Sunday, November 11, 2012

CIS 157 Lesson 12 - Backing Up


CIS 157 Lesson 12 - Backing Up

Like all good things Hard Drives are no exception in the market of “Fail.”  Now that the ugly truth has yet again reared it’s ugly head lets go ahead and deliberate some basic backup concepts and backup tools. These are not the tools in your granddaddy’s shed either.

 The absolute main three principal criterions to contemplate when beholding the capacity for a storage device to function as a backup device are 1.  Capacity, 2. Speed and 3. Cost. Depending on the type of backup device selected for the servers, backup software can be a convenience if not an absolute necessity. It is extremely crucial that tests are conducted on the restore process protocols on a episodic basis.  This is to ensure that you can recover any lost data that is lost. The most common types of backup jobs are full, differential and incremental.

 
Thanks for stopping by and see you next week.
 
 

Sunday, November 4, 2012

Lesson 11 - Monitoring Servers

Lesson 11 - Monitoring Servers



The importance of monitoring servers cannot be stressed enough. Server 2008 provides quite a bit of  of intrinsic information about both proprietary and third party computer hardware, operating systems and applications.
 
The ability to monitor the server makes it less difficult to ascertain just what is occuring at any given moment inside the server.
 
This brings us to just,

What is a Windows Server 2008 Monitor?

A Windows® Server 2008 monitor is a tool that allows administrators to monitor a Windows Server 2008 network with a wide range of technologies. A Windows Server 2008 monitor reports on the availability of networked Windows Server 2008 systems by measuring usage and traffic. A Windows Server 2008 monitor solution can help administrators reduce expenses by avoiding network outages, optimizing connections, and increasing efficiency to better meet service level agreements (SLAs).

I hope that you did not try and read that all on one breath.

Thanks for stopping by and see you next week.



Sunday, October 28, 2012

CIS 157 Lesson 10 - Managing Servers


CIS 157 Lesson 10 - Managing Servers

This particular lesson covers managing remote servers, delegating administration tasks and updating servers.

Server Manager is a Management Console that contains a collection of snap-ins that are most commonly used by administrators.  Server Manager does by default assimilate ten different individual snap-ins into a unified and categorized interface. There are 2 types of snap-ins, standalone and extension.  

Standalone snap-ins

•A standalone snap-in is a single tool that you can install directly into an empty MMC console.

•Standalone snap-ins appear in the first level directly beneath the console root in the console’s scope pane.

–Extension snap-ins

•An extension snap-in provides additional functionality to specific standalone snap-ins.

•You cannot add an extension snap-in to a console without adding an appropriate standalone snap-in first. Extension snap-ins appear beneath the associated standalone snap-in in the console’s scope pane.

Another interesting subject is Remote Desktop.  Ever since the Windows Server 2003 the components that make up the Terminal Services application are fully integrated into the operating system.  Such that Terminal Services capabilities are present, even if you do not have the Terminal Services role installed on the computer. This is so administrators can use Terminal Services to manage remote computers without having to travel to a distant location.  In Windows, this capability is known as Remote Desktop.

Active Directory Permissions were also covered.  Active Directory has its own permissions system, which functions much like that of the NTFS file system.

This functions by granting users and groups permissions to specific Active Directory objects, you can allow them to perform specific administrative tasks on those objects.

This was a very enlightening chapter and I am sure a thorough understanding of the material in this chapter will be most beneficial in the IT Field.
 
 

 

 

Sunday, October 21, 2012

CIS 157 Lesson 9 Securing Infrastructure Services


CIS 157 Lesson 9 Securing Infrastructure Services

 
This was quiet an involved chapter in terms of reading.  Within this chapter I learned that Win Svr 08 provides Remote Access Services which is part of Network Policy.   This enables users to connect to the network via VPN for example.

In a Virtual Private Network (VPN) Connection the remote client and the remote access server are connected to a network via the internet and do not have to a share the same service provider.

I learned about the tunneling process where two computers establish a PPP connection but instead of transmitting PPP packets they encapsulate the packets again using one of the three VPN protocols supported by Win Svr 08.

DIK that Remote Access in Win Svr 08 uses an authentication system that is entirely separate from the Kerberos authentication system that clients on a local network use?  Now you can rest easy at night with that information under your pillow.

Also a digital certificate is a digitally signed document, issued by a third party called a Certification Authority. (CA) This binds a user or service holding a private key with its corresponding public key.

Also Certificated Templates are sets of rules and settings that define the format and content of a certificate based on the certificate’s intended use.

Active Directory Certificate Services supports several certificate enrollment methods such as a client’s choice of enrollment for obtaining certificates is typically dictated by the type of CA the client is requesting the certificate from and whether the client and CA can communicate across a network. 

I found this chapter to be very enlightening and it “Cleared up some misconceptions I had about Infrastructure Hierarchy.

 

 

Sunday, October 14, 2012

Lesson 8 - Planning Server and Network Security


It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.

Sun Tzu Chinese General and Strategist.

 

Lesson 8 - Planning Server and Network Security  

Security begins with education, knowing the dangers of your enemy and the really bad people that exist in this world to get what you got. The secondary part of security begins with the physical aspect of server security. You must ensure that servers are warehoused in a sheltered locale that unsanctioned individuals are not able to access.   A firewall for instance does more than stop "fire." It is a software program or carefully crafted hardware program that protects computers by permitting applicable network traffic through the system while denying traffic it deems as haphazard.  It is the checkpoint security guard that sifts and regulates the packets of data and their configurations.

When an individual utilizes Active Directory on a company network, it is in control of two perilous security functions: authentication and authorization. Computers use several set of complicated algorithms and bit oriented security protocols to safeguard data that is stored and transferred over a network.

Have a great week.
 
 

Sunday, October 7, 2012

Lesson 7 Planning High Availability


 High availability unto itself gives reference to algorithmic mechanisms enabling the continuance of a resource notwithstanding the occurrence of a catastrophic failure.  In forecasting for high availability you need to consider three primary factors.  These would be fault tolerance, performance and bottom line.  For instance if you have a boundless prerequisite for fault tolerance then your expenses rise by X amount while performance will degrade by Y amount.
 The simplest form of disk redundancy is mirroring and usually has little or no bearing on performance.  This is however; permitting that you utilize technology enabling the computer to concurrently write to both disks. Also parity based RAID is most generally used for data storage in high availability regimes.  This is due to its scalability allowing more effectual utilization of disk storage.
An interesting note is that a Failover Cluster is a consortium of servers that execute the same role and perform on the network as a single unit.

Thanks for Stopping By and "SeeYaLL" next week




Saturday, September 29, 2012

Chapter 6 CIS 157 Windows Server 2008 Planning Storage Solutions


Chapter 6 CIS 157 Windows Server 2008 Planning Storage Solutions


WOW did I think I knew everything there was to know about disks before I read this chapter.  I was as wrong a college kid with unlimited credit.

There is quite a bit more to disks than A through D for example, there really is a whole science managing them.  For instance WinSvr2008 supports two disk partition types MBR and GPT. Two Disk Types basic and dynamic. Five Volume types: simple striped, spanned, mirrored and RAID-5; two file systems NTFS and FAT. I think I seem to resemble the last part at times.  WOW!!!  Now maybe I can catch my breath after spatting all that out.  I will never try and say all this again with Saltine Crackers in my mouth.

I became somewhat familiar with the disk management snap in console as it is the PRIMARY interface used to manage disks.  I suppose this will not be the last time I see it in life. 

I had heard of Fibre Channel in the past it is now enlightening to know what it actually is. I had thought it was what the TV in the rec room of the senior citizens center was tuned to. Come to find out is not just for supercomputing anymore. It has found it’s way to storage area networking.

Fibre Channel is actually a high speed serial-networking technology that was originally designed for use with supercomputers but now is associated with Storage Area Networking. (SANS)

This was the primary focus of the Lesson however, there was more in the terms of utilizing storage. Compressing files and moving them were also discussed.

Thanks and have a great week.

Barry