Windows server 2012 - installation

Assignment Help Computer Networking
Reference no: EM131603697

Windows Server 2012 - Installation

To give students hand-on experience in
- Installing Windows Server 2012 R2
- VirtualBox environment will be used

Perform post-installation settings, such as
- Change computer name
- Change workgroup
- Enable remote desktop
- Replacing CMD with Powershell
- Perform post-installation checklist

Document the newly installed machine

Creating a Virtual Box Machine

Selecting the Windows 2012 type will default all the settings to the recommended Microsoft requirement for you, but it is not necessary

Adding the disc image

RAM is defaulted to 2048mb/2GB but can be increased to 4Gb

You'll be prompted to select an existing virtual hard-drive, create a new one, or not use one at all. Select "Create a virtual hard drive now", then "VDI" and "Dynamically Allocated"

Select your ISO from the local directory

Install Windows Server 2012 R2

The Virtual Machine creation process is finished. Close the setting window, then click on the green start button as indicated.

It should automatically boot into the Windows Server 2012 R2 installation process

Select the correct language and time/currency setting

Enter one of the generic key below, depending on the version you have. Evaluation version of Windows Server 2012 R2 has it prefilled for youPartitioning

On a live system, you may have a different partitioning scheme. But for this installation, just click next, Windows will create the necessary partitions for you

Installing

• Windows Server 2012 R2 is now installing. It will reboot twice before finishing up and allowing you to configure it. The process takes around 25-30 minutes
• Don't press any key after either reboot, or you'll be booting into the DVD image

Completion

Fill in the necessary
details

(Note: VirtualBox may not capture your Ctrl-Alt-Delete. Use the combo Host-Del instead.
The default Host key is Right CTRL. Alternatively, you can click on the Machine menu, then Insert CTRL-ALT- DELETE)

• To insert the guest addition CD, press Host-D, or go into Devices -> Insert Guess Additions CD
• Follow the wizard, selecting Yes when asked to trust the device driver
• Reboot as indicated by the installer• Open post-installation checklist for Windows Server 2012 on Week-2 of ITSA1001 on e-learning.vit.edu.au
• Check with the check-list for the tasks we have not
performed and document them.
• Perform the undone tasks except joining a domain and
windows update task.
- We will turn this server to a domain controller later so we will not perform the joining domain task.
- We will not do any update now because our system is not a
production system.
• For IP network configuration, choose a static IP address of 192.168.123.1 mask 255.255.255.0

• Record date, time
• Record the server hardware details (see VM settings)
• Record the server name and workgroup
• Record Administrator password
• Record the server network settings e.g. IP address, mask, DNS server etc.
• Record the list of tasks that have been performed according to
the checklist and the results e.g. OK or any error.
• Record the list of tasks that have not been done and the reasons
• Record the server status at the time you have done everything
e.g. running normally or any observable issues.

Verified Expert

This assignment solution is prepared in ms word using windows server 2012 installation in virtual machine which contains Record date, time Record the server hardware details,Record the server name and workgroup,Record Administrator password,Record the server network settings ,Record the list of tasks that have been performed , Record the list of tasks that have not been done and the reasons,Record the server status at the time. All steps of the screen shots are attached in the solution and given explanation.

Reference no: EM131603697

Questions Cloud

Compute the total overhead cost applied to job-c : Sino-woodworks Ethiopia Ltd makes office furniture from fine hardwoods. The company uses a job-order costing system and predetermined overhead rates.
Explain the gender wage gap and gender segregation : Define the gender wage gap and gender segregation within the given occupation
What is the idea-segment is trying to communicate : In this week's assignment we are going to look at the the influence of the media, sensationalism, and our own ability to think critically about the world.
Discovered that when the required rate of return on bond : You have discovered that when the required rate of return on a bond you own fell by 0.5 percent from 9.7 percent to 9.2 percent,
Windows server 2012 - installation : Perform post-installation settings - Creating a Virtual Box Machine - Selecting the Windows 2012 type will default all the settings to the recommended
Do you think the same words would be said face-to-face : Do you think the same words would be said face-to-face? Have you ever had anyone spread rumors about you or someone you know online?
Assets-costs-current liabilities are proportional to sales : Assets, costs, and current liabilities are proportional to sales. Long-term debt and equity are not.
Discuss the current organizational structure : Each student will write a literature review of NOT more than 2000 words. The review should demonstrate that the student has thoroughly researched their topic.
State your position on the question at issue : Provide an introduction in which you briefly explain the topic and the particular question on which you will focus your paper.

Reviews

inf1603697

9/25/2017 4:42:13 AM

Very good and am gonna give you people my future assignments also. Really good work and i ll appreciate you people definitely, thanks. My friends will also submit same tasks so please make sure to provide them unique work.

inf1603697

9/25/2017 4:41:30 AM

i have more assignment so can you suggest me price for both of them all together What is status of my assignment? When will you be delievering it to me? ITSA1001 Week2 Tutorial 1.pdf

Write a Review

Computer Networking Questions & Answers

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

  Advantages and disadvantages of computer netwoerks

Advantages and disadvantages of computer netwoerks

  Define the topology that will be used

Define the topology that will be used. Select the appropriate network media. Select the appropriate network connecting devices, including network security devices. Select the appropriate computer systems to use to support the network design. Determin..

  How will the network be effected

How will the network be effected - We wish to improve network reliability. How will inserting a node at a given point influence connectivity -

  What type of naming structure would you give to servers

What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.

  Find turing machine that changes a unary string to a string

Find a nonhalting Turing machine that begins with a single 1 on its tape and successively generates strings of the form 0n 10n , n = 1, that is, such strings.

  Identify the tentative conclusion you have reached

Explain that in the report, you would summarize what has been accomplished in the investigation. Identify the tentative conclusion you have reached.

  Develop a simple web server in two steps

Develop a simple Web server in two steps. In the end, you will have built a Web server that is capable of processing simple web requests such as an HTML page with embedded images -

  Protecting personally identifiable information

Describe the federal laws that address protecting an individual's PII.

  Detail study on social media

The length of your report should reflect the complexity of the topic and the thoroughness of the research. The report should be self-contained (explain any terminology particular to the topic the first time you use it), consistent, and to the poin..

  Identify the users of the information system.

Identify the users of the information system.

  Describe the three main types of firewalls

Describe the three main types of firewalls. Determine which firewall is the most efficient and why

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd