M06 - Configure & Administer Server
M06 - Configure & Administer Server
Information Sheet 1.1 Confirming network operating system and server design
The first step in building and configuring a server is to confirm that theinformation about
the project is correct, current and that the client agrees withdocumented specifications
and design.
You will need to reconfirm with the client
The role of the server
How it will function with the remaining IT infrastructure, and the required
configuration.
Functional requirements
Functional requirements capture the intended behavior of the system. This behavior
may be expressed as a service, task or function that the system is required to perform.
The functional requirements documents are the ‘blueprint’ for the project implementation
Requirements issues
One of the first and most important activities to get on when confirming server
specifications is to confirm client needs and to ensure that they acknowledge that
requirements have been captured correctly and sign-off on the requirements
The functional specification describes what the system will do, as opposed to how it
will be done. This distinction is important because the client may not be interested in the
details of how a function is implemented, and the technical details may simply cause
confusion for the client the implementation details may need to change during the
design and development of the project. You don’t want to have to negotiate changes to
the functional specification just to change details of implementation the technical
specification for large projects will be detailed in a separate document, and you should
not entangle one with the other.
User requirements
Technical requirements
What does management expect the system will do and won’t do?
Hardware
Support for proprietary formats: will the existing systems and architecture support
all types of data?
Will the new system be supported by existing resources within the company?
Are there other projects that you may be able to share hardware costs with?
Software
Can the software be licensed for use by multiple users who use it on different
machines? (Concurrent licensing)
What happens if the software company becomes insolvent? Who supports it?
What happens if the source code is modified? Who supports the product then?
Does the solution work with all other company software systems?
Stage sign-off
A project is divided into many stages. Each stage will have entry and exit criteria that
must be met before the project can progress further.
At the planning stage, the owner of the system or project steering committee must sign-
off on stage exit criteria, which would include server design documentation. This then
would trigger the start of the next stage of the project the development stage.
The exit criteria will normally state that the following items have been identified and
agreed to:
Server platforms
Operating systems
Applications
Privacy issues
Initial timelines
Budget
Identify specifications
Once requirements have been defined and client needs are clarified, it’s time to start
thinking about identifying products that fit the solution. In this case, we need to focus on
the possible server solutions. Remember: a server consists of
Hardware
Software
Network connections.
There are different types of server designs that need to be considered when identifying
equipment. There are multiple server architectures to choose from, including
Mainframe architecture
Client/server architecture
Blade architecture.
Definition– Network operating system is like as software that is installed on the server
side on the network infrastructure. Network operating system provides the several
functionalities for managing the data, applications, security, and other functions. In this
system, all computers and other terminal are connected each other through LAN (Local
Area Network) line or Inter-network system. Main objective of NOS (Network operating
system) is to share data, printer access, and other devices. Novell NetWare was
introduced as a first network operating system, in 1983.
NOS allows the protection of data, information, and their hardware components
from unauthorized users.
To detect the all errors and bugs while execution of their jobs.
NOS allows to all users for creating user account, and they can manage them as
well.
Hardware Components
There are some devices which are physically connected with each other.
Server M/C
Client M/C
Peer M/C
Software Components
These are some programs which are installed on the network machines.
Each vendor in the marketplace supports specific platforms and server architecture.
When selecting equipment for the server, you will need to consider the hardware and
software platforms from each vendor.
Hardware platform refers to the hardware components that make up the computer
system.
Platform selection
mail services
web services
network access
Application services.
Detailed information about server hardware is available from the server documentation
and from the hardware manufacturer’s website. At a minimum, the server vendor will
have a component list detailing what hardware is in the server.
Hub
Hubs connect multiple computer networking devices together. A hub also acts as a
repeater in that it amplifies signals that deteriorate after traveling long distances over
connecting cables. A hub is the simplest in the family of network connecting devices
because it connects LAN components with identical protocols.
A hub can be used with both digital and analog data, provided its settings have been
configured to prepare for the formatting of the incoming data. For example, if the
incoming data is in digital format, the hub must pass it on as packets; however, if the
incoming data is analog, then the hub passes it on in signal form.
Hubs do not perform packet filtering or addressing functions; they just send data
packets to all connected devices. Hubs operate at the Physical layer of the Open
Systems Interconnection (OSI) model. There are two types of hubs: simple and
multiple port.
Switch
Switches generally have a more intelligent role than hubs. A switch is a multiport device
that improves network efficiency. The switch maintains limited routing information about
nodes in the internal network, and it allows connections to systems like hubs or routers.
Strands of LANs are usually connected using switches. Generally, switches can read
the hardware addresses of incoming packets to transmit them to the appropriate
destination.
Using switches improves network efficiency over hubs or routers because of the virtual
circuit capability. Switches also improve network security because the virtual circuits are
more difficult to examine with network monitors. You can think of a switch as a device
that has some of the best capabilities of routers and hubs combined. A switch can work
at either the Data Link layer or the Network layer of the OSI model. A multilayer
switch is one that can operate at both layers, which means that it can operate as both a
switch and a router. A multilayer switch is a high-performance device that supports the
same routing protocols as routers.
Switches can be subject to distributed denial of service (DDoS) attacks; flood guards
are used to prevent malicious traffic from bringing the switch to a halt. Switch port
security is important so be sure to secure switches: Disable all unused ports and use
DHCP snooping, ARP inspection and MAC address filtering.
Modem
Modems (modulators-demodulators) are used to transmit digital signals over analog
telephone lines. Thus, digital signals are converted by the modem into analog signals of
different frequencies and transmitted to a modem at the receiving location. The
receiving modem performs the reverse transformation and provides a digital output to a
device connected to a modem, usually a computer. The digital data is usually
transferred to or from the modem over a serial line through an industry standard
interface, RS-232. Many telephone companies offer DSL services, and many cable
operators use modems as end terminals for identification and recognition of home and
personal users. Modems work on both the Physical and Data Link layers.
Router
Routers help transmit packets to their destinations by charting a path through the sea of
interconnected networking devices using different network topologies. Routers are
intelligent devices, and they store information about the networks they’re connected to.
Most routers can be configured to operate as packet-filtering firewalls and use access
control lists (ACLs). Routers, in conjunction with a channel service unit/data service unit
(CSU/DSU), are also used to translate from LAN framing to WAN framing. This is
needed because LANs and WANs use different network protocols. Such routers are
known as border routers. They serve as the outside connection of a LAN to a WAN, and
they operate at the border of your network.
Router are also used to divide internal networks into two or more sub networks. Routers
can also be connected internally to other routers, creating zones that operate
independently. Routers establish communication by maintaining tables about
destinations and local connections. A router contains information about the systems
connected to it and where to send requests if the destination isn’t known. Routers
usually communicate routing and other information using one of three standard
protocols: Routing Information Protocol (RIP), Border Gateway Protocol (BGP) or Open
Shortest Path First (OSPF).
Routers are your first line of defense, and they must be configured to pass only traffic
that is authorized by network administrators. The routes themselves can be configured
as static or dynamic. If they are static, they can only be configured manually and stay
that way until changed. If they are dynamic, they learn of other routers around them and
use information about those routers to build their routing tables.
Crimpers
Crimpers are tools used to make cold weld joints between two wires or a wire and a
connector, such as lugs. Ideally, the electrical and mechanical properties of the weld
joint are as strong as the parent materials. Crimping tools are sized according to the
wire gauges (using AWG - American Wire Gauge) they can accept.
Self-Check1.2. Written Test
Processors
Storage
Optical drive.
System requirements
For hardware and software components, you will need to ensure that any minimum
system requirements are met. You will find this information at manufacturer’s websites
as whitepaper, installation documentation, and product overviews.
For software, you will need to ensure that your system meets minimum requirements for
for hardware components you will need to ensure compatibility with the
existing system o
Hard drives and optical drives — ensure that there is an available drive
bay, power cable and interface connection.
Expansion cards — ensure that there is a suitable expansion slot for
installation of the expansion card.
Active Directory
Disk Management
Windows networking
Successor to FAT/FAT32
Native support for long filenames, file and folder permissions, support for large
files and volumes, reliability, compression, and encryption
Most significant is the added ability for more granular file access control
Active Directory
Uses snap-ins, which are designed to perform specific administrative tasks (such
as disk management or active directory configuration)
Multiple snap-ins can be combined into a single MMC, providing quicker access
to commonly used tools
Disk Management
Shadow copies
Disk quotas
Easy to configure and works well for small groups of users (fewer than 10)
Network Interface
Composed of two parts; the network interface card (NIC) and the device
driver software
Network Protocol
Modular design
Extensibility
Manageability
Computer hardware raises similar issues. In some instances, two pieces of hardware
simply can't communicate with each other. For example, consider an analogy to
automobile parts: two parts might look alike and be able to perform the same function,
but each is designed to work in a different car.
This lesson examines the issue of ensuring hardware compatibility and what you can do
to resolve incompatibilities.
Each developer has a unique perspective on the best way to accomplish the same task,
and each will provide a unique solution. Copyright and patent issues further
complicatethe matter. Evaluating and selecting hardware is a major part of planning for
network implementation.
It is likely that you will have to create a network out of an existing collection of hardware.
In such cases, the likelihood that problems stemming from incompatible hardware will
arise is very high. It is sometimes more cost-effective to discard the old hardware and
start over. The most common incompatibilities occur between hardware and software.
Changing or upgrading a computer or network operating system can lead to major
problems.
Read all the documentation about the products involved. Your hardware or software
might have a recurring problem or might conflict with another product. Frequently, the
manufacturer will document these conflicts and provide a fix. If you do not find the
solution in the supplied documentation, you might contact the manufacturer of the
product and ask for undocumented conflicts.
When you install a new computer or network operating system, your computer will
usually attempt to detect the hardware in the system during the installation process and
load the appropriate drivers for it.
Check the list of detected hardware and ensure that it matches what is already in the
machine. If you are installing Novell's Intranet Ware, for example, the install utility will
automatically scan your computer for hardware such as hard disks, CD-ROM drives,
and NICs. If the devices are recognized, the appropriate drivers will then be loaded for
the recognized devices.
COMPUTER
Checking Minimum Requirements
As a first step before you install, make sure that you exceed the minimum requirements
for the resources in the computer. These resources include processor speed, memory,
and disk space. Table1.1 Minimum computer Hardware Requirements for server 2008
lists some minimum computer hardware requirements for server 2008
Minimum CPU 133 MHz 133 MHz for 400 MHz for 133 MHz
x86-based x86-based
Speed
computers733 computers733
MHz for Itanium- MHz for
based Itanium-based
computers* computers*
Multiprocessor Up to 4 Up to 8 Minimum 8 Up to 2
Support ** required
Maximum 64
Weight Approx. 22 to 58 g
Software compatibility
Application software
When evaluating software, the cost of the product will be determined by how many
licenses are required. A license is a legal agreement to use software, and the exact
terms of the agreement vary.
An important part of managing software licenses is to purchase the right types and mix
of licenses. Software licenses are offered as follows:
Network Hardware
Since these devices are common to many different types of networks and work mainly
with data packets, they are less likely to present conflicts. The manufacturers of these
products maintain strict adherence to the IEEE 802.x standards.
Therefore, any device that meets an IEEE standard can communicate with another
device that meets the same standard. The only situation in which you can expect
incompatibility issues to arise is when two devices meet different standards. There are
some network hardware that’s stated below.
NIC
NIC stands for “Network Interface Card”, and this hardware component is used to link
multiple computers with each other over the network. NIC performs some activates
such as sending and receiving data as well as controlling data flow between linked all
terminals over the network. NIC is capable to send and receive data on (10,100 to 1000
Mb/s) transfer rate. All NIC contain unique id (MAC address) that is programmed on
chip, and it is embedded on the network interface card.
NIC has two variant such as –
1. Wired NIC – Cables and connectors are connected to Wired NIC, which is
embedded inside the motherboard.
2. Wireless NIC – Wireless NIC has small type antenna, it helps to make
connection on the wireless network.
Modem
Wireless modem – Wireless modem contains small antenna, and it is connected with
computer terminal through wireless network.
Switches
Switches are used in the wired network such as Ethernet network. Switch is a small
type of hardware component that helps to receive data from other different input ports
and send this got data to appropriate output port, and finally destination terminal obtains
data over the network.
Here, some types of switches
Unmanaged switches – These switches are used in the small area such as home
network.
Managed switches – These switches are used in medium size of area such as small
and large organizations. There are two types such as Smart switches and Enterprise
managed switches.
Ethernet switches – These types of switches are mostly used to decrease network
congestion, and it helps to make connection with LAN points.
PoE switches – PoE switches stands for “Power over Ethernet”, and they deliver to
great flexibility by cabling process.
Client
Client is edge point of computers which are obtained the requests and received services
from server side, and it uses computer network resources such as printer, scanner,
plotter, and more.
Server
Server is high level computer which are get high configuration. It has responsibility to
handle all resources of the entire network system. On the server, a special type of
operating system is installed, it is known as network operating system.
File servers
Database servers
The steps for installing an operating system, like Linux or Microsoft Windows, depends
on the operating system version you are installing. Each version has different steps and
options that are unique to that operating system.
On this page, you'll find general steps and guidelines for installing an operating system
on your computer.
First, you need to purchase the operating system that you want to install on the
computer. The best place to purchase the operating system from is a retail store, like
Best Buy, or through an online store, like Amazon or Newegg. The operating system
may come on multiple CD or DVD discs, or it may even come on a USB flash drive.
Downloading a copy of the operating system is usually the most convenient way to
obtain it. However, be sure you obtain the operating system from the publisher, like
Microsoft. Downloading it from another source may result in an unusable or illegal copy
of the software.
To install the computer's operating system using a CD or DVD, you need to configure
your computer to boot from the CD/DVD drive. You can change the boot sequence in
your BIOS setup, and setting the CD/DVD drive to be the first boot device. Some
computers may also allow you to access the boot sequence directly at computer start
up, without entering the BIOS, by pressing a specific key on the keyboard. The key to
press differs for each computer, but is often the Delete key or one of the function keys.
If the operating system software came on a USB flash drive, you need to configure the
computer to boot to a USB device as the first boot device.
Once the computer is configured to boot to the proper device, the computer should load
the operating system installation program and guide you through the install process.
You will be asked questions along the way for configuration of basic settings, like date
and time, user account name, and if you want to enable automatic operating system
updates. Go through the installation steps, answering questions and selecting the
preferred options
Operation Sheet 2.1. Installing operating system and software
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step 1. Insert the appropriate Windows Server 2008 installation media into your
DVD drive.
Step 2. Reboot the computer.
Step 3.When prompted for an installation language and other regional options, make
your selection and press Next.
Step4. Next, press Install Now to begin the installation process.
Step5. Product activation is now also identical with that found in Windows Vista. Enter
your Product ID in the next window, and if you want to automatically activate Windows
the moment the installation finishes, click Next.
Step6. If you do not have the Product ID available right now, you can leave the box
empty, and click next. You will need to provide the Product ID later, after the server
installation is over. Press No.
Step7. Because you did not provide the correct ID, the installation process cannot
determine what kind of Windows Server 2008 license you own, and therefore you will be
prompted to select your correct version in the next screen, assuming you are telling
the truth and will provide the correct ID to prove your selection later on.
Step8. If you did provide the right Product ID, select the Full version of the right
Windows version you're prompted, and click Next.
Step9. Read and accept the license terms by clicking to select the checkbox and
pressing Next.
Step 10. In the "Which type of installation do you want?" window, click the only
available option – Custom (Advanced).
Step 11. In the "Where do you want to install Windows?", if you're installing the
server on a regular IDE hard disk, click to select the first disk, usually Disk 0, and click
Next.
Step12.The installation now begins, and you can go and have lunch. Copying the setup
files from the DVD to the hard drive only takes about one minute. However, extracting
and uncompressing the files takes a good deal longer. After 20 minutes, the operating
system is installed. The exact time it takes to install server core depends upon your
hardware specifications. Faster disks will perform much faster installs… Windows
Server 2008 takes up approximately 10 GB of hard drive space.
Step 13. Then the server reboots you'll be prompted with the new Windows Server
2008 type of login screen. Press CTRL+ALT+DEL to log in.
Step 14. Click on Other User.
Step 15. The default Administrator is blank, so just type Administrator and press
Enter.
Step 16.You will be prompted to change the user's password. You have no choice but
to press Ok.
Step 17. In the password changing dialog box, leave the default password blank (duh,
read step #15…), and enter a new, complex, at-least-7-characters-long new password
twice. A password like "topsecret" is not valid (it's not complex), but one like
"T0pSecreT!" sure is. Make sure you remember it.
Step 18.Someone thought it would be cool to nag you once more, so now you'll be
prompted to accept the fact that the password had been changed. Press Ok.
Step 19. Finally, the desktop appears and that's it, you're logged on and can begin
working. You will be greeted by an assistant for the initial server configuration, and
after performing some initial configuration tasks, you will be able to start working
First off, keep in mind that the method of installation is dependent on the type of device
driver you are working with. Each type has its own particular needs and methods. In
addition, each developer of the driver may have specifics on how they would like the
driver to be downloaded and used.
Consider the following methods to installing device drivers, most commonly found.
CD And Discs: When it comes to Windows, almost all manufacturers of hardware and
computer components will include a group of device drivers for each of these devices
on a CD or other disc. However, remember this, too. Often times, the same CD will
contain drivers for more than just one driver. For example, if you obtained a device
driver for a printer on CD form, chances are good that CD also has drivers for numerous
other printers. Therefore, it is critical to select only the driver right for the printer you
have.
Downloading: In this day and age, it is easy to find what you need online. That goes for
device drivers, too. Most of the drivers you need can be downloaded from the web.
These are going to download in an executable file in most situations that will be
compressed. You will need to uncompressed the file and extract the information from it.
This is all done by answering questions that are posed to you as the driver downloads.
It is also helpful to note that when you are done downloading these files, you can delete
them from your computer. They are not necessary files after you have installed the
driver and just take up space.
Take the time to find the right device driver for the computer component that you are
downloading. It is critical to have the exact information in place to ensure that you are
actually downloading the right driver, since even small number differences can make
problems rather than solutions.
The good news is that most manufacturers realize that people do not have extensive
knowledge of how to use these drivers and therefore they make the process simple
using on screen navigation screens. Even if you do know how to use these files, these
on screen steps make the process simplistic. Simply follow the commands as directed.
Learning how to install drivers is a onetime thing. Once you know how to do so, you will
see that the process is easy and can be highly efficient. Keep in mind that as new
media becomes available, the methods for installation may differ. Nearly all computer
components you need device drivers for will come with specific directions on how to
download these to your computer.
What are device drivers and why do you have to worry about them? If you just
purchased a printer, camera or even a new video card, you need device drivers. You
cannot often take these items out of the box, slide them into your computer and assume
that they will work. In some instances, these devices may work like this, however they
may also have problems, including glitches. This can be quite frustrating for anyone that
just wants to start using what they purchased. The fact is, you need to download device
drivers to your computer to work between your new hardware and the computer itself.
Device drivers
A device driver is a set of instructions. The driver tells your computer what to do with the
hardware you are installing in it. For example, you may have a new printer. Your
computer does not have information installed in it to handle all types of printers, since
every printer is slightly different. Therefore, it needs something to tell it what to do.
Device drivers are created by the manufacturers of the hardware (in this case the printer
manufacturer) and provide very specific instructions on how to use the device.
Just about all computer devices require the use of device drivers. They tell the computer
what the device is and how to use it. This includes both internal and external devices.
Installing Drivers
The good news is that it is usually fairly easy for you to download device drivers to your
computer so that you can start using the device. Most of the time, device drivers are
sent with the manufacturer of the device to you when you purchase the device. This is
often done in the form of a CD ROM. All you need to do is to insert the CD and follow
the directions provided to you. The driver will be automatically loaded onto your
computer.
Repairing Drivers
Device drivers are a form of software. Therefore, you have to keep in mind that these
drivers may in fact become corrupt or they may not work properly over time. The good
news is that you can often reinstall the device driver to fix the problem. If you need to do
this, try to use the same installation disk you used rather than investing in a third party
to have the driver you need.
If you cannot find the device driver you need from the installation disk, or you do not
have a disk, you can visit the manufacturer's website, as well as a number of third party
websites, to obtain the driver. It is important to have the right driver, so look for them
based on the manufacturer and model number.
You do need device drivers to operate many of the software and hardware that is
installed on your computer. They provide a fundamental resource for your computer in
telling your computer what to do with the device. Device drivers do not have to be
difficult to find or use, if you know where to look.
The Importance of Choosing Compatible Device Drivers
Why do you use your computer? Unless you just use it to play games or to write reports
just for your own information, you need device drivers. If you watch videos online line
you need video and audio drivers in addition to sound and video cards. The drivers you
install must be compatible with the device as well as your computer and its operating
system. You can't simply choose drivers you may have from another system and expect
them to work - it just won't happen. If the drivers are not compatible with the device on
which you install them, the device will not work.
That doesn't mean each device needs its own driver - there are some drivers that will
work on more than one type of device - if that were not the case we would find probably
millions of different device drivers on the market. It is essential for the user to choose
the drivers that are designed to work with the hardware they have on their computer.
Failure to do this will render the device unusable. You can buy the most expensive
printer you can find, connect it to your computer, but if you do not use the printer drivers
that are compatible with your hardware nothing you do will make the printer work. The
same holds true for network drivers, probably the most important of your drivers.
Without compatible network drivers your compute will not be able to communicate with
other computers in the network or allow you to access the Internet.
Wouldn't it be easier to design drivers that will work on any device by any
manufacturer? It might seem it would be easier but in reality, it would be much more
complicated. Each hardware device has a different set of components, so to make
drivers that would work with all of those components interchangeably would be very
complicated indeed. Even if it were possible, there is a good probability those drivers
would lack the efficiency of those that are designed for specific hardware devices.
Using compatible drivers for each hardware device will make that device more efficient
and assure a long life for both the device and the drivers. If you were to attempt to use
the wrong drivers for an audio device, it would likely provide a distorted sound quality if
it even worked at all. If you think back to the days when we relied on typewriters, you
will remember ribbons and then later printer balls were designed for specific models.
Certainly, the same one worked in more than one model but only if you choose the one
that was compatible with that model. The same holds true for device drivers.
Whether you are operating a home or business computer it is essential for you to
understand the importance of drivers and choosing ones that are compatible with the
hardware you are using. Have no doubts about it - the wrong drivers will reduce the
efficiency of your device or will prevent it from working entirely.
Equipment ,tools and materials: computer and driver pack solution software
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required, need available power all time and internet
connection.
Procedures :
Download and run it easily, and it will check your computer configurations.
Step2- After checking your computer configurations, the application will look like
below
You can chose to do automatic setup or you can click on the expert mode on the below
bar to customize your driver and programs installations, and that’s what i recommend
On this step you will select which software do you need for your computer
Step5- The most important step and it’s Drivers installation
Select the required drivers that you need to install and also you will notice that
Driverpack can update your current drivers
After made your selections with each tab (Drivers,Software,Security,..Etc) click Install
everything, and the driver pack will download your required drivers and software to
install
It's pretty much useless. New threats that have been discovered since its last update
cannot be picked up, as it'll not show any no record of it being a vulnerability. Patching
your anti-virus means that it can pick up everything that it should do.
Patch management is the process of distributing and applying updates to software. ...
Common areas that will need patches include operating systems, applications, and
embedded systems (like network equipment). When a vulnerability is found after the
release of a piece of software, a patch can be used to fix it.
Patching
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step3. DefineConfiguration
Parameter Description
Add the Patches If you have reached this configuration page from the Patch
Management tab by selecting the patches, the selected patches
automatically gets added to the List of Patches.
Click the Add More Patches button to invoke the Patch Browser. From
the patch browser select the patches and service packs that have to
be applied. The patch browser has an option to view the missing
patches/service packs or all patches/service packs, which can then be
filtered based on the application and service pack.
Select this option and specify the date and time after which the
patches have to be installed. The patches will be installed
based on the Install Options selected after the scheduled time.
Expiry date
Deployment If you have set any Policy as default, then the default policy will be
Settings automatically applied to the configuration. You can choose from the
policies which are listed under "Apply Deployment Policy". You can
see the Policies segregated as My Policies and Created by Others.
You can click on View Details to see the policy details and the list of
configurations to which the policy is applied.
If you do not have an existing policy, you can create one by clicking on
create policy
Using the Defining Targets procedure, define the targets for deploying the Install
Patches Configuration.
Click the Deploy button to deploy the defined Install Patches Configuration in the
defined targets. Deployment will be initiated during the next system startup.
Quality criteria: install all patch file and safe computer from any kind of security threat.
Equipment ,tools and materials: windows 10 and office 2013 installed computer
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step 1. Click on the Windows "start" icon (bottom-left corner of your screen).
Step 3. Click on "Apps". The "Apps and Features" window containing a list of your
installed programs should appear.
Step 4. Select "Microsoft Office" (or "Microsoft Excel" if you do not have the full Office
installation).
Step 5.Click"Modify".
Step 6. Choose from "Quick Repair" or "Online Repair".
Quality criteria: install all patch file and repair MS office 2013
Practical Demonstration
LAP Test 1
Instructions: Given necessary templates, workshop, tools and materials you are
required to perform the following tasks within 3 hours.
Task1: installing server 2008 operating system
1. Install Windows Server 2008 Operating System on the Server Computer
Task2: installing deriver pack solution
Task3: installing operating system patch
Task4: installing application software patch
LO #3- Configure and test server
Information Sheet 3.1. Configuring server and its applications using technical
requirements
Server configuration
Configuring server hardware and software means setting up the way the hardware and
software operates to suit the IT environment and organizational or user requirements.
Generally, server hardware is configured before the server operating system is installed
or afterwards, if hardware components in an operating server are being changed or
added. Software may be configured when installed, as part of the installation process,
or afterwards, if a default installation has been performed. Some specific considerations
for configuring server hardware and software configuration follow.
Server Hardware Configuration
Server hardware configurations will depend on what components make up the server.
Configurations you may need to consider include those for
Storage
Boot sequence
Specific device
Redundant component
Configurations for server software depend on the purpose or function of the server.
Generally, a server may be configured for one or more of the following roles:
A storage server which provides a central storage place for data that can
be accessed by computer users around a network.
A network services server which provides specific services such as print,
user authentication and authorizations, dynamic host configuration protocol
(DHCP), and domain name system (DNS) are some examples of the
services that can be provided.
Server Items to be Configured
Environment setting and policies, which are settings for the server to operate as
required or settings dictated by organizational policy. Having data backup schedules for
the server is an example of environment setting.
Types of Servers
Mail Server (POP3, SMTP) Installs POP3 and SMTP so that the server
can act as an e-mail server for POP3 clients.
Active directory
Microsoft Active Directory provides the structure to centralize the network management
and store information about network resources across the entire domain.Active
Directory uses Domain Controllers to keep this centralized storage available to network
users. In order to configure a Windows Server 2008 machine to act as Domain
Controller, several considerations and prerequisites should be taken into account, and
several steps should be performed.
When you install AD to create the first domain controller in a new Windows Server 2008
forest, you must keep the following considerations in mind:
You must make forest and domain functional level decisions that determine
whether your forest and domain can contain domain controllers that run Windows
2000 Server, Windows Server 2003, or both.
Domain controllers running the Microsoft Windows NT Server 4.0 operating
system are NOT supported with Windows Server 2008.
Servers running Windows NT Server 4.0 are NOT supported by domain
controllers that are running Windows Server 2008, meaning you MUST have
additional DCs running Windows 2000/2003 to support older NT 4.0 servers.
The first Windows Server 2008 domain controller in a forest must be a global
catalog server
When you install AD to create the first domain controller in a new Windows Server 2008
domain, you must keep the following considerations in mind:
Before you create a new Windows Server 2008 domain in a Windows 2000/2003
forest, you must prepare the forest for Windows Server 2008 by extending the
schema.
You must make domain functional level decisions that determine whether your
domain can contain domain controllers that run Windows 2000 Server, Windows
Server 2003, or both.
General considerations
User Objects
User objects are, well, users! Users, after all, are the foundation of your organization.
When you right-click a User object and select Properties, you’ll see the screen shown in
Figure 1.
General: Displays general descriptive information about the user, including name, email
address and primary telephone number.
Address: This tab displays postal addresses for the selected user.
Account: The Account tab holds detailed account information for the user, including the
logon name for the user and, via the Logon Hours button on this tab, account
restrictions.
The Account options section gives you a way to force users to change their password at
next logon, prevent them from changing passwords, require a Smart Card for logon, and
enable delegation for the account. You’ll also use this page if the account gets locked
out due to logon failures. Microsoft has made is easy to unlock accounts by adding an
“Unlock account” option to this tab.
Profile: The Profile tab holds fields that specify the paths to any logon scripts the user
needs to access. You can also specify a path to the user’s profile and home folder here.
Telephones: This tab serves as a repository for any telephone numbers you have for
the user, including pagers, cell phones, and IP telephone numbers.
Organization: Don’t confuse this tab with Active Directory’s Organizational Unit object.
Here, you’ll place information about the user’s company, including job title, department,
and company name. You can also link the user to his or her manager’s Active Directory
object.
Terminal Services Profile: This tab is similar to the Profile tab, but this only controls
profile information for the Terminal Services session, including home folder location.
COM+: You can assign the user to be part of a COM+ partition set here. COM+ partition
sets allow users in a domain to access COM+ applications throughout the domain.
Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008,
Microsoft has borrowed from the ADSI Edit utility and added this tab, which allows you
to directly manipulate all of the attributes associated with the selected object.
Security: This tab controls the Active Directory rights other objects have to this object.
The Group or users box lists the objects with rights and the Permissions box describes
the permissions of the selected object.
Environment: This tab controls the Terminal Services startup environment for the user.
Sessions: The information on the Sessions tab helps you control how the user interacts
with Terminal Services, including how long a session stays connected and what
happens if she disconnect from the server.
Remote Control: This tab indicates whether a user’s Terminal Server session can be
remotely controlled. You can set options that allow you to establish view-only sessions
or that allow interaction.
Published Certificates: This tab allows you to associate X.509 security certificates with
the user.
Group Objects
There are a couple of kinds of group objects that can be created in Active Directory. The
first kind, the security distribution group, provides a way to manage access rights for
multiple users (or other objects) all at once. Rather than assign individual permissions to
a file share, for example, you can give rights to the security group and then add and
remove group members as needed. Security groups can also be used as email
distribution groups. The second kind of group, called a distribution group, is used solely
as an email distribution list. This article focuses on security groups.
If you right click a Group object, you’ll see the screen shown in Figure 2.
Figure 2: domain admins properties
General: This tab displays information about the object. You can view, but not
change Group Scope and Group Type for Groups. You can change all other
fields on this page.
Member: Here you can add and remove group members. By clicking the Add
button, you can add individual objects or select multiple objects.
Member Of: This tab lists the groups that the object belongs to. You can add or
delete group membership here.
Managed By: Here you can enter information about who’s in charge of the
computer. You can quickly assign someone by selecting their information directly
from Active Directory.
Object: This tab displays information about the object including its name, when it
was created, when it was last updated, and the Update Sequence Numbers for it.
On this tab, you can also indicate that the object should be protected from
accidental deletion.
Security: This tab controls the Active Directory rights other objects have to this
object. The Group or users box lists the objects with rights and the
Permissions box describes the permissions the selected object has.
Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008,
Microsoft has borrowed from the ADSI Edit utility and added this tab, which
allows you to directly manipulate all of the attributes associated with the selected
object.
Operation Sheet 3.1.1Installing active directory
Equipment ,tools and materials: server 2008 software CD and windows server 2008
installed computer
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Roles can and should be added from Server Manager (but they can also be initiated
from the Initial Configuration Tasks wizard that auto-opens the first time you log on to
the server).
Step 1.Open Server Manager by clicking the icon in the Quick Launch toolbar, or from
the Administrative Tools folder.
Step2. Wait till it finishes loading, then click on Roles > Add Roles link.
Step 5.In the Active Directory Domain Services window read the provided information if
you want to, and then click Next.
.
Step 6.In the Confirm Installation Selections, read the provided information if you want
to, and then click Next.
Step 8. Going back to Server Manager, click on the Active Directory Domain
Services link, and note that there's no information linked to it, because the DCPROMO
command has not been run yet.
Step 9.Now you can click on the DCPROMO link, or read on.
To run DCPROMO
Step 1.enter the command in the Run command, or click on the DCPROMO link from
Server Manager > Roles > Active Directory Domain Services.
Step 2. Depending upon the question if AD-DS was previously installed or not, the
Active Directory Domain Services Installation Wizard will appear immediately or after a
short while. Click Next.
Note: The Advanced features of DCPROMO will be discussed in a future article.
Step 10. In the Operating System Compatibility window, read the provided information
and click Next.
Step 11. In the Choosing Deployment Configuration window, click on "Create a new
domain in a new forest" and click Next.
Step 12. Enter an appropriate name for the new domain. Make sure you pick the right
domain name, as renaming domains is a task you will not wish to perform on a daily
Note: Do NOT use single label domain names such as "mydomain" or similar. You
MUST pick a full domain name such as "mydomain.local" or "mydomain.com" and so
on.
The wizard will perform checks to see if the domain name is not already in use on the
local network.
Step 13. Pick the right forest function level. Windows 2000 mode is the default, and it
allows the addition of Windows 2000, Windows Server 2003 and Windows Server 2008
Domain Controllers to the forest you're creating.
Step 14.Pick the right domain function level. Windows 2000 Native mode is the default,
and it allows the addition of Windows 2000, Windows Server 2003 and Windows Server
2008 Domain Controllers to the domain you're creating.
Note: If you select "Windows Server 2008" for the forest function level, you will Not be
prompted to pick a domain function level.
Step15.The wizard will perform checks to see if DNS is properly configured on the local
network. In this case, no DNS server has been configured, therefore, the wizard will
offer to automatically install DNS on this server.
Note: The first DCs must also be a Global Catalog. Also, the first DCs in a forest cannot
be a Read Only Domain controller.
Step16.It's most likely that you'll get a warning telling you that the server has one or
more dynamic IP Addresses. Running IPCONFIG /all will show that this is not the case,
because as you can clearly see, I have given the server a static IP Address. So, where
did this come from? The answer is IPv6. I did not manually configure the IPv6 Address,
hence the warning. In a network where IPv6 is not used, you can safely ignore this
warning.
Step 17.You'll probably get a warning about DNS delegation. Since no DNS has been
configured yet, you can ignore the message and click Yes.
Step 18Next, change the paths for the AD database, log files and SYSVOL folder. For
large deployments, carefully plan your DC configuration to get the maximum
performance. When satisfied, click Next.
Step19.Enter the password for the Active Directory Recovery Mode. This password
must be kept confidential, and because it stays constant while regular domain user
passwords expire (based upon the password policy configured for the domain, the
default is 42 days), it does not. This password should be complex and at least 7
characters long. It is strongly suggest that you do NOT use the regular administrator's
password, and that you write it down and securely store it. Click Next.
Step 20.In the Summary window review your selections, and if required, save them to
an un attend answer file. When satisfied, click Next.
Step 21.The wizard will begin creating the Active Directory domain, and when finished,
you will need to press Finish and reboot your computer.
Note: You can automate the rebooting process by checking the Reboot on Completion
checkbox.
Method 2 – Servermanagercmd.exe
Servermanagercmd.exe is the command prompt equivalent of the Add Roles and Add
Features wizards in Server Manager. Through the use of various command line options,
you can quickly and easily add or remove features and roles to or from your server,
including the AD-DS role.
Let the command run and when it finishes, AD-DS will be installed on the server.
Step1.Oh yes. If you forget to install AD-DS or simply want to skip clicking on some
windows, you can run DCPROMO from the Run command and before it is executed, the
server will check to see if the AD-DS binaries are installed. Since they are not, they will
auto-install.
Step 2.After you complete the Add Roles Wizard, either click the link to start the Active
Directory Domain Services Installation Wizard, or close Server Manager and manually
run DCPROMO from the Run command.
Running DCPROMO
After installing the AD-DS role, we need to run DCPROMO to perform the actual Active
Directory database and function installation.
Quality criteria: install all rolls which are available in server 2008
Operation Sheet 3.1.1.1 Creating Users and User Templates in Windows Server
2008 Active Directory
Purpose: To create user in server 2008 and use template for huge amount of user
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step2.Next we will open up the Roles section, next to Active Directory Users and
Computers section and finally the Active Directory Users and Computers. You
should now see your domain name.
Step3.We are going to click on our Users section where we are going to create a new
User Account. To do so, right-click on the blank section, point to New and select User.
Step 4.In this window you need to type in the user’s first name, middle initial and last
name. Next you will need to create a user’s logon name.
In our example we are going to create a user account for Billy Miles and his logon name
will be bmiles. When done, click on the Next button.
Step 5.In the next window you will need to create a password for your new user and
select appropriate options.
In our example we are going to have the user change his password at his next logon.
You can also prevent a user from changing his password, set the password so that it
will never expire or completely disable the account.When you are done making your
selections, click the Next button.
Step 6.And finally, click on the Finish button to complete the creation of new User
Account.
Creating user using template
Step1.To start out, right-click on the empty space, point to new, and select User.
Step 2. Type in the user’s name (with asterisks if so desired) and click Next.
Step3.Create the template’s password and do not forget to check the box next to the
Account is disabled option. When ready, click Next.
Step 4.Once the account is created, you can go ahead and add all the properties you
need for that template. To do so, double-click on that account and navigate to a specific
tab. Once done click OK.
How To Use a User Template in Active Directory
Step 1.Now in order to use that user template, we are going to select it, copy it and add
the unique information such as user name, password, etc.We can do that for as many
users as needed. Let’s start by right-clicking on the template and selecting Copy.
Step 2. Next we are going to enter the user’s name, login and password information
while making sure the checkbox next to Account is disabled is unchecked.
Step 3. Once we finish, our new user account is created with all the properties of the
template account. Now wasn’t that easy!
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step 1.ClickStart, click Administrative Tools, and then click Active Directory
Users and Computers. The Active Directory Users and Computers MMC opens. If
it is not already selected, click the node for your domain. For example, if your
domain is example.com, click example.com.
Step 2.In the details pane, right-click the folder in which you want to add a new
group.
Where?
Step 4.InNew Object – Group, in Group name, type the name of the new group.
By default, the name you type is also entered as the pre-Windows 2000 name of
the new group.
Domain local
Global
Universal
Step 6.In Group type, select one of the following options:
Security
Distribution
Step 7.ClickOK.
Step 1.ClickStart, click Administrative Tools, and then click Active Directory
Users and Computers. The Active Directory Users and Computers MMC opens. If
it is not already selected, click the node for your domain. For example, if your
domain is example.com, click example.com.
Step 2.In the details pane, double-click the folder that contains the group to which
you want to add a member.
Where?
Step 3.In the details pane, right-click the group to which you want to add a member,
and then click Properties. The group Properties dialog box opens. Click the
Members tab.
Step 5.In Enter the object names to select, type the name of the user, group, or
computer that you want to add, and then click OK.
Step 6.To assign group membership to other users, groups or computers, repeat
steps 4 and 5 of this procedure.
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step 1.In the Active Directory Users and computers Window right click on FQDN
(project.sbk.com) and in the appeared menu select New then Select Organizational
Unit
Step 2.Creating OU write the require Name, check protection container option and click
OK
The required OU(Student) is created below FQDN (project.sbk.com)
DNS
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step 1.InServer Manager window, and let’s click with right mouse button on Roles and
let’s select Add roles.
Step 2. Now we have Add Roles Wizard, and we have to select DNS Server role (or
any other Windows Server 2008 role) in Select Server Roles screen. Then, click on
Next.
Step 5.Computer will then reboot and that’s it, you have Domain Name System Server
installed on Windows Server 2008.
Quality criteria: install DNS rolls which are available in server 2008 try to resolve IP to
domain
DHCP
If an IP address is required for longer than the lease has been set for, the client must
request an extension before the lease expires. If the client has not requested an
extension on the lease time, the IP address will be considered free and can be assigned
to another client. If the user wishes to change IP address then they can do so by typing
"ipconfig /release", followed by "ipconfig /renew" in the command prompt.
This will remove the current IP address and request a new one. Reservations can be
defined on the DHCP server to allow certain clients to have their own IP address (this
will be discussed a little later on). Addresses can be reserved for a MAC address or a
host name so these clients will have a fixed IP address that is configured automatically.
Most Internet Service Providers use DHCP to assign new IP addresses to client
computers when a customer connects to the internet - this simplifies things at user level.
Figure 3: internet IP distribution
The above diagram displays a simple structure consisting of a DHCP server and a
number of client computers on a network.The DHCP Server itself contains an IP
Address Database which holds all the IP addresses available for distribution. If the client
(a member of the network with a Windows 2000 Professional/XP operating system, for
example) has "obtain an IP address automatically" enabled in TCP/IP settings, then it is
able to receive an IP address from the DHCP server.
Forests
A forest is one or more trees connected at the tree roots by a Kerberos bidirectional
transitive trust. As with a tree, this now means that every single domain in a forest trusts
every other domain in the forest, even those domains in other trees. Why would you
need more than one tree in the first place? Remember, a tree is a contiguous
namespace. If you needed a separate namespace, maybe you wanted a domain to be
named savtech.org, you could not place this into the existing savilltech.net tree. Instead,
when you created this new domain you would specify that you wanted to join an existing
forest and give the name of the existing tree. For example, you would give the name
savilltech.net, and as with domains in a tree, a trust between the two tree roots would
be created .The phrase “domain and forest functionality” refers to the scope of Active
Directory features you have available in your enterprise
After DHCP is running on a network, configure clients to obtain IP addresses via DHCP
and they automatically request an IP address upon startup.
Operation Sheet 3.1.2.1 Installing and Performing DHCP Initial Configuration
Purpose: To install and automatically assign IP address for all computer in the network
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step1.Select the Add Roles link within the Roles section of the tool (either ICT or Server
Manager)
FIGURE1. The Add Roles option is also available via the ICT environment.
Step2. The Add Roles wizard is displayed and gives warnings that you should ensure
the Administrator has a strong password, a static IP address, and the latest updates.
Click Next
Step3.A list of all roles is displayed. Select DHCP Server and click Next
Step4.The wizard now guides you through the basic configuration of DHCP with seven
steps. Click Next.
The role-based method is far more attractive than the old style Add/Remove Windows
Components in previous versions.
Step5.The first step is determining which network connections are bound for the DHCP
server. All connections with a static IP address are listed. Confirm that the bindings are
correct and click Next.
Step6.The DNS information that is given to clients, including the DNS domain of the
client parent, the primary DNS server, and the secondary DNS server (if available), is
configured. Click Next . This configuration is set at the global level and so applies to all
scopes created on the DHCP server.
Selecting the network connections with which the DHCP server provides service.
Configuring the DNS domain and servers for the DHCP server.
Step7.The next screen configures WINS (if required). If any of your applications still use
NetBIOS names, configure the WINS servers. Click Next.
Step8.DHCP scopes can be configured by clicking the Add button, which opens up the
scope properties. Configure the name, its default gateway, subnet mask, and starting
and ending IP address. You can also select the type of subnet (see Figure 7-8). If it’s
wireless, this generally assumes devices are connected for less time and so have a
lease of only eight hours. Wired devices are normally more permanent fixtures in the
environment and therefore have a lease of six days. Check the Activate the Scope
option and click OK. Click Next after scopes have been defined.
Step9.The option to enable DHCPv6 protocol on the server is displayed. It is set to Yes,
so click Next. If you are not using IPv6, disable this setting for now. You can enable it in
the future.
Step10.The DNS settings for IPv6 DNS must be configured if you selected to enable
DHCPv6. After the configuration is done, click Next.
Step11. Finally, the DHCP server must be authorized with the current credentials or an
alternate set of credentials. You can also decide to skip the authorization. Make a
choice and click Next
Selecting credentials for authorizing a DHCP server.
You can use Microsoft® Web Platform Installer (Web PI) to easily install Internet
Information Services (IIS) and applications that run on IIS. However, if you choose to
install IIS manually, you can use this article for guidance.
IIS 7.0 is the Web server role in Windows Server ® 2008 and the Web server in Windows
Vista®. IIS 7.5 is the Web server role in Windows Server ® 2008 R2 and the Web server
in Windows® 7. Windows Server 2008 R2 and Windows Server 2008 operating systems
have all the IIS features needed to support the hosting of Web content in production
environments. Windows 7 and Windows Vista also include IIS features, but the
available features depend on the operating system versions.
The Web server was redesigned in IIS 7.0 to enable you to customize a server by
adding or removing modules to meet your specific needs. Modules are individual
features that the server uses to process requests. For example, IIS 7.0 and IIS 7.5 use
authentication modules to authenticate client credentials and use cache modules to
manage cache activity. Both versions of IIS also provide:
A new management interface. The interface lets you quickly and easily change
the settings for each Web site. It is also possible to edit the settings of a Web site
in a text-based configuration file.
The ability to share tasks with Web site owners. A hoster with multiple sites can
delegate administrative control to developers or content owners.
IIS 7.0 and IIS 7.5 are together known as IIS 7 or IIS 7 and above; however, IIS 7.5 and
Windows Server 2008 R2 include several new features not found in IIS 7.0:
IIS 7.5 includes configuration logging and tracing (IIS 7.0 does not include any built-in
tracing mechanisms for configuration changes).IIS 7.5 includes the Best Practice
Analyzer, an automated tool for helping to ensure compliance with security best
practices.
Operation Sheet 3.1.3Installing IIS 7
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step1.Click Start -> All Programs -> Administrative Tools -> Server Manager.
Step2.In the Server Manager window, scroll down to Roles Summary, and then
click Add Roles. The Add Roles Wizard will start with aBefore You Begin page. The
wizard asks for verification of the following:
Step 3.Select Web Server (IIS) on the Select Server Roles page. An introductory page
will open with links for further information.
Note: When you use the Add Roles Wizard to install IIS, you get the default
installation, which has a minimum set of role services. If you need additional IIS role
services, such as Application Development or Health and Diagnostics, make sure to
select the check boxes associated with those features in the Select Role
Services page of the wizard.
Step 4Select the IIS services to be installed on the Select Role Services page. Add
only the modules necessary. In this case, ASP.NET is selected, and a description of
ASP.NET appears in the right pane. Once desired modules are added, click Next.
Step5.Add any required role services.
Step 6 IIS is now installed with a default configuration for hosting ASP.NET on Windows
Server. Click Close to complete the process.
Step 7 Confirm that the Web server works by using http://localhost.
Note: Install only the absolutely necessary IIS services to minimize the IIS installation
footprint. This also minimizes the attack surface, which is one of the benefits of IIS 7
and above.
FTP Server is a highly secure, fully featured and easy-to-administer file transfer server
for Microsoft Windows® systems. FTP Server lets you create a host that makes files
and folders on your server available to other people. Users can connect (via the Internet
or a local area network) to your host, list folders and files, and (depending on
permissions) download and upload data. Administrators can control access to data and
files with granular permissions by folder, user, and group. Administrators can also
create multiple hosts that function as completely distinct sites. FTP Server is proven and
reliable. It is used by administrators globally to support millions of end users and enable
the transfer of billions of files. WS_FTP Server complies with the current Internet
standards for FTP and SSL protocols. Users can connect to the server and transfer files
by using an FTP client that complies with these protocols, such as Ipswitch WS_FTP LE
or IFTP Professional. FTP Server with SSH also includes support for SFTP transfers
over a secure SSH2 connection.
Operation Sheet 3.1.4 Installing FTP on Windows Server 2008 R2
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step 7.Open IIS, expand your computer, expand Sites, right click on your Web Site and
then click on Add FTP Publishing…
Step 8.IIS Manager: Add FTP Publishing Once the Add FTP Site Wizard comes up:
Choose an IP address for your FTP site from the IP address drop-down, or
choose to accept the default selection of “All Unassigned.”
Normally, you would enter the TCP/IP port for the FTP site in the port box. For
this how-to, choose to accept the default port of 21.
For this how-to, we will not use a host name, so make sure that the Virtual
Host box is blank.
Make sure that the Certificates drop-down is set to “Not Selected” and that the
Allow SSL option is selected.
When you have completed these items, click Next.
Binding and SSL Setting On the Authentication and Authorization Information page:
Step 9.Authentication and Authorization Last thing to make sure is if your Windows
Firewall has a rule set for FTP default port 21.
Once opened, click on Inbound Rules and then click on New Rule under the Actions
Pane.
Step12.Windows Firewall with Advanced Security The New Inbound Rule Wizard will
pop up. You will select Port and click Next.
Step 13.Rule Type Since this is for the default port 21 for FTP, we will use the TCP
protocol and 21 for the Specific local ports. Once done, click Next.
Step14. Protocol and Ports In the Action page, we will select to Allow the connection
and click Next.
Step15.Action The next page is the Profile page, which we will check all the boxes and
then click Next.
Step16.Profile On the last page, you will need to select a name for the new rule. Here,
we will name it “FTP” and then click Finish.
Step17.Name now the firewall rule has been added for the default port 21. We can now
test FTP connection to the Web Site. In this how-to, I will use FileZilla to show
connection but there are many FTP clients out there to use.
With FileZilla, we will need to fill in the Host/IP Address, Username, Password and Port
# to connect. Earlier, I set up FTP to use a specific user (administrator) and also used
the default FTP port 21. Once you hit Connect, you will be connected to your Web Site
via FTP!
Print server
Print Services in Windows Server 2008 allows you to share printers on a network and
consolidate print server and network printer management tasks by using the Print
Management console. The Print Service role in Windows Server 2008 includes Server
Manager and Print Management.
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step1.In Server Manager, right click Roles and select Add Roles, this will load the Add
Roles Wizard.
Step 2.On the Before You Begin page, click Next.
Step3. On the Server Roles page, select the Print Services check box and click Next.
Step4.On the Print Services page, click Next.
Step5.On the Select Role Services page, select the Print Server and Internet Printing
check boxes, and click Next.
Step6.If IIS is not installed, in the Add Roles wizard dialog box, click Add Required Role
Services.
Step7.On the Select Role Services page, click Next.
Step8.On the web Server (IIS) page, click Next.
Step9.On the Select Role Services page, you're prompted to select the role services
you want to install to support IIS. Click Next to accept the default settings.
Step10.On the Confirmation page, click Install.
Step11.On the Results page, click Close.
E-mail server
We can say that an email server (or mail server or mail server) is your digital
correspondence agency. It's a machine or application responsible for handling
messages. In other words, an e-mail server receives and delivers e-mails, this is its
function.
So, when you send an email, your message usually goes through a series of email
servers until it reaches the recipient.
The process is so fast and efficient that it looks simple, but there is a great deal of
complexity behind sending and receiving e-mails.
To avoid confusion, it is important to be clear that the term email server can have
different meanings depending on the context. Sometimes an email server can mean a
computer or a machine that has a complete system that includes different services or
applications.
At other times, the term e-mail server can be used precisely as a synonym for some of
these services or applications.
When we use the term email server in the sense of services or applications, we can
separate email servers into 2 main categories: outgoing email servers and incoming
email servers.
Outgoing e-mail servers are called SMTP servers(Simple Mail Transfer Protocol).
Incoming email servers are known by the acronyms POP3 (Post Office Protocol) and
IMAP (Internet Message Access Protocol).
Before you ask yourself about the difference between IMAP and POP3, we answer you.
With IMAP, messages are stored on the server itself. While with POP3, messages are
usually kept on the device, that is, on your computer or cell phone.
When you send an email, your email service or provider, such as Gmail, Exchange,
Office 365 and Zimbra, will connect to the SMTP server. That SMTP server is
connected to your domain and has a specific address, such as smtp.gatefy.com. or
smtp.example.com.
At this stage, your e-mail service will provide the SMTP server with some important
information, such as your e-mail address, the message body and the recipient's e-mail
address.
The SMTP server will now identify and process the recipient's email address. If you are
sending an email to someone else in your company, that is, to the same domain, the
message will be directed directly to the IMAP or POP3 server.
Otherwise, if you are sending the message to another company, for example, the SMTP
server will need to communicate with that company's e-mail server.
At this stage, your SMTP server will need to connect with DNS (Domain Name System)
to find the recipient's server.
The DNS works like a translation system. It will help to convert the recipient's domain
into an IP address. By the way, the IP is a unique number that identifies a machine or
server connected to the internet.
SMTP needs IP to perform its function correctly, thus being able to direct the message
to the recipient's server.
But not everything is as simple as it seems. Generally, your email will go through
different unrelated SMTP servers until it reaches the recipient's SMTP server.
When the recipient receives the email, the SMTP checks the message and then directs
it to the IMAP or POP3 server. The email then enters a queue and is processed until it
is available for the recipient to access.
There, now the email can be read. And you know the basics about incoming and
outgoing mail servers. But to conclude, we still need to talk about email protection and
security.
Email security
Here we show a simplified process. Sending and receiving e-mails involves different
and complex processes and protocols, which, unfortunately, are usually forged or
falsified.
In fact, e-mail is the main vector for cyber-attacks, the most used way by criminals and
attackers to commit scams and fraud.
This means that if you have a business and want to keep it free from threats, you need
to be careful with email protection. Your company's email security needs to take into
account several aspects, from creating internal policies for the use of email to adopting
protection solutions.
If you use G Suite, Office 365, Exchange or Zimbra, for example, read more about how
to improve the protection of these platforms and, consequently, your company's
information and data.
Procedures :
Step1.Open Server Manager Console and under Features select Add Features
Step2.Select SMTP Server option
Step3.Click on Install wait until finish and click close
Step4.Open IIS 6.0 Manager under Administrative Tools -> Internet Information
Services 6.0
Step5.Under [SMTP Virtual Server] second mouse click and properties
Step6.Select Relay under Access Tab
Step7.Select Only the list below and click on Add button
Step8.Enter IP Address 127.0.0.1 for relay
Step9.Send a manual email through telnet to confirm everything working successfully.
Telnet local host 25 or telnet your public IP 25 and make sure you open the specific port
on your firewall to be available to public.
FIREWALL SERVER
The new features of the Windows Server 2008 Advanced Firewall and how to configure
this powerful host-based firewall using the new MMC snap-in.
Since its inception, the Windows Server 2003 SP1 firewall has been a basic, inbound-
only, host based, state full firewall. With Windows Server 2008, the built-in firewall has
been dramatically improved. Let's find out how the new advanced firewall can help you
and how to configure it using the MMC snap-in.
Many companies today secure their network using the "hard outer shell / gooey center"
approach. What this means is that they create a strong perimeter around their network
with firewalls and IPS systems, protecting themselves from malicious attackers on the
Internet. However, if an attacker could penetrate the outer perimeter and gain access to
the internal network, there would only be Windows authentication security to stop them
from gaining access to the company's most valuable assets - their data.
This is because most IT Pros don't secure their servers with host-based firewalls. Why
is that? We see host-based firewalls as being "more trouble than they are worth".
After reading this article, I hope that many of you will take a second look at the Windows
host-based firewall. With Windows Server 2008, the host-based firewall is built in to
Windows, is already installed, now has more features, and is now easier to configure.
Plus, it is really one of the best ways to secure a crucial infrastructure server. So, what
can the Windows Server Advanced firewall do for you and how do you configure it?
Let’s find out.
New with Windows Server 2008, the built-in firewall is now “advanced”. And it isn’t just
me saying that, Microsoft now calls it the “Windows Firewall with Advanced Security”
(let’s abbreviate that as WFAS).
Here are the new features that help justify that new name:
With the addition of being a bi-directional firewall, a better GUI, and advanced rules
configuration, the Windows Advanced firewall is bordering on being as good as
traditional host-based firewalls (like ZoneAlarm Pro, for example).
I know that the first concern of any server admin in using a host-based firewall is: what if
it prevents critical server infrastructure apps from functioning? While that is always a
possibility with any security measure, WFAS will automatically configure new rules for
any new server roles that are added to the server. However, if you run any non-
Microsoft applications on your server that need inbound network connectivity, you will
have to create a new rule for that type of traffic.
By using the advanced windows firewall, you can better secure your servers from
attack, your servers from attacking others, and really nail down what traffic is going in
and out of your servers. Let’s see how it is done.
Previously, with Windows Server, you could configure the Windows firewall when you
went to configure your network adaptor or from the control panel. The configuration was
very basic.
With Windows Firewall with Advanced Security (WFAS), most admins will configure the
firewall either from Windows Server Manager or the MMC with only the WFAS snap-in.
Operation Sheet 3.1.7 Installing firewall server
Purpose: To install firewall server and protect our server from attack
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
What I have found is that the quickest & easiest way to start the WFAS MMC is to just
type firewall in the Start menu Search box, like this:
There is also a new netshadvfirewall CLI option for configuring WFAS.
Step3.Profiles now available in Windows 2008 Firewall with Advanced Security
Note: Windows 2003 Server Firewall Exception windowNow, let’s compare that to
Windows 2008 Server:
Step4.Windows 2008 Server Advanced Firewall Exception window
Notice how the Protocols and Ports tab is just a small part of the multi-tabbed window.
You can also configure rules to apply to Users & Computers, Programs and Services,
and IP address Scopes. With this type of sophisticated firewall rules configuration,
Microsoft has pushed WFAS more toward Microsoft’s IAS server.
The number of default rules offered by WFAS is truly amazing. In Windows 2003
Server, there were the 3 default exceptions (rules). Not so in Windows Server. WFAS
offers about 90 default inbound firewall rules and at least 40 default outbound rules –
WOW!
Step5. Windows 2008 Server Advanced Firewall Default Inbound Rules
Quality criteria: ready your server installed computer from any attack
A proxy server provides a gateway between users and the internet. It is a server,
referred to as an “intermediary” because it goes between end-users and the web pages
they visit online.
When a computer connects to the internet, it uses an IP address. This is similar to your
home’s street address, telling incoming data where to go and marking outgoing data
with a return address for other devices to authenticate. A proxy server is essentially a
computer on the internet that has an IP address of its own.
Proxies provide a valuable layer of security for your computer. They can be set up as
web filters or firewalls, protecting your computer from internet threats like malware.
This extra security is also valuable when coupled with a secure web gateway or other
email security products. This way, you can filter traffic according to its level of safety or
how much traffic your network—or individual computers—can handle.
Some people use proxies for personal purposes, such as hiding their location while
watching movies online. For a company, however, they can be used to accomplish
several key tasks such as:
1. Improve security
2. Secure employees’ internet activity from people trying to snoop on them
3. Balance internet traffic to prevent crashes
4. Control the websites employees access
5. Save bandwidth by caching files or compressing incoming traffic
Proxy Works
Because a proxy server has its own IP address, it acts as a go-between for a computer
and the internet. Your computer knows this address, and when you send a request on
the internet, it is routed to the proxy, which then gets the response from the web server
and forwards the data from the page to your computer’s browser, like Chrome, Safari,
Firefox, or Microsoft Edge
Getting a Proxy
Proxy servers have hardware and software versions. Hardware solutions sit between
your network and the internet, where they get, send, and forward data from the web.
Software proxies are typically hosted by a provider or reside in the cloud. You install an
app on your computer that facilitates interaction with the proxy.
Often, a software proxy can be obtained for a monthly fee. Sometimes, they are free.
The free versions tend to offer users fewer addresses and may only cover a few
devices, while the paid proxies can meet the demands of a business with many devices.
Proxy Set Up
To get started with a proxy server, you have to set it up in your computer, device, or
network. Each operating system has its own setup procedures, so check the steps
required for your computer or network.
In most cases, however, setup means using an automatic configuration script. If you
want to do it manually, there will be options to enter the IP address and the appropriate
port.
A proxy server performs the function of a firewall and filter. The end-user or a network
administrator can choose a proxy designed to protect data and privacy. This examines
the data going in and out of your computer or network. It then applies rules to prevent
you from having to expose your digital address to the world. Only the proxy’s IP address
is seen by hackers or other bad actors. Without your personal IP address, people on the
internet do not have direct access to your personal data, schedules, apps, or files.
With a proxy server in place, web requests go to the proxy, which then reaches out and
gets what you want from the internet. If the server has encryption capabilities,
passwords and other personal data get an extra tier of protection.
Benefits of a Proxy Server
Proxies come with several benefits that can give your business an advantage:
1. Enhanced security: Proxy servers can act like a firewall between your system
and the internet. Without them, hackers have easy access to your IP address,
which they can use to infiltrate your computer or network.
2. Private browsing, watching, listening, and shopping: Use different proxies to
help you avoid getting inundated with unwanted ads or the collection of IP-
specific data.
3. Access to location-specific content: You can designate a proxy server with an
address associated with another country. You can, in effect, make it look like you
are in that country and gain full access to all the content computers in that
country are allowed to interact with.
4. Prevent employees from browsing inappropriate or distracting sites: You
can use a proxy server to block access to websites that run contrary to your
organization’s principles. Also, you can block sites that typically end up
distracting employees from important tasks. Some organizations block social
media sites like Facebook and others to remove time-wasting temptations.
While all proxy servers give users an alternate address with which to use the internet,
there are several different kinds—each with its own features.
Forward Proxy
A forward proxy sits in front of clients and is used to get data to groups of users within
an internal network. When a request is sent, the proxy server examines it to decide
whether it should proceed with making a connection.
A forward proxy is best suited for internal networks that need a single point of entry. It
provides IP address security for those in the network and allows for straightforward
administrative control. However, a forward proxy may limit an organization’s ability to
cater to the needs of individual end-users.
Transparent Proxy
A transparent proxy can give users an experience identical to what they would have if
they were using their home computer. In that way, it is “transparent.” They can also be
“forced” on users, meaning they are connected without knowing it.
Transparent proxies are well-suited for companies that want to make use of a proxy
without making employees aware they are using one. It carries the advantage of
providing a seamless user experience. On the other hand, transparent proxies are more
susceptible to certain security threats, such as SYN-flood denial-of-service attacks.
Anonymous Proxy
A transparent proxy is best suited for users who want to have full anonymity while
accessing the internet. While transparent proxies provide some of the best identity
protection possible, they are not without drawbacks. Many view the use of transparent
proxies as underhanded, and users sometimes face pushback or discrimination as a
result.
A high anonymity proxy is an anonymous proxy that takes anonymity one step further. It
works by erasing your information before the proxy attempts to connect to the target
site.
A high anonymity proxy server is best suited for users for whom anonymity is an
absolute necessity, such as employees who do not want their activity traced back to the
organization. On the downside, some of them, particularly the free ones, are decoys set
up to trap users in order to access their personal information or data.
Distorting Proxy
A distorting proxy identifies itself as a proxy to a website but hides its own identity. It
does this by changing its IP address to an incorrect one.
Distorting proxies are a good choice for people who want to hide their location while
accessing the internet. This type of proxy can make it look like you are browsing from a
specific country and give you the advantage of hiding not just your identity but that of
the proxy, too. This means even if you are associated with the proxy, your identity is still
secure. However, some websites automatically block distorting proxies, which could
keep an end-user from accessing sites they need.
Data center proxies are not affiliated with an internet service provider (ISP) but are
provided by another corporation through a data center. The proxy server exists in a
physical data center, and the user’s requests are routed through that server.
Data center proxies are a good choice for people who need quick response times and
an inexpensive solution. They are therefore a good choice for people who need to
gather intelligence on a person or organization very quickly. They carry the benefit of
giving users the power to swiftly and inexpensively harvest data. On the other hand,
they do not offer the highest level of anonymity, which may put users’ information or
identity at risk.
Residential Proxy
Residential proxies are well-suited for users who need to verify the ads that go on their
website, so you can block suspicious or unwanted ads from competitors or bad actors.
Residential proxies are more trustworthy than other proxy options. However, they often
cost more money to use, so users should carefully analyze whether the benefits are
worth the extra investment.
Public Proxy
A public proxy is accessible by anyone free of charge. It works by giving users access
to its IP address, hiding their identity as they visit sites.
Public proxies are best suited for users for whom cost is a major concern and security
and speed are not. Although they are free and easily accessible, they are often slow
because they get bogged down with free users. When you use a public proxy, you also
run an increased risk of having your information accessed by others on the internet.
Shared Proxy
Shared proxies are used by more than one user at once. They give you access to an IP
address that may be shared by other people, and then you can surf the internet while
appearing to browse from a location of your choice.
Shared proxies are a solid option for people who do not have a lot of money to spend
and do not necessarily need a fast connection. The main advantage of a shared proxy
is its low cost. Because they are shared by others, you may get blamed for someone
else’s bad decisions, which could get you banned from a site.
SSL Proxy
A secure sockets layer (SSL) proxy provides decryption between the client and the
server. As the data is encrypted in both directions, the proxy hides its existence from
both the client and the server.
These proxies are best suited for organizations that need enhanced protection against
threats that the SSL protocol reveals and stops. Because Google prefers servers that
use SSL, an SSL proxy, when used in connection with a website, may help its search
engine ranking. On the downside, content encrypted on an SSL proxy cannot be
cached, so when visiting websites multiple times, you may experience slower
performance than you would otherwise.
Rotating Proxy
A rotating proxy assigns a different IP address to each user that connects to it. As users
connect, they are given an address that is unique from the device that connected before
it.
Rotating proxies are ideal for users who need to do a lot of high-volume, continuous
web scraping. They allow you to return to the same website again and again
anonymously. However, you have to be careful when choosing rotating proxy services.
Some of them contain public or shared proxies that could expose your data.
Reverse Proxy
Unlike a forward proxy, which sits in front of clients, a reverse proxy is positioned in
front of web servers and forwards requests from a browser to the web servers. It works
by intercepting requests from the user at the network edge of the web server. It then
sends the requests to and receives replies from the origin server.
Reverse proxies are a strong option for popular websites that need to balance the load
of many incoming requests. They can help an organization reduce bandwidth load
because they act like another web server managing incoming requests. The downside
is reverse proxies can potentially expose the HTTP server architecture if an attacker is
able to penetrate it. This means network administrators may have to beef up or
reposition their firewall if they are using a reverse proxy.
On the surface, proxy servers and virtual private networks (VPNs) may seem
interchangeable because they both route requests and responses through an external
server. Both also allow you to access websites that would otherwise block the country
you’re physically located in. However, VPNs provide better protection against hackers
because they encrypt all traffic.
If you need to constantly access the internet to send and receive data that should be
encrypted or if your company has to reveal data you must hide from hackers and
corporate spies, a VPN would be a better choice.
If an organization merely needs to allow its users to browse the internet anonymously, a
proxy server may do the trick. This is the better solution if you simply want to know
which websites team members are using or you want to make sure they have access to
sites that block users from your country.
A VPN is better suited for business use because users usually need secure data
transmission in both directions. Company information and personnel data can be very
valuable in the wrong hands, and a VPN provides the encryption you need to keep it
protected. For personal use where a breach would only affect you, a single user, a
proxy server may be an adequate choice. You can also use both technologies
simultaneously, particularly if you want to limit the websites that users within your
network visit while also encrypting their communications.
Operation Sheet 3.1.7.1 configure client computer for joining server
Operation title: configure client computer
Purpose: configure client computer for joining server
Equipment ,tools and materials : AD installed computer
Conditions or situations for the operations: All tools, equipment’s and materials
should be available on time when required and need available power all time.
Procedures :
Step1.Configure the following settings for each DNS client:
The following procedures require you to log on with an account that belongs to the
Administrators group on the client computer.
Step3.Right-click the network connection that you want to configure, and then click
Properties.
Step4.On the General tab, click Internet Protocol (TCP/IP), and then click
Properties.
Step 5.Click Use the following IP address.
Step7.In Subnet mask, type the subnet mask of the domain controller.
Step 8In Default gateway, type the address of the default gateway of the domain
controller.
Step10.In Preferred DNS server, type the IP address of the DNS server that you
installed in Installing and Configuring AD DS and DNS.
Important
Do not use the IP address of a DNS server that is provided by your Internet service
provider (ISP) as a primary or alternate DNS server.
Step11.Click OK, and then click Close.
Note
It is not necessary to restart the computer at this time if you intend to change the
computer's name or domain membership in the following steps.
Step 16.If a second Computer Name Changes dialog box appears, in User
Name, type the domain name and user name of an account that has permission to
join computers to the domain.
Step3.Click Network and Sharing Center. In the Tasks pane, click Manage
network connections.
Step4.Right-click the network connection that you want to configure, and then click
Properties.
Step5.On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and
then click Properties.
Step6.Click Use the following IP address.
Step7.In IP address, type the address of the client computer.
Step8.In Subnet mask, type the subnet mask of the domain controller.
Step9.In Default gateway, type the address of the default gateway of the domain
controller.
Step10.Click Use the following DNS server addresses, and in Preferred DNS
server, type the IP address of the domain controller that you installed in Installing
and Configuring AD DS and DNS.
Important
Do not use the IP address of a DNS server that is provided by your ISP as a
primary or alternate DNS server.
Step11.Click OK to exit.
Step12.If Internet Protocol Version 6 (TCP/IPv6) is selected, click it, and then
click Properties. Perform the same steps as for TCP/IPv4, and then click OK and
Close.
Note
It is not necessary to restart the computer at this time if you intend to change the
computer's name or domain membership in the following steps.
Step14.In Control Panel, click System and Maintenance, and then click System.
In User Name, type the domain name and user name of an account that has
permission to join computers to the domain.
In Password, type the password of the account. Separate the domain name
and user name with a backslash, for example, domain\user_name.
Procedures :
Step1.Create a local folder on your server computer. For example, create a folder
called TVET on the C:\ drive.
Step5.In the Permission level column, select Read/Write, then click Share.
Procedures :
Logon hours restriction is done by editing a user's account in the following way:
Step1.Open the user object whose account you want to restrict logon hours for.
Step2.Select account tab and put a check against the Logon hours box. Click Logon
hours button.
Step3.In the next window, select the time that you want to restrict or allow them to
logon.
Group policy allows you to lock a user out when their logon time expires. Follow the
steps given below to configure this setting:
Step3. Run → gpmc.msc and create a new GPO called "Logon restrictions" Right click
on this GPO and click edit.
So using this GPO we can enforce clients to disconnect if there are active sessions
running when the logon hours expire.
Tasks performed during stress and load testing of an integrated platform include
Test Plan
A Test Plan is a detailed document that describes the test strategy, objectives,
schedule, estimation, deliverables, and resources required to perform testing for a
software product. Test Plan helps us determine the effort needed to validate the quality
of the application under test. The test plan serves as a blueprint to conduct software
testing activities as a defined process, which is minutely monitored and controlled by the
test manager.
As per ISTQB definition: “Test Plan is A document describing the scope, approach,
resources, and schedule of intended test activities.”
Let’s start with following Test Plan example/scenario: In a meeting, you want to discuss
the Test Plan with the team members, but they are not interested - .
Fig 4.
In such case, what will you do? Select your answer as following picture
Fig 5.
Importance of Test Plan?
Making Test Plan document has multiple benefits
Help people outside the test team such as developers, business managers,
customers understand the details of testing.
Test Plan guides our thinking. It is like a rule book, which needs to be followed.
Important aspects like test estimation, test scope, Test Strategy are
documented in Test Plan, so it can be reviewed by Management Team and re-
used for other projects.
The product under test is Guru99 banking website. You should research clients and the
end users to know their needs and expectations from the application
The components of the system that will not be tested also need to be clearly
defined as being "out of scope."
Defining the scope of your testing project is very important for all stakeholders. A
precise scope helps you
Give everyone a confidence & accurate information of the testing you are
doing
All project members will have a clear understanding about what is tested and
what is not
In the article Risk Analysis and Solution, you have already learned about the
‘Risk’ analysis in detail and identified potential risks in the project.
To select the right member for specified task, you have to consider if his skill is qualified
for the task or not, also estimate the project budget. Selecting wrong member for the
task may cause the project to fail or delay.
Person having the following skills is most ideal for performing software testing:
Ability to understand customers point of view
Strong desire for quality
Attention to detail
Good cooperation
In your project, the member who will take in charge for the test execution is the tester.
Base on the project budget, you can choose in-source or outsource member as the
tester.
In the previous topic, you have already analyzed the requirement specs and walk
through the website, so you can create a Mind-Map to find the website features.
This figure shows all the features which the Guru99 website may have.
Based on above features, you can define the Test Objective of the project Guru99 as
following
Verify the usability of the website. Are those functionalities convenient for user
or not?
Suspension Criteria
Specify the critical suspension criteria for a test. If the suspension criteria are met during
testing, the active test cycle will be suspended until the criteria are resolved.
Test Plan Example: If your team members report that there are 40% of test cases failed,
you should suspend testing until the development team fixes all the failed cases.
Some methods of defining exit criteria are by specifying a targeted run rate and pass
rate.
Run rate is ratio between number test cases executed/total test cases of test
specification. For example, the test specification has total 120 TCs, but the tester
only executed 100 TCs, So the run rate is 100/120 = 0.83 (83%)
Pass rate is ratio between numbers test cases passed / test cases executed.
For example, in above 100 TCs executed, there’re 80 TCs that passed, so the
pass rate is 80/100 = 0.8 (80%)
The resource planning is important factor of the test planning because helps in
determining the number of resources (employee, equipment…) to be used for the
project. Therefore, the Test Manager can make the correct schedule & estimation for
the project.
What is the maximum user connection which this website can handle at the same
time?
To create the project schedule, the Test Manager needs several types of input as
below:
Employee and project deadline: The working days, the project deadline,
resource availability are the factors which affected to the schedule
Project estimation: Base on the estimation, the Test Manager knows how long
it takes to complete the project. So he can make the appropriate project schedule
Project Risk : Understanding the risk helps Test Manager add enough extra time
to the project schedule to deal with the risks
There are different test deliverables at every phase of the software development
lifecycle.
Fig 13.
Examples include
Data stored by one module in a system test cannot be accessed and processed
by another interface to a legacy system fails a process fails to initiate another in a
defined sequence System crashes at less than maximum transaction levels.
Self-Check3.4 Written Test
If you choose to send generic information automatically about a problem, Microsoft will
send back either the most current solution or use the information to start working on a
solution.
On the Windows Error Reporting Configuration dialog box, the following two options
disable Windows Error Reporting:
The following two options enable Windows Error Reporting. Each option provides a
different level of detail in the information sent to Microsoft when failures occur.
Yes, automatically send detailed reports. Notify me if there are possible
solutions to the problem.
When this option is selected, if an application failure occurs, detailed reports are
automatically sent to Microsoft. Portions of documents you were working on at
the moment a program failed, or data you provided to Web sites or forms may be
included in these reports. The contents of log files, and portions of the registry,
may also be sent to Microsoft.
Procedures :
Error reporting
Step1. Locate Control Panel from Windows startup.
Step2. Click Control Panel> System and Security> Security and Maintenance.
Step3.Look out for Report problems. Make it 'On'.
There is nothing worse for a user than annoying, overly persistent, inaccurate, or
uninformative validation. For example, error messages that describe an error but don't
specify which field contains the error are difficult to correct. However, there is no recipe
for balancing validation with system requirements: what is pleasing or mandated by
requirements in one application might be annoying or useless in another.
Validation is actually two processes: finding errors and presenting error messages.
Finding errors can be interactive, where data is checked as it's entered, or post-
validation, where the data is checked after entry. Presenting errors can be field-by-field?
where a new error message is presented to the user for each error found? or it can be
batched, where all errors are presented as a single message. There are other
dimensions to validation and error processing, such as the degree of error that is
tolerated and the experience level of the user. However, considering only the basic
processes, the choice of when to error-check and when to notify the user, leads to four
common approaches:
The user first enters all data with no validation. The data is then checked and errors are
reported for each field, one by one. The user fixes each error in turn and resubmits the
data for revalidation.
Practical Demonstration
LAP Test 2
Instructions: Given necessary templates, workshop, tools and materials you are
required to perform the following tasks within 3 hours.
Task1: installing server 2008 operating system
2. Install Windows Server 2008 Operating System on the Server Computer
4. Configure the Server as a DNS and Active Directory for the Server Computer
using the HRM.local as a domain name.
Task5:-Set the Access limitation time for the Human recourse group users to access
the network from Monday to Friday during lunch hour from 12:30AM to 1:30PM only.