Step 1: Creating a Virtual Machine
A server is a very important part for any organization to facilitate smooth flow of operations and processes. It processes the requests from the client computers on a local network or over the internet. There are many types of servers available in the market, for example, print server, file server, web server, mail server, and many more. It is high-powered computers with large memories, storage, and great processing speed. Its functions by pulling and pushing data over the network.
A virtual machine is more like a physical computer, but is not, which runs applications and operating systems. The virtual machine is made up of configuration files and specifications and is supported by physical resources of the host. The key components that makes up a virtual machine include NVRAM setting file, configuration file, log file, and virtual disk file.
A local photography studio needs a server to be set up that addresses its current IT needs. The studio needs to create a network that allows photographers to store all the pictures in one place and can be accessed by all the employees and supports data redundancy to make sure that the work is secured. Additionally, they would like to host a web server from which customers can be able to access the photos after been given the rights to access them. The solution is as discussed in the subsequent sections.
Step 1: Right click Host in Hyper-V manager and choose New Virtual Machine to create a new virtual machine
Click Next and rename the virtual machine appropriately, for this case “Test VM” and click on Next. Choose Generation 1 and click next. 4GB should be the minimum start up memory. For the virtual memory created we have allocated 16GB. On the next screen select dynamic memory and then click on next. Set up the network and rename it as “External vSwitch” and click next.
Select the radio button linked to “create a virtual hard disk” and utilize the default location. Installation of windows server 2012 R2 requires a minimum of 30GB. 150GB will be allocated for the test VM.
Choose install an OS from bootable CD/DVD-ROM under installation options and choose the image file.
Click on Finish
Step 2: Right click on the newly created virtual machine and choose start and follow the prompts to install the windows OS on Test VM.
Step 3: configure the VM once the operating system has been installed.
Step 2: Installing and Configuring the VM
Select local server from the VM server manager
Set updates to install automatically, remote desktop must be configured, set IE Enhanced Security Configuration to off, Change the name of the computer and time zone accordingly.
Because the company will be using the domain, select WORKGROUP from the local server, click on change then choose the domain. Key in the domain admin credentials and domain name and restart the machine.
Web Hosting/Remote Shell Access Configuration
Windows systems administrators use a Microsoft-proprietary remote access protocol to remotely manage Window Sever systems (Warner, 2016). The protocol is known as Remote Desktop protocol (RDP). It has a full graphical desktop shown in Figure 1 below unlike Windows PowerShell or Secure Shell (SSH).
TCP port 3389 is the default port that RDP server uses to listen for incoming connections. For security reasons, the administrator can change the default port.
Microsoft currently pushes administrators to minimize their dependency on RDP and instead
To be sure, Microsoft’s current push is for admins to reduce their reliance upon RDP and instead (a) use Windows Servers in Server Core or Nano mode; and (b) utilize Windows PowerShell command-line remote administration rather than of RDP.
Two Microsoft’s justification for the PDA
A GUI interface uses unnecessary system resources
A GUI interface broadens the attack surface of your servers
Irrespective, many administrators are used to RDB- based remote administration and likely to do the same in the recently released Windows Server 2016 Operating System (Cisco, 2016). The procedure of enabling RDP in Server 2016 is as follows (the procedure is the same to that of windows server 2012 R2).
Server Manager
Start the Server Manager console, go to the Local Server node, and click the Remote Desktop hyperlink as shown in Figure 2.
The Remote Desktop hyperlink is just a shortcut to the System Properties sheet from the System Control Panel item (Cisco, 2018). Select Allow remote connections to this computer, and optionally enable Allow connections only from computers running Remote Desktop with Network Level Authentication (recommended).
Windows Server is protected against Denial of Service Attacks by the Network Authentication (NLA).
Before any the server establishes any graphical session, it requires authentication to take place (Markle, 2017). The NLA also allows the Server to conserve system resource.
Windows PowerShell
From a lower-point of view, incoming RDP connections can be enabled on using two Registry values and a Windows Firewall rule on the server. Run the following commands after opening an elevated Windows PowerShell session.
Web Hosting/Remote Shell Access Configuration
This create the fDenyTSConnections value and set it to 0 (off). This is important as we don’t want to reject Terminal Services (TS) connections.
New-ItemProperty -Path ‘HKLM:SystemCurrentControlSetControlTerminal Server’ -Name ‘fDenyTSConnections’ -Value 0 -PropertyType dword -Force
UserAuthentication valu (NLA) is created and enabled by the second command. Network Layer Authentication is important and should be enabled by default in the server.
New-ItemProperty -Path ‘HKLM:SystemCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp’ -Name ‘UserAuthentication’ -Value 1 -PropertyType dword -Force
Use the next command to enable Predefined “Remote Desktop” windows firewall rule. This can be then invoked by the Get-NetFirewallRule PowerShell cmdlet to verify as shown in Figure 3.
Enable-NetFirewallRule -DisplayGroup ‘Remote Desktop’
Group Policy
We use Group policy to standardize RPD behavior in all the network infrastructure servers (Gerend, 2017). To start, create, link and scope a new group policy Object (GPO) which targets server which share server settings for RDP.
Next, add a new Restricted Groups entry in the Restricted Group Policy path. (shown in Figure 4):
Computer ConfigurationPoliciesWindows SettingsSecurity SettingsRestricted Groups
Customization of the membership can be done in the servers built-in Remote Desktop Users group (Lee, 2017). Where by members of the group can establish RDP sessions to the server. It should be noted that local Administrators Group are automatically given this privilege in Active Directory.
The Group Policy settings governed are:
User right to create RDP sessions
Windows Firewall incoming RDP exceptions
Requiring NLA
Computer ConfigurationAdministrative TemplatesNetworkNetwork ConnectionsWindows FirewallDomain ProfileWindows Firewall: Enables Inbound Remote Desktop exceptions
Computer ConfigurationAdministrative TemplatesWindows ComponentsRemote Desktop ServicesRemote Desktop Session HostConnections enables the user to connect remotely in the Remote Desktop Services.
Computer ConfigurationAdministrative TemplatesWindows ComponentsRemote Desktop ServicesRemote Desktop Session HostSecurityRequire authenticates users for remote connections using Network Layer Authentication.
Creating the Client Connection
Microsoft RDP client is included in both Windows Server and Windows Client, and it is called Remote Desktop Connection. The best way to invoke this tool is as follows:
Press WINDOWS KEY+R
Type mstsc (Microsoft Terminal Services Client)
Press ENTER
Figure 5 below is the Remote Desktop Connection interface for the user.
RDP very unique and important as they are available for every desktop and mobile operating system. The representatives are listed below.
iOS: Microsoft Remote Desktop
Android: Microsoft Remote Desktop
Make sure that you have copied the —–BEGIN CERTIFICATE—– and —–END CERTIFICATE—– when copying the SSL certificate. Confirm that there are no white spaces, no line breaks and no additional characters. Using a text editor like as Notepad, paste the certificate content and save it with an extension .p7b (if you are using a Windows system the icon should change into an icon of the certificate.
Step 1: Generating SSL Certificate
Step 2: Installing the SSL Certificate
Navigate to Start, then administrative tools and then to internet information services (IIS) Manager
Click the server name on the left menu.
Double click the Server Certificates located in the middle of the pane under security.
Select Complete Certificate Request at the Right Action pane.
Click on the icon button, go and select the location of the new certificate file. (Change the default extension of all the certificate files to .p7b. The default might be .cer).
Chose an easy name for quick identification of the new certificate.
Ensure that Personal is selected in the drop down menu in the Select certificate store.
NOTE: during the system installation you may receive an error message. A glitch with the IIS 7 to IIS 8 series causes it.
To acknowledge the error message, click Ok and then Cancel out of the Complete Certificate Request Wizard.
Press the F5 button on the keyboard to in order to refresh the IIs console. The new certificate will appear under the Server Certificates in the middle pane. It might not have the name you chose. The installation will be successful if you are able to see the new certificate.
Note: The CSR request was not created if you can see the new certificate or the private key was damaged as a result. To correct this, generate a new CSr request and reissue the certificate.
Step 3: Assigning and Binding of the SSL certificate to the web site:
Browse to the server name, then Sites and then your SSL-based site.
click Bindings in the Actions pane,
If the https binding is missing in the Site Bindings Window, choose Add change the Type from HTTP to HTTPS.
Note: If the https binding exists, select it and click Edit.
Select the Friendly Name you chose for the SSL certificate for the site in the SSL Certificate drop down,.
Click Ok.
The SSL certificate installation is finished and the website is fully configured.
Step 1
Open the server Manager Dashboard, then go to tools and click on Computer Management
Image: Server Manager Dashboard.
Step 2
After clicking on the Computer Management it will open Computer Management Widow where you can view different categories of tools and utilities.
Expand System Tools, the expand Shared Folders, Right click Shares and then Select New Share.
Image: Computer Management
Step 3
Create A Shared Folder Wizard is opened when you click New Share. Click Next.
Image: Create A Shared Folder Wizard.
Step 4
Type the path of the folder to share or Click Browse to select.
Step 2: Installing the SSL Certificate
Image: Specify Folder Path
Step 5
Click on browse and select the drive; for this case drive C. Create a new folder in drive C by clicking on make new folder and rename it accordingly.
Step 7
Click on next to see the options to add description or name of the folder.
`
Step 8
Declare sharing permission of the folder as read and write or read only.
Step 1:
Click on Add the Server Role on the Server manager dashboard.
Step 2: identify the preferred volume/disk in the File and Storage Services.
Step 3: Click on volumes and choose the disk to configure for duplication.
Windows server 2016 has new layers of security to enhance privilege identity protection, secure virtualization, and breach resistance. In addition, it has software defined data centers which are enterprise ready and affordable, built-in SDDC functionalities, and Azure-inspired infrastructure (Richard, 2016). Additionally, it offers cloud-ready application environment like microservices, cloud-native and traditional applications among others.
It is important to only allow authorized users to access the resources with their rights. As such, it is important for the server to have authentication capabilities so as to be able to allow authorize users and block unauthorized ones. Authentication also allows clients to determine if the server is what it claims to be (Zhelezko, 2017). Giving the users usernames and passwords to access the server will help to secure the server and keep logs on who is using the server and the time.
Conclusion
Hypervisor-specific and specialized hardware is not required for the virtual machine. However, more bandwidth, processing ability, and storage is required by the virtual machine as compared to the physical computers. One advantage of the VMs is that it can be reassigned, copied, or moved easily between hosts servers to enhance utilization of resources.
Reference List
Cisco, C. (2016). HTTP Services Configuration Guide – HTTP/HTTPS 1.1 Web Server and Client [Cisco ASR 1000 Series Aggregation Services Routers]. [online] Cisco. Available at: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/https/configuration/xe-16/https-xe-16-book/HTTP_1-1_Web_Server_and_Client.html [Accessed 29 Jun. 2018].
Cisco, C. (2018). HTTP Services Configuration Guide – HTTPS–HTTP Server and Client with SSL 3.0 [Cisco ASR 1000 Series Aggregation Services Routers]. [online] Cisco. Available at: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/https/configuration/xe-16/https-xe-16-book/HTTPS–HTTP_Server_and_Client_with_SSL_3-0.html [Accessed 29 Jun. 2018].
Gerend, J. (2017). Installing and enabling Data Deduplication. [online] Docs.microsoft.com. Available at: https://docs.microsoft.com/en-us/windows-server/storage/data-deduplication/install-enable [Accessed 29 Jun. 2018].
Lee, B. (2017). Creating and Configuring VMs in Windows Server 2016 Hyper-V. [online] Official NAKIVO Blog. Available at: https://www.nakivo.com/blog/creating-configuring-vms-in-windows-server-2016-hyper-v/ [Accessed 29 Jun. 2018].
Markle, B. (2017). What is Shell (SSH) Access? | InMotion Hosting. [online] Inmotionhosting.com. Available at: https://www.inmotionhosting.com/support/website/ssh/what-is-shell-access [Accessed 29 Jun. 2018].
Richard, A. (2016). Windows Server 2016 Using VirtualBox – Getting Ready for Docker. [online] Miles to go 4.0 … Available at: https://blog.arungupta.me/windows-server-2016-virtualbox-getting-ready-docker/ [Accessed 29 Jun. 2018].
Warner, T. (2016). How to Create a File Share in Windows Server 2016. [online] Tom’s IT Pro. Available at: https://www.tomsitpro.com/articles/create-file-share-windows-server-2016,1-3364.html [Accessed 29 Jun. 2018].
Zhelezko, A. (2017). Data deduplication using both Windows Server 2016 and Veeam. [online] Veeam Software Official Blog. Available at: https://www.veeam.com/blog/data-deduplication-windows-server-veeam.html [Accessed 29 Jun. 2018].