Server Fundamentals Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

A server role is a primary duty that a server performs.

You should note that a server could


have multiple roles. Some of the more common server roles include:
• File services
• Print services
• Web services
• Remote access
• Application servers
• Email server
• Database server
• Monitoring servers
• Threat management servers
Windows assigns the following system resources to the device you are installing so that the device can
operate at the same time as other expansion cards:
• Interrupt request (IRQ) line numbers: A signal sent by a device to get the attention of
the processor when the device is ready to accept or send information. Each device must be
assigned a unique IRQ number.
• Direct memory access (DMA) channels: Memory access that does not involve the
processor.
• Input/output (I/O) port addresses: A channel through which data is transferred between
a device and the processor. The port appears to the processor as one or more memory
addresses that it can use to send or receive data.
• Memory address ranges: A portion of computer memory that can be allocated to a device
and used by a program or the operating system. Devices are usually allocated a range of
memory addresses.

The built-in accounts include:


• Local System: Highly privileged account that can access most resources on the local
computer.
• NT Authority\LocalService: Has the same privileges of the local Users group on
the computer. When it accesses Network resources, it uses no credentials and a null
session.
• NT Authority\NetworkService: Has the same level of access as the Users group on the
local computer. When it accesses network resources, it does so under the context of the
local computer account.

RAID 0 – striping
RAID 1 – mirroring
RAID 5 – striping with parity
RAID 6 – striping with double parity
RAID 10 – combining mirroring and
striping
• Master Boot Record (MBR): This is the traditional partitioning style that has been around since DOS, as
well as for all versions of Windows. MBR supports partitions up to 2 terabytes (TB) and allows up to 4
primary partitions per disk. Each partition can contain a bootable operating system. Although not used as
much as in the past, you can also create three primary partitions and one extended partition. The extended
partition can hold an unlimited number of logical drives.
• GUID Partition Table (GPT): This is a newer partitioning style that supports up to 18 exabtyes (EB) or
18 billion gigabytes and can store up to 128 partitions on each disk. In addition, this style is more fault
tolerant because it stores a duplicate set of partition tables.
The Windows system state is a collection of system components that are not contained in a simple file but
can be backed up easily. It includes:
• Boot files (boot.ini, NTLDR, NTDetect.com)
• DLLScache folder
• Registry (including COM settings)
• SYSVOL (Group Policy and log on scripts)
• Active Directory NTDS.DIT (domain controllers)
• Certificate Store (if the service is installed)
• User profiles
• COM and WMI information
• IIS metabase

Shadow Copy (Volume Snapshot Service or Volume Shadow copy Service or VSS) is a technology
included in Microsoft Windows that allows you take a snapshot of data, even if it has a lock on a specific
volume at a specific point in time which would prevent from making a copy. Today, most backup
software uses VSS to make backups of files within Windows.
A tree is made of one or more domains (although most people think of a tree as two or more domains)
with contiguous name space.
A forest is made of one or more trees (although most people think of a forest as two or more trees). A
forest differs from a tree because it uses disjointed namespaces between the trees. For example, in a
forest, you could have microsoft.com as the root for one tree. Say that Microsoft then purchases another
company called Acme (acme.com), and acme.com then becomes the root of another tree. Both trees could
be combined into a forest, yet each tree’s identity could be kept separate.
To allow users in one domain to access resources in another domain, Active Directory uses trust
relationships. As mentioned earlier, domains with a tree and forest are automatically created as two-way
transitive trusts. A transitive trust is based on the following concept: If domain A trusts domain B, and
domain B trusts domain C, then domain A trusts domain C.
Group Policy is one of the most powerful features of Active Directory that controls the working
environment for user accounts and computer accounts. Group Policy (see Figure 5-14) provides the
centralized management and configuration of operating systems, applications, and user settings in an
Active Directory environment.
When group policies are applied, they are applied in the following order:
1. Local
2. Site
3. Domain
4. OU
A right authorizes a user to perform certain actions on a computer, such as logging on to a system
interactively or backing up files and directories on a system. User rights are assigned through local
policies or Active Directory Group Policy
A permission defines the type of access that is granted to an object (an object can be identified with a
security identifier) or object attribute. The most common objects assigned permissions are NTFS files and
folders, printers, and Active Directory objects. Which users can access an object and what actions those
users are authorized to perform are recorded in the access control list (ACL), which lists all users and
groups that have access to the object.

You might also like