0% found this document useful (0 votes)
57 views76 pages

Windows Server 2012 R2 Installation and Configuration

This document outlines the installation and configuration process for Windows Server 2012 R2, specifically tailored for K12 networks. It includes system requirements, pre-installation steps, server initial configuration, and detailed instructions for setting up Active Directory and DNS services. The guide also covers additional configurations such as DHCP, WSUS, and group policies, along with troubleshooting and maintenance tips for the server environment.

Uploaded by

Salah Eddine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views76 pages

Windows Server 2012 R2 Installation and Configuration

This document outlines the installation and configuration process for Windows Server 2012 R2, specifically tailored for K12 networks. It includes system requirements, pre-installation steps, server initial configuration, and detailed instructions for setting up Active Directory and DNS services. The guide also covers additional configurations such as DHCP, WSUS, and group policies, along with troubleshooting and maintenance tips for the server environment.

Uploaded by

Salah Eddine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

WINDOWS SERVER 2012 R2

INSTALLATION AND CONFIGURATION

Prepared By
DIS APSCN/LAN Support
Table of Contents

WINDOWS SERVER 2012 REQUIREMENTS ______________________________________1


PRE-INSTALLATION REQUIREMENTS __________________________________________2
INSTALLATION _________________________________________________________2
SERVER INITIAL CONFIGURATION ____________________________________________6
DISABLE IPV6 VIA REGISTRY EDITOR _________________________________________7
DISABLE WINDOWS FIREWALL ______________________________________________8
DOMAIN SERVICES AND ACTIVE DIRECTORY SETUP _______________________________10
ADDITIONAL DNS CONFIGURATION _______________________________________13
REVERSE LOOKUP ZONES ______________________________________________13
STALE RECORD SCAVENGING ____________________________________________14
DNS FORWARDERS __________________________________________________15
DHCP INSTALLATION AND CONFIGURATION ____________________________________16
WINS INSTALLATION AND CONFIGURATION ____________________________________19
WINDOWS SERVER UPDATE SERVICES (WSUS) _________________________________21
CONFIGURING WSUS AFTER INSTALLATION __________________________________21
WSUS GROUP POLICY ________________________________________________26
BASIC ACTIVE DIRECTORY STRUCTURE FOR K12 _________________________________29
SINGLE SITE ACTIVE DIRECTORY NETWORKS _________________________________29
CREATE SHARES AND HOME DIRECTORIES ___________________________________32
CREATING USER TEMPLATE _____________________________________________36
CREATING NEW USER USING TEMPLATE _____________________________________39
LOGON SCRIPTS – BATCH FILE METHOD ____________________________________40
IMPLEMENTING SHADOW COPIES ___________________________________________43
CLIENT USAGE SCENARIOS _____________________________________________43
WHAT SHADOW COPIES OF SHARED FOLDERS CAN DO ___________________________43
IT USAGE SCENARIOS ________________________________________________44
HOW SHADOW COPY WORKS ____________________________________________45
IMPLEMENTING SHADOW COPIES _________________________________________46
IMPLEMENTING VOLUME BASED QUOTA LIMITS __________________________________48
VOLUME LEVEL QUOTA LIMITS USING PROPERTIES _____________________________48
DIRECTORY LEVEL QUOTA LIMITS USING FILE SERVER RESOURCE MANAGER ____________49
INSTALL FILE SERVER RESOURCE MANAGER ________________________________49
CONFIGURE QUOTA TEMPLATES _________________________________________50
APPLY QUOTA TEMPLATE TO DIRECTORY ___________________________________51
FINE-GRAINED PASSWORD POLICIES (ACT-723) ________________________________52
SOME COMMON K12 GROUP POLICIES ________________________________________55
RETAIN SECURITY EVENT LOG FOR 90 DAYS GROUP POLICY _______________________55
AUTO-BACKUP AND CLEAR EVENT LOGS (AT LEAST WINDOWS VISTA) _________________56
SECURITY EVENT AUDITING – SECURITY EVENT LOG CONTENTS _____________________57
GROUP POLICY FOR LOGON BANNER _______________________________________58
LOCKING SCREEN SAVER GROUP POLICY ____________________________________59
FOLDER REDIRECTION GROUP POLICY ______________________________________60
RESTRICT COMPUTERS TO FACULTY USE ONLY ________________________________61
REFRESH GROUP POLICY SETTINGS WITH GPUPDATE.EXE__________________________63
UPDATE GROUP POLICY SETTINGS FROM GROUP POLICY MANAGEMENT CONSOLE _________65
TROUBLESHOOTING WINDOWS SERVER 2012 ___________________________________66
DISABLING THE SHUTDOWN EVENT TRACKER _________________________________66
SET TIME SOURCE TO DIS______________________________________________67
ACTIVE DIRECTORY MAINTENANCE __________________________________________68
DELETE DEAD/TOMB-STONED DOMAIN CONTROLLER FROM ACTIVE DIRECTORY __________68
REMOVING THE SERVER FROM THE ACTIVE DIRECTORY SITE _______________________68
REMOVING THE SERVER FROM THE FILE REPLICATION SERVICE _____________________69
REMOVING THE SERVER FROM ACTIVE DIRECTORY SITES AND SERVICES _______________69
REMOVING THE SERVER FROM ACTIVE DIRECTORY USERS AND COMPUTERS _____________70
MANUALLY SEIZE FSMO ROLES __________________________________________71
HOW TO RESET THE DIRECTORY SERVICES RESTORE MODE ADMINISTRATOR ACCOUNT PASSWORD
_______________________________________________________________72
This document is DIS’ recommended method for implementing a Windows Server 2012
and Active Directory within a K12 network.

WINDOWS SERVER 2012 R2 REQUIREMENTS

Component Requirement

• Minimum: 1.4GHz (x64 processor)


• Recommended: 2GHz or faster
Processor
Note: Processor performance depends not only on the clock frequency
of the processor, but also on the number of processor cores and the
size of the processor cache

• Minimum: 512 MB RAM or greater


Memory • Recommended: 6GB RAM or greater
• Maximum (64-bit systems): 4TB (Standard and Datacenter editions)

• Minimum: 32GB or greater


• Recommended: 80GB or greater
Available Disk
Space
Note: Servers with more than 16GB of RAM will require more disk
space for paging, hibernation, and dump files

Drive DVD-ROM drive

• Super VGA (800 x 600) or higher-resolution monitor


Display and • Keyboard
Peripherals • Microsoft Mouse or compatible pointing device
• Internet Access

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
1|Page
PRE-INSTALLATION REQUIREMENTS

• Microsoft Windows Server 2012 R2 DVD (with Service pack IF applicable).


• 1 NAT IP Address.
• Public IP address (IF applicable).
• Floppy Disk, USB Drive, CD/DVD containing your SCSI/RAID drivers.

INSTALLATION

1. Insert the Windows 2012 Server installation DVD into the drive.

2. Restart the computer and boot to the DVD-ROM. Wait for Setup to display a
dialog box.

3. Insert the appropriate Windows Server 2012 installation media into your
DVD drive and reboot the computer/server.

4. When prompted for an installation language and other regional options,


make your selection and press Next.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
2|Page
5. Next, press Install Now to begin the installation process.

6. Select the proper edition of Windows Server 2012 R2 that is to be installed


and press Next.

7. Read and accept the license terms by clicking to select the checkbox and
pressing Next.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
3|Page
8. In the "Which type of installation do you want?" window, click the only
available option – Custom (Advanced).

9. Select the disk that Windows Server 2012 R2 will be installed on and then
click New to create a partition.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
4|Page
10. In the “Size:” entry box, enter the size of the partition and press Next.

**The size format is in megabytes. GB * 1024 = Size to be entered.

You will see the following screen while the installation files are copied to the server.
The server will reboot to complete the installation (leave media inserted).

11. Once the server has completed the setup, it will notify you that the password
needs to be set. This password MUST meet Microsoft password complexity
requirements. It will require a minimum password length of 7 characters and
three out of the four following:

a. Upper Case
b. Lower Case
c. Numbers
d. Special Characters

12. Once the password is successfully changed, the server will login to the initial
desktop and Server Manager will start up automatically.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
5|Page
SERVER INITIAL CONFIGURATION

1. On the Server Manager screen, click on Local Server.

2. Activate Windows and insert key.

3. Change Computer name.

4. Set Time zone.

5. Configure Networking and change to Static IP and disable IPv6 by unchecking the
option for TCP/IPv6.

6. Enable Windows Updates.

7. Download and Install updates.

8. Turn off IE Enhanced Security Configuration for Administrators only.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
6|Page
DISABLE IPV6 VIA REGISTRY EDITOR

**Recommended To Be Done

1. Open the Registry Editor by moving your mouse over the bottom-right or top-
right corner of the screen. Click on the Search button (magnifying glass), type
REGEDIT and press Enter

2. Expand the following Key Structure in the Registry Editor:

HKEY_LOCAL_MACHINE
|---System
|---CurrentControlSet
|---Services
|---Tcpip6
|---Parameters

3. Right-Click on the Parameters Key and click New > DWORD (32-Bit) Value.

4. Type in the name DisabledComponents and press Enter.

5. Double-click on the newly created key and enter ffffffff (8 f’s) for the value data
in Hexadecimal mode.

6. Close the Registry Editor.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
7|Page
DISABLE WINDOWS FIREWALL

1. Open up Windows Firewall with Advanced Security by moving your mouse over
the bottom-right or top-right corner of the screen. Click on the Search button
(Magnifying glass), type Firewall and press Enter.

2. In the middle of the screen you will find an “Overview” section, at the bottom of
this section click Windows Firewall Properties.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
8|Page
3. Turn off the Firewall state for Doman Profile and Private Profile.

**It is highly recommended that the Firewall be enabled on DIS Router if you are not
using a third-party firewall. If you do not have any firewall appliance, you may wish to
leave the windows firewall enabled. Adjust the scopes of the Inbound/Outbound rules
to meet application requirements.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
9|Page
DOMAIN SERVICES AND ACTIVE DIRECTORY SETUP

**Before starting this section, make sure that your server has a statically assigned IP
address and that the DNS IP Address in the TCP/IP settings are pointing to itself.

We do not have to pre-install the DNS Server Role or pre-create our DNS Zone. When
the Active Directory Domain Services Role is installed the DNS Server Role will be
automatically installed and configured with the DNS zone specified during the Active
Directory installation.

1. Launch Server Manager.

2. Click Manage and then select Add Roles and Features.

3. On the Before You Begin screen, click Next.

4. On the Select Installation type screen, select Role-based or Feature-based


installation and click Next.

5. On the Select Destination server screen, click Next.

6. Check the box to the left of Active Directory Domain Services.

7. On the Add Roles and Features Wizard dialogue box, click Add Features.

8. Click Next for rest of the screens, and then click Install.

9. When the installation is finished, click Close.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
10 | P a g e
10. Promote the Server to be a Domain Controller by clicking the Notifications
icon (Flag Icon) and then selecting Promote this Server to a Domain
Controller.

11. On the Deployment Configuration screen, select Add a new forest. Type the
DNS name for the new domain in Root Domain Name and click Next.

**DIS recommends you type your abbreviated school district name followed
by .local e.g. school.local. DO NOT end your domain name with .com, .net,
.org, .edu, or any other domain names that are resolvable on the internet.

**This domain name is for INTERNAL resolution only.

**This step and those following assume this is the first Domain Controller in
a new domain, tree and forest.

12. For the Forest Functional Level and the Domain Functional Level, select
Windows Server 2012 and click Next.

**If any previous versions of Windows Server Operating (2003 or 2008 R2)
are present in the domain or will be introduced as Domain Controllers,
select the corresponding Forest and Domain Functional level.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
11 | P a g e
13. Under Domain Controller Capabilities, make sure that DNS and Global
Catalog options are selected.

14. Under Directory Services Restore Mode (DSRM) Password, enter in a


complex password that is UNIQUE to this server and is NOT your
administrator password and click Next.

15. On the DNS Options screen click Next.

**Ignore the Parent zone delegation warning on top of the screen. It will be
created during initial AD installation.

16. On the Additional Options screen click Next.

17. On the Location for Database, Log Files and SYSVOL screen click Next.

18. On the Review Options screen click Next.

19. On the Prerequisites Check screen, review warnings and errors if any. Click
install to start Domain Controller promotion.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
12 | P a g e
20. When the Active Directory installation finishes, the computer will
automatically restart.

ADDITIONAL DNS CONFIGURATION

REVERSE LOOKUP ZONES

21. Log into the server when the server has completely booted back up.

22. Launch Server Manager, click on Tools and select DNS from the drop down
list.

23. Expand your server name, right-click on Reverse Lookup Zones and click New
Zone.

24. On the Zone Type screen, take the defaults and click Next.

25. For the Active Directory Zone Replication Scope, select To all DNS Servers
running on domain controllers in this domain and click Next.

26. Select IPv4Reverse Lookup Zone and click Next.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
13 | P a g e
27. For the reverse zone name, enter the first two/three octets of your IP range
and click Next.

**If IP range spans multiple “class C subnets” ONLY enter the first two
octets e.g. if the IP range is 10.10.0.0 to 10.10.1.255, then you would only
enter 10.10

28. On the Dynamic Update screen, take the default and click Next.

29. Click Finish to create the new zone.

**Steps 23 through 26 must be completed for Public and Private IP subnets being used
in the Active Directory environment.

STALE RECORD SCAVENGING

30. Within the DNS Manager, right-click on your DNS server and click Set
Aging/Scavenging for All Zones.

31. Check the box Scavenge stale resource records and then click OK.

32. When prompted with the Server Aging/Scavenging Confirmation box, check
the Apply these settings to the existing Active Directory-integrated zones
option and then click OK.

**Steps 30 and 32 must be completed on each DNS server.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
14 | P a g e
DNS FORWARDERS

By setting the DNS Forwarders to DIS’ DNS servers, your server will not have to perform
a full DNS resolution of a requested domain name. Rather, it will query the DNS servers
at DIS for the specified DNS entry and, if cached, the DIS DNS servers will return the
results from its local cache. If the DIS DNS Server does not have the result in its cache, it
will perform the full lookup of the DNS Name, and return the results to your DNS server
to be delivered to your client.

With Windows Server 2012, should the DIS DNS Servers become unavailable, your DNS
server will default to use the DNS Root Hint servers on the Internet for DNS resolution.

33. Within the DNS Manager, right-click your server and click Properties.

34. Click the Forwarders tab and then click the Edit button.

35. Enter your DIS DNS servers as specified below and click OK.

36. Click Apply and then OK.

37. Close the DNS Manager.

DNS Resolvers for Central Arkansas

DNS = 170.94.156.195 (resolver1.state.ar.us)


DNS = 170.94.156.196 (resolver2.state.ar.us)

DNS Resolver for Northwest Arkansas

DNS = 66.204.1.66 (dns4.state.ar.us)

DNS Resolver for South Arkansas

DNS = 66.204.193.26 (dns5.state.ar.us)

List the server in your area as the primary DNS resolver. For redundancy purposes, list
an alternate DNS resolver in another part of the state.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
15 | P a g e
DHCP INSTALLATION AND CONFIGURATION

1. Launch Server Manager.

2. Click Manage and then select Add Roles and Features.

3. On the Before You Begin screen, click Next.

4. On the Select Installation type screen, select Role-based or Feature-based


installation and click Next.

5. On the Select Destination server screen, click Next.

6. On the Select server roles screen, select the DHCP Server role, click on Add
Features and click Next.

7. Click Next for rest of the screens, and then click Install.

8. When the installation is finished, click Close.

9. Configure the DHCP Server installation by clicking the Notifications icon (Flag
Icon) and then selecting Complete DHCP configuration.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
16 | P a g e
10. On the Description screen click Next.

11. On the Authorization screen, click Commit.

12. Now that DHCP Server role has been installed, we will configure it in DHCP
Manager by clicking on Tools and selecting DHCP from the drop down list.

13. Expand the server node and IPv4 node until you see Server Options, Policies.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
17 | P a g e
14. Right click on IPv4 and select New Scope.

15. On the Scope Name screen enter the Scope name and description you want
to use for this scope e.g. IP NAT POOL

16. On the IP Address Range screen type in the starting and ending IP address
for this scope along with the subnet mask. This is the range of IP addresses
this DHCP server will be issuing. Click Next.

**It is recommended to leave a few numbers at the start of the scope for
static assignment e.g. if the IP range is 10.10.10.0 - 10.10.11.255 enter
10.10.10.51 for the Starting IP Address and 10.10.11.254 for the Ending IP
Address to leave 50 IP’s at the beginning of your IP range for static
assignment.

17. On the Exclusion screen enter the IP addresses you want to be excluded from
the DHCP range defined in the previous step and then click Next.

18. On the Lease time screen take the default values unless required otherwise
and Click Next.

19. On the Configure DHCP options screen select No, I will configure these
options later and click Next and then Finish to close the wizard.

20. Right click Server Options and select Configure Options. From the list
opened select the following options:

- 003 Router --- Gateway Address for devices


- 006 DNS Server --- On premises DNS Servers typically DCs
- 015 DNS Domain Name --- Domain name e.g. school.local
- 044 WINS/NBNS Server --- On premises WINS Servers
- 046 WINS/NBT Node Type --- Recommended to be configured as 0x8

21. Right-click IPv4 and select Properties. Under the Advanced tab, for Conflict
Detection Attempts, change this value to 3.

22. Also, under Advanced tab click on the Bindings button and verify that the
only network adapter checked is the adapter that is on the same subnet the
DHCP server will be serving IP addresses for.

23. Once all the settings are done, right click on the newly created scope and
select Activate for the DHCP server to start giving out IP numbers.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
18 | P a g e
WINS INSTALLATION AND CONFIGURATION

1. Launch Server Manager.

2. Click Manage and then select Add Roles and Features.

3. On the Before You Begin screen, click Next.

4. On the Select Installation type screen, select Role-based or Feature-based


installation and click Next.

5. On the Select Destination server screen, click Next.

6. On the Select server roles screen, click Next.

7. On the Select features screen, select WINS Server, click on Add Features and
then click Next and then click Install.

8. Add the WINS IP addresses to each respective network cards in all servers.

9. If multiple WINS servers are being deployed, they need to be added as


replication partners under WINS manager.

10. Open up WINS Manager by selecting Tools in the Server Manager and then
selecting WINS from the drop down list.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
19 | P a g e
11. Expand the respective WINS Server and click on Replication Partners.

12. Right-click Replication Partners and select New Replication Partner.

13. Enter the respective server name that will be replicating with this WINS
server and close WINS manager.

** Steps 12 and 13 needs to be repeated for all WINS servers in the domain.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
20 | P a g e
WINDOWS SERVER UPDATE SERVICES (WSUS)

Microsoft Windows Server Update Services (WSUS) enables information technology


administrators to deploy latest Microsoft product updates to systems running Microsoft
products. By using Windows Server Update Services, you can fully manage the
distribution of updates that are released through Microsoft Update to computers in
your network.

For Windows Server 2012, WSUS requires the following:

• At least Microsoft Internet Information Services (IIS) 6.0


• At least Microsoft .Net Framework 2.0
• WSUS 4.0 Management Console requires at least Windows 8
• 1GB of free space on system partition.

**You will want to have a WSUS server at each physical site that is behind a router.
The reason is that you do not want to have computers go across the WAN connection
to get their updates.

CONFIGURING WSUS AFTER INSTALLATION

1. Launch Server Manager.

2. Click Manage and then select Add Roles and Features.

3. On the Before you begin page, click Next.

4. On the Select Installation type screen, select Role-based or Feature-based


installation and click Next.

5. On the Select Destination server screen, click Next.

6. On the Select Server roles page, select Windows Server Update Services.

7. In the Add Roles and Features dialog box that pops up, click Add Features
and then click Next.

8. On the Select features page, leave the default selections, and then
click Next.

**WSUS only requires the default Web Server role configuration. If you are
prompted for additional Web Server role configuration while setting up

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
21 | P a g e
WSUS you can safely accept the default values and continue setting up
WSUS.

9. On the Windows Server Update Services page, click Next.

10. On the Select Role Services page, leave the default selections unless an
external SQL Server database is being used, and then click Next.

11. On the Content location selection page, type a valid location to store the
updates e.g. D:\WSUS and then click Next.

**You must have at least 200GB of free disk space, on the volume selected
to store updates locally.

12. On the Web Server Role (IIS) page, click Next.

13. On the Select role services page, leave the default selections, and then
click Next.

14. On the Confirm installation selections page, review the selected options,
and then click Install.

15. On the Installation progress page, make sure that the installation succeeded,
and then click Close.

16. Now that WSUS role is installed, it will be configured by clicking on Tools and
selecting Windows Server Update Services from the drop down list.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
22 | P a g e
17. On the Complete WSUS Installation dialog box appears, click Run.

18. In the Complete WSUS Installation dialog box, click Close when the
installation successfully finishes.

19. The Windows Server Update Services Wizard appears and on the Before you
Begin page, click Next.

20. Read the instructions on the Join the Microsoft Update Improvement
Program page and evaluate if you want to participate or not. If you do not
want to participate, Uncheck the box and click Next.

21. On the Choose Upstream Server page, select Synchronize from Microsoft
Update and click Next.

**If you are synchronizing from another WSUS server from within the
district, be sure to enter the proper port number that WSUS is running on
remotely.

22. On Specify Proxy Server settings, leave the default values, unless these
settings are required for your environment and then click Next.

23. On the Connect to Upstream Server, click Start Connecting to retrieve the
current updated list of products available.

24. When the initial product file download is completed, click Next.

25. On the Choose Languages page, Verify that English is the ONLY selected
language and then click Next.

26. On the Choose Products page, choose the Microsoft products running in
your environment that will require updates and click Next.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
23 | P a g e
27. On the Choose Classifications page, it is recommended to select everything
EXCEPT Drivers and click Next.

28. On the Set Sync Schedule page, select Synchronize automatically and set
this to off-peak usage hours e.g. 11:00pm and then click Next.

29. Click Finish on the next screen to complete the configuration wizard.

30. On the Update Services management console screen, expand your WSUS
Server and click Options.

31. In the Options pane, select Update Files and Languages. Uncheck the
Download update files to this server only when the updates are approved
and click OK.

**If you choose to manually approve updates, your workstations will not
have to wait until after the next WSUS Sync with Microsoft to get the
updates.

32. In the Options pane, select Automatic Approvals.

33. Select the Default Automatic Approval Rule and click Edit.

34. In the Step 2 box, click on Critical Updates, Security Updates.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
24 | P a g e
35. Select all classification items EXCEPT drivers and click OK.

**Some districts choose not to select Feature Packs. These include items
such as Silver Light and Desktop Search.

36. Verify that Default Automatic Approval Rule is checked. Click Apply and OK.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
25 | P a g e
WSUS GROUP POLICY

1. Launch Server Manager.

2. Click on Tools and select Group Policy Management from the drop down list.

3. Expand Forest: yourdomain.local.

4. Expand Domains and then expand yourdomain.local and navigate to Group


Policy Objects.

5. Right-click on the Group Policy Objects and then select New.

6. Name the new group policy WSUS Policy and click OK.

7. Expand Group Policy Objects. Right-click the newly created WSUS Policy and
click Edit to open the Group Policy Editor.

8. Expand Computer Configuration > Policies > Administrative Templates >


Windows Components and select Windows Update.

9. Double-click on Configure Automatic Updates, change Not Configured to


Enabled and select option 4 – Auto Download and schedule install under
Configure automatic updating drop-down menu.

10. Set the desired scheduled install day and time.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
26 | P a g e
11. Click the Next Setting button to change to Specify Intranet Microsoft Update
Services Location window.

12. Change Not Configured to Enabled and in both entry boxes enter
http://YourWsusServername:8530 and then click OK.

13. Click the Next Setting button to change to Automatic Updates detection
frequency window.

14. Change Not Configured to Enabled, leave the default value for Interval
(hours) and then click OK.

15. Double-click on Allow Automatic Updates immediate installation, change


Not Configured to Enabled and then click OK.

16. Double-click on No auto-restart for scheduled Automatic Updates


installations, change Not Configured to Enabled and then click OK.

17. Double-click on Reschedule Automatic Updates Scheduled Installations.

18. Change Not Configured to Enabled, change the startup (minutes) to any
value between 1 – 5 (recommended) and then click OK.

19. Close the Group Policy Management Editor.


Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
27 | P a g e
20. Drag and Drop WSUS Policy on the Workstations OU to link the policy to
everything residing under Workstations.

**It is recommended to have a separate Group Policy for Domain Servers and Domain
workstations to avoid automatic restart on servers.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
28 | P a g e
BASIC ACTIVE DIRECTORY STRUCTURE FOR K12
SINGLE SITE ACTIVE DIRECTORY NETWORKS

1. Launch Server Manager.

2. Click on Tools and select Active Directory Users and Computers from the
drop down list

3. Right-click on YourDomain.LOCAL, click New, then Organizational Unit (OU).

4. Enter Faculty as the name of the new Organizational Unit then click Next.

** Uncheck the Protect container from accidental deletion box before


selecting Next if you do NOT want to automatically protect the OU from
being deleted or moved.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
29 | P a g e
** Repeat Steps 2 and 3 for Organizational Units required in your Active Directory
environment e.g. Students, Workstations, Domain Member Servers, and Custom
Security Groups.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
30 | P a g e
Now that we have our basic OU structure setup, we need to create our security groups.
It is best to use security groups to assign permissions rather than assigning permissions
to network shares using individual accounts. It is much easier to find where someone is
getting incorrect access to something if access to files and shares is based off of security
groups.

5. Right-click on the Custom Security Groups OU then click New Group.

6. Name this group Faculty and click OK.

**Repeat Steps 4 and 5 for all Custom Security Groups required in your Active
Directory environment e.g. Students, Journalism, YearBook, and Technology etc.

**If you are running Active Directory over multiple sites (behind more than one
router), you would want to create an OU for each site, place Workstations, Faculty,
and Students OU’s under that Site OU. You can delegate campus level technicians to
be able to have the authority to maintain user accounts, computer accounts, etc. that
reside only in their campus’ OU.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
31 | P a g e
CREATE SHARES AND HOME DIRECTORIES

The first thing we need to do before we can create our user template is to create a
network share for the home directories.

1. Open Computer and browse to the volume that will hold the faculty
home-directories.

**It is recommended that Faculty and Student Home folders be stored


on individual volumes. Do not place them on the same volume or on the
DATA volume.

2. Create a new folder called Faculty-Homes.

3. Right click on the Faculty-Homes folder and click Properties.

4. Select on the Sharing tab and click the Advanced Sharing button.

5. Select the Share this folder check box.

6. For the share name type Faculty-Homes$.

**When sharing folders or drives with Windows, if a dollar sign ($)


character is added to the end of a share name, the share name does not
appear in a browsed list of available shares on the server.

7. Click on the Permissions button.

8. Select Everyone and click Remove.

9. Click Add. In the name box enter Domain Admins, Administrators,


Faculty, and each separated by a semi-colon. Click the Check Names
button and then click OK.

**If a name or group is misspelled or not found in the Directory, you will
be prompted to correct the spelling or to distinguish the proper group,
should the same text exist within multiple groups.

10. Give Domain Admins and Administrators both Full Control.

11. Give the Faculty group Change rights, they will receive Read
automatically.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
32 | P a g e
12. Click on the Caching button. Select No files or programs from this
shared folder will be available offline.

**Unless required, it is NOT recommended to allow offline file-caching


for any network shares as these files will be synced at every log off for
every user using the share.

13. Click OK, Apply, and then OK until all property windows are closed.

14. Select the Security tab and click the Advanced button.

15. On the Advanced Security Settings page, click on Disable inheritance.

**By Default all folders created have “Inheritance” turned on which


means that the folder inherits its rights from its parent folder. The
easiest way to distinguish this is to notice that the Allow or Deny
selection boxes will be grayed out for a user or group that is getting
rights through inheritance.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
33 | P a g e
16. A dialog box prompting that permission inheritance from the parent
folder is being blocked will popup.

17. Select Convert inherited permissions into explicit permissions on this


object.

18. Click Apply and then OK to return to the Faculty-Homes Properties


screen.

19. Your permissions to Faculty-Homes should now look like the following
screen.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
34 | P a g e
20. Click on Edit button and remove all Groups from the list except
Administrators group.

21. Click on Add, enter Domain Admins and click OK.

22. Click on Domain Admins, then under Permissions for Domain Admins
check Full Control under Allow section. Click Apply and OK.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
35 | P a g e
CREATING USER TEMPLATE

Now that the network share to store home directories is set up, User template will be
created using the following steps:

23. Launch Server Manager, click on Tools and select Active Directory Users
and Computers from the drop down list.

24. Right click on the Faculty OU, select New, and then User.

25. In the information screen fill it out as shown in this screen and then click
Next.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
36 | P a g e
**An underscore before the first name places the template at top of the
list within the Organizational Unit.

26. Enter a password for the template account that meets the minimum
password requirements. Make sure User much change password at next
logon and Account is disabled are checked and click Next.

**It is recommended that a template account is ALWAYS disabled after


creation.

Now that the template account is set up, it needs to be configured for login script, home
directory path, and make sure that this template is a member of the required security
group(s) by following these steps:

27. Right-click on the _Faculty Template account and click Properties.

28. Click on the Member Of tab and then click on Add.

29. In the Select Groups box, type Faculty and click Check Names. Add any
additional security group this template needs to be a member of and
then click OK.

30. Click on the Profile tab and in the Logon Script text box, enter logon.bat

31. Under the Home folder section, click the radio button next to Connect.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
37 | P a g e
32. Select the drive letter to be used for user’s home directory when it is
mapped.

33. In the To: text box enter \\servername\Faculty-Homes$\%username%

34. Click Apply and then OK.

**The %username% in the home directory path will automatically


change to the login id of the user.

35. This will create a new subfolder called FTemplate under Faculty-Homes
folder with the proper rights.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
38 | P a g e
CREATING NEW USER USING TEMPLATE

To create a new account based off the template, use the following steps:

1. Right click on the _Faculty Template account and click Copy.

2. In the Information screen fill it out the information for the New User and
then click Next.

3. Make sure that the Account is disabled box is Unchecked when creating
a real user account. Click Next and then Finish to complete the creation.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
39 | P a g e
LOGON SCRIPTS – BATCH FILE METHOD

By default Windows does not know what shares users need access to or what drive
letters they need to be mapped to. By creating a simple batch file logon script, this can
be accomplished easily. All logon scripts should be saved in the
\\DOMAINNAME\NETLOGON folder.

A batch file is nothing more than a series of DOS commands. The main command in a
basic batch file logon script would be the NET USE command. For instance, if you have a
server named DC1 and it has a share name of APPS, the following command would map
this drive as N: for the user, when the logon script runs.

NET USE N: \\DC1\APPS

You can use the REM to remark out anything that you type after the REM. This is helpful
for documenting what each command is doing in your logon script. REM Statements
MUST be on their own line. They are shown on the same line in this example.

A logon script would look similar to the following:

*DO NOT ADD THE REM STATEMENTS*

LOGON.BAT

@ECHO OFF
NET USE N: /D REM Disconnects mapped N drive
NET USE O: /D REM Disconnects mapped O drive
NET USE P: /D REM Disconnects mapped N drive

NET USE N: \\DC1\Apps /Persistent:NO REM Map Apps share on server DC1 to N
NET USE O: \\DC1\Faculty-Apps /Persistent:NO REM Map Faculty-Apps share on server DC1 to O
NET USE P: \\DC1\Student-Apps /Persistent:NO REM Map Student-Apps share on server DC1 to P

REM Copy All Icon Files in Shared Folder to Users’ Desktop – Overwrite any items that are duplicates.
Xcopy “\\server\sharename\desktopicons\*.*” “%USERPROFILE%\DESKTOP” /C /E /S /Y

REM Start BGInfo


\\%USERDNSDOMAIN%\netlogon\bginfo.exe \\%USERDNSDOMAIN%\netlogon\bginfo-settings.bgi /timer:0
/accepteula

REM Rename Mapped Drives in My Computer


Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
40 | P a g e
Wscript.exe \\%userdnsdomain%\netlogon\rename-mapped-drives.vbs

:END
EXIT

VBScript to rename mapped network drives. Example: In My Computer from “Apps on


‘DC1’ (O:)” to “Apps (O:)”.

Before After

Rename-Mapped-Drives.VBS

‘------Script Start
On Error Resume Next

Dim UserName

Set oShell = CreateObject("Shell.Application")


Set objNetwork = CreateObject("WScript.NetWork")

Username = objNetwork.UserName
UserName = UCase(Left(UserName,1)) & LCase(Right(UserName,Len(UserName)-1))

mDrive = "M:"
oShell.NameSpace(mDrive).Self.Name = Username & " - Home Directory"
mDrive = "N:"
oShell.NameSpace(mDrive).Self.Name = "Apps"
mDrive = "O:"
oShell.NameSpace(mDrive).Self.Name = "Faculty Apps"
mDrive = "P:"
oShell.NameSpace(mDrive).Self.Name = "Student Apps"
mDrive = "W:"
oShell.NameSpace(mDrive).Self.Name = Username & " - Web Space"
mDrive = "Y:"
oShell.NameSpace(mDrive).Self.Name = "Student Home Directories"
mDrive = "Z:"
oShell.NameSpace(mDrive).Self.Name = "Faculty Home Directories"

‘------ Script End

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
41 | P a g e
As you may notice, there is a section for Windows 9X Clients and a section for NT-based
clients. NT-based clients include the Operating Systems Windows NT Workstation 4.0
up to Windows XP, as well as Server 2003.

We placed the following command at the beginning to check and see if what type of OS
is on the workstation that the user is logging in with by using the OS variable built into
NT based clients.

IF “%OS%”==”Windows_NT” GOTO NTClients

Some of the other variables that are available are %LOGONSERVER%,


%COMPUTERNAME% and %USERNAME%. These commands can be placed in the login
script and can also be run from a DOS prompt to check the validity of your syntax.

**All login scripts need to be placed in the NETLOGON folder


\\DomainName\NETLOGON. Anything placed in this folder is replicated to ALL domain
controllers.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
42 | P a g e
IMPLEMENTING SHADOW COPIES
CLIENT USAGE SCENARIOS

Shadow copy usage scenarios for both client and IT administrators are relatively
straightforward. Three common scenarios of data loss due to human error are:
Accidental file deletions.
Accidental overwrites of a file (for example, forgot to perform ‘Save as’).
File corruption.
Shadow Copies of Shared Folders provides an end user-accessible tool that restores
documents by accessing point-in-time shadow copies of documents and folders stored
on network shares. Local volume recovery support of an end user’s computer, for
example, is not supported. The network file share must have the Volume Shadow Copy
service enabled on a Windows Server 2003-based computer.

Shadow Copies of Shared Folders is transparent to end users when they store files on
the network file server. Only when an end user needs to replace a lost or damaged file
with a prior version will they activate the client user interface (UI) through Windows
Explorer. Shadow Copies of Shared Folders also enables users to see network folder
contents at specific points in time.

WHAT SHADOW COPIES OF SHARED FOLDERS CAN DO

Shadow Copies of Shared Folders helps end users:


Recover files without assistance from the help desk
Recover files that were not saved using the “Saved as” command.
Recover files that were corrupted and not recovered with the file recovery
capabilities of Windows XP Professional or Microsoft Office XP.
Shadow Copies of Shared Folders creates a safety net for end users by providing an
easily and readily available previous version of a file. In this way, Shadow Copies of
Shared Folders helps end users to:
Manage their own files.
Fix mistakes without rebuilding the file or calling the help desk.
Save time and money for the business.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
43 | P a g e
IT USAGE SCENARIOS

The most common scenario for recovering lost or corrupted files is a request by the end
user to the IT help desk to find an archived version. Assuming that the organization has
an archiving system in place, this request usually means a costly and time-intensive
search of archived media, which in many instances is a tape back-up.
This situation creates several problems:
Potential loss of business agility or revenue if the lost document is time- or
context-sensitive.
Increased unproductive time for end user.
Increased cost to help desk and IT support services.

Shadow Copies of Shared Folders enables end users to view the contents of shared
folders as they existed at specific points in time, and recover those files by themselves.
This eliminates administrators having to restore accidentally deleted or overwritten
files. Implementing Shadow Copies of Shared Folders for routine file recovery scenarios
can help to:
Reduce demand on busy administrators; for example, by reducing restore-from-
tape requests.

Reduce the cost of recovering single or multiple files. Table 1 below presents a summary
of how end users, IT departments, and organizations can benefit by implementing
Shadow Copies of Shared Folders.

Table 1: Benefits of Using Shadow Copies of Shared Folders

Benefit End IT Company


User Department
Saves lost time by not having to rebuild file
Empowers users to manage their own files
Saves critical data and information
Saves money by avoiding data loss
Avoids loss of revenue by retaining critical data
Reduces end users’ dependence on IT
administrators

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
44 | P a g e
HOW SHADOW COPY WORKS

The shadow copy feature in Windows Server works by making a block-level copy of any
changes that have occurred to files since the last shadow copy. Only the changes are
copied, not the entire file.

As a result, previous versions of files do not usually take up as much disk space as the
current file, although the amount of disk space used for changes can vary, depending on
the application that changed the file.
For example, some applications rewrite the entire file when a change is made, but other
applications add changes to the existing file. If the entire file is rewritten to disk, then
the shadow copy contains the entire file. Therefore, consider the type of applications in
your organization, as well as the frequency and number of updates, when you
determine how much disk space to allocate for shadow copies.

**Shadow copies DO NOT eliminate the need to perform regular backups, nor do
shadow copies provide protection from media failure. In addition, shadow copies are
not permanent. As new shadow copies are taken, old shadow copies are purged when
the size of all shadow copies reaches a configurable maximum, or when the number of
shadow copies reaches 64, whichever is sooner. Therefore, shadow copies might not
be present for as long as end users expect them to be. End user needs and
expectations should be considered when shadow copies are configure

A copy of the Shadow Copy Client can be downloaded for Windows XP or prior
operating systems from the following link:

http://www.microsoft.com/en-us/download/details.aspx?id=16220

**Windows Vista and later have the Shadow copy client installed by default

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
45 | P a g e
IMPLEMENTING SHADOW COPIES

1. On the server go to File manager and then select Computer.

2. Right-click on the volume that you would like to enable Shadow Copies and
then click Properties.

3. Click on the Shadow Copies tab.

4. Select the volume(s) from the list shadow copies needs to be enabled on and
then click Enable.

5. On the Enable Shadow Copies dialog box that pops up check Do not show
this message again and click Yes.

6. Click on the volume that you enabled Shadow Copies for then click the
Settings button.

7. Click the Schedule button.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
46 | P a g e
8. By default, the only two options for a snapshot are every day at 7AM and
12PM, Mon - Friday. Adjust these schedule to meet the district’s needs or
create a new schedule per requirement.

9. Click OK twice to return to the Shadow Copies Settings window.

10. Click OK to return to Computer.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
47 | P a g e
IMPLEMENTING VOLUME BASED QUOTA LIMITS
VOLUME LEVEL QUOTA LIMITS USING PROPERTIES

**Quota limits are based off of volumes. Quota limits are, when applied, are for all
users that save data on the volume. It is recommended that volumes containing
Faculty and Student home folders be on separate volumes. This will allow different
quota limits on volumes.

1. On the server go to File manager and then select Computer.

2. Right click on the volume that Quota limits need to be enabled and then
select Properties and click on the Quota tab.

3. Check the box next to Enable Quota Management.

**It is recommended to enable Deny Disk Space to Users Exceeding Quota Limit.

4. Select the radio button next to Limit disk space to. Set the limit and warning
level to meet district’s needs. You can set the log options to meet your
needs.

5. Click Apply and OK.

To view user’s current disk utilization, click on the Quota Entries button from within the
window.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
48 | P a g e
DIRECTORY LEVEL QUOTA LIMITS USING FILE SERVER RESOURCE MANAGER

INSTALL FILE SERVER RESOURCE MANAGER

1. Launch Server Manager.

2. Click Manage and then select Add Roles and Features.

3. On the Before You Begin screen, click Next.

4. On the Select Installation type screen, select Role-based or Feature-based


installation and click Next.

5. On the Select Destination server screen, click Next.

6. On the Select Server roles page expand File and Storage Services to view the
options below.

7. Expand File and iSCSI Services, select File Server Resource Manager.

8. In the Add Roles and Features dialog box hat pops up, click Add Features and
then click Next.

9. Click Next for rest of the screens, and then click Install.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
49 | P a g e
10. When the installation is finished, click Close and restart the server.

CONFIGURE QUOTA TEMPLATES

11. Now that File Server Resource Manager role is installed, it will be configure by
clicking on Tools and selecting File Server Resource Manager from the drop
down list.

12. Expand Quota Management in the left-hand pane and click on Quota
Templates.

13. Under the Actions pane (far right) click Create Quota Template.

14. Enter a template name, such as Faculty Home Directory Limits or Student Home
Directory Limits.

15. Enter the limit size and select either Hard quota or Soft quota.

16. Email notifications to either the user or network administrative staff can be
enabled by clicking on the Add button in the Notification threshold section.

17. Click OK to save the Quota Template.


Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
50 | P a g e
APPLY QUOTA TEMPLATE TO DIRECTORY

18. Under the Quota Management section of the left pane, click on Quotas.

19. Right-click Quotas and select Create Quota.

20. Click the Browse button to select the directory that you wish to apply the quota
limit to.

21. Select the following quota type:

Create quota on path – This will apply the space limitation to ALL files and
folders within the parent directory.

**This option should be used for folders such as Yearbook Staff or Multimedia
class where multiple users save to the same folder.

Auto apply template and create quotas on existing and new subfolders – This
will apply the template to the subfolders within the parent folder.

**This option should be used for applying limits on home directory folders and
is automatically applied to any new folders created. This method would allow
you to have your Faculty-Homes and Student-Homes parent folders both on
their own volume or you can also place them on the Data volume with the rest
of your network shares.

22. Select the Quota Template to be used from the drop-down menu under Derive
properties from this quota template and click Create.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
51 | P a g e
FINE-GRAINED PASSWORD POLICIES (ACT-723)

One of the nice features introduced in Windows Server 2012 AD DS is the ability to
configure fine grained password policies through GUI.

Fine grained password policies allow Network Administrators to configure multiple


password policies within a single domain which can be used to apply different
restrictions for password and account lockout policies to different sets of users and
groups.

Policy Name Faculty Password Policy Students Password Policy


Precedence 1 1
Group Name Faculty/Staff Students
Minimum Password Length 8 8
Enforce Password History 5 (Recommended) 5 (Recommended)
Minimum Password Age 1 1
Maximum Password Age 90 180

To configure fine-grained password policies as per the table above (ACT723 - K12 State
Security Policies), use the following steps:

1. Launch Server Manager.

2. Click on Tools and select Active Directory Administrative Center (ADAC) from
the drop down list.

3. When ADAC opens, change the view from List view to Tree View

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
52 | P a g e
4. Expand the Domain name and navigate to System and then Password Settings
Container.

5. Right-click on Password Settings Container, select New and then Password


Settings.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
53 | P a g e
6. Specify the password policy settings for each of the required policies referenced
in table.

7. After the attributes for the password policy has been filled in, click Add to link
created policy to the required security group and click on OK twice.

**Repeat steps 5 – 7 for Students password policy


Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
54 | P a g e
SOME COMMON K12 GROUP POLICIES
RETAIN SECURITY EVENT LOG FOR 90 DAYS GROUP POLICY

1. Launch Server Manager.

2. Click on Tools and select Group Policy Management from the drop down list.

3. Expand Forest: yourdomain.local.

4. Expand Domains and then expand yourdomain.local and navigate to Default


Domain Policy.

5. Right-click the Default Domain Policy and click Edit.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
55 | P a g e
6. Expand Computer Configuration > Policies > Windows Settings > Security
Settings and select Event Log.

7. Set the policy setting Retain Security Log to 90 days. You will automatically
prompted to change the Retention method to days. Click OK.

8. Set the Maximum Security Log Size to 131072 kilobytes (128MB).

AUTO-BACKUP AND CLEAR EVENT LOGS (AT LEAST WINDOWS VISTA)

9. Expand Computer Configuration > Policies > Administrative Templates >


Windows Components > Event Log Service and select Security.

10. Enable the Backup log automatically when full setting.

11. Close the Group Policy Management Editor.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
56 | P a g e
SECURITY EVENT AUDITING – SECURITY EVENT LOG CONTENTS

1. Launch Server Manager.

2. Click on Tools and select Group Policy Management from the drop down list.

3. Expand Forest: yourdomain.local.

4. Expand Domains and then expand yourdomain.local and navigate to Default


Domain Policy.

5. Right-click the Default Domain Policy and click Edit.

6. Expand Computer Configuration > Policies > Windows Settings > Security
Settings > Local Policies and select Audit Policy.

7. Enable auditing for the following Policy Settings:

a. Audit Account Logon Events – (Success AND Failure)


b. Audit Account Management – (Success)
c. Audit logon event – (Success AND Failure)
d. Audit policy change – (Success)

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
57 | P a g e
8. Close the Group Policy Management Editor.

GROUP POLICY FOR LOGON BANNER

1. Launch Server Manager.

2. Click on Tools and select Group Policy Management from the drop down list.

3. Expand Forest: yourdomain.local.

4. Expand Domains and then expand yourdomain.local and navigate to Default


Domain Policy.

5. Right-click the Default Domain Policy and click Edit.

6. Expand Computer Configuration > Policies > Windows Settings > Security
Settings > Local Policies and select Security Options.

7. Navigate to the following options and Enable them:

a. Interactive logon: Message text for users attempting to log on.


b. Interactive logon: Message title for users attempting to log on.

8. Close the Group Policy Management Editor.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
58 | P a g e
LOCKING SCREEN SAVER GROUP POLICY

1. Launch Server Manager.

2. Click on Tools and select Group Policy Management from the drop down list.

3. Expand Forest: yourdomain.local.

4. Expand Domains and then expand yourdomain.local and navigate to Default


Domain Policy.

5. Right-click the Default Domain Policy and click Edit.

6. Expand User Configuration > Policies > Administrative Templates > Control
Panel and select Personalization.

7. Set the Enable Screen Saver policy to Enabled.

8. Set the Password Protect the Screen Saver policy to Enabled.

9. Set the Screen Saver timeout to Enabled and to a recommended time of 900
seconds (15 minutes).

10. Close the Group Policy Management Editor.


Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
59 | P a g e
FOLDER REDIRECTION GROUP POLICY

1. Launch Server Manager.

2. Click on Tools and select Group Policy Management from the drop down list.

3. Expand Forest: yourdomain.local.

4. Expand Domains and then expand yourdomain.local and navigate to Group


Policy Objects.

5. Right-click on the Group Policy Objects and then select New.

6. Name the new group policy Folder Redirection Policy and click OK.

7. Expand Group Policy Objects. Right-click on the newly created Folder


Redirection Policy and click Edit to open the Group Policy Editor.

8. Expand User Configuration > Policies > Windows Settings and select Folder
Redirection.

9. Right click on Documents and click Properties.

10. Change the setting to Basic – Redirect everyone’s folder to the same
location and set the Target folder location to Redirect to the user’s home
directory.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
60 | P a g e
11. Click the Settings tab and check the box Also apply redirection policy to
Windows 2000, Windows 2000 Server…

12. Click Apply and if prompted to also redirect Pictures, Music, etc. to the Home
Directory, click Yes. Click OK.

13. Close the Group Policy Management Editor.

RESTRICT COMPUTERS TO FACULTY USE ONLY

This policy can be used to restrict access for students to log on to faculty machines. This
policy will be based off of the Faculty User group and can be adjusted to meet the group
of users that meets your needs.

1. Launch Server Manager.

2. Click on Tools and select Active Directory Users and Computers from the
drop down list.

3. Create a security group called Faculty Use Only Computers under Custom
Security Groups Organization Unit (OU).

4. Under Server Manager, click on Tools and select Group Policy Management
from the drop down list.
Arkansas Department of Information Systems – APSCN LAN Support
Printed on 5/14/2014
61 | P a g e
5. Expand Forest: yourdomain.local.

6. Expand Domains and then expand yourdomain.local and navigate to Group


Policy Objects.

7. Right-click on the Group Policy Objects and then select New.

8. Name the new group policy Faculty Use Only Computers and click OK.

9. Expand Group Policy Objects and select the newly created Faculty Use Only
Computers policy.

10. In the right-hand pane, click on the Scope tab. Under Security Filtering list,
select Authenticated Users and then click the Remove button.

11. Click the Add button, enter the group name Faculty Use Only Computers and
then click the OK.

12. Right-click on the newly created Faculty Use Only Computers policy and
select Edit.

13. Expand Computer Configuration > Policies > Windows Settings > Security
Settings > Local Policies and select User Rights Assignment.

14. In the right-hand window, double-click on Allow log on locally.

15. Check the box for Define these policy settings.

16. Click the Add User or Group button and add Domain Admins,
Administrators, and Faculty to the list. Click Apply and OK.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
62 | P a g e
17. Close the Group Policy Management Editor and link the policy to Faculty
Workstations OU.

**Once this policy is created and applied, add computers to the Faculty Use
Only Computers security group to apply the policy. A reboot is required
after the computer is added to and removed from the group to
enforce/remove the policy.

REFRESH GROUP POLICY SETTINGS WITH GPUPDATE.EXE

Syntax
Gpupdate [/target:{computer|user}] [/force] [/wait:value] [/logoff] [/boot]

Parameters
/target:{computer|user}
Processes only the computer settings or the current user settings. By default,
both the computer settings and the user settings are processed.
/force
Ignores all processing optimizations and reapplies all settings. The Group Policy
engine on the client tracks versions of the GPOs that are applied to the user and
computer. By default, if none of the GPO versions change and the list of GPOs
remains the same, the Group Policy engine will not reprocess policy. This option
overrides this optimization and forces the Group Policy engine to reprocess all
policy information.
/wait:value
Number of seconds that policy processing waits to finish. The default is 600
seconds. 0 means "no wait"; -1 means "wait indefinitely."

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
63 | P a g e
/logoff
Logs off after the refresh has completed. This is required for those Group Policy
client-side extensions that do not process on a background refresh cycle but that
do process when the user logs on, such as user Software Installation and Folder
Redirection. This option has no effect if there are no extensions called that
require the user to log off.
/boot
Restarts the computer after the refresh has completed. This is required for those
Group Policy client-side extensions that do not process on a background refresh
cycle but that do process when the computer starts up, such as computer
Software Installation. This option has no effect if there are no extensions called
that require the computer to be restarted.
/?
Displays help at the command prompt.

Examples
The following examples show how you can use the gpupdate command:

• gpupdate
• gpupdate /target:computer
• gpupdate /force /wait:100
• gpupdate /boot

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
64 | P a g e
UPDATE GROUP POLICY SETTINGS FROM GROUP POLICY MANAGEMENT CONSOLE

A new feature introduced with Windows Server 2012 is that from within the Group
Policy Management Console. The update process also notifies how many computer
objects will be affected by the update operation.

This can be accomplished by Right-clicking an Active Directory Organization Unit (OU)


select Group Policy Update.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
65 | P a g e
TROUBLESHOOTING WINDOWS SERVER 2012
DISABLING THE SHUTDOWN EVENT TRACKER

To turn off the Shutdown Event Tracker, navigate to the following key in your registry:

HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Reliability

**Creation of the Reliability is required

Create a new DWORD with the following values:

Value Name: ShutdownReasonOn


Value: 0 (HEX)

**The change will take place immediately no reboot is required.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
66 | P a g e
SET TIME SOURCE TO DIS

• First, locate your PDC Server. Open command prompt on any server and type:

netdom /query fsmo

• Log in to your PDC Server and open the command prompt.

• Stop the W32Time service

net stop w32time

• Configure the external time sources, type:

w32tm /config /syncfromflags:manual /manualpeerlist:”165.29.1.11,165.29.1.12”

• Make your PDC a reliable time source for the clients. Type:

w32tm /config /reliable:yes

• Start the w32time service:

net start w32time

• The windows time service should begin synchronizing the time. You can check
the external NTP servers in the time configuration by typing:

w32tm /query /configuration

**Check the Event Viewer for any errors.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
67 | P a g e
ACTIVE DIRECTORY MAINTENANCE
DELETE DEAD/TOMB-STONED DOMAIN CONTROLLER FROM ACTIVE DIRECTORY

1. From another Domain Controller within the domain, open a command prompt
and type ADSIEDIT.MSC

2. In the ADSI Edit window, click Action > Connect To.

3. In the Select a Well Known Naming Context drop-down menu, select


Configuration, and click OK.

REMOVING THE SERVER FROM THE ACTIVE DIRECTORY SITE

4. Navigate to
Configuration\CN=Configuration\CN=Sites\CN=<SiteName>\CN=Servers\CN=<Se
rverName>, where <SiteName> and <ServerName> correstpond to the location
of the dead domain controller.

5. Right-Click on CN=NTDS Settings and click Delete, when prompted to delete the
container and everything in it, click Yes.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
68 | P a g e
6. Right-Click CN=Server Name that you are removing and click Delete. Click Yes to
confirm the delete.

REMOVING THE SERVER FROM THE FILE REPLICATION SERVICE

7. In the ADSI Edit window, click on ADSI Edit in the left-hand pane.

8. Click Action > Connect To.

9. In the Select a Well Known Naming Context drop-down menu, select Default
naming context, and click OK.

10. Navigate to Configuration\CN=System\CN=File Replication Service\CN=Domain


System Volume(SYSVOL share)\CN=<ServerName> where <ServerName>
correstpond to the location of the dead domain controller.

11. Right-click the CN=<ServerName>, and select Delete.

12. Click Yes to delete the object.

REMOVING THE SERVER FROM ACTIVE DIRECTORY SITES AND SERVICES

13. Open Active Directory Sites and Services.

14. Expand Sites.

15. Expand the AD Site that the dead Domain Controller was a member of.

16. Expand the dead Domain Controller.

17. Right-click NTDS Settings and click Delete.

18. When prompted, click Yes.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
69 | P a g e
19. You will receive the Confirm Subtree Deletion box as shown below. Check the
Use Delete Subtree server control option and click Yes.

20. Close Active Directory Sites and Services.

REMOVING THE SERVER FROM ACTIVE DIRECTORY USERS AND COMPUTERS

21. Open Active Directory Users & Computer.

22. Browse to the Domain Controller Computer object, right-click and select Delete.

23. When prompted to confirm the deletion, select Yes.

24. Another confirmation box will pop up.

25. Check the box next to “This Domain Controller is permanent...” and click Delete.

26. Close Active Directory Users & Computers

**DNS may need to be verified to make sure that there are not any records tied to the
server that was removed from the domain.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
70 | P a g e
MANUALLY SEIZE FSMO ROLES

To seize the FSMO roles by using the Ntdsutil utility, follow these steps:

• Log on to a Windows Server-based member computer or Domain controller that


is located in the forest where FSMO roles are being seized.

**It is recommend that you log on to the domain controller that you are assigning
FSMO roles to.

**The logged-on user should be a member of the Enterprise Administrators group to


transfer schema or domain naming master roles, or a member of the Domain
Administrators group of the domain where the PDC emulator, RID master and the
Infrastructure master roles are being transferred.

• Click Start, click Run, type ntdsutil in the Open box, and then click OK.

• Type roles, and then press ENTER.

• Type connections, and then press ENTER.

• Type connect to server servername, and then press ENTER.

**Servername is the name of the domain controller FSMO role is being transferred to.

• At the server connections prompt, type q, and then press ENTER.

• Type seize role, where role is the role that you want to seize.

**For a list of roles that you can seize, type ? at the fsmo maintenance prompt, and
then press ENTER, or see the list of roles at the end of this section. For example, to
seize the RID master role, type seize rid master. The one exception is for the PDC
emulator role, whose syntax is seize pdc, not seize pdc emulator.

• At the fsmo maintenance prompt, type q, and then press ENTER.

• Type q, and then press ENTER to quit the Ntdsutil utility.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
71 | P a g e
HOW TO RESET THE DIRECTORY SERVICES RESTORE MODE ADMINISTRATOR ACCOUNT PASSWORD

24. Click, Start, click Run, type ntdsutil, and then click OK.

25. At the Ntdsutil command prompt, type set dsrm password.

26. At the DSRM command prompt, type one of the following lines:

a. To reset the password on the server on which you are working, type:

reset password on server null

**The null variable assumes that the DSRM password is being reset on the local
computer. Type the new password when you are prompted.

**No characters appear while you type the password.

b. To reset the password for another server, type:

reset password on server servername

**where servername is the DNS name for the server on which you are resetting the
DSRM password.

c. Type the new password when you are prompted.

27. At the DSRM command prompt, type q.

28. At the Ntdsutil command prompt, type q to exit.

http://support.microsoft.com/default.aspx?scid=kb;en-us;322672

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
72 | P a g e
Active Directory, Microsoft, MS-DOS, Visual Basic, Visual Studio, Windows,
Windows NT, Active Directory, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.

This product contains graphics filter software; this software is based, in part, on the
work of the Independent JPEG Group.

All other trademarks are property of their respective owners.

Arkansas Department of Information Systems – APSCN LAN Support


Printed on 5/14/2014
73 | P a g e

You might also like