Server Fundamentals Notes
Server Fundamentals Notes
Server Fundamentals Notes
RAID 0 – striping
RAID 1 – mirroring
RAID 5 – striping with parity
RAID 6 – striping with double parity
RAID 10 – combining mirroring and
striping
• Master Boot Record (MBR): This is the traditional partitioning style that has been around since DOS, as
well as for all versions of Windows. MBR supports partitions up to 2 terabytes (TB) and allows up to 4
primary partitions per disk. Each partition can contain a bootable operating system. Although not used as
much as in the past, you can also create three primary partitions and one extended partition. The extended
partition can hold an unlimited number of logical drives.
• GUID Partition Table (GPT): This is a newer partitioning style that supports up to 18 exabtyes (EB) or
18 billion gigabytes and can store up to 128 partitions on each disk. In addition, this style is more fault
tolerant because it stores a duplicate set of partition tables.
The Windows system state is a collection of system components that are not contained in a simple file but
can be backed up easily. It includes:
• Boot files (boot.ini, NTLDR, NTDetect.com)
• DLLScache folder
• Registry (including COM settings)
• SYSVOL (Group Policy and log on scripts)
• Active Directory NTDS.DIT (domain controllers)
• Certificate Store (if the service is installed)
• User profiles
• COM and WMI information
• IIS metabase
Shadow Copy (Volume Snapshot Service or Volume Shadow copy Service or VSS) is a technology
included in Microsoft Windows that allows you take a snapshot of data, even if it has a lock on a specific
volume at a specific point in time which would prevent from making a copy. Today, most backup
software uses VSS to make backups of files within Windows.
A tree is made of one or more domains (although most people think of a tree as two or more domains)
with contiguous name space.
A forest is made of one or more trees (although most people think of a forest as two or more trees). A
forest differs from a tree because it uses disjointed namespaces between the trees. For example, in a
forest, you could have microsoft.com as the root for one tree. Say that Microsoft then purchases another
company called Acme (acme.com), and acme.com then becomes the root of another tree. Both trees could
be combined into a forest, yet each tree’s identity could be kept separate.
To allow users in one domain to access resources in another domain, Active Directory uses trust
relationships. As mentioned earlier, domains with a tree and forest are automatically created as two-way
transitive trusts. A transitive trust is based on the following concept: If domain A trusts domain B, and
domain B trusts domain C, then domain A trusts domain C.
Group Policy is one of the most powerful features of Active Directory that controls the working
environment for user accounts and computer accounts. Group Policy (see Figure 5-14) provides the
centralized management and configuration of operating systems, applications, and user settings in an
Active Directory environment.
When group policies are applied, they are applied in the following order:
1. Local
2. Site
3. Domain
4. OU
A right authorizes a user to perform certain actions on a computer, such as logging on to a system
interactively or backing up files and directories on a system. User rights are assigned through local
policies or Active Directory Group Policy
A permission defines the type of access that is granted to an object (an object can be identified with a
security identifier) or object attribute. The most common objects assigned permissions are NTFS files and
folders, printers, and Active Directory objects. Which users can access an object and what actions those
users are authorized to perform are recorded in the access control list (ACL), which lists all users and
groups that have access to the object.