Free Essay

Nt2670 - Installation and Configuration of Ms

In: Computers and Technology

Submitted By Koffa
Words 2240
Pages 9
After viewing this video for at least 5 times plus watching another to come to the conclusion listing the steps to get sound understanding since I couldn’t complete the final two labs.
Pre-Installation Checklist

Make sure you have all of the following steps in place before you setup Exchange Server 2010 on Windows Server 2008 R2 64 Bit and this is for a small office for both the Active Directory and the Exchange Server. But if you have a larger office you may want to consider separating the Active Directory machine and the Exchange 2010 Server.

Install Windows Server 2008 R2 64 bit version
Exchange 2010 is a 64 bit application and requires 64 bit versions of Windows Server 2008; therefore only a computer capable of running the 64 bit version of 2008. Once that is done named the server (, set the clock and it’s configured to be a stand alone with default settings.
Configure Your Static IP Address
The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use DHCP. Since we will be configuring this computer to be a domain controller, you must change the IP address of the computer to be a static IP address which should be done via View Network Connections" in the Server Manager screen. This will display the list of active network interfaces. a. Double click on your network adaptor to display the adaptors status. b. Press the Properties button. c. Highlight "Internet Protocol Version 4 (TCP/IPv4)" and then press the Properties button. d. Change the radio button to "Use the following IP address" and enter an IP address you want to use for this server. I chose to assign this server the internal IP address "". The firewall appliance is set as a gateway at the IP address "". e. Press OK to save your changes.
If IP v6 is needed, follow the same process as in IP v4 or else IP v6 set to the default setting of DHCP. DO NOT DISABLE IP V6 or else the Exchange Hub Transport Service will not start.
Activate Auto Update
Now activate Domain Controller for auto update by clicking on the link "Configure Updates”; selecting the option to have Windows automatically install updates. Updates download and computer reboots then install Active Directory.

Add role - Active Directory Services
This requires two steps; firstly, install Active Directory and lastly, to configure your Active Directory. Now your Windows Server will now be a Domain Controller.
Step 1 - Install Active Directory a. Start > Administrator > Server Manager > "Add Roles" > "Active Directory Domain Services". b. Select “Add Required Features” > ".NET Framework 3.5.1". > Next c. Install > When the installation is complete, you should see a message indicating "Installation Succeeded". > Close to return to the Server Management Screen.

Step 2 - Configure Active Directory
At the Server Management screen you should now see that you have 1 role installed. The Active Directory Domain Services may indicate that it is installed but there are errors. This is because the software is installed but not configured.
To configure Active Directory a. Click on the link "Run the Active Directory Services Installation Wizard (dcpromo.exe)". b. When the Active Directory Domain Services Installation Wizard appears, press Next. c. Choose "create a new domain in a new forest". Press Next d. Enter the name of your domain. The domain name you enter here is the domain name that Exchange will associate with all of your email. e. Once you have decided on the name of your internal domain, that will be your Active Directory Domain and the domain serviced by Exchange, press Next. f. Since we do not host on this Exchange Server, we will use IGetMail.local to indicate our internal domain for IGetMail. k. To set the Forest functional level, I choose Windows Server 2008 that you are using for domain controllers. Press Next. l. To set the Domain functional level, I also choose Windows Server 2008 for compatibility sake. m. Check DNS server running locally. Next. n. Default on the next screen o. Change password p. Install then click Finish and Restart.

Since we are dealing with Exchange 2010, we will need to also add more roles and features…. a. "Active Directory Lightweight Directory Services" b. "Windows Process Activation Service" c. “Remote Administrator Server Tools” d. “PRC over HTTP Proxy e. “HTTP Activation”

Add role - Web Server (IIS)
The next Role that Exchange needs installed is the Web Server IIS. To install this role, at the Server Manager click on "Add Roles" a, Select "Web Server (IIS)" and press Next.
Exchange requires that several additional services be added to the default settings in IIS. a. Security - Basic Authentication b. Security - Windows Authentication c. Security - Digest Authentication d. Performance - Dynamic Content Compression e. Management Tools - IIS 6 Management Compatibility (include all items under this service) Press Next > Install.
Add feature - PowerShell a. At the Server Manager click on the link "Add Feature". b. Select "Windows Power Shell" and press Next > Install > Close

Enable TCP Port Sharing
We will have to enable TCP Port Sharing a. At the Server Manager screen - expand "Configuration" in the left hand panel. b. Click on "Services". The middle of the screen will show the installed Services. Scroll to the Service named "Net.Tcp Port Sharing Service" c. Right Click on the Service "Net. Tcp Port Sharing" and choose Properties. d. Change the Startup from Disabled to Automatic. > Save
Apply the 2007 Office System Converter
You will need to download the 2007 Office System Converter Pack. Click on this link to go to Microsoft's Download Site. a. Click on the link "Download Files Below". Then press the "Download" button next to the File Name "FilterPackx64.exe". > install. b. Accept term > Next c. Exchange has a requirement to use its own SMTP service and not the SMTP Role that is built into Server 2008

Finally we are done about to perform the “Installation And Configuration of MS Exchange Server 2010”. a. To start, we pick the LANGUAGE(English) b. Click "Install Microsoft Exchange." > Next c. Accept Term of license d. Since this is Exchange Server is intended to be our only Exchange server, we will chose the typical installation which installs all of the components to make this Exchange receive, store and send email. Select "Typical Exchange Server Installation" and press Next e. Enter the name (soundbox) typically this corresponds to your company name or domain name. Press Next. f. If you intend to use Outlook 2003 clients to connect to this Exchange Server, then chose Yes to provide compatibility with these clients, then press Next g. Exchange will now ask what you want to specify for the Internet facing side of Exchange. In our example, using Exchange we would create the Internet facing side of Exchange as>Next h.Exchange Setup will ask if you want to join the Customer Experience Program. i. Exchange will now verify that all prerequisites are met. If there are any items that Exchange needs, it will inform you at this time. If the prerequisites have all been met, then press Install to begin the installation. j. When the Exchange Server 2010 installation wizard completes, it will show the results of installing each component within Exchange Server. You should see all components with a green check mark. Press Finish and your Exchange Server should now be ready to use. k. When Exchange completes its installation, the Exchange System Manager will appear.

Allow IGetMail access to your Exchange Server

IGetMail Version 3.x instructions:

When you are running IGetMail version 3.x you can instruct IGetMail to send email to your Exchange server using an authenticated user or anonymous access.

Authenticated User Access - With this method you instruct IGetMail to use a specific Exchange user account to connect to the Exchange Server. Once connected through this account, IGetMail can send email to any of your Exchange user accounts. In order to use this method, the Exchange user account must be a member of the Exchange Server Group within Active Directory.

To setup Authenticated Access:

a. Open the Exchange Management Console b. Expand "Server Configuration" c. Select "Hub Transport" d. In the middle section of the Management Console you will see the list of Receive Connectors. e. The Exchange System Manager will guide you through several post installation tasks. f. Right click on the Receive Connector "Default ServerName" and choose Properties g. Select the "Authentication" tab.

If you do not have an SSL certificate from a third party SSL provider, then Uncheck / Untick the option "Offer Basic authentication only after starting TLS". By default Exchange will not allow users to authenticate until you have an SSL certificate. Unchecking / Unticking "Offer Basic authentication only after starting TLS," allows Exchange to offer Authenticated login over standard SMTP.

When you configure IGetMail, you will need to specify a Windows user that meets these two requirements.

a. The Windows account must have a mailbox in Exchange b. The Windows user must be a member of the group "Exchange Servers"

Commonly, the Administrator account does not work because it does not have a mailbox and a standard Windows account is normally not a member of the Exchange Server group. To solve this you can either give the administrator a mailbox, or in our example below we created a Windows user, made this Windows user a member of the "Exchange Servers" groups, and then created a mailbox for the user. In our example this new Windows user is named "IGetMail".

a. Run Active Directory for Users and Computers. b. Select the Users group in the column on the left. c. Right Click and add a new user. In our case we choose to name this new user "IGetMail" since we will use this Windows user account to route the email through as the email is delivered to all of the other users within Exchange. d. Select the Window user account that you want to have IGetMail use to connect to your Exchange Server. f. Right click on the user name and choose Properties. g. Go to the "Member Of" panel. h. Press the Add... button. Add the Group "Exchange Servers" to make this Windows account a member of the "Exchange Servers" group. This will grant this Windows account the rights to route email to other users. This is needed for IGetMail to route email to your users.
Next we need to add a mailbox to the Windows account that IGetMail will use for authentication. 1. Run the Exchange Management Console 2. Expand "Recipient Configuration" 3. Select Mailbox to show a list of existing Exchange Users 4. Right Click on "Mailbox" under "Recipient Configuration" and select New Mailbox or Click on New Mailbox in the Actions Column on the right hand side. 5. Add the Windows account that you want IGetMail to use to the list of Exchange users. In our example below we have added the account "IGetMail" to the list of Exchange Users.
Now Run IGetMail 1. At the Status Panel, press the "Modify SMTP Settings" button. 2. Check / Tick the option "Authenticate as - " 3. Enter the Name of a Windows User Name that you want IGetMail to use to connect to the Exchange Server. This Windows account must have a mailbox in Exchange and must be a member of the "Exchange Servers" group. 4. IGetMail is now configured to send email to your Exchange Server.
To Setup Anonymous Access:
Anonymous access - With anonymous access you can allow anyone to send email to any of your users. In this case, IGetMail only has to connect to the Exchange Server. It does not need to log into a Windows Account. Open the Exchange Management Console Expand "Server Configuration" To configure Exchange to allow any user to route email perform these steps: Select "Hub Transport" In the middle section of the Management Console you will see the list of Receive Connectors 1. Right click on the Receive Connector "Default ServerName" and choose Properties 2. Select the "Permissions Group" tab 3. Check / Tick "Anonymous Users" 4. Save your changes 5. Now anyone can connect to the Exchange Server and route email to any user

GetMail Version 1.x and 2.x instructions:
When you are running IGetMail Version 2.x and 1.x you need to allow anonymous SMTP connections for your server.
Method 1 - Run the Exchange Management Console. Expand the Server Configuration and select Hub transport. In the lower half of the screen under the tab "Receive Connectors" right click on the connect labeled "Default <Name Of Your Server>" and select Properties. At the Properties for the default server select the Permissions Group tab. At the Permissions Group Tab, check / tick the option Anonymous and save your changes.
Method 2 - Run the following management shell command (note this is the Exchange Management shell and not the PowerShell):

Set-ReceiveConnector -Identity "Default <ServerName>" -PermissionGroups "AnonymousUsers"
Where you would replace <ServerName> with the computer name of this server.
Adding E-Mail Users
Run the Exchange Management Console. Expand the item "Recipient Configuration" and select Mailbox.
Click on the option "New Mailbox" in the right hand panel under the Actions column heading.
Proceed through the wizard to create each of your new users…...

Similar Documents

Free Essay

It Memory Installation

...IT/280 Computer Hardware Fundamentals “CPU and Memory Installation Paper” Student: __________ Instructor: __________ JSTONE Associates LLC requires many different tasks which are performed by out IT department of technicians. Upgrades are a must for any business that wants to stay relevant in the market. We at JSTONE Associates LLC understand these upgrades not just viable but necessary. As our company grows and prospers so much our systems. In this portion of your handbook we will be covering the installation or upgrading of memory within our company. These step by step instructions must be completed as required by our company policy and procedure guidelines. 1. Acquire unit or unit’s specs from the company database to retain the compatible upgraded RAM for the system or systems being updated. 2. Pull the allotted memory upgrades from our warehouse and proceed to your specified area of operation. 3. Power down the unit(s) and remove all connections from the system. 4. Locate and procure a clean and clear area to process the work order. 5. Pull cover from system and clean the unit of dust and other materials with your kit. 6. Wash and dry hands thoroughly and put on company issued static shield bracelet. 7. Carefully pull each individual RAM stick from the motherboard and place the dated hardware in the shield sleeves from your kit. 8. Clear all connections or components that may obstruct your path to the motherboard. 9. If removal...

Words: 488 - Pages: 2

Premium Essay

Ms Project

...and maintained by defining the date the project begins. This includes any planning or initiation activities. By setting the start date, we can better estimate how long a project will take. Set the task type to “Fixed duration” to facilitate project schedule development and consistency. Understanding task types is very important. MS Project defines three task types. The task type determines how MS Project calculates duration, work, or hours and resource unit assignments. Setting the wrong task type will cause MS Project to recalculate schedules incorrectly. Next, uncheck the new tasks or effort-driven checkbox. When you’re just starting a project, you should always uncheck this box. It helps to facilitate planning and the initial work. Now, uncheck the split in progress tasks checkbox. Normally, task progress will either be zero or complete with no other value. It is very important to uncheck this box. Next, uncheck the box next to “Tasks will always honor their constraint dates.” Sometimes, a task is started earlier or later than originally planned. By clearing this option, tasks that are started earlier will be moved by MS Project to the earlier start date. Finally, select the “Set as default” button for the changes to take effect for all projects. Next, I’m going to select the calculation tab and make sure that the checkbox next to updating task status updates resource status has been checked. If it is not, be sure to select it. Again, select......

Words: 8020 - Pages: 33

Premium Essay

Work Floe Installation

...Microsoft Dynamics™ GP Workflow Installation Guide Release 10.0 Copyright Copyright © 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Notwithstanding the foregoing, the licensee of the software with which this document was provided may make a reasonable number of copies of this document solely for internal use. Trademarks Microsoft, Microsoft Dynamics, Internet Explorer, Outlook, SharePoint, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation or its affiliates in the United States and/or other countries. The names of actual companies and products mentioned herein may be trademarks or registered marks - in the United States and/or other countries - of their respective owners. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be......

Words: 12176 - Pages: 49

Free Essay

Installation and Training Documentation

...(Originally in APA Format) Installation and Training Documentation Installing windows is a fairly straightforward process that requires simple instruction from the installation wizard. We need, however, an idea for the specific use of the system and how the OS will be used. So on top of an installation of the OS there needs to be an implementation of a filing system that is organized and easy to use. Also a user based system to ensure that those with the proper permissions can make the necessary changes and those without expertise cannot make significant changes and potentially ruin the system. First we need to install windows. When we insert the CD be sure to boot from the CD. The following screen should appear, prompting you if you wish to install Windows 7. Click Install now. Next a screen will show what is currently being installed. The computer will restart a few times as different sections are installed. When the installation is complete it changing screens prompting you for more information. This screen is asking for a name for the Primary User which will be defaulted as the Admin and also a name for the system itself. In this case this will be the first computer to have Windows installed on it at the ABC Hospital, so to be able to recognize it on the network it will be given a easy to remember name so you know exactly which system you are working with. ...

Words: 1190 - Pages: 5

Premium Essay

Installation of Cobbler

...Installation of Cobbler on Centos 6.4 by NAFIU, Alaba (A20300063) (July 18, 2013) Cobbler version= 2.4 and Cobbler-web version= 2.4 1. Get Centos 6.4 running on the machine 2. Login as a root user: su 3. Turn off fire wall by running this command and unselecting Enabled: System-config-firewall-tui 4. Disable Selinux by editing /etc/sysconfig/selinux by running this command and Changing SELINUX= Enforcing to SELINUX= disabled: vi /etc/sysconfig/selinux 5. Then Reboot 6. Perform software update: yum update 7. Install EPEL: rpm -Uhv Please note that since we used intel machine, thus iso x86_64. However, for 32 bit or a non-Core 2 Duo Machine: rpm -Uhv 8. Installing cobbler-web package: yum install cobbler cobbler-web pykickstart 9. Ensuring the required services( apache and cobbler) will start at boot: chkconfig httpd on chkconfig xinetd on chkconfig cobblerd on service httpd start service xinetd start service cobblerd start The status of can be confirmed by: service cobblerd status 10. We need to get loaders: cobbler get-loaders 11. Edit the DNS and DHCP in the /etc/cobbler/modules.conf by running the command: vi /etc/cobbler/modules.conf to look like: [dns] module = manage_dnsmasq [dhcp] module = manage_dnsmasq [authentication] module = authn_configfile [authorization] module = authz_allowall 12. The Cobbler-web......

Words: 768 - Pages: 4

Free Essay

Hardware Configurations

...NT1110 Unit 8: Video Summary 6 Hardware Configurations I watched 4 videos on Hardware Configuration. They were, in order, Device Manager, Driver Signing, Hardware Profile and Regional and Language Options. The 1st, Device Manager went over how to manage all your hardware devices. It covers how they are configured, their settings, drivers and resources. It’s found in System Properties. After this, was Driver Signing which is Microsoft’s way of confirming that its devices and drivers have been tested and are compatible with Microsoft’s operating system. Each driver and device is checked off in the System Properties verifying its authenticity. There is also driving signing options for hardware installations with software that is not Windows. They are Ignore, which means install anyway. Warn, which means the system will prompt you to choose and Block, which blocks unsigned software. The next video was Hardware Profile. This is a list of devices enabled at the start of a computer and loading into the operating system. It too is found in System Properties. It covered how to change your hardware profile. It’s usually used for laptops. We can change what devices our system uses 1st for instance, changing the network connections when traveling. The last video was Regional and Language Options. This is found on the Control Panel. Here, you can set language or choose how you want your numbers, currency, time and dates displayed. You can go to Customize to make changes.......

Words: 498 - Pages: 2

Free Essay

Nt1430 Linux Networking (Unit 1 Linux Server Installation and Configuration)

...disk drive, or with a corrupted hard disk drive or file system, allowing users to rescue data. 10. Which boot parameter would you use to begin an FTP installation? askmethod or method 11. Describe the Anaconda installer. Anaconda is the installer for Red Hat Linux and Fedora. It is written in Python and C, with a graphical interface using GTK+ 3 and PyGObject and a text interface using python-newt. A kickstart file can be used to automatically configure the installation, allowing users to run it without much supervision. Anaconda is used by RHEL, Fedora and a number of other projects, Anaconda offers a text-mode and GUI mode, so users can install on a wide range of systems. 12. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 13. When should you specify an ext2 filesystem instead of ext4? Use ext2 for partitions whose data does not change often, such as /boot. The added overhead of the ext4 journal offers no benefit on these filesystems. 14. Describe Disk Druid. Disk Druid is an interactive program for editing disk partitions. Users run it only within the Fedora installation system. Disk Druid enables you to configure Linux software RAID and LVM to provide more extensible and reliable data storage. 15. When does a......

Words: 1467 - Pages: 6

Premium Essay

Switch Configuration

...| Switch Configuration | | | Amanda Robertson | 4/20/2014 | | I was Hired By a company as a network engineer. One of my first jobs was to purchase, install, configure and deploy a Cisco Catalyst 2960-S Series Switches. This is a popular choice with the LAN Base Software, which comes with the switches. I found that this switch would be compatible with the companies needs having 48 ports, POE configurations that offer up to 15.4w per port, USB storage, 10 GB Ethernet uplink flexibility. This switch would use either copper or fiber optic cabling however I would prefer the fiber optic. The first step that I would have to take is to connect all hardware properly. “When you first set up the switch, you should use Express Setup to enter the initial IP information. This enables the switch to connect to local routers and the Internet. You can then access the switch through the IP address for further configuration” (Cisco, 2006-2010). Plug in the AC adaptor cord to the Cisco switch to power it on. The switch will go through POST and then verify that the SYST LED light blinks green rapidly. To run Express Set up mode, hold the mode button for 3 seconds, or when all lights above mode buttons turns green. Connect a CAT5 Ethernet cable to the switch and computer, after 30 seconds launch a browser and enter the IP address in the browser and press enter. I would then fill out all the information requested by the Express Set up Mode, the Management interface......

Words: 569 - Pages: 3

Premium Essay

Ms Word

...operating system? The free software foundation is a nonprofit with a worldwide mission to promote computer user freedom and to defend the rights of all free software users, the GNU is an ongoing effort to provide a complete operating system licensed as free software. Linux is an operating system, it represents a free system. Savannah is a supporting source code repository and center for free software development. 3. Briefly, what does the process of installing an OS such as fedora/RHEL involve? Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. 4. What is a live system? What advantages does it have over an installed system? Live System- A computer that runs the Wide Area Progressive games and displays the main system window. Advantages- Customization, cost, free market, stability, and community. 5. Where on the disk should you put your/boot partition or the /root partition if you do not use a /boot? Partitioning a hard drive allows one to logically divide the available space into sections that can be accessed independently of one another. 6. When does a fedora/RHEL system start X by default? WHEN THE System activates or enters run level......

Words: 504 - Pages: 3

Free Essay


...NT2670 U2A1: Identifying HTML Tags Tag | Usage | <html> </html> | Tells the (Web) that this is an HTML document. Tags are to mark sections of the text and for most, an opening and closing tags are required | <body> </body> | the document's body everything visible on the page content has all the contents of HTML documents such as: links, images, etc. | <b> </b> | makes the enclosed text into bold text | <p> </p> | makes enclosed text a paragraph, with lines skipped at the top and bottom | <i> </i> | the default tag for italics | <br> | stops the current line and goes on to the next | <body bgcolor=> | defines the background color of the page | <h1> </h1> | describes a heading; h1 being the largest | <h6> </h6> | smallest heading | <img src="name"> | Adds an image | <a href="URL"> </a> | href attribute specify the URL(web address) for a link | <a href="URL"> <img src="URL"> <a> | creates an imagelink src attributes specifies the URBL for an image | <p align=> | the alignment of the text within a paragraph or image left is the default alignment | 1. <b> <i> Hello World </b> </i> 2. <body bgcolor=”#000000”> or <body bgcolor=”black”> 3. <p align=center> Hello World</p> 4. <img src=”\Images\MyImage.jpg” alt=”hiking”......

Words: 329 - Pages: 2

Premium Essay

Obia Installation

...Oracle® Business Intelligence Applications Installation Guide for Informatica PowerCenter Users Release E35271-01 November 2012 Provides the steps to install and set up Oracle Business Intelligence Applications Release Oracle Business Intelligence Applications Installation Guide for Informatica PowerCenter Users, Release E35271-01 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: P Brownbridge This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs......

Words: 60905 - Pages: 244

Free Essay

Haddoop Installation

...In this tutorial, the required steps has been described for setting up a pseudo-distributed, single-node Hadoop cluster backed by the Hadoop Distributed File System, running on Ubuntu Linux. Installing Python $ sudo apt-get install python-software-properties $ sudo add-apt-repository ppa:ferramroberto/java Update the source list $ sudo apt-get update Install Sun Java 6 JDK $ sudo apt-get install sun-java6-jdk Select Sun's Java as the default on your machine. (See 'sudo update-alternatives --config java' for more information.) $ sudo update-java-alternatives -s java-6-sun The full JDK which will be placed in /usr/lib/jvm/java-6-sun (well, this directory is actually a symlink on Ubuntu). After installation, make a quick check whether Sun’s JDK is correctly set up: $ java –version java version "1.6.0_20" Java(TM) SE Runtime Environment (build 1.6.0_20-b02) Java HotSpot(TM) Client VM (build 16.3-b01, mixed mode, sharing) Adding a dedicated Hadoop system user $ sudo addgroup hadoop $ sudo adduser --ingroup hadoop hduser This will add the user hduser and the group hadoop to your local machine. Configuring SSH user@ubuntu:~$ su – hduser hduser@ubuntu:~$ ssh-keygen -t rsa -P "" Generating public/private rsa key pair. Enter file in which to save the key (/home/hduser/.ssh/id_rsa): Created directory '/home/hduser/.ssh'. Your identification has been saved in /home/hduser/.ssh/id_rsa. Your public key has been saved in /home/hduser/.ssh/id_rsa...

Words: 2067 - Pages: 9

Premium Essay

Nt2670 Lab 2

...was the result of the installation? There was no result these roles were already installed during the last lab LAB 1-2-3 Task #10 take a screen shot of the Installation Results page in the Resume Configuration Wizard: LAB 1-2-4 13. What happens to the wizard when you select the File Services checkbox? The checkbox fills with a checkmark 14. What happens to the wizard when you select the Windows Search Services checkbox? Nothing happens, it puts a checkmark and adds those items to the install list on the side 15. What happens to the wizard if you select the Windows Server 2003 File Services checkbox? Error message Windows search service and indexing service cannot both be installed on the same server. LAB 1-2-4 Task #10 take a screen shot of the Roles node in server manager, showing the details for the installed File Services role: Lab Review Questions 1. After creating a spanned volume containing space from two disks, as you did in Exercise 1-2-2, what happens to the data stored on the volume if Disk 1 fails? Only the data written to disk 1 is lost because it is a spanned volume. 2. In Exercise 1-2-2, how many partitions does each disk have after you converted the disks from basic to dynamic? How do you know? Disk 0 has 3 and disk 1 has 1, I can see under the disk management node in server manager. 3. In Exercise 1-2-3, what is the effect of turning off Internet Explorer Enhanced Security Configuration? It removes the......

Words: 721 - Pages: 3

Free Essay

Nt2670 Mid Term Study

...NT2670 Midterm Study Two basic types of computers that can be on an enterprise network are ____________. Which of the following roles enables users working at another computer on the company network or on the Internet to establish a connection to a server and open an application or desktop session there? Terminal Services By using the Server Core installation option of Windows Server 2008, you get a stripped-down version of the operating system that shows a single window with a command prompt. The ServerManagerCmd.exe utility provides a command prompt alternative to Server Manager and can be used to install roles and features from scripts or batch files. You must activate Windows Server 2008 computers within 30 days of installing them. The Add Roles Wizard provides roles that fall into three basic categories: Directory services, Application services, and Infrastructure services. Which of the following correctly identifies the HTTP binding options available? IP address, Port Number, Host Header What is the original default filename for the Web? Index.html FTP7 can use SSL to encrypt its authentication traffic before transmission. IIS7 uses a generic request pipeline that is modular in nature. The component that manages the request pipeline, the server’s application pools, and the worker processes is called WPAS-Windows Process Activation Service. Which feature of IIS7 enables you to publish content found on different drives or different computers on a network,......

Words: 868 - Pages: 4

Free Essay

Sharepoint 2010 Installation and Configuration Plan

...FAST SEARCH SERVER 2010 INSTALLATION AND CONFIGURATION PLAN Document Control |Document Details | |Project Name |Intranet Revamp | |Document Location |IT | |Document Reference | SharePoint 2010 Installation Plan.doc | |Revision History | |Revision Description |Version |Date |Author / Editor | |Initial draft |0.1 |08/08/2010 |Chiyesu Kalaba | |Final draft |0.2 |25/08/2010 |Jacob Siwiti | 1. INTRODUCTION This document outlines the process of preparing, installation and configuration of Microsoft......

Words: 7699 - Pages: 31