Sunteți pe pagina 1din 14

Windows Server 2008

An Introductory Overview

Lori M. Sanders
Managing Senior Partner
iSolve Consulting Group

1-800-843-8733
www.learningtree.ca

© 2007 Learning Tree International. All Rights Reserved.


LEARNING TREE INTERNATIONAL White Paper

T A B L E O F C O N T E N T S

I. Introduction . . . . . . . . . . . . . . . . . . 1 I. Introduction
II. Windows Server 2008 Family 2
As the world awaits the launch of another Microsoft
III. Security Enhancements 2 operating system, administrators, managers and
professionals are asking, “Do we really need it?”
• Identity and Access Control
in 2008 . . . . . . . . . . . . . . . . . . . . . . . . 2 The answer to that question is: It depends on your
– Active Directory Federation organization’s needs and goals. One way to determine
Services (ADFS) . . . . . . . . . . . . . . . . 2 whether Windows Server 2008 is worth spending time,
– Active Directory Rights energy and corporate budget on is to learn what the
Management Services (AD RMS) . . . 3 new operating system can do for you. There are many
• Network Access Protection (NAP) . . . . 3 interesting things to talk about in this product, and the
• BitLocker Drive Encryption . . . . . . . . . 4 purpose of this White Paper is to give you an overview
• Windows Server Core Deployments . . . 4 of the most important new or improved features. When
you finish reading the Paper, you will have a good idea
• Read-Only Domain Controllers
(RODC). . . . . . . . . . . . . . . . . . . . . . . . 5 of what Windows Server 2008 offers and it can be used
in your organization. You will also find additional
• Domain Password Policy Changes. . . . 5
resources and Web links at the end.
• Auditing Enhancements . . . . . . . . . . . 5
As a longtime server administrator, I see three areas
IV. Maintaining High Availability . . . . 5 of functional improvement in Windows Server 2008—
• Failover Clusters . . . . . . . . . . . . . . . . . 5 security, manageability, and availability. Although
some of the new tools and capabilities available offer
• Network Load Balancing (NLB) . . . . . 6
benefit in more than one area, I will frame them within
• Distributed File System (DFS) . . . . . . 6
the context of these three boundaries.
• Virtualization . . . . . . . . . . . . . . . . . . . 7
Many of the components we will cover in the next
• Windows Server Backup . . . . . . . . . . . 8
pages are new to the product line, others first became
• Restartable AD Services . . . . . . . . . . . 8 available in Windows Server 2003 R2. Some are simply
• Terminal Services . . . . . . . . . . . . . . . . 9 refinements and rebranding of existing Windows 2000,
Windows Server 2003 or Windows Vista capabilities. In
V. Manageability . . . . . . . . . . . . . . . . 9 all cases though, I think you will find this generation of
• Server Manager . . . . . . . . . . . . . . . . . 9 Microsoft Server easier to deploy, manage and maintain
• PowerShell . . . . . . . . . . . . . . . . . . . . 11 than any of its predecessors. So let’s get started!
• Windows Deployment Services
(WDS) . . . . . . . . . . . . . . . . . . . . . . . . 11
• Log and Event Consolidation . . . . . . . 11

VI. Conclusion . . . . . . . . . . . . . . . . . . 11
Books and Web Sites . . . . . . . . . . . . . . 12
About Learning Tree International . . . . 13
About the Author . . . . . . . . . . . . . . . . . 13

1-800-843-8733 • www.learningtree.ca
© 2007 Learning Tree International. All Rights Reserved
Windows Server 2008 – An Introductory Overview 1
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

II. Windows Server 2008 Family III. Security Enhancements


Before diving into product improvements, let’s have Let’s begin our discussion of new capabilities with a
a quick look at the entire product line. The Windows topic near and dear to every IT professional’s heart:
Server 2008 family looks much like the Windows keeping our servers secure and our corporate data
Server 2003 collection of products. You have four private. Windows Server 2008 has implemented
major versions available for purchase. They are Web several new features and provided improvements to
Server, Standard, Enterprise and DataCenter editions. existing features that will assist in achieving this
Each of these editions is available for either 32 or 64 goal. Many of these features will someday end up as
bit platforms. DataCenter will also be available for individual chapters in a security textbook, but we will
the IA-64 architecture. discuss them at a higher level. Again, at the end of the
As with Windows Server 2003, the product you choose Paper, you will find a list of hyperlinks and resources to
depends on the size of your organization and the deepen your knowledge of any of the security features
functionality that you want to employ. Below we have mentioned here.
a comparison of some of the basic features included in • Identity and Access Control in 2008
each server edition. Naturally, until the product is actually In any organization, one of the first security tasks we
released to manufacturing (RTM) early next year, nothing need to undertake is to establish and secure a perimeter
is written in stone. And, as mentioned earlier, if you are around our network. In Active Directory, we do this by
familiar with the Windows Server 2003 product line, you delineating domains and forest structures, and making
will see that the new server product line is marketed sure that everyone who is allowed into our perimeter
with similar organizational limits in mind. has a valid sign-on. This is a relatively simple process,
• Standard Edition—Provides fundamental server as long as everyone who needs access to your data is
functionality; intended for use in small to medium- within this perimeter. But what happens when you
sized organizations; includes key server roles and have customers, suppliers or partners that are outside
features; and supports full or server core only your forest? In the past, that situation could be a
installations. Can be used as an Active Directory management and security nightmare. Microsoft has
(AD) domain controller (DC). implemented two technologies to assist with maintaining
sign-on and resource security when using extranets:
• Enterprise Edition—Same functionality as
the Standard Edition, plus technologies that are – Active Directory Federation Services (ADFS)
generally more important in larger enterprises such ADFS was first introduced in Windows Server 2003
as Active Directory Federation Services (ADFS) R2. In Windows Server 2008, ADFS is implemented
and Failover Clustering. as a server role that is capable of providing identity
• DataCenter Edition—Same functionality management for extranet customers that are called
as the Enterprise edition, plus unlimited federation partners. ADFS allows browser-based
virtualization rights and support for robust servers clients to access Internet applications even when
with large amounts of RAM and a larger number the user account and application are located in
of processors. separate forests. ADFS allows a user to authenticate
to multiple Web applications using a single sign-on.
• Web Server 2008—Like Web Server 2003, a ADFS uses a new type of trust, called a federation
limited version of the operating system designed to trust, to securely share user identity and rights
be used as a Web and application server only; has a information between federation partners.
very limited set of server roles; cannot be used as a
Active Directory server; does not have the option to How is this different than simply creating an external
install just the server core; and supports less RAM or forest trust between the two organizations? If
and fewer processors. we create such a trust, the entire external domain

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 2
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

is included in the trust model; however, if I employ allow administrators to control, and even quarantine,
ADFS, I can specify a trusted subset of individuals in machines that don’t meet the minimum requirements
that remote domain that will be allowed access inside for the network. Non-compliant clients can be denied
my perimeter. In addition, using policies, I can set up access to the network or directed to a remediation
additional conditions and rules for this federated trust. server’s network for immediate repair.

– Active Directory Rights Management Services There are five enforcement mechanisms for NAP:
(AD RMS) • DHCP
A second server role employed to protect information • IPSec
is AD RMS. This is Windows Server 2003 Rights • VPN
Management Services, rebranded and improved. AD • 802.1x
RMS is a technology aimed at controlling data access • TS Gateway
rather than user identity. To use AD RMS, you must NAP requires components on both network clients and
install the server role, which handles certificates and servers. The server components consist of the Network
licensing, and you must employ AD RMS clients as Policy Server (NPS), the System Health Validators (SHVs)
well as a database server. Currently, only Vista has a and the Quarantine Server (QS). The NPS is the heart
native AD RMS client. Once in place, data authors set of the system where administrators create policies that
persistent usage rules on information and data sources specify the organization’s health requirements for full
that will remain attached to the data no matter where network participation by clients. When a client attempts
it is moved—both inside and outside the organization. to access the network, the SHVs determine whether
they meet the basic requirements specified in the
This technology augments the traditional Access
policies. If a client is found non-compliant, it is sent to a
Control List ACL protection by allowing security
remediation network where QSs will make it compliant
masks such as “read only – no printing” to be config-
allowing for full network access. The actual process may
ured on a resource and have that security enforced
differ based on which enforcement methods are used
even when the document is e-mailed to recipients
and what exceptions have been created for machines
outside the organization. Applications, including
that are not NAP client enabled or need to be exempted
custom and third party, must be AD RMS enabled.
from NAP screening.
Once done, any document, drawing, e-mail or other
For a machine to be screened by NAP, it must have a
product of the application can have AD RMS security
NAP client installed. Currently, the only embedded NAP
embedded in the information. Developers can create
clients are in Windows Vista and Windows Server 2008.
customized AD RMS applications using the AD RMS
Microsoft is developing a NAP client for XP and expects
software development kit.
it to be released about the same time as Windows Server
• Network Access Protection (NAP) 2008 RTM. The NAP client consists of three layers: the
How secure is your server? The answer really is: only System Health Agents (SHAs), Quarantine Agent (QA)
as secure as your network clients. For example, what and the Enforcement Clients (ECs). SHAs check for
if a client machine isn’t running a virus scanner? Do compliance with a particular requirement, such as a
you want to allow such a highly vulnerable laptop to particular patch or a certain level of AV software. A client
communicate with your corporate servers and pass on may have multiple SHAs present as each one is directed
a virus or spyware? To combat this problem, Windows at a particular health requirement. The QA takes the
Server 2008 now offers Network Access Protection status from the SHAs and compiles a list of results which
(NAP). NAP allows administrators to specify base it forwards to the EC. The ECs then determine whether
“health” requirements, such as minimum software the client is granted full or partial network access based
requirements, security update levels and other security on the SHA outcomes. There are embedded ECs for each
settings that must be met before a client is allowed to of the enforcement mechanisms mentioned earlier, and
fully access the corporate network. These NAP policies ISVs are being encouraged to come up with their own
custom ECs for installation.

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 3
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

• BitLocker Drive Encryption The question is, why did Microsoft include this installation
Unlike file encryption (EFS), which can be used to option? What do you gain from doing a core-only
encrypt folders and files, BitLocker encrypts the entire install? There are several answers, but probably the
drive, including the swap and hibernation files. This most important is: increased security. By reducing the
technology foils the data thief who tries to boot the components installed and the services that are running,
computer to an alternate operating system where Microsoft has automatically reduced the attack surface
NTFS permissions would not be enforced, use other of your server. There aren’t as many security holes to
tools to read the drive’s information, or attempt to exploit because the elements that would allow attacks
access the data offline. BitLocker can be of value to simply aren’t in place. Of course, the core architectural
organizations that are concerned about the security components of the OS are still there—the kernel,
of their data traveling outside the company on laptops Hardware Abstraction Layer (HAL) and drivers.
and for any organization required to maintain higher
Beyond security improvement, the Server Core install
than usual data security due to regulatory requirements
also gives the benefits of a smaller system footprint,
such as HIPAA or Sarbanes-Oxley compliance. It is
reduced administration and decreased need for software
especially useful in the server environment when
patching because there are fewer OS components to
servers are located outside the server room or in some
install, configure or patch. Of course, given the command
unsecure location such as a branch office.
line interface, strong experience in commands and
Although BitLocker first became available with certain scripting will be an important skill for Server Core
versions of Windows Vista, the Windows Server 2008 administrators.
implementation has a few key improvements that
When you perform a Server Core install, you lose
make it more usable in a server environment. First,
the ability to install some of the roles and features
the technology has been extended to include any
available with a full installation. And naturally, the roles
locally created internal volume on the machine—not
and features you choose to install must be managed
just the bootable volume. These non-bootable volumes
using ServerManagerCmd.exe—the command line
are referred to as data volumes. Second, security
version of Server Manager.
has been improved by adding a new multifactor
authentication mechanism combining a TPM protected The following is a list of server roles and features that
key, which can be stored on a USB device, and a user- are available for use on a Server Core machine:
generated PIN, both of which must be used before Server Roles Available Features Available
access is granted to the volume. Finally, support for the
Active Directory Domain Services Failover Clustering
Extensible Firmware Interface (EFI) has been included.
Active Directory Lightweight Multipath I/O
• Windows Server Core Deployments Directory Services
When you install Windows Server 2008, you will see DHCP Server Network Load Balancing
that you have a new installation alternative called DNS Server Quality of Service
Server Core. Choosing this option means that only
File Services Removable Storage
the absolutely essential OS components are deployed (including NFS and DFSR) Management
to the machine. Elements that are considered extraneous Print Services SNMP Services
are not installed. The most obvious missing feature is
Streaming Media Services Subsystem for UNIX-based
the GUI. That’s right—Server Core is a primarily a Applications
command line driven administrative interface. There
IIS 7.0 * Telnet Client
are a few GUI-like tools that you can use (such as Task
Windows BitLocker Drive
Manager, regedit.exe and Notepad) but, overall, the Encryption
tools you are used to seeing in Windows are gone—
Windows Server Backup
no Server Manager, no Taskbar, no Start Menu, no
Windows Explorer. WINS Server

*Without .NET framework—Announced at TechEd June 2007

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 4
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

• Read-Only Domain Controllers (RODC) • Auditing Enhancements


Microsoft is marketing RODCs as a new category Administrators have always been able to audit access
of domain controller that can be deployed in environ- to objects for file system and Active Directory objects,
ments where a writable copy of the AD database may but with the dawn of Windows Server 2008, security
be a security liability, such as a branch office where tracking becomes more granular. A new policy
physical security may be less than perfect. If you are category called Directory Service Changes will allow
familiar with the NT 4 concept of a backup domain administrators to capture who made changes to an
controller (BDC), the idea here is similar. The RODC Active Directory object or attribute, when the change
contains the same domain objects and attributes as was made and what the old and new values are. The
a writable domain controller (except passwords); same ability to keep initial and changed values is available
however, as the name implies, RODCs are not able for any changes to the Registry as well. Administrators
to write any changes to the database. When changes will also be able to audit permission changes, network
are required, administrative tools are redirected to a share access and IPSec events.
writable DC elsewhere in the organization. Administra- Like other security events, this tracking is sent to the
tion of a specific RODC can be delegated to any domain security logs and can be consolidated from several
user without having to grant that user administrative machine sources. These logs can be viewed with traditional
rights on other domain controllers. This allows a local Microsoft tools such as Event Viewer or accessed from
user at the branch office to perform administrative third party toolsets. This new level of auditing detail will
tasks on the RODC, such as configuring an application, assist with AD change management tracking as well as
but not have any permissions or rights on any other maintaining regulatory compliance for organizations
DC. This protects the integrity of the data on writable with HIPPA or SOX requirements.
copies of the Active Directory database.

• Domain Password and Account Lockout


IV. Maintaining High Availability
Granularity “Anytime…anywhere.” These two words have become
Although there have been several improvements in the mantra for our industry. Even if the business needs
security policies, one of the most useful (and long are not 24/7/365, the user’s needs often are. Many of the
overdue) is the change made to the domain password technologies you will see deployed with Windows Server
and account lockout functionality. In previous AD 2008 are addressed at meeting such requirements. In the
implementations, a single password policy applied next section, we will discuss the most prominent of these.
to all domain accounts. If domain users required
• Failover Clusters
different levels of password enforcement, such as
One of the fundamental technologies used to create a
separate minimum password lengths or different
high-availability or fault-tolerant environment is server
expiration periods, the only option was to create two
clustering. Clustering refers to a set of independent
domains and then create different password policies
servers that are configured to work together through
in each domain to each group’s specifications. In
physical cabling and cluster management software. If any
Windows Server 2008, different password policies
cluster node (server participant) becomes unavailable,
can be set within a single domain. A new password
another node will automatically take over for the failed
settings object (PSO) holds the password policies.
server. This allows always-on access to business critical
A PSO can then be associated with any group in
applications and data, even through server crashes.
the Active Directory.
In Windows Server 2008, cluster technology has been
rebranded to Failover Clustering. In this generation of
clustering, Microsoft has attempted to make the creation
and management of clusters easier and improve cluster
security and stability. This process begins with the use of

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 5
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

the Cluster Validation Wizard, which lets administrators • Network Load Balancing (NLB)
test node compatibility, check network configuration Network Load Balancing (NLB) technology distributes
for the proposed cluster, and make sure that the storage the network load for applications across multiple
access requirements are met for all the nodes in the servers arranged in an NLB cluster. As the name
cluster. Once set up, cluster management is simplified implies, NLB is useful for large organizations that want
through a new administrative interface. to balance their network traffic across multiple servers,
but it also allows applications to “scale out” when the
Additional clustering improvements include support
demand increases. By adding more servers to the NLB
for GUID Partition Table (GPT) disks which have built
cluster as the workload increases, administrators can
in redundancy, support for large partitions and more
guarantee availability and responsiveness for users of
partitions per disk. A new quorum model, called the
networked applications.
majority quorum model, allows you to be in control
of the quorum configuration. You can configure your Like other features, NLB is not new to Server in 2008,
cluster to use the traditional shared quorum device or but it has had a facelift and now includes the following
majority node models, or create a hybrid model. In improvements:
the new model, even a simple two-node cluster can I. IPv6 Support
survive the loss of the quorum resource disk. Other
II. NDIS 6.0 driver with backwards compatibility
important new storage features include the ability to
use shares (rather than whole disks) as a resource, the III. Support for multiple IP addresses per node
capacity to add additional resources to the quorum enabling administrators to have multiple
while the cluster is running, SAN support, and storage applications hosted on the same NLB cluster
connections that support persistent reservations even when each application requires a
(Fibre Channel, iSCSI, and SAS). dedicated IP address
Improvements in the networking model for clusters • Distributed File System (DFS)
include support for IPv6, removal of legacy dependen- Another availability technology that is not new but has
cies on NetBIOS, DHCP support, and the ability to certainly been improved in Windows Server 2008 is the
have cluster nodes exist on different logical IP subnets. Distributed File System (DFS). DFS has been around for
The most important of these—especially to large, decades in both the UNIX and Microsoft worlds, and
geographically distributed organizations—would be most administrators of complex networks with many
the last. This functionality change allows an enterprise resource servers are big fans of the concept. The problem
to implement GeoClusters (Geographically Dispersed has been that although we love the concept, Microsoft’s
Clusters) without the creation of a VLAN as required implementation of that concept has had issues that made
in earlier generations of Microsoft clustering. To it somewhat difficult to use for highly volatile shares.
complement this change, cluster heartbeat timeouts With Server 2008, many of those issues have either been
are now configurable. resolved or made significantly better. Two major areas of
As with other components, Microsoft’s focus in 2008 improvement are the removal of the 5000 folder limitation
is to simplify the management of servers. In clustering, and the use of a new replication algorithm. But first let’s
talk about the benefits of DFS in general.
we see this focus come to life with the addition of the
new Failover Cluster Management interface, an MMC DFS allows administrators to create a transparent
3.0 console which lets administrators validate, create and network namespace for their users, grafting together
manage clusters through a series of three-step wizards. shared resources from many servers into a single logical

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 6
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

structure. From the user’s perspective, a DFS namespace Active Directory replication topology. In addition, what
appears in their interface as a single file structure with a if you need to add patches or new software to the install
top level folder and subfolders with subfolders (if needed). share? Without DFS, you would have to add it three
Users access the namespace root share just as they would times, once on each distributed server. With DFS, add it
any other network share and, once there, they are able to to one server and it automatically replicates the changes
connect to any of the resources in the structure (as long to the others.
as they have appropriate permissions, of course). This The mechanism that accomplishes that replication
eliminates the need for mapping drives to each shared between alternate targets is one of the most meaningful
resource. Now they can simply map a drive to the improvements in the DFS architecture. NTFRS (used
namespace root share. in Windows 2000 and Windows Server 2003 DFS imple-
Administrators can also reallocate resources on the fly. mentations) has been replaced by DFSR in the new
Let’s say, for example, that a server is reaching the end architecture. What makes this more efficient and network
of its useful life and needs to be retired, but it is a file friendly is the fact that DFSR uses remote differential
server and hosts gigabytes of user data from all over compression. This engine breaks files down into smaller
the company. Moving this data to another server might chunks which are then tracked for changes. When the
require e-mails to many users telling them the new system detects a change to a data block, only those blocks
drive mappings or new logon scripts to perform the that have changed are replicated among alternate targets.
mapping for users. With DFS, administrators can use With NTFRS, the entire file was replicated no matter how
the Distributed File System Manager console and small the change to the file.
specify the new file server as an additional target folder • Virtualization
in the DFS namespace. Then, through the magic of Administrators love virtualization—and they should.
DFS Replication (DFSR), the data on the existing server Virtualization allows administrators to consolidate
can be replicated to the new server automatically. multiple roles on underutilized hardware, isolate functions
Changes between the two data sources will be synchro- into individual virtual environments, perform testing in
nized and administrators can even control the replication a safe environment and remove hardware compatibility
topology, schedule, and bandwidth utilization of these issues from the environment.
replication cycles.
Unfortunately, as of this writing, sources have indicated
One of the major benefits of DFS for geographically that native virtualization will not be deployed when
dispersed organizations becomes apparent when using Windows Server 2008 is released to manufacturing.
site aware clients (Windows 2000 Professional, Windows The current estimate is that the VM components will be
XP and Windows Vista). Imagine that you have a software available as a download 180 days after Server’s RTM date.
installation server in New York and branch offices in We can look at the proposed VMM architecture, but since
Boston and Miami. With only one server, all your the release of product may be up to nine months after
installations for all sites would come through the New the date of this writing, be aware that this scenario may
York server. So…you create two more installation servers, change. For this reason, we will not go into a great deal
one at each branch. Now we are getting local installations, of detail about the planned implementation of this
but what if the Boston install server goes down? Where technology. You can count on the fact that the planned
will those clients get their installs from? Well, if they are architecture is a Type 1 hypervisor. Type 1 hypervisors are
AD clients and you are using DFS for your install shares, those that run directly on the system hardware and offer
they will look for the next closest site as defined in your a higher level of virtualization efficiency and security.

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 7
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

Some of the important advancements (over their current • Windows Server Backup
Virtual Server and Virtual PC products) are: Microsoft is the first to admit that Windows Server
Backup is not an enterprise solution to the backup and
• 64-bit operating system support for both restore problems of large organizations. This product is
host and guests deliberately targeted at single server backup in smaller
organizations. Microsoft’s logic is that large organizations
• 64-bit hypervisor requires VM aware hardware— usually employ third party solutions to manage their
such as Intel’s VT and AMD-V processors backup processes. However, in the right environment,
administrators will see that the changes made to the
• Automatic Network Address Translation (NAT),
firewall, and Network Access Protection (NAP) Windows Server Backup component provides a backup
and recovery solution that is much more flexible and
• Dynamic hardware swapping useful for maintaining availability than any previous
version of this tool. The key technological difference
• Assignment of minimum and maximum is that the new system uses the Volume Shadow Copy
allocations of RAM to ensure minimum (VSC) service to perform backups. This means that VSC
performance and limit system hogs take a snapshot of the resource(s) being backed up and
then creates the backup from the snapshot. The benefit
• Adaptable network support, including VLANs,
of this is that a server can be fully backed up while it is
NAT and firewall configuration
running since VSC does not require the system to be
• Virtualization can be managed through GPOs idle when the snapshot is made. In addition, only one
full backup is made. After that, only incrementals are
• Security with support for hardware technologies initiated, thereby saving time and disk storage space.
such as DEP Backups can be made of the entire system, individual
volumes, or a particular folder or file.
• Multicore support for up to eight processors
When the time comes to restore from backup, the
• Virtual servers can be managed with Microsoft Windows recovery environment supports a full or partial
System Center Operations Manager (SCOM) restore. The machine can be booted from DVD, and a
and System Center Virtual Machine Manager bare metal restore (BMR) can be done from the backup
(SCVMM) source—which can be any disk media or network
resource. The only backup media not supported is tape.
• Native management tool will be MMC 3.0 based
• Restartable AD Services
• Disk Access—Guest OS can access local or In the past, certain AD functions, such as authoritative
SAN storage restores and offline defrags required that the DC be
rebooted (sometimes more than once) while these
• Support for PowerShell scripting offline functions were performed. If the DC played
multiple roles in the organization, such as DNS, DHCP
• Virtualization role available on Server Core
and printer server, all these roles were also unavailable
installations
while AD maintenance was being performed through
• Windows Management Instrumentation multiple reboot cycles.
(WMI) support Now in Windows Server 2008, the Active Directory runs
as a service, called Active Directory Directory Service
(AD DS). As such, this service can be stopped and started
like any other service on the machine through MMC
snap-ins, command line or WMIC. This allows other
services to continue to run and service clients while the
AD DS undergoes maintenance.

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 8
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

• Terminal Services – Remote Desktop Connection 6.0


This is definitely one of those topics that could be a whole Users will employ Remote Desktop Connection 6.0
chapter in a Windows Server 2008 book, or maybe even a to connect to Terminal Services in Windows Server
book topic of its own because there is so much new func- 2008. This version is included in Windows Server 2008
tionality embedded in Windows Server 2008’s “ Terminal and Windows Vista. It is also available for Windows
Services”. We will cover the highlights of the major new XP users and Windows Server 2003 users as a free
components here, and then point you to some very good download from Microsoft.
additional resources at the end of this paper.
– Single Sign-On (SSO)
– Terminal Services RemoteApp With SSO, domain users of Terminal Services can
Terminal Services RemoteApp is a new way of log on to a terminal session using their username
presenting terminal services applications to the end and password or a smartcard. They need to do so
user in Windows Server 2008. In previous versions only once. If they initiate another terminal service
of Terminal Services, when the user connected to a session, they are not asked for credentials again.
session, the entire desktop on the remote machine This eliminates the need for the user to repeatedly
was presented to the user by default. With Remote- enter their authentication information and, therefore,
App, only the application is presented to the user. increases their satisfaction with the system.
The remote application launches and runs on the
user’s desktop just as a locally installed application V. Manageability
does. Local drives and printers are automatically One of the administrative trends Microsoft has been
redirected, and the window the application runs in implementing in phases over the past several years is
is resizable, just like any other program window role-based administration of servers. The idea is that a
would be. This improves the user experience, by server has roles to play, such as the DNS server, file server,
integrating the remote application seamlessly with DFS server, Web server or domain controller. Each of
their local desktop. these roles requires certain services to be running, ports
– Terminal Services Gateway to be opened perhaps and security to be configured. In
TS Gateway allows users to connect to terminal Windows Server 2008, role-based administration has
servers and remote desktop workstations that are come of age. When a system is first installed, the server’s
behind the firewall without having to configure a roles and features need to be installed and configured.
VPN connection. The embedded security model is This can be done by using the Initial Configuration Tool
actually more secure than a standard VPN because (ICT) which appears on the first boot of a newly installed
users of TS Gateway are allowed access to a selected server or through a new console called Server Manager.
subset of servers and workstations instead of the No matter which tool you use, the system automatically
entire network like a VPN would allow. installs and configures needed services, opens required
ports and configures security settings for you. In addition
– Terminal Services Web Access to this role/feature configuration task, Server Manager
With TS Web Access, TS RemoteApp applications is the central administrative console for many server man-
can be served to the user in a browser. The user can agement jobs, so we’ll take a deeper look at that new tool.
choose from a list of programs in their browsers
and, when they select an application, a TS session is • Server Manager
started transparently on the terminal server hosting Server Manager is a new MMC console that gives the
the application. For the administrator, Web Access administrator a one-stop tool for managing a server. In
has the same benefits of a regular terminal service addition to the role and feature installation and configura-
application— applications are centrally managed and tion tasks mentioned above, Server Manager can be used
secured on the server. Software does not have to be to remove roles and features. Once you install a role or
maintained on the client workstations. feature, the Server Manager interface automatically adds
the management snap-ins for that role or feature.

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 9
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

Figure 1

As you can see in Figure 1 above, there is a lot more to then launch a local instance of the Server Manager
Server Manager than just configuring roles. If you look program once you are connected to the remote server.
closely at the expanded tree pane, you can see that this
is where you will access the Event logs, use Windows If you are unable to use Remote Desktop for some
System Resource Manager, perform backups, create reason, you can still perform remote management of
performance and reliability reports, configure scheduled many installed server roles by employing the Remote
tasks, manage Windows Firewall…the list goes on and Server Admin Tools (RSAT) from another server—or
on. As I’ve said before, one stop shopping for the in the future (after Vista SP1 is released) from a Vista
administrator! workstation. RSAT is the adminpak.msi for the next
generation of operating systems. RSAT is a feature that
At the time of this writing, Server Manager cannot be
can be installed on Windows Server 2008, but the current
used remotely, nor can its command line interface with
version will not work with Windows Vista or XP. Using
servermanagercmd.exe. In order to use Server Manager
the RSAT is one of the recommended approaches to
on a remote machine, you must use the Remote Desktop
easily manage a remote server core machine.
client to connect to the sever you want to administer,

© 2007 Learning Tree International. All Rights Reserved


Windows Server 2008 – An Introductory Overview 10
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

• PowerShell server to answer client requests for boot images, as well


PowerShell is an interactive command line shell with as a TFTP server. You will need a shared folder for your
an embedded administrative scripting language that image repository. The image repository holds your boot
employs consistent syntax and utilities. PowerShell lets images, installation images, and the files required for
administrators automate repetitive tasks and doesn’t network boots. There is also a server multicast component
require a college degree in programming to learn and and a diagnostics module for enhanced logging. Finally,
use effectively. One of the secrets to this low learning there is a set of management tools for administering
curve is the use of more than 130 standard command images, the WDS server and client computer accounts.
line tools, called cmdlets, that address common admin- For those of you familiar with RIS, notice that I did not
istrative tasks such as managing services, logs, processes mention the Active Directory. No, I didn’t forget. This
and more. On a surprising note, PowerShell does not generation of deployment technology doesn’t require the
require migration of your existing scripts. PowerShell AD. You have to install Transport Server to make it work,
can understand and use data from all Microsoft admin- but it can be done. On the client, there will be a GUI that
istrative data access technologies, such as WMI, ADSI, runs on the Windows PE. The GUI is used to select and
XML, ADO, HTML and COM. install the client image.
• Windows Deployment Services (WDS) • Log and Event Consolidation
Windows Deployment Services (WDS) is the new and This was mentioned a little earlier in our paper, but
improved version of the Remote Installation Services from the manageability standpoint, I think it is important
(RIS) that came with Windows Server 2000 and 2003. enough to be given a section of its own. In Windows
WDS, like RIS, allows you to boot a client machine to Server 2008, you can now combine and track events
the network, retrieve a boot image and then install an from several logs sources even if the logs are on multiple
operating system on that machine—all without you physical systems. This greatly reduces the hassle histori-
having to be present at the client. cally associated with trying to monitor events on multiple
geographically separated machines. Through the use
If you weren’t a big fan of RIS, you may want to take
of subscriptions, events can be consolidated into one
some time to re-evaluate this generation of WDS. This
management interface such as Event Viewer, or third
implementation overcomes several of the common
party tools can be utilized to see the events.
complaints about the RIS architecture. For example,
WDS supports multicasting. Not only can it multicast,
a client can join a multicast deployment that is already VI. Conclusion
in progress and not lose any data. Next, in order to quiet Windows Server 2008 is a powerful base to build your
the ACKs down on the network from the use of con- enterprise architecture on. Many of the new components
nectionless UDP, TFTP windowing is in place. WDS also are going to simplify management and lead to less
supports network boots of x64-based computers with the downtime for your organization’s server architecture. But,
Extensible Firmware Interface (EFI). The client uses the now that you have seen just some of the more important
Windows PE (Pre-installation Environment) system to improvements for Windows Server 2008, I think you can
boot the machine, which gives us an environment with agree that there is a lot to learn as you move into this new
much more functionality than before. WDS supports environment. Although this article is a good start to your
WIM images. And finally, as you will see in the next education, and a good product overview, you will need a
section, some of the burdensome architectural elements deeper level of detail to successfully implement these new
needed for RIS to work are no longer required for WDS. features. The following page shows is a list of books and
Web sites that you can use to increase the depth of your
Like many technologies, WDS has server side as well as
knowledge.
client components. On the server side, you need a PXE

© 2007 Learning Tree International. All Rights Reserved.


Windows Server 2008 – An Introductory Overview 11
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

Books:
Introducing Windows Server 2008
by Mitch Tulloch with the Microsoft Windows
Server Team
(ISBN: 9780735624214),
Publisher: Microsoft Press.

Microsoft Windows PowerShell Step by Step


by Ed Wilson (ISBN: 9780735623958),
Publisher: Microsoft Press

Web Sites:
Changes in Functionality from Windows Server
2003 with SP1 to Windows Server 2008:
http://go.microsoft.com/fwlink/?LinkID=90854

Windows Server 2008 TechNet Webcasts, Virtual


Labs, Podcasts & Chats:
http://go.microsoft.com/fwlink/?LinkID=90855

Windows Server 2008 Step-by-Step Guides


(15 downloadable documents—varied topics):
http://go.microsoft.com/fwlink/?LinkID=90856

Windows Server 2008 TechCenter:


http://go.microsoft.com/fwlink/?LinkID=86041

Windows Server 2008 Troubleshooting:


http://go.microsoft.com/fwlink/?LinkID=90857

Windows PowerShell:
http://www.microsoft.com/windowsserver2003/
technologies/management/powershell/default.mspx

Microsoft Script Center Repository: Sample


PowerShell Scripts:
http://www.microsoft.com/technet/scriptcenter/
scripts/msh/default.mspx?mfr=true

Microsoft System Center:


http://www.microsoft.com/systemcenter/

© 2007 Learning Tree International. All Rights Reserved.


Windows Server 2008 – An Introductory Overview 12
1-800-843-8733 • www.learningtree.ca LEARNING TREE INTERNATIONAL White Paper

About Learning Tree International About the Author


Learning Tree International is a leading worldwide Lori M. Sanders
provider of vendor-independent training to managers Managing Senior Partner
and IT professionals in business and government iSolve Consulting Group
organizations. Since 1974, over 1,800, 000 course lsanders@isolvegroup.com
participants from over 13,000 organizations worldwide www.isolvegroup.com
have enhanced their skills and extended their knowledge
Lori Sanders is the head of iSolve Consulting Group,
under the guidance of expert instructors with real-
an independent firm offering project management and
world experience. Learning Tree develops, markets and
consulting services in Windows server-based network
delivers a broad, proprietary library of instructor-led
solutions, Active Directory planning, implementation
courses focused on the latest information technologies,
and integration, group policy consulting and technical
management practices and key business skills.
and process-oriented consulting in software engineering
Learning Tree International annually trains over and configuration management.
87,000 professionals in its Education Centers around
the world. Learning Tree also provides training in a Lori has 27 years of experience in the IT field and has
number of additional cities and on site at customer supported Microsoft products since DOS 1.0. Her
locations in 26 countries. For more information responsibilities have included desktop support, server
about Learning Tree products and services, call administration, project management and technical
1-800-THE-TREE (1-800-843-8733), or visit our management. Lori is also an instructor, author and
Web site at www.learningtree.ca technical editor for Learning Tree as well as a Certified
Professional for both Windows Server 2000 and 2003.

Lori has written a book on group policies and desktop


management, published by New Riders: Windows 2000
User Management, ©2000.
Atlanta Los Angeles Boston Chicago

Washington, DC New York City Toronto London

Paris Ottawa Stockholm Tokyo

© 2007 Learning Tree International. All Rights Reserved.


WPWinServer2008Final 0710CN
Windows Server 2008 – An Introductory Overview 13

S-ar putea să vă placă și