Windows Server 2008

1. WINDOWS SERVER 2008 2. WINDOWS 2008 Editions 3. WINDOWS 2008 Server Core 4. APPROX. COST OF WINDOWS SERVER 2008 5. Upgrade / Migrate 6. Upgrade from previous OS 7. WINDOWS SERVER 2008 INSTALLATION 8. Windows Server 2008 Activation 9. Activation Method 10. RAID 11. BACKUP and RECOVERY 12. Wbadmin 13. BACKUP Utility 14. Windows Recovery Environment 15. Server Roles for WINDOWS SERVER 2008 16. IP-ADDRESSING and IPV4 17. IPV6 18. Remote Desktop Connection 19. Steps for Remote Desktop Pc from Client PC 20. Remote Desktops 21. MANAGING SERVER CORE 22. TERMINAL SERVICES (TS) 23. TERMINAL SERVICES MANAGER 24. MANGAING FILE AND PRINT SERVERS 25. Share Folder 26. Attrib (Attribute) 27. Windows Registry 28. Disk Quotas 29. Disaster Recovery Tools 30. MMC 31. Remote Assistance 32. Signed & Unsigned Driver 33. Hardware Profile 34. CHKDSK.EXE(Check Disk) 35. Disk Defragmenter (DFRG.MSC) 36. ACTIVE DIRECTORY REVIEW 37. Introduction to AD 38. TRUST 39. FSMO 40. GC (GLOBAL CATALOG) Server 41. Site 42. AD replication 43. Backup of Active Directory (DC) 44. Understanding USER, GROUP & COMPUTER 45. Create Local User & Multiple Users 46. GROUP SCOPE 47. Public and Private key encryption 48. Trust concept of CA working 49. ETHERNET CARDS 50. Availability and Security 51. General Server Security Issues 52. OSI MODEL 53. Data Encapsulation 54. TCP/IP or DoD Model 55. Protocol Working at Host to Host (Transport) layer 56. NETWORK MONITOR 57. Internet Information Services 58. Monitoring Tools 59. DNS [Domain Name System] 60. DNS ZONE 61. Remote Access Authentication Process 62. Remote Access Interview Question & Answer part 1 Tutorials Interview Question & Answer part 2 Tutorials Interview Question & Answer part 3 Tutorials Interview Question & Answer part 4 Tutorials Interview Question & Answer part 5 Tutorials Interview Question & Answer part 6 Tutorials Interview Question & Answer part 7 Tutorials
Pr.Pg Next Pg


1) Active Directory's logical structure consists of FOREST, TREE and Domains

2) AD's Physical structure consists of Sites and Domain Controllers

3) The AD database is made up of a hierarchical structure of objects. these objects can either be container objects which are used to hold other objects or leaf objects which represt a network entity and does not hold other objects.


AD - Logical Structure

1) Domains - Act as the primary administrative containers within AD

2) Trees - An area of namespace containing one or more domains

3) Forest - A bunch of trees, considered to be the top of the Active Directory Hirearrchy.


Active Directory Objects

Container Object - the most common container object in AD is called an OU (Organizational Unit)

A good OU design will support 3 functions.

1) Good Organization

2) Delegation of control

3) Group Policy Managment

Leaf Objects - Any AD object which does not hold other objects. for ex. computers.



how users in one domain can access resoucres of other domain.

1) Parent/Child Trust - By default all domain within a forest hace a 2 way trainstive trust with any other domain directly above or below them in hierarchy

2) Shortcut Trust - A direct trust created between 2 domains. Typically used in a large complex forest or 2 or more forest. commenly used.

3) Extennal Trust. - A direct trust created between a domain in the forest and a domain outside the forest. Typically used with an old Windows NT Domain. We don't see this quite often.

4) Realm Trust - Used to create a trust between Windows Domain and a Unix realm (domain).

5) Forest Trust - Creates a trust relationship between in all domains in one forest with all domains in another forest. where 2 companies have come together - merged - we can see this.

6) Federated Trust - A cross forest trust in which communication takes place across the internet via a web application like Sharepoint Server. Federated Trusts are implemented using a AD FS (Active Directory Federation Services) role.




1) A Group Policy Object (GPO) is an AD object which contains configuration settings for computers and / or Users.

2) GPO's are used to simplify network administration by allowing administrators to establish settings once and those setting can be applied to many users/computers. When any user makes some settings, when those computers are rebooted it will be set as per GPO.

3) GPO's settings will be applied to computer /computers objects held in any container object which the GPO is linked to.


Pr.Pg border                                              Next Pg