Microsoft Windows NT Server 4.0 in the Enterprise Exam 70-068 Study Outline

 Content created and copyright Ó 1998-1999, by David L. Woodall, all Rights Reserved

 

Trust Relationships

Domain that Contains the Users is the TRUSTED Domain

Domain that Contains the Resource(s) is the TRUSTING Domain

To Establish a Trust BOTH Domains must configure the Trust in User Manager for Domains

The Four NT Domain Models

  1. Single Domain Model

    All Account and Resource Management is Centralized

    NO Trusts to manage

    Must Contain LESS THAN 40,000 User, Group, and Computer Accounts

  2. Master Domain Model

    User Account Management is Centralized

    Resource Management can be Decentralized if Desired

    Only One-way Trusts are needed

    Must Contain LESS THAN 40,000 User, Group, and Computer Accounts

    More Administrative Overhead than the Single Domain Model

  3. Multiple Master Domain Model

    Account Management is Retained in Multiple Account Domains

    Resource Management can be Decentralized if Desired

    Scalable to ANY SIZE

    More Administrative Overhead to Manage the two-way Trusts

  4. Complete Trust Domain Model

Each Domain has Full Control over its Accounts and Resources

Requires Some, but Little, Central Planning

Well Suited for Companies with Localized Operations joined together by a WAN

Requires n(n-1) Trusts, where n=number of Domains

Logon Validation and SAM Synchronization Traffic

Be aware of how they affect WAN traffic

Also applies to DHCP, WINS, and DNS

BDC's Offload Authentication Traffic and Provide Fault Tolerance to the PDC's

A BDC CANNOT be installed into a Domain if the PDC is Unavailable

 

 

Automatic Domain Synchronization

By Default PDCs Send a Pulse every 5 Minutes

When the BDC Receives the Pulse, it Responds and Requests the Changes from the Change Log. This is a PARTIAL Synchronization

Pulse and Pulse Concurrency (the number of BDCs to which a Pulse will be sent) can be controlled through the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NetLogon\Parameters Key. The Default for the Pulse is 300 seconds (Range=60-3,600). The Default for Pulse Concurrency is 20 (Range=1-500)

The Replication Governor

Controls how often the BDC responds to the Pulses from the PDC

Is controlled through

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NetLogon\Parameters Key. The Default is 100% (Range=1-100). This value also manipulates the size of the buffer, which has a default value (at 100%) of 128k. At 50% the buffer size would be 64k.

Manual Domain Synchronization

Can be Forced through Server Manager at Either the PDC or a BDC

DHCP

Once installed, is configured through DHCP Manager

Can have Basic or Advanced Configuration. For a Basic Configuration:

  1. Create a Scope (a range of IP addresses that can be leased by the DHCP Clients)
  2. Edit the properties of the Scope to reflect your configuration

AppleTalk Configuration

AppleTalk is AUTOMATICALLY INSTALLED with Services for Macintosh

Configured by Specifying:

  1. Default Adapter
  2. Default Zone
  3. Routing Information

DLC - No Configuration

Computer Browser

The BROWSER SERVICE is used to display the available Domains and computers and their associated resources that are available to the Local Computer

Browser Roles

  1. Domain Master Browser - is always the PDC
  2. Master Browser (Including the Preferred Master Browser) - specially configured to win elections
  3. Backup Browsers - offload network traffic from Master Browsers
  4. Potential Browsers - Those that can participate in an election
  5. NonBrowsers - can be a client, but does not provide Browser services
  6. Client Systems - A machine that accesses Browser Services

Browser Selection (Election Hierarchy)

  1. Operating System

    NT Server Domain Controller (PDC wins over BDC)

    NT Member Server

    NT Workstation

    Windows 95

    Windows for Workgroups

  2. Operating System Version

    NT4.0

    NT3.51

    NT3.5

    NT3.1

  3. Computer that has been running the longest
  4. Computer with the highest alphanumeric name (this is the final determining factor)

NT Printer Permissions

No Access

Print

Manage Documents

Full Control - allows manage documents plus all properties of a printer including ownership

Printing in a TCP/IP Environment

  1. You must first install the TCP/IP protocol and the MICROSOFT TCP/IP PRINTING SERVICE on the computer that will act as the print server for the TCP/IP Printer
  2. You must know the IP Address and Domain Name of the Printer

The Print Server that defines the TCP/IP Printer becomes an LPD (Line Printer Daemon) Print Server. To print to printers that have been configured as LPD Print Servers, use the LPR command. To obtain the status of an LPD Server queue, use the LPQ command.

Configuring Printers to use the DLC Protocol

  1. Install DLC on the Print Server
  2. Use the self-test on the network printer to ID the MAC address of the NIC
  3. Name the Printer
  4. Through the Add Printers Wizard, add a printer that is configured to use the Hewlett-Packard Network Port and when prompted, specify the MAC address of the printer.

NT Server Configuration for Client Support

To add an NT Workstation;

  1. Create a computer account in Server Manager using the NetBIOS name for the workstation
  2. At the workstation, go to Control Panel> Network> Identification Tab and enter the Domain to which the computer should belong

To add a Windows95 Client

  1. From Control Panel> Network> Configuration Tab, add the CLIENT SOFTWARE for MICROSOFT NETWORKS
  2. After installing the software, highlite Client Software for Microsoft Networks and click on the Properties button
  3. In the Properties Dialog Box, check Log on to Windows NT Domain, and specify the Domain

To add a Macintosh Client

You only need to add the Services for Macintosh on the NT Server to which the Client will attach, if you configure Services for Macintosh to allow Guest Logons or Clear Text Passwords. If you need encrypted passwords, the Macintosh Clients will require the UAM (User Authentication Module) be installed.

If you will support a Macintosh Network that uses LocalTalk as its connection media, you must:

  1. Upgrade the Macintosh Clients to EtherTalk (or some other common media with the PC network)
  2. Install a third-part router that connects Ethernet with LocalTalk
  3. Install a LocalTalk NIC into your NT Server to function as a router

Managing NT Groups

Local Groups

When created (at ANY NT MACHINE) it resides in the Local computer's Local SAM database

Can Contain:

  1. Users from the Local SAM database
  2. Users from within the Domain
  3. Users from Trusted Domains
  4. Global Groups from within the Domain
  5. Global Groups from Trusted Domains

Global Groups

Can reside only on NT Domain Controllers

Can only contain USERS FROM WITHIN THE LOCAL DOMAIN

Default NT Groups - Global Default Groups

Group

Default Membership

Description

 

 

 

Domain Administrators

Administrator

Used to logically group all members who will administer the Domain

Domain Users

Any User Created in the Domain, Except the Guest Account

Used to logically group all Users within a Domain

Domain Guests

Guest

Used to logically group all of the Domain Guest accounts

 

Local Default Groups

Group

Default Membership

Description

 

 

 

Administrators

Administrators and the Domain Administrators Global Group

This group has the rights to manage accounts, resources, and the NT OS

Account Operators

None Assigned

This group can only manage NT accounts

Backup Operators

None Assigned

Can backup and restore the NT Domain Servers

Print Operators

None Assigned

Can share and stop sharing printers, and manage EXISTING printers

Replicator

None Assigned

Special group used only if you use Directory Replication

Server Operators

None Assigned

Can manage NT Server resources such as sharing, lock or override a lock on a Server, manage (even format) the hard disks, backup and restore the Server

Guests

Guest and the Domain Guests Global Group

Guests don't have default rights. You must assign them right to the resources to which they need access

 

"Hidden" Default Groups

Groups which do not appear in User Manager for Domains, but which are used in the NT Security Model.

They appear in other parts of the NT OS, such as when NTFS permissions are set.

Group

Description

 

 

Everyone

ALL USERS who can access a computer

Network

Users who connect and use the resources of a computer over the network

Interactive

User who is logged on locally at the computer which contains the resources he or she is accessing

Domain Users are from Local Domain Only! Everyone includes Users from Trusted Domains also.

Domain Admins is automatically added to the Administrators Local Group on each machine, so DOMAIN ADMIN IS MORE POWERFULL THAN LOCAL ADMIN!

Audit Options

Once auditing is enabled, you can select to manage these events:

  1. Logon and Logoff
  2. File and Object Access - must be enabled to audit NTFS or printer events
  3. Use of User Rights - any User Right except those associated with Logon and Logoff
  4. User and Group Management - Tracks changes to Users and Groups
  5. Security Policy Changes
  6. Restart, Shutdown, and System - Clearing the Security Log is tracked through System
  7. Process Tracking - Process-related events such as program activation, indirect object access, etc…

File Auditing

File auditing is enabled and configured through NT EXPLORER, Right Click, Properties, Security Tab

The Options you can Audit are:

  1. Read
  2. Write
  3. Execute
  4. Delete
  5. Change Permissions
  6. Take Ownership

MultiProtocol Routing

In order to support routing, NT Server uses a Service called MultiProtocol Router (MPR). It is actually a set of three different network Services that you can install. They are:

  1. RIP (Routing Information Protocol) for IP - also referred to as the Internet Router
  2. DHCP Relay Agent - also referred to as BOOTP/DHCP Relay Agent
  3. RIP for NWLINK IPX/SPX Compatible Protocol - also referred to as IPX Router

Routers are commonly used to:

  1. Connect dissimilar topologies
  2. Segment a high-traffic network into subnets to reduce local traffic
  3. Connect a LAN to a WAN

 

 

RIP for IP

Uses Dynamic Route Tables to route between IP subnets

Static route tables are sometimes used because they do not generate network traffic. Static route tables require an NT Server with at least 2 NICs, each configured with an IP address from the subnet to which it will connect. Once the NICs have been installed you need to ensure that IP Forwarding is enabled. You can verify this through Control Panel>Network>Protocols>TCP/IP>Properties>Routing

The Route command can then be used to manually configure your router tables

With RIP for IP, Dynamic Routing is enabled. Anytime routing information changes, the RIP router will note the change and propagate the changes to other routers on the network. The drawback is increased network traffic.

 

DHCP Relay Agent

Used to broadcast DHCP messages between a DHCP Server and a router.

Install through Control Panel>Services>Add>DHCP Relay Agent

Once installed it must be activated by specifying the DHCP Server's IP address in Control Panel>Network>Protocols>TCP/IP Protocol DHCP Relay Tab.

Rip for NWLink

In a static IPX environment, IPXROUTE command is used

When installing RIP for NWLink, you actually use the services of RIP and SAP (Service Addressing Protocol). SAP is used by Netware to broadcast Services.

If you have Microsoft Clients using NWLink to connect to the NT Server, you must also enable Broadcast Propagation (broadcast of type 20 packets). Failure to do so will prevent NetBIOS functions (such as browsing) running on NWLink will not function properly.

IIS

Comprised mainly of:

  1. HTTP
  2. FTP

Upon installation, The Program Group, Microsoft Internet Server (Common) is created. Within the group is INTERNET SERVICE MANAGER. HTTP and FTP are configured here.

WWW Service

Installed automatically upon IIS installation. Used to provide a graphical interface for viewing documents on the Internet. Uses HTTP as a Client-Server process. To configure, click on the WWW service. Through WWW service you can configure:

  1. Service - Tabs for such elements as Port (default is port 80), Connection Timeout (Default is 900 seconds without activity), Max Connections (Default is 100,000), Anonymous Login (Default is to use account IUSR_computername, Password Authentication (Default is ALLOW ANONYMOUS and Windows NT Challenge/Response)
  2. Directories - Directories Tab specifies the path of the directories to be used by WWW, paths for virtual directories, the IP address for virtual servers, and Error (which will list any system errors reported). You can also Enable Default Document to specify a default document to be displayed if the remote client does not request a specific document in the directory. Directory Browsing Allowed - This option will allow the remote client to obtain a listing of directories and files that are hosted by the WWW Service.
  3. Logging - Logging is used to determine how much use you have through the WWW Service (i.e., how long each client is attached), what files are being accessed, and help identify any security violations. Here you can Enable Logging, select Log Format - either Standard format or the NCSA format (National Center for Supercomputing Applications), Automatically Open New Log - Specifies how often a new log should be generated, Default is Daily but can be set to Weekly, Monthly, or whenever the file reaches a specified size. Log File Directory -Default is \WINNT\System32\LogFiles, unless otherwise specified, or Log to SQL/ODBC Database - which specifies that the log be saved in a database as opposed to the file logging (this option requires the path, username and password required to access the database application).
  4. Advanced - Here you can define which computers are granted or denied access based on the computer's IP address and subnet mask. You can also specify bandwidth allowed by the ISP and specify the maximum number of kilobits per second that will be allowed.

FTP Service

Through the FTP Services Properties you can configure:

  1. Service - Similar to WWW Service with the exception of a Default Port of 21, Max Connections of 10,000, and NO MS-CHAP (encrypted passwords
  2. Messages - Allows you to specify the message users see when

    They Access the FTP Server

    They Exit the FTP Server

    They access the FTP Server, but the Max Connections has already been exceeded

  3. Directories - Similar to WWW Directories but allows you to specify whether the will be UNIX or MS-DOS based. FTP DOES NOT SUPPORT VIRTUAL SERVERS
  4. Logging - Similar to WWW Logging Properties
  5. Advanced - Similar to WWW Advanced Properties

Virtual Directories and Virtual Servers

Virtual Directory

A directory that appears to exist on the IIS Server, but in fact resides on a remote computer

To create a Virtual Server, point to a UNC name through the WWW or FTP Directories Service Property Tab

Virtual Servers

A single computer that has IIS installed, but appears to remote users as multiple Internet Servers

To create a Virtual Server:

  1. You must have an IP address for the Primary Server and an IP address that will be used for each Virtual Server
  2. You must use Control Panel>Network to assign the multiple IP address to your LAN adapter
  3. Through the Internet Service Manager, assign each Virtual Server its own IP address through the Directories Tab of the WWW Service. FTP DOES NOT SUPPORT THIS.

LAN Protocols and RAS

Each network protocol can be configured to allow access to the Entire Network or This Computer Only. Entire Network allows RAS Clients to access any network resource to which the User Account has permissions. This Computer Only allows access to resources on the RAS Server only.

NetBEUI

Other than Entire Network or This Computer Only, NetBEUI requires no configuration.

IPX

  1. Allocate Network Numbers Automatically - Default option used to assign any IPX network number that is not in use by the RAS Server.
  2. Allocate Network Numbers - Allows you to specify the range of network numbers. You provide the start range, and the end range will be filled in automatically based on the number of ports you have defined
  3. Assign Same Network Numbers to All IPX Clients - Specifies that ALL RAS Clients use only one network address. This option helps reduce RIP traffic and is activated by default
  4. Allow Remote Clients to Request IPX Node Number - Allows remote Clients to pick their own network address. You run a serious security risk with this option because a Client can impersonate another node with the same address

 

 

TCP/IP

  1. Use DHCP to Assign Remote TCP/IP Client Addresses - Allows a RAS client to get an IP address from a DHCP Server. If a DHCO Server is not available, you must use a Static Address Pool
  2. Use Static Address Pool - Allows the assignment of IP addresses from a Scope that you define. The Scope requires an address for the network adapter in the RAS Server and an IP address for each RAS Client. The Range must be valid for the subnet where the RAS Server is located. Multiple exclusions can be created in the single defined Scope
  3. Allow Remote Clients to Request a predetermined IP Address - Allows the RAS Clients to select their own IP address. This address must be valid for the subnet where the RAS Server is located

TCP/IP is the only protocol that supports the Windows Sockets API. If your Users require access to applications that use the Windows Sockets API, you must configure TCP/IP for your RAS Server

The REMOTE ACCESS ADMIN Utility can be used to manage the RAS communication ports; Start, Stop, and Pause the RAS Service; or Assign RAS permissions. To assign RAS permissions, select Users>Permissions

Installing RAS Client Software

To install on an NT Client, follow the same procedure as RAS for NT Server. Once completed, choose My Computer, then Dial-Up Networking. Here you must specify:

  1. A phone book entry (where you will call your RAS Server)
  2. The communication device you will use
  3. The telephony dialing properties (where you are calling from)

Once DUN is installed you use the Dial-Up Networking Dialog Box (accessed by clicking the "More" button) where you can further configure the RAS Client software. The two most important configuration tabs are:

1. Server Tab

Allows you to configure the connection for the Server to which you will connect. The options are:

  1. Dial-Up Server Type - Allows you to specify the type of connection you are using
  1. PPP connection to attach to Windows NT, Win95 Plus, or the Internet
  2. SLIP connection to the Internet
  3. A connection to a Windows NT3.1 or Windows for Workgroups computer
  1. Network Protocols - Allows you to specify the dial in protocol(s) you will use. TCP/IP and IPX/SPX are selected by default. You must have a protocol in common with the RAS server you are calling.
  2. Enable Software Compression - Offers software compression that is used in addition to modem hardware compression. Selected by Default
  3. Enable PPP LCP Extensions - Specifies that you want to enable enhancement features for PPP. This can cause problems if you connect to a Server running outdated PPP software. Selected by Default

2. Security Tab

The Security Tab specifies the authentication and encryption method you want to use. The options are:

  1. Accept any Authentication Including Clear Text - Specifies that the Client can specify any authentication that is requested by the Server, including no authentication (which could happen if you are connecting to a non-Microsoft Server)
  2. Accept Only Encrypted Authentication - Specifies that you can authenticate with any encryption method except PAP. This is more secure than the previous option
  3. Accept Only Microsoft Encrypted Authentication - Specifies that you want to use the MS-Chap encryption method to authenticate. This assumes that you will connect to a Microsoft Server. This is THE MOST SECURE AUTHENTICATION METHOD AND ALLOWS YOU THE OPTION OF ENCRYPTING ANY DATA THAT IS SENT. This also allows use of data encryption and current usernames and passwords. Selected by Default

 

Baseline Measurement and System Optimization

When collecting data, you should first try to create a measurement for an environment with no-load, or as little load as possible. New Baselines should be established after major hardware and software configuration changes.

A Bottleneck is a system resource that is inefficient compared to the rest of the system as a whole.

You can also use your baselines to perform Trend Analysis. If you create Baselines on a regular basis, you can use the data to spot trends in system usage.

Network Monitor

By default Network Monitor IS NOT INSTALLED. Install it through Control Panel>Network>Services, then add the Network Monitor Tools and Agent. Once Network Monitor is installed you can use it too:

  1. Collect Data - To collect Data, access the Network Monitor through Administrative Tools (Common)>Network Monitor. To initiate a data capture, Capture>Start, then Capture>Stop
  2. Present Data - The Main screen presents data through 4 summary panes:

Bar Graphs - provide Real-Time information on network activity. They provide information on:

  1. %Network Utilization
  2. Frames per Second
  3. Bytes per Second
  4. Broadcasts per Second
  5. Multicasts per Second
  1. Data Filtering - can be configured on:
  1. Specific Protocol
  2. Specific MAC (media access control) address
  3. Protocol Property

To create a filter, choose Display>Filter

NT Blue Screen Errors

Generated when NT encounters a fatal system error (basically a crash)

Information Generated through Blue Screens

Area of Screen

Information Generated

 

 

TOP

Error Code and Parameters

Middle

All Modules and Drivers that have Loaded and Initialized Successfully

Bottom

All Modules and Drivers that are Waiting to be Loaded

To create a DUMP FILE you must have a paging file on the boot partition that is at least 1MB larger than the amount of RAM installed on the NT Server

Kernel Debugger

Advanced Troubleshooting can be accomplished through the Kernel Debugger. Used when you are dealing with MS Tech Support to help ID and resolve problems that are occurring on your NT Server. The most common way to connect to Microsoft is through RAS

Kernel Debugger Requires:

  1. Both the Host and Target computer must be running the same version of NT
  2. Symbol files (from he NT Server CD) must be copied to the Host computer. Symbol files include extra code to be used for debugging information
  3. The BOOT.INI file needs to be edited on the Target computer with the /debug or /crashdebug option
  4. The Kernel Debugger is accessed through the i386kd.exe command
  5. If dialing in to Microsoft, the Host computer and the Microsoft computer must run the REMOTE command line utility

Content created and copyright Ó 1998-1999, by David L. Woodall, all Rights Reserved