Académique Documents
Professionnel Documents
Culture Documents
PROFESSIONAL
Exam 70-290: Managing and Maintaining a Microsoft Windows Server 2003 Environment
Exam 70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server
2003 Network Infrastructure
Exam 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network
Infrastructure
Exam 70-294: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003
Active Directory Infrastructure
The client component consists of a choice between the existing client exams Windows XP
Professional (70-270) or Windows 2000 Professional (70-210). If you have already passed one of
these exams, then you do not need to worry about the client component.
The Design component consists of 1 exam and you will have a choice between 2 exams:
Exam 70-297: Designing a Microsoft Windows Server 2003 Active Directory and Network
Infrastructure
Exam 70-298: Designing Security for a M
Microsoft Windows Server 2003 Network
You can take both of these exams and use 1 of them to satisfy your elective requirement
which is discussed next.
INDEX
Chapter 1: Introduction to Windows 2003. 8
Chapter 2: Installing Windows XP / Server 2003..15
Chapter 3: Configuring Windows 2003 Server Environment...26
Chapter 4: Managing Users & Groups...32
Chapter 5: Working with Group Policy and Active Directory .39
Chapter 6: Managing Disks.....50
Chapter 7: Accessing Files / Folders using Windows Server 2003 and XP......64
Chapter 8: Managing Network Connections ......79
Chapter 9: Manage Printing 87
Chapter 10: Administering Terminal Services ..103
Chapter 11: Optimizing windows 2003 Server ..118
Chapter 12: Performing System Recovery Functions 130
Chapter 13: Using Windows Backup ..140
Chapter 14: Using Recovery Console .150
Chapter 1
Apple
Mac OS
Novell
LAN 2.2
LAN 3.11
LAN 3.12
LAN 4.X
LAN 4.X
UNIX
Solaris Sun
HP
HP
AIX IBM
XENIX
SCO-Unix
Microsoft
LINUX
Red hat
Suse
NT 4.0
DOS 1, 2, 3, 4, 5, 6.22.
Lan Manager
Win 3.1 / 3.11
NT 3.5, NT 3.51
Win 95
Win 98
Win ME
Win 2000
XP-Home
Win 2003
Vista Home
Win 2008
NT 4.0
NT Server 4.0
NT Wks 4.0
Windows 2000
Windows 2000 server
Windows 2000 advanced server
Windows 2000 datacenter server
10
Windows XP Professional
64 bit edition of windows 2003 server run only on Intel Itanium based computers which provide
higher clock speeds and faster floating point processor operations.
64-Bit editions do not support 16-bit windows applications, Real mode application, POSIX
application and print service for Apple Macintosh Clients.
12
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
13
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
14
Chapter 2
After you have made sure you can start the installation process.
Hardware Requirements for Windows XP
Processor
Ram
15
Web
Std
Enterprise
Data Centric
Min Ram
Rec RAM
Max Ram
128 MB
256 MB
2 GB
128 MB
256 MB
4 GB
CPU Min
233 MHz
233 MHz
CPU Rec
Multiprocessor
550 MHz
2
550 MHz
4
128 MB
256 MB
32bit- 32GB
64bit-64GB
32-233 MHz
64-733Mhz
733 MHz
8
Disk Space
1.5GB
1.5GB
512 MB
1 GB
32bit-64GB
64bit-512GB
32-400 MHz
64-733Mhz
733 MHz
32-32
64-64
32-1.5GB
64-2GB
32-1.5GB
64-2GB
You can install Windows Server 2003 in several methods - all are valid and good, it all
depends upon your needs and your limitations.
Method 1 Start setup by booting directly from cd: - Enter the bios settings and set the first
boot device to cd-rom drive. Insert the cd and restart the computer. Now the setup will
automatically start.
Method 2 Start setup from existing windows computer: - Copy the I386 folder from CD.
Run the setup process by going into the I386 folder and using WINNT32.exe command.
After starting the setup, complete following steps.
Phase 1: The text-based portion of the Setup program
The setup process begins loading a blue-looking text screen (not GUI). In that phase you will be
asked to accept the EULA and choose a partition on which to install 2003, and if that partition is
new, you'll be asked to format it by using FAT, FAT32 or NTFS.
1. You can press F6 if you need to install additional SCSI adapters or other mass-storage
devices. If you do you will be asked to supply a floppy disk with the drivers and you
CANNOT browse it (or a CD for that matter). Make sure you have one handy.
16
Fig.2.1
If you want, you can press F2 to run the ASR sequence. For that you need a good backup
created by the Windows Server 2003 backup program, and the ASR floppy disk. If you plan
to install a new copy of 2003 - don't do anything.
Select To Setup Windows Server 2003 Now. If you want, and if you have a previous
installation of the OS, you can try to fix it by pressing R. If not, just press ENTER.
Fig.2.2
Read and accept the licensing agreement and press F8 if you accept it.
17
Select or create the partition on which you will install Windows Server 2003.
Depending upon your existing disk configuration choose one of the following:
If the hard disk is unpartitioned you can create and size the partition on which you will
install Windows Server 2003.
Fig.2.3
Fig.2.4
18
If the hard disk is already partitioned, but has enough unpartitioned disk space,
you can create an additional partition in the unpartitioned space.
Fig.2.5
If the hard disk already has a partition that is large enough, you can
install Windows Server 2003 on that partition. If the partition has an
existing operating system, you will overwrite that operating system if
you accept the default installation path. However, files other than the
operating system files, such as program files and data files, will not be
overwritten.
If the hard disk has an existing partition, you can delete it to create more
unpartitioned space for the new partition. Deleting an existing partition
erases all data on that partition.
If you select a new partition during Setup, create and size only the partition on which
you will install Windows Server 2003. After installation, use Disk Management to
partition the remaining space on the hard disk.
Select a file system for the installation partition after you create the partition on which
you will install Windows Server 2003. 2003 supports the NTFS file system as well as
the file allocation table (FAT) and FAT32 file systems. we will use FAT32
19
Fig.2.6
Setup will then begin copying necessary files from the installation point (CD, local
I386 or network share).
Fig.2.7
9. The computer will restart in graphical mode, and the installation will continue
20
Next the setup process will finish copying files and configuring the setup. You do not
need to do anything.
Setup will now reboot the system. if you see the login screen, your installation is
successful.
21
New OS
Data
Software
Applications
Data
Software
Applications
Upgrade Path
You can upgrade your computer from any of the following operating systems to Windows XP.
Windows 98
Windows ME
windows NT 4.0 workstation
Windows 2000 Professional
Windows XP Professional
You can upgrade windows server 2003 from following server operating systems
NT 3.5 server
NT 4.0 server
Windows 2000 server
Starting Upgrade Process:You can start the upgrade process by running the i386\winnt32 file from the existing operating
system.
Put the CD of XP in CD-ROM
\I386winnt32 and select Upgradation
22
Compatibility Problems with Windows 9X:9X has different Registry setting. So it may give a problem related to the compatibility. For this
first update 9x with latest pack files.
You can verify the compatibility issues related to installed software and application.
Winnt32/checkupgradeonly
Chkupgrd.exe (Down load from Internet)
Check Compatibility.
Unsupported Options when upgrading to windows XP.
Application filters files. Ex Antivirus & Disk Quota (Remove it before Installation)
Custom Plug & Play tools (remove it before installation)
3rd party application software used for disk management Eg. PQmagic and Seagate Disk
Manager
Application that supports virtual disk drive (VXDs)
Old application of 16 bit.
23
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
24
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
25
Chapter 3
3.1 There are mainly four tools to configure windows environment (2003/XP)
1)
2)
3)
4)
Control panel
Computer management
MMC (Microsoft Management Control).
Registry
1) Control Panel:This is the most important tools which are used in 2003 & XP computer. You can add remove
software programs; install hardware, modem and printer. You can change setting related to
mouse, keyboard, Internet option, Network connection option, power management and also
system related settings.
Fig.3.1
26
2) Computer Management:You can use computer management to administer networks, computers, services, and other system
components.
To start computer management go toStartProgramsAdministrative ToolsComputer Management
Contents of computer management
1) System Tools
A) Event Viewer
Application
Security
System
B) Shared Folder
Shares
Sessions
Open Files
C) Local Users and Groups
User
Groups
D) Performance Logs and Alerts
E) Device Manager
2) Storage
Removable Storage
Disk Defragmenter
Disk Management
27
Fig.3.2
28
4) Windows Registry:Windows stores its configuration information in a database called the registry. The registry
also stores the information related to hardware, application settings and user profiles.
Win 98------------REGEDIT
NT 4.0------------REGEDT32
Win 2000---------REGEDT32
Win 2003---------REGEDIT
The registry has five keys.
Folder/predefined key
Description
Contains the root of the configuration information for the user
who is currently logged on. The user's folders, screen colors,
HKEY_CURRENT_USER
and Control Panel settings are stored here. This information is
referred to as a user's profile.
Contains the root of all user profiles on the computer.
HKEY_USERS
HKEY_CURRENT_USER is a sub key of HKEY_USERS.
Contains configuration information particular to the computer
HKEY_LOCAL_MACHINE
(for any user).
Is a sub key of HKEY_LOCAL_MACHINE\ Software. The
HKEY_CLASSES_ROOT
information stored here ensures that the correct program opens
when you open a file by using Windows Explorer.
Contains information about the hardware profile used by the
HKEY_CURRENT_CONFIG
local computer at system startup.
Fig.3.3
.
29
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
30
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
31
Chapter 4
4.1 Introduction
A user is an authorized person who regularly uses the computer. In win 2003 server or windows XP
by default you get two built-in user accounts.
1. Administrator --------Highest Rights
2. Guest ------------------Lowest Rights (By default Guest user is disabled)
On A stand alone (workgroup) computer you can create user from local user & groups.
Fig.4.1
NOTE:-The users created by this tool are stored in the SAM file locally and are only able to
log on to the computer on which they are created
Fig.4.2
32
4.2 Creating Local Users and Groups:To create users Right click My ComputerClick ManageOpen Local Users and
GroupsRight Click Users and click new user.
Enter the information in the following screen and click on create. The created user will be by
default member of users group.
Fig.4.3
Creating Groups: - Open the same window which you opened for users. Right click on
groups and click new group. Enter the information in the following screen and click, create.
Now you can add users to groups
Fig.4.4
33
Fig.4.5
Backup operators - Backup Operators can override security restrictions for the sole
Purpose- of backing up or restoring files.
Guests- Guests have the same access as members of the Users group by default,
except for the Guest account which is further restricted.
Network configuration operators- Members in this group can have some administrative
privileges to manage configuration of networking features.
Power users- Power Users possess most administrative powers with some Restrictions.
Remote desktop user- Members in this group are granted the right to logon remotely.
Users- Users are prevented from making accidental or intentional system-wide changes.
Help service group- Group for the Help and Support Center.
34
The user Administrator is the member of Administrators group and the Guest is a member of
Guests group.
You can not do the following when you logon as a Standard User.
Fig.4.6
35
Roaming User Profile: It is a server based profile, which is stored on central location .roaming profile allows users to get
the same profile even if they logon from different machines each time.
Creating Roaming profile: 1) Create a folder profile and share the folder.
2) On the DC in active directory user and computer in user profile profile specify the path.
\\computername\sharefolder\username (for one user)
\\computername\sharefolder\%username% (for multiple or all user)
Fig.4.7
Click copy and rename the new profile. Boot from the new profile and make necessary changes to
the profile. Hardware profiles are used mostly with portable computers.
Fig.4.8
36
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
37
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
38
Chapter 5
Fig.5.1
Overview of group policy
Account Policy: - It is used to set the password setting & security related to user log on this option
contains password policy & account policy.
Account policy is not applied to users who are created before the policy was set.
Password Policy: - contains password related policies.
1) Enforce password history
2) Maximum password age
3) Minimum password age
4) Minimum password length
5) Password must meet complexity requirement
6) Store passwords using reversible encryption
39
Administrative Templates:-Used to specify what options users will get when they logon.
Using administrative templates you can lock control panel, command prompt, and many tools that
are critical to the system.
Fig.5.2
40
Fig.5.3
41
Fig.5.4
Fig.5.5
42
Fig.5.6
5) Select the database location.
Fig.5.7
43
Fig.5.8
7) Select the Permission type.
Fig.5.9
44
Fig.5.10
9) Summery is displayed.
Fig.5.11
45
Fig.5.12
Users container
By default domain users created from here can log on from any client in the domain. You can
use user properties to restrict the logon computers and logon hours. You can set the account
expiry also. To set these right click any user and click properties. And select account TAB
Fig.5.13
46
Fig.5.14
Fig.5.15
47
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
48
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
49
6.1 Introduction
Data is an important element of computer systems. To store data, many devices are available
in the market. Most widely used device is the HARD DISK which comes in many types and
capacities. in a desktop computer IDE or SATA hard disks are common but in most servers
SCSI Hard Disks are used .SCSI disks provide a great speed and reliability ,they are hot
swappable, which means if they fail they can be changed without shutting down the servers.
High-end servers like IBM, HP and DELL have multiple slots for these SCSI disks.
Hard disk is a permanent storage device.
6.3 Formatting the Disks:-Formatting creates a file system on the hard disk. File system
is needed for storing files on the disk. You can choose FAT, FAT32 or NTFS file system on
windows XP or Server 2003 computers. You can also create and format the partitions during
installation of windows XP or Server 2003.NTFS is the newest file system which supports
many new features like compression. Encryption etc, FAT and Fat32 are used for Windows
95/98 and ME. In servers mostly NTFS is used. Compact disks use CDFS.
FAT 16
FAT 32
NTFS
1) OS Support
All
Win95 OS R2
Win98
Win2000
Win2003
NT
2000
win 2003
Yes
No
No
No
No
Yes
No
No
No
No
Yes
Yes
Yes
Yes
Yes
No
2GB
1MB
No
32GB
7MB
Yes
2 TB
50MB
50
Fig.6.1
By default the disk type is basic in windows XP and server 2003.
1) Basic Disks: - It is a default storage into 2003 & XP. A basic disk contains primary partitions,
extended partitions, or logical drives. Partitions are logical division of a Disk. Basic disk can have
four primary partitions or three primaries and one extended partition.
Creating Partitions with Basic Disks :
You can create 3 types of partitions with basic disk.
1. Primary Partition (total 4 or 3 primary and one extended)
2. Extended Partition (only one)
3. Logical Partition (up to 23)
51
Fig.6.2
2. Select the Partition type (as shown in fig)
Fig.6.3
52
Fig.6.4
4. Select the Drive Letter
Fig.6.5
53
Fig.6.6
Fig.6.7
54
Fig.6.8
Using Mounted Drives
Mounted drives let you mount your partition to an empty folder on any NTFS drive. This way you
can save the Drive letters for other drives.
1. Create a new empty folder on any NTFS drive
2. Create partition using the above method. In step 4 dont assign the drive letter. Select mount in
the empty folder and browse to the folder you created in step 1.
Fig.6.9
55
3. The mounted drive will be available when you open the folder in which you mounted the drive.
Fig.6.10
Deleting partitions: - Deleting the partition will delete all your data.
1. Right click the partition and select delete.
Dynamic Disks: - Dynamic disks provide features that basic disks do not, such as the ability to
create volumes and the ability to create fault tolerant volumes (mirrored and RAID-5 volumes). All
volumes on dynamic disks are known as dynamic volumes.
Converting Basic Disk to Dynamic
Fig.6.11
56
Once you convert the basic disk to dynamic disk, you have to delete all the volumes from dynamic
HDD to revert it back to Basic disk.
Windows server supports five types of volumes
1. Simple Volume
2. Spanned Volume
3. Striped Volume
Win XP
Win 2003 Srv
4. Mirrored Volume
5. RAID 5 Volume (Stripe set with parity)
1. Simple volume: - A simple volume contains free space from a single Dynamic disk. The
space from the single disk can be contiguous or noncontiguous.
C:
Simple volume
D:
Simple volume
D1
D2
C:
D:
F:
500 MB
1GB
500 MB
2
GB
Extend
Spanned volume consists of disk space on two or more dynamic disks (up to 32). In spanned
volume data written sequentially filling space on one physical drive before writing to another
physical disk you can extend the spanned volume it. You can allocate different amount of space
from each disk in spanned volume. You can extend an existing spanned volume with new free disks
space.
The main disadvantage of the spanned volume is that if any drive in spanned volume set fail we
loose access to entire spanned volume.
57
D1
D2
C:
D:
F:
1 GB
1 GB
1 GB
3GB
Striped Volume is created using equal free space from minimum 2 dynamic disks up to 32 dynamic
disks. Data is written sequentially in a striped volume so the I/O performance is faster. You can not
extend striped volume once created. The main disadvantage of the striped volume is, if a single disk
fails in a striped volume set you loose access to a entire striped volume.
Mirror
C:
D:
Mirror
D:
Disk Mirroring
Disk Duplexing
Mirror volumes are copies of two Simple volumes which are stored on two separate physical disks.
User can see only one volume, but data is written to both the copies simultaneously. When one disk
fail data is still available on the second disk. You can mirror the full disk or only selected volume.
58
Raid
75% 25%
Data parity
D:
D:
D:
D:
10 GB10 GB
10 GB 10 GB
D: = 30 GB for data and 10 GB parity.
C
C
Raid 5 volume is similar to stripped volume. Data is striped on multiple disks. Raids5 volume
places a parity strip across the volume (Parity is a mathematical calculation performed on the -data that provides information that can be used to rebuild data on failed disks). If a single
within the volume set fails the parity information stored on the other drive to rebuild the data for the
drive. They are fault tolerance and provide good performance.
59
6.8 Creating Volumes in Dynamic Disks:Right click the unallocated partition and select new volume
Fig.6.12
Select the volume type to create
Fig.6.13
60
6.9 Using Diskpart Command:Diskpart is a command utility for disk management. You can create/format partitions, assign drive
letters and delete partitions using this utility.
To start diskpart type DISKPART at the command prompt. and use the following commands.
1. Help :- This command displays the list of available commands in diskpart.
2. List
3. Select :- Use this command to select disk, partitions or volumes. You must
select disk before you select partitions or volumes and make operations on
them.
4. Create partition:- This command creates partition of specified size
Eg- create partition primary size =1024 .
5. Assign:- This command assigns or deletes drive letter to the partition or
Volume. Eg- assign letter=m
6. Delete :- This command deletes the selected partition.
61
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
62
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
63
Chapter 7
Disk Quota
Data Compression
Encrypted File System
NTFS File/Folder Permissions
Disk Quota
Disk quota is used to specify how much disk space a user is allowed to use on a NTFS volume
Guidelines for Disk Quota: 1) Disk quota can be specified only on NTFS volume.
2) Disk Quota is applied at volume level.
3) Disk Quota is applied at volume on file and folder ownership, i.e. when a user creates &
copies or takes ownership of any folder or files the user is an owner. And the files size is
calculated for quota.
In short we can say that disk usage is calculated based on the files owned by the user.
4) When a user installs any application on disk Quota see the available size and not the actual
size.
Disk Quota is not applied to the administrator group.
Disk Quota is not applied to user who has accessed the disk Quota volume before the
Quota was applied.
When you apply disk Quota it is specified for all users by default
You can also specify disk Quota It is specified on per user basis.
To apply quota to all users, Right click the volume propertiesQuota tab.
Select enable quota management and select limit disk space to.
If you want to deny the users who exceed the limit, select deny disk space to users exceeding
quota limit
64
Fig.7.1
Data Compression
Data compression is a process of storing data in compressed form that take less space than
uncompressed data. You can compress files only on NTFS volume. Encrypted files cannot be
compressed.
To compress a folder/file.
Right click propertiesadvanced and check the checkbox shown below, and click ok. When
you compress a file or folder they are display in blue color
Fig.7.2
65
ABC
#&)!
ABC
EFS is a technology used in win2000 server/professional, win2003 server/XP. Every user who is
owner of his own file and folder can encrypt and decrypt the files. If owner of encrypted file and
folder is not available than DRA (Data Recover Agent) can decrypt the files on the behalf of the
user.
To Encrypt File or Folder
Right clickadvanced select encrypt contents to secure data. Once the file or folder is encrypted
they are displayed in green color.
Fig.7.3
You can use the command line tool to encrypt files and folders.
Open Command prompt and type any of the following command.
1)
2)
3)
4)
5)
66
Read, write, modify, and execute files in the folder, change attributes, permissions,
and take ownership of the folder or files within.
Modify
Read, write, modify, and execute files in the folder, and change attributes of the
folder or files within.
Display the folder's contents and display the data, attributes, owner, and permissions
Read
&
for files within the folder, and run files within the folder (if they're programs or have
Execute
a program associated with them for which you have the necessary permissions).
Display the folder's contents and display the data, attributes, owner, and permissions
List Folder
for files within the folder, and run files within the folder (if they're programs or have
Contents
a program associated with them for which you have the necessary permissions).
Read
Write
Write to the file, append to the file, and read or change its attributes.
Table 7.1
Modify
Display the file's data, attributes, owner, and permissions, and run the file
Read & Execute (if it's a program or has a program associated with it for which you have
the necessary permissions).
Read
Write
Write to the file, append to the file, and read or change its attributes.
Table 7.2
67
Does not create a new file - simply updates location in directory. File
keeps its original permissions.
Moving across a
partition
Creates a new file and deletes the old one. Inherits the target folders
permissions.
Copying within a
partition
Remember that file permissions override the permissions of its parent folder. Anytime a new file is
created, the file will inherit permissions from the target folder.
Fig7.4
68
Fig7.5
69
2. Folder view options:- These options are used to change the view of a folder
Fig7.6
3. File type options :- These options are used to set the file extensions and the programe used
to open these file types
Fig7.7
70
4. Offline Folder Options:- This option lets you configure the offline file settings. Offline files let
you work on network files even when you are not connected to the network.
Fig7.8
71
Fig.7.9
72
Fig 7.10
Change
Includes read permissions and the ability to add, delete or change files or
subdirectories
Full Control
Can perform any and all functions on all files and folders within the share.
73
The Deny permission can also be applied to shares. The Deny permission overrides all others. When
folders on FAT and FAT32 volumes are shared, only the share level permissions apply as these
systems do not support file and directory (NTFS) permissions. When folders on NTFS volumes are
shared, the effective permission of the user will be the most restrictive of the NTFS and share
permissions.
You can use the net share command to share or stop sharing folders
Ex. Net share Soft=C:\Software .the name soft is the share name and the c:\software is the path of
the folder you want to share.
When you share a folder by default the everyone group gets read permission.
Fig 7.11
74
Fig 7.12
Open Windows Explorer or My Computer from the Windows Start Menu. Or right
click my computer
2. From the Tools menu, click Map Network Drive. A new Map Network Drive
window opens.
Fig 7.13
3. In the Map Network Drive window, choose an available drive letter from the dropdown
list located next to the "Drive:" option. Any drives already mapped will have a shared
folder name displayed inside the dropdown list, next to the drive letter.
4. Type the name of the folder to map. This name must follow UNC. Alternatively, click
the Browse button to find the correct folder by browsing available network shares.
75
5.Click the "Reconnect at login" checkbox if this network drive should be mapped
permanently. Otherwise, this drive will un-map when the user logs out of this computer.
6. If the remote computer that contains the shared folder requires a different username and
password to log in, click the "different user name" hyperlink to enter this information.
7. Click Finish.
8. If the Finish operation succeeds, the network drive will be mapped. If the network drive
cannot be mapped, ensure the folder name is spelled correctly, that this folder was
correctly set up for sharing on
9. The remote computer, that (if necessary) the correct username and password have been
entered, and that the computer network connections are functioning properly.
Note:-You can use a net use command to map a network share.
C:\>Net use X: \\computername\sharefolder Where x: is the drive
\\computername\sharefolder is the UNC path of the share you want to map.
Sharing Commands
net share
Display all the share folders with path
Net share sharename = path
It creates a new share folder.
Eg- net share India=c:\india
Net share sharename /delete
Eg - net share India /delete
76
letter
and
the
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
77
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
78
Chapter 8
8.1 Introduction
Network plays an important role in our day-to-day computer needs. Even small organizations have
started to build networks. Networks help Administrators to take centralized control of the computers
and make the data available to all of the users. To successfully create the network you must have a
network adapter (NIC) installed in your computer.
NW Link IPX/SPX/NET Bios compatible transport this protocol is mainly use if you
want to connect Novell NetWare (network)
TCP/IP as a universal protocol. This protocol is used by almost all networks and it is
very important protocol.
Apple talk is used if you want to connect to the Macintosh computers.
79
Fig.8.1
1. In the above diagram we can see two networks. The first network contains a domain
controller and xp clients, and the other network has Netware server with xp clients. Here the
gateway server will help windows clients to access the Netware server shares and the
windows clients will see the shares as if they reside on their server, but those shares will be
on the Netware server.
DHCP Server
Fig.8.2
81
Fig.8.3
Fig.8.4
WINS was developed by Microsoft for their network it dose the same work as DNS but DNS can be
used for any network and Wins is only for Microsoft networks.
82
Novell Netware
(IPX/SPX)
RedHat Linux
(TCP/IP)
Microsoft Windows
(IPX/SPX)
(TCP/IP)
(Apple)
Apple Macintosh
(Apple)
Fig.8.5
GATEWAY server
(GSNW)
XP
XP
(CSNW)
XP
XP
XP
Fig.8.6
83
XP
Microsoft Windows
Apple Macintosh
Fig.8.7
84
Windows Component
Check mark on file
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
85
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
86
Chapter 9
Manage Printing
9.1 Introduction
Printing is the process of converting soft copies into hard copies. This process involves two devices,
1. Printer Which is software installed on the computer.
2. Pint Device Which is the actual print hardware which comes in many shapes and sizes.
You can find many types of these print devices, some are small while others are
big and heavy duty which are used in corporate sectors like bank and billing
sections.
In a Small Organization
Fig 9.1
Print Server
In a Large Organization
IP=192.168.22.11
Fig 9.2
87
These print devices are connected to your computer using various ports some of them are
listed below.
Ports used for connecting print devices
1) Parallel Port this is the most popular port used to connect a print device to a computer.
2) USB Port- universal serial bus is the newest technology which provides higher speeds then
the old parallel ports
3) NIC - Print device, which has a NIC port, is called network printer, which is directly
connected to the network.
Fig 9.3
88
Fig. 9.4
Fig 9.5
89
Fig 9.6
Step 3Select the printer make and model install printer software.
Fig 9.7
90
Fig 9.8
Fig 9.9
91
Fig 9.10
Step7Select yes if you want to print a test page
Fig 9.11
92
Fig 9.12
.
Fig 9.13
93
2) Sharing: - Enables you to share printers and publish them in the active directory or stop
sharing the printer.
Fig 9.14
3) Additional Drivers:-You can configure additional drivers for other systems which are pre
windows200.
Fig 9.15
94
4) Ports: - You can select port used by the printer. you can add new port to redirect the print
jobs to other printers, delete ports and enable printer pooling(using same driver for
multiple print devices
Fig 9.16
Redirecting Print Jobs: - This option helps you to redirect the print jobs sent to your printer to
some other printer on the network when your printer is down for maintenance
Fig.9.16
95
Fig.9.17
Select local port and click New Port
Fig.9.18
Type the UNC path of the printer where you want to redirect the print jobs
And click ok.
All the print jobs which are sent to your printer will be redirected to this printer now.
And the users who had your printer installed on their computers will not need to change anything at
their computer settings.
Enabling Printer Pooling:- Printer pooling is the technique where you can use multiple print
devices with one driver. That means in your computer you will only see one printer installed but the
printer will be using multiple physical print devices. This helps in distributing the print jobs sent to
one print server to multiple print devices attached to the server. When printer pool is enabled the
print job is given to the print device that has shortest print job queue. The print devices must be of
same make and model for the pooling to work .you can enable printer pooling from the ports tab in
printer properties.
96
Multiple Print
devices of
same model
and make
Fig.9.19
Fig.9.20
97
Print schedule
print priority
update printer driver
configure spooling
separator page settings
Fig 9.21
Setting printer priority: - To set the printer priorities, install the same printer with new driver.
Assign low priority (1) to the old driver and assign higher priority (99) to new driver. Tell users to
install the printer with priority 2 if they need high priority given to their documents. Other users will
use the low priority printer with priority 1.
Fig.9.22
98
3. Manage documents:-this permission allows the user to manage all print jobs
of all the users.
Fig 9.23
99
Managing Print Spooler Service:Print spooler folder path:StartsettingsPrinter and FaxFile menuServer propertiesAdvanced
Fig.9.24
This option is used to view and change the spool folder and path
From the same option you can enable or disable printer notification.
If the print job is jammed and you cannot cancel or restart the print job then
Stop and restart the print spooler service.
Fig.9.25
100
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
101
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
102
Chapter 10
10.1 Introduction
Remote management
Fig 10.1
Telnet
Unix
Dos
Fig 10.2
Telnet
Router
Switch
Fig 10.3
103
Terminal services with windows2000:Microsoft introduced terminal services first time in windows 2000 server
Windows 2003 Terminal Server contains two modes
1. Remote administration mode
2. Application serer mode
Remote Administration Mode:
Terminal client
XP/win2003 srv
Remote Desktop Connection
Fig 14.4
104
Windows 2000
Terminal server
98
98
NT
Terminal clients
NT
Fig 10.5
RDC
T.C.
Fig 10.6
105
Fig 10.7
To connect to the remote windows Xp machine
Go to runtype MSTSC and press enter.
Type the IP address of the computer you wish to connect to, and click connect
Fig 10.8
106
Remote desktop in win XP allows only one session. If anyone loges to the XP machine the XP
machine will be locked.
Remote desktop
enable
System is locked
RDC
WinXP
WinXP
Fig 10.9
Fig 10.10
107
Windows 2003
Terminal server
XP
XP
2000 prof
Terminal clients
2000 prof
Fig 10.11
Windows 2003 terminal services allow to share and run applications on terminal client computers
which contain not enough hardware.
Terminal clients are mainly called as thin clients because they only give input of keyboard and
mouse and all the processing takes place at the server.
108
Fig 10.12
109
Fig 10.13
2) Terminal Services Configuration: - from this option in the server setting you can remove
the restriction per user permission, change permission compatibility, remote desktop
protocol properties.
Fig 10.14
110
RDP Properties :- From this option you can set encryption setting, set log on settings, terminal
client session, set terminal client environment, configure remote control, configure the client setting
and network adapter service and also set the terminal service permissions.
Fig 10.15
1. General:-
Fig 10.16
111
2. Logon settings
Fig 10.17
3. Sessions
Fig 10.18
112
4. Environment
Fig 10.19
5. Permissions
Fig 10.20
113
6. Network Adapter
Fig 10.21
7. Client Settings
Fig 10.22
114
8. Remote Control
Fig 10.23
Remote Control: - Remote control allows viewing the terminal session of terminal client. you can
configure to require user permission before you see or interact with his session or you can choose
not to interact with the user session.
Note: - To view remote control the admin need to access terminal service from a terminal client
machine because remote control is not allowed from the terminal server.
115
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
116
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
117
Chapter 11
11.2 Determine Trends: -Determine the various trends faults with proactive management you
track the problem before it occurs.
11.3 Using System Monitor: - System monitor is used to connect and see Real Time
Performance data for local and remote computer on network it allows to
1) Collection data from local & Remote computer
2) View data in graph, Hectograph or report
Data in graph view
Fig 11.1
118
Fig 11.2
Report view
Fig 11.3
119
Fig 11.4
3) Alerts: - Alerts can be generated when the specific counter exceeds a specified value. You
can send alerts to other computer over the network.
Fig 11.5
120
Alert message
Fig 11.6
Fig 11.7
121
Fig 11.8
122
Application Tab
Fig 11.9
123
Processes Tab
Fig.11.10
Set Affinity
Fig 11.11
124
Performance Tab
Fig 11.12
Networking Tab
Fig 11.13
125
Users Tab
Fig 11.14
Manage Memory Crash Failure
If there is a memory crash, windows 2003 OS dumps the memory information in a file called as
memory dump file which is located under WINDOWS\MEMORY.DMP
You can set the memory system failure from
Right-Click My Computer Properties Advanced Startup & Recovery setting
Fig 11.15
126
Fig 11.16
Fig 11.17
127
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
128
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
129
Chapter 12
Internet Explorer
Latest device driver
Updated the system files (.dll)
Update the registry
Latest hot fixes
Fig.12.1
130
WSUS clients
Fig.12.2
2) Service Pack: - Service pack contains latest pack files which are released by Microsoft
periodically on the internet. Different versions of service packs are available for different
operating systems.
Winver command is used to check the service pack install on system.
NT4.0
- SP1 / SP2 / SP3 / SP4 / SP5 / SP6
Win2000 - SP1 / SP2 / SP3 / SP4
Win2003 - SP1 / SP2
1) Event Viewer: - Event viewer utility is used to view the events that are logged. The
information includes hardware & software events and security events.
131
Fig.12.3
1) Application Log: - Track Event that is related to application running on the computer.
2) System Log: - It tracks events that are related to win 2003 OS
3) Security Log: - Security log contains events that are enabled in auditing. You can audit
file & folder access located only on NTFS volume, to audit file & folder enable audit
object access option (success & failure) from group policy audit option. To audit a
Specific folder go to the folder properties Security Advanced Audit Add the
user & groups to audit. you can also audit system logon
132
Fig.12.4
In log properties you can view log filename & path or set log file size. You can clear the log file and
also filter the log as per your needs.
133
1) General Option
Fig.12.5
2) Filter Option
Fig.12.6
134
NTLDR
BOOT.INI
BOOTSECT.DOS
NTBOOTDD.SYS
NTDETECT.COM
1) NTLDR: -NT loader it is the first file that is loaded during the system initiation.
2) BOOT.INI: - It builds OS menu choices that are displayed during the boot process to select
OS to start in case of multi boot system. It also specifies the location of the OS on the
partition.
Fig.12.7
ARC path
IN THE ABOVE boot.ini file
Multi ( ) used when disk is IDE or (SCSI with BIOS enabled)
SCSI ( ) used when disk is SCSI with BIOS disabled
Disk ( ) Used with SCSI
Rdisk ( ) Used with multi
Partition ( ) specifies Partition number where OS is installed.
135
7) Directory Service Restore mode: - This option is used by win2003 server computers
that are configured as D.C. (Domain Controller) to restore the ADS database.
8) Debugging Mode: - This option runs the kernel debugger. If the utility is installed it is for
advanced trouble shooting.
136
Fig.12.8
137
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
138
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
139
Chapter 13
13.1 Introduction
Backup is an additional copy of database.
Win NT 4.0 windows backup supports only Tape Devices.
But win2000/2003 backup supports FDD, HDD, CD Zip drive & Tape Devices.
What to backup?
Important thing for backup are
1) ADS
2) Registry
3) User Data
4) Application Data
5) Group Policy
6) Login Script
7) Profiles
Who will backup?
Allow groups for backup are
1) Administrator
2) Backup Operator
When to backup?
Online/offline (After Office Hours)
Using Windows Backup
Startprograms Accessoriessystem ToolsBackup
Or use the command NTBACKUP.EXE
Normal
Incremental
Differential
Daily
Copy
140
1) Normal + Incremental
Normal
Mon
All
Incremental
Tue
F2
F4
Modified
Incremental
Wes
F1
F5
Modified
Incremental
Thu
--Modified
Incremental
Fri
-F6
Modified
2) Normal + Deferential
Normal
Mon
All
Deferential
Tue
F1
F3
Deferential
Wes
F2
Deferential
Thu
---
F1, F3
F1, F2, F3
F1, F2, F3
Deferential
Fri
F5
F6
F1, F2, F3, F5,
F6
In deferential Backup backups all files modified after the normal backup. Backup is slower.
141
Fig 13.1
142
Taking Backup
Fig 13.2
Fig 13.3
143
Fig 13.4
Fig 13.5
144
Fig 13.6
Fig 13.7
145
Fig 13.8
Fig 13.9
146
Fig 13.10
Fig 13.11
147
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
148
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
149
Fig. 14.1
Step 2
Fig. 14.2
150
Step 3
Fig. 14.3
After the recovery console is installed the recovery console option is added to the boot.ini file
This screen will display the recover console option during startup
Fig. 14.4
151
Fig. 14.5
Once the recovery console is started you can access the following.
1. Only root drives (c:, d:, e:)
2. System root folder (Windows)
3. CMDCONS folder if you have installed the recovery console.
4. CD-ROM and floppy disk drive.
152
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
153
Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
154
155