Windows Server & Network Administration Fundamentals

Publishing Applications with Web Application Proxy

The Web Application Proxy is a Remote Access Service (RAS) capability that allows an organization to publish applications, making them accessible to users outside the organization while still maintaining those applications on the organization’s internal servers.

Minimum Windows Version for SSTP Clients

To utilize the Secure Socket Tunneling Protocol (SSTP), the minimum supported Windows version that must be installed for the client is Windows Vista.

Remote Desktop Connection Broker Role

When multiple Remote Desktop Services (RDS) servers are on a network, the Remote Desktop Connection Broker role ensures that a client connects to the correct server and that clients are load-balanced amongst the available servers.

Rights Management Services (RMS) Security Feature

Rights Management Services (RMS) is a security feature created by Microsoft that enables the ability to define security rights for documents, spreadsheets, email, and other types of files created by applications. This goes beyond what is possible with Access Control Lists (ACLs) and the Windows Firewall.

Group Policy Application Rules

An accurate statement regarding the use of Group Policies is that Group Policy cannot be set for non-OU folder containers.

Invoking the Recovery Agent Key with Cipher

The flag used in conjunction with the cipher command to invoke the recovery agent key, allowing a server administrator to set up a recovery policy, is cipher /r.

DNS Reverse Lookup: PTR Record

When investigating network traffic and wishing to resolve an IP address to a DNS name (a reverse lookup), the resource record used is a PTR record.

Understanding the svchost.exe Process Role

On a running system, the svchost.exe process is responsible for implementing logon and security policies.

Windows Server 2016: Computer Browser Service

The Computer Browser service in Windows Server 2016 is used to maintain a listing of computers and domain resources that can be accessed on the network.

Understanding % Privileged Time Counter

The % Privileged Time counter represents the amount of time spent by the CPU for system activities while operating in privileged mode.

Purpose of the SYSVOL Folder in Windows Server 2016

On a Windows Server 2016 system, the SYSVOL folder is the location for scripts, Group Policy Objects (GPOs), and software distribution files related to Active Directory.

Troubleshooting Server Failure: Windows Firewall Logs

If you suspect that a server failure might be due to the Windows Firewall configuration, you should check the Admin logs in Event Viewer.

Purpose of a Start of Authority (SOA) Record

The purpose of a Start of Authority (SOA) record is to identify the authoritative DNS server for the current zone.

Group Policy Precedence Order

When considering Group Policy Object (GPO) precedence among Local GPO, Default Domain GPO, Domain Controller GPO, Site GPO, and Organizational Unit (OU) GPOs, the Local GPOs are applied first.

Most Secure RAS Server Authentication Type

When selecting an authentication type for a Remote Access Service (RAS) server, the Extensible Authentication Protocol (EAP) is considered the most secure authentication type.

Troubleshooting SNMP Trap Issues

After configuring SNMP traps for a system, if you discover that the traps are not being sent out, the most likely issue is that the SNMP Trap service has not been started.

Essential Elements for Network Diagrams

A comprehensive network diagram should include the following items:

  • Servers, workstations, and network printers
  • Wireless network devices
  • Cabled network devices
  • Telecommunications links
  • Wireless and cabled network links
  • Remote links
  • Building locations

Monitoring Users on a Windows Server 2016 VPN Server

To periodically monitor users connected to a Windows Server 2016 VPN server, you can use the Routing and Remote Access tool. With the tool open, expand the elements under the server name in the left pane. Then, click Remote Access Clients in the left pane. The right pane will display connected users, including their username, connection duration, number of ports used, and active or idle status for the connection.

BitLocker Drive Encryption Protection

BitLocker Drive Encryption provides protection for an entire hard drive by encrypting the entire drive, including the operating system, programs, and data files. When the system boots and while it is running, BitLocker Drive Encryption checks to ensure that files have not been tampered with or accessed by any sources without the proper physical-device key. If unauthorized access is detected, it locks the files on the drive.

IPsec Communication Negotiation Process

When an IPsec communication begins between two computers, they first exchange certificates or passwords/pre-shared keys to authenticate the receiver and sender. Next, data is encrypted at the Network Interface Card (NIC) of the sending computer as it is formatted into an IP packet, which consists of a header containing transmission control information, the actual data, and a footer with error-correction information.

Understanding DNS Root Hints

On a DNS server, a root hint is a resource record that enables a DNS server to quickly find an authoritative DNS server in a zone that is not hosted on the local DNS server, particularly for finding authoritative DNS servers on the Internet. When a DNS server receives a query for a domain it does not recognize, it can use the root hint to locate that domain on the Internet. When you configure a DNS server, approximately 15 root hints for well-known top-level Internet domains are configured automatically.

Security Disadvantages of PPTP

Some of the disadvantages of the Point-to-Point Tunneling Protocol (PPTP) in terms of security include:

  • The original PPTP specification does not include mandatory encryption.
  • Microsoft’s version is enhanced by the addition of Microsoft Point-to-Point Encryption (MPPE), but it is still considered an insecure option because tools are available to crack its encryption.
  • MPPE only supports the use of keys up to 128 bits, with 128 bits being used by default.

Log Maintenance Options in Event Viewer

Logs in Event Viewer can be maintained using several methods:

  • Sizing each log to prevent it from filling too quickly.
  • Overwriting the oldest events when the log is full.
  • Archiving the log when it is full.
  • Clearing the log manually.