Title: Introduction to Windows 2000 for Lage Landen
1Windows 2000
Introduction to Windows 2000 for K.U.B.
Rafal Lukawiecki Strategic Consultant rafal.lukawi
ecki_at_aris.com Aris
2Agenda
- Overview
- Windows 2000 Professional
- Windows 2000 Server
- Active Directory
- Group policies
- Security
- Deployment
3Windows 2000Build on NT Technology
4Windows 2000 Family
- This part covers Windows 2000 Professional
- Important to think about differences between
Windows 2000 family members - Professional Replacement for all desktop
versions of Windows in organizations - If youre not deploying server or infrastructure,
still think about Professional
5Windows 2000 Professional Big Picture
- Best features of Win98
- PnP, ACPI, USB, 1394, DX6, integrated
browser/shell - Broad driver support
- Display, Sound, Printer, Digital Cameras,
Scanners, NIC, etc. - Enhanced ease-of-use
- Shell, Network UI, Fewer config reboots, IE5
- Lowest Total Cost of Ownership
- Setup Manager, SysPrep, Windows installer,
WMI, WBEM - NTs traditional power
- Better Reliability, Security, Performance
6Shell Enhancements
- Next generation web integration (IE 5.0)
- Adaptive Menus
- New Balloon Help makes more discoverable
- New File Open and Printer dialogs
- File Open - FTP and Web (HTTP)
- Printer - Add New Printer Wizard
- Enhanced My Documents
- Single primary document location
- My Pictures Folder
- Find Files, Folders
- Enhanced My Network Places
- Interactive Add/Remove Programs wizard
- AutoComplete
- Explore Folders Button
- Consistent Namespace
- Inactive Window Object Selection
- Document History
- Thumbnails
- File Associations/Open With
- SuperHidden Files
- Disk Cleaners
- Sync Manager
- Common Controls
- Alpha Blending
- Keyboard Cue Suppression
- HTML Help
- Balloon-Shaped Tooltips
- Tahoma Font
7Shell Enhancements Examples
Map Network Drive
Balloon Tooltips
8New File Association Support
- Windows tracks the applications you use
- Quick access to the most used apps
- Open With is always available
- Friendly names
- Only relevant apps
9Toolbar Enhancements
- Customizable
- Resizable
- Double-arrows when not enough room
10Multi Language User Interface
- On demand user interface language
- Supports over 60 languages
- Can create, view, edit and print in any of the 60
languages - Roams with user via User Profiles
- Requires MUI system
- Works with Terminal Server
- Cannot upgrade existing NTW4 localized version to
MUI - Need to wipe and load
11New Multilingual Support
12Multilingual OptionsWhich version should I use?
13Agenda
- Overview
- Windows 2000 Professional
- Windows 2000 Server
- Active Directory
- Group policies
- Security
- Deployment
14Major Scalability Initiatives
SMP
Large Systems
Clustering
64-bit
15Large Memory Support
- Physical Address Extension (PAE)
- All physical memory is treated as general purpose
memory - No APIs needed for running above 4GB physical
memory address - just have 4 GB VA limit as today - AWE APIs to access gt 4GB of physical memory
- Direct I/O is done to gt4GB physical address
16Job Object API
- Provides a namable, securable, inheritable,
sharable object that controls associated
processes - Limit possible adverse impacts (eg leaks)
- Manage groups of processes as a unit
- Enforce limits on each process associated with job
17SAN System Area Network
- High performance interconnect
- Used for interprocess communication
- Storage is a different topic
- Connects servers in data center
- Limited cable lengths
- Limited topologies
- Physical security assumed
18Clustering In Windows 2000
Cluster Server
Network Load Balancing
Component Load Balancing (COM)
Clients
COM Components
IIS Web Server or other IP based services
Data Servers SQL, Exchange, File
Application Servers
19Network Load Balancing
- No single point of failure
- No performance bottleneck
- No additional hardware needed
- Grow incrementally as demand increases
- Up to 32 windows 2000 servers in a cluster
Internet/ Intranet
NLB Virtual IP Address
- Handle both planned and unplanned server downtime
transparently (sub-10 second failover)
20Packaging Proposal
Windows 2000 Server. 4 CPU 4 GB memory
Windows 2000 Advanced Server. 8 CPU 8 GB
memory 2-node clustering, NLBS
Windows 2000 Datacenter Server. 32 CPU, 64 GB
memory, 64-bit (future) 4-node clustering, Gold
HCL Process Control, Partition-ability
21Windows 2000 Datacenter
- Up to 32 processors SMP
- 64 GB memory support
- 4-node failover cluster support
- System Area Network support
- Process Group Manager tool
- Higher level platform certification
- Available 90-120 days after Windows 2000 Server
and Advanced Server
22Terminal Services
Centrally deploy and manage applications
One Install, Many Accesses Uniform LOB deployment
Extend benefits of Windows 2000
Wide Range of Client Systems including thin
clients and UNIX Investment Protection for older
hardware
Enhance Manageability
New Remote Mgmt. Capabilities Low cost per device
23Windows 2000Maturity
- Split Windows 2000 in pieces
- Windows 2000 V5
- ADSI V2.5
- ADS Replication based on exchange V5.5
- ADS Store based on exchange V5.5
- Domain model new
-
- Windows 2000 is evolution over almost 8 year
24Industry Leading PerformanceEnterprise Web
Server Performance
Source 4-way SPECWeb 96 results
http//www.specbench.org
25Agenda
- Overview
- Windows 2000 Professional
- Windows 2000 Server
- Active Directory
- Group policies
- Security
- Deployment
26What Is Active Directory?
- Windows Clients
- Mgmt profile
- Network info
- Policy
- Windows Servers
- Mgmt profile
- Network info
- Services
- Printers
- File shares
- Policy
- Windows Users
- Account info
- Privileges
- Profiles
- Policy
- Management
- Focal Point For
- Users and resources
- Security
- Delegation
- Policy
Active Directory
27Active DirectoryIntegration
Network Infrastructure
Routers
Network Devices
HTTP
LDAP
MAPI
ADSI
Unix servers
Clients Applications
28Directory Objects
ObjectClass
Defined in the schema
Data storage is allocated as necessary
29Resource Access
Domain
ACL
ACL
ACL
OU
OU
OU
ACL
ACL
- If you can gain access to the directory object,
it doesnt mean you can gain access to the
resource - The resource is still protected by its own ACLs
30Organizing the Directory
- A hierarchy of objects can be created using
Organizational Units (OUs) - Although OUs are the primary containers used to
create the hierarchy, all directory objects are
potential containers
31OUs
OU
- OU security provides the mechanism for
controlling object visibility and delegating
administration
32Domains
Configuration
- One or more domain controllers
- Multi-master replication
- One or more sites
33Sites
- Control Active Directory replication
- Site knowledge used
- Logon locator
- Printer locator
- DFS and more
34Trees And Forests
- Configuration and schema common to all domains
- Transitive trusts link domains
35Boundaries
- Replication
- Administration
- Security Policy
- Group Policy
36Global Catalog
- Enterprise wide searches
- Resolves enterprise queries
37Identity Management Issues
BusinessRules?
- Most companies maintain identity data in many
places - Not all identity data is kept in directories or
exposed through directory interfaces - No single place to access or manage aggregated
enterprise identity information
38Zoomit Scenario
Zoomit CompassBrowser
X
Meta-Directory
VIA 2.1
- Fire Business Rules
- Remove Dave from Meta-Directory
- Remove Dave from Notes
- Remove Dave from NDS
39Zoomit Scenario
Zoomit CompassBrowser
X
Meta-Directory
VIA 2.1
40Agenda
- Overview
- Windows 2000 Professional
- Windows 2000 Server
- Active Directory
- Group policies
- Security
- Deployment
41Change and Configuration ManagementTechnologies
42Group PolicyDefinition
The ability for the administrator to state a
wish about the state of their users environment
once, and then rely on the system to enforce that
wish!
- Sales department will have Office 2000
- Disable logoff from Start Menu for all
Receptionist - Audit all failed logon attempts for all
Computers in the Atlanta area, in the Peachtree
office
43Group Policy
- Universal, hierarchical way to describe any or
all settings - For users
- For computers
- For any Active Directory object!
- Follows hierarchy SDOU
- Site(s)
- Domain(s)
- Organizational Unit(s)
44Hierarchical Policy Settings
- Applied policy for a computer combines multiple
policy objects
45Automatic Application Installation
1 Make a network install. for app.
2 Tune installation options
3 Make application framework
4 Policy maps framework to user
5 During logon, the framework is applied
6 On first use the app is installed (natural
staggering of software rollout)
46Auto-Install
47Auto-Install
48Systems Management Server 2.0
- Complete solution
- Hardware software inventory
- Software distribution and installation
- Licensing control
- Remote control, diagnostics and monitoring
- Rollback
Hardware Software Inventory
Software Distribution Installation
Remote Management and Troubleshooting
49Agenda
- Overview
- Windows 2000 Professional
- Windows 2000 Server
- Active Directory
- Group policies
- Security
- Deployment
50The Infrastructure Pieces
- Account Management
- Authentication Services
- Public Key Infrastructure
- Policy Management
- Trust Management
- Authorization Services
- Auditing Services
- Cryptographic Services
- Data Protection Services
- Integrity Services
51Security
- IP Security
- ENTFS (Encrypting NTFS)
- Kerberos
- Public Key Infrastructure (X509)
- SmartCards
- Code Signing
- Security Configuration Tool
52Key Kerberos Concepts
- Kerberos is
- An authentication protocol
- Based on encrypted tickets with client
credentials - The default authentication package in Windows
2000 - The basis for transitive domain trusts
- Based on RFC 1510 and draft revisions
- More efficient than NTLM
- Extensible
53Cross-Platform Interop
- Based on Kerberos v5 protocol
- RFC 1510 and RFC 1964 token format
- Windows NT hosts the KDC
- UNIX clients to Unix Servers
- UNIX clients to NT Servers
- NT clients to UNIX Servers
- Simple cross-realm authentication
- UNIX realm to NT domain
- Not DCE compatible
54Symmetric Key Encryption
Plain-text input
Plain-text output
Cipher-text
The quick brown fox jumps over the lazy dog
The quick brown fox jumps over the lazy dog
AxCv5bmEseTfid3)fGsmWe4,sdgfMwir3dkJeTsY8R\s_at_
!q3
Encryption
Decryption
Same key(shared secret)
55Public Key Encryption
Clear-text Input
Clear-text Output
Cipher-text
The quick brown fox jumps over the lazy dog
The quick brown fox jumps over the lazy dog
Py75cbn)9fDebDFaqxzjFr_at_g5nmdFg5knvMdrkv
egMs
Encryption
Decryption
Different keys
Recipients private key
Recipients public key
56Public Key Cryptography
- Knowledge of the encryption key doesnt give you
knowledge of the decryption key - Public key for encryption
- Private key for decryption
- Receiver of information generates a pair of keys
- Publish the public key in directory
- Then anyone can send him messages that only he
can read
57Digital Signatures
- Want to give plain text data to someone, and
allow them to verify the origin - Hash the text, encrypt the hash, provide the
signature with the plain text - Encrypt (Hash( plain text) )
- Encrypt the hash using Private key
- Recipient
- Hashes plain text H(pt)
- Decrypts D(E(H(pt)) H(pt) using Public key
- Compares the result!
58Encrypting File System
- Strong data protection for desktops
- Integrated and transparent to users and
applications - Per file or entire directory encryption
- Enterprise ready
- Data recoverability
- Shared access to encrypted data
- Remote encrypted files on servers
- Fault tolerance
59Data Encryption Process
Launch key for nuclear missile RedHeat is...
60Data Decryption Process
fjdaj u539!3t t389E \_at_ 5e32\kd
61Data Recovery Process
fjdaj u539!3t t389E \_at_ 5e32\kd
62Agenda
- Overview
- Windows 2000 Professional
- Windows 2000 Server
- Active Directory
- Group policies
- Security
- Deployment
63Disk Duplication
- Enabled using Sysprep.exe
- Sysprep readies disk for duplication and
ready-to-run scenarios - Beta version available on Beta 3 CD
- Support for workstations and stand-alone servers
- Domain Controllers can be installed in limited
scenarios - Greatly reduces deployment costs and time
64Setup and Deployment System Preparation Tool
- 1. Install, Configure NTW4.0/2000
- Network, Security, Desktop
- 2. Install, Configure Applications
- Templates, File locations
- 3. Run System Preparation tool
- Shutdown system
- 5. On first boot complete configuration
- Regenerate SID (Security Identifier)
- Auto Create ComputerName, UserName, CompanyName,
Admin Password
- 4. Run Third Party Image Copy tool
- Examples Symantec Ghost, PowerQuest DriveImage
...
http//www.microsoft.com/ntworkstation
65Unattended Installation
- Most flexible deployment option
- Starts and run Windows 2000 Setup on each
computer individually - What you need
- Winnt.exe, Winnt32.exe or CD (BIOS must support
bootable CD ) - A distribution share with Setup files or Windows
2000 CD - An answer file (text file) or winnt.sif if
running unattended from CD
66Integrating Service Packs
- Windows 2000 and Service Pack Integration
- No need to reapply a Service Pack after changing
system state - Slipstreaming - apply the service pack to an
install share of Windows 2000 for clean installs - Solves significant customer problems with
current Windows NT 4.0 Service Packs
67If Time Remains
68What is Windows DNA?
- It is
- A Platform of products and services using which
you can build various solutions, following the - Architectural Guidance, which tells you how to do
the things correctly - Without a good architecture, your solution will
be poor! - Windows DNA tells you how to do things the right
way!
69Why is Windows DNA Good?
- Unlike 2-tiers (client-server, thick-client),
Windows DNA gives you - Scalability
- Manageability
- Reliability
- Easier development and maintenance
- Simpler and more available skill-set needed
- Easy choices about locating business logic
- Academically speaking, 3-tiers (or more) have
been the right way for the past 6-7 years
70A Component
- Could be explained as
- A building block in a solution
- A portion of software
- A bunch of methods and properties
- A COM object
- Is
- Easy to reuse and deploy
- Easy to replace and maintain
- Simpler than big top-to-bottom code
- Embodiment of divide and conquer
- Bought or created when needed
- Gives software high quality
71Windows DNA for FMStocks
72Tools Used on FMStocks
Planning Visual Modeller Teamwork Visual
SourceSafe
MSDN Universal contains all of these tools and
the knowledge
Knowledge Support MSDN
73Thank You!