Sei sulla pagina 1di 8

Describe how to use DHCP, DNS, WINS Services and Active Directory. Network Services in each one.

How to use the configurations in windows server 2008? Their different types of network services and there are a few that are going to be named. The first one is call DHCP, which is dynamic host configuration protocol. This is a protocol for assigning different dynamic IP addresses to different hardware devices on a network. The DHCP also accepts a complex different amount of static and dynamic IPaddresses. There a few different types of reasons why it is important to have a DHCP network system. When you have a DHCP on a network it basically saves you from wasting time, when you are trying to configure the IP address and making things work together. If you did not have a DHCP enabled on your server this would just have to be done every-time you had to change servers. Every device on a TCP/IP-based network must have a unique unicast IP address to access the network and its resources. Without DHCP, IP addresses must be configured manually for new computers or computers that are moved from one subnet to another, and manually reclaimed for computers that are removed from the network. There are issues that have come up when a user uses a DHCP server option; there is more of a security flaws that have been pin pointed out. How to use DNS? The first thing is that DNS stands for domain name server. The DNS has an important job and that is to translate the websites that we visit and then change them into an IP address. For example if you type in a website robertmorris.edu it might translate it to 195.205.232.4. Back in the 80's DNS came to out when servers were being over ran to much

information was being placed on them and requiring the servers to perform to much work. Each site that needed to resolve host names on the network downloaded this file. As the number of hosts on the Internet grew, the traffic generated by the update process increased, as well as the size of the HOSTS file. The need for a new system, which would offer features such as scalability, decentralized administration, support for various data types, became more and more obvious. Domain names consist of individual labels separated by dots, for example: mydomain.fake.com. The first name of a domain is called Root Domain which has marks just like the example is gave you. Through Microsoftits stated to be one of the top tree domains that represents an unnamed level. The second is called top-leveldomain, which is used to name an organization that is using that specific domain. Something similar to when you type out the website it gives you a specific IP address that belongs to that domain, its almost the same with this top level domain but instead depending where its located it will give you that option, for example if you go to Google in the United States its google.com but if you were to go and search for Google in Mexico it would be different. It would be google.mx and that thing at the end is what a top level domain is.The Domain Name System is implemented as a hierarchical and distributed database containing various types of data, including host names and domain names. The names in a DNS database form a hierarchical tree structure called the domain namespace. Domain names consist of individual labels separated by dots, for example.mydomain.microsoft.com dots. A Fully Qualified Domain Name (FQDN) uniquely identifies the hosts position within the DNS hierarchical tree by specifying a list of names separated by dots in the

path from the referenced host to the root. The next figure shows an example of a DNS tree with a host called my domain within the microsoft.com. Domain the FQDN for the host would be mydomain.microsoft.com. The DNS domain namespace, as shown in the following figure, is based on the concept of a tree of named domains. Each level of the tree can represent either a branch or a leaf of the tree. A branch is a level where more than one name is used to identify a collection of named resources. A leaf represents a single name used once at that level to indicate a specific resource.

How to use WINS services? Although NetBIOS and NetBIOS names can be used with network protocols other than TCP/IP, WINS was designed specifically to support NetBIOS over TCP/IP (NetBT). WINS required for any environment in which users access resources that have NetBIOS names. If you do not use WINS in such a network, you cannot connect to a remote network resource by using its NetBIOS name unless you use Lmhosts files, and you might be unable to establish file and print sharing connections.

How to use Active Directory? Active Directory stores information about network components. Clients find objects within its namespace. The term namespace (also known as console tree) refers to the area in which a network component can be located. For example, the table of contents of this book forms a namespace in which chapters can be

resolved to page numbers. DNS is a namespace that resolves host names to IP addresses. Active Directory provides a namespace for resolving the names of network objects to the objects themselves. Active Directory can resolve a wide range of objects, including users, systems, and services on a network. Active Directory tracks are considered an object. An object is any user, system, resource, or service tracked within Active Directory. The generic term object is used because Active Directory is capable of tracking a variety of items, and many objects can share common attributes.Attributes describe objects in Active Directory. For example, all User objects share attributes to store a user name, full name, and description. Systems are also objects, but they have a separate set of attributes that include a host name, an IP address, and a location. The set of attributes available for any particular object type is called a schema. The schema makes object classes different from each other. Schema information is actually stored within Active Directory, which allows administrators to add attributes to object classes and have them distributed across the network to all corners of the domain, without restarting any domain controllers.A container is a special type of object used to organize Active Directory. It does not represent anything physical, like a user or a system. Instead, it is used to group other objects. Container objects can be nested within other containers.Each object in an Active Directory has a name. These are not the names that you are accustomed to, like "Tony" or "Eric." They are LDAP distinguished names. LDAP distinguished names are complicated, but they allow any object within a directory to be identified uniquely regardless of its type. My distinguished name on the Microsoft network is "/O=Internet/DC=COM/DC=Microsoft/ DC=MSPress/CN=Users/CN=Tony

Northrup"but you can call me Tony. The term tree is used to describe a set of objects within Active Directory. When containers and objects are combined hierarchically, they tend to form brancheshence the term. A related term is contiguous subtree, which refers to an unbroken branch of the tree.Continuing the tree metaphor, the term forest describes trees that are not part of the same namespace but that share a common schema, configuration, and global catalog. Trees in a forest all trust each other, so objects in these trees are available to all users if the security allows it. Organizations that are divided into multiple domains should group the trees into a single forest.A site is a geographical location, as defined within Active Directory. Sites correspond to logical IP subnets, and as such, they can be used by applications to locate the closest server on a network. Using site information from Active Directory can profoundly reduce the traffic on wide area networks.

Security systems in each OS this includes talking about permissions rights and tasks. When you begin the process of installing any type of operating system, the thought that needs to come into mind is that all the following requirements stated below should be taken into consideration. The first step that should be followed in the process of installing an operating system is making sure that all patches are accounted for and installed.PATCHES. The second step process we believe should be followed is checking and verifying that all user account security is taken into consideration. This means that the person whom is going to be using the accounts can be trusted in everything that is worked on and handled in the account process. USER ACCOUUNT.

http://www.stanford.edu/group/security/securecomputing/xp.html. PAGES used.

The third process which we believe is an important procedure to follow is checking to see what applications and network services are not necessarily important can be disabled. This means searching through the operating system using MSCONFIG to disable the services. NETWORK SERVICES. The third process we can follow is installing AND CONFIGURE NECESSARY APPLICATIONS AND NETWORK SERVICES. The fourth process we discovered after hours of research is that configuring system logging to record significant events. CONFIGURE SYSTEM LOGGING TO RECORD SIGNIFICANT EVENTS. The fifth thing that we need to take into consideration is similar to the first step, taking into considerations that updates needed to be done. This means that updating all the patches and applications need to be updated. If there ever happens to be security breach in the system all the applications and patches will be another wall of security. This is similar to when you have an anti-virus on your pc, in order for your pc to be protected from all the latest viruses and spyware the latest definitions need to be downloaded. http://www.stanford.edu/group/security/securecomputing/pc_practices.html http://web.nvd.nist.gov/view/ncp/repository http://www.slideshare.net/waseem.akhtar/chapter14-windows-server-2003-securityfeatures WINDWOS SERVER 2003 SECURITY FEATURES. There are five broad categories of security that need to be taken into consideration.

Authentications access control, encryption, security policies, service packs and hot fixes. The access control feature is a resource that is used in order to secure files, folders, and printers. When using encryption in an operating system you have to be making sure that you use EFS for storing on local NTFS volumes. There are many times when people believe that when you are downloading a hot fix for your pc that it will fix and entire issue and that is not the case but in reality a service pack is needed to be downloaded from Microsoft.com. This not only is a secure website to download information from but its a trusted website. There are times when we were searching for downloadable items from google.com for our project and it lead us to a fraudulent website that was not real, and could potentially harm our servers. This is very important to follow proper procedures, when you are working for a large corporation in the future. For example, if you happen to land a job for Microsoft and in charge of handling their servers, they would not be very happy with your choice in installing patches from a non legit website. This will potentially cause humungous problems throughout the entire company and cause you to lose your job. In windows server 2003 there are tools that are provided when using this server that manage the configurations properly. It is called (Security Configuration Manager Tools). There are key components that are provided in SCMT and what is provided is security templates, security settings in group policy objects, security configuration and analysis tool, SECEDIT command-line tool.

Potrebbero piacerti anche