active dir lab ii

Upload: 4kinfotech

Post on 29-May-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Active Dir Lab II

    1/76

    Hacking Commands

    1. C:\>ping 192.168.1.1

    C:\> ping /?

    Options

    - t- a

    - n- L- f- I - ttl- v - tos- r - count- s - coat

    - j - host list- k - host list- w - time out

    2. C:\> ipconfig/all

    We use this command for finding out the network interface and also finding out thenetwork interface device.

    3. C:\> tracert

    We use this command for finding out the exact path and also for jumping one computer

    to another computer

    C:\> tracert www.google.com

    4. C:\> telnet

    telnet is used in port no. 23 | and telnet need always passward

    C:\> telnet 192.168.1.1

    BCM 96338 ADSL router

    Login Administrator

    Password -

    C:\> logout

    5. C:\> nslookup

    This command is used for restore the DNS records it is used in Local DNS

    C:\> nslookup ?

    http://www.google.com/http://www.google.com/
  • 8/9/2019 Active Dir Lab II

    2/76

    Serverwww.google.com (restore DNS server)

    6 C:\> telnet 192.168.1.205 ( through this IP address we can access another computer)7 C:\> mstsc (we can remotely access the another computer )

    8 C:\> netstat ( this command is used for display protocol statistics and also

    convert TCP/IP network connection. OR also used for watching session or current open

    session.

    - C:\> netstat a - C:\> netstat 192.168.1. 205 (through this command we can watch mail

    session of another system, suppose main is open in system 205 it will show in

    your system.

    9 C:\> arp

    This command is used for finding MAC IP and physical address

    ********************

    http://www.google.com/http://www.google.com/http://www.google.com/
  • 8/9/2019 Active Dir Lab II

    3/76

    Performing Computer (Disk) Management

    Start > My computer > Mange> Disk Management

    Right Click My computer > Disk Management

    (Appearing) Disk 0, Disk 1, Disk 2

    Very first time if you are managing any disk it will be on the Basic Disk Basic Disk

    contains up to four Primary Partitions or three Partitions and an extended partition with

    multiple logical drives.

    Basic Disk contains up to four Primary Partitions or three Partitions and an extendedpartition with multiple logical drives.

    Fist convert basis disk into Dynamic Disk by using disk management

    diskpart.exe command can be used ( to convert basic disk into dynamic disk)

    What is Dynamic Disk?

    A physical disk provides features that basic disk do not, such as support for volumes that

    spam multiple disks.

    What is Active Volume?

    The Volume from which the computer startup. The Active Volume must be a Simple

    Volume on a Dynamic Disk.

    Caution while converting Basic Disk into Dynamic Dick

    Fist you must dismount and take offline the volume containing the original files before

    you convert the disk containing shadow copy in Dynamic Disk. Once converting Basic

    Disk into Dynamic Disk you cannot change basic Volume back, you must delete allvolumes on the Disk and then you can convert Dynamic Disk into Basic Disk. Your

    computer will restart when you convert Dynamic Disk into Basic Disk.

    What is Extended Volume?

    If a volume does not have a file system or it is formatted using the NTFS file

    system, you cannot extend volumes formatted using FAT or NTFS 32.

    You cannot extend a system volume boot volume, striped volume,

    mirrored volume, or Raid 5 volumes.

    You can extend only Simple Volume or extended volumes that are not

    system or boot volumes, as long as there is available disk space.

    Resynching Message

    The volumes mirrors are being resynchronized so that both mirrors contain

    identically data. (the message appear when extending volumes)

  • 8/9/2019 Active Dir Lab II

    4/76

    Online Message

    The disk is OK

    Extended Volume

    If you are extending volumes which contains system files it will also mirrored in another

    disk.

    Managing Simple Volume

    Select the disk space unallocated > right click > new volume >

    Select Disks > Add > 200 MB

    perform quick format

    Simple Volume

    It contains disk space from a single disk and can be extended if necessary.

    If the volume deleted the file or data cannot be recovered.

    Spanned Volume

    It uses 2 or more dynamic disks ( Up to 32 bits)

    Dynamically increases the size of volume

    Data contain sequentially on each disk.

    Same amount of space is not necessary on each disk.

    Both disk will be deleted if delete one disk and data cannot be recovered

    Striped Volume

    It also uses two disks

    If delete one disk both disks deleted.

    Mirrored Volume

    Recynching the both disks.

    For implementing Mirrored volume you need first convert basic disk into

    dynamic disk then you can implement new volume ( mirrored)

    ***********

  • 8/9/2019 Active Dir Lab II

    5/76

    BackupTypes of back up

    Normal backup

    Copy backup

    Incremental backup

    Differential Backup

    Daily Backup

    Normal Backup

    A normal backup copies all selected files and marks each file as having been backed up

    (in other words, the archive attribute is cleared). With normal backups, you need only the

    most recent copy of the backup file or tape to restore all of the files. You usually performa normal backup the first time you create a backup set.

    Backing up your data using a combination of normal backups and incremental backups

    requires the least amount of storage space and is the quickest backup method. However,recovering files can be time-consuming and difficult because the backup set can be storedon several disks or tapes.

    Backing up your data using a combination of normal backups and differential backups is

    more time-consuming, especially if your data changes frequently, but it is easier to

    restore the data because the backup set is usually stored on only a few disks or tapes.

    Copy backup

    A copy backup copies all selected files but does not mark each file as having been backed

    up (in other words, the archive attribute is not cleared). Copying is useful if you want toback up files between normal and incremental backups because copying does not affect

    these other backup operations.

    Incremental backup

    An incremental backup backs up only those files created or changed since the last normal

    or incremental backup. It marks files as having been backed up (in other words, the

    archive attribute is cleared). If you use a combination of normal and incremental backups,you will need to have the last normal backup set as well as all incremental backup sets in

    order to restore your data.

    Differential backup

    A differential backup copies files created or changed since the last normal or incrementalbackup. It does not mark files as having been backed up (in other words, the archive

    attribute is not cleared). If you are performing a combination of normal and differential

    backups, restoring files and folders requires that you have the last normal as well as the

    last differential backup.

  • 8/9/2019 Active Dir Lab II

    6/76

    Daily Backup

    A daily backup copies all selected files that have been modified the day the daily backupis performed. The backed-up files are not marked as having been backed up (in other

    words, the archive attribute is not cleared).

    Performing Normal Backup

    Create and select any file or folder which you want take backup. Suppose you want totake backup the file placed on the desktop.

    5 N All backup & Remove mark

    5 N all backup & remove mark

    Start > Run > Ntbackup >backup or restore wizard will open

    Second Step

  • 8/9/2019 Active Dir Lab II

    7/76

    Step 3

    Step 4

    Step 5

    A normal backup copies

    all selected files andmarks each file as having

    been backed up * (in other

    words, the archiveattribute is cleared). Withnormal backups, you need

    only the most recent copy

    of the backup file or tapeto restore all of the files.

    You usually perform a

    normal backup the firsttime you create a backup

    set

  • 8/9/2019 Active Dir Lab II

    8/76

    Then

    Browse if you want to keep backup in desktop do next and save it on desktop andfinish

    Now selectthe

    advancetab

  • 8/9/2019 Active Dir Lab II

    9/76

    Open the box

    available

    various typesof backups,

    There are 5types ofbackup

    available.

    The both box

    should bechecked

    during

    backup

  • 8/9/2019 Active Dir Lab II

    10/76

  • 8/9/2019 Active Dir Lab II

    11/76

    Now select the file which you have taken backup right click and see properties

    In advanced Attributes box see the message the file is ready for archiving

    < apply>

    ******************

    Advance Attirbutes

    While checking attributes that small box contained the message advance attributes

    will appear on the screen, the message file is ready for archieving will be shown inthe box when first time taking normal backup.

    Click the advance tab and see A normal

    backup copies all selected files and marks

    each file as having been backed up * (in

    other words, the archive attribute is

    cleared).

    With normal backups, you need only the most recent copy of the backupfile or tape to restore all of the files. You have usually performed a normal

    backup the first time you created a backup set.

    Right click the folder

    which you want tocheck the archiving.

    Because it was thenormal backup so in

    advance attributes box

    will be unchecked infirst time, but in normal

    back it will select and

    take backup of all files

    either you will select

    files or not it will takebackup.

  • 8/9/2019 Active Dir Lab II

    12/76******************

    In first time

    normal backup thebox will be

    unchecked.

    After modifying the file or

    folder the box advancedattributes will be checked

    automatically. It isbecause we have modifiedsomething and backup is

    completed. If we modify

    many times then also the

    box will be checked innormal backup.

  • 8/9/2019 Active Dir Lab II

    13/76

    Copy backup

    A copy backup copies all selected files but does not mark each file as having been

    backed up (in other words, the archive attribute is not cleared). Copying is useful ifyou want to back up files between normal and incremental backups because copying

    does not affect these other backup operations.

    A copy backup is responsible for taking backup the selected files only C all files and no remove the mark, if we have modified file no. 1,2,5 then also

    it will take backup but it will not remove the mark.

    In advanced attributes box thebox will be checked always.

    This is the concept when

    first time taking backup.

    The box got unchecked if

    we modified the file insecond time.

    Conclusion: In previousnormal backup when secondtime doing any modification

    the box will be checked. But

    in copy backup second timemodification the box will be

    unchecked.

  • 8/9/2019 Active Dir Lab II

    14/76

    Incremental backup

    An incremental backup backs up only those files created or changed since the last normalor incremental backup. It marks files as having been backed up (in other words, the

    archive attribute is cleared). If you use a combination of normal and incremental backups,

    you will need to have the last normal backup set as well as all incremental backup sets in

    order to restore your data.

    If we select all files it will take back up the selected files.

    5 incremental all backup (only marked ) remove mark

    5 incremental only marked remove mark

    Backs up selected files

    only if they were

    created or modifiedsince the previous

    backup.

    The box is uncheckedwhile first time taking

    incremental backup.

    Conclusion: if wehave modified any

    files previously then

    incremental backup isgood.

  • 8/9/2019 Active Dir Lab II

    15/76

    Differential backup

    A differential backup copies files created or changed since the last normal or incrementalbackup. It does not mark files as having been backed up (in other words, the archive

    attribute is not cleared). If you are performing a combination of normal and differential

    backups, restoring files and folders requires that you have the last normal as well as thelast differential backup.

    * if we select all unmark file should copied, and mark will be removed

    * If we select marked file it will not remove the mark.

    After doing anymodification the

    box will be

    unchecked inincremental

    backup.

    Backs up selected files

    only if they werecreated or modified

    since the previousbackup, but does not

    mark them as backedup.

  • 8/9/2019 Active Dir Lab II

    16/76

    Daily Backup

    A daily backup copies all selected files that have been modified the day the daily backupis performed. The backed-up files are not marked as having been backed up (in other

    words, the archive attribute is not cleared).

    No remove mark but take backup of files in which data file was modified.

    Type Copy Mark

    Normal All file Remove mark file

    Copy All file No remove mark

    Incremental Only Mark Copy Remove Mark

    Differential Only mark copy No remove mark

    Daily Only Modify copy No remove

    Microsoft recommend 3 types of backup schemes.

    1. Normal

    2. Normal + Incremental

    3. Normal + Differential

    The box isunchecked while

    taking first time

    differential backup.After doing any

    modification the box

    will also remain

    unchecked.

  • 8/9/2019 Active Dir Lab II

    17/76

    Backup Planning

    Monday Tuesday Wednesday Thursday Friday Saturday

    Normal Normal Normal Normal Normal Normal

    10 files 10 files 10 files 10 files 10 files 10 files

    10 files 20 files 30 files 40 files 50 files 60 files

    T 1 T 2 T 3 T 4 T 5 T 6

    T 1 T 2 T 3 T 1 T 2 T6

    T 1 T 2 T 3 T 4 T 5 T 7

    T 3 T1 T 2 T 3 T 1

    Daily 5 files

    Daily 3 files

    Wed 4 Files

    Mon 12 files

    *****************

    Compress & Encrypt

    Compressing files, folders, and programs decreases their size and reduces the amount of

    space they use on your drives or removable storage devices. Drive compression decreasesthe amount of space used by all of the files and folders stored on that drive.

    Windows supports two types of compression: NTFS compression and compression using

    the Compressed (zipped) Folders feature.

    NTFS compression

    If you do not have an NTFS drive, this option is not available. To determinewhether your drive is formatted with NTFS, open My Computer, right-click a

    drive, and then clickProperties. The file system is indicated on the General tab.

    You can compress individual files and folders using NTFS compression, as wellas entire NTFS drives.

    You can compress a folder without compressing its contents.

    You can work with NTFS-compressed files without decompressing them.

    You can display NTFS-compressed file and folder names in a different color to

    make them easier to identify.

  • 8/9/2019 Active Dir Lab II

    18/76

    You may notice a decrease in performance when working with NTFS-compressed

    files. When you open a compressed file, Windows automatically decompresses itfor you, and when you close the file, Windows compresses it again. This process

    may decrease your computers performance.

    NTFS-compressed files and folders only remain compressed while they are storedon an NTFS drive.

    You cannot encrypt an NTFS-compressed file.

    NTFS file encryption is not available on Windows XP Home Edition.

    Performing Compressing

    Before compressing file see the file size first, and note after compressing what isthe files size

    Select the file > right click > properties > advance >

    Compress contentsto save disk space

    The file size is 230MB

    before compressing.

    (241,887,018 bits)

  • 8/9/2019 Active Dir Lab II

    19/76

    Check the box

    The box will

    appear whileclicking OK and

    apply. Selectapply changes tothis folder only

  • 8/9/2019 Active Dir Lab II

    20/76

    *************

    Encrypt{for performing Encrypting need net atmosphere}

    This folder option is used to no one can access your file or folder.

    Encrypting File System (EFS) provides the core file encryption technology used to storeencrypted files on NTFS file system volumes. Once you encrypt a file or folder, you

    work with the encrypted file or folder just as you do with any other files and folders.

    Encryption is transparent to the user that encrypted the file. This means that you do not

    have to manually decrypt the encrypted file before you can use it. You can open andchange the file as you normally do.

    Using EFS is similar to using permissions on files and folders. Both methods can be used

    to restrict access to data. However, an intruder who gains unauthorized physical access toyour encrypted files or folders will be prevented from reading them. If the intruder tries

    to open or copy your encrypted file or folder he receives an access denied message.

    Permissions on files and folders does not protect against unauthorized physical attacks.

    You encrypt or decrypt a folder or file by setting the encryption property for folders andfiles just as you set any other attribute such as read-only, compressed, or hidden. If you

    encrypt a folder, all files and subfolders created in the encrypted folder are automatically

    encrypted. It is recommended that you encrypt at the folder level.

    You can also encrypt or decrypt a file or folder using the cipher command. For moreinformation, see Cipher.

    After

    compressing the

    files the file sizewill decrease

    Note

    (241,894,210)

    bytes

  • 8/9/2019 Active Dir Lab II

    21/76

    Configuring diskquotas for the POP3 service

    Important

    You can configure diskquotas only onNTFSfile systempartitions.

    You can use disk quotas to control and limit the amount of disk space individual

    mailboxes on the mail server can use. This ensures that individual mailboxes, and the

    mail store in general, do not use excessive or unanticipated amounts of diskspace and

    adversely affect the performance of the server where the POP3 service is running.

    For example, if the mail server suddenly receives a large volume of unsolicited e-mail,

    the mail store expands rapidly and might use all of the available diskspace on the hard

    disk. If you implement quotas, the mail store only expands to the quota limit that youspecified. As a result, no more mail is accepted by the server, and the rest of the server

    still functions normally.

    If you are using Active Directory integrated authentication or local Windows accounts

    authentication, the e-mail delivered to a POP3 service mailbox will have file ownershipassigned to the mailbox user by default. A quota file is created in the mailbox directory

    that contains the security identifier (SID) of the user account associated with the mailbox.

    File ownership is then assigned to the user account that corresponds to the SID contained

    in the quota file. The SID is also used by the NTFS file system disk quota system toenforce the quota limits specified on the user account matching the SID. All e-mail

    transferred to the mailbox's mail store directory is marked with the SID contained in the

    quota file; this marks the e-mail so it can be monitored by the quota system.

    Enabling disk quotas

    If you are a member of the Administrators group, you can enable quotas onNTFS

    volumes. On volumes that already contain files, Windows calculates the disk space usedby all users who have copied, saved, or taken ownership of files on the volume up to that

    point. The quota limit and warning level are then applied to all current users based on

    those calculations, and to users who begin using the volume from that point on. You can

    then set different quotas, or disable quotas, for individual or multiple users. You can alsoset quotas for specific users who have not yet copied, saved, or taken ownership of files

    on the volume.

    For example, if \\Production\Public is shared from the root directory of an NTFS volume,you might want to set a quota limit of 50 megabytes (MB) for all users of

    \\Production\Public, while making sure two users who work with larger files on the serverhave a 100 MB limit. If both of these users already have files stored on

    \\Production\Public, you can select both users and set their quota limit to 100 MB.However, if one or both users do not have files stored on the server when you enable

    quotas, you need to select the users in the Quota Entries window and then set their quota

    limit to a value higher than the default for new users.

    To enable disk quotas

    1. Open My Computer.

  • 8/9/2019 Active Dir Lab II

    22/76

    2. Right-click the disk volume for which you want to enable disk quotas, and then

    clickProperties.3. In the Properties dialog box, click the Quota tab.

    4. On the Quota tab, click the Enable quota management check box.

    5. Select one or more of the following options, and then clickOK:

    Then rightclick the

    selecteddisk

    properties

    which youwant to

    apply quota

    See the quotain advanced

    tab

  • 8/9/2019 Active Dir Lab II

    23/76

    Check the box for

    enabling quota

    management

    See the box carefully

    and implementing diskquota

  • 8/9/2019 Active Dir Lab II

    24/76

    Disk quota is

    implementing in Drive D

    for the Limit Disk Space700 MB and also have set

    the warning level to 600MB.

  • 8/9/2019 Active Dir Lab II

    25/76

    See the error

    message

    appearing thebox. While

    implementingdisk quota

  • 8/9/2019 Active Dir Lab II

    26/76

    ControlPanelControlPanel provides a set of special-purpose administrative tools that you can use to

    configure the Windows, applications, and services environment. ControlPanel includesdefault items that you can use for common tasks (for example, Display and Add

    Hardware). User-installed applications and services can also insert icons into Control

    Panel.

    There are two view options for Control Panel: Category View and Classic View.

    Category View displays ControlPanel icons according to the type of task that the user

    wants to perform. Classic View displays ControlPanel icons in a view that is familiar to

    users of previous versions of Windows.

    There is a list contains by the control panel

    Accessibility Options

    Add Hardware

    Add or Remove Programs

    Administrative Tools (Windows interface administrative tool reference A-Z)

    Date and Time

    Display

    Folder Options

    Fonts Game Controllers

    Internet Options Keyboard

    Licensing

    Mouse

    Network Connections

    Phone and Modem Options

    Power Options

    Printers and Faxes

    Regional and Language Options

    Scanners and Cameras Scheduled Tasks (Task Scheduler) Sounds and Audio Devices

    Speech

    Stored User Names and Passwords

    System & Taskbar and Start Menu

    CPL is the extension of control panel

    For performing control panel, start > search > *.cpl

  • 8/9/2019 Active Dir Lab II

    27/76

    Type *.cpl

    for searchingcontrol panel

    The System

    32 files

    contains

    maximum ofcontrol panel

    objects.

  • 8/9/2019 Active Dir Lab II

    28/76

    When Selecting access.cpl the following window appear

    This window

    provide you the

    information andAccessibility

    Option

    Appwiz.cpl

    Provides Add

    or remove

    Programmes

  • 8/9/2019 Active Dir Lab II

    29/76

    Desk.cplProvides

    the Desktop

    options

    Through this option

    you can giveprivileges to your

    administrator to do

    not open the

    particular selectedcontrol panel object

    in your administrator

    account.

  • 8/9/2019 Active Dir Lab II

    30/76

    Through the control panel option there is some important task which we alwaysneed to perform during administrating any system

    Add remove programmes

    Accessories & utilities

    Data & time

    UPS, Hybernet & power

    Power schemes

    Display settings

    Regional & Language settings

    Folder Options

    View

    ***************

    Through

    Regional andLanguage

    Options you

    can set theworldslanguage,

    like Russian,

    Japanise etc.

  • 8/9/2019 Active Dir Lab II

    31/76

    Active Directory

    An active directory is a directory structure used on Microsoft Windows based computers

    and servers to store information and data about networks and domains. It is primarilyused for online information and was originally created in 1996 and first used with

    Windows 2000.

    An active directory (sometimes referred to as an AD) does a variety of functions

    including the ability to provide information on objects, helps organize these objects for

    easy retrieval and access, allows access by end users and administrators and allows theadministrator to set security up for the directory.

    An active directory can be defined as a hierarchical structure and this structure is usually

    broken up into three main categories, the resources which might include hardware such as

    printers, services for end users such as web email servers and objects which are the mainfunctions of the domain and network.

    It is interesting to note the framework for the objects. Remember that an object can be a

    piece of hardware such as a printer, end user or security settings set by the administrator.

    These objects can hold other objects within their file structure. All objects have an ID,usually an object name (folder name). In addition to these objects being able to hold other

    objects, every object has its own attributes which allows it to be characterized by the

    information which it contains. Most IT professionals call these setting orcharacterizations schemas.

    Depending on the type of schema created for a folder, will ultimately determine how

    these objects are used. For instance, some objects with certain schemas can not be

    deleted, they can only be deactivated. Others types of schemas with certain attributes canbe deleted entirely. For instance, a user object can be deleted, but the administrator object

    can not be deleted.

    When understanding active directories, it is important to know the framework that objects

    can be viewed at. In fact, an active directory can be viewed at either one of three levels,these levels are called forests, trees or domains. The highest structure is called the forest

    because you can see all objects included within the active directory.

    Within the Forest structure are trees, these structures usually hold one or more domains,

    going further down the structure of an active directory are single domains. To put theforest, trees and domains into perspective, consider the following example.

    A large organization has many dozens of users and processes. The forest might be the

    entire network of end users and specific computers at a set location. Within this forest

    directory are now trees that hold information on specific objects such as domaincontrollers, program data, system, etc. Within these objects are even more objects which

    can then be controlled and categorized.

  • 8/9/2019 Active Dir Lab II

    32/76

    How are Active Directories used?

    If you are a computer administrator for a large corporation or organization, you can easilyupdate all end users computers with new software, patches, files, etc simply by updating

    one object in a forest or tree.

    Because each object fits into a set schema and has specific attributes, a network

    administrator can easily clear a person on a set tree or instantly give access to some users

    for certain applications or deny access to certain users for others. The Microsoft serversuse trust to determine whether or not access should be allowed. Two types of trust that

    Microsoft active directories incorporate are transitive trusts and one way non transitivetrusts. A transitive trust is when there is a trust that goes further than two domains in a set

    tree, meaning two entities are able to access each others domains and trees.

    A one way transitive trust is when a user is allowed accessed to another tree or domain,

    however, the other domain does not allow access to the other domains. This can besummed up as a network administrator and end user. The network administrator can

    access most trees in the forest including a specific end user's domain. However the end

    user, while able to access his or her own domain, can not access other trees.

    It is important to note that active directories are a great way to organize a large

    organization or corporation's computers data and network. Without an active directory,

    most end users would have computers that would need to be updated individually andwould not have access to a larger network where data can be processed and reports can

    be created. While active directories can be extremely technical and require lots of

    expertise to navigate, they are essential to storing information and data on networks.

    When we install Active Directory services in server 2003 it is called DC ( Domain

    Controller) and DC is called Active Directory. Active Directory functions toorganize a huge organizations computers data and network.

    Active Directory is implemented in only Server Operating System.

    The purpose of implementing Active Directory is manage the data base :

    The Active Directory manages :

    1. Users & Group

    2. Computer

    3. Resources ( Printer)4. Organization Unit

    5. Central Administration ( Manage from Central Location)

    6. Security.

  • 8/9/2019 Active Dir Lab II

    33/76

    Printer

    Users & Groups

    HCL.COM

    Active Directory

    http:\\ www.google.com

    http is Protocolswww is services

    google.com is Domain Na

    Public Dom

    URL ( UnifoResource Loc

    When we run private domain like HCL.COM then it automatically works like public domain

    www.hcl.com / http:\\www.hcl.com

    http://www.google.com/http://www.hcl.com/http://www.hcl.com/http://www.hcl.com/http://www.hcl.com/http://www.hcl.com/http://www.google.com/
  • 8/9/2019 Active Dir Lab II

    34/76

    Goolge.com

    When creating DC suppose HCL.COM in any system.

    Google is the

    server name

    (.) dot is called root

    ComEdu.

    orggov

    Toplevel Domain

    Domain Name

  • 8/9/2019 Active Dir Lab II

    35/76

    DC Changed in Host name then FQDN

    Domain Controller

    DCDC

    DC

    DC HCL.COM

    FQDN (Fully

    Qualified DomainName)

    Forest

    Parent DC

    Child DC Child DC

    DCDC

    HCL.COM

    Server 2003

    Child DC Child DC

  • 8/9/2019 Active Dir Lab II

    36/76

    Tree Concept of Domain Controller

    How DC Works

    HCL.COM

    Raipur. hcl.com

    durg.raipur.hcl.com

  • 8/9/2019 Active Dir Lab II

    37/76

    DC is functioning child by parenting so it is called the process of FQDN

    Like : Childname\parent\toplevel domain

    If you create any user suppose U1 in central location, U1 can login from any PC but User

    cannot take any data backup from central location.

    DCDC

    Member Member

    Replication

    Replication

    Backup Domain Controller

    DC

    U 1

    Domain Name

  • 8/9/2019 Active Dir Lab II

    38/76

    With DNS we can implement DC , for creating member you must have DNS. Soit is important you must of combination of AD(DC) + DNS

    DC is the back bone of DNS

    NT Window 2003

    PDC ---- DC ( AD)

    (Primary Domain Controller)

    BDC ----- ADC

    (Backup Domain Controller )

    Implementing Domain Controller

    Fist give IP in local net

    Run Dc

    promo

    In WindowServer 2003

    we can take

    backup data

    from ADC(Additional

    DomainController

  • 8/9/2019 Active Dir Lab II

    39/76

    For making new dc select (O) Domain Controller for a new Domain

  • 8/9/2019 Active Dir Lab II

    40/76

    Give name

  • 8/9/2019 Active Dir Lab II

    41/76

  • 8/9/2019 Active Dir Lab II

    42/76

    Do next

  • 8/9/2019 Active Dir Lab II

    43/76

  • 8/9/2019 Active Dir Lab II

    44/76

  • 8/9/2019 Active Dir Lab II

    45/76

    Check I386 file also

  • 8/9/2019 Active Dir Lab II

    46/76

  • 8/9/2019 Active Dir Lab II

    47/76

    (See Active Director Installed)

    How to make memberThe Open Client Site Computer

    Give same preferred DNS IP which is given in your server like 192.168.2.11

    Step: My computer > property > computer name

  • 8/9/2019 Active Dir Lab II

    48/76

    Select change

  • 8/9/2019 Active Dir Lab II

    49/76

    Then Restart your computer you have made the member of Active directory of thisclient computer

    ******

    Step 3:

    In server site computer we have to make user profile and map pofile.

    1. Make one folder in server site suppose we have created a folder name MINAL

    In MINAL folder just create two sub folder one should be M PRO and another should

    be M MAP

  • 8/9/2019 Active Dir Lab II

    50/76

    Give Share and Security permission to your main folder ( MINAL)

  • 8/9/2019 Active Dir Lab II

    51/76

  • 8/9/2019 Active Dir Lab II

    52/76

    Share this folder

    Allow every one

  • 8/9/2019 Active Dir Lab II

    53/76

    Then set security option and give permission

  • 8/9/2019 Active Dir Lab II

    54/76

    If you need full security of your user then remove all Group or User Names give

    aforeside in the fox which is 1. administrator 2.creator owner 3. system 4. user(Bhili\users)

    Go in advance tab

    Now break the inheritance for doing inheritance uncheck the box and do copy

    Then apply and ok

  • 8/9/2019 Active Dir Lab II

    55/76

  • 8/9/2019 Active Dir Lab II

    56/76

    Remove the users if you want to keep the administrator use then you can keep it.

    ***********

    Step 4 : Now we will create the user in server site

    Start > Administrative Tools > Active Directory Users and Computers

    Then open Bhilai.com

  • 8/9/2019 Active Dir Lab II

    57/76

    Then select Users folder given in the aforesaid box

    Right click on the right side box > new > user

    Do next and give complex password

  • 8/9/2019 Active Dir Lab II

    58/76

    See given below your user profile has been created

    Then open my computer c Drive and open Minal folder

  • 8/9/2019 Active Dir Lab II

    59/76

    Give both folder sharing and security and also full permission to HCL1 user

  • 8/9/2019 Active Dir Lab II

    60/76

    Then check names

  • 8/9/2019 Active Dir Lab II

    61/76

    Then give full permission

    The also set the security

  • 8/9/2019 Active Dir Lab II

    62/76

    Now do check names

  • 8/9/2019 Active Dir Lab II

    63/76

    Then allow permission for minal

  • 8/9/2019 Active Dir Lab II

    64/76

    Apply and OK

    Then Go into the user side where we have created MINAL SAHARE user

  • 8/9/2019 Active Dir Lab II

    65/76

    Right click perperties

    Now open profile tab and give path

  • 8/9/2019 Active Dir Lab II

    66/76

    Open your computer name select it and fill up the box for giving path

  • 8/9/2019 Active Dir Lab II

    67/76

  • 8/9/2019 Active Dir Lab II

    68/76

    Apply OK

    The Go in Client Site computer logon the HCL1 user thorough

    For implementing Domain Controller first configure IP address

    Step 1. Open Network Connections

    Right click - Properties

    Networking Tab

    Propterties

    General tab

    Use the following IP Address

    Give IP Address : 192.168.1.99

  • 8/9/2019 Active Dir Lab II

    69/76

    Use the DNS Server Address:DNS IP Address: 192.168.1.99

    ( configure both IP address same )

  • 8/9/2019 Active Dir Lab II

    70/76

  • 8/9/2019 Active Dir Lab II

    71/76

    Important

    For implementing domain controller check the Drive which contain NTFS filesystem. Without NTFS the DC will not implement.

    You must have CD / or I386 Folder

    Step 2:

    Run > dcpromo

    It will open Active Directory Installation Wizard

    Do

    And make server installation finish

    Then

    Restart your computer

    After starting your computer

    Start my computer properties computer name change member of domain typethe name hcl.com-

    Through performing the task your domain controller is completed

    Step 3:

    Run >CMD

    Ping 192.168.1.100 Your IP Address

    ThenPing your Domain Controller self > HCL.COM

    (All should send packets)

    Step 4:

    After completion of Domain Controller installation

    Login computer

    with new domainname

  • 8/9/2019 Active Dir Lab II

    72/76

    Step 5:

    Confirm you have installed Domain Controller or not in your PC

    See the message box in your computer in server 2003 automitically open the tool

    named

    Step 6:

    My computer > Administrative Tools > ---------------------------------------------------------------------- ----------

    -----------------------------------------

    DNS Management

    .

    .

    Step 7:

    Now Select Account User & Computer

    Also You can change your computer name > ABC.COM >User> Right Click > new user

    > HCL

  • 8/9/2019 Active Dir Lab II

    73/76

    Client Computer / User

    While completing DNS in your server PC. Your another work is making your computer

    the member of the server computer.

    Configure the following steps for making the member of domain of your computer.

    Suppose your user computer name is U1.

    Step 1:Give the unique name of your user (Client) computer like RAM.COM

    Step 2:

    Set IP Address in U1 computer : 192.168.1.99

    Set preferred DNS : 192.168.1.100

    (The preferred DNS IP address should be given to the Server computer)

    It should be noted that your IP address and your Preferred IP address should not be same.

    _______________________________________________________________

    Creating Profiles

    When we create any user account in our computer then the user

    make profiles by default.

    See My computer

  • 8/9/2019 Active Dir Lab II

    74/76

    See there is having some user documents and also some by default

    folders like :

    1. windows system files, application files

    2. Programme files all software (Microsoft & III party)

    3. Documents & Settings Profiles

    Why profile is useful ?

    Profile is used for users personal settings.

    One user having

    1. Desktop

    2. My document3. temp

    4. Templates

    5. sent to

    6. recent open document

    7. start new

    8. programme data

    9. favourties

  • 8/9/2019 Active Dir Lab II

    75/76

    When we login in any user then create profile.

    Fist profile is {Document & Setting }

    1. Adminstrator

    2. HCL ( initial user which made during installation )

    3. U1, U2, U3,

    4. all users display5. default user hidden

    Performing Sent to option

    Open My computer and select the user which you

    want to sent on the desktop so users file can be access.

    Select the user and right click > select create short cut of the user

    so we can access it in our desktop.

    Conclusion : All User : When we make any setting it will go in

    ( Current User + new user)

    Administrator having privillages to open any user account,

    but user can not access another profile.

  • 8/9/2019 Active Dir Lab II

    76/76

    Suppose we created one profile in U1 user account ( it is a

    text file ) we can access it in administrator account and also

    U1 user account but can not access it in U2 account.

    If you want to delete any user account you can delete it from

    administrator account only.

    Open Administrator Account > My computer > Tools >

    Folder options> view > show hidden files or folders > OK

    It will show all users accounts

    In this situation another user folder is containing only by

    default music profile & picture documents.

    LabIf you have crated any shortcut in desktop it will go in all users

    means current user + new user (means the user which you will

    make in future)

    Desktop -------- shortcut ->

    Step > Default Folder

    If you do any modification in default folder suppose you make any

    shortcut it will only go in new user not in current user folder

    profile.

    Desktop -> shortcut-> only new user

    all user

    current user

    new user