Install & Manage A Server

the imperial college of australia
Install & Manage A Server
ICTNWK401

Muhammad Usman

Contents

EXECUTIVE SUMMARY 3

AssignmentTutorOnline

Appointment: 3

Members: 3

Timing 3

Plan 3

Overview of Deployment Environment 3

System 1 4

Installation Scale: 4

Preference Option: 5

Properties 5

Other Features 5

Data Migration 6

Host-based file-level migration 6

Back-Up Requirements: 6

System Requirements 6

Hardware 6

Recovery Requirements 7

Data Recovery Tool 7

Recuva 7

Pandora Recovery 7

PC INSPECTOR File Recovery 7

PC INSPECTOR Smart Recovery 7

FreeUndelete 8

Recommendation:- 8

Training 8

Server Installation Deployment Plan: 8

Part B 11

System Downtime 11

Different OS Server’s Installation 11

Server 2008 R2 Installation: 12

Server Configuration & Connection 13

Project Sign-Off 15

EXECUTIVE SUMMARY

This project is undertaken in real IT professional environment. All the proper tools are used to make sure performance and ability standards to meet client requirements.

Appointment:

As a professional consultancy service’s requirement, appointment was fixed with clients to confirm installation procedure and requirements planning before deploying. All the necessary information and aspects of process were discussed under criteria and circumstances.

Members:

  1. Usman
  2. Client

Timing:

Meeting between client and server installation planner was held on 15th of Feb, 2019­­­­­­­.
Time: 11:00

Plan

Overview of Deployment Environment

Company has multiple UNIX business applications running on multiple application servers. All servers are located in single office. Users Can Be Local, remote or mobile.

Server installation is required to be done in Main office of Client in 2 Different Computers with different operating systems.

  • Windows Xp ( System 1)
  • Windows 7 ( System 2)

There are various types of servers, available in IT industry having different properties from each other and are used to install on basics requirements or environment.

MS Server 2008 Common Types Are;

  • Single Application Server
  • Multi-Application Server
  • Multiple X Application Server

System 1

Elements Capacity
OS Windows Xp
RAM 2GB
HDD 250 GB
VGA 512MB
Processor IBM Core 2 Duo
Type Desktop

Installation Scale:

Scale-out involves running an Enterprise Server for .NET installation across multiple, clustered machines:

  • The setup uses a single Microsoft SQL Server installation that operates on one or more machines.
  • Setting up an installation to run on multiple machines.
  • Setting up network load balancing to define the cluster.
  • Configuring the service endpoints, that is configuring the locations of the various Enterprise Server for .NET services operating on the cluster machines, so that they can communicate with each other.
  • Configuring network load balancing to handle distribution of traffic.

Preference Option:

  • Server 2, Multi-Application Server

Properties

Exceed Connection Server supports Gateway connection configuration. In this configuration, Exceed Connection Server and X applications are housed in spate machines. This server will act as a gateway between client PCs and those application servers. This configuration will provide the following benefits.

  • Less Administrative Overhead
    • No need to manage multiple files configurations.
  • Non-Intrusive in critical line of business applications
    • Don’t have to share system resources
  • Highly Scalable
    • The Open Text managed application access solution can easily scale by forming an Exceed Connection Server Cluster.
    • Company can enjoy the benefits of automatic load balancing and fail-over protection.

Other Features

  • Delivers high performance over any network connection
  • Improves user productivity be offering the ability to suspend and resume Exceed on Demand sessions.
  • Safeguards Exceed on Demand sessions through the built-in crash and resume feature
  • Enables project collaboration with desktop sharing and session shadowing feature
  • Centralize control of application access and license usage

Data Migration

Host-based file-level migration

This open source tool has been around for a long time and distinguishes itself by being very simple, yet powerful, and totally host- and storage-agnostic. Rsync is very flexible and can be adapted to almost every data migration need, but it shines especially brightly with largely static unstructured content.

Back-Up Requirements:

For back up , following tool is requirement;

  • Back Up Agent

System Requirements

Hardware

Hardware Requirements
Physical Memory Minimum 512 MB
Free Disk Space Minimum 256 GB
15%+ free space on protected drives is recommended to maintain point-in-time snapshots during replication.
Primary Storage Types Directly Attached Storage 
Including: 
IDE, SATA, SCSI, SAS, ISCSI, Fibre Channel, 
Dynamic Disks (Software RAID), Hardware RAID,  
Solid State Drives (SSD)
File Systems NTFS (512 byte – 64 KB cluster sizes)
Virtualization MS Hyper-V, Xen Source Hypervisor, Oracle Virtual Box

Recovery Requirements

Data Recovery Tool

Following tools are Suitable More for Recovery purposes For installation of Server in Different OS.

Recuva

Recuva is a user-friendly Windows-based tool. When you run Recuva, you can resurrect missing files using either the file-recovery wizard or the application’s manual mode. 

Pandora Recovery

With a free version for recovering data from secondary drives, and a pay version you can put on a USB key to recover an operating system drive, Pandora Recovery has a versatile offering that can bring back most data without issue.

 PC INSPECTOR File Recovery

Completely free, PC INSPECTOR File Recovery is a great recovery tool for Windows systems. It can recognize data types even when the header is missing, so you can recover from deletions, formatting, or even total volume loss.

PC INSPECTOR Smart Recovery

Also free, Smart Recovery is a tool focused on recovery files from external media, like flash drives and SD cards. It’s a bit older than File Recovery, but still works great and can handle proprietary file formats.

Free Undelete

The name of this tool from Office Recovery says it all. It’s free for personal use, and it undeletes files that you have deleted, even if you SHIFT-DEL or empty the Recycle Bin. What it lacks in fancy features it more than makes up for in efficiency and simplicity.

Recommendation:-

Recuva:-

As Recuva is a user-friendly Windows-based tool.

Training

Following Training Strategy is necessary to be placed.

  • Training Delivery Technology 
  • Training the Technical Staff 
  • Systems Administrator Training 
  • LAN Administration 
  • Operating System Issues 
  • Application Issues 

Server Installation Deployment Plan:

1.        Name according to naming standard

2.        Install operating system

3.        Install OS patches

4.        Configure network settings

5.        Configure necessary services and disable unnecessary services, ports and protocols

6.        Disable unneeded accounts such as Guest

7.        Configure time server to point to DC using GPO.

8.        Configure event logging to corporate standard

a.    If server is placed in existing AD server OU then GPO will ensure appropriate event logs are created. This GPO includes the following settings:

                                  i.    Log file size sufficient for 7 days worth of records,

                                ii.    Server will shut down if unable to write log records,

                                iii.    Log audit event for create, read, update and delete events of protected information,

                              iv.    Log audit event for execution of any privileged function,

                                v.    Log audit event for management activities including system startup/shutdown and security policy changes.

9.        Install Oracle virtual box tools if virtual or HPtools if physical

10.      Add to HP IRS if physical

11.      Document IP address

12.      Add to server inventory

13.      Install AV, update signatures and place in correct group in AV Manager

14.      Join to domain

15.      Place in correct OU in AD

16.      Configure RDP security

17.      Configure windows updates

18.      Add to backup schedule

19.      Add to Log monitoring

20.      Add to vulnerability scanner

Part B

System Downtime

System downtime is not defined actually. Ideally it is 0 but depends on clients requirements that how much he can afford to maintain server’s and systems stability. For multiple application servers, it should Be 9s as a standard Measurement.

Different OS Server’s Installation

System 2

Elements Capacity
OS Windows 7
RAM 2GB
HDD 250 GB
VGA 512MB
Processor IBM Core 2 Duo
Type Desktop

Server 2008 R2 Installation:

These steps describe the installation of Windows Server 2008 R2 Enterprise (Full Edition).These steps are included to demonstrate ground-up installations of an Infinity application in a two machine and three machine scenario.

  • Insert the installation media for Windows Server 2008 R2.
  • After the installer runs, the Install Windows screen appears. Enter language and other preferences.
  • Click Next. Click Install now. The setup begins.
  • The installer prompts to select an operation system.
  • Select Windows Server 2008 R2 Enterprise (Full Installation) and click Next.
  • The installer prompts to read the license terms.
  • Read the license terms. If you agree to the license terms, select I accept the license terms and click next.
  • The installer asks you which type of installation. For a new installation, click Custom (advanced).
  • The installer asks for disk location information. Make your selection and click next.
  • The installation begins.
  • The installer prompts to change the password. Click OK.
  • Enter a new password, re-enter the password to confirm it, and click the right-arrow.

After you click OK on the confirmation screen, the operating system prepares your desktop.

Server Configuration & Connection

Configuration Required:- WebSphere Application Server

Server 2008 is installed in premises and as per Client’s Requirement, WebSphere Application Server configuration Can be Performed along with following steps.

  1. Install Installation Manager on Machine A and Machine B.
  2. Use Installation Manager to install WebSphere Application Server Network Deployment on Machine A.
  3.  Create the first application server profile using the Profile Management Tool on Machine A.
  4. Use Installation Manager to install the following on Machine B.
    • Web Server Plug-ins for WebSphere Application Server
    • Websphere Customization Toolbox
  5. Use Installation Manager to install the IBM HTTP Server on Machine B, or install another supported web server on Machine B.
  6.  Open the WebSphere Customization Toolbox, and launch the Web Server Plug-ins Configuration Tool on the machine with the web server.
  7. Select a web server plug-in runtime location.

If the location of a previously installed web server that you want to use is not in the list, perform the following actions to add the location to your working set:

  1. Click Add.
  2. Enter a name for the web server plug-in location.
  3. Perform one of the following actions:
    • Enter the location.
    • Click Browse, find the location, and click OK.

Following Procedures Are Done in Stimulated workplace for Server’s Installation;

  • Server Installed Successfully in 2 different OS.
  • Configured and Connected according to finalized plan with Client
  • Security, malware detection and Systems stability Tested and Approved
  • Log-in created for multiple users and Guidelines provided to help out and explain structure of design.

Server is than successfully configured and connected and tested for performance and malware security. Log in Files are created separately for users who are authorized and hand book created to help out users as Access Documentation.

Project Sign-Off

Install & Manage A Server

Created by:- Usman

.

Project: Install & Manage A Server
This document has been issued by: Usman
Date Issued:15/02/2019
The Project Outcome has been measured against its acceptance criteria and has been formally accepted on behalf of the customer. The project may now be closed.
Additional Comments about the Client’s Acceptance:







Recorded Shortfalls of the Final Project Outcome (if any):









Executive



Client:





Project Manager:


Signature: _________________________ Name: _________________________ Date: _________________________

Signature: _________________________ Name: _________________________ Date: _________________________

Signature: _________________________ Name: _________________________ Date:_________________________