Premium Essay

Ms Server 2008

In: Computers and Technology

Submitted By bdmcneal
Words 842
Pages 4
Windows Server 2008
Microsoft Windows Server 2008 was officially released on February 27, 2008, nearly five years after its predecessor Microsoft windows Server 2003. (EaseUs, 2012) Since the original release date, Microsoft has released multiple updates and fixes. This section is going to cover some of the basic features and benefits of Microsoft Windows Server 2008 R2.
Microsoft Windows Server 2008 R2 is a multipurpose sever designed to increase flexibility and reliability of a server or private cloud infrastructure. It provides tools that help save time and cost by reacting to business needs faster than ever before with greater control and confidence. The latest release also implements a robust datacenter and desktop virtualization plan. (Microsoft, 2012)
Microsoft has included some great features that make Windows Server 2008 R2 a great asset to almost any company. Some of the features that are included with Windows Server 2008 R2 are Virtualization with Hyper-V; which utilizes the system resources to allow a virtual environment for operating systems and applications. This allows one server to consolidate multiple server roles on a single machine. (Microsoft, 2012) Another great feature that is offered with Windows Server 2008 R2 is Remote Desktop Services. The Remote Desktop Service allows users to access applications, data, and an entire desktop that is running on the server. Windows Server 2008 R2 has also improved the Scalability and Reliability feature. This feature now includes the capability of leveraging sophisticated CPU architectures and improvement of performance and scalability for applications and services. (Microsoft, 2012)
There are many components that make Windows Server 2008 R2 what it is today. Active Directory is one of these components, it allows the server administrator to set unique features specific to individual roles. Direct

Similar Documents

Free Essay

Week 5 Assessment

...Windows Server 2008 to provide remote access to clients. This service is important in a corporate environment because there is the potential to have several hundred or thousands of clients to manage and the IT personnel to support that many computer is limited and unable to provide hands on service to every client. 2. The IP host range for the remote VPN client pool is 172.30.0.250 through 172.30.0.252. 3. There are two encryption setting available from the remote access server, Microsoft Encrypted Authentication version 2 (MS-CHAPv2) and Microsoft Encrypted Authentication (MS-CHAP). MS-CHAPv2 is more secure and the best option to use but MS-CHAP does offer backwards compatibility. 4. During a Remote access session the client is only asked to provide it’s credentials once. This is an example of milt-factor authentication because the knowledge factor and the inherence factor used in the authentication of the user. 5. Strong encryption is important for both authentication and communication protocols because this is the connection used to communicate with the remote server. The weaker the authentication and communication protocol is then you are making it easier for unwanted user to gain access to your network. 6. MS Windows Server 2008 authentication protocols are EAP, MS-CHAPv2, MS-CHAP, and PAP. EAP is the strongest security by providing the most flexibility in authentication variations. 7. The other type of connection supported by MS Remote Access...

Words: 346 - Pages: 2

Premium Essay

Unix/Linux

...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active...

Words: 2760 - Pages: 12

Premium Essay

Unix, Linux, and Windows Server Critique

...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap...

Words: 2750 - Pages: 11

Premium Essay

Windows vs. Linux

...want a tablet instead of a keyboard, no problem. Need to run a multi-million dollar company with an extensive database from home? No problem. Interfaces and operating systems and software applications and hardware upgrades and I/O devices provide each and every person on the planet a customized computer experience. We should thank capitalism for many of the technological advances that have come about over the past fifty years. After all, money has a tendency to flow to the products that make our lives the most enjoyable. Three of the most notable advances in computer history are servers (formerly known as mainframes), Microsoft Windows, and the Linux operating system. Each one in its own right could fill volumes. However, the objective of this paper is to simply highlight a few of the most prominent features each of these advances has to offer. We will start with the most notorious MS Windows®. Microsoft has been in the computer industry for many years, and it is one of the most well-known companies worldwide, the majority of the operating systems these days are from Microsoft. Windows 7 was a fast selling operating system, historically sold more than 240 million around the globe. Users could tell very fast that Windows 7 was easy to use, it was indeed Microsoft newest and most powerful operating system, it works with...

Words: 2777 - Pages: 12

Free Essay

The Evolution of Microsoft Network Operating Systems

...MS Network Operating System 1 January 15, 2013 The Evolution of Microsoft Network Operating Systems (2003 vs. 2008) An exciting aspect and significant upgrade to Windows Server 2008 is the inclusion of multiple versions of the software. Also there are many upgrades and new features. So you might ask……  How many versions are there and why are so many offered?  What is the significance of each version?  What are the new features and how does it differ from Server 2003?  What is 64 bit architecture and how is it better? I will explain the differences, the features, and the uses of the newest version of Windows Server. Hopefully you will gain a better understanding of the software and how it can be utilized for your specific set of criteria. Let’s start with the different editions and how they compare to the 2003 editions. Edition Comparisons 2008 Web Edition 2008 Standard Edition 2008 Enterprise Edition 2008 Datacenter Edition Supersedes 2003 Web edition 2003 R2 Standard and Standard x64 editions 2003 R2 Enterprise and Enterprise x64 editions 2003 R2 Datacenter and Datacenter x64 Editions Hyper-V-virtualization technology Not included Included Included Included OS instances permitted per server license One instance (physical or virtual) One physical and one virtual instance One physical and up to 4 virtual instances Unlimited number of OS instances Maximum server RAM supported 32-bit: 4GB 64-bit: 32GB 32-bit: 4GB 64-bit:32GB 32-bit: 64GB 64-bit: 2TB 32-bit:64GB ...

Words: 1323 - Pages: 6

Free Essay

Ntfs and Hyperv

...NTFS AND HYPER V The New Technology File System (NTFS) is the standard file structure for the Windows NT operating system. It is used for retrieving and storing files on the hard disk. The NTFS introduced a number of enhancements, including innovative data structures that increased performance, improved metadata, and added expansions like security access control, reliability, disk space utilization, and file system journaling. The NTFS replaced the OS/2 High-Performance File System and the Windows 95 file allocation table (FAT), which was used in MS-DOS and earlier operating system versions. NTFS is also used with Windows 2000, Windows XP, and Windows Server 2003.NTFS was initially designed for the Intel i860 XR processor released by Microsoft in 1993. Although IBM and Microsoft worked together to create the graphical operating system known as the OS/2, they disagreed on many important issues and they eventually separated. IBM continued to work on the OS/2, while Microsoft started working on Windows NT. The OS/2 HPFS had many new features that were also used with Windows NT. Both HPFS and NTFS share the same disk partition identification type code (07), which is unusual because there are dozens of codes available. The new reliable features of the NTFS include a fault tolerance system that automatically repairs hard drive errors without error messages. The NTFS also retains detailed transaction records that keep track of hard drive errors. This feature is beneficial in...

Words: 651 - Pages: 3

Premium Essay

Research Assignment for Active Directory

...Research Assignment 1. Explain the function of the following Windows Server 2008 Services: A. Active Directory Federation Services B. Active Directory Lightweight Directory Services C. Active Directory Certificate Services D. Active Directory Rights Management Services AD FS is composed of three different server components: Federation Server, Federation Proxy server, and ADFS Web Agents. A federation server is the main AD FS component, which holds the Federation Service role. These servers route authentication requests between connected directories. A federation proxy server acts as a reverse proxy for AD FS authentication requests. This type of server normally resides in the demilitarized zone (DMZ) of a firewall, and is used to protect the back-end AD FS server from direct exposure to the untrusted Internet. The Web Agents component of AD FS hosts the claims-aware agent and the Windows token-based agent components that manage authentication cookies sent to web server applications. The Active Directory Lightweight Directory Services server role is a Lightweight Directory Access Protocol directory service. It provides data storage and retrieval for directory-enabled applications, without the dependencies that are required for Active Directory Domain Services. Active Directory Certificate Services provides customizable services for issuing and managing public key infrastructure (PKI) certificates used in software security systems that employ public key technologies...

Words: 1307 - Pages: 6

Premium Essay

Is3230 Assy#4

...Services Use Msrpc A tool for running processes on a remote computer. netbios-ssn It provides services related to the session layer of the OSI model allowing the applications on a separate computer to communicate microsoft-ds This port replaces the notorious Windows NetBIOS trio (ports 137-139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services. ms-wbt-server Virtual data connection that can be used by programs to exchange data directly, instead of going through a file or other temporary storage location. wsdapi Used to develop client applications that find and access devices, and to develop device hosts and associated services that run on Windows Vista and Windows Server 2008.  Unnecessary services and removing them: Ideally, a Web server should be on a dedicated, single-purpose host. When configuring the OS, disable everything except that which is expressly permitted—that is, disable all services and applications, re-enable only those required by the Web server, and then remove the unneeded services and applications. If possible, install the minimal OS configuration and then add or remove services and applications as needed. Choose the “minimal installation” option, if available, to minimize the effort required in removing unnecessary services. Furthermore, many uninstall scripts or programs are far from perfect in completely removing all components of a service; therefore, it is...

Words: 429 - Pages: 2

Premium Essay

Nt1230 Final

... Movies 2. Designed to replace VB Script for scripting and performing actions at the command line? PowerShell 3. Windows 7 edition that can be added to an Active Directory domain? Windows 7 Professional 4. Replaced the MS-DOS boot disks for fixing and troubleshooting a wide range of boot problems on a Windows Vista or 7 system. Windows PE 5. Series of folders associated with a specific user that contains personal documents, user-specific registry settings, Internet favorites, and other personalized information. User profile 6. What program do you use to determine if your machine can be upgraded to Windows 7? Upgrade Advisor 7. What is the default partition style used in Windows 7? MBR 8. Maximum number of primary partitions that MBR supports. 4 9. What type of volume supports is based on RAID-0? Striped volume 10. The preferred file system used in Windows 7? NTFS 11. Which layer of the OSI model covers the cabling and electrical signaling? Physical 12. Which layer of the OSI model is IPv4 Addressing included? Network 13. What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier? Subnet mask 14. What address is assigned to a computer that fails to locate a DHCP server? APIPA 15. The process of verifying the identity of the person operating the computer? Authentication 16. Enables users to perform specific operating system tasks such as shut down the system or perform backups? User rights ...

Words: 842 - Pages: 4

Free Essay

Nt2670 - Installation and Configuration of Ms

...have all of the following steps in place before you setup Exchange Server 2010 on Windows Server 2008 R2 64 Bit and this is for a small office for both the Active Directory and the Exchange Server. But if you have a larger office you may want to consider separating the Active Directory machine and the Exchange 2010 Server. Install Windows Server 2008 R2 64 bit version Exchange 2010 is a 64 bit application and requires 64 bit versions of Windows Server 2008; therefore only a computer capable of running the 64 bit version of 2008. Once that is done named the server (mailitsupport.com), set the clock and it’s configured to be a stand alone with default settings. Configure Your Static IP Address The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use DHCP.  Since we will be configuring this computer to be a domain controller, you must change the IP address of the computer to be a static IP address which should be done via View Network Connections" in the Server Manager screen.  This will display the list of active network interfaces. a. Double click on your network adaptor to display the adaptors status. b. Press the Properties button. c. Highlight "Internet Protocol Version 4 (TCP/IPv4)" and then press the Properties button. d. Change the radio button to "Use the following IP address" and enter an IP address you want to use for this server. I chose to assign this server the internal IP address "192.168.1.25". The firewall appliance is...

Words: 2240 - Pages: 9

Free Essay

It Specialist

...Ethiopian Sex: Male Date of Birth: 1974 E.C Contact Numbers: 240-423-8250 Email: yareda2@gmail.com KEY QUALIFICATION AND EXPERTISE SUMMARY Recently I work as a Technical Consultant and Engineer position in one of the leading IT solution provider in Ethiopia creative computer systems. I have a BSC degree in Management Information System (MIS). While working in this position, I have been adding a lot of Microsoft & other certification. Recently I did a lot of big projects at: 1. African union – desktop deployment using Microsoft product system center configuration manager. 2. African union – record management using Microsoft product SharePoint 2010 3. Ethio Telecom – proof of concept project (POC) in four major Microsoft product windows 2008 R2, Exchange server 2010, SCCM 2007...

Words: 1812 - Pages: 8

Free Essay

Systems High Availability

...Cloud Computing Future Proof IT… Internal Cloud External Cloud APP APP Owned and Operated by IT Rented by IT Unlock new market based economies of scale, service and innovation beyond what currently exists today What is Virtualization? What is Virtualization? Physical World Virtualized World Hardware Traditional x86 Architecture • Single OS image per machine • Software and hardware tightly coupled • Multiple applications often conflict • Underutilized resources Virtualization: • Separation of OS and hardware • OS and application contained in single file • Applications are isolated from one another • Hardware independence & flexibility Typical Consolidation: 15:1 Key Properties of Virtual Machines •Partitioning  Run multiple operating systems on one physical machine system resources between virtual machines  Divide Key Properties of Virtual Machines •Partitioning   Run multiple operating systems on one physical machine Divide system resources between virtual machines •Isolation  Fault and security isolation at the hardware level resource controls preserve performance  Advanced Key Properties of Virtual Machines •Partitioning   Run multiple operating systems on one physical machine Divide system resources between virtual machines •Isolation   Fault and security isolation at the hardware level Advanced resource controls preserve performance •Encapsulation  Entire state of...

Words: 2163 - Pages: 9

Free Essay

Performance Tuning for Windows Server 2008

...Performance Tuning Guidelines for Windows Server 2012 April 12, 2013 Abstract This guide describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the Windows Server 2012 operating system. It describes each setting and its potential effect to help you make an informed decision about its relevance to your system, workload, and performance goals. The guide is for information technology (IT) professionals and system administrators who need to tune the performance of a server that is running Windows Server 2012. For the most current version of this guide, see Performance Tuning Guidelines for Windows Server 2012. ------------------------------------------------- Disclaimer: This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. You bear the risk of using it. ------------------------------------------------- Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. ------------------------------------------------- This document does not provide you with any legal rights to any intellectual...

Words: 50142 - Pages: 201

Premium Essay

Window 7

...he believes all the networking features he requires can be provided by this “ultimate” version. Mr. Green’s stand-alone machines consist of 2 GHz processors, 4 GBs of system memory, and approximately 350 GBs of free hard drive space. At the same time, Mr. Green is concerned that this potential new edition may not be the correct one for his needs although he wants to experiment with it and be able to resort back to the previous version, if possible. 1. List and explain the concerns about Windows 7 Ultimate’s capabilities that Mr. Green should be aware of currently. 2. List and explain the concerns about Windows 7 Ultimate’s capabilities that Mr. Green should be aware of down the line as his business and network grows. 3. Use Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Note: The graphically depicted solution is not included in the required page length. 4. Explain your...

Words: 910 - Pages: 4

Premium Essay

Deployment

...[pic] [pic] Windows Deployment Services Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Trina Gorman Editor: Katie Cumming Abstract This guide provides an introduction to Windows Deployment Services in Windows Server® 2008. It includes an overview of features and procedures to follow to setup the technology. [pic] Copyright Information This document supports a preliminary release of a software product that may be changed substantially prior to final commercial release, and is the confidential and proprietary information of Microsoft Corporation. It is disclosed pursuant to a non-disclosure agreement between the recipient and Microsoft. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights...

Words: 9354 - Pages: 38