In the workplace, we can't have only one computer. When the computer needs to manage multiple computers or servers, it's better to adopt the domain management mode, which can be more centralized management. How to promote a member server to a domain controller? This paper will introduce the installation and setting method of domain controller in Win2003 system.
Installation and setting method of domain controller
1. All member servers adopt Microsoft Windows Server 2003, and the client adopts Windows XP. First of all, of course, install Windows Server 2003 on the member server. After the installation is successful, enter the system. The first thing we need to do is to assign a fixed IP to the member server. The designation here is as follows: Machine Name:
Server IP:192.168.5.1
Subnet mask: 255.255.255.0
DNS:192.168.5.1
(because I want to configure this machine as a DNS server)
Open virtual machine settings - select CD / DVD, click Browse to find the windows 2003 image;
2. Open the start menu - run - enter "dcpromo" and click "OK";
3. In the pop-up window, select the default "domain controller of new domain" and click next;
4. Select the default domain in new forest and click next;
5. Enter the full DNS name of the new domain "demo. Com" (here according to the actual domain name of your company);
6. Netblos domain name. Click "next" by default;
7. Specify the path to place the ad database file and log file. The default is saved here;
8. Keep the default path of SYSVOL folder and click next;
9. Select the second item "only compatible with Windows 2000 or Windows Server 2003 operating system";
10. Enter the administrator password of directory service restore mode;
11. Relevant settings summary, click next;
12. Installation is in progress at this time, and DNS will be installed together;
13. Wait for the installation to complete, and then restart the computer to complete the installation of ad domain controller;
Supplement: server introduction
Servers, also known as servers, are devices that provide computing services. Since the server needs to respond to service requests and process them, generally speaking, the server should have the ability to undertake services and ensure services.
The composition of the server includes processor, hard disk, memory, system bus, etc., which is similar to the general computer architecture. However, due to the need to provide highly reliable services, it requires high processing capacity, stability, reliability, security, scalability, manageability and so on.
In the network environment, according to the different types of services provided by the server, it is divided into file server, database server, application server, web server, etc.
Related reading: what are the server FAQs
1. System blue screen, frequent crash, restart, slow response
The of the server is very similar to our ordinary computer, whether it is hardware structure or running system. Therefore, just like our computers, they may be infected with viruses, crash, blue screen, restart and other failures due to system vulnerabilities, software conflicts and hardware failures, and slow response due to too much garbage cache information.
2. The remote desktop connection exceeds the maximum number of connections
Since the server allows 2 connections by default, if you forget to log off after logging in and directly close the remote desktop, the server recognizes that the login is still on the server side. In this case, the most common is to restart the server. However, if it is the peak period, the loss caused by restarting the server is obvious. At this time, you can use the mstsc / console command to forcibly log in. Open the "run" box and type "mstsc / V: xxx.xxx.xxx.xxx (server IP) / console" to forcibly log in to the remote desktop.
3. How to clean up files that cannot be deleted
In this case, it may be that the file is still running. You can restart and delete it, or run CMD, enter the name of the folder arrtib-a-s-h-r you want to delete, and finally enter the name of the folder del wants to delete. It cannot be recovered after running this command. Please use it with caution.
4. Hidden trouble of system port
For the server, the first thing is to ensure stability and security. Therefore, we only need to ensure the most basic functions of the server, just like the sound card is prohibited by default. We don't need too many functions and port support. For example, some unnecessary and high-risk ports can be blocked. For some necessary and risky ports, such as ports 3389 and 80, we can set them as non-special secret ports by modifying the registry, so that the security hidden dangers of server ports no longer exist.