Premium Essay

Installing Server Roles with a Batch File

In:

Submitted By amayne
Words 314
Pages 2
Course Objectives and Learning Outcomes
In this assignment, you will evaluate how to perform post-installation tasks, including the installation of roles with Server Manager and how to create batch files to manage administrative tasks.

Assignment Requirements
Evaluate the following scenario:

After careful consideration, it was decided by the corporate IT team that in order to increase security and lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers. However, a few roles need to be installed on the server, and your Senior Administrator is not familiar with installing roles on a Server Core machine. Use notepad to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V.

Questions:

1. What does the /w switch do? Why is it used? 2. What switch is used to remove a role? 3. What is the command to start the DHCP Server service? 4. What command is used to configure a DNS zone?

These commands will be entered in a WordPad. Once entered the file will be saved has roles.bat. double clicking on the file will run it automatically
/w ocsetup DHCPServerCore /w ocsetup DNS-Server-Core-Role
/w ocsetup Microsoft-Hyper-V
/w ocsetup Printing-ServerCore-Role

1. What does the /w switch do? Why is it used?
Using /w prevents the command prompt from returning until the installation completes. Without /w, there is no indication that the installation completed. 2. What switch is used to remove a role?
ServerManagerCmd.exe -remove “name of role being removed” -restart
The -restart switch restarts the computer automatically after removal is complete, if a restart of the computer is required. 3. What is the command to start the DHCP Server service?
Net start dhcpserver 4. What command is used to configure a DNS zone? dnscmd or by remotely using the DNS MMC

Similar Documents

Premium Essay

Student

...Lopayi Wani 06/23/15 NT2670 Email and Web Services Unit 1 Assignment 1: Installing Server Roles with a Batch File Assignment: After careful consideration, it was decided by the corporate IT team that in order to increase security and lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers. However, a few roles need to be installed on the server and your Senior Administrator is not familiar with installing roles on a Server Core machine. Using Internet research and use notepad to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V. Students will complete a notepad file that will successfully install all of the roles mentioned. Save the file using the name Roles.bat. 1. DHCP: start /w ocsetup dhcpservercore. 2. DNS: start /w ocsetup DNS-Server-Core-Role 3. PRINT: start /ocsetup Printing_ServerCore-Role. 4. SERVICES: start /w ocsetup MediaServer, 5. HYPER- Start /ocsetup Microsoft-Hyper-V. Questions 1. What does the /w switch do? Why is it used? Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. 2. What switch is used to remove a role? To remove a role you would need to commas to separate command names. 3. What is the command to start the DHCP Server service? To open DHCP, click Start, click Settings, click Control Panel, double-click Administrative...

Words: 267 - Pages: 2

Free Essay

Nt2670 – Unit 1 Assignment

...team that in order to increase security and lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers. However, a few roles need to be installed on the server, and your Senior Administrator is not familiar with installing roles on a Server Core machine. Use notepad to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V. Questions: 1. What does the /w switch do? Why is it used? The /W switch specifies the warning level of the MIDL compiler, and the level indicates what type of security warning level is present. The security levels range from 0-4. Zero meaning no warning and four being the highest level. 2. What switch is used to remove a role? /remove will remove all the roles specified on the computer. 3. What is the command to start the DHCP Server service? The netsh command will start the DHCP server. 4. What command is used to configure a DNS zone? The dnscmd command-line tool will be used to configure a new DNS zone. Lessons 1- fill in the blank 1. iSCS 2. Streaming Media Services and Windows Server Virtualization 3. Infrastructure 4. UDDI Services 5. Windows SharePoint Services 6. Multipath I/O 7. Single Instance Store 8. Web Server (IIS) 9. Desktop Experience 10. Key Management Service Lesson 1 – Multiple choices 1. B. Applications 2. D. LPD service role service 3. C. Print Services 4. D. None of the above 5. A 6. B ...

Words: 352 - Pages: 2

Free Essay

Nt 2670 Unit 1 Assignment 1

...Installing Server Roles with a Batch File 1. What does the /w switch do? Why is it used? “¹/W switch specifies the warning level of the MIDL compiler.” 2. What is the goal of port scanning? ServerManagerCmd.exe command-line tool can be utilized to install or remove Server 2008 Roles and Features. “Type the following, in which name represents the command name of the role, role service, or feature that you want to remove, and then press Enter. The -restart parameter restarts the computer automatically after removal is complete, if a restart of the computer is required. ” ServerManagerCmd.exe -remove name –restart”² 3. What is the command to start the DHCP Server service? “To start the DHCP service, use the command/sbin/service dhcpd start. To stop the DHCP server, use the command /sbin/service dhcpd stop.”³ 4. What command is used to configure a DNS zone? “dnscmd [ServerName] /zoneadd ZoneName ZoneType [/dp FQDN| {/domain|/enterprise|/legacy}] /load”⁴ References 1. /W switch. (n.d.). (Windows). Retrieved March 20, 2014, from http://msdn.microsoft.com/en-us/library/windows/desktop/aa367383(v=vs.85).aspx 2. Dnscmd Syntax. (n.d.). : Domain Name System(DNS). Retrieved March 20, 2014, from http://technet.microsoft.com/en-us/library/cc756116(v=ws.10).aspx#BKMK_22 3. Removing Server Roles and Features. (n.d.). Removing Server Roles and Features. Retrieved March 20, 2014, from http://technet.microsoft.com/en-us/library/cc732257.aspx 4. Start or stop...

Words: 274 - Pages: 2

Premium Essay

Work Floe Installation

...2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Notwithstanding the foregoing, the licensee of the software with which this document was provided may make a reasonable number of copies of this document solely for internal use. Trademarks Microsoft, Microsoft Dynamics, Internet Explorer, Outlook, SharePoint, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation or its affiliates in the United States and/or other countries. The names of actual companies and products mentioned herein may be trademarks or registered marks - in the United States and/or other countries - of their respective owners. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Intellectual property Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 12176 - Pages: 49

Free Essay

Nt2670 Mid Term Study

...NT2670 Midterm Study Two basic types of computers that can be on an enterprise network are ____________. Which of the following roles enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there? Terminal Services By using the Server Core installation option of Windows Server 2008, you get a stripped-down version of the operating system that shows a single window with a command prompt. The ServerManagerCmd.exe utility provides a command prompt alternative to Server Manager and can be used to install roles and features from scripts or batch files. You must activate Windows Server 2008 computers within 30 days of installing them. The Add Roles Wizard provides roles that fall into three basic categories: Directory services, Application services, and Infrastructure services. Which of the following correctly identifies the HTTP binding options available? IP address, Port Number, Host Header What is the original default filename for the Web? Index.html FTP7 can use SSL to encrypt its authentication traffic before transmission. IIS7 uses a generic request pipeline that is modular in nature. The component that manages the request pipeline, the server’s application pools, and the worker processes is called WPAS-Windows Process Activation Service. Which feature of IIS7 enables you to publish content found on different drives or different computers on a network, without...

Words: 868 - Pages: 4

Free Essay

Websphere Wlm

...WebSphere ® Redpaper Carla Sadtler Susan Hanson WebSphere Application Server: New Features in V8.5.5 IBM® WebSphere® Application Server helps drive business agility with an innovative, performance-based foundation to build, reuse, run, integrate, and manage service-oriented architecture (SOA) applications and services. From business critical enterprise-wide applications to the smallest departmental level applications, WebSphere Application Server offers reliability, availability, security, and scalability. WebSphere Application Server V8.5 addresses the needs of today’s agile enterprises and developers. It provides increased scalability, resiliency, and security for critical applications, and the flexibility to deploy new offerings quickly and efficiently. It includes a lightweight and powerful, yet simple, application server to satisfy multiple requirements around a simplified “low-end” application environment. For the developer, it provides an improved developer experience and a simplified server configuration that can have multiple versions and be maintained in source control along with the applications. This IBM Redpaper™ publication presents a high-level view of some of the features and enhancements in WebSphere Application Server V8.5. and WebSphere Application Server V8.5.5. © Copyright IBM Corp. 2012, 2013. All rights reserved. ibm.com/redbooks 1 WebSphere Application Server overview Application infrastructure trends show a push towards rapid application...

Words: 12331 - Pages: 50

Premium Essay

Obia Installation

...Oracle® Business Intelligence Applications Installation Guide for Informatica PowerCenter Users Release 7.9.6.4 E35271-01 November 2012 Provides the steps to install and set up Oracle Business Intelligence Applications Release 7.9.6.4. Oracle Business Intelligence Applications Installation Guide for Informatica PowerCenter Users, Release 7.9.6.4 E35271-01 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: P Brownbridge This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed...

Words: 60905 - Pages: 244

Premium Essay

Hgjfghk

...________________________ Batch Date : ________________________ Windows Server 2008 - Network Administration INDEX Sr. No. 1 Topic Dynamic Host Configuration Protocol (DHCP) Lab – 1: Installing DHCP Service Lab – 2: Creating a Scope Lab – 3: Creating DHCP Reservations Lab – 4: DHCP Server Backup and Restore Page No. 5 6 12 20 22 2 Domain Naming System (DNS) Lab – 1: Installing DNS Service Lab – 2: Creating Standard Primary Forward Lookup Zones Lab – 3: Creating Standard Primary Reverse Lookup Zones Lab – 4: Creating Secondary Zone Lab – 5: Creating Stub Zone Lab – 6: Creating Active Directory Integrated Primary zone Lab – 7: Conditional Forwarders Lab – 8: Forwarders Lab – 9& 10: Root Hints and Cache Server 24 25 27 33 38 42 44 47 48 49 3 Internet Information Services (IIS)- Web Server Lab – 1: Installing Internet Information Service - Web Server Lab – 2: Creating a Website Lab – 3: Configuring Redirection of Websites Lab – 4: Creating Virtual Directory Lab – 5: Changing the Website IP address or Port no Lab – 6: Creating Self-Signed Certificate for HTTPS Website Lab – 7: Creating a HTTPS Web Site 50 51 54 62 64 67 68 71 4 Internet Information Services (IIS)- Ftp Server Lab – 1: Installing Internet Information Service - FTP Server Lab – 2: Creating Do not Isolate User FTP Site Lab – 3: Creating Isolate User FTP Site Lab – 4: Creating Isolate User using Active Directory FTP Site 84 85 86 90 96 2 Windows Server 2008 - Network Administration ...

Words: 12134 - Pages: 49

Premium Essay

Abcdef

...3.5 Trees 1.3.6 Hash Quiz 1.4 Algorithms 1.4.1 Search Algorithms 1.4.2 Sorting Algorithms 1.4.3 String Search Algorithms 1.4.4 Graph Algorithms Quiz Questions and Answers 2 3 3 7 10 11 14 15 15 18 21 24 25 25 27 29 30 32 34 37 38 38 41 45 48 50 51 i Chapter 2 Computer Systems 2.1 Hardware 2.1.1 Information Elements (Memory) 2.1.2 Processor Architecture 2.1.3 Memory Architecture 2.1.4 Magnetic Tape Units 2.1.5 Hard Disks 2.1.6 Terms Related to Performance/ RAID 2.1.7 Auxiliary Storage / Input and Output Units 2.1.8 Input and Output Interfaces Quiz 2.2 Operating Systems 2.2.1 Configuration and Objectives of OS 2.2.2 Job Management 2.2.3 Task Management 2.2.4 Data Management and File Organization 2.2.5 Memory Management Quiz 2.3 System Configuration Technology 2.3.1 Client Server Systems 2.3.2 System Configurations 2.3.3 Centralized Processing and Distributed Processing 2.3.4 Classification by Processing Mode Quiz 2.4 Performance and Reliability of Systems 2.4.1 Performance Indexes 2.4.2 Reliability 2.4.3 Availability Quiz 2.5 System Applications 2.5.1 Network Applications 2.5.2 Database Applications 2.5.3 Multimedia Systems Quiz Questions and Answers 62...

Words: 26218 - Pages: 105

Premium Essay

Server Buil Automation

...Installing Cobbler Introduction This post will show you step by step installation of Cobbler, please comment if you think anything’s is missing as you know nothing is perfect, so my blog  This topic focus on CentOS/RHEL/Fedora, if everything goes well here you should be able to build client servers without any manual work using PXE boot. Server setup. For the cobbler server basic requirement is you need two NIC cards if you want to use it for DHCP as well. Why do i need two NIC cards because it allow client servers to initially boot up in the private network where Cobbler will handle the installation. Since Cobbler utilizes DHCP and TFTP, making these services listen on a Private network will ensure that they don’t interfere with any other DHCP or TFTP server on the Public network. Once the installation has finished, the client can be moved to the Public network. Installation media You can use any media you want. You can burn iso to DVD of CentOS 5 or 6 or Fedora. Network selection. For the Network Configuration, I renamed System eth0 and System eth1 to Public andPrivate respectively. I configured each NIC with static information and made sure to check theConnect Automatically checkbox for each — otherwise NetworkManager will not bring the NICs up. Package Selection For this section either you can rely on kickstart file which will have all packages listed in a tab called %packages or you can have minimal install like “Server”. Post-Installation Steps. Disable the...

Words: 16529 - Pages: 67

Free Essay

Sql Server Security Best Practise

...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 15647 - Pages: 63

Free Essay

Websphere Service Registry and Repository , Used for Soa Governance on Bpm

...Front cover WebSphere Service Registry and Repository Handbook Best practices Sample integration scenarios SOA governance Chris Dudley Laurent Rieu Martin Smithson Tapan Verma Byron Braswell ibm.com/redbooks International Technical Support Organization WebSphere Service Registry and Repository Handbook March 2007 SG24-7386-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xv. First Edition (March 2007) This edition applies to Version 6, Release 0, Modification 0.1 of IBM WebSphere Service Registry and Repository (product number 5724-N72). © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 163740 - Pages: 655

Premium Essay

Server Questions

...Server question Ques 1 :-Which of the following is not a benefit of DHCP? 1.       centralized administration of IP configuration 2.       dynamic host configuration 3.       seamless IP host configuration 4.       portability of workstations ques 2:- Which of the following is not a component of DNS? 1.       DNS namespace 2.       DNS zones 3.       DNS resource records 4.       DNS relay agent Ques 3:- A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class? 1.       Class a 2.       Class b 3.       Class c 4.       Class d Ques 4:- Which of the following is not a function of DHCP? 1.       transmitting data from one network to another 2.       bootstrapping diskless workstations 3.       automating the assigning, tracking, and reassigning of IP addresses 4.       dynamically allocating an IP address from a pool of addresses ques 5:-  If a system will be a DHCP server, what type of address should you set? 1.       automatic private IP address 2.       fixed IP address 3.       static IP address 4.       none of the above ques 6:- What is the minimum number of physical computers required to allow you to use a KMS key? 1.       20 Vista and ten Windows Server 2008 computers 2.       20 Vista and five Windows Server 2008 computers 3.       15 Vista and ten Windows Server 2008 computers 4.       25 Vista and five Windows Server 2008 computers Ques 7:- A striped volume uses which type of striping to interleave data across...

Words: 4583 - Pages: 19

Premium Essay

Examples of Biopoem About My Mother

...Chapter 10 Information Systems for Business Operations V. LECTURE NOTES SECTION I: Business Information Systems 10-1 Information Systems in Business: As a prospective managerial end user you should have a general understanding of the major ways information systems are used to support each of the functions of business. The term business information systems is used to describe a variety of types of information systems (transaction processing, information reporting, decision support, etc.) that support the functions of business such as accounting, finance, marketing, or human resource management. Analyzing Gulf States Paper We can learn a lot about how information technology provides major business benefits in manufacturing and other functional areas of business from the Real World Case of Gulf States Paper Corporation. Take a few minutes to read it, and we will discuss it (See Gulf States Paper Corporation in section XI). 10-2 Cross Functional Information Systems: [Figure 10.2] Information systems can be grouped into business function categories, however, in the real world information systems are typically integrated combinations of functional information systems. Such systems support business processes, such as product development, production, distribution, order management, customer support, and so on. There is a strong emphasis in many organizations to develop such composite or cross-functional information systems that cross the boundaries...

Words: 5434 - Pages: 22

Premium Essay

Class Notes - Networking

...PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Essential Linux Administration: A Comprehensive Guide for Beginners Page 1 of 4 PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. ESSENTIAL LINUX ® ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS i CHUCK EASTTOM WITH SERGE PALLADINO Course Technology PTR A part of Cengage Learning 9781133795308 i ii Essential Linux Administration: A Comprehensive Guide for Beginners Chuck Easttom with Serge Palladino Publisher and General Manager, Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: Sarah Panella Manager of Editorial Services: Heather Talbot Marketing Manager: Mark Hughes Acquisitions Editor: Heather Hurley Project and Copy Editor: Marta Justak Technical Reviewer: Danielle Shaw Interior Layout Tech: MPS Limited, a Macmillan Company Cover Designer: Mike Tanamachi Indexer: Sharon Shock Proofreader: Kelly Talbot © 2012 Course Technology, a part of Cengage Learning. ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording...

Words: 34239 - Pages: 137