0% found this document useful (0 votes)
108 views124 pages

CBLM CoC 3 - SET-UP COMPUTER SERVERS

CSS NC II documents

Uploaded by

dhoynavarrojr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views124 pages

CBLM CoC 3 - SET-UP COMPUTER SERVERS

CSS NC II documents

Uploaded by

dhoynavarrojr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 124

COMPETENCY – BASED

LEARNING MATERIALS

Sector : Electronics Sector

Qualification Title : Computer System Servicing NC II

Unit of Competency: Set-up Computer Servers

Module Title : Setting-up Computer Servers

Table of Contents
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 1 of 124
Title Page ------------------------------------------------ 1
-----
Table of Contents ------------------------------------------------- 2
----
How to… ------------------------------------------------- 3
----
Introduction ------------------------------------------------ 6
-----
Summary of Learning Outcome ------------------------------------------------ 6
-----
Learning Experience ------------------------------------------------ 11
-----
Information Sheet 3.1-1 ------------------------------------------------ 12
-----
Self-Check 3.1-1 ------------------------------------------------ 17
-----
Answer Key 3.1-1 ------------------------------------------------ 18
-----
Information Sheet 3.1-2 ------------------------------------------------ 19
-----
Job Sheet 3.1-2 ------------------------------------------------ 26
-----
Performance Criteria 3.1-2 ------------------------------------------------ 27
-----
Information Sheet 3.1-3 ------------------------------------------------ 28
-----
Job Sheet 3.1-3 ------------------------------------------------ 33
-----
Performance Criteria 3.1-3 ------------------------------------------------ 34
-----
Information Sheet 3.2-1 ------------------------------------------------ 35
-----
Self-Check 3.2-1 ------------------------------------------------ 39
-----
Answer Key 3.2-1 ------------------------------------------------ 40
-----
Information Sheet 3.2-2 ------------------------------------------------ 41
-----
Job Sheet 3.2-2 ------------------------------------------------ 72
-----
Performance Criteria 3.2-2 ------------------------------------------------ 73
-----
Information Sheet 3.2-3 ------------------------------------------------ 74
-----
Job Sheet 3.2-3 ------------------------------------------------ 10
----- 2
Performance Criteria 3.2-3 ------------------------------------------------ 10
----- 3
Information Sheet 3.3-1 ------------------------------------------------ 10
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 2 of 124
----- 4
Job Sheet 3.3-1-A ------------------------------------------------ 11
----- 3
Performance Criteria 3.2-1- ------------------------------------------------ 11
A ----- 4
Job Sheet 3.3-1-B ------------------------------------------------ 11
----- 5
Performance Criteria 3.3-1- ------------------------------------------------ 11
B ----- 6
Information Sheet 3.3-2 ------------------------------------------------ 11
----- 7
Self-Check 3.3-2 ------------------------------------------------ 12
----- 2
Answer Key 3.3-2 ------------------------------------------------ 12
----- 3

HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL

Welcome to the Module “Setting-up Computer Servers ”. This


module contains training materials and activities for you to
complete.

The unit of competency “Set-up Computer Servers ” contains


knowledge, skills and attitudes required for a Computer System
Servicing NC II course.

You are required to go through a series of learning activities in


order to complete each of the learning outcomes of the module. In
each learning outcome there are Information Sheets, Job
Sheets, Operation Sheets, and Activity Sheets. Follow these
activities on your own and answer the Self-Check at the end of each
learning activity.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 3 of 124
If you have questions, don’t hesitate to ask your facilitator for
assistance.

Recognition of Prior Learning (RPL)

You may already have some or most of the knowledge and skills covered in
this learner's guide because you have already completed training in this area.

If you can demonstrate to your trainer that you are competent in a particular
skill/s, talk to him/her about having them formally recognized so you don't have to
do the same training again. If you have a qualification or Certificate of Competency
from previous trainings, show it to your trainer. If the skill/s you acquired are still
current and relevant to the unit/s of competency they may become part of the
evidence you can present for RPL. If you are not sure about the currency of your
skills, discuss this with your trainer.

After completing this module ask your teacher to assess your competency.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome may
have more than one learning activity.

 Talk to your trainer and agree on how you will both organize the Training of
this unit. Read through the module carefully. It is divided into sections, which
cover all the skills, and knowledge you need to successfully complete this
module.

 Work through all the information and complete the activities in each section.
Read information sheets and complete the self-check. Suggested references
are included to supplement the materials provided in this module.

 Most probably your trainer will also be your supervisor or manager. He/she is
there to support you and show you the correct way to do things.

 Your trainer will tell you about the important things you need to consider
when you are completing activities and it is important that you listen and
take notes.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 4 of 124
 You will be given plenty of opportunity to ask questions and practice on the
job. Make sure you practice your new skills during regular work shifts. This
way you will improve both your speed and memory and also your confidence.

Computer System Servicing NC II


COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Module Title Code


Competency

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 5 of 124
Install a n d Installing and
1. Configure Configuring ELC 724 331
Computer S stems Computer Systems
Set- up C om p u t e r Setting- up Comput er
2. ELC 724332
Networks Networks
Set- up C om p u t e Setting- up Comput er
3. ELC 724333
r Servers Servers
Maintain and Maintaining a n d
4. Repair Compute r Repairing Computer ELC 724334
Systems and Systems and
Networks Networks

Program/Course : Computer Systems Servicing NC II


Unit of Competency : Set-up Computer Servers
Module : Setting-up Computer Servers

INTRODUCTION:

This module contains information and suggested learning


activities on Computer Systems Servicing II. It includes activities and
materials on Installation of Computer Systems and Networks.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 6 of 124
Completion of this module will help you better understand the
succeeding module on the Setting-up Computer Server.

This module consists of 3 learning outcomes. Each learning


outcome contains learning activities supported by each instruction
sheets. Before you perform the instructions, read the information
sheets and answer the self-check and activities provided to ascertain
to yourself and your teacher that you have acquired the knowledge
necessary to perform the skill portion of the particular learning
outcome.

Upon completion of this module, report to your teacher for


assessment to check your achievement of knowledge and skills
requirement of this module. If you pass the assessment, you will be
given a certificate of completion.

SUMMARY OF LEARNING OUTCOMES:

Upon completion of the module you should be able to:

LO1. Set-up user access


LO2. Configure network services
LO3. Perform testing, documentation and pre-deployment procedures

TECHNICAL TERMS
 Bluetooth - wireless connection use to send and
receive messages
 Coverall - apparel suit won to protect the body
 E-mail - electronic messages we received via internet
 Fax - abbreviation of facsimile; the electronic transmission of
copies of documents for reproduction at a remote location.
 Internet - abbreviation for internetwork. A set of corrupt networks
made up of a large number of smaller networks.
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 7 of 124
 Intranet - set of interconnected networks using the Internet Protocol
 Modems - translates between digital signals that the computer
uses, and analog signals suitable for transmission over telephone
lines.
 Network - interconnected group of computers
 PDA - abbreviation for Personal Digital Assistant; a tiny pen-based
palm top computer that combines fax, e-mail and simple word
processing into an easy-to-use unit that fits, into pocket.
 OHS - Occupational Health & Safety
 Peer-to-peer network – a network architecture in which driver
files and printers on every PC can be available to every other PC on
the network.
 Policies - approach, code, system, guidelines, theory, line
 Server - any computer that makes access to files, printing,
communications, or other services available users of the network.
 Software - an application program or an operating system that
computer executes
 Storage Media - devices used to store data from the computer.
 Topology - map of a network
 USB - abbreviation of Universal Serial Bus
 Wide Area Network – network that connects users across large
distances, and other crosses the geographical boundaries of cities
or state.

Program/Course : Computer Systems Servicing NC II


Unit of Competency : Set-up Computer Servers
Module : Setting-up Computer Servers

Learning Outcome 3-1: Set-up User Access

Assessment Criteria:
1. User folder is created in accordance with network operating system
(NOS) features

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 8 of 124
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.

Learning Outcome 3-2: Configure Network Services

Assessment Criteria:
1. Normal functions of server are checked in accordance with
manufacturer’s instructions
2. Required modules /add-ons are installed/updated based on NOS
installation procedures
3. Network services to be configured are confirmed based on
user/system requirements
4. Operation of network services are checked based on user/system
requirements
5. Unplanned events or conditions are responded to in accordance with
established procedures

Learning Outcome 3-3: Perform Testing, documentation and Pre-deployment


procedures

Assessment Criteria:
1. Pre-deployment procedures is undertaken based on enterprise
policies and procedures
2. Operation and security check are undertaken based on end-user
requirements
3. Reports are prepared/completed according to enterprise policies and
procedures.

Resources:

Equipment/ Tools & Instruments Supplies &


Facilities Materials
Server Multi-tester Connectors, RJ45
Computer peripherals Diagnostic software Adaptors
Desktop computers Appropriate software Bus wires and cables
Glasses Assorted pliers Appropriate software
Mask Assorted screw drivers Computer storage
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 9 of 124
Gloves Soldering gun media
Anti-static wrist strap Allen key
USB Flash drive

References:

 McLaughlin, Robert, Sasser,Susan, Ralston,Mary.Fix Your Own PC.Philippine Graphic


Arts, Inc Tandang Sora St.Caloocan City
 Meralco Faoundation. Microcomputer Servicing Plus. Pasig City, Philippines.
 Legaspi, Carlos, Caiña, Mark Anthony. Operate A Personal Computer. Dasmariñas
Computer Learning Center.Dasmariñas,Cavite, Philippines
 Bigelow, Stephen J. PC Technician’s Troubleshooting, McGaw Hill
 www.helpwithpcs.com
 http://en.wikipedia.org
 www.techsoup.org
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 10 of 124
 www.howstuffworks.com
 www.microsoft.com/technet/network

Learning Experiences

Learning Outcome 3 – Set-up Computer Server


Learning Activities Special Instructions

1. Read information sheet on 3.1 -1 (Computer Read each Information Sheet and
Networks) answer the Self-Check at the
2. Answer Self-Check 3.1-1 end of
3. Read information sheet on 3.1-2 (Configuring each Learning Activity.
P2P connection)
4. 4. Perform Job Sheet 3.1-2 There are Learning Activities

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 11 of 124
5. Read information sheet on 3.1-3 (Setting-up that may require you to perform
Computer Server) certain Task and
6. Perform Job Sheet 3.1-3 Jobs that you have to perform
7. Read information sheet 3.2-1 (Checking Normal and
Function of Server) check your performance based
8. Perform Job Sheet 3.2-1 on
9. Read information sheet 3.2-2 (Installing the performance criteria set.
Required Add-ons)
10. Perform Job Sheet 3.2-2 At the completion of this module
you will be able to configure P2P
11. Read information sheet 3.2-3 (Confirm network connection, configure server,
services to be configured) DNS. DHCP. ADDS. File services,
12. Perform Job Sheet 3.2-3 Folder Redirection, Remote
13.Read information sheet 3.3-1 (Undertaking Desktop, and Printer sharing.
operation and security check)
14 Perform Job Sheet 3.3-1-A
15. Perform Job Sheet 3.3-1-B
16. Read information sheet 3.3-2 (Preparing and
Completing Report)
17. Answer Self-Check 3.3-2

INFORMATIOM SHEET 3.1-1


Computer Network

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Learn the different type and topology of network.
2. Identify initial network operating system
Overview: In computer networking, will give the learner basic concepts of
computer networks.

Networking

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 12 of 124
Arguably, the greatest advancement in technology and communication over the past 20 years has been
the development and advancement of the computer network. From emailing a friend to on-line bill
paying to downloading data off the Internet to e-commerce, networking has made our world much
smaller and changed the way we communicate forever.

net·work: [net-wurk] – noun, a system containing any combination of computers, computer terminals,
printers, audio or visual display devices, or telephones interconnected by telecommunication equipment
or cables: used to transmit or receive information.

Computer network: A collection of computing devices that are connected in various ways in order to
communicate and share resources. Usually, the connections between computers in a network are made
using physical wires or cables. However, some connections are wireless, using radio waves or infrared
signals

The Four Types of Networks

1. WAN – Wide Area Network

• A Wide Area Network exist over a large area


• Data travels through telephone or cable lines
• Usually requires a Modem
• The world’s largest Wide Area Network is the Internet

2. LAN – Local Area Network

• A Local Area Network spans a relatively small area


• LAN are usually confined to one building or a group of buildings
• Data travel between network devices via network cables.
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 13 of 124
• The most common type of Local Area Network is called Ethernet

3. Peer-to-Peer Network

• Usually very small networks


• Each workstation has equivalent capabilities and responsibilities
• Does not require a switch or a hub.
• These types of networks do not perform well under heavy data loads.

4. Metropolitan-area network (MAN)


The communication infrastructures that have been developed in and around large cities

Types of Network Connection (Topology):

Ring Topology

• All devices are connected to one another in the shape of a closed loop.
• Each device is connected directly to two other devices, one on either side of it.
• A configuration that connects all nodes in a closed loop on which messages travel in one
direction.

Star Topology

• All devices are connected to a central hub.


• Nodes communicate across the network by passing data through the hub or switch.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 14 of 124
• A configuration that centers around one node to which all others are connected and through which
all messages are sent.

Bus Topology

• All devices are connected to a central cable, called the bus or backbone.
• There are terminators at each end of the bus that stops the signal and keeps it from traveling
backwards.
• All nodes are connected to a single communication line that carries messages in both directions

Network Operating System (NOS)

The term network operating system is used to refer to two rather different
concepts:

 A specialized operating system for a network device such as a router switch


or firewall.
 An operating system oriented to computer networking, to allow shared file
and printer access among multiple computers in a network, to enable the
sharing of data, users, group, security, application, and other networking
functions. Typically, over a local area network (LAN), or private network. This
sense is now largely historical, as common operating systems generally now
have such featured included.
Types of Network Operating System

1. Peer-to-peer network

 In a peer-to-peer network operating system users are allowed to share


resources and files located on their computers and access shared resources
from others. This system is not based with having a file server or centralized
management source. A peer-to-peer network sets all connected computers
equal; they all share the same abilities to use resources available on the
network.

Advantages

 Ease of set-up
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 15 of 124
 Less hardware needed, no server need be acquired

Disadvantage

 No central location of storage


 Less security than client-server model

2. Client-Server Model

Network operating system can be



based on a client-server model
(architecture) in which a server
enables multiple clients to share
resources. Client-server network
operating system allow networks
to centralize functions and
applications in one or more
dedicated file servers. The server
is the center of the system,
allowing access to resources and instituting security.

Advantages

 Centralized servers are more stable


 Security is provided through the server
 New technology and hardware can be easily integrated into the system
 Hardware and operating system can be specialized, with a focus on
performance
 Servers are able to be accessed remotely from different locations and
types of systems.

Disadvantages

 Buying and running a server raises costs


 Dependence on a central location for operation
 Requires regular maintenance and updates.

Peer-to-peer VS Client-server

Peer-to-Peer Client/Server
Networks Networks

Each PC is an equal One PC acts as the

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 16 of 124
participant on the network controller
network

PCs are not reliant on One PC controls access


one PC for resources to network resources
such as the printer

Access to the network is Network access and


not centrally controlled security are centrally
controlled

Can operate on a basic Need a special operating


PC operating system system

Are generally simpler Are generally more


and lower cost complex but give the
user more control

https://www.informit.com/articles/article.aspx?p=26437&seqNum=3

Self-Check 3.1-1

A. What is a network?

_________________________________________________________________________________
_________________________________________________________________________________

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 17 of 124
_________________________________________________________________________________
_________________________________________________________________________________

B. 4 types of network.

1. ______________________________
2. ______________________________
3. ______________________________
4. ______________________________

C. 3 types of network topologies.

1. _________________________________
2. _________________________________
3. _________________________________

D. 2 types of NOS.

1. _________________________________
2. _________________________________

Answer Key 3.1-1

A:

Computer network: A collection of computing devices that are connected in various ways in order to
communicate and share resources. Usually, the connections between computers in a network are made

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 18 of 124
using physical wires or cables. However, some connections are wireless, using radio waves or infrared
signals

B:

1. LAN
2. WAN
3. MAN
4. Peer-to-peer

C:

1. Star
2. Bus
3. Ring

D:

1. Peer-to-peer
2. Client-server

INFORMATIOM SHEET 3.1-2


Configure P2P connection

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Learn how to configure a peer-to-peer connection.
2. Learn the procedure in P2P file sharing
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 19 of 124
Overview: Configuring P2P connection, will give the learner the experience in basic
P2P networking.

Peer-to-Peer Connection

Stands for "Peer to Peer." In a P2P network, the "peers" are computer systems
which are connected to each other via the Internet. Files can be shared directly
between systems on the network without the need of a central server. In other
words, each computer on a P2P network becomes a file server as well as a client.

How to connect two computers in a P2P connection?

Step 1. Physical connection.

Connect the crossover cable to the RJ45 ports (Network ports) of your two PCs. The
crossover cable can be made by you.

Step 2. Configure your PCs for network communication.

Windows 7 Network Configuration.


In windows 7, settings are split into two sections: adapter settings and advanced
sharing settings; let’s start with the adapter settings;

♦Click on Control Panel > Network and Internet > Network and Sharing Center>
Change adapter settings and you get to see you Network Interface Card. (shown in
fig). If it is disabled, right click and click on Enable.

Network card in Windows7


♦Right click and select properties;

♦Highlight Internet Protocol Version 4(TCP/IPv4) and click on Properties; this gives
us an interface that allows us to assign an IP address to the Network Interface Card
of our PC. Manually enter the IP address information as shown in the figure and
click OK; again, remember that the Default gateway of one PC is the IP address of

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 20 of 124
the other and vice versa. To see this, compare the two IP address configuration
figures.

TCP/IP - Transmission Control Protocol/Internet Protocol is a suite of


communication protocols used to interconnect network devices on the internet.
TCP/IP can also be used as a communications protocol in a private network
(an intranet or an extranet).

Protocol - the official procedure or system of rules

IP Address - a unique string of numbers separated by periods that identifies each


computer using the Internet Protocol to communicate over a network.

Reserved for private networks.

The organizations that distribute IP addresses to the world reserves a range of IP


addresses for private networks.

 192.168.0.0 - 192.168.255.255 (65,536 IP addresses)


 172.16.0.0 - 172.31.255.255 (1,048,576 IP addresses)
 10.0.0.0 - 10.255.255.255 (16,777,216 IP addresses)

Your simple home network, with its router at the center and computers connected
to it—wired or wireless—classifies as one of those networks.

There are two types of IP addresses: static and dynamic IP. Static IP
addresses remain constant, while dynamic IPs change periodically.

Local area connection properties


Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 21 of 124
IP address configuration

Next, we cover the advanced sharing settings.

♦Click on Control Panel > Network and Internet >Network and Sharing Center>
Change advanced sharing settings; in the window that pops up, make sure you turn
on “Network discovery” and” File and Printer sharing”. For other settings, do as
shown in the figure below.

Advanced network sharing

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 22 of 124
Advanced sharing settings

♦Choose a folder on your hard drive that you wish to share on your PC and
configure sharing; right click on the folder, click on properties and select sharing in
the interface that pops up. Click on the share button. Select everyone in the popup
menu and click on add. Click on the share button to close the window. Now we are
ready to test our configuration.

Sharing configuration in windows 7

Step 3 Test the connectivity.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 23 of 124
In Networking, there is a long and rich list of commands we use to test and
troubleshoot networks; one of them is the “ping” command and it is used here to
test if our network configuration is working.

On your windows XP Professional PC, do the following:

♦In the start pop up window, click on “Run”. In the small window that appears,
enter “cmd” as shown in the figure.

♦In the black and white screen that appears, enter “ping 192.168.1.103” and hit
Enter. If the system responds with replies from 192.168.1.103 as shown in the
figure, your network configuration is working and you can share as much as you
want!

Ping command response

What is “ping” command?

The ping is the reaction time of your connection–how fast you get a response after
you've sent out a request. A fast ping means a more responsive connection,
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 24 of 124
especially in applications where timing is everything (like video games). Ping is
measured in milliseconds (ms).

On your Windows 7 machine, just click on the start image and enter cmd in the
search box that appears, the same black and white screen appears and you can
ping the Windows XP Professional IP address to check and see if the connection is
working. This is what you type in the black and white screen “ping 192.168.102″. If
you reply from 192.168.1.102 pop up, we know that our connection works.

Ping command response.

On your Windows 7 machine, do the following:

♦ Click on Start > Computer > Network and the folders from the other PC that are
shared appear in the window that appears.

Shared folder viewed on windows 7

Peer-to-peer connection Windows 10

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 25 of 124
Setting up a peer-to-peer network between two computers running Windows 10 is
relatively straightforward.

Here are the general steps to do so:

1. Connect both computers to the same network, either through a wired or wireless
connection.
2. On each computer, open the Control Panel and navigate to "Network and
Sharing Center."
3. Click on "Change advanced sharing settings" and ensure that network discovery,
file and printer sharing, and public folder sharing are turned on.
4. Next, right-click on the folder or drive that you want to share, select "Properties,"
and then go to the "Sharing" tab. Click on "Advanced Sharing" and check the box
that says "Share this folder."
5. Once the folder is shared, you can set permissions for specific users or groups if
needed.
6. To access the shared folder on the other computer, open File Explorer, and
under the Network section, you should see the other computer listed. You can
then browse and access the shared files and folders.

It's important to note that both computers should be on the same workgroup or
homegroup for easier network discovery. Additionally, ensure that any firewalls or
security software on both computers are configured to allow file and printer
sharing.

https://www.quora.com/How-do-you-set-up-a-peer-to-peer-network-on-two-
computers-with-Windows-10

Job Sheet 3.1-2

Title: Configure P2P connection


Performance Objective: Make a P2P connection (Windows 7)

Tools/PPE: Crimping tool, wire stripper, cable tester, scissor


Materials : 1 pc Cross-over cable, 2 units Computer

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 26 of 124
Steps/Procedure:

1. Make a physical connection. (Refer to Information Sheet 3.1-2)


2. Configure the PCs for network communication. (Refer to Information
Sheet 3.1-2)
3. Test the connectivity. (Refer to Information Sheet 3.1-2)

Assessment Method: Performance Demonstration.

PERFORMANCE CRITERIA CHECKLIST JOB SHEET 3.1-2

Configure P2P connection

Trainee’s Name: Date:

CRITERIA YES NO N/A


1. Did you make a physical connection?

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 27 of 124
2. Did you configure the PCs for network communication?
3. Did you test the connectivity?

Comments/Suggestions

Trainer’s Signature: Date: ____________

INFORMATIOM SHEET 3.1-3


Setting-up Computer Server

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Learn to set-up computer server.
2. Identify the services that must put in automatic.
Overview: Setting-up computer server, will give the learner the knowledge to
prepare the server before configuring all the add-ons.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 28 of 124
Task 1: Setting IP address back to Static

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 29 of 124
Task 2: Setting FDRP, FDPH, SSDP, UPnP to Automatic

A. Set Function Discovery Resource Publication to Automatic

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 30 of 124
B. Set Function Discovery Provider Host to Automatic

C. Set SSDP Discovery to Automatic

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 31 of 124
D. Set UPnP Device Host to Automatic

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 32 of 124
Now, turn on Network Discovery, file and printer sharing but turn off password
protected sharing

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 33 of 124
Job Sheet 3.1-3

Title: Setting-up Computer Server


Performance Objective: Assigning Static IP Address and set required Services
to Automatic.

Tools/PPE:
Materials : 1 units Computer (Server)
Steps/Procedure:

1. Right click on the “Network Icon” on the task bar.


2. Choose “Open Network and Sharing”.
3. Select “Change Adapter Setting”.
4. Right click on the Local Area Network icon, then click “Properties”.
5. Select “TCP/IPv4” then click “Properties”
6. Select “Use the following IP address” then assign the IP address given.
7. Click “OK”
8. Set-up the services properly. (Refer to Information Sheet 3.1-3)

Assessment Method: Performance Demonstration.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 34 of 124
PERFORMANCE CRITERIA CHECKLIST JOB SHEET 3.1-3

Setting-up Computer Server

Trainee’s Name: Date:

CRITERIA YES NO N/A


1. Did you right click on the “Network Icon” on the task
bar?
2. Did you choose “Open Network and Sharing”?
3. Did you select “Change Adapter Setting”?
4. Did you right click on the Local Area Network icon, then
click “Properties”?
5. Did you select “TCP/IPv4” then click “Properties”?
6. Did you select “Use the following IP address” then
assign the IP address given?
7. Did you click “OK”?
8. Did you set-up the services properly?

Comments/Suggestions

Trainer’s Signature: Date: ____________

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 35 of 124
INFORMATION SHEET 3.2-1
Checking Normal Function of Server

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Identify and check normal functions of server
2. Identify what are a server and its function
3. Enumerate the procedures to be made in moving and saving files to the
server home directory
Overview: In checking normal function of server, will give the learner basic
concept on what a server is and its functions.

What is a Server?

• Server is a computer program that provides a service to another


computer programs and their users.

• A physical computer which runs a server programmed is frequently referred


to as a SERVER. Servers perform various essential tasks and activities
that is a very crucial thing of any organization's IT infrastructure.

• The many complex processes that take place during an activity, for
example a security and authentication to billing and orders, the purchase
could not take place without several powerful servers handling the load
hence servers are very much important for any organization.

Functions of Server:

• The main and important function of a server is to listen in on a port for


incoming network requests, and a good demonstration of this is the
interaction between a Web server and browser.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 36 of 124
• For a user the process is instantaneous, but when he clicks a link while
surfing on the Web, several things are taking place behind the scenes like
the request for the Web page is transmitted to the corresponding web
server, and the server fetches and assembles the Web page and
retransmits it using a protocol like HTTP, and, the user's browser receives
the data, converts it, and displays the page.

• Other function of a computer server is to store, retrieve and send or


"serve" files and data to other computers on its network. Many
businesses of all sizes use a local network or "intranet" in their office
facilities. On a larger scale, the world-wide computer network we know as
the "Internet" depends upon a large number of servers located around
the world. The files, data, and functionality of a given website are based on
web servers.

Storage Server

• A storage server is a type of server that is used to store, access, secure


and manage digital data, files and services.
• It is a purpose-built server used for storing and accessing small to large
amount of data over a shared network or through the Internet.
• A storage server may also be called a file server.
• A storage server is typically less powerful than a standard server, but has
more storage space, storage access interfaces and specialized data
retrieval and management utilities.
• A storage server generally serves as a central point of access for data
storage and access. Local client nodes and remote computers access the
storage server through a GUI control panel and FTP or through
programmatic API access by software and applications.
• It can be used for routine or frequently used data storage and access, or it
can serve as a backup server for storing backup data.
• A storage server is an integral part of direct attached storage (DAS),
network attached storage (NAS) and other storage networking
technologies.

Saving Files to the Home (Server) Directory

If you are concerned about students having access to tests or files on your
computer, you can save files to your personal server space (Home
Directory). The only way to gain access to those files is to log on to a
computer, which connects to the server. You can find your Home Directory
under My Computer. The Drive will begin with your logon name. Example: My
drive name is ‘janetsmith on wynne6\home\w-admin’ (H:) Sometimes you
might not be able to see the H: but just look for your name.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 37 of 124
Only s m a l l f i l e s s h o u l d b e s a v e d t o y o u r H o m e
directory. Do NOT save music, movies, or pictures there. If you have
large files and want to save them, e-mail Helpdesk.

Moving Files to the Home Directory

You may already have files created and you want to move them over to the
server.

1. Find the files you want to move to the server.


2. Highlight the file or files

a. To highlight multiple files, which are all in a row, highlight the first file in
line – hold the shift key down and highlight the last file in line.

b. To highlight multiple files that are scattered throughout a folder,


highlight the first file – hold the control key and highlight the remaining
files.

3. Edit, Copy
4. Go to My Computer and Double-click on H:\ (The drive that starts with
your logon name)
5. File, New, Folder Name the folder whatever you like, example:
“Mydocs Backup 5-20-04”
6. Open the folder you just created
7. Edit, Paste

You can save files to your home directory any time you want, just as you would
save them to My Documents or the C: drive.

Saving files to the Home Directory

1. Log on to your computer under your own name.


2. You Must be logged into the Novell Network in order for your H: drive to
be available.
3. Create any document, as you would typically.
4. Save the file, but change the drive letter from C: or My Documents to H:

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 38 of 124
References:
• https://www.quora.com/What-is-the-function-of-server
• https://www.sancuro.com/blog/post/What-Is-A-SERVER-And-What-Are-the-
Functions-of-It/
• https://www.techopedia.com/definition/9550/storage-server
• http://wynne.k12.ar.us/faculty/guides/saving_server.htm

Self-Check 3.2-1
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 39 of 124
A. What is a server?

____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

B. How do move the files to the home directory?

____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

C. How do you save files to the home directory?

____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

Answer Key 3.2-1

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 40 of 124
A:

Server is a computer program that provides a service to another computer


programs and their users

B:

Moving Files to the Home Directory

You may already have files created and you want to move them over to the
server.

1. Find the files you want to move to the server.


2. Highlight the file or files

a. To highlight multiple files, which are all in a row, highlight the first file in
line – hold the shift key down and highlight the last file in line.

b. To highlight multiple files that are scattered throughout a folder,


highlight the first file – hold the control key and highlight the remaining
files.

3. Edit, Copy
4. Go to My Computer and Double-click on H:\ (The drive that starts with
your logon name)
5. File, New, Folder Name the folder whatever you like, example:
“Mydocs Backup 5-20-04”
6. Open the folder you just created
7. Edit, Paste

C:

Saving files to the Home Directory

1. Log on to your computer under your own name.


2. You Must be logged into the Novell Network in order for your H: drive to
be available.
3. Create any document, as you would typically.
4. Save the file, but change the drive letter from C: or My Documents to H:

INFORMATION SHEET 3.2-2


Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 41 of 124
Installing required Add-ons

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Identify the different add-ons on a server.
2. Enumerate the procedures in installing the required add-ons.
Overview: In installing required add-ons, will give the learner the procedure in
adding features on a server.

Before we start with the configuration of the server, we must first make a basic set-
up of a network configuration. A simple configuration is seen below.

First, we must set a static IP address for the server. Use the examples given below:
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 42 of 124
Example:

Domain Name: scistech.edu.ph Server


IP Address: 192.168.1.2
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1
Preferred DNS: 192.168.1.2
DHCP Scope: 192.168.1.10 to 192.168.1.199

Second, we should set a proper computer name. (Example: SERVER)

Click on “Start” button → Right click on “Computer” → Click on “Properties” → Click


“Change Settings” → Click “Change” → Type the computer name → Click “Ok” →
then close. Computer will restart to apply the changes.

NOTE: Change also the computer name for the client. (Example: CLIENT)

Installing and Configuring DNS Role in Windows Server 2008 R2

DNS - Domain Name System, Domain Name Servers (DNS) are the Internet's equivalent of a phone
book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 43 of 124
1. Open Server Manager and click Roles then Add Roles.

2. Click the Next button on the Add Roles Wizard window.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 44 of 124
3. Check the DNS Server on the Select Server Roles window then click the Next.

4. Click the “Next” button.


5. Click “Install” then wait for the installation process to finish.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 45 of 124
6. Click the “Close” button.

7. Go back to Server Manager and expand Roles (click the “+” sign). Then click
“Forward Lookup Zone”. Then click “Action” on the menu bar and click “New

Zone”
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 46 of 124
A forward lookup zone is a DNS zone in which hostname to IP address
relations are stored. When a computer asks the IP address of a specific
hostname, the forward lookup zone is checked and the desired result is
returned.

8. On the New Zone Wizard click “Next”.

9. Select “Primary Zone” then click “Next”.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 47 of 124
10. Type the name of the zone (ex. scistech.edu.ph) then click “Next”

11. Click “Next”, by default it is selected on “Create a new...”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 48 of 124
12. Select “Allow both nonsecure and secure dynamic updates” on the section
then click “Next”.

13. Click “Finish” on the Completing the New Zone Wizard

14. To confirm that the new zone is created, expand “Roles”, expand “DNS
server”, expand “DNS”, expand “SERVER”, expand “Forward Lookup Zone”.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 49 of 124
Installing and Configuring DHCP Role in Windows Server 2008 R2

DHCP stands for Dynamic Host Configuration Protocol. The built-in DHCP server
automatically assigns IP addresses to the computers and other devices on each
local area network (LAN).

1. Open Server Manager and click Roles then Add Roles.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 50 of 124
2. Click the Next button on the Add Roles Wizard window.

3. Select “DHCP Server” on the list then click “Next”

4. Click “Next”
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 51 of 124
5. Confirm the IP address for IPv4 DNS Settings for Network Connection
Bindings. The IP address should be the same as the IP address of the
server. Then click “Next”

6. Type the Parent Domain (ex. scistech.edu.ph), then click Validate to


check if the IP address is Valid as a Preferred DNS server IPv4 address.
Once it is validated, click “Next”.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 52 of 124
7. Select “WINS is not required for applications on this network” then click

“Next”
8. Click “Add” … to create DHCP Scopes. Type the scope name, starting IP and
ending IP address, and default gateway. Then click “OK”

9. Click “Next” to proceed with the installation.


10. Select “Disable DHCPv6 stateless mode for this server”, then click “Next”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 53 of 124
11. Review the summary of the DHCP Server settings then click “Install” to
confirm the installation. Wait for the installation to finish.
12. Click “Close”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 54 of 124
13. Expand “Roles”, expand “DHCP Server”, expand “server”, expand
“IPv4”, expand “Scope”, click “Address Leases”, now you can check
the list of connected PCs if any.

Installing and Configuring AD/DC in Windows Server 2008 R2

AD/DC – Active Directory/Domain Controller

Active Directory - Active Directory (AD) is a Microsoft technology used to manage


computers and other devices on a network. ... Active Directory allows network
administrators to create and manage domains, users, and objects within a network.

Domain Controller - A domain controller is a server that manages network security,


effectively acting as the gatekeeper for user authentication and authorization.

Active Directory Domain Services (AD DS) - is a server role in Active Directory that
allows admins to manage and store information about resources from a network, as
well as application data, in a distributed database.

1. Open Server Manager and click Roles then Add Roles.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 55 of 124
2. Click the Next button on the Add Roles Wizard window

3. Select “Active Directory Domain Services” from the list of server roles. The
Add Role Wizard will require you to install additional features such as
NET Framework 3.5.1. Click “Add Required Features”, then click “Next”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 56 of 124
4. Click “Next”

5. Click “Install” to confirm the server role installation, and wait for the
installation to finish

6. Click “Close”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 57 of 124
7. By default, Active Directory Domain Services is inactive. You need to enable it.

8. Click “Run the Active Directory Domain Services Installation Wizard


(dcpromo.exe)”

9. Once clicked, the Active Directory Domain Services Installation Wizard will
appear. Then Click “Next” to proceed with the installation.

DCPromo (Domain Controller Promoter) is a tool in Active Directory


that installs and removes Active Directory Domain Services and
promotes domain controllers. DCPromo, which builds forests and
domains in Active Directory, is found in every version of Windows
Server since Windows 2000.

10. Click “Next” to proceed

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 58 of 124
11. Select “Create a new domain in a new forest”, then click “Next”

12. Type the Fully Qualified Domain Name (FQDN) (Example scistech.edu.ph),
then click “Next”.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 59 of 124
13. Set the Forest Functional Level to Windows Server 2008 R2, then click “Next”

14. After examining the DNS Configuration, the Additional Domain Controller
Options will appear. It should display that DNS Server and Global Catalog is
already installed, and message saying that The DNS Server is already
installed on this server. Click “Next” to proceed.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 60 of 124
15. After examining the DNS Configuration, another message will. Click “Yes” to
continue.

16. Click Next to proceed.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 61 of 124
17. Type a password (Example: P@$$w0rd) for Directory Services Restore Mode,
the click “Next”

18. Review the installation “Summary”, scroll down to Additional Options to


view the information. It should display that the Read-Only domain controller
is set to “No”, Global Catalog is set to “Yes”, and DNS Server is also set to
“Yes”, then click “Next”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 62 of 124
19. Check “Reboot on completion”, and wait until the installation for a new
domain to finish.

20. A message will appear that the DNS Zone could not be created because
it already exists. Click “OK” button to finish the installation and wait until
the computer to boot up.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 63 of 124
21. Once the computer has restarted, login the Administrator’s account,
then click the plus (+) sign in Roles under Server Manager and check all
running server roles. Expand the DHCP Server by clicking the plus (+) sign to
check if IPv4 and IPv6 is running (it should display a green upward arrow).
If not, right-click on the server (Example: server.ursb.edu.ph), then click
Authorize to enable the DHCP role. Then click on IPv4 and IPv6 to activate

them.

Creating Organizational Unit in Active Directory Domain Services

An organizational unit (OU) is a subdivision within an Active Directory into which


you can place users, groups, computers, and other organizational units. You can
create organizational units to mirror your organization's functional or business
structure. Each domain can implement its own organizational unit hierarchy.

Group Policy is a feature of the Microsoft Windows NT family of operating systems


that controls the working environment of user accounts and computer
accounts. Group Policy provides centralized management and configuration of
operating systems, applications, and users' settings in an Active Directory
environment.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 64 of 124
1. Expand Active Directory Domain Services under Roles and click the plus (+)
sign in Active Directory Users and Computers. Right-click on the domain
(Example: ursb.edu.ph), then click New, then click Organizational Unit

2. Type the name of the Organizational Unit and uncheck Protect Container from
accidental deletion, then click “OK”

3. Check the domain to confirm the newly created Organizational

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 65 of 124
Installing File Services on Windows Server 2008 R2

The File Services role installs file and folder sharing and the Share and Storage
Management console, which is the preferred method for administering shared
folders.

1. Open Server Manager and click “Roles”, then “Add Roles”.

2. Click the “Next” button on the Add Roles Wizard window.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 66 of 124
3. Select “File Services” from the list of server roles, then click “Next”

4. Click “Next” to proceed to the installation confirmation.


5. Ensure that the File Server is checked, then click “Next” to proceed

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 67 of 124
6. Click “Install” to proceed with the installation of File Services, and wait the
setup to finish.

7. Click “Close” to exit the Server Role Installation Wizard

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 68 of 124
8. Go to Roles under Server Manager to see the newly created File Services role.

Installing Windows Server Backup Using Server Manager

1. Open the Server Manager and wait for it to load.


2. Click on “Features” and wait for it to load.
3. Click “Add Features “.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 69 of 124
4. In the “Add Features Wizard” page, scroll down and click to select “Windows
Server Backup features “. If you also want to get the PowerShell command
samples, manually select “Command Line Tools “. You do not need this addition if
you plan to use the GUI or the WBADMIN command line tool. Click “Next “.

5. In the “Confirm Installation Selections” page click “Install “

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 70 of 124
6. Click “Close”

7. Once finished, there is no need to reboot the server.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 71 of 124
Job Sheet 3.2-2

Title: Installing required Add-ons


Performance Objective: Install the server add-ons required

Tools/PPE:
Materials : 1 units Computer (Server)
Steps/Procedure:

1. Install and configure DNS Role. (Refer to Information Sheet 3.2-2)


2. Install and configure DHCP Role. (Refer to Information Sheet 3.2-2)
3. Install and configure AD/DC Role. (Refer to Information Sheet 3.2-2)
4. Create Organizational Unit. (Refer to Information Sheet 3.2-2)
5. Install File Services Role. (Refer to Information Sheet 3.2-2)
6. Install Window Server Backup features. (Refer to Information Sheet 3.2-2)

Assessment Method: Performance Demonstration.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 72 of 124
PERFORMANCE CRITERIA CHECKLIST JOB SHEET 3.2-2

Installing required Add-ons

Trainee’s Name: Date:

CRITERIA YES NO N/A


1. Did you install and configure DNS Role?
2. Did you install and configure DHCP Role?
3. Did you install and configure AD/DC Role?
4. Did you create an Organizational Unit?
5. Did you install File Services Role?
6. Did you install Window Server Backup features?

Comments/Suggestions

Trainer’s Signature: Date: ____________

INFORMATION SHEET 3.2-3


Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 73 of 124
Confirm network services to be configured

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Identify what is a network service.
2. Enumerate the procedures on how to share network services.
Overview: In confirming network services, the learner will know how to configure
different services.

Network Services

A networking s e r v i c e is a l o w -level a p p l i c a t i o n t h a t
e n a b l e s the network to p e r f o r m m o r e t h a n b a s i c f u n c t i o n s .
Some e x a m p l e s of networking services include; NTP, DNS, DHCP, VoIP, File
and Directory, Hardware Sharing, Email, and Website Hosting.

Creating and Sharing Folder for File Services

1. Click the “Start” button, and click “Computer”. Then double-click “Local Disk

(C:)”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 74 of 124
2. Create a Folder (Example: REDIRECTION) in Local Disk (C:)

3. Enable Sharing in the newly created folder. Right-click on the folder, then
“Properties”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 75 of 124
4. Click the “Sharing” tab, then click the “Advance Sharing”

5. Check “Share this folder”, then click “Permissions”

6. Check “Full Control”, then click “Apply” and “OK” to change the permission
level.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 76 of 124
7. Click “Apply” and “OK” button again to share the folder. Once applied, it
will display a Network Path (Example: \\server\redirection). Highlight the
Network Path, then right-click it, and Copy. The network patch will be used for
the creation of File Redirection Policy

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 77 of 124
Creating and configuring File Redirection Policy for Active Directory Users

Folder redirection can be used to redirect certain special folders on the end user's
desktop to server shares. Special folders such as the My Documents or Documents,
which is the default folder for users to store and access their data, can be
redirected to server shares.

1. Click “Start” button, and go to “Administrative Tools”, then click “Group Policy
Management”

2. Expand “Forest”, expand “Domains”, expand “scistech.edu.ph”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 78 of 124
3. Right-click on the Organizational Unit named “REDIRECTION”, then click “Create
a GPO in this domain”, and link it here…

4. Type the name of the Group Policy Object (GPO) (Example: REDIRECTION),
then click “OK “to create the GPO.

5. Expand the organizational unit named REDIRECTION by clicking the plus (+)
sign to show the GPO

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 79 of 124
6. Right-click on the GPO named REDIRECTION, then click “Edit” to open the
Group Policy Management Editor

7. Under the GPM Editor, expand “User Configuration”, expand “Policies, expand
“Windows Setting”, expand “Folder Redirection”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 80 of 124
8. Right-click the folder named “Desktop”, then click “Properties”.

9. Once opened, on the Target tab Set the Settings to” Basic – Redirect
everyone’s folder to the same location”, and paste the network path of
previously shared folder (\\server\redirection) to the Root Path:

10. Click “Apply”, and click the “Yes” button on the message box that will
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 81 of 124
appear.

11. Click OK button to accept the changes.


12. Repeat steps 8 to 11 for the Documents folder
13. Close the Group Policy Management Editor to go back to Group Policy
Management, then click Minimize button

Creating and Adding Users for Folder Redirection Policy

What is user account in Window Server?

- A user account allows you to sign in to your computer. By default, your


computer already has one user account, which you were required to create
when you set up your computer. If you plan to share your computer with
others, you can create a separate user account for each person.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 82 of 124
1. Go back to Server Manager, then expand the role Active Directory Domain
Services, and click the plus (+) sign in Active Directory Users and
Computers to show the domain (scistech.edu.ph)

2. Right-click the Organizational Unit named REDIRECTION, then “New” and click
“User”

3. Type in the user’s information and User logon name, then click next to set
and create the user’s password

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 83 of 124
4. Set the user’s password and password settings, select “Password never
expire”
then click “Next”

5. Click “Finish” to close the New Object – User window.

6. The newly create user account will appear inside the REDIRECTION
Organizational Unit.

7. Minimize Server Manager and go back to the Group Policy Management


Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 84 of 124
8. On the Group Policy Management click on the GPO name REDIRECTION (if not yet
selected), and click Add… on the Security Filtering section, then type the
name of newly created user account (type only the first name then, click
Check Names), then OK to add the user to the security filtering.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 85 of 124
9. Enable the GPO by right-clicking the GPO named REDIRECTION, and click
“Enforced”

Joining Computers to Domain (Windows 7)

1. Click the “Windows Orb” button, right-click “Computer” then click

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 86 of 124
“Properties”.
2. In the System Properties, click “Change Settings” in the Computer name,
domain, and workgroup settings section.

3. On the Computer Name tab, click “Change” button

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 87 of 124
4. Select Domain in the Member of section, and type the name of the domain
(Example: scistech.edu.ph). Then click “Ok”

5. Type the administrator’s username and password on the Windows Security


Logon box, then click “OK”

6. A confirmation box will appear saying that the computer has successfully
joined in the domain and will require to restart the computer to accept the
changes. Click “OK”

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 88 of 124
7. Click “Close” to accept the changes.

8. Click “Restart Now” to restart the computer.

9. After the computer has been restarted. Press CTRL + ALT + DEL to open
logon screen and click Switch User

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 89 of 124
10. Click “Other User”

11. Logon to the computer with the user account created in the active directory
domain services

12. Wait for the desktop to load.


13. To check whether the Folder Redirection Policy is implemented, go to the
server PC and open the folder named REDIRECTION. As shown in the
image below, the sub-folder labeled under the name of the user will
automatically be created once the user logged on to the client’s PC

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 90 of 124
Remote Desktop Connection

Step 1 - On the Computer That You Plan to CONNECT TO:

These steps allow for Remote Access to a specific Windows 7 Computer. This is
typically your Office Computer; however, it could also be a server or other
departmental resource.

1. Open the Control Panel: Start | Control Panel.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 91 of 124
2. Click System and Security.

3. Click Allow Remote Access.

4. Under the Remote Tab:


o Select "Allow Remote Assistance connections to this computer".
o Select "Allow connections only from computers running Remote Desktop
with Network Level Authentication (more secure)".

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 92 of 124
5. Click Select Users.

 Click Add.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 93 of 124
 Enter your myLSU ID and click OK when finished.

6. Under the Computer Name Tab: Make a note of the [Full Computer Name].

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 94 of 124
Step 2 -- Remotely Connect to Another Computer

1. Click Start and search for Remote Desktop Connection

2. Enter the Full Computer Name you noted in Step 6, and click Connect. You may
need to enter a username and password depending on the access credentials that
are required by the other user or the other computer.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 95 of 124
3. To Disconnect: Click Start | Log Off. This will log you out of the remote computer.

Note: If you have problems connecting to the remote computer, double-check the
full computer name. If this is correct, you might need to change your firewall
connection. To do this, open the Control Panel and select Windows Firewall.
Make sure that under General, the box that reads "Don't allow exceptions" is not
checked, and that under Exceptions, Remote Desktop is selected.

Configure the Firewall Settings

If the Firewall is Enabled, it needs to have Remote Desktop Exception Enabled.

1. Click Start | Control Panel.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 96 of 124
2. Click on System and Security.

3. Click on Windows Firewall.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 97 of 124
4. Click Allow a program or feature through Windows Firewall.

5. Scroll through the list of programs and features until you find Remote
Desktop. CHECK the box marked Remote Desktop and both boxes to the left
field.

6. Click OK.
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 98 of 124
https://grok.lsu.edu/article.aspx?articleid=17028
Configuring Printers in Window Server 2008

1. Launch Server Manager< from the Start Menu, expand the local
server's name, and then expand the Roles item. If Print Services are
already found, then stop.

Otherwise right-click on Roles and select Add Roles from the context
menu.

2. Enable the checkbox on Print Services, then click Next.

This is a good time to add other services if you think you need them,
though many application servers won't.
After clicking Next, an "Introduction to Print Services" dialog is
displayed. Review, then click Next on this as well.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 99 of 124
3. Most users require only Print Server — this provides normal ordinary
Windows printing support.

4. This final dialog confirms what's about to be performed, and though it


warns that a system reboot may be necessary. It didn't require one
when we added print services to our server.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 100 of 124
But removing the Print Services role did require a restart before any
additional role-related changes could be made.

At this point, the machine is configured with full Print Services.

Administrating Printers

With Print Services fully installed, there are several places that can perform printer
administration.

Server Manager » Roles » Print Services » Print Management


This is the main Print Management application for administration of printing
resources. This is an MMC snap-in, so it fits right in with all the other
administrative

Start » Run » printmanagement.msc


This launches the same Print Management MMC application directly, without
going through the Server Manager. This can be made into a shortcut onto the
desktop if print management will be done often.

Control Panel » Printers


Unlike the previous two items, which run with Administrative privileges
because of the UAC elevation, the Control Panel runs in the user's Windows
Explorer context without administrative rights.
Only the machine's local Administrator — not merely a member of the
local Administrators group — has these rights automatically, so it forbids
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 101 of 124
changes to most settings. This stumped a number of experienced admins for
days.
It turns out that right-clicking a printer and selecting Run as administrator,
then Open will allow full administration after the UAC confirmation.

http://unixwiz.net/techtips/server2008-print-mgmt.html

Job Sheet 3.2-3

Title: Confirm network services to be configured


Performance Objective: Install and configure network services

Tools/PPE:
Materials : 1 units Computer (Server), functional network
Steps/Procedure:

1. Create and share folder for File Services. (Refer to Information Sheet 3.2-
3)
2. Create and configure File Redirection Policy. (Refer to Information Sheet
3.2-3)
3. Create and add user. (Refer to Information Sheet 3.2-3)
4. Join a computer to the domain. (Refer to Information Sheet 3.2-3)
5. Do remote desktop connection. (Refer to Information Sheet 3.2-3)
6. Configure printer in server. (Refer to Information Sheet 3.2-3)

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 102 of 124
Assessment Method: Performance Demonstration.

PERFORMANCE CRITERIA CHECKLIST JOB SHEET 3.2-3

Confirm network services to be configured

Trainee’s Name: Date:

CRITERIA YES NO N/A


1. Did you create and share folder for File Services?
2. Did you create and configure File Redirection Policy?
3. Did you create and add user?
4. Did you join a computer to the domain?
5. Did you do remote desktop connection?
6. Did you configure printer in server?

Comments/Suggestions

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 103 of 124
Trainer’s Signature: Date: ____________

INFORMATION SHEET 3.3-1


Undertaking operation and security check

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Learn how to undertake operation and security check.
2. Follow proper procedure in undertaking operation and security check.
Overview: Undertaking operation and security check, will give the learner basic
understanding on how to check operation and security in computer system and
network.

Network Security

As a future Computer Technician, you need to understand


computer and network security. Failure to implement proper
security procedures can affect users, computers, and the general
public. Private information, company secrets, financial data,
computer equipment, and items about national security are placed
at risk if proper security procedures are not followed.

The Importance of Security in Computer System and Networks

Computer and network security help keep data and


equipment safe by giving only the appropriate people access.
Everyone in an organization should give high priority to security,
because everyone can be affected by a lapse in security.
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 104 of 124
Theft, loss, network intrusion, and physical damage are some
of the ways a network or computer can be harmed. Damage or loss
of equipment can mean a loss of productivity. Repairing and
replacing equipment can cost the company time and money.
Unauthorized use of a network can expose confidential information
and reduce network resources.

An attack that intentionally degrades the performance of a


computer or network can also harm an organization’s production.
Poorly implemented security measures that allow unauthorized
access to wireless network devices demonstrate that physical
connectivity is not necessary for security breaches by intruders.

A technician’s primary responsibilities include data and


network security. A customer or an organization may depend on
you to ensure that their data and computer equipment are secure.
You will perform tasks that are more sensitive than those assigned
to the average employee. You may have to repair, adjust, and
install equipment. You need to know how to configure settings to
keep the network secure, but still keep it available to those who
need to access it. You will ensure that software patches and
updates are applied, antivirus software is installed, and
antispyware software is used. You may also be asked to instruct
users on how to maintain good security practices with computer
equipment.

Security Attacks

To successfully protect computers and the network, a


technician must understand both of the following types of threats
to computer security:

 Physical: Events or attacks that steal, damage, or


destroy such equipment as servers, switches, and
wiring.
 Data: Events or attacks that remove, corrupt, deny
access to, allow access to, or steal information.

Threats to security can come from inside or outside an


organization, and the level of potential damage can vary greatly.
Potential threats include the following:

 Internal: Employees who have access to data,


equipment, and the network. Internal attacks can be
characterized as follows:
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 105 of 124
 Malicious threats are when an employee intends
to cause damage.
 Accidental threats are when the user damages
data or equipment unintentionally.

 External: Users outside an organization who do not


have authorized access to the network or resources.
External attacks can be characterized as follows:
 Unstructured attacks, which use available
resources, such as passwords or scripts, to gain
access to and run programs designed to vandalize.
 Structured attacks, which use code to access
operating systems and software.

Physical loss or damage to equipment can be expensive, and


data loss can be detrimental to your business and reputation.
Threats against data are constantly changing as attackers find new
ways to gain entry and commit their crimes.

Viruses, Worms, and Trojan Horses

Computer viruses are created with malicious intent and sent


by attackers. A virus is attached to small pieces of computer code,
software, or document. The virus executes when the software is
run on a computer. If the virus spreads to other computers, those
computers could continue to spread the virus.

A virus is transferred to another computer through e-mail, file


transfers, and instant messaging. The virus hides by attaching itself
to a file on the computer. When the file is accessed, the virus
executes and infects the computer. A virus has the potential to
corrupt or even delete files on your computer, use your e-mail to
spread itself to other computers, or even erase your hard drive.
Some viruses can be exceptionally dangerous. The most damaging
type of virus is used to record keystrokes. Attackers can use these
viruses to harvest sensitive information, such as passwords and
credit card numbers. Viruses may even alter or destroy information
on a computer. Stealth viruses can infect a computer and lay
dormant until summoned by the attacker.

A worm is a self-replicating program that is harmful to


networks. A worm uses the network to duplicate its code to the
hosts on a network, often without any user intervention. It is
different from a virus because a worm does not need to attach to
a program to infect a host. Even if the worm does not damage
data or applications on the hosts it infects, it harms networks
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 106 of 124
because it consumes bandwidth.

A Trojan horse technically is a worm. It does not need to


be attached to other software. Instead, a Trojan threat is hidden
in software that appears to do one thing, and yet behind the
scenes it does another. Trojans often are disguised as useful
software. The Trojan program can reproduce or replicate like a
virus and spread to other computers. Computer data damage and
production loss could be significant. A technician may be needed
to perform the repairs, and employees may lose or have to
replace data. An infected computer could be sending critical data
to competitors while at the same time infecting other computers
on the network.

Security Procedures

You should use a security plan to determine what will be


done in a critical situation. Security plan policies should be
constantly updated to reflect the latest threats to a network.

A security plan with clear security procedures is the basis


for a technician to follow. Security plans should be reviewed each
year. Part of the process of ensuring security is conducting tests
to determine areas where security is weak. Testing should be
done on a regular basis. New threats are released daily.

Regular testing provides details of any possible weaknesses in


the current security plan that should be addressed. A network
has multiple layers of security, including physical, wireless, and

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 107 of 124
data. Each layer is subject to security attacks. The technician
needs to understand how to implement security procedures to
protect equipment and data.

Source: www.computerflu.com
Figure 87. Most Commonly Known Anti-Virus Software

Virus protection software, known as antivirus


software, is software designed to detect, disable, and
remove viruses, worms, and Trojans before they infect a
computer. Antivirus software becomes outdated quickly,
however. The technician is responsible for applying the most
recent updates, patches, and virus definitions as part of a
regular maintenance schedule. Many organizations establish
a written security policy stating that employees are not
permitted to install any software that is not provided by the
company. Organizations also make employees aware of the
dangers of opening e-mail attachments that may contain a
virus or worm.

Data Encryption

Encrypting data involves using codes and ciphers. Data


encryption can help prevent attackers from monitoring or
recording traffic between resources and computers. It may
not be possible to decipher captured data in time to make
any use of it. A security alert may inform you that you are
using an encrypted connection.

A virtual private network (VPN) is an encryption


system that protects data as though it resides on a private
network. The data actually travels over the Internet or
another unsecured public network.

Port Protection

Every communication using TCP/IP is associated with


a port number. HTTPS, for instance, by default uses port
443. A firewall is a way of protecting a computer from
intrusion through the ports.

With port protection, the user can control the type


of data sent to a computer by selecting which ports will be
open and which will be secured. Data being transported on
a network is called traffic.
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 108 of 124
.
How to Enable Firewall for Windows 10?

1. Select the Start button > Settings > Update & Security > Windows
Security and then Firewall & network protection. Click Open Windows
Security settings

2. Select a network profile: Domain network, Private network, or Public


network.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 109 of 124
3. Under Microsoft Defender Firewall, switch the setting to On. If your device is
connected to a network, network policy settings might prevent you from
completing these steps. For more info, contact your administrator.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 110 of 124
4. To turn it off, switch the setting to Off. Turning off Microsoft Defender Firewall
could make your device (and network, if you have one) more vulnerable to
unauthorized access. If there's an app you need to use that's being blocked, you
can allow it through the firewall, instead of turning the firewall off.

Note: If you get errors, or if the setting won't turn on, you can use the
troubleshooter and then try again.

Wireless Security Techniques

Traffic flows through radio waves in wireless networks, so it is


easy for attackers to monitor and attack data without having to
connect to a network physically. Attackers gain access to a network
by being within range of an unprotected wireless network. A
technician needs to know how to configure access points and
wireless network interface cards (WNIC) to an appropriate level of
security.

When installing wireless services, you should apply the


following wireless security techniques immediately to prevent
unwanted access to the network:

 Wired Equivalent Privacy (WEP) was the first-


generation security standard for wireless network.
Attackers quickly discovered that 64-bit WEP
encryption was easy to break. Monitoring programs
could detect the encryption keys used to encode the
messages. After the keys were obtained, messages
could be easily decoded. In an attempt to overcome
this weakness, most users employ a 128-bit key for
WEP.
 Change the default administration password.
 Disable the broadcasting of the Service Set Identifier
(SSID) to hide it from other users.
 Use MAC filtering to protect the network from other users.
 Change the default values of the SSID by entering the
setup program for the access point and renaming the
SSID.
 Update to the latest available firmware.
 Install or activate a firewall, and adjust the settings to
eliminate all traffic except the desired network
settings.
 Update to the latest available firmware.
 Install or activate a firewall, and adjust the settings to
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 111 of 124
eliminate all traffic except the desired network settings.

An attacker can access data as it travels over the


radio signal. However, you can use a wireless encryption
system to encode data and thereby prevent unwanted
capture and use of the data. Both ends of every link must
use the same encryption standard. The following list
describes the different levels of wireless security, from most
secure to least secure:

 Lightweight Extensible Authentication


Protocol (LEAP): Also called EAP-Cisco, LEAP is a
wireless security protocol created by Cisco to
address the weaknesses in WEP and WPA. LEAP is
a good choice when using Cisco equipment in
conjunction with operating systems such as
Windows and Linux.
 Wi-Fi Protected Access (WPA): An improved
version of WEP. It was created as a temporary
solution until 802.11i (a security layer for wireless
systems) was fully implemented. Now that 802.11i
has been ratified, WPA2 has been released. It
covers the entire 802.11i standard.
 WEP 128: An enhanced encryption protocol
combining a 104-bit key and a 24-bit initialization
vector.
 WEP 64: The first-generation security standard for
wireless network. It could be exploited because of
an encryption key that was vulnerable to decoding.
 No security: Although you can elect to implement
no security whatsoever, you leave your wireless
network completely vulnerable to attack.

In addition, Wireless Transport Layer Security


(WTLS) is a security layer used in mobile devices that
employ the Wireless Applications Protocol (WAP). Mobile
devices do not have a great deal of spare bandwidth to
devote to security protocols. WTLS was designed to provide
security for WAP devices in a bandwidth-efficient manner.

To manually create a network profile using WEP


shared key authentication:

1. Open Network and Sharing Center by clicking the Start


button
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 112 of 124
Then clicking Control Panel.
2.
In the search box, type network
3.
Click Network and Sharing Center.
4.
Click Set up a new connection or network.
5.
Click Manually connect to a wireless network
6.
Click Next.
7.
On the Enter information for the wireless
8.
network you want to add page
9. Under Security type, select WEP.
10. Complete the rest of the page, and then click Next.
11. Click Change connection settings.
12. Click the Security tab, and then, under Security type, click
Shared.
13. Click OK, and then click Close.

Job Sheet 3.3-1-A

Title: Undertaking operation and security check


Performance Objective: Enable firewall for Windows 10

Tools/PPE:
Materials : 1SU Windows 10, network

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 113 of 124
Steps/Procedure:

1. Select the Start button


2. Select Setting
3. Click Update & Security
4. Choose Windows Security and click it.
5. Select Firewall & network protection and click it.
6. Click Open Windows Security settings
7. Select a network profile: Domain network, Private network, or Public
network
8. Under Microsoft Defender Firewall, switch the setting to On

Assessment Method: Performance Demonstration.

PERFORMANCE CRITERIA CHECKLIST JOB SHEET 3.3-1-A

Undertaking operation and security check

Trainee’s Name: Date:

CRITERIA YES NO N/A

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 114 of 124
1. Did you select the Start button?
2. Did you select Setting?
3. Did you click Update & Security?
4. Did you choose Windows Security and click it?
5. Did you select Firewall & network protection and
click it?
6. Did you click Open Windows Security settings?
7. Did you select a network profile: Domain
network, Private network, or Public network?
8. Did you switch the setting to On?

Comments/Suggestions

Trainer’s Signature: Date: ____________

Job Sheet 3.3-1-B

Title: Undertaking operation and security check


Performance Objective: Manually create a network profile using WEP shared
key authentication

Tools/PPE:
Materials : 1SU Windows 10, network

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 115 of 124
Steps/Procedure:

1. Click the Start button


2. Look for Control Panel then click it
3. In the search box, type network
4. Click Network and Sharing Center
5. Click Set up a new connection or network
6. Click Manually connect to a wireless network
7. Click Next
8. On the Enter information for the wireless network
you want to add page
9. Under Security type, select WEP
10. Complete the rest of the page, and then click Next
11. Click Change connection settings
12. Click the Security tab, and then, under Security type, click
Shared
13. Click OK, and then click Close

Assessment Method: Performance Demonstration.

PERFORMANCE CRITERIA CHECKLIST JOB SHEET 3.3-1-B

Undertaking operation and security check

Trainee’s Name: Date:

CRITERIA YES NO N/A


Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 116 of 124
1. Did you click the Start button?
2. Did you look for Control Panel and click it?
3. Did you type network on the search box?
4. Did you click Network and Sharing Center?
5. Did you click Set up a new connection or network?
6. Did you click Manually connect to a wireless
network?
7. Did you click Next?
8. Did you select Add page?
9. Did you select WEP under Security type?
10. Did you click Next?
11. Did you click Change connection settings?
12. Did you click the Security tab, and then, under
Security type, click Shared?
13. Did you Click OK, and then click Close?

Comments/Suggestions

Trainer’s Signature: Date: ____________

INFORMATION SHEET 3.3-2


Preparing and completing report

Learning Objectives:
After reading this INFORMATION SHEET, LEARNER MUST be able to:
1. Learn how to prepare a technical report for computer system and
network.
Overview: In preparing and competing a report will give the learner the guidelines
in constructing a report and forms.
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 117 of 124
The main purpose of a technical report is to deliver information.
Technical reports are intended primarily for the long-term archival of
results and descriptions and for monitoring the conditions of laboratory
facilities such as the computers, network status and other hardware
facilities.

A good report needs careful planning. As part of the planning


stage, you should answer the following questions.

 What is the report about? What are you trying to say? You should
arrange things so that the key facts and conclusions are very
accessible. Not everyone will read the whole report, so ensure that
your message is concise even if a person only skims the document.
 Who are you writing for? It is simply impossible to write a technical
document that will be equally easy for everybody to read: the level of
explanation you need for an expert audience is totally different from
the explanation needed for readers who are unfamiliar with the
subject. It is absolutely essential that you identify the potential
readers — the professional group, not the individuals — before you
start your work.

How long can the report be? It is difficult to predict in advance exactly how
long a report will be. Technically speaking, writing reports for hardware and
other facilities should be specific and itemized.

A computer system and network report can help you to:


 identify the hardware components inside your computer
– CPU, memory, motherboard etc.; and your network
devices.
 understand conflicting hardware inside your computer; and common
errors you may
encounter in networking

 help the computer repair persons and network


administrators to understand your computer system
and networks with a written, detailed hardware report
(therefore he can find the missing drivers faster, for
example).

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 118 of 124
Key tasks in a network maintenance checklist

Network technologies and devices might change over time, but certain
maintenance tasks, such as data backup and device inventory, will always be
essential for network teams.

Network maintenance is important, but projects like designing and installing a new
section of the network or installing a new application can often interfere with
needed maintenance tasks. Despite the urgency of these types of projects, network
teams cannot push aside the following network maintenance tasks.

Network maintenance checklist

1. Data backups

Data backups are the most crucial maintenance activity. No matter what kind of
network disaster takes place, it's crucial to be able to recover up-to-date data. For
some firms, an end-of-day backup is sufficient, while others require continuous
backup. Backups can be made locally or across the network. Local backups should
be stored off-site to protect against fire or other factors that could damage them.
Network teams should check periodically that backups are actually are being done
and are readable. There's nothing worse than when teams need the backed-up data
only to find out that, for some reason, backups haven't been made or can't be
found.

2. Malware protection

Malware protection is increasingly important. Update protection software, run scans


and keep track of new attack types. It's also important to keep server OSes and
network device software up to date. If possible, maintain a test network with no
connection to the main network. Try any updates on the test network before
updating OSes.

3. Network documentation updates

Keep network documentation up to date. It's easy for teams to accidentally skip this
task when dealing with an emergency. Record the time and date of every fix, the
name of the person who made the fix and a description of why the fix was made.

Network maintenance tasks have always been necessary and are unlikely to
change a great deal in the future.

4. Device inventory

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 119 of 124
Maintain an inventory of devices. Develop a set of device names that indicate
where in the network a device is located and the type of device. Include IP and MAC
addresses.

5. Power checks

When teams are focused on all the other things that can go wrong in the network,
it's easy for them to forget that power failures can occur. If possible, connect to
power from two poles and regularly test uninterruptible power supply (UPS)
systems. Increase UPS capacity when adding to the network.

6. Device filter dusting

Dust can clog device intake filters on network devices and air conditioners. Replace
filters when necessary. Clogged filters can decrease airflow, which causes the
temperature to rise. Hotter devices run slower and use more energy.

7. Cable organization

Organize cables, and keep them where they won't be dislodged by a custodian or
someone tripping over one when walking by. Critical networks have been taken
down by these types of accidents.
Changes in technology have introduced new types of devices and management, but
network maintenance tasks have always been necessary and are unlikely to change
a great deal in the future.

https://www.techtarget.com/searchnetworking/tip/Key-tasks-in-a-network-maintenance-checklist

Computer and Network Maintenance Checklist

To keep Chronicle (and your computer system in general) performing well, the
network administrator should regularly do each of the following:
Date Developed: Document No.
Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 120 of 124
On Servers and Workstations

 Check for and install Windows updates.


 Check for and install Office updates.
 Check Windows event logs, and correct ALL errors and potential issues
identified there.
 Check for games, memory-intensive screen savers, and other programs that
shouldn’t be installed. It’s especially important that no one install/play games
or run other programs directly from the server; this can seriously affect
performance. If any inappropriate programs are found, uninstall them and
notify management if necessary.
 Check with users to see if they are experiencing any computer or software
problems.
 Periodically clean machines internally.

On Workstations Only

 Periodically defragment the hard drive.


 Regularly run Spybot and Ad-aware to scan for and remove ad and spyware.
(This should be unnecessary on servers since users should never browse the
internet directly from a server.)

On the Servers Only

 Monitor drive space on the server and on the file server.


 Maintain regular, rotating network backups that include the server backup
folder, QuickBooks data files, and any other key data. (However, do NOT
directly back up from any hard drive on the server; only back up from the
backup folder server writes to your network.)
 Store copies of backups off-site.

General

 Check the firewall, making sure ports are closed except as needed for server
and your other applications.
 Setup and maintain spam filtering.
 Make sure each computer has adequate memory, processor, hard drive,
space, etc., and suggest an upgrade plan to periodically replace obsolete
machines.
 Organize all software by computer/user so you know what you have and so
you can quickly find it if you need to reinstall any software.

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 121 of 124
 Arrange for someone to cover for you in case a network problem occur when
you are unavailable or away.

https://www.pdffiller.com/

Self-Check 3.3-2

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 122 of 124
Why is it important to prepare a technical report for computer systems and
networks?

____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________

Answer Key 3.3-2

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 123 of 124
A computer system and network report can help you to:
 identify the hardware components inside your computer
– CPU, memory, motherboard etc.; and your network
devices.
 understand conflicting hardware inside your computer; and common
errors you may
encounter in networking
 help the computer repair persons and network
administrators to understand your computer system
and networks with a written, detailed hardware report
(therefore he can find the missing drivers faster, for
example).

Date Developed: Document No.


Dec. 13, 2023 Issued by:
COMPUTER SSYTEM
SERVICING NCII Developed by:
Roberto B. Navarro Jr. Page 124 of 124

You might also like