Please contact with me, if you are interested in that seminar by 99540206 or thru following link http://goo.gl/forms/3Cb3SwfY2b
Agenda of seminar
Date: 08.10.2014
Subject: Active Directory essentials, Virtualization, WDS/WSUS
Venue: Suite 601, UJM office, Peace avenue-36, Chingeltei district, 3th khoroo, Ulaanbaatar, Mongolia
Presenter and author: B.Munkhtuvshin
Language: Mongolian
Organizer: Geomon Engineering LLC
First day
Subject: Common questions, installation, configurations
- 9.00-9.45IntroductionWhy Active Directory/AD
- Pre-history
- For whom, how to convince management to implement AD, the main obvious benefits of AD implementation
- What is AD for system administration, network admin, for IT manager, business owners
- 9.45-10.15The main definitions and termsforest, tree, Domain, DC, GC,OU, security groups
- GPO
- Subnet and site, DNS for sites (glue records and delegation of zones for forest)
- Fsmo roles (PDC emulator, RID, infrastructure, domain naming, schema masters) and GC
- Functional levels
- Kerberos protocol, NTLM protocols, SAM and NTDS, KDC service
- Schema considerations (precautions, how activate snap-in, Schema changes for Exchange, Lync and so on)
- 10.15-11.15Installation and Initial configurationsPre-requisites (compatible BIND, static IP, unique name of server, unique domain name)
- What network changes(conflicts between DNS, DHCP setting for ISP and AD) are required in typical Mongolian company
- Types of AD, functional levels, when and how to rise functional levels
- Insides of AD (database files, used TCP/IP ports and so on)
- How to install AD in multisite, multi subnet and multi domain environment
- 11.15-11.30 Q&A
- 11.30-11.45 break
- 11.45-13.00Standard basic operations sometimes ignored or wrongly used by Mongolian sysadmins, common mistakes:Deleting domain
- Adding computer into domain, removing computer from domain. Duplicated netbios names for domains and computers, wrong length of names or wrong symbols. Naming computers in corporate environment – why it’s important
- Why pre-installed Windows versions on the notebooks cannot be added to AD
- Why Desktop Windows is not good as a fileservers and printer servers
- Sysprep – why, for what?
- Grouping computer accounts, user accounts by OU for GPO
- Usage of only one DC despite the vendor recommendations
- DNS considerations, proper configurations recommended by the best configurations
- How to promote server in AD, how to demote, how to re-add workstation/member servers to AD
- How to add user, group (local, global, universal) why it’s necessary to re-login after changing the membership in group
- Groups, which of them to use and when
- Assigning rights to groups for sharing, how to correctly share, how to automatically map shares, how automatically empty content of temporarily share folders
- Printers in AD, publishing in AD, default print rights and how to administrate printers in AD, print monitor software (who, when, what, how many pages printed)
- Time Service and Kerberos (time zones, NTP server, virtualization aspects, net time command, how auto check time on multiple servers by script)
- 13.00-14.00 break
- 14.00-15.00Demonstration of the provisioning stereotype AD domain in average Mongolian company. IT policy best practices for ADRestricting LocalAdmins, and what resistance it causes from user side, how to solve
- How to solve problems to launch some programs without LocalAdmin rights
- Fileserver and AD, advantages, pitfalls (for comparison – example of how to setup it without AD on workstations with max 10 connections) Automatically mounted users shared folders, quotas, backuping and redirection, re-assigning to new employee. Samba protocol/CIFS, ports 135, 138,139, 445, Windows Browser Service (elections and network neighborhood lists)
- How to give LocalAdmin rights for somebody not making him/her DomainAdmin
- 15.00-15.30Once again DNS server setting for ADZones, domains – the difference
- DNS server at multi homed server, round robin for DNS, listening IPs of DNS server
- Forwarders and root servers, conditional forwarders and stub zones, primary and secondary zones
- Storing AD in filesystem or AD integrated?
- New type of records – SRV, connection dynamic records with Netlogon service
- Why dhcp client should be used even for servers and workstation with static IPs
- How to add static records (A, CNAME, MX) in case of existence of public Internet domain with the exactly same as an AD domain name, troubleshooting
- Reverse lookup zones – for what
- Caching DNS – when and how to utilize, ipconfig /flushdns
- 15.30-16.00Theory of authorization and authenticationKerberos (Kerberos and DNS, predecessors like NTLMv1/v2) ticket system
- SQL and AD/windows authorizations, vendor recommendations
- Syskey for SAM, digests and how passwords are stored, LC and saminside
- PKI/CA and AD
- Certificates for web SSL, SSH, Wi-Fi AccessPoints, VPN, e-mail and so on
- Smart cards/eTokens for winlogon
- 16.00-17.00Management and administration in AD environmentBrief review of standard tools/snap-ins for work with AD
- Password policy – pitfalls which can ruin whole implementation of AD in the company, unlocking accounts, why you shouldn’t to disable a strong password policy, resetting LocalAdmin passwords, removing local users+profiles, new in password policy for functional level win2008r2.
- c. Remote work (RDP, regedit, shutdown, net time, firewall settings, $resources, remote execution shells like powershell, remotely computer/server management, GPO, WMI and so on)
- 17.00-17.30 Q&A
Second day
Subject: Maintenance and troubleshooting of AD
- 09.00-10.00Insides of Group PolicyGPC and GPT, locations and storage of them, how it works
- GP extension templates for Microsoft Office, WSUS and so on
- How to target GP to OU, domain, site and so on
- Merging GPO (LSDOU), loopbackes, WMI filters
- Troubleshooting of Group Policy (gpedit.msc, gpresult, Rsop, gpotool, gpupdate /force), FRS
- 10.00-13.00Group Policy best practices:WMI and security filters
- Disabling shutdown tracker, autorun, Windows Browser service on non-DCs and so on
- Enabling RDP, DHCP client, DNS client, eventlog,remote registry, print spooler, windows update,time service on everywhere in domains and so on
- Enabling remote Device management
- GPO for Terminal Service lockdown
- WSUS and GPO
- PKI/CA and GPO
- IPsec, VPN and GPO
- PKI and GPO (certificates)
- Software distribution (assigning and publishing, patching, removing msi)
- Software restriction (restrict running gtalk, yahoo messenger and so on)
- Domain wide setup of services
- Logon messages configuration
- Configure EvenLog thru GPO
- Scripting and GPO
- 13.00-14.00 break
- 14.00-15.00Sites, multi domain implementations, trusts, replications (bridgeheads, various topologies)USN milestones
- SPN (setspn and ADCU delegation, for what)
- What is site, for what, what’s the difference from subnets,topologies
- RPC, smtp replications, KCC, Read-onlyDC (password caching)
- Troubleshooting AD/frs replication (Repadmin, replmon, ADSites and Services, eventlog, time, DNS, dcdiag and on) Everything is wsused.
- 15.00-15.30 Seizing/moving fsmo role (for example after crush of DC)
- 15.30-16.45 Q&A
- 16.45-17.00 break
- 17.00-18.00 Backup and restore of DCs, restoring objects in AD by ntdsutil, authoritative and non-authoritative restores, other tools like adsiedit, ldp, netdom and so on. New features of AD in the last Windows versions
Third day
Subject: Microsoft Hyper-V virtualization
- 9.00-9.10 Coffee break, registration
- 9.10-10.00 Theory, short introduction presentation
- 10.00-13.00 Installation on single host server with external storage system.Planning and designing Microsoft virtualization, prerequisites
- Performance optimizations, synthetic drivers, integration tools
- Creation of new VMs from a scratch or from template’s library
- Methodology of system administration in virtualized environment. New paradigm for system management – differences from conventional way
- New aspects of backup for virtualization. MSSC DPM
- Conversion of legacy physical server to virtual server – consideration of the servers with SCVMM
- 13.00-14.00 break
- 14.00 – 17.00 Clustered installation of Hyper-V on two node cluster with external storageServer specification recommendations (choice of UPS and UPS software, antivirus for virtualization, storage issues and so on
- Storage configuration
- Classic Microsoft HA cluster, new features for virtualization
- Installation and initial configuration
- Live Migration demo
- 17.00-17.15 Q&A session
- 17.15-18.00 Comparison with VMware ESX
Fourth day
Subject: WDS
- WDS. Introduction.For what and when , how to use.
- Advantages of WDS.
- Predecessors like RIS and alternatives like Ghost Server, Acronis Server and so on. What’s the difference and pitfalls.
- Basement of the WDS implementation.System requirements.
- Pre-requisites in network (DHCP server, router, DNS, tftp and so on),
- AD integration
- New features of WDS in windows 2008r2.Multicast,
- driver injections,
- deduplication and so on
- X32, x64 images, pxe boot mechanism
- Which OS can be deployed by WDS and why. WIM format, WINPE, SLP, OPK and so on.
- Sysprep in Windows XP, windows2003r2, Setup Manager (where, how to use) Lab1.
- Capture disk
- Deployment of the windows XP thru WDS. Lab2.
- ERD disk (locksmith, services and so on) Microsoft Optimization Pack. Lab3
- How to integrate pxelinux and WDS to be able to run mhdd, memtest, Norton ghost, Acronis Director, knopix network boot thru network. Lab4
- Discovery disk, for what, how to create, how to move to usb boot flashdisk, Win7 to usb Microsoft tool, esx installation from the network) Lab5
- WAIK for Vista, win7, windows 2008r2 (pass/ stages) Generating answer files for different scenarios. Lab6
- Pending, delegation in AD , PreStaging computer names in AD, Lab 7
- KMS server – auto activation of Win7/Vista/Win2008r2/Office2010, automatically adding computer accounts into AD
- Office 2010/2007 unattended installation. Lab 8
- Driver injections into boot images, into install images. Lab 9
- Recommendations and best practices what and how to do. How to completely get rid off re-installation of workstations (AD group policy, WSUS, corporate antiviruses, LocalAdmin rights, Terminal Server, VMware View and so on)