Вы находитесь на странице: 1из 65

Republic of the Philippines

Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 9
COMPUTER SYSTEMS SERVICING
November 15, 2016

I. Objective(s)
L3_LO2_2.3 Install computer systems, networking devices and peripherals in accordance
with job requirements

Demonstrates skills and understanding in Windows Server 2008 and driver


installation.

TLE_ICTCS9CN-IIa-g-2

II. Subject Matter


A. Topic : Windows Server 2008 and Driver Installation
B. References :
a. Curriculum Guide : L3_LO2_2.3_2.3.1_p7
b. Teacher’s Guide : CHS9_p7
c. Learner’s Material : CHS9_107-116
d. Training : TESDA Core Competencies TESDAELC724331
Regulations 2_2.1_p35
e. Other References : Youtube.com
C. Materials : PC, 8 Gb flash drive, Windows 7 download tool, Windows 7 ISO
file format.
III. Procedure
A. Pre Activity
1. Preliminaries
2. Review
2.1 Recall the Occupational Health and Safety procedure for Windows
installation.
2.2 BIOS setup utilities configuration. Setting Specific Boot Media as Boot
Priority Option.
2.3 What are the materials needed for windows installation?
2.4 Windows 7 installation Procedure.
2.5 Procedure to create a bootable stick.
3. Present the rubrics on installation of Windows 7.

B. Activity
1. Presentation of the lesson.
2. Instruct the students to create
3. Visualize and discuss the Windows Server 2008 installation procedure.
4. Let the students install Windows Server 2008 in some available PCs.

C. Analysis
1. State the difference between the installation of Windows 7 from Windows Server
2008.
2. Cite the purpose of Windows Server 2008 and Windows 7 Operating System.
3. Site importance on the Windows Server 2008 installation to you being the CSS
students.
D. Abstraction.
1. How to install Windows Server 2008?
2. The System Specification required for Windows Sever 2008.
3. Cite purposes of Windows Server 2008 in internet café.
4. If you are the owner of an internet café, would you use Windows Server? Why?

E. Application
1. Install Windows Server 2008 in some available PCs.

IV. Assessment
Note: Students will be rated base on the prepared rubrics presented below.

Section Time P F PL MPS Remarks


9 - Mercury 10:55 - 11:55
9 - Aluminum 01:00 - 02:00
9 – Beryllium 02:00 - 03:00

Skill Score Card


Criteria Percentage Score
Accuracy
50%
(Adherence to the correct procedure)
Workmanship
(Adherence to OHS policy, neatness and organization of 30%
materials used)
Speed 20%
PERFORMANCE RATING 100%

RUBRICS
ACCURACY
(50) – Created partition in the hard drive into two (partition 1 about 150Gb and
partition 2 is the remaining disk space) Install operating system in drive
C:\.
(40) – Created partition in the hard drive into two (partition 1 about 150Gb and
partition 2 is the remaining disk space) but OS is installed in drive D:\.
(30) – Did not create hard drive partition but able to install operating system.
(20) – Was not able to finish the installation process.
(10) – Were not able to create partition and installed Windows Server 2008.

RUBRICS
WORKMANSHIP
(30) – Observed OHS policy, neatness and organization of materials used.
(20) – Some of the OHS policy, neatness and organization of materials used was
not observed.
(10) – Did not observed OHS policy, neatness and organization of materials used.

RUBRICS
SPEED
(20) – Able to finish Windows Server 2008 installation in one hour
(10) – Was not able to finish Windows 7 installation in one hour.
V. Homework
A. Topic : Create a bootable disk in Windows Server 2008 and copy
service pack solution for the driver, MS office and other
applications needed for a computer.

B. Reference(s) : TESDA Training Regulations - Core Competencies_3_3.2p35


Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head - TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
November 17, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

1. Visualizes Windows Server 2008 active directory.

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Windows Server 2008 active directory.
B. References :
a. Curriculum Guide : L3_LO2_2.1_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training Regulations : Unit Code ELC724333 (Set-up Computer Servers)
e. Other References : CSS NCII Windows Server 2008 Configuration Video
Clip
http://www.everyjoe.com/2006/03/27/technology
/57-2/#ixzz4McGgBH3u

C. Materials : Laptop, Speaker, Video Clips on Introduction to active


directory.

III. Procedure
A. Pre Activity
1. Preliminary activities.
2. Recall the network configuration’ procedures for windows 7 clients and host.
3. As the students to recite the procedures.
4. Differentiate between server computer from clients.

B. Activity
1. Presentation of the lesson by saying: “Visualizes windows server 2008 active
directory.
2. Film showing. Play the .mp4 video clips on Introduction to Active Directory.
3. Let the students answer the following questions:
3.1 What is an active directory?
3.2 Differentiate between workgroup from Domain;
3.3 Define Forest; and
3.4 What is the importance of server configuration in computerization?

C. Analysis
What is an active directory?
Active Directory is Microsoft's trademarked directory service, an integral part of the
Windows 2000 architecture. Like other directory services, such as Novell Directory Services
(NDS), Active Directory is a centralized and standardized system that automates network
management of user data, security, and distributed resources, and enables interoperation
with other directories. Active Directory is designed especially for distributed networking
environments.

Differentiate between workgroup from domain.


In computer networking, a workgroup is a collection of computers on a local area
network (LAN) that share common resources and responsibilities. The term is most
commonly associated with Microsoft Windows workgroups but also applies in other
environments.

Workgroups in Microsoft Windows


Microsoft Windows workgroups organize PCs as Windows peer-to-
peer local networks that exist to facilitate easier sharing of files, printers and other local
network resources. Each PC that's a member of the group can access the resources being
shared by other PCs and in turn can share its own if configured to do so. Windows
workgroups can be found in homes, schools and small businesses.
Joining a workgroup requires setting up the PC with a workgroup name matching
that of other PCs in the group. All Windows PCs are automatically assigned to a
default group named "WORKGROUP" (in Windows XP, "MSHOME"). Users with
administrative privileges can change this name from the WIndows Control Panel (the
"Change settings" link under System).

Note that workgroup names are managed separately from computer names.

To access shared resources on other PCs within its group, a user must know the
name of the workgroup that computer belongs to plus the username and password of an
account on the remote computer.
Windows workgroups may contain many computers but work best with smaller
numbers (15 or fewer). As the number of computers increases, a workgroup LAN eventually
become very difficult to administer and should be re-organized into multiple networks or
a client-server network.

Windows Workgroups vs. Homegroups and Domains


Windows domains support client-server local networks. A specially configured
computer called the Domain Controller running a Windows Server operating system serves
as a central server for all clients. Windows domains can scale handle to many more
computers than workgroups due to maintaining centralized resource sharing and access
control. A client PC can belong only to a workgroup or to a Windows domain but not both -
assigning a computer to the domain automatically removes it from the workgroup.

Microsoft introduced the HomeGroup concept in Windows 7. HomeGroups are


designed to simply the management of workgroups for administrators, particularly
homeowners. Instead of requiring an administrator to manually set up shared user accounts
on every PC, HomeGroup enables security to be managed through one shared login. Joining
a HomeGroup does not remove a PC from its Windows workgroup; the two sharing methods
co-exist. Computers running versions of Windows older than Win7, however, cannot be
members of HomeGroups.

Workgroup vs. Domain: What’s the difference?


Windows has two modes of operation – Workgroup and Domain. Depending on the
environment that your computer is in, you will be running in one of these two modes. Most
home and small business environments will be Workgroup, and most mid- to large
businesses will run in domain mode. There are different features and capabilities depending
on each, and each serve a purpose

Workgroups can be best understood as a loosely connected group of computers.


They rely on each other for nothing, but they are there to share resources should the need
arise. There is no centralized management and so there is a low barrier to use. By default,
Windows XP is in this mode.

Domains, on the other hand, provide centralized management and security. User
access is controlled from a separate server called a domain controller and there is a “trust”
built between systems in a domain. There are much more robust differences as well.

Workgroup
A workgroup is best understood as a peer-to-peer network. That is, each computer
is sustainable on its own. It has its own user list, it’s own access control and its own
resources. In order for a user to access resources on another workgroup computer, that exact
user must be setup on the other computer.

In addition, workgroups offer little security outside of basic access control. Windows
“share permissions” are very basic and do not offer any kind of granularity for “who” can
access “what”, etc.
Workgroups are more than adequate, though, for most small business and home use.

Domain
A domain is a trusted group of computers that share security, access control and have
data passed down from a centralized domain controller server or servers. Domain
Controllers handle all aspects of granting users permission to login. They are the gatekeeper.
In addition, most modern domains use Active Directory which allows and even more
centralized point for software distribution, user management and computer controls.
D. Abstraction
1. What is an active directory?
2. Differentiate between workgroup from Domain;
3. Define Forest; and
4. What is the importance of server configuration in computerization?
5. Call students to visualize Windows Server 2008 Active Directory.

E. Application
1. Relate active directory to a real life situation.
2. Cite examples.

IV. Assessment
Direction: Answer the following questions.

1. What is an active directory?


2. Differentiate between workgroup from Domain;
3. Define Forest; and
4. What is the importance of server configuration in computerization?

Section Time P F PL MPS Remarks


G10-Bell 8:40-9:40
G10-Galileo 9:55-10:55

V. Assignment
A. Topic : Download video clip procedure from youtube about installation
and configuring active directory.
B. Reference(s) : Youtube.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
November 18, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

1. Identifies the procedure to configure Active Directory - Windows Server


2008 R2.
TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Configuring Active directory (Windows Server 2008 R2)
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training Regulations : Unit Code ELC724331 (Install and Configure
Computer Systems)
e. Other References :
C. Materials : Ethernet cable (UTP Cat5e, RJ45, LAN tester, Crimping tool),
Router, 2 desktop computers. Job order, Rubrics.

III. Procedure
A. Pre Activity
1. Preliminary activities.
2. Drill
2.1 Using computer, demonstrate the host-client configuration including:
2.1.1 File/folder sharing; and
2.1.2 Printer sharing.
3. Identify the two different types of computer system settings.
4. Unlock difficulties.
4.1 Domain. In a LAN, a subnetwork made up of a group of clients and servers
under the control of one security database. In a communication network, all
resources under the control of a single computer system. (A system of
centralized network administration, in which the permissions that grant access
to resources in the network are maintained in one or more servers called Domain
controllers.
4.2 Workgroup. Two or more individuals who share data and resources.
5. When to use domain and workgroup in networking?
6. What is the function of domain in networking?
7. Where can we find domain?

B. Activity
1. Presentation of the lesson “Identifies the procedure to configure Active Directory in
Windows Server 2008 R2”.
2. A video clip about installing and configuring active directory for windows server
2008 R2 is save in the DCP computer. Instruct them to play the clip in order to
identify the required procedure. Ask the students to write down the procedure in
their note book while playing the clip.
3. Let the students present the procedure to the class after viewing the clips on active
directory.

C. Analysis
1. What is the procedure to configure active directory for windows server 2008 R2?
2. Describe active directory. Give benefits of domain controller.
3.

D. Abstraction
Procedure to configure active directory.
How to Install Active Directory On Windows Server 2008 R2

Active Directory is essential to any Microsoft network built on the client-server network
model–it allows you to have a central sever called a Domain Controller (DC) that does
authentication for your entire network. Instead of people logging on to the local machines they
authenticate against your DC. Let’s take a look at how to install Microsoft’s Active Directory.

Installation
Open Server Manager and click on roles, this will bring up the Roles Summary on the
right hand side where you can click on the Add Roles link.

This will bring up the Add Roles Wizard where you can click on next to see a list of
available Roles. Select Active Directory Domain Services from the list, you will be told that you
need to add some features, click on the Add Required Features button and click next to move on.

A brief introduction to Active Directory will be displayed as well as a few links to


additional resources, you can just click next to skip past here and click install to start installing
the binaries for Active Directory.
When the installation is finished you will be shown a success message, just click close.

Configuration
Open up Server Manager, expand Roles and click on Active Directory Domain Services.
On the right hand side click on the Run the Active Directory Domain Services Installation Wizard
(dcpromo.exe) link.

This will kick off another wizard, this time to configure the settings for you domain, click next to
continue.
The message that is shown now relates to older clients that do not support the new cryptographic
algorithms supported by Server 2008 R2, these are used by default in Server 2008 R2, click next
to move on.

Choose to create a new domain in a new forest.


Now you can name your domain, we will be using a.local domain the reason why will be
explained in an upcoming article.

Since this is the first DC in our domain we can change our forest functional level to Server 2008
R2.
We want to include DNS in our installation as this will allow us to have an AD Integrated DNS
Zone, when you click next you will be prompted with a message just click yes to continue.

You will need to choose a place to store log files, it is a best practice to store the database and
SYSVOL folder on one drive and the log files on a separate drive, but since this is in a lab
environment I will just leave them all on the same drive.
Choose a STRONG Active Directory Restore Mode Password and click next twice to kick off the
configuration.

You will be able to see what components are being installed by looking in the following box.
When it’s done you will be notified and required to reboot your PC.

That’s all there is to it guys, now you have a working installation of Active Directory.

2. Enumerate the steps to install and configure active directory for windows Server
2008 R2

E. Application
Let the students configure windows server 2008 R2.

IV. Assessment
Write down the complete procedure to configure active directory for Windows
Server 2008 R2.

V. Assignment
A. Topic : Active Directory Configuration.
B. Reference(s) : Youtube.com

Prepared by: Checked by:


ROBIN A. CANO NOEL P. DEL PILAR
TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
November 18, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

Perform the procedure to configure Active Directory - Windows Server 2008 R2.

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Configuring Active directory (Windows Server 2008 R2)
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training Regulations : Unit Code ELC724331 (Install and Configure
Computer Systems)
e. Other References :
C. Materials : Ethernet cable (UTP Cat5e, RJ45, LAN tester, Crimping tool),
Router, 2 desktop computers. Job order, Rubrics.

III. Procedure
A. Pre Activity
1. Preliminary activities.
2. Drill
2.1 Using computer, demonstrate the host-client configuration including:
2.1.1 File/folder sharing; and
2.1.2 Printer sharing.
3. Identify the two different types of computer system settings.
4. Unlock difficulties.
4.1 Domain. In a LAN, a subnetwork made up of a group of clients and servers
under the control of one security database. In a communication network, all
resources under the control of a single computer system. (A system of centralized
network administration, in which the permissions that grant access to resources
in the network are maintained in one or more servers called Domain controllers.
4.2 Workgroup. Two or more individuals who share data and resources.
5. When to use domain and workgroup in networking?
6. What is the function of domain in networking?
7. Where can we find domain?

B. Activity
1. Presentation of the lesson “Identifies the procedure to configure Active Directory in
Windows Server 2008 R2”.
2. A video clip about installing and configuring active directory for windows server
2008 R2 is save in the DCP computer. Instruct them to play the clip in order to
identify the required procedure. Ask the students to write down the procedure in
their note book while playing the clip.
3. Let the students present the procedure to the class after viewing the clips on active
directory.

C. Analysis
1. What is the procedure to configure active directory for windows server 2008 R2?
2. Describe active directory. Give benefits of domain controller.

D. Abstraction
Procedure to configure active directory.
1. Click server manager icon in the taskbar.

2. Click view network connections.

3. Edit the Local Area Connection by right click then properties


4. Uncheck the TCP/IPv6 then click TCP/IPv4

E. Application
Let the students configure windows server 2008 R2.

IV. Assessment
Write down the complete procedure to configure active directory for Windows
Server 2008 R2.

V. Assignment
A. Topic : Active Directory Configuration.
B. Reference(s) : Youtube.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department
Republic of the Philippines
Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
November 29, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

Installs and configures Windows Server 2008 R2 Active Directory.

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Installing and Configuring Active directory (Windows Server 2008
R2)
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure Computer
Regulations Systems)
e. Other References :
C. Materials : Ethernet cable (UTP Cat5e, RJ45, LAN tester, Crimping tool),
Router, 2 desktop computers. Job order, Rubrics.

III. Procedure
A. Pre Activity
1. Preliminary activities.
2. Drill
2.1 Spell out the following:
2.1.1 AD
2.1.2 DS
2.1.3 DNS
2.1.4 FQDN
3. Review the procedure of Windows Server 2008 R2 Active Directory installation
and configuration.
3.1 Enumerate the procedure to install Windows Server 2008 R2 Active
Directory.
3.2 What are the steps to configure install Windows Server 2008 R2 Active
Directory?

B. Activity
1. Presentation of the lesson “Installs and configures Windows Server 2008 R2 Active
Directory”.
2. Distribute the job order on Installation and Configuration of Windows Server 2008
R2 Active Directory.

JOB ORDER

1. Install Windows Server 2008 R2 Active Directory.


2. Configure Windows Server 2008 R2 Active Directory.
3. Restore Windows Server 2008 R2 default configuration.
C. Analysis
1. State the importance of installation and configuration of active directory.
2. Describe active directory. Give benefits of domain controller.

D. Abstraction
Procedure to configure active directory.

E. Application
Installs and configures Windows Server 2008 R2 Active Directory

IV. Assessment
Installs and configures Windows Server 2008 R2 Active Directory

V. Assignment
A. Topic : 1. Describe DHCP.
2. Search the procedure to Install & Configure DHCP - Windows
Server 2008 R2
B. Reference(s) : Youtube.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte
LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
December 5, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

Identify the procedure to install and configure Dynamic Host Control Protocol
(DHCP) for Windows Server 2008 R2.

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Installing and Configuring Dynamic Host Control Protocol (DHCP)
Windows Server 2008 R2
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure Computer
Regulations Systems)
e. Other References :
C. Materials : Desktop, speaker, LCD projector, Video

III. Procedure
A. Pre Activity
1. Preliminary activities.
2. Drill
2.2 Spell out the following:
2.2.1 AD
2.2.2 DS
2.2.3 DNS
2.2.4 FQDN
3. Review the procedure of Windows Server 2008 R2 Active Directory installation
and configuration.
3.2 Enumerate the procedure to install Windows Server 2008 R2 Active
Directory.
3.3 What are the steps to configure install Windows Server 2008 R2 Active
Directory?

B. Activity
1. Presentation of the lesson “Identify the procedure to install and configure Dynamic
Host Control Protocol (DHCP) for Windows Server 2008 R2”.
2. Play the video on installation and configuration of DHCP for windows server 2008
R2.
3. Take note on the steps to install and configure DHCP for windows server 2008 R2.
4. Presentation of output.

C. Analysis
1. Describe the interaction between clients and server in DHCP.
2. What are the steps to install and configure Dynamic Host Control Protocol
(DHCP) for Windows Server 2008 R2?

D. Abstraction
1. Discussion: discuss the concept of DHCP

Install and configure a DHCP server in Windows Server 2008?


DHCP is an invaluable service when you have a network larger than a handful of
computers. Microsoft Windows Server 2008's built-in DHCP server allows Windows machines
to obtain their IP addresses and network settings automatically, which can vastly simplify
network configuration. Steven Warren describes how to install and configure a DHCP server
in Windows Server 2008, and explores some of the advanced features DHCP has to offer.
Dynamic Host Configuration Protocol (DHCP) is an invaluable service when you have
a network larger than a handful of computers. It's also a standard component of enterprise
networks and sub networks. Microsoft Windows Server 2008's built-in DHCP server allows
Windows machines (and any other TCP/IP-based machines and devices) to obtain their IP
addresses and network settings automatically, which can vastly simplify network
configuration. In this document, we'll discuss how to install and configure a DHCP server in
Windows Server 2008, and we'll explore some of the advanced features DHCP has to offer.

Create a plan
Before you configure your DHCP server, it is a good idea to have all your ducks in a
row. Prepare and have all the necessary information up front before sitting down and
configuring your server. For example, you may need to know:
 The scope of IP addresses that your server will manage (e.g., 192.168.1.50 to
192.168.1.200).
 Which machines require static IP addresses (i.e., those machines such as servers and
routers that will not use DHCP to receive their IP addresses but will be set manually).
 Which network information you want to send out to DHCP clients when they get their IP
addresses (e.g., the addresses for your default gateway, DNS servers, and WINS
servers).

It is much easier to configure your DHCP server with this information in hand rather
than scrambling for it at implementation time.

Installing DHCP
Installing a DHCP server in Windows 2008 is a snap. They created a very simple
wizard that walks you through the entire process. Follow me on this journey.
To install a DHCP server from the Control Panel, follow these steps:
1. From the Start menu, select | Control Panel | Administrative Tools | Server Manager.
2. Expand and click Roles (Figure A).
3. Choose Add Roles and follow the wizard by selecting the DHCP role (Figure B).
4. A new DHCP wizard appears to help you configure a DHCP server.
Figure A

Server Manager

Figure B

Add Roles Wizard

In the previous release of Windows, a wizard did not appear to walk you through
creating a DHCP server. Windows Server 2008 has really simplified this process by allowing
you to configure a DHCP server in roughly seven steps. Of course, you can still manage your
DHCP server from the DHCP Microsoft Management Console (MMC) snap-in or delete and create
scopes on the fly.
Let's continue on through the wizard. Your network cards and static IP addresses are
automatically detected and you can choose how DHCP will service clients on different subnets,
as shown in Figure C.

Figure C

Choose your static IP addresses to service DHCP clients


On the next window (Figure D), you can specify the applicable DNS server(s) to be
used with DHCP when an address is assigned. Figure E displays where you would enter the
applicable WINS servers if you require it on your network.

Figure D

Enter your DNS server IP address

Figure E

Enter your WINS server IP address

About scopes
When you create a scope, you must select the range of IP addresses and you must
specify the appropriate scope options to include. These options are what we were referring to
above when we mentioned that you can assign other network information to your clients at the
time they are given an IP address.
There are two types of scope options: Global and Scope. Global options are propagated
to all the scopes that you create on that DHCP server, while Scope options are only for the
individual scope that you are working with.
For example, if you have different scopes for several different subnets and each subnet
will have a different default gateway but will share the same DNS servers, you would want to
set the DNS servers as a Global option while the default gateways would be set separately in
each scope as a Scope option.
On the DHCP scope window, you will create your scope. Depending on the size of your
network and the amount of users that will be assigned IP addresses, some thought must be given
to the parameters of your scope selections. In my example (Figure F), I created a simple scope.
Figure F

Creating your scope

The subnet type dropdown allows you to choose wireless as well (Figure G).
It defaults to 24 hours. If you want to activate the scope when the wizard is complete,
click the Activate this scope checkbox. If you leave it empty, you must activate the
scope in the DHCP Microsoft Management Console (MMC) snap-in.

Figure G

You can add multiple scopes before continuing the wizard

With Windows Server 2008, if you have a router (Figure H) that supports and is
configured to take advantage of IPv6, you can enable this functionality on your network.

Figure H
Enable IPv6 stateless mode

Authorizing the DHCP server and activating scopes


In previous versions of Windows Server, you had to install and configure your DHCP
server and then authorize it in the DHCP MMC snap-in. Authorizing your DHCP server allows
you to prevent hackers from configuring rogue DHCP servers. In Windows Server 2008, you
have the ability to either authorize the server in the Wizard or authorize it after the fact in the
DHCP MMC-snap-in (Figure I).

Figure I

Authorizing your DHCP server

You are now ready to review (Figure J) and confirm your settings before applying your DHCP
settings (Figure K).

Figure J
Reviewing your DHCP configuration before applying

Figure K

DHCP installation in progress

Once you have installed the DCHP server, you can manage it from the DHCP MMC
snap-in (Figure O) located in Administrative tools. On this screen you can create additional
exclusions and reservations.

Adding reservations
In addition to specifying exclusions, you can add reservations to your DHCP server. By
adding a reservation, you ensure that a machine always receives the same IP address from the
DHCP server.
1. Right-click on Reservations and choose new reservation.
2. Enter a friendly name for the reservation and the IP address you want to assign to the
computer or device.
3. Enter the MAC address of the computer or device. (For Windows machines, you can find
the MAC address by running ipconfig/all from the command prompt of the machine.)
4. Enter a description and then choose the following reservation type: DHCP, BOOTP (going
across a router), or both, as shown in Figure L. Click Add.

Figure L
Adding a reservation

Adding exclusions
In addition to specifying reservations, you can add exclusions to your DHCP server
(Figure M). By adding exclusions, you ensure that machines never receive a DHCP lease for
that range of IP addresses. This is very useful to block IP addresses for your servers and
routers.

Figure M

Adding an exclusion
In order to add Exclusions, right-click on Address Pools and choose New Exclusion
Range as shown in Figure N and Figure O.

Figure N
IP address Exclusion range

Figure O

DCHP MMC snap-in

Troubleshooting DHCP
After configuring DHCP, the easiest way to troubleshoot it is to use Ipconfig from a
command prompt. To view all TCP/IP information on a machine just type ipconfig/all. To
release a DHCP lease, type ipconfig/release; to renew a lease, type ipconfig/renew.

2. How client-server works in DHCP?

E. Application
How important is DHCP in networking?

IV. Assessment
Write down the steps to install and configure Dynamic Host Control Protocol.

V. Assignment
A. Topic : 1. What is domain controller?
2. Search the procedure to setup a domain controller - Windows
Server 2008 R2
B. Reference(s) : Youtube.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
December 6, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

Identify the procedure to Setup and Configure a Domain Controller on Windows


Server 2008 R2

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : to Setup and Configure a Domain Controller on Windows Server
2008 R2
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure Computer
Regulations Systems)
e. Other References :
C. Materials : Desktop, speaker, LCD projector, Video

III. Procedure
A. Pre Activity
1. Preliminary activities.
2. Drill
2.1 Spell out the following:
2.1.1 AD
2.1.2 DS
2.1.3 DNS
2.1.4 FQDN
3. Review the procedure to setup a domain controller for Windows Server 2008 R2.
3.1 How domain controller works in a network?

B. Activity
1. Presentation of the lesson “Identify the procedure to Setup and Configure a
Domain Controller on Windows Server 2008 R2”.
2. Play the video on Setup and Configure a Domain Controller on Windows Server
2008 R2.
3. Take note on the steps to Setup and Configure a Domain Controller on Windows
Server 2008 R2.
4. Presentation of output.

C. Analysis
1. Relate the function of domain controller with the interaction between clients and
server in DHCP.
2. Enumerate the steps to setup a domain controller for windows server 2008 R2.

D. Abstraction
1. Discussion:
Setup and Configure a Domain Controller on Windows Server 2008 R2

In this series of articles, I will be explaining the simplest and efficient ways to perform
common tasks in Windows Server and SharePoint Server environments. Here I will focus on
Active Directory Domain Services setup and configuration of a new Domain Controller.

A. Log into your Windows Server and start the Server manager

B. Navigate to the Server Roles tab and press on the “Add Roles” button.

C. The Add Roles Wizard is going to open up, click Next.

D. The Wizard will display a list of Roles. Choose the Active Directory Domain Services
Role.

E. The Active Directory Domain Services Role requires adding features to the server. Click
on “Add required features” on the appearing screen and then click on next.
F. On the following screen click on Install and wait for the installation to finish. When the
installation finishes click on Close.

G. At this point the Active Directory Domain Services are not configured yet.

H. If we click on Active Directory Domain Services button we get to the following screen.
Our next step will be configuring Active Directory Domain Services using
dcpromo.exe.
I. We are about to start the Active Directory Domain Services installation Wizard.

J. Navigate to the following screen. Choose the “Create a new domain in a new forest
option” and click on next button.

K. Type in your Domain name.


L. Choose the oldest operating system in your network. This option exists for backwards
compatibility of different features.

M. If your Domain Controller is a stand-alone server you don’t have to choose the DNS server
option. If otherwise, it’s recommended to leave it checked.

N. Specify the folders that will contain the Active Directory controller database, log files. And
SYSVOL and click on Next.

O. Choose a password for Restore mode Administrator account. (This is not the Domain
Administrator account, this is an additional account used for recovery)

P. When the wizard finishes configuring the settings reboot your server.
Q. After rebooting when you first log on the server is not going to accept your machine
Administrator account.

R. In order to solve this issue you need to choose the “Switch User” button and login with
your Domain Administrator account which is basically the same user account and
password but now it belongs to a domain the domain name is needed. For example:
PPSP2010\Administrator.

2. How to setup a domain controller?


3. Explain the importance of domain controller in network server-client network?

E. Application
How important is a domain controller in networking?

IV. Assessment
Write down the steps to install and configure Dynamic Host Control Protocol.

V. Assignment
A. Topic : 1. Download a procedure to create users and groups in Active
Directory.
B. Reference(s) : Youtube.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
December 8, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

Recognizes the steps to create users in active directory.

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Create users users in active directory.
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure
Regulations Computer Systems)
e. Other References :
C. Materials : Desktop, speaker, LCD projector, Video

III. Procedure
A. Pre Activity
1. Review:
 What is account?
 What are being created in some account applets in the control panel?
2. Drill
 Create user account in the Windows 7.
3. Motivation
 Pictures/situations posed before the desktop.
 What do you call the two or more icons that you choose to click to enter
into an account?

B. Activity
1. Presentation of the lesson “Recognizes the steps to create new users in active
directory”
2. Play the video on Server Basics 2: Create users in an active directory.
3. Take note on the steps to create users in an active directory.
4. Presentation of output.

C. Analysis
1. Relate the steps to create user account in Windows 7 from user’s active
directory.
2. Reiterate the steps to create some new users in an active directory.

D. Abstraction
1. Discussion:

How to Create a New User in Server 2008


One of the first things to do in a new network is to create Users, also called User
Objects. As long as you know the information about the user you need to create, the process
will take no time at all.
This is a task we want to do from a Domain Controller, and you should have the
Administrative Tools in your Start menu next to the Control Panel link. We’ll choose the Active
Directory Users and Computers snap-in.

Once we’re inside the Active Directory Users and Computers snap-in, we’ll need to
expand the domain in which we want to create the user, and right-click on the Users folder.
We’ll then select New|User.

The New Object – User box will pop up and require you to put in the user’s name and
create the user logon. You’ll need to use a standard method of creating user logon names, as
this will cause much less confusion in the future. If you have a small network, you may want
to just stick to using the first initial and last name because it’s shorter. If you anticipate that
your network will grow quite large, the standard advice is to use the full first and last name
separated by a period, as we’ve done below.

Next we’ll give the user an initial password, and make sure to have them change it as
soon as they first logon.

When we’re finished, we’ll get a nice summary of our work.


When we go back to the Users folder in the domain, we can see our newly created user.

Once we’ve created a user, there are many things that we’ll need to do with them in
order for them to be useful, like adding permissions and security groups, but at least the
operation for spawning them is simple and straightforward.
2. Generalization.
 What are the steps to create users in active directory?
 Cite importance of users in active directory.

E. Application
Create users in active directory.

IV. Assessment
How to create users in active directory?

V. Assignment
A. Topic : Download procedure(s) to create and manage users and groups in
active directory
B. Reference(s) : www.it.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
December 9, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

Creates and manages users and groups in active directory.

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Creating and managing users and groups in active directory.
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure Computer
Regulations Systems)
e. Other References :
C. Materials : Desktop, speaker, LCD projector, Video

III. Procedure
A. Pre Activity
1. Review:
 How to create a user in active directory?
2. Drill
 What is the first, second, third etc. steps to create a user in active directory

3. Motivation
 Is it possible to have two or more users and/or groups in active directory?
How?

B. Activity
1. Presentation of the lesson “creates and manages users and groups in active
directory”.
2. Play the video on Server Basics 2: Create users in an active directory.
3. Take note on the steps to create users in an active directory.
4. Presentation of output.

C. Analysis
1. Relate the steps to create user account in Windows 7 from user’s active directory.
2. Reiterate the steps to create some new users in an active directory.

D. Abstraction
1. Discussion:

Create and Manage Users and Groups in Active Directory

In this chapter from Deploying and Managing Active Directory with Windows PowerShell:
Tools for cloud-based and hybrid environments, learn how to create and manage users, groups,
and OUs; how to filter against the properties of users, groups, and computers to selectively act
on the results of that filter; and how to add users to groups and move users and computers into
an OU.
Now that we have a forest and domain, and we’ve got the basics of networking and
name resolution sorted, the next step is to add some users to our domain. We’ll start with adding
a simple user, interactively, and then create a bunch of users by using a script and a comma-
separated values (CSV) file. We’ll create a new group and then add a group of users into that
group, using a filter to ensure that we add the correct set of users. Then we’ll create a new
organizational unit (OU) and move users and computers into the OU. Pretty basic stuff, really, but
essential for any domain administrator.

Active Directory Windows PowerShell nouns used in this chapter:


 ADUser
 ADGroup
 ADGroupMember
 ADAccountPassword
 ADPrincipalGroupMembership
 ADObject
 ADComputer

Other Windows PowerShell commands used in this chapter:


 Import-CSV
 ConvertTo-SecureString
 Get-Command
 Test-Path
 Read-Host
 Write-Host

Create users
Use the New-ADUser cmdlet to create new users. Most user properties can be directly
added by using the parameters of New-ADUser detailed in Table 3-1, shown later in this section.
Those user attributes not explicitly available as direct parameters to New-ADUse can be added
by using the OtherAttributes parameter, which accepts a hashtable of attribute names and
values.

Create a single user


The first thing you’ll want to do for your new domain is create an administrative user
that isn’t ”Administrator.” That first Administrator account is sometimes referred to as the 500
account because the last three digits of its security identifier (SID) are 500, as we can tell from a
quick Get-ADUser.

Get-ADUser -Identity Administrator


DistinguishedName : CN=Administrator,CN=Users,DC=TreyResearch,DC=net
Enabled : True
GivenName :
Name : Administrator
ObjectClass : user
ObjectGUID : a196f5de-343f-48d5-8aab-5289bfa6fabc
SamAccountName : Administrator
SID : S-1-5-21-910751839-3601328731-670513855-500
Surname :
UserPrincipalName :

The 500 account is a bit too well known to use for everyday administration and should
be given a really long and onerous password that is locked away somewhere very secure and
then left alone except in dire emergencies. So let’s give ourselves a working administrative
account, and then we’ll change the password on the 500 account and retire it from everyday
use.

To add a new user, use the New-ADUser cmdlet. There are three basic ways to use
New-ADUser:
1. Create a user by specifying all details on the command line.
2. Create a user from a template object“either one you create or an existing user.
3. Use a CSV file to create multiple users from a list of users and properties.

We’re going to use option #1 to create our first administrative user. We need to specify
the settings for the new user at the command line. Then we need to add the user to the
appropriate Active Directory Domain Services (AD DS) security groups. First, to create the user,
”Charlie,” use the following commands.

$SecurePW = Read-Host -Prompt “Enter a password” -asSecureString


New-ADUser -Name “Charlie Russel” `
-AccountPassword $SecurePW `
-SamAccountName 'Charlie’ `
-DisplayName 'Charlie Russel’ `
-EmailAddress 'Charlie@TreyResearch.net’ `
-Enabled $True `
-GivenName 'Charlie’ `
-PassThru `
-PasswordNeverExpires $True `
-Surname 'Russel’ `
-UserPrincipalName 'Charlie’

The Read-Host in the previous code prompts for a password and masks what the user enters, and the
result of the New-ADUser command is displayed at the console because I used the -PassThru parameter, as shown
in Figure 3-1.

Figure 3-1 Creating a new user by using New-ADUser

This creates our first user but doesn’t make the user a member of any domain security
groups except Domain Users, the default. To add the user to security groups, we need to use the
Add-ADGroupMember cmdlet. And because the goal is to give Charlie the same set of security
groups as the Administrator account, we’ll use Windows PowerShell to get the list of security
groups that the Administrator is a member of, and then loop through the list and add Charlie to
each of the groups.
$SuperUserGroups = @()
$SuperUserGroups = (Get-ADUser -Identity “Administrator” -Properties *
).MemberOf

ForEach ($Group in $SuperUserGroups ) {


Add-ADGroupMember -Identity $Group -Members “Charlie”
}

(Get-ADUser -Identity Charlie -Properties *).MemberOf


CN=Group Policy Creator Owners,CN=Users,DC=TreyResearch,DC=net
CN=Domain Admins,CN=Users,DC=TreyResearch,DC=net
CN=Enterprise Admins,CN=Users,DC=TreyResearch,DC=net
CN=Schema Admins,CN=Users,DC=TreyResearch,DC=net
CN=Administrators,CN=Builtin,DC=TreyResearch,DC=net

As we can tell from the Get-ADUser command in the previous code, the account Charlie is
now a member of five security groups: Group Policy Creator Owners, Domain Admins, Enterprise
Admins, Schema Admins, and Administrators. These are the same security groups to which the
Administrator account belongs. We’ll want to come back to AD DS groups later, but let’s focus on
users first.

In the creation of this first user, we used the most common parameters of the New-ADUser
cmdlet, but they’re only a fraction of the options available. Your situation might well require you
to add significantly more information to each AD DS account. The available parameters for New-
ADUser that relate to users are listed in Table 3-1.

Table 3-1 The user property parameters of New-ADUser


PARAMETER TYPE
Name String
AccountExpirationDate Datetime
AccountNotDelegated Boolean
AccountPassword SecureString
AllowReversiblePasswordEncryption Boolean
AuthenticationPolicy ADAuthenticationPolicy
AuthenticationPolicySilo ADAuthenticationPolicySilo
AuthType ADAuthType
CannotChangePassword Boolean
Certificates X509Certificate[]
ChangePasswordAtLogon Boolean
City String
Company String
CompoundIdentitySupported Boolean
Country String
Credential PSCredential
Department String
Description String
DisplayName String
Division String
EmailAddress String
EmployeeID String
EmployeeNumber String
Enabled Boolean
Fax String
GivenName String
HomeDirectory String
HomeDrive String
HomePage String
HomePhone String
Initials String
Instance ADUser
KerberosEncryptionType ADKerberosEncryptionType
LogonWorkstations String
Manager ADUser
MobilePhone String
Office String
OfficePhone String
Organization String
OtherAttributes Hashtable
OtherName String
PassThru Switch
PasswordNeverExpires Boolean
PasswordNotRequired Boolean
Path String
POBox String
PostalCode String
PrincipalsAllowedToDelegateToAccount ADPrincipal[]
ProfilePath String
SamAccountName String
ScriptPath String
Server String
ServicePrincipalNames String[]
SmartcardLogonRequired Boolean
State String
StreetAddress String
Surname String
Title String
TrustedForDelegation Boolean
Type String
UserPrincipalName String
NOTE: In this table of parameters, and in others throughout the book, I’ve deliberately ignored the parameters
that don’t directly relate to the object we’re working with. This means I haven’t included Common
Parameters, nor have I included Confirm or WhatIf parameters.

Add users in a batch


There are multiple ways to add users in a batch, but probably the simplest is to use a
CSV file. You can easily create the CSV file in Microsoft Excel or any plain text editor, and then
use Windows PowerShell to read the values in the CSV file and add the users. In my lab, all my
animals have their own domain accounts, so I’ll use them to show how to quickly and easily
create new users. All are initially created as Domain Users, with a default password, and then
one account gets elevated and prompts for a password. The list of users and their basic properties
are in the following code.

TreyUsers.csv
Name,GivenName,Surname,DisplayName,SAMAccountName,Description
David Guy,David,Guy,Dave R. Guy,Dave,Customer Appreciation Manager
Alfredo Fettucine,Alfredo,Fettuccine,Alfie NoNose,Alfie,Shop Foreman
Stanley Behr,Stanley,Behr,Stanley T. Behr, Stanley,WebMaster
Priscilla Catz,Priscilla,Catz,Dame Priscilla,Priscilla,Shop Steward
Harold Catz,Harold,Catz,Harold S. Catz,Harold,Engineering Manager
William Wallace,William,Wallace,Sir William Wallace,Wally,Marketing
Manager
Trey Barksdale,Trey,Barksdale,Lord Barksalot,Trey,Sales Manager
Charlie Russel,Charlie,Russel,Charlie Russel,Charlie,SuperUser Account

As you can tell, I’ve only used the most basic information for each new user. To read the CSV file, use
the Import-CSV cmdlet, and then loop through each user from the CSV file and create the user with New-ADUser
by using a basic ForEach loop.

Create-TreyUsers.ps1
<#
.Synopsis
Creates the TreyResearch.net users
.Description
Create-TreyUsers reads a CSV file to create an array of users. The users
are then added
to the users container in Active Directory. Additionally, Create-
TreyUsers adds the
user Charlie to the same AD DS Groups as the Administrator account.
.Example
Create-TreyUsers
Creates AD Accounts for the users in the default “TreyUsers.csv” source
file
.Example
Create-TreyUsers -Path “C:\temp\NewUsers.txt”
Creates AD accounts for the users listed in the file
C:\temp\NewUsers.txt”
.Parameter Path
The path to the input CSV file. The default value is “.\TreyUsers.csv”.
.Inputs
[string]
.Notes
Author: Charlie Russel
Copyright: 2015 by Charlie Russel
: Permission to use is granted but attribution is appreciated
Initial: 3/26/2015 (cpr)
ModHist:
:
#>
[CmdletBinding()]
Param(
[Parameter(Mandatory=$False,Position=0)]
[string]
$Path = “.\TreyUsers.csv”
)

$TreyUsers = @()
If (Test-Path $Path ) {
$TreyUsers = Import-CSV $Path
} else {
Throw “This script requires a CSV file with user names and
properties.”
}

ForEach ($user in $TreyUsers ) {


New-AdUser -DisplayName $User.DisplayName `
-GivenName $user.GivenName `
-Name $User.Name `
-SurName $User.SurName `
-SAMAccountName $User.SAMAccountName `
-Enabled $True `
-PasswordNeverExpires $true `
-UserPrincipalName $user.SAMAccountName `
-AccountPassword (ConvertTo-SecureString -AsPlainText -
Force -String
“P@ssw0rd!” )
If ($User.SAMAccountName -eq “Charlie” ) {
$cprpwd = Read-Host -Prompt 'Enter Password for account: Charlie’ -
AsSecureString
Set-ADAccountPassword -Identity Charlie -NewPassword $cprpwd -Reset
$SuperUserGroups = @()
$SuperUserGroups = (Get-ADUser -Identity “Administrator” -
Properties * ).MemberOf

ForEach ($Group in $SuperUserGroups ) {


Add-ADGroupMember -Identity $Group -Members “Charlie”
}
Write-Host “The user $user.SAMAccountName has been added to the
following AD
Groups: “
(Get-ADUser -Identity $user.SAMAccountName -Properties * ).MemberOf
}
}

NOTE: As you’ll notice, I’ve included the same superuser account as in the previous section. If you’ve already
added that account, just change the account name and details or remove the account from the list.

When we run the Create-TreyUsers script, we get output only about the superuser account that was
created, as shown in Figure 3-2.

Figure 3-2 Creating multiple AD DS users from a CSV file

If you want more detail about the individual accounts that you created, modify the New-
ADUser command in the script to include the PassThru parameter. With that change, though,
you’ll get a lot more detail than you likely want. Instead, try a quick one-line search to find the
users.
(Get-ADUser -Filter {Enabled -eq “True”} -Properties
DisplayName).DisplayName
Dave R. Guy
Alfie NoNose
Stanley T. Behr
Dame Priscilla
Harold S. Catz
Sir William Wallace
Lord Barksalot
Charlie Russel

Now that’s just introduced a whole new set of issues with the Filter parameter. I’ll cover filters,
both traditional Windows PowerShell filters as we used here and LDAP filters, later in the
“Manage groups” section, but for the moment let’s examine this particular one-line search. The
goal of the search is to get a list of the users we just created. Get-ADUser is the cmdlet to use to
get users, but we only want to get a list of users that are actually enabled, to avoid accounts like
the Guest account and some other special accounts. To get the DisplayName value, we need to
add that property to the list of properties returned by Get-ADUser because it isn’t part of the
default properties.

2. Generalization.
 What are the steps to create and manage users and groups in active
directory?
 Cite importance of users in active directory.

E. Application
Create users and manages users and groups in active directory.

IV. Assessment
How to create and manage multiple users/group in active directory?

V. Assignment
A. Topic : Download procedure(s) in www.it.com

B. Reference(s) : Google.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
December 12, 2016

I. Objective(s)
L3_LO2. Configure computer systems and networks

Recognizes steps to Setup Dynamic Host Configuration Protocol in Windows


Server 2008 R2

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Steps to Setup Dynamic Host Configuration Protocol in Windows
Server 2008 R2
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure Computer
Regulations Systems)
e. Other References :
C. Materials : Desktop, speaker, LCD projector, Video

III. Procedure
A. Pre Activity
1. Review:
2. Drill
3. Motivation

B. Activity
1. Presentation of the lesson “Recognizes the steps to setup Dynamic Host
Configuration Protocol in Windows Server 2008 R2.”
2. Play the video on Server Basics 3: Setup DHCP: Join client to domain.
3. Take note on the steps to Setup DHCP: Join client to domain.
4. Presentation of output.

C. Analysis
1.

D. Abstraction
1. Discussion:

How to Set Up DHCP in Windows Server 2008 R2

Continuing our series on learning IT basics, today we’re going to show you how to setup
DHCP on Windows Server 2008 instead of using it on a router.

Note: this is part of our ongoing series teaching IT administration basics, and might not
apply to everybody.

This guide assumes that you have Server 2008 up and running on a machine–if you
don’t, you should check out our guide on how to install it. You should also have set a static IP
address on the server before continuing.

To get started, fire up the Server Manager, right click on roles, and then select add roles.
You will be prompted with the normal “Before You Begin” screen, and after clicking Next you’ll
be able to choose DHCP Server.

Next you’ll want to select the network connection to bind the DHCP protocol to.

Put in the IP address of your DNS Server, which in this case is the same machine–but be careful
not to put the loopback address (127.0.0.1) as this will be the address your clients will go to for
name resolution.
Click next again to skip the WINS setup, this will bring you to creating a DHCP Scope, where
you can click the Add button.

Now you need to:


 Give your scope a name
 Enter the first address that you want available to clients to use
 Enter the last address that you want available to clients to use
 Enter the subnet mask (usually 255.255.255.0)
 Enter the IP address of your default gateway (usually your router IP at .1)
Once you have clicked on OK, you can click next 4 times to get to the confirmation screen where
you can finally click install.

Once the installation is complete your DHCP will be functioning, and you can start managing
your DHCP server right away.

2. Generalization.
 What are the steps to setup Dynamic Host Configuration Protocol in
Windows Server 2008 R2?

E. Application
Setup Dynamic Host Configuration Protocol.

IV. Assessment
How to setup DHCP?

V. Assignment
A. Topic : Download procedure(s) to Join Machines to Your Active Directory
Domain?
B. Reference(s) : www.it.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department
Republic of the Philippines
Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
January 3, 2017

I. Objective(s)
L3_LO2. Configure computer systems and networks

Recognizes steps to join machines to your active directory domain

TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Steps to Join machines to active directory domain.
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure Computer
Regulations Systems)
e. Other References :
C. Materials : Desktop, speaker, LCD projector, Video

III. Procedure
A. Pre Activity
1. Review:
2. Drill
3. Motivation

B. Activity
1. Presentation of the lesson “Recognizes the steps to join machines to your active
directory domain”
2. Play the video on joining machines to active directory domain.
3. Take note on the steps to join machine to active directory domain.
4. Presentation of output.

C. Analysis
1.
D. Abstraction
1. Discussion:

How to Join Machines to Your Active Directory Domain

We have shown you how to install Active Directory on your network, but it’s pointless
to have a Domain Controller unless you add your machines to the Domain, so today we’re going
to cover how to do that.
Note: this is part of our ongoing series teaching IT administration basics, and might not
apply to everybody.

Adding a Computer to an Active Directory Domain is not hard by any means, but there
are 3 things you should always remember:
 Rename the machine to a user friendly, recognizable name before adding it to the
Domain.
 Make sure your DNS settings are pointing to the correct DNS Server for the domain.
 You have to have access to a Domain account that is part of the Domain Admins
security group.

Joining a Machine To a Domain


Open Computer and click on the System Properties button.
Now click on the Advanced system settings link on the left hand side.

When the advanced system settings open, switch to the computer name tab.

Click on the change button, from here you can change your Computers Name to a more
friendly name.
Now switch the radio button, in the bottom section, from Workgroup to Domain. This will
make the text box become available.
Now type in the name of your domain, ours is howtogeek.local, but yours will be
whatever you made it when you set up Active Directory.

When you hit enter, or click ok, you will be asked for the user name and password of a
Domain Admin user account.

If you specify the correct credentials you will be welcomed to the Domain.
2. Generalization.
 What are the steps to join to active directory domain.

E. Application
Join machine to active directory domain.

IV. Assessment
How to join machine to active directory domain.

V. Assignment
A. Topic : Download procedure(s) to share network permission.
B. Reference(s) : www.it.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
January 10, 2017

I. Objective(s)
L3_LO2. Configure Windows Server 2008.

Performs network shares permission


TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : User Accounts Groups Permissions & Their Role in Sharing
B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure Computer
Regulations Systems)
e. Other References :
C. Materials : Desktop, speaker, LCD projector, Video

III. Procedure
A. Pre Activity
1. Preliminary activities:
2. Drill:
3. Review:
4. Motivation:
5. Presentation of the lesson: Perform network shares permission.

B. Activity
1. Explain the concept of network sharing and permission.

C. Analysis
1. What is the importance of network shares-permission?
2. Enumerate the procedure to share file, folder and printer.

D. Abstraction
1. Conceptualization:

User Accounts Groups Permissions & Their Role in Sharing

This How-To Geek School class is intended for people who have their own home network
with at least one Windows PC or device. The end objective is to give you the knowledge you
need in order to set up sharing in Windows and be able to share files, folders, and devices with
other PCs or devices in your home network, regardless of the operating system.

In this first lesson you will learn what a user account is and what the most important
characteristics of a user account are. Then, we will go into detail about the types of user
accounts that are available in Windows and what’s different from this perspective in Windows
8 versus Windows 7. As you will see, the newest versions of Windows have added new user
types that are very different than what you have been accustomed to in the past.

Next, we will explain the concepts of user groups and permissions. As you will see, these
concepts are important when sharing with others on the network.

Last but not least we will explain the benefits of using a Microsoft account in Windows
8, related to network sharing.

What is a User Account?


A user account is a collection of settings and information that tells Windows which files
and folders you can access, what you can do on your computer, what are your preferences,
and what network resources you can access when connected to a network.

The user account allows you to authenticate to Windows or any other operating system
so that you are granted authorization to use them. Multi-user operating systems such as
Windows don’t allow a user to use them without having a user account.

In Windows, you can manage your computer’s user accounts by going to the “Control
Panel” and then to “User Accounts and Family Safety > User Accounts.”
A user account in Windows is characterized by the following attributes:
 User name. the name you are giving to that account.
 Password. the password associated with the user account (in Windows 7 or older
versions you can also use blank passwords).
 User group. a collection of user accounts that share the same security rights and
permissions. A user account must be a member of at least one user group.
 Type. all user accounts have a type which defines their permissions and what they
can do in Windows.

Windows 7 User Accounts


Windows 7 and earlier versions has three important types of accounts:

Administrator
The “Administrator” user account has complete control over the PC. He or she can install
anything and make changes that affect all users of that PC.

Standard
The “Standard” user account can only use the software that’s already installed by the
administrator and change system settings that don’t affect other users.

Guest
The “Guest” account is a special type of user account that has the name Guest and no
password. This is only for users that need temporary access to the PC. This user can only use
the software that’s already installed by the administrator and cannot make any changes to
system settings.

Windows 8 User Accounts


Windows 8 introduces two new types of user accounts, alongside those already in
Windows 7:
Microsoft account
Microsoft accounts are user accounts with an associated e-mail address that give you
access to all Microsoft products and services. They always have password that’s not blank. If
you are using an outlook.com e-mail address (let’s say howtogeek@outlook.com), you have a
Microsoft account with that address.

To further complicate things, Microsoft allows people to create Microsoft accounts using
third-party e-mail services like Gmail. To simplify things for you, remember that you have a
Microsoft account when you use an email address to log into Windows or to any Microsoft
product or service.

Microsoft accounts work on multiple systems and devices. Therefore, you can use the
same account to log into all your Windows 8.x devices, your Xbox One console and your
Windows Phone. You don’t have to create a separate account for each device.

Microsoft accounts can be administrators or standard user accounts.

Local account
Local accounts are classic user accounts that exist locally and can use blank
passwords. For example, in Windows 7 all user accounts are local accounts. Local accounts
can be administrators or standard user accounts. They work on a single system only, so if you
do have multiple devices, you’ll have to create a separate account for each.

User accounts provide the added benefit of letting you share the same computer with
several people, while having your own files and settings. Each person accesses his or her user
account without interfering with others.

How to tell them apart?


In Windows 8.x you can quickly differentiate local user accounts from Microsoft
accounts by looking at whether they use an email address or not. Look at the screenshot below,
sharing the Manage Accounts window, which is accessed by going to “Control Panel > User
Accounts and Family Safety > User Accounts > Manage Accounts.”

The first account, named Ciprian Rusen, is a Microsoft account. All the other user
accounts are local accounts. The Microsoft account is an administrator, which is marked by the
“Administrator” statement beneath its email address. All other user accounts are standard user
accounts because they do not have the “Administrator” statement.
What is a User Group?
As mentioned earlier, the user group is a collection of user accounts that share the same
security rights and permissions.

Keep Reading…
Windows has a long list of predefined user groups which includes “Administrators”
and “Users.” However, most predefined user groups do not have user accounts until the
administrator or third-party apps start customizing them. User groups can also be created by
third-party software and services like virtual machines which create hidden user accounts and
groups in order to provide different features or services.

A user account is a member of at least one user group while some user accounts are
members of two groups or more, depending on how they are set.

For example, all user accounts that are set as administrators will be part of the
“Administrators” group. Standard user accounts are part of the “Users” group. However, both
types of user accounts will become members of the “HomeUsers” group, when you start using
the Homegroup networking feature in Windows.

User groups are managed automatically by Windows and you won’t need to fiddle with
them, even though you can if you are an administrator. This concept is important so that you
better understand how file sharing works, how permissions are assigned, etc.

What are File & Folder Permissions?


Permissions are a method for assigning access rights to specific user accounts and user
groups. Through the use of permissions, Windows defines which user accounts and user groups
can access which files and folders, and what they can do with them. To put it simply,
permissions are the operating system’s way of telling you what you can or cannot do with a
file or folder.

To learn the permissions of any folder, right click on it and select “Properties.” In the
Properties window, go to the Security tab. In the “Group or user names” section you will see all
the user accounts and use groups that have permissions to that folder. If you select a group or
a user account, then see its assigned permissions, in the “Permissions for Users” section.

In Windows, a user account or a user group can receive one of the following permissions
to any file or folder:
 Read. allows the viewing and listing of a file or folder. When viewing a folder, you
can view all its files and subfolders.
 Write. allows writing to a file or adding files and subfolders to a folder.
 List folder contents. this permission can be assigned only to folders. It permits
the viewing and listing of files and subfolders, as well as executing files that are
found in that folder.
 Read & execute. permits the reading and accessing of a file’s contents as well as
its execution. When dealing with folders, it allows the viewing and listing of files
and subfolders, as well as the execution of files.
 Modify. when dealing with files, it allows their reading, writing and deletion. When
dealing with folders, it allows the reading and writing of files and subfolders, plus
the deletion of the folder.
 Full control. it allows reading, writing, changing and deleting of any file and
subfolder.

Generally, files inherit the permissions of the folder where they are placed, but users can
also define specific permissions that are assigned only to a specific file. To make your
computing life simpler, it is best to edit permissions only at a folder level.

Why are Permissions Important to Sharing in Windows?


Permissions are important because when you share something in Windows, you actually
assign a set of permissions to a specific user account or user group. A shared folder can only
be accessed by someone with a user account that has the permission to access that folder.

For example, when using the Sharing Wizard, you choose the user name or the user
group and then one of these two permission levels:
 Read/Write. it is the equivalent of the “Modify” permission level.
 Read. it is the equivalent of the “Read & execute” permission level.

When using the Sharing Wizard you will also see a permission level named “Owner.”
This is not a permission level per-se. It just signals that the folder you are about to share is
owned by the user account for which you see this entry. An owner has full control over that
folder. You will learn more about the Sharing Wizard and how to use it in lesson 6.

When using advanced sharing, you can assign one of these three permission levels:
 Full Control. it allows reading, writing, changing, and deleting of any file and subfolder.
 Change. it is the equivalent of the Modify permission level.
 Read. it is the equivalent of the Read & execute permission level.
When sharing resources with the network, you will encounter a special group that’s
named “Everyone.” This user group stands for anyone with or without a user account on the
computer who is sharing the resource with the network. As you will learn in future lessons, this
user group is very useful when you have a network with very diverse devices and operating
systems. Advanced sharing will be explained in detail, in lesson 7.

Why is it Useful to Use a Microsoft Account in Your Network?


Using a Microsoft account has both benefits (e.g. the ability to sync all your apps and
settings across multiple devices) and downsides (e.g. you will give more data to Microsoft). From
a network sharing perspective, using a Microsoft account can be useful if you have a network
with many PCs and devices with Windows 8.x:
 You log in with the same Microsoft account on all your devices, using the same
credentials.
 You don’t have to create separate local accounts on each computer or device with
Windows 8.x.
 Setting up permissions when sharing is easier because you don’t have to deal with
multiple local user accounts.
 Accessing network shares is also easier because you log in with the same user account
everywhere and you can quickly access everything that’s shared with it.

If you have a very diverse network that includes Macs, Chromebooks or Linux PCs
alongside Windows, then using a Microsoft account doesn’t provide any special benefits from
a network sharing perspective.

2. Generalization.
 What are the steps to join to active directory domain?

E. Application
Join machine to active directory domain.

IV. Assessment
How to deploy wallpaper using GPO?

V. Assignment
A. Topic : Download procedure(s) to share network permission.
B. Reference(s) : www.it.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Republic of the Philippines


Department of Education
Regional Office VIII
DIVISION OF LEYTE
DULAG NATIONAL HIGH SCHOOL
Dulag, Leyte

LESSON PLAN
Technology and Livelihood Education 10
COMPUTER SYSTEMS SERVICING
January 13, 2017

I. Objective(s)
L3_LO2. Configure Windows Server 2008.

Deploy Desktop Background Wallpaper Using Group Policy


TLE_ICTCS10CC-IIdf-2

II. Subject Matter


A. Topic : Deploying desktop background wallpaper using group policy.

B. References :
a. Curriculum Guide : L3_LO2_p12
b. Teacher’s Guide : N/A
c. Learner’s Material : N/A
d. Training : Unit Code ELC724331 (Install and Configure
Regulations Computer Systems)
e. Other References :
C. Materials : Desktop with Windows Server 2008 R2, speaker, LCD projector,
Video

III. Procedure
A. Pre Activity
1. Preliminary activities:
2. Drill/Review:
2.1 what do you call the graphics that is displayed in your CP desktop? What
about in computer?
2.2 How do you set a background of your cellular phone?
3. Motivation:
3.1 Let students set desktop background.
3.2 Can we set computer desktop background using other computer?
3.3 What do you call that process?
4. Presentation of the lesson: Deploy Desktop Background Wallpaper Using Group
Policy

B. Activity
1. Paly the video on Server Basics 5 – Deploy Desktop Background Wallpaper Using
Group Policy.
2. Write down the steps/procedure to deploy desktop background wallpaper using
GPO.

C. Analysis
1. What are the steps that you have had excerpted from the video?

D. Abstraction
1. Conceptualization:

Deploy Desktop Background Wallpaper


Using Group Policy

There are many ways to deploy desktop background wallpaper using group policy. One
of the common request from administration or management in any company is to set the
desktop wallpaper background with group policy. In this post we will see the easiest way to
configure desktop wallpaper using group policy. To brief you about group policy, Group Policy
is an infrastructure that allows you to specify managed configurations for users and
computers through Group Policy settings and Group Policy Preferences. To configure Group
Policy settings that affect only a local computer or user, you can use the Local Group Policy
Editor. You can manage Group Policy settings and Group Policy Preferences in an Active
Directory Domain Services environment through the Group Policy Management Console
(GPMC). However note that Group Policy management tools also are included in the Remote
Server Administration Tools pack to provide a way for you to administer Group Policy settings
from your desktop.

Deploy Desktop Background Wallpaper using Group Policy

Open the Group Policy Management Console. In the Group Policy Management
Console, right click on the domain and click Create a GPO in this domain and link it here.
You can also create a group policy object and later use the option Link an existing GPO. To
link an existing GPO, right-click the domain or OU within the domain, and then click Link
an Existing GPO. Provide a name to the GPO, once the GPO is created, right click on the
GPO and click Edit. This will open the Group Policy Management Editor.
In Group Policy Management Editor, expand User Configuration,
expand Administrative Templates, expand Desktop, and then click Desktop. In the details
pane, double-click Desktop Wallpaper.

To enable this setting click Enabled. The wallpaper name should be set to either
local path of the image or it can be UNC path. Set the wallpaper style as Fill. This will work
best with most screen resolutions.

Click Apply and OK.

You need to apply this group policy to the user group. Note that this policy is
applicable only to domain users. If you are looking to apply the same policy to computers
then you should make use of Loopback processing of Group Policy
On the client machine wait for the policy to get updated. The users may have to log
off and login once to see the changed desktop wallpaper. In the below screenshot we see
that desktop wallpaper policy settings have been successfully applied.

3. Generalization.
 How to deploy desktop wallpaper desktop background using Group Policy?

E. Application
Deploy floral background to all clients using Group Policy.

IV. Assessment
How to deploy printers using Group Policy??

V. Assignment
A. Topic : Deploy printers using Group Policy.
B. Reference(s) : www.it.com

Prepared by: Checked by:

ROBIN A. CANO NOEL P. DEL PILAR


TLE_ICT_CSS Teacher Head TLE Department

Вам также может понравиться