Windows Server Roles

 

Windows Server Roles

DNS: Domain Name Server

What DNS Does:

When you type a website address (like www.google.com) into your browser, your computer doesn’t understand that name directly. It needs the IP address (like 142.250.190.68) of the server hosting that website. DNS translates the human-friendly domain name into the machine-friendly IP address.

How DNS Works (Step-by-Step):

·         User enters a URL – e.g., www.example.com

·         DNS resolver (usually provided by your ISP or a service like Google or Cloudflare) checks if it already knows the IP.

·         If not, it queries the root DNS servers to find the right Top-Level Domain (TLD) server (for .com, .org, etc.).

·         The TLD server points to the authoritative DNS server for example.com.

·         That server responds with the IP address of the web server.

·         The resolver sends that IP back to your computer, which connects to the site.

 

Why DNS Is Important:

  • Usability: People remember names better than numbers.
  • Scalability: Allows websites to change IPs without changing their names.
  • Security: Systems like DNSSEC help validate DNS responses to prevent spoofing.
  • Performance: Caching speeds up future lookups.

 

Key Terms:

  • DNS Resolver: The service that finds the IP for a domain.
  • Root Servers: The starting point of DNS lookups.
  • TLD Servers: Handle domains like .com, .org, etc.
  • Authoritative DNS Server: Holds the actual IP info for a domain.
  • DNS Cache: Stores past lookups to speed up future visits.

 

What is DHCP?

DHCP stands for Dynamic Host Configuration Protocol.
It’s a protocol used to automatically assign IP addresses and other network settings to devices on a network.

 

What Does DHCP Do?

When you connect a device (like a phone, laptop, or printer) to a network, DHCP automatically gives it:

  • An IP address
  • A subnet mask
  • A default gateway
  • DNS server information

Without DHCP, you'd have to set all these values manually for each device.

 

DHCP: Dynamic Host Configuration Protocol

How DHCP Works (Step-by-Step):

1. Discovery

The device says:
🗣️ “Hey, any DHCP server out there?”
(It broadcasts a DHCP DISCOVER message.)

2. Offer

A DHCP server replies:
🎁 “Here’s an IP you can use!”
(It sends a DHCP OFFER.)

3. Request

The device says:
🙏 “I’d like to use that IP, please.”
(It sends a DHCP REQUEST.)

4. Acknowledgment

The server confirms:
That IP is now yours.
(It sends a DHCP ACK.)

Now the device is fully configured and ready to use the network!

 

Lease Time

The IP address is given for a limited time, called a lease (e.g., 24 hours). When the lease expires, the device can:

  • Renew the lease
  • Or get a new IP address

 

Example

You connect your laptop to Wi-Fi.
Without doing anything, your laptop gets:

  • IP: 192.168.1.45
  • Subnet: 255.255.255.0
  • Gateway: 192.168.1.1
  • DNS: 8.8.8.8

All thanks to DHCP.

 

Why DHCP is Useful

  • No manual setup
  • Avoids IP conflicts
  • 📈 Scales easily (good for homes, offices, hotels, etc.)
  • 🔁 Centralized control for network administrators

 

DC: Domain Controller

A Domain Controller (DC) is a server that manages network security and user access in a Windows domain environment. It’s a central authority that handles authentication and authorization in networks using Active Directory (AD).

 

 What is a Domain Controller?

A Domain Controller is a server that:

  • Authenticates users when they log in (e.g., verifies username and password)
  • Enforces security policies
  • Manages computers, users, and groups in the domain
  • Provides access control to shared resources

It runs Active Directory Domain Services (AD DS), which is Microsoft's directory service.

 

What It Does:

  1. Authentication
    • Verifies who the user is
    • Controls who can log in and from where
  2. Authorization
    • Decides what the user can do (files, printers, apps, etc.)
  3. Central Management
    • Admins can manage all users and computers from one place
  4. Policy Enforcement
    • Uses Group Policy to control user settings, app access, security, etc.

 

Example Scenario:

You're in a company called Contoso:

  • You log into a PC with your username: john@contoso.com
  • The PC contacts the Domain Controller
  • The DC checks your password and permissions
  • If approved, it logs you in and applies company policies

 

Key Concepts:

Term

Description

Domain

A group of computers/users managed as a unit

Active Directory (AD)

The database storing user accounts, groups, policies

Group Policy

Set of rules pushed from DC to user computers

Kerberos

The protocol used by AD for authentication

LDAP

Protocol used to access and manage directory info

 

Why Domain Controllers Matter:

  • Security: Centralized login and access control
  • Efficiency: Easy to manage users and devices
  • Scalability: Works well in small offices or large enterprises
  • Redundancy: You can have multiple DCs for failover and load balancing

 

AD DS: -Active Directory Domain Services

What is AD DS?

AD DS stands for Active Directory Domain Services.
It is a core service in Microsoft’s Active Directory that enables centralized management of users, computers, and resources on a network.

 

What Does AD DS Do?

AD DS is the directory service that:

  • Stores information about users, groups, computers, printers, etc.
  • Authenticates users when they log in
  • Helps enforce security policies across the network
  • Enables single sign-on (SSO) so users log in once and access many resources

 

Think of AD DS Like a Company Directory

It keeps track of:

  • Who works here (users)
  • Their job roles (groups)
  • What computers they use
  • What they’re allowed to access
  • Where things are (organizational structure)

 

AD DS Key Components:

Component

Description

Domain

A logical group of network objects (users, computers, etc.)

Domain Controller (DC)

The server that runs AD DS and manages domain security

Forest

A collection of one or more domains that share a common schema

Organizational Units (OUs)

Containers used to organize users and resources

Group Policy

Used to control settings and behavior of users and computers

Schema

Defines what kinds of objects can exist in the directory and their properties

 

How It Works (Simplified):

1.     A user logs in to their computer

2.     The computer contacts a Domain Controller

3.     AD DS checks the user’s credentials

4.     If correct, it logs them in and applies policies

5.     The user can now access network resources like printers, shared folders, or applications

 

Why Use AD DS?

  • Centralized management
  • 🔐 Secure authentication
  • 🔁 Policy enforcement across all users/devices
  • 👥 Scalable for small to large organizations

 

Example Use Case:

A school uses AD DS:

  • Students and teachers have accounts
  • Each group has access to specific folders and printers
  • IT can manage all users and policies from one server

 

Microsoft Exchange

What is Microsoft Exchange?

Microsoft Exchange is a mail server and collaboration platform developed by Microsoft. It’s used by businesses and organizations to manage:

  • Email
  • Calendars
  • Contacts
  • Tasks
  • Shared mailboxes

It’s the backend system for Microsoft Outlook and other mail clients in an organization.

 

Think of Exchange Like a Mailroom + Calendar Manager

It handles:

  • Delivering email messages
  • Storing mailboxes
  • Synchronizing calendar events
  • Managing contact lists
  • Enabling shared scheduling between users

 

Key Components of Exchange:

Component

Description

Mailbox Server

Stores user mailboxes and handles mail delivery

Client Access Services

Lets users connect via Outlook, web, or mobile

Transport Services

Routes and delivers email across the network

Exchange Admin Center (EAC)

Web-based UI to manage mailboxes and settings

Outlook Web Access (OWA)

Web-based version of Outlook email and calendar

 

Versions of Exchange:

1.     Exchange Server – On-premises version installed on your own servers

2.     Exchange Online – Cloud version hosted by Microsoft as part of Microsoft 365

3.     Hybrid Exchange – Combines on-premises and cloud-based Exchange

 

 Features of Exchange:

  • Business-class email
  • 🔐 Built-in anti-spam and antivirus
  • 📅 Shared calendars & scheduling
  • 🧑🤝🧑 Delegated access and shared mailboxes
  • 📱 Mobile device support
  • 📁 Email retention policies and compliance tools

How It Works (Simplified):

1.     A user sends an email from Outlook.

2.     The message goes to the Exchange server.

3.     Exchange routes the message to the recipient (inside or outside the organization).

4.     The recipient’s email client (Outlook, mobile app, etc.) downloads it.

 

Why Businesses Use Exchange:

  • Centralized email and calendar management
  • Integration with Active Directory
  • Better security and data compliance
  • Scalable for small teams or large enterprises

What is RADIUS

What is RADIUS?

RADIUS stands for Remote Authentication Dial-In User Service.
It’s a network protocol used to authenticate, authorize, and account (often abbreviated as AAA) for users who connect and use a network.

 

What Does RADIUS Do?

RADIUS is commonly used by organizations to:

  • Authenticate users before they access a network (like Wi-Fi or VPN)
  • Authorize what services or access they get
  • Account for what users do (like session duration or data usage)

 

How RADIUS Works (Simplified Flow):

Let’s say a user tries to connect to a company’s secure Wi-Fi:

1.     Access Request
The user enters their username and password on a Wi-Fi login page.

2.     Request Sent to RADIUS Server
The access point (router or switch) sends the credentials to the RADIUS server.

3.     Authentication
The RADIUS server checks the credentials against a user database (like Active Directory or LDAP).

4.     Authorization
If the login is valid, RADIUS checks what level of access the user has (e.g., full access, guest network, etc.).

5.     Access Granted or Denied
The RADIUS server tells the network device whether to allow or deny access.

6.     Accounting (Optional)
RADIUS can track user activity, like how long they stayed connected or how much data they used.

 

Key Concepts:

Term

Description

AAA

Authentication, Authorization, Accounting

RADIUS Server

The system that validates login requests

NAS (Network Access Server)

The router, switch, or firewall that forwards login requests to RADIUS

User Database

Where usernames and passwords are stored (e.g., Active Directory)

 

Where RADIUS is Used:

  • Corporate Wi-Fi networks (secure login)
  • VPNs (remote access authentication)
  • ISP dial-in services
  • University campus networks
  • Guest access portals with login requirements

 

Why RADIUS Matters:

  • Secure network access
  • 🔁 Centralized login management
  • 🧑🤝🧑 Integrates with existing user directories
  • 📊 Tracks user activity for compliance and billing

 

IIS – Internet Information Services

What is IIS?

IIS stands for Internet Information Services.
It is a web server software created by Microsoft that runs on Windows Server and is used to host websites, web applications, and services.


What Does IIS Do?

IIS is responsible for:

  • Serving web pages (HTML, CSS, JavaScript)
  • Running web applications (e.g., ASP.NET apps)
  • Handling HTTP/HTTPS requests from browsers
  • Supporting FTP, SMTP, and other protocols (optional features)
  • Hosting REST APIs, SOAP services, and more

Key Features of IIS:

Feature

Description

HTTP/HTTPS Support

Delivers secure web content to users

ASP.NET Integration

Runs .NET-based web applications

Authentication & Authorization

Controls who can access what

Logging & Monitoring

Tracks visits, errors, and usage

SSL Certificates

Supports secure connections via HTTPS

FTP Hosting

Can serve files via FTP (optional)

Modular Design

Add/remove features like caching, compression, etc.


How IIS Works (Simplified):

1.     A user enters www.example.com in their browser.

2.     The browser sends a request to the IIS web server.

3.     IIS receives the request and processes it (maybe using ASP.NET or PHP).

4.     IIS sends back the webpage or data to the user’s browser.


Common Use Cases:

  • Hosting corporate websites
  • Running intranet portals
  • Powering ASP.NET applications
  • Serving RESTful APIs
  • Providing web services for mobile apps

 Why Use IIS?

  • Deep integration with Windows Server
  • 🔐 Built-in security features (like Windows Authentication)
  • Scalable for small and enterprise deployments
  • 🧰 GUI-based management (via IIS Manager) and PowerShell scripting

IIS vs Other Web Servers:

Server

Platform

Common Use

IIS

Windows

.NET/ASP.NET apps

Apache

Cross-platform

PHP/web hosting

Nginx

Cross-platform

High-performance/reverse proxy

 

RAS – Remote Access Service

What is RAS?

RAS stands for Remote Access Service.

It is a Windows-based service that allows users to remotely connect to a private network (like a company's internal network) over the internet or phone lines.


What Does RAS Do?

RAS allows users to:

·         Log in to their work network from outside the office

·         Access shared files, printers, and internal systems

·         Use company resources as if they were physically on-site

It's especially useful for:

·         Remote workers

·         Traveling employees

·         IT administrators


How RAS Works (Simplified):

1.     A user at home opens a remote access connection (like VPN or dial-up).

2.     The computer connects to the RAS server via the internet or phone line.

3.     The RAS server:

o    Authenticates the user (username/password or certificates)

o    Authorizes the connection

4.     Once connected, the user can securely access the network.


RAS Components:

Component

Description

RAS Server

The system that accepts and manages remote connections

RAS Client

The user device connecting to the network remotely

Authentication Protocols

Verifies the user's identity (e.g., PAP, CHAP, MS-CHAP)

Communication Links

Dial-up, VPN, ISDN, or internet connections


RAS in Windows:

In Windows Server environments, RAS is part of:

·         RRAS (Routing and Remote Access Service)

RRAS provides:

·         VPN functionality

·         NAT (Network Address Translation)

·         LAN routing

·         Remote user access


Real-World Use Case:

A sales employee on a business trip needs to:

·         Access the company’s CRM

·         View files on a shared drive

·         Use internal apps

They connect via RAS (usually using a VPN), and work just like they're in the office.


Related Technologies:

Term

Purpose

VPN

Encrypts and secures remote network access

RADIUS

Often used with RAS for authentication

IIS

Used to host internal web apps the RAS users might access