Building from scratch SMB IT infrastructure. Common mistakes, pitfalls.
Intro:
This seminar was designed for IT sysadmins, IT engineers who needs to systematize own field experience and fill the gaps in practical and theoretical knowledge. The agenda of seminar deliberately organized to embrace as much as possible practical skills, specifics from real life needs in Mongolia. The topics which included in the seminar are missing in other official courses or too spread over different resources and never before collected in a such way in one place interconnected.
[spoiler effect=”blind”]
Other our courses are more formal and official, but this one is digest of recommendations collected, processed and analyzed during multiple projects in Mongolia, in other words this course are more customized and targeted to real life company needs.
Unlike other developed countries my colleagues (except very big companies like OT and so on) don’t have luxury to be narrowly specialized in own profession. So it means each of us are forced to be electrician, network administrator, system administrator, communication specialist, repair service technician, helpdesk, IT manager, procurement employee and so on at the same time.
The main goal of my training is to provide the minimal, but mandatory to have technical knowledge for a such role. It’s all about specifics. Role of IT in business, awareness about IT and as consequence IT budget is completely different from other countries. The quality of IT human resources provided by local and average Asian colleges, small size of IT market in Mongolia are another specifics. All these specifics didn’t allow to invest enough into local IT pros competence. [/spoiler] …. But times change. Almost each SMB company starts to feel something wrong with IT, and starts to understand the need in changes, the need in new generation of IT admins who more proactively (preventively) solves problem, not reactively as now (more innovative, intensive and appropriate approaches instead of extensive IT management when IT issues solved mainly by increasing number of cheap IT employees)
Agenda:
day 1 – Building basement[spoiler]
- Construction and design of affordable server room. SCS topology and design, choice of equipment, where never economize.
- Choice of platform for your business, Mainstream Microsoft Windows + Office, or free Linux, or mix? Pros and cons of each option.
- How to balance budget between mandatory and optional IT expenses? What is mandatory, and what is optional?
- How to create affordable Server Room, and is it really necessary?
- Mistakes with planning power sources in company renting buildings:
- Electrics considerations
- BackUPS vs SmartUPS. Lab 01. Environment conditions for UPS.
- For what Data cable for UPS, and why it’s so important.
- SCS mistakes
- How to choose network equipment, common mistakes
- Do you really need server and why
- Do you need Dell server or maybe Desktop computer PC is enough.
- Requirement and affordable improvements to use Virtualization on budget PC server.
- When it’s justified to use Software firewalls, VPN server, proxy servers
- Microsoft licensing in details, how KMS server can help you to stop installing cracks on each computer. Lab 02
- Dell servers as the most popular and available servers in Mongolia.
- how to decide what Dell server we need to buy?
- how to conduct express diagnostics of newly bought server
- Why we need to upgrade hardware firmware and how
- Storage recommendations
- Lifecycle Controller and iDRAC. Express vs Enterprise iDRAC. What’s the difference and do you need it? Mistakes with installing OS on Dell servers (not updated “OS deploy” drivers, wrong RAID configurations for specific tasks, BIOS booting instead of UEFI for large disks and so on) Lab 03.
- how to configure hardware monitoring using iDRAC alert notifications thru SNMP or email. Why it’s so important? Lab 04.
- What is vPro/AMT? Why nobody uses it in Mongolia. And why nobody orders it from hardware suppliers?
- almost workstation iDRAC
- types of vPro, which one do you need and for what
- how to determine does your computer supports what kind of vPro.
- how to configure lab 05.
- WDS. How quickly distribute standardized images to servers and workstations. Re-imaging of computers – “format” of computers on enterprise level. Lab 06
- What is WSUS. Why total software piracy suppress the usage of WSUS.
- Why it’s so important. IT audit, security, stability of IT and WSUS.
- Quick start.
- Common mistakes with WSUS
- Why Backup and Disaster Recovery are always forgotten and ignored? Review of options, starting from builtin and free solutions to robust backup solutions like Veeam Backup and Replication server, MS SC DPM and so on.
- tape devices – do you really need them now?
- backup to local disks, network shares, cloud
- backup or replication? or both?
- storage redundancy and backup
- Cluster and backup
- Bare metal backups vs backup of only DBs and data
- Disaster Recovery policy, test labs
- Lab 07. Demo of Veeam BR to illustrate and compare features.
[/spoiler]
day 2 – Virtualization, VMWARE and Hyper-V.
[spoiler effect=”blind”]
- What is virtualization. Advantages of virtualization. Comparison of two main hypervisors.
- Virtualization and Backup, Replication, DR (VM hardware abstraction layer, synthetic vs emulated drivers)
- Virtualization and clusters
- Vmware essentials.
- installation of VMware ESXi to USB stick, redirection of logs to datastore
- installation from USB, DVD
- installation by iDRAC
- installation from network
- initial
- Subject: Microsoft Hyper-V virtualization essentials
- 9.00-9.10 Coffee break, registration
- 9.10-10.00 Theory, short introduction presentation
- 10.00-13.00 Installation on single host server with external storage system.Planning and designing Microsoft virtualization, prerequisites
- Performance optimizations, synthetic drivers, integration tools
- Creation of new VMs from a scratch or from template’s library
- Methodology of system administration in virtualized environment. New paradigm for system management – differences from conventional way
- New aspects of backup for virtualization. MSSC DPM
- Conversion of legacy physical server to virtual server – consideration of the servers with SCVMM
- 13.00-14.00 break
- 14.00 – 17.00 Clustered installation of Hyper-V on two node cluster with external storageServer specification recommendations (choice of UPS and UPS software, antivirus for virtualization, storage issues and so on
- Storage configuration
- Classic Microsoft HA cluster, new features for virtualization
- Installation and initial configuration
- Live Migration demo
- 17.00-17.15 Q&A session
- 17.15-18.00 Comparison with VMware ESX
[/spoiler]
day 3 – Active Directory essentials
[spoiler effect=”blind”]
Subject: Common questions, installation, configurations
- 9.00-9.45 Introduction, Why Active Directory/AD
- Pre-history
- For whom, how to convince management to implement AD, the main obvious benefits of AD implementation
- What is AD for system administration, network admin, for IT manager, business owners
- 9.45-10.15 The main definitions and terms. Forest, tree, Domain, DC, GC,OU, security groups
- GPO
- Subnet and site, DNS for sites (glue records and delegation of zones for forest)
- Fsmo roles (PDC emulator, RID, infrastructure, domain naming, schema masters) and GC
- Functional levels
- Kerberos protocol, NTLM protocols, SAM and NTDS, KDC service
- Schema considerations (precautions, how activate snap-in, Schema changes for Exchange, Lync and so on)
- 10.15-11.15 Installation and Initial configurations Pre-requisites (compatible BIND, static IP, unique name of server, unique domain name)
- What network changes(conflicts between DNS, DHCP setting for ISP and AD) are required in typical Mongolian company
- Types of AD, functional levels, when and how to rise functional levels
- Insides of AD (database files, used TCP/IP ports and so on)
- How to install AD in multisite, multi subnet and multi domain environment
- 11.15-11.30 Q&A
- 11.30-11.45 break
- 11.45-13.00 Standard basic operations sometimes ignored or wrongly used by Mongolian sysadmins, common mistakes; Deleting domain
- Adding computer into domain, removing computer from domain. Duplicated netbios names for domains and computers, wrong length of names or wrong symbols. Naming computers in corporate environment – why it’s important
- Why pre-installed Windows versions on the notebooks cannot be added to AD
- Why Desktop Windows is not good as a fileservers and printer servers
- Sysprep – why, for what?
- Grouping computer accounts, user accounts by OU for GPO
- Usage of only one DC despite the vendor recommendations
- DNS considerations, proper configurations recommended by the best configurations
- How to promote server in AD, how to demote, how to re-add workstation/member servers to AD
- How to add user, group (local, global, universal) why it’s necessary to re-login after changing the membership in group
- Groups, which of them to use and when
- Assigning rights to groups for sharing, how to correctly share, how to automatically map shares, how automatically empty content of temporarily share folders
- Printers in AD, publishing in AD, default print rights and how to administrate printers in AD, print monitor software (who, when, what, how many pages printed)
- Time Service and Kerberos (time zones, NTP server, virtualization aspects, net time command, how auto check time on multiple servers by script)
- 13.00-14.00 break
- 14.00-15.00Demonstration of the provisioning stereotype AD domain in average Mongolian company. IT policy best practices for AD. Restricting LocalAdmins, and what resistance it causes from user side, how to solve
- How to solve problems to launch some programs without LocalAdmin rights
- Fileserver and AD, advantages, pitfalls (for comparison – example of how to setup it without AD on workstations with max 10 connections) Automatically mounted users shared folders, quotas, backuping and redirection, re-assigning to new employee. Samba protocol/CIFS, ports 135, 138,139, 445, Windows Browser Service (elections and network neighborhood lists)
- How to give LocalAdmin rights for somebody not making him/her DomainAdmin
- 15.00-15.30 Once again DNS server setting for ADZones, domains – the difference
- DNS server at multi homed server, round robin for DNS, listening IPs of DNS server
- Forwarders and root servers, conditional forwarders and stub zones, primary and secondary zones
- Storing AD in filesystem or AD integrated?
- New type of records – SRV, connection dynamic records with Netlogon service
- Why dhcp client should be used even for servers and workstation with static IPs
- How to add static records (A, CNAME, MX) in case of existence of public Internet domain with the exactly same as an AD domain name, troubleshooting
- Reverse lookup zones – for what
- Caching DNS – when and how to utilize, ipconfig /flushdns
- 15.30-16.00 Theory of authorization and authentication. Kerberos (Kerberos and DNS, predecessors like NTLMv1/v2) ticket system
- SQL and AD/windows authorizations, vendor recommendations
- Syskey for SAM, digests and how passwords are stored, LC and saminside
- PKI/CA and AD
- Certificates for web SSL, SSH, Wi-Fi AccessPoints, VPN, e-mail and so on
- Smart cards/eTokens for winlogon
- 16.00-17.00 Management and administration in AD environment. Brief review of standard tools/snap-ins for work with AD
- Password policy – pitfalls which can ruin whole implementation of AD in the company, unlocking accounts, why you shouldn’t to disable a strong password policy, resetting LocalAdmin passwords, removing local users+profiles, new in password policy for functional level win2008r2.
- c. Remote work (RDP, regedit, shutdown, net time, firewall settings, $resources, remote execution shells like powershell, remotely computer/server management, GPO, WMI and so on)
- 17.00-17.30 Q&A
[/spoiler]
day 4 – Mastering Active Directory
[spoiler effect=”blind”]
Subject: Maintenance and troubleshooting of AD
- 09.00-10.00Insides of Group PolicyGPC and GPT, locations and storage of them, how it works
- GP extension templates for Microsoft Office, WSUS and so on
- How to target GP to OU, domain, site and so on
- Merging GPO (LSDOU), loopbackes, WMI filters
- Troubleshooting of Group Policy (gpedit.msc, gpresult, Rsop, gpotool, gpupdate /force), FRS
- 10.00-13.00Group Policy best practices:WMI and security filters
- Disabling shutdown tracker, autorun, Windows Browser service on non-DCs and so on
- Enabling RDP, DHCP client, DNS client, eventlog,remote registry, print spooler, windows update,time service on everywhere in domains and so on
- Enabling remote Device management
- GPO for Terminal Service lockdown
- WSUS and GPO
- PKI/CA and GPO
- IPsec, VPN and GPO
- PKI and GPO (certificates)
- Software distribution (assigning and publishing, patching, removing msi)
- Software restriction (restrict running gtalk, yahoo messenger and so on)
- Domain wide setup of services
- Logon messages configuration
- Configure EvenLog thru GPO
- Scripting and GPO
- 13.00-14.00 break
- 14.00-15.00Sites, multi domain implementations, trusts, replications (bridgeheads, various topologies)USN milestones
- SPN (setspn and ADCU delegation, for what)
- What is site, for what, what’s the difference from subnets,topologies
- RPC, smtp replications, KCC, Read-onlyDC (password caching)
- Troubleshooting AD/frs replication (Repadmin, replmon, ADSites and Services, eventlog, time, DNS, dcdiag and on) Everything is wsused.
- 15.00-15.30 Seizing/moving fsmo role (for example after crush of DC)
- 15.30-16.45 Q&A
- 16.45-17.00 break
- 17.00-18.00 Backup and restore of DCs, restoring objects in AD by ntdsutil, authoritative and non-authoritative restores, other tools like adsiedit, ldp, netdom and so on. New features of AD in the last Windows versions
[/spoiler]
day 5 – PKI
[spoiler effect=”blind”]
- Why Microsoft PKI/CA? Alternatives. Internal and public CAs.
- Internal SMB CA objectives. Precautions (backup of private keys, key archival, recovery agents, templates)
- Software and hardware keyloggers vs 2fa/certificates
- Ransomware, backup encryption/auto detach.
- Multifactor authentication, 2fa in lastpass, joomla, wordpress. Labs: how to configure 2fa/2sv for gmail, microsoft accounts.
- CA and smart cards (eToken and conventional smart cards) used for windows login. Labs: how to configure etoken to protect user credentials with elevated permissions.
- Bitlocker, TrueCrypt and so on (why it’s recommended to use encrypted mobile storages)
- EFS, pitfalls of usage, non-documented weak sides. Why it’s so crucial to carefully plan EFS usage.
- CA and mail servers, S/MIME, PGP, how to protect email correspondence (as examples google/yahoo PGP)
- CA and SSL certs for web services, common mistakes (SSL certificate for Lync, Exchange web services like Outlook Anywhere, ActiveSync and so on)
- CA and VPN (IPsec and AD GroupPolicy)
- ADRMS, what is it? How to use properly, how to restore access, backup ADRMS
[/spoiler]