Senior Acquisitions Editor: Kenyon Brown
Development Editor: Kim Wimpsett
Technical Editors: Rodney R. Fournier and Chris Crayton
Senior Production Editor: Rebecca Anderson and Christine O’Connor
Copy Editor: Judy Flynn
Editorial Manager: Mary Beth Wakefield
Production Manager: Kathleen Wisor
Executive Editor: Jim Minatel
Book Designers: Bill Gibson and Judy Fung
Proofreader: Nancy Carrasco
Indexer: Jack Lewis
Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley
Cover Image: Getty Images Inc./Jeremy Woodhouse
Copyright © 2018 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-35914-2
ISBN: 978-1-119-35916-6 (ebk.)
ISBN: 978-1-119-35915-9 (ebk.)
Manufactured in the United States of America
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978)
646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley
products, visit www.wiley.com.
Library of Congress Control Number: 2018932871
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Windows Server is a registered trademark of Microsoft Corporation. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
This book is dedicated to the three ladies of my life, Crystal, Alexandria, and Paige.
I would like to thank my wife and best friend, Crystal. She is always the light at the end of my tunnel. I want to thank my two daughters, Alexandria and Paige, for all of their love and support during the writing of all my books. The three of them are my support system, and I couldn’t do any of this without them.
I want to thank all of my family and friends who always help me when I’m writing my books. I want to thank my brothers Rick, Gary, and Rob. I want to thank my great friends Shaun, Jeremy, and Gene.
I would like to thank all of my friends and co-workers at StormWind Studios. I want to especially thank the team who I work with on a daily basis and that includes Tom W, Dan Y, Corey F, Ronda, Dan J, Jessica, Dave, Tiffany, Tara, Ashley, Brittany, Doug, Mike, Vince, Desiree, Ryan, Ralph, Dan G, Tyler, Jeff B, Shayne, Patrick, Noemi, Michelle, Zachary, Colin, and the man who makes it all possible, Tom Graunke. Thanks to all of you for everything that you do. I would not have been able to complete this book without all of your help and support.
I want to thank everyone on my Sybex team, especially my development editor, Kim Wimpsett, who helped me make this the best book possible, and Rodney R. Fournier, who is the technical editor of many of my books. It’s always good to have the very best technical guy backing you up. I want to thank Rebecca Anderson and Christine O’Connor, who were my production editors, and Judy Flynn for being the Copy Editor.
I want to also thank Chris Crayton who is my Technical Proofreader. Special thanks to my acquisitions editor, Kenyon Brown, who was the lead for the entire book. Finally, I want to thank everyone else behind the scenes that helped make this book possible. It’s truly an amazing thing to have so many people work on my books to help make them the very best. I can’t thank you all enough for your hard work.
William Panek holds the following certifications: MCP, MCP+I, MCSA, MCSA+ Security and Messaging, MCSE-NT (3.51 & 4.0), MCSE 2000, 2003, 2012/2012 R2, MCSE+Security and Messaging, MCDBA, MCT, MCTS, MCITP, CCNA, CCDA, and CHFI. Will is also a four time and current Microsoft MVP winner.
After many successful years in the computer industry, Will decided that he could better use his talents and his personality as an instructor. He began teaching for schools such as Boston University and the University of Maryland, just to name a few. He has done consulting and training for some of the biggest government and corporate companies in the world including the United States Secret Service, Cisco, United States Air Force, and US Army.
In 2015, Will became a Sr. Microsoft Instructor for StormWind Studios (www.stormwindstudios.com). He currently lives in New Hampshire with his wife and two daughters. Will was also a Representative in the New Hampshire House of Representatives from 2010 to 2012. In his spare time, he likes to do blacksmithing, shooting (trap and skeet), snowmobiling, playing racquetball, and riding his Harley. Will is also a commercially-rated helicopter pilot.
EXERCISE 1.1 Installing Windows Server 2016 Datacenter (Desktop Experience)
EXERCISE 1.2 Installing Windows Server 2016 Using Server Core
EXERCISE 1.3 Creating a Nano Server VHD
EXERCISE 2.1 Downloading and Installing MDT 2013
EXERCISE 2.2 Configuring MDT 2013
EXERCISE 2.3 Prepare a System for Imaging by Using the System Preparation Tool
EXERCISE 2.4 Installing Windows Server 2016 from a Disk Image
EXERCISE 2.5 Installing the Microsoft Assessment and Planning Toolkit
EXERCISE 2.6 Configuring MAP
EXERCISE 3.1 Viewing Disk Configurations
EXERCISE 3.2 Initializing Disk Drives
EXERCISE 3.3 Converting a Basic Disk to a Dynamic Disk
EXERCISE 3.4 Creating a Volume Set
EXERCISE 3.5 Creating Mount Points
EXERCISE 3.6 Installing Microsoft MPIO
EXERCISE 3.7 Configuring iSCSI Storage Connection
EXERCISE 3.8 Installing the iSNS Feature
EXERCISE 3.9 Configuring Shared and NTFS Settings
EXERCISE 3.10 Configure the NFS Data Store
EXERCISE 3.11 Configuring Disk Quotas
EXERCISE 3.12 Starting the Windows PowerShell Utility
EXERCISE 4.1 Installing Hyper-V in Full Installation Mode
EXERCISE 4.2 Creating an Internal Virtual Network
EXERCISE 4.3 Creating a Differencing Hard Disk
EXERCISE 4.4 Creating a New Virtual Machine
EXERCISE 4.5 Installing Hyper-V Integration Components
EXERCISE 4.6 Creating a Linux Virtual Machine
EXERCISE 4.7 Updating Linux Ubuntu 16.10
EXERCISE 5.1 Installing NLB Nodes
EXERCISE 6.1 Installing the Failover Cluster Feature
EXERCISE 6.2 Running the Validate A Configuration Wizard
EXERCISE 6.3 Creating a Cluster
EXERCISE 6.4 Clustering the Print Services Role
EXERCISE 6.5 Using the Dependency Viewer
EXERCISE 7.1 Installing Docker
EXERCISE 7.2 Installing a Base Operating System
EXERCISE 7.3 Adding an Image to a Container
EXERCISE 7.4 Uninstalling an Image
EXERCISE 8.1 Installing a WSUS Server
EXERCISE 8.2 Setting WSUS Server Options
EXERCISE 8.3 Configuring a GPO for WSUS
EXERCISE 8.4 Backing Up Active Directory
EXERCISE 9.1 Using Performance Monitor
EXERCISE 9.2 Installing SNMP
EXERCISE 9.3 Configuring SNMP
Subnet Mask Exercise 10.1 Class C, 10 Hosts per Subnet
Subnet Mask Exercise 10.2 Class C, 20 Hosts per Subnet
Subnet Mask Exercise 10.3 Class C, Five Subnets
Subnet Mask Exercise 10.4 Class B, 1,500 Hosts per Subnet
Subnet Mask Exercise 10.5 Class B, 3,500 Hosts per Subnet
EXERCISE 11.1 Installing and Configuring the DNS Service
EXERCISE 11.2 Configuring a Zone for Dynamic Updates
EXERCISE 11.3 Creating a Delegated DNS Zone
EXERCISE 11.4 Manually Creating DNS RRs
EXERCISE 11.5 Simple DNS Testing
EXERCISE 11.6 Using the nslookup Command
EXERCISE 11.7 Enabling DHCP-DNS Integration
EXERCISE 12.1 Installing the DHCP Service
EXERCISE 12.2 Authorizing a DHCP Server
EXERCISE 12.4 Creating a New Scope
EXERCISE 12.5 Configuring User Class Options
EXERCISE 12.6 Creating a Superscope
EXERCISE 12.7 Creating a New Multicast Scope
EXERCISE 12.8 Enabling DHCP-DNS Integration
EXERCISE 12.9 Creating and Activating a New DHCPv6 Scope
EXERCISE 12.10 Configuring DHCP Failover
EXERCISE 12.11 Configuring DHCP Filtering
EXERCISE 12.12 Enabling DHCP Name Protection
EXERCISE 13.1 Installing the IPAM Feature
EXERCISE 13.2 Provisioning an IPAM Server
EXERCISE 13.3 Configuring IPAM Server Discovery
EXERCISE 13.4 Manually Add IPAM IP Address and Blocks
EXERCISE 13.5 Adding Resource Records
EXERCISE 13.6 Managing the DNS zone
EXERCISE 13.7 Creating a DHCP Scope
EXERCISE 13.8 Setting up DHCP Policies
EXERCISE 13.9 Configuring Role-Based Access Control
EXERCISE 13.10 Configuring Auditing
EXERCISE 14.1 Installing the Remote Access Role
EXERCISE 14.2 Setting Up a VPN Server
EXERCISE 14.3 Changing Remote Access Logging Settings
EXERCISE 14.4 Creating a Network Access Policy
EXERCISE 14.5 Restricting a User Profile for Dial-In Access
EXERCISE 14.6 Configuring Encryption
EXERCISE 14.7 Creating a VPN Network Access Policy
EXERCISE 15.1 Enabling BitLocker in Windows Server 2016
EXERCISE 15.2 Installing the DFS Namespace Service
EXERCISE 15.3 Setting Up a DFS Namespace
EXERCISE 15.4 Configure the NFS Data Store
EXERCISE 15.5 Configuring BranchCache Firewall Exceptions
EXERCISE 15.6 Installing BranchCache on Windows Server 2016
EXERCISE 15.7 Enabling Auditing of Active Directory Objects
EXERCISE 15.8 Generating and Viewing Audit Logs
EXERCISE 15.9 Configuring iSCSI Storage Connection
EXERCISE 15.10 Installing the iSNS Feature on Windows Server 2016
EXERCISE 16.1 Installing NLB Nodes
EXERCISE 16.2 Installing the Failover Cluster Feature
EXERCISE 16.3 Running the Validate a Configuration Wizard
EXERCISE 16.4 Creating a Cluster
EXERCISE 16.5 Clustering the Print Services Role
EXERCISE 16.6 Using the Dependency Viewer
EXERCISE 17.1 Installing Hyper-V in Full Installation Mode
EXERCISE 17.2 Creating an Internal Virtual Network
EXERCISE 17.3 Creating a Differencing Hard Disk
EXERCISE 17.4 Creating a New Virtual Machine
EXERCISE 17.5 Installing Hyper-V Integration Components
EXERCISE 17.6 Creating a Linux Virtual Machine
EXERCISE 17.7 Updating Linux Ubuntu 16.10
EXERCISE 18.1 Viewing the Disk Configurations
EXERCISE 18.2 Promoting a Domain Controller
EXERCISE 18.3 Installing AD DS on Server Core Using PowerShell
EXERCISE 18.4 Creating an RODC Server
EXERCISE 18.5 Viewing the Active Directory Event Log
EXERCISE 18.6 Joining a Computer to an Active Directory Domain
EXERCISE 18.7 Configuring DNS Integration with Active Directory
EXERCISE 19.1 Creating an OU Structure
EXERCISE 19.2 Modifying OU Structure
EXERCISE 19.3 Using the Delegation of Control Wizard
EXERCISE 19.4 Delegating Custom Tasks
EXERCISE 19.5 Creating Active Directory Objects
EXERCISE 19.6 Creating a User Template
EXERCISE 19.7 Managing Object Properties
EXERCISE 19.8 Moving Active Directory Objects
EXERCISE 19.9 Resetting an Existing Computer Account
EXERCISE 19.10 Applying Security Policies by Using Group Policy
EXERCISE 19.11 Fine-Grained Password Policy
EXERCISE 19.12 Creating and Publishing a Printer
EXERCISE 19.13 Creating and Publishing a Shared Folder
EXERCISE 19.14 Finding Objects in Active Directory
EXERCISE 19.15 Creating a PSO Using the Active Directory Administrative Center
EXERCISE 20.1 Creating Sites
EXERCISE 20.2 Creating Subnets
EXERCISE 20.3 Configuring Sites
EXERCISE 20.4 Creating Site Links and Site Link Bridges
EXERCISE 20.5 Moving Server Objects Between Sites
EXERCISE 20.6 Creating a New Subdomain
EXERCISE 20.7 Assigning Single-Master Operations
EXERCISE 20.8 Managing Trust Relationships
EXERCISE 20.9 Adding a UPN Suffix
EXERCISE 20.10 Managing GC Servers
EXERCISE 20.11 Managing Universal Group Membership Caching
EXERCISE 20.12 Backing Up Active Directory
EXERCISE 21.1 Creating a Group Policy Object Using the GPMC
EXERCISE 21.2 Linking Existing GPOs to Active Directory
EXERCISE 21.3 Filtering Group Policy Using Security Groups
EXERCISE 21.4 Delegating Administrative Control of Group Policy
EXERCISE 21.5 Configuring Automatic Certificate Enrollment in Group Policy
EXERCISE 21.6 Configuring Folder Redirection in Group Policy
EXERCISE 21.7 Creating a Software Deployment Share
EXERCISE 21.8 Publishing and Assigning Applications Using Group Policy
EXERCISE 21.9 Applying Software Updates
EXERCISE 22.1 Installing AD CS Through Server Manager
EXERCISE 22.2 Configuring AD CS Through Server Manager
EXERCISE 22.3 Configure an Auto-Enrollment Group Policy for a Domain
EXERCISE 22.4 Creating a Certificate Template
EXERCISE 22.5 Publishing a Certificate Template
EXERCISE 22.6 Revoking a Certificate
EXERCISE 22.7 Configuring CA Policy Auditing
EXERCISE 22.8 Backing Up the Certificate Authority Server
EXERCISE 23.1 Installing the AD FS Role on a Computer Using Server Manager
EXERCISE 23.2 Configuring the AD FS Role on the Computer Using Server Manager
EXERCISE 23.3 Configuring Multifactor Authentication
EXERCISE 23.4 Workplace Joining a Device
EXERCISE 23.5 Installing an AD RMS Role on the Local Computer Using Server Manager
EXERCISE 23.6 Backing Up an AD RMS Database
EXERCISE 23.7 Adding a Trusted User Domain
EXERCISE 23.8 Exporting the Trusted User Domain
EXERCISE 23.9 Exporting the Trusted Publishing Domain
EXERCISE 23.10 Adding the Trusted Publishing Domain