Download - Active Dir Lab II
-
8/9/2019 Active Dir Lab II
1/76
Hacking Commands
1. C:\>ping 192.168.1.1
C:\> ping /?
Options
- t- a
- n- L- f- I - ttl- v - tos- r - count- s - coat
- j - host list- k - host list- w - time out
2. C:\> ipconfig/all
We use this command for finding out the network interface and also finding out thenetwork interface device.
3. C:\> tracert
We use this command for finding out the exact path and also for jumping one computer
to another computer
C:\> tracert www.google.com
4. C:\> telnet
telnet is used in port no. 23 | and telnet need always passward
C:\> telnet 192.168.1.1
BCM 96338 ADSL router
Login Administrator
Password -
C:\> logout
5. C:\> nslookup
This command is used for restore the DNS records it is used in Local DNS
C:\> nslookup ?
http://www.google.com/http://www.google.com/ -
8/9/2019 Active Dir Lab II
2/76
Serverwww.google.com (restore DNS server)
6 C:\> telnet 192.168.1.205 ( through this IP address we can access another computer)7 C:\> mstsc (we can remotely access the another computer )
8 C:\> netstat ( this command is used for display protocol statistics and also
convert TCP/IP network connection. OR also used for watching session or current open
session.
- C:\> netstat a - C:\> netstat 192.168.1. 205 (through this command we can watch mail
session of another system, suppose main is open in system 205 it will show in
your system.
9 C:\> arp
This command is used for finding MAC IP and physical address
********************
http://www.google.com/http://www.google.com/http://www.google.com/ -
8/9/2019 Active Dir Lab II
3/76
Performing Computer (Disk) Management
Start > My computer > Mange> Disk Management
Right Click My computer > Disk Management
(Appearing) Disk 0, Disk 1, Disk 2
Very first time if you are managing any disk it will be on the Basic Disk Basic Disk
contains up to four Primary Partitions or three Partitions and an extended partition with
multiple logical drives.
Basic Disk contains up to four Primary Partitions or three Partitions and an extendedpartition with multiple logical drives.
Fist convert basis disk into Dynamic Disk by using disk management
diskpart.exe command can be used ( to convert basic disk into dynamic disk)
What is Dynamic Disk?
A physical disk provides features that basic disk do not, such as support for volumes that
spam multiple disks.
What is Active Volume?
The Volume from which the computer startup. The Active Volume must be a Simple
Volume on a Dynamic Disk.
Caution while converting Basic Disk into Dynamic Dick
Fist you must dismount and take offline the volume containing the original files before
you convert the disk containing shadow copy in Dynamic Disk. Once converting Basic
Disk into Dynamic Disk you cannot change basic Volume back, you must delete allvolumes on the Disk and then you can convert Dynamic Disk into Basic Disk. Your
computer will restart when you convert Dynamic Disk into Basic Disk.
What is Extended Volume?
If a volume does not have a file system or it is formatted using the NTFS file
system, you cannot extend volumes formatted using FAT or NTFS 32.
You cannot extend a system volume boot volume, striped volume,
mirrored volume, or Raid 5 volumes.
You can extend only Simple Volume or extended volumes that are not
system or boot volumes, as long as there is available disk space.
Resynching Message
The volumes mirrors are being resynchronized so that both mirrors contain
identically data. (the message appear when extending volumes)
-
8/9/2019 Active Dir Lab II
4/76
Online Message
The disk is OK
Extended Volume
If you are extending volumes which contains system files it will also mirrored in another
disk.
Managing Simple Volume
Select the disk space unallocated > right click > new volume >
Select Disks > Add > 200 MB
perform quick format
Simple Volume
It contains disk space from a single disk and can be extended if necessary.
If the volume deleted the file or data cannot be recovered.
Spanned Volume
It uses 2 or more dynamic disks ( Up to 32 bits)
Dynamically increases the size of volume
Data contain sequentially on each disk.
Same amount of space is not necessary on each disk.
Both disk will be deleted if delete one disk and data cannot be recovered
Striped Volume
It also uses two disks
If delete one disk both disks deleted.
Mirrored Volume
Recynching the both disks.
For implementing Mirrored volume you need first convert basic disk into
dynamic disk then you can implement new volume ( mirrored)
***********
-
8/9/2019 Active Dir Lab II
5/76
BackupTypes of back up
Normal backup
Copy backup
Incremental backup
Differential Backup
Daily Backup
Normal Backup
A normal backup copies all selected files and marks each file as having been backed up
(in other words, the archive attribute is cleared). With normal backups, you need only the
most recent copy of the backup file or tape to restore all of the files. You usually performa normal backup the first time you create a backup set.
Backing up your data using a combination of normal backups and incremental backups
requires the least amount of storage space and is the quickest backup method. However,recovering files can be time-consuming and difficult because the backup set can be storedon several disks or tapes.
Backing up your data using a combination of normal backups and differential backups is
more time-consuming, especially if your data changes frequently, but it is easier to
restore the data because the backup set is usually stored on only a few disks or tapes.
Copy backup
A copy backup copies all selected files but does not mark each file as having been backed
up (in other words, the archive attribute is not cleared). Copying is useful if you want toback up files between normal and incremental backups because copying does not affect
these other backup operations.
Incremental backup
An incremental backup backs up only those files created or changed since the last normal
or incremental backup. It marks files as having been backed up (in other words, the
archive attribute is cleared). If you use a combination of normal and incremental backups,you will need to have the last normal backup set as well as all incremental backup sets in
order to restore your data.
Differential backup
A differential backup copies files created or changed since the last normal or incrementalbackup. It does not mark files as having been backed up (in other words, the archive
attribute is not cleared). If you are performing a combination of normal and differential
backups, restoring files and folders requires that you have the last normal as well as the
last differential backup.
-
8/9/2019 Active Dir Lab II
6/76
Daily Backup
A daily backup copies all selected files that have been modified the day the daily backupis performed. The backed-up files are not marked as having been backed up (in other
words, the archive attribute is not cleared).
Performing Normal Backup
Create and select any file or folder which you want take backup. Suppose you want totake backup the file placed on the desktop.
5 N All backup & Remove mark
5 N all backup & remove mark
Start > Run > Ntbackup >backup or restore wizard will open
Second Step
-
8/9/2019 Active Dir Lab II
7/76
Step 3
Step 4
Step 5
A normal backup copies
all selected files andmarks each file as having
been backed up * (in other
words, the archiveattribute is cleared). Withnormal backups, you need
only the most recent copy
of the backup file or tapeto restore all of the files.
You usually perform a
normal backup the firsttime you create a backup
set
-
8/9/2019 Active Dir Lab II
8/76
Then
Browse if you want to keep backup in desktop do next and save it on desktop andfinish
Now selectthe
advancetab
-
8/9/2019 Active Dir Lab II
9/76
Open the box
available
various typesof backups,
There are 5types ofbackup
available.
The both box
should bechecked
during
backup
-
8/9/2019 Active Dir Lab II
10/76
-
8/9/2019 Active Dir Lab II
11/76
Now select the file which you have taken backup right click and see properties
In advanced Attributes box see the message the file is ready for archiving
< apply>
******************
Advance Attirbutes
While checking attributes that small box contained the message advance attributes
will appear on the screen, the message file is ready for archieving will be shown inthe box when first time taking normal backup.
Click the advance tab and see A normal
backup copies all selected files and marks
each file as having been backed up * (in
other words, the archive attribute is
cleared).
With normal backups, you need only the most recent copy of the backupfile or tape to restore all of the files. You have usually performed a normal
backup the first time you created a backup set.
Right click the folder
which you want tocheck the archiving.
Because it was thenormal backup so in
advance attributes box
will be unchecked infirst time, but in normal
back it will select and
take backup of all files
either you will select
files or not it will takebackup.
-
8/9/2019 Active Dir Lab II
12/76******************
In first time
normal backup thebox will be
unchecked.
After modifying the file or
folder the box advancedattributes will be checked
automatically. It isbecause we have modifiedsomething and backup is
completed. If we modify
many times then also the
box will be checked innormal backup.
-
8/9/2019 Active Dir Lab II
13/76
Copy backup
A copy backup copies all selected files but does not mark each file as having been
backed up (in other words, the archive attribute is not cleared). Copying is useful ifyou want to back up files between normal and incremental backups because copying
does not affect these other backup operations.
A copy backup is responsible for taking backup the selected files only C all files and no remove the mark, if we have modified file no. 1,2,5 then also
it will take backup but it will not remove the mark.
In advanced attributes box thebox will be checked always.
This is the concept when
first time taking backup.
The box got unchecked if
we modified the file insecond time.
Conclusion: In previousnormal backup when secondtime doing any modification
the box will be checked. But
in copy backup second timemodification the box will be
unchecked.
-
8/9/2019 Active Dir Lab II
14/76
Incremental backup
An incremental backup backs up only those files created or changed since the last normalor incremental backup. It marks files as having been backed up (in other words, the
archive attribute is cleared). If you use a combination of normal and incremental backups,
you will need to have the last normal backup set as well as all incremental backup sets in
order to restore your data.
If we select all files it will take back up the selected files.
5 incremental all backup (only marked ) remove mark
5 incremental only marked remove mark
Backs up selected files
only if they were
created or modifiedsince the previous
backup.
The box is uncheckedwhile first time taking
incremental backup.
Conclusion: if wehave modified any
files previously then
incremental backup isgood.
-
8/9/2019 Active Dir Lab II
15/76
Differential backup
A differential backup copies files created or changed since the last normal or incrementalbackup. It does not mark files as having been backed up (in other words, the archive
attribute is not cleared). If you are performing a combination of normal and differential
backups, restoring files and folders requires that you have the last normal as well as thelast differential backup.
* if we select all unmark file should copied, and mark will be removed
* If we select marked file it will not remove the mark.
After doing anymodification the
box will be
unchecked inincremental
backup.
Backs up selected files
only if they werecreated or modified
since the previousbackup, but does not
mark them as backedup.
-
8/9/2019 Active Dir Lab II
16/76
Daily Backup
A daily backup copies all selected files that have been modified the day the daily backupis performed. The backed-up files are not marked as having been backed up (in other
words, the archive attribute is not cleared).
No remove mark but take backup of files in which data file was modified.
Type Copy Mark
Normal All file Remove mark file
Copy All file No remove mark
Incremental Only Mark Copy Remove Mark
Differential Only mark copy No remove mark
Daily Only Modify copy No remove
Microsoft recommend 3 types of backup schemes.
1. Normal
2. Normal + Incremental
3. Normal + Differential
The box isunchecked while
taking first time
differential backup.After doing any
modification the box
will also remain
unchecked.
-
8/9/2019 Active Dir Lab II
17/76
Backup Planning
Monday Tuesday Wednesday Thursday Friday Saturday
Normal Normal Normal Normal Normal Normal
10 files 10 files 10 files 10 files 10 files 10 files
10 files 20 files 30 files 40 files 50 files 60 files
T 1 T 2 T 3 T 4 T 5 T 6
T 1 T 2 T 3 T 1 T 2 T6
T 1 T 2 T 3 T 4 T 5 T 7
T 3 T1 T 2 T 3 T 1
Daily 5 files
Daily 3 files
Wed 4 Files
Mon 12 files
*****************
Compress & Encrypt
Compressing files, folders, and programs decreases their size and reduces the amount of
space they use on your drives or removable storage devices. Drive compression decreasesthe amount of space used by all of the files and folders stored on that drive.
Windows supports two types of compression: NTFS compression and compression using
the Compressed (zipped) Folders feature.
NTFS compression
If you do not have an NTFS drive, this option is not available. To determinewhether your drive is formatted with NTFS, open My Computer, right-click a
drive, and then clickProperties. The file system is indicated on the General tab.
You can compress individual files and folders using NTFS compression, as wellas entire NTFS drives.
You can compress a folder without compressing its contents.
You can work with NTFS-compressed files without decompressing them.
You can display NTFS-compressed file and folder names in a different color to
make them easier to identify.
-
8/9/2019 Active Dir Lab II
18/76
You may notice a decrease in performance when working with NTFS-compressed
files. When you open a compressed file, Windows automatically decompresses itfor you, and when you close the file, Windows compresses it again. This process
may decrease your computers performance.
NTFS-compressed files and folders only remain compressed while they are storedon an NTFS drive.
You cannot encrypt an NTFS-compressed file.
NTFS file encryption is not available on Windows XP Home Edition.
Performing Compressing
Before compressing file see the file size first, and note after compressing what isthe files size
Select the file > right click > properties > advance >
Compress contentsto save disk space
The file size is 230MB
before compressing.
(241,887,018 bits)
-
8/9/2019 Active Dir Lab II
19/76
Check the box
The box will
appear whileclicking OK and
apply. Selectapply changes tothis folder only
-
8/9/2019 Active Dir Lab II
20/76
*************
Encrypt{for performing Encrypting need net atmosphere}
This folder option is used to no one can access your file or folder.
Encrypting File System (EFS) provides the core file encryption technology used to storeencrypted files on NTFS file system volumes. Once you encrypt a file or folder, you
work with the encrypted file or folder just as you do with any other files and folders.
Encryption is transparent to the user that encrypted the file. This means that you do not
have to manually decrypt the encrypted file before you can use it. You can open andchange the file as you normally do.
Using EFS is similar to using permissions on files and folders. Both methods can be used
to restrict access to data. However, an intruder who gains unauthorized physical access toyour encrypted files or folders will be prevented from reading them. If the intruder tries
to open or copy your encrypted file or folder he receives an access denied message.
Permissions on files and folders does not protect against unauthorized physical attacks.
You encrypt or decrypt a folder or file by setting the encryption property for folders andfiles just as you set any other attribute such as read-only, compressed, or hidden. If you
encrypt a folder, all files and subfolders created in the encrypted folder are automatically
encrypted. It is recommended that you encrypt at the folder level.
You can also encrypt or decrypt a file or folder using the cipher command. For moreinformation, see Cipher.
After
compressing the
files the file sizewill decrease
Note
(241,894,210)
bytes
-
8/9/2019 Active Dir Lab II
21/76
Configuring diskquotas for the POP3 service
Important
You can configure diskquotas only onNTFSfile systempartitions.
You can use disk quotas to control and limit the amount of disk space individual
mailboxes on the mail server can use. This ensures that individual mailboxes, and the
mail store in general, do not use excessive or unanticipated amounts of diskspace and
adversely affect the performance of the server where the POP3 service is running.
For example, if the mail server suddenly receives a large volume of unsolicited e-mail,
the mail store expands rapidly and might use all of the available diskspace on the hard
disk. If you implement quotas, the mail store only expands to the quota limit that youspecified. As a result, no more mail is accepted by the server, and the rest of the server
still functions normally.
If you are using Active Directory integrated authentication or local Windows accounts
authentication, the e-mail delivered to a POP3 service mailbox will have file ownershipassigned to the mailbox user by default. A quota file is created in the mailbox directory
that contains the security identifier (SID) of the user account associated with the mailbox.
File ownership is then assigned to the user account that corresponds to the SID contained
in the quota file. The SID is also used by the NTFS file system disk quota system toenforce the quota limits specified on the user account matching the SID. All e-mail
transferred to the mailbox's mail store directory is marked with the SID contained in the
quota file; this marks the e-mail so it can be monitored by the quota system.
Enabling disk quotas
If you are a member of the Administrators group, you can enable quotas onNTFS
volumes. On volumes that already contain files, Windows calculates the disk space usedby all users who have copied, saved, or taken ownership of files on the volume up to that
point. The quota limit and warning level are then applied to all current users based on
those calculations, and to users who begin using the volume from that point on. You can
then set different quotas, or disable quotas, for individual or multiple users. You can alsoset quotas for specific users who have not yet copied, saved, or taken ownership of files
on the volume.
For example, if \\Production\Public is shared from the root directory of an NTFS volume,you might want to set a quota limit of 50 megabytes (MB) for all users of
\\Production\Public, while making sure two users who work with larger files on the serverhave a 100 MB limit. If both of these users already have files stored on
\\Production\Public, you can select both users and set their quota limit to 100 MB.However, if one or both users do not have files stored on the server when you enable
quotas, you need to select the users in the Quota Entries window and then set their quota
limit to a value higher than the default for new users.
To enable disk quotas
1. Open My Computer.
-
8/9/2019 Active Dir Lab II
22/76
2. Right-click the disk volume for which you want to enable disk quotas, and then
clickProperties.3. In the Properties dialog box, click the Quota tab.
4. On the Quota tab, click the Enable quota management check box.
5. Select one or more of the following options, and then clickOK:
Then rightclick the
selecteddisk
properties
which youwant to
apply quota
See the quotain advanced
tab
-
8/9/2019 Active Dir Lab II
23/76
Check the box for
enabling quota
management
See the box carefully
and implementing diskquota
-
8/9/2019 Active Dir Lab II
24/76
Disk quota is
implementing in Drive D
for the Limit Disk Space700 MB and also have set
the warning level to 600MB.
-
8/9/2019 Active Dir Lab II
25/76
See the error
message
appearing thebox. While
implementingdisk quota
-
8/9/2019 Active Dir Lab II
26/76
ControlPanelControlPanel provides a set of special-purpose administrative tools that you can use to
configure the Windows, applications, and services environment. ControlPanel includesdefault items that you can use for common tasks (for example, Display and Add
Hardware). User-installed applications and services can also insert icons into Control
Panel.
There are two view options for Control Panel: Category View and Classic View.
Category View displays ControlPanel icons according to the type of task that the user
wants to perform. Classic View displays ControlPanel icons in a view that is familiar to
users of previous versions of Windows.
There is a list contains by the control panel
Accessibility Options
Add Hardware
Add or Remove Programs
Administrative Tools (Windows interface administrative tool reference A-Z)
Date and Time
Display
Folder Options
Fonts Game Controllers
Internet Options Keyboard
Licensing
Mouse
Network Connections
Phone and Modem Options
Power Options
Printers and Faxes
Regional and Language Options
Scanners and Cameras Scheduled Tasks (Task Scheduler) Sounds and Audio Devices
Speech
Stored User Names and Passwords
System & Taskbar and Start Menu
CPL is the extension of control panel
For performing control panel, start > search > *.cpl
-
8/9/2019 Active Dir Lab II
27/76
Type *.cpl
for searchingcontrol panel
The System
32 files
contains
maximum ofcontrol panel
objects.
-
8/9/2019 Active Dir Lab II
28/76
When Selecting access.cpl the following window appear
This window
provide you the
information andAccessibility
Option
Appwiz.cpl
Provides Add
or remove
Programmes
-
8/9/2019 Active Dir Lab II
29/76
Desk.cplProvides
the Desktop
options
Through this option
you can giveprivileges to your
administrator to do
not open the
particular selectedcontrol panel object
in your administrator
account.
-
8/9/2019 Active Dir Lab II
30/76
Through the control panel option there is some important task which we alwaysneed to perform during administrating any system
Add remove programmes
Accessories & utilities
Data & time
UPS, Hybernet & power
Power schemes
Display settings
Regional & Language settings
Folder Options
View
***************
Through
Regional andLanguage
Options you
can set theworldslanguage,
like Russian,
Japanise etc.
-
8/9/2019 Active Dir Lab II
31/76
Active Directory
An active directory is a directory structure used on Microsoft Windows based computers
and servers to store information and data about networks and domains. It is primarilyused for online information and was originally created in 1996 and first used with
Windows 2000.
An active directory (sometimes referred to as an AD) does a variety of functions
including the ability to provide information on objects, helps organize these objects for
easy retrieval and access, allows access by end users and administrators and allows theadministrator to set security up for the directory.
An active directory can be defined as a hierarchical structure and this structure is usually
broken up into three main categories, the resources which might include hardware such as
printers, services for end users such as web email servers and objects which are the mainfunctions of the domain and network.
It is interesting to note the framework for the objects. Remember that an object can be a
piece of hardware such as a printer, end user or security settings set by the administrator.
These objects can hold other objects within their file structure. All objects have an ID,usually an object name (folder name). In addition to these objects being able to hold other
objects, every object has its own attributes which allows it to be characterized by the
information which it contains. Most IT professionals call these setting orcharacterizations schemas.
Depending on the type of schema created for a folder, will ultimately determine how
these objects are used. For instance, some objects with certain schemas can not be
deleted, they can only be deactivated. Others types of schemas with certain attributes canbe deleted entirely. For instance, a user object can be deleted, but the administrator object
can not be deleted.
When understanding active directories, it is important to know the framework that objects
can be viewed at. In fact, an active directory can be viewed at either one of three levels,these levels are called forests, trees or domains. The highest structure is called the forest
because you can see all objects included within the active directory.
Within the Forest structure are trees, these structures usually hold one or more domains,
going further down the structure of an active directory are single domains. To put theforest, trees and domains into perspective, consider the following example.
A large organization has many dozens of users and processes. The forest might be the
entire network of end users and specific computers at a set location. Within this forest
directory are now trees that hold information on specific objects such as domaincontrollers, program data, system, etc. Within these objects are even more objects which
can then be controlled and categorized.
-
8/9/2019 Active Dir Lab II
32/76
How are Active Directories used?
If you are a computer administrator for a large corporation or organization, you can easilyupdate all end users computers with new software, patches, files, etc simply by updating
one object in a forest or tree.
Because each object fits into a set schema and has specific attributes, a network
administrator can easily clear a person on a set tree or instantly give access to some users
for certain applications or deny access to certain users for others. The Microsoft serversuse trust to determine whether or not access should be allowed. Two types of trust that
Microsoft active directories incorporate are transitive trusts and one way non transitivetrusts. A transitive trust is when there is a trust that goes further than two domains in a set
tree, meaning two entities are able to access each others domains and trees.
A one way transitive trust is when a user is allowed accessed to another tree or domain,
however, the other domain does not allow access to the other domains. This can besummed up as a network administrator and end user. The network administrator can
access most trees in the forest including a specific end user's domain. However the end
user, while able to access his or her own domain, can not access other trees.
It is important to note that active directories are a great way to organize a large
organization or corporation's computers data and network. Without an active directory,
most end users would have computers that would need to be updated individually andwould not have access to a larger network where data can be processed and reports can
be created. While active directories can be extremely technical and require lots of
expertise to navigate, they are essential to storing information and data on networks.
When we install Active Directory services in server 2003 it is called DC ( Domain
Controller) and DC is called Active Directory. Active Directory functions toorganize a huge organizations computers data and network.
Active Directory is implemented in only Server Operating System.
The purpose of implementing Active Directory is manage the data base :
The Active Directory manages :
1. Users & Group
2. Computer
3. Resources ( Printer)4. Organization Unit
5. Central Administration ( Manage from Central Location)
6. Security.
-
8/9/2019 Active Dir Lab II
33/76
Printer
Users & Groups
HCL.COM
Active Directory
http:\\ www.google.com
http is Protocolswww is services
google.com is Domain Na
Public Dom
URL ( UnifoResource Loc
When we run private domain like HCL.COM then it automatically works like public domain
www.hcl.com / http:\\www.hcl.com
http://www.google.com/http://www.hcl.com/http://www.hcl.com/http://www.hcl.com/http://www.hcl.com/http://www.hcl.com/http://www.google.com/ -
8/9/2019 Active Dir Lab II
34/76
Goolge.com
When creating DC suppose HCL.COM in any system.
Google is the
server name
(.) dot is called root
ComEdu.
orggov
Toplevel Domain
Domain Name
-
8/9/2019 Active Dir Lab II
35/76
DC Changed in Host name then FQDN
Domain Controller
DCDC
DC
DC HCL.COM
FQDN (Fully
Qualified DomainName)
Forest
Parent DC
Child DC Child DC
DCDC
HCL.COM
Server 2003
Child DC Child DC
-
8/9/2019 Active Dir Lab II
36/76
Tree Concept of Domain Controller
How DC Works
HCL.COM
Raipur. hcl.com
durg.raipur.hcl.com
-
8/9/2019 Active Dir Lab II
37/76
DC is functioning child by parenting so it is called the process of FQDN
Like : Childname\parent\toplevel domain
If you create any user suppose U1 in central location, U1 can login from any PC but User
cannot take any data backup from central location.
DCDC
Member Member
Replication
Replication
Backup Domain Controller
DC
U 1
Domain Name
-
8/9/2019 Active Dir Lab II
38/76
With DNS we can implement DC , for creating member you must have DNS. Soit is important you must of combination of AD(DC) + DNS
DC is the back bone of DNS
NT Window 2003
PDC ---- DC ( AD)
(Primary Domain Controller)
BDC ----- ADC
(Backup Domain Controller )
Implementing Domain Controller
Fist give IP in local net
Run Dc
promo
In WindowServer 2003
we can take
backup data
from ADC(Additional
DomainController
-
8/9/2019 Active Dir Lab II
39/76
For making new dc select (O) Domain Controller for a new Domain
-
8/9/2019 Active Dir Lab II
40/76
Give name
-
8/9/2019 Active Dir Lab II
41/76
-
8/9/2019 Active Dir Lab II
42/76
Do next
-
8/9/2019 Active Dir Lab II
43/76
-
8/9/2019 Active Dir Lab II
44/76
-
8/9/2019 Active Dir Lab II
45/76
Check I386 file also
-
8/9/2019 Active Dir Lab II
46/76
-
8/9/2019 Active Dir Lab II
47/76
(See Active Director Installed)
How to make memberThe Open Client Site Computer
Give same preferred DNS IP which is given in your server like 192.168.2.11
Step: My computer > property > computer name
-
8/9/2019 Active Dir Lab II
48/76
Select change
-
8/9/2019 Active Dir Lab II
49/76
Then Restart your computer you have made the member of Active directory of thisclient computer
******
Step 3:
In server site computer we have to make user profile and map pofile.
1. Make one folder in server site suppose we have created a folder name MINAL
In MINAL folder just create two sub folder one should be M PRO and another should
be M MAP
-
8/9/2019 Active Dir Lab II
50/76
Give Share and Security permission to your main folder ( MINAL)
-
8/9/2019 Active Dir Lab II
51/76
-
8/9/2019 Active Dir Lab II
52/76
Share this folder
Allow every one
-
8/9/2019 Active Dir Lab II
53/76
Then set security option and give permission
-
8/9/2019 Active Dir Lab II
54/76
If you need full security of your user then remove all Group or User Names give
aforeside in the fox which is 1. administrator 2.creator owner 3. system 4. user(Bhili\users)
Go in advance tab
Now break the inheritance for doing inheritance uncheck the box and do copy
Then apply and ok
-
8/9/2019 Active Dir Lab II
55/76
-
8/9/2019 Active Dir Lab II
56/76
Remove the users if you want to keep the administrator use then you can keep it.
***********
Step 4 : Now we will create the user in server site
Start > Administrative Tools > Active Directory Users and Computers
Then open Bhilai.com
-
8/9/2019 Active Dir Lab II
57/76
Then select Users folder given in the aforesaid box
Right click on the right side box > new > user
Do next and give complex password
-
8/9/2019 Active Dir Lab II
58/76
See given below your user profile has been created
Then open my computer c Drive and open Minal folder
-
8/9/2019 Active Dir Lab II
59/76
Give both folder sharing and security and also full permission to HCL1 user
-
8/9/2019 Active Dir Lab II
60/76
Then check names
-
8/9/2019 Active Dir Lab II
61/76
Then give full permission
The also set the security
-
8/9/2019 Active Dir Lab II
62/76
Now do check names
-
8/9/2019 Active Dir Lab II
63/76
Then allow permission for minal
-
8/9/2019 Active Dir Lab II
64/76
Apply and OK
Then Go into the user side where we have created MINAL SAHARE user
-
8/9/2019 Active Dir Lab II
65/76
Right click perperties
Now open profile tab and give path
-
8/9/2019 Active Dir Lab II
66/76
Open your computer name select it and fill up the box for giving path
-
8/9/2019 Active Dir Lab II
67/76
-
8/9/2019 Active Dir Lab II
68/76
Apply OK
The Go in Client Site computer logon the HCL1 user thorough
For implementing Domain Controller first configure IP address
Step 1. Open Network Connections
Right click - Properties
Networking Tab
Propterties
General tab
Use the following IP Address
Give IP Address : 192.168.1.99
-
8/9/2019 Active Dir Lab II
69/76
Use the DNS Server Address:DNS IP Address: 192.168.1.99
( configure both IP address same )
-
8/9/2019 Active Dir Lab II
70/76
-
8/9/2019 Active Dir Lab II
71/76
Important
For implementing domain controller check the Drive which contain NTFS filesystem. Without NTFS the DC will not implement.
You must have CD / or I386 Folder
Step 2:
Run > dcpromo
It will open Active Directory Installation Wizard
Do
And make server installation finish
Then
Restart your computer
After starting your computer
Start my computer properties computer name change member of domain typethe name hcl.com-
Through performing the task your domain controller is completed
Step 3:
Run >CMD
Ping 192.168.1.100 Your IP Address
ThenPing your Domain Controller self > HCL.COM
(All should send packets)
Step 4:
After completion of Domain Controller installation
Login computer
with new domainname
-
8/9/2019 Active Dir Lab II
72/76
Step 5:
Confirm you have installed Domain Controller or not in your PC
See the message box in your computer in server 2003 automitically open the tool
named
Step 6:
My computer > Administrative Tools > ---------------------------------------------------------------------- ----------
-----------------------------------------
DNS Management
.
.
Step 7:
Now Select Account User & Computer
Also You can change your computer name > ABC.COM >User> Right Click > new user
> HCL
-
8/9/2019 Active Dir Lab II
73/76
Client Computer / User
While completing DNS in your server PC. Your another work is making your computer
the member of the server computer.
Configure the following steps for making the member of domain of your computer.
Suppose your user computer name is U1.
Step 1:Give the unique name of your user (Client) computer like RAM.COM
Step 2:
Set IP Address in U1 computer : 192.168.1.99
Set preferred DNS : 192.168.1.100
(The preferred DNS IP address should be given to the Server computer)
It should be noted that your IP address and your Preferred IP address should not be same.
_______________________________________________________________
Creating Profiles
When we create any user account in our computer then the user
make profiles by default.
See My computer
-
8/9/2019 Active Dir Lab II
74/76
See there is having some user documents and also some by default
folders like :
1. windows system files, application files
2. Programme files all software (Microsoft & III party)
3. Documents & Settings Profiles
Why profile is useful ?
Profile is used for users personal settings.
One user having
1. Desktop
2. My document3. temp
4. Templates
5. sent to
6. recent open document
7. start new
8. programme data
9. favourties
-
8/9/2019 Active Dir Lab II
75/76
When we login in any user then create profile.
Fist profile is {Document & Setting }
1. Adminstrator
2. HCL ( initial user which made during installation )
3. U1, U2, U3,
4. all users display5. default user hidden
Performing Sent to option
Open My computer and select the user which you
want to sent on the desktop so users file can be access.
Select the user and right click > select create short cut of the user
so we can access it in our desktop.
Conclusion : All User : When we make any setting it will go in
( Current User + new user)
Administrator having privillages to open any user account,
but user can not access another profile.
-
8/9/2019 Active Dir Lab II
76/76
Suppose we created one profile in U1 user account ( it is a
text file ) we can access it in administrator account and also
U1 user account but can not access it in U2 account.
If you want to delete any user account you can delete it from
administrator account only.
Open Administrator Account > My computer > Tools >
Folder options> view > show hidden files or folders > OK
It will show all users accounts
In this situation another user folder is containing only by
default music profile & picture documents.
LabIf you have crated any shortcut in desktop it will go in all users
means current user + new user (means the user which you will
make in future)
Desktop -------- shortcut ->
Step > Default Folder
If you do any modification in default folder suppose you make any
shortcut it will only go in new user not in current user folder
profile.
Desktop -> shortcut-> only new user
all user
current user
new user