LAB 5 ANSWER KEY WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC)
|
|
- Logan Carr
- 5 years ago
- Views:
Transcription
1 LAB 5 ANSWER KEY WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) This lab contains the following exercises: Exercise 5.1 Exercise 5.2 Exercise 5.3 Exercise 5.4 Exercise 5.5 Exercise 5.6 Installing Internet Information Server Testing IIS Connectivity Allowing a Program through the Firewall Creating Windows Firewall Rules Using NTFS Compression Using EFS Encryption Estimated lab time: 85 minutes Exercise 5.1 Installing Internet Information Server Overview Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time 10 minutes 1. Click VM > Settings and change Network Adapter settings to bridged.
2 Configuring Windows 7
3 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 2. Turn on the Workstation## computer and log on using your Student## account and the password 3. Click Start and then click Control Panel. The Control Panel window appears. 4. Click Programs > Program and Features. The Uninstall or change a program window appears.
4 Configuring Windows 7 5. Click Turn Window features on or off. The Windows Features dialog box appears.
5 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 6. Browse to the Internet Information Services\World Wide Web Services. 7. Select the Common HTTP Features, Health and Diagnostics, and Security check boxes. 8. Expand the Web Management Tools folder and select the IIS Management Console check box. Then click OK. Windows 7 installs the selected components.
6 Configuring Windows 7 9. Close the Programs and Features control panel window. 10. Click Start, and click Control Panel. The Control Panel window appears. 11. Click System and Security > Administrative Tools. The Administrative Tools window appears. 12. Double click Internet Information Services (IIS) Manager. The Internet Information Services (IIS) Manager console appears.
7 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 13. Expand the Workstation container, and then expand the Sites folder.
8 Configuring Windows Right click the sites folder and, from the context menu, select Add Web Site. The Add Web Site dialog box appears. 15. In the Site name text box, type Intranet. 16. In the Physical path text box, type c:\intepub\wwwroot. 17. Change the value in the Port text box to Click OK. The new intranet Web site appears in the Sites folder. 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. 20. The URL for your new intranet Web site will be (where IP Address is the IP Address of your virtual machine). 21. Close the Internet Information Services (IIS) Manager console. 22. Leave the computer logged on for the next exercise.
9 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Exercise 5.2 Overview Testing IIS Connectivity In Exercise 5.2, you test the functionality of the web server you just installed. Completion time 20 minutes 1. Click Start and then click All Programs > Internet Explorer. An Internet Explorer window appears. 2. In the address box, type and press Enter. Question 1 What is the result, and what does the result indicate? Answer: IIS is functioning.
10 Configuring Windows 7 3. Next, test the intranet Web site by using the URL you specified in Exercise 5.1. Question 2 What is the result, and what does it indicate? Answer: The web site that was created is functioning. 4. On the host computer (NOT YOUR VIRTUAL MACHINE) open Internet Explorer and attempt to access the IIS web server running on your workstation by typing (where IP Address is the IP Address of your virtual machine) and pressing Enter.
11 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 3 What is the result? Answer: Internet Explorer cannot display the webpage.
12 Configuring Windows 7 5. Now, try to connect to the intranet Web site from the host computer. Question 4 What is the result? Answer: Internet Explorer cannot display the webpage. Question 5 List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer. Answer: Firewall, Antivirus, improperly configured network connections, permissions etc.
13 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 6. Back on your virtual machine, click Start, and the click Control Panel > System and Security > Windows Firewall. The Windows Firewall control panel appears.
14 Configuring Windows 7 7. Click Turn Windows Firewall on or off. The Customize settings for each type of network window appears.
15 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 8. Under Home or work (private) network location setting, select the Turn off Windows Firewall (not recommended) option and click OK.
16 Configuring Windows 7 9. Return to your host computer (NOT YOUR VIRTUAL MACHINE) and Clear the Internet Explorer cache by clicking Tools >Internet Options. The Internet Options dialog box appears. 10. Under Browsing History, click the Delete button. The Delete Browsing History dialog box appears.
17 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 11. Click Delete all. Then click OK to close the Internet Options dialog box. Question 6 Why is it necessary to clear the cache before you retest the web server connections? Answer: Because the cache will point to the previous URL that was not functioning correctly. 12. Attempt to access both of the sites on the web server using Internet Explorer.
18 Configuring Windows 7
19 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 7 What are the results, and what do the results indicate? Answer: The web page is displayed. Question 8 What other test could you perform to prove that it was your computer s firewall that was blocking the connection and not the firewall on the computer you are using as a client? Answer: Disabling the clients firewall, enabling the firewall on the Virtual Machine and opening the port, use netstat to determine if the port is open etc. 13. Back on your virtual machine in the Windows Firewall control panel, open the Customize settings for each type of network window again. 14. Under Home or work (private) network location settings, select the Turn on Windows Firewall option and click OK.
20 Configuring Windows 7 Question 9 Why can you not simply leave Windows Firewall turned off when you deploy an actual web server? Answer: Because the machine would be open to attack from external sources 15. Leave the Windows Firewall control panel open and the workstation logged on for the next exercise. Exercise 5.3 Overview Completion time Allowing a Program Through the Firewall Windows Firewall is preventing clients from connecting to the web server. In Exercise 5.3 to enable client access, you will use the Windows Firewall control panel to allow access to the web server. 10 minutes 1. On your workstation, in the Windows Firewall control panel, click Allow a program or feature through Windows Firewall. The Allow programs to communicate through Windows Firewall window appears.
21 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 2. Click Change settings, scroll down in the Allowed programs and features list, select the World Wide Web Services (HTTP) check box, and click OK. 3. Return to your host computer (NOT YOUR VIRTUAL MACHINE) and try to access the web server again using Internet Explorer and trying to connect to (where IP Address is the IP Address of your virtual machine) and pressing Enter. Question 10 Why are you now able to connect to the Web site from the client? Answer: The HTTP port is open. 4. Now test the connection to the intranet Web site. Question 11 Why are you unable to connect to the intranet site from the client? Answer: The port the intranet site uses was not open.
22 Configuring Windows 7 5. Open the Allow programs to communicate through Windows Firewall window again and clear the World Wide Web Services (HTTP) check box. Then, click OK. 6. Leave the remaining windows open and the workstations logged on for the next exercise.
23 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Exercise 5.4 Overview Completion time Creating Windows Firewall Rules The port you opened in Exercise 5.3 enables clients to access the default Web site hosted by your web server, but not the intranet Web site. In this exercise, you use the Windows Firewall with Advanced Security console to create rules that will enable clients to access both Web sites. 15 minutes 1. On your workstation, click Start. Then click Control Panel > System and Security > Administrative Tools. The Administrative Tools window appears. 2. Double click Windows Firewall with Advanced Security. The Windows Firewall with Advanced Security console appears.
24 Configuring Windows 7 3. Select the Inbound Rules container. The list of default inbound rules appears.
25 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 4. Scroll down to the bottom of the list and locate the rules for World Wide Web Services (HTTP Traffic-In). Question 12 Why are there two separate rules for the World Wide Web Services? Answer: One is for the Domain profile and one is for the Public and Private profiles. 5. Double click each of the two rules and examine their properties.
26 Configuring Windows 7 Question 13 How do the properties of the two rules differ? Answer: They are exactly the same except for the profile assignments. Question 14 How would the opening of the port you performed in Exercise 5.3 affect the World Wide Web Services (HTTP Traffic-In) rules you just examined? Answer: Opening the port activates the rule for the Domain profile, causing its check mark to appear red in the console. 6. Select the Inbound Rules container and, from the Action menu, select Filter By Profile > Filter By Private Profile. Question 15 What happens to the list of rules? Answer: It changes to display only the rules that apply to the Private profile.
27 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 7. Right click the Inbound Rules container and, from the context menu, select New Rule. The New Inbound Rule Wizard launches, displaying the Rule Type page.
28 Configuring Windows 7 8. Select the Port option and click Next. The Protocol and Ports page appears.
29 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 9. Leave the default TCP and Specific local ports options selected. In the Specific local ports text box, type 80, 4444 and click Next. The Action page appears.
30 Configuring Windows Leave the default Allow the connection option selected and click Next. The Profile page appears.
31 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 11. Clear the Public check box, leaving only the Private and Domain check box selected, and then click Next. The Name page appears.
32 Configuring Windows In the Name text box, type Lab Web Server Ports 80 & 4444 and click Finish. The wizard creates and enables the new rule and then adds it to the Inbound Riles list.
33 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 16 How would the rule creation procedure you just performed differ if you wanted to restrict client access to the intranet Web site to computers on the local network only? Answer: You would have to create separate rules for ports 80 and In the rule for port 4444, you would specify a scope limiting access to your local network address.
34 Configuring Windows Click Clear All Filters on the Action pain in order to view the new rule. Double click the rule you just created. The Lab Web Server Ports 80 & 4444 Properties sheet appears. 14. Take a screen shot of the Properties sheet for the new rule by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.
35 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 15. Return to your host computer (NOT YOUR VIRTUAL MACHINE) and Clear the Internet Explorer cache by clicking Tools >Internet Options. The Internet Options dialog box appears. 16. Under Browsing History, click the Delete button. The Delete Browsing History dialog box appears.
36 Configuring Windows Click Delete all. Then click OK to close the Internet Options dialog box. 18. Attempt to access both of the sites on the web server using Internet Explorer. Question 17 What are the results, and why are they different from the results you experienced with the program exception? Answer: The client successfully connects to both websites. This occurs because the rule you created opens up both port 80 and port Click VM > Settings and change Network Adapter settings back to Host-only. 20. Close all windows and leave the computer logged on for the next exercise.
37 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Exercise 5.5 Overview Completion time Using NTFS Compression The graphic design department uses lots of image files, which are quite large. To save room, they have been saving images as.jpg files, but they are starting to notice degradation in the images when they are printed. They have therefore decided to use Windows bitmap (.bmp) files to store images, which are uncompressed. You need to implement NTFS compression, to save space, on a folder in which they store the.bmp images. 15 minutes 1. On your workstation, click Start and select Computer. 2. In the Computer windows, browse to C:\Users\Public\Public Documents.
38 Configuring Windows 7 3. In the Public Documents folder click New Folder in the toolbar. 4. Name the folder Brochure Images. 5. Right click the Brochure Images folder, and then select Properties.
39 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 6. In the Brochure Images Properties dialog box, on the General tab, click Advanced.
40 Configuring Windows 7 7. In the Advanced Attributes dialog box, select the Compress contents to save disk space check box and click OK. 8. In the Brochure Images Properties dialog box, click OK. Question 18 What color is the font for the Brochure Images folder? Answer: Blue 9. In the Public Documents folder, right click blank space, point to New > Bitmap Image. 10. Name the image Picture1.
41 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 11. Right click Picture1, and then select Edit.
42 Configuring Windows In Microsoft Paint click the Microsoft Paint File menu tab and select Properties. 13. In the Properties dialog box, in the Width and Height text boxes, type 2048, and then click OK.
43 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 14. From the Microsoft Paint File menu tab and select Save. 15. Close Microsoft Paint. 16. In the Public Documents folder, right click Picture1 and then select Properties.
44 Configuring Windows 7 Question 19 How large is the Picture1file on the disk? Answer: 12.0 MB (but could vary) 17. Close the Picture1 Properties dialog box. 18. In the Public Documents folder, move the Picture1 file into the Brochure Images folder by dragging the file into the folder. 19. Open the Brochures Images folder.
45 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 20. In the Brochure Images folder, right click Picture1 and then select Properties.
46 Configuring Windows 7 Question 20 The image file has been moved into a folder using NTFS compression. Why isn t the file any smaller? Answer: Because the file was moved it did not inherit the properties of the Brochure Images folder. 21. Close the Picture1 Properties dialog box. 22. Right click Picture1, and then select Cut. 23. Click the Back icon in the standard buttons toolbar. 24. In the Public Documents folder, right click blank space, and select Paste.
47 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 25. Right click Picture1, and then select copy. 26. Open the Brochure Images folder. 27. In the Brochure Images folder, right click blank space, and select Paste.
48 Configuring Windows Right click Picture1, and then select Properties.
49 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 21 What is the size on disk of the Picture1 file now? Answer: 1.75 MB (but could vary) Question 22 Why did the file shrink, when it remained full size when it was moved? Answer: Because the file was copied, it inherited the properties of the Brochure Images folder. 29. Close the Picture1 Properties dialog box.
50 Configuring Windows Take a screen shot of the Brochure Images folder showing Picture1 by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. 31. Click the Back icon in the standard buttons toolbar to return to the Public Documents folder for the next exercise. Exercise 5.6 Overview Completion time Using EFS Encryption The graphic design team is working on a brochure for proprietary software that Contoso is going to use. The software is expected to give the company an edge over other companies, and management is very paranoid about keeping the new concepts secret. To help protect this data, you need to create an encrypted data store using EFS on the computers of all the members in the graphic design team who are assigned to the project. 15 minutes 1. In the Public Documents folder click New Folder in the toolbar. 2. Name the folder Sensitive Data. 3. Right click the Sensitive Data folder, and then select Properties.
51 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 4. In the Sensitive Data Properties dialog box, on the General tab, click Advanced. 5. In the Advanced Attributes dialog box, select the Encrypt contents to secure data check box and click OK.
52 Configuring Windows 7 6. In the Sensitive Data Properties dialog box, click OK. Question 23 What color is the font for the Sensitive Data folder? Answer: Green 7. In the Public Documents folder, right click blank space, point to New > Text Document. 8. Name the document Sensitive Text.
53 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 9. Open the Sensitive Text file. 10. In Notepad type Encrypted Data. 11. Exit Notepad, when asked if you want to save changes, click Yes. 12. In the Public Documents folder, move the Sensitive Data file into the Sensitive Data folder by dragging the file into the folder.
54 Configuring Windows Open the Sensitive Data folder. 14. Open the Sensitive Data text file. Question 24 Can you read the Sensitive Text file? Answer: Yes 15. Close Notepad. 16. Minimize the Sensitive Data folder. 17. Click Start, and in the Search programs and files box, type mmc and press Enter. A blank Microsoft Management Console window appears.
55 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 18. Click File > Add/Remove Snap-in. The Add or Remove Snap-ins dialog box appears. 19. In the Available snap-ins list, select Certificates and click Add. The This snap-in will always manage certificates for: dialog box appears. 20. Select My user account, and click Finish.
56 Configuring Windows Click OK. The snap-in appears in the MMC console. 22. In the console tree, expand Certificates > Personal > Certificates.
57 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 23. In the Details pane, on the right hand side, right click the certificate and then select Delete. 24. In the Certificates message box, click Yes to delete the certificate.
58 Configuring Windows Close the Console1 console, and click No when asked if you want to save changes. 26. Log off Workstation## and log back on using your Student## account and the password P@ssw0rd. 27. Open the Sensitive Data folder (C:\Users\Public\Public Documents\Sensitive Data)
59 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 28. In the Sensitive Data folder, open Sensitive Text. Question 25 What occurs when you try to open the Sensitive Text file? Answer: Access is denied 29. Take a screen shot of the Sensitive Data folder showing the Sensitive Text document by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. 30. Close all open windows and log off the computer.
LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE
LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE This lab contains the following exercises: Exercise 8.1 Exercise 8.2 Exercise 8.3 Installing Active Directory Creating Users and Groups Joining
More informationUsing the Terminal Services Gateway Lesson 10
Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web
More information5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP
5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP Introduction Print and complete this lab. In this lab, you will use administrative tools to monitor system resources. You will also
More informationLab - System Utilities in Windows
Introduction In this lab, you will use Windows utilities to configure operating system settings. Recommended Equipment The following equipment is required for this exercise: A computer running Windows
More informationBROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017
BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...
More informationLAB 2 WORKSHEET WORKING WITH DISKS AND DEVICES
LAB 2 WORKSHEET WORKING WITH DISKS AND DEVICES Exercise 2.1 Creating a Basic Disk Partition In Exercise 2.1, you create a new basic partition for Alice where she can store her data. 10 minutes 7. Based
More informationCompTIA Network+ Lab Series Network Concepts. Lab 2: Types of Networks
CompTIA Network+ Lab Series Network Concepts Objective 1.5: Identify common TCP and UDP default ports Objective 1.6: Explain the function of common networking protocols Document Version: 2015-09-18 otherwise
More informationLab B: Configuring Disk Compression and Quotas
Module 6: Managing Data by Using NTFS 33 Lab B: Configuring Disk Compression and Quotas Topic Objective To introduce the lab. Lead-in In this lab, you will configure disk compression and quotas. *****************************ILLEGAL
More informationCreating a Web Presentation
LESSON 9 Creating a Web Presentation 9.1 After completing this lesson, you will be able to: Create an agenda slide or home page. Create a hyperlink to a slide. Create a Web presentation with the AutoContent
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager
Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside
More informationHands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1
Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationModule 3 Remote Desktop Gateway Estimated Time: 90 minutes
Module 3 Remote Desktop Gateway Estimated Time: 90 minutes A. Datum Corporation provided access to web intranet web applications by implementing Web Application Proxy. Now, IT management also wants to
More informationImplementing Messaging Security for Exchange Server Clients
Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment
More informationVMware Horizon FLEX Client User Guide
Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationLab - Task Manager in Windows 7 and Vista
Lab - Task Manager in Windows 7 and Vista Introduction In this lab, you will explore Task Manager and manage processes from within Task Manager. Recommended Equipment The following equipment is required
More informationms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm
Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.
More informationPEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server
PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows
More information10ZiG Technology. Thin Desktop Quick Start Guide
10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:
More informationEkran System High Availability Deployment Guide
Ekran System High Availability Deployment Guide Table of Contents About... 3 System Requirements... 4 Program Structure... 5 Deployment Process... 6 About... 6 Prerequisites... 6 General Prerequisites...
More informationVMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12
26 SEP 2017 Horizon FLEX 1.12 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.
More informationUSER GUIDE PowerPhoto CRM
USER GUIDE PowerPhoto CRM 2013 2015 Contents CONFIGURING POWERPHOTO Add, Remove, Set Default, Set Record Image, Thumbnail & View Text Display Original File Save Original File Resize Photo Resize Height
More informationms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm
Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the
More informationEM L23 - Implementing Client and Server Management with Site Services Hands-On Lab
EM L23 - Implementing Client and Server Management with Site Services Hands-On Lab Description If you are new to the Symantec Management Technologies or are just looking to reinforce your existing knowledge
More informationModule 9. Configuring IPsec. Contents:
Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring
More information202 Lab Introduction Connecting to the Lab Environment
202 Lab Introduction Connecting to the Lab Environment Objectives During this v7.1 Deployment lab, each student (from the Blue group or Green group) must verify access (and permissions) to their assigned
More informationLAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT
LAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 5.1 Exercise 5.2 Exercise 5.3 Lab Challenge Installing the Windows Assessment
More informationSupporting Networked Computers
CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up
More informationA D S S G o > S i g n D e s k t o p. I n s t a l l a t i o n G u i d e. D o c u m e n t V e r s i o n
A D S S G o > S i g n D e s k t o p I n s t a l l a t i o n G u i d e A S C E R T I A LTD A p r i l 2 0 1 8 D o c u m e n t V e r s i o n - 5.7. 0. 1 Ascertia Limited. All rights reserved. This document
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:
More informationKeyNexus Hyper-V Deployment Guide
v1.0 09/2018 . Copyright Notice Copyright 2018 KeyNexus Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationBSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario
BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark
More informationCENTAUR S REAL-TIME GRAPHIC INTERFACE V4.0 OPERATOR S MANUAL
CENTAUR S REAL-TIME GRAPHIC INTERFACE V4.0 OPERATOR S MANUAL TABLE OF CONTENTS Installation... 6 Introduction to Centaur s real-time Graphic Interface... 6 Computer Requirements... 7 Operating System
More informationSection 2 Getting Started
Section 2 Getting Started ECDL Section 2 Getting Started By the end of this section you should be able to: Start, restart and close down a device Log on and log off Windows Recognise and use the Desktop
More informationWorkstation Configuration
Workstation Configuration Version 8.2 May 2, 2014 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 3 1.1 Custom level Internet
More informationOrgPublisher Web Administration Guide for Windows Server 2012
OrgPublisher Web Administration Guide for Windows Server 2012 Table of Contents OrgPublisher Web Administration Guide for Windows Server 2012 Table of Contents Introduction... 3 Role Requirements for Installation...
More informationINF204x Module 1, Lab 3 - Configure Windows 10 VPN
INF204x Module 1, Lab 3 - Configure Windows 10 VPN Estimated Time: 40 minutes Your organization plans to allow Windows 10 users to connect to the internal network by using the VPN client built into the
More informationRecent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004
Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and
More informationHTML Exercise 20 Linking Pictures To Other Documents Or Web Sites
HTML Exercise 20 Linking Pictures To Other Documents Or Web Sites Turning pictures into hyperlinks is nearly the same as what you learned in Exercises 4 and 5. If a picture is essential to a Web page,
More informationChapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER
Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression
More informationSQL Server Reporting Services (SSRS) is one of SQL Server 2008 s
Chapter 9 Turning Data into Information with SQL Server Reporting Services In This Chapter Configuring SQL Server Reporting Services with Reporting Services Configuration Manager Designing reports Publishing
More information20411D D Enayat Meer
Lab A Module 8: Implementing Direct Access by Using the Getting Started Wizard Scenario: Recommended lab time is 240 Minutes {a complete class session is dedicated for this lab} Many users at A. Datum
More informationWorkstation Configuration Guide
Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations
More informationInstallation Manual. Fleet Maintenance Software. Version 6.4
Fleet Maintenance Software Installation Manual Version 6.4 6 Terri Lane, Suite 700 Burlington, NJ 08016 (609) 747-8800 Fax (609) 747-8801 Dossier@dossiersystemsinc.com www.dossiersystemsinc.com Copyright
More informationMicrosoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide
Microsoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide Army Information Assurance CAC/PKI Division 2530 Crystal Drive Arlington,
More informationWhatsUp Gold 2016 Installation and Configuration Guide
WhatsUp Gold 2016 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup 1 Installation Overview 1 Overview 1 Security considerations 2 Standard WhatsUp
More informationAzure 209x Practical Exercises Overview
Azure 209x Practical Exercises Overview This course includes optional exercises where you can try out the techniques demonstrated in the course for yourself. This guide lists the steps for the individual
More informationToolkit Activity Installation and Registration
Toolkit Activity Installation and Registration Installing the Toolkit activity on the Workflow Server Install the Qfiche Toolkit workflow activity by running the appropriate SETUP.EXE and stepping through
More informationEkran System v.6.1 Deployment Guide
Ekran System v.6.1 Deployment Guide Table of Contents About... 6 System Requirements... 7 Program Structure... 10 Deployment Process... 12 Server and Database... 13 About... 13 Database Types Comparison...
More informationDeveloping Intelligent Apps
Developing Intelligent Apps Lab 1 Creating a Simple Client Application By Gerry O'Brien Overview In this lab you will construct a simple client application that will call an Azure ML web service that you
More informationSecurexam Mac User Guide
Securexam Mac User Guide Unlike previous versions, Securexam for Mac now functions much like the PC version where it integrates with PlanetSSI to retrieve a user s exams and licenses via the web and upon
More informationSage Pastel Accounting
Sage Pastel Accounting Status 94 Pervasive Error Code 94 Status 94 also known as Pervasive Error Code 94 is a permissions error and usually caused by incorrectly configured or blocked settings on either
More informationPractice Labs User Guide
Practice Labs User Guide This page is intentionally blank Contents Introduction... 3 Overview... 3 Accessing Practice Labs... 3 The Practice Labs Interface... 4 Minimum Browser Requirements... 5 The Content
More informationStarWind Native SAN Configuring HA File Server for SMB NAS
Hardware-less VM Storage StarWind Native SAN Configuring HA File Server for SMB NAS DATE: FEBRUARY 2012 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind Software
More informationVMware AirWatch Certificate Authentication for EAS with ADCS
VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationInserting Information into PowerPoint
LESSON 6 6.1 Inserting Information into PowerPoint After completing this lesson, you will be able to: Change the layout of a slide. Insert a clip art image. Scale an image. Insert and format a table. Insert
More informationManaging Applications, Services, Folders, and Libraries
4 LESSON Managing Applications, Services, Folders, and Libraries EXAM OBJECTIVE MATRIX SKILLS/CONCEPTS EXAM OBJECTIVE DESCRIPTION EXAM OBJECTIVE NUMBER Installing and Managing Applications Understand application
More informationWorkstation Configuration
Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationWebConnect Through the Internet
WebConnect Through the Internet WebConnect Table of Contents i Chapter 1. Table of Contents Page INTRODUCTION...1 Chapter 2. ACCESSING DataLink SM...2 Chapter 3. FEATURES OF WebConnect...10 File Menu Options...10
More informationQuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23
QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23 This guide provides a procedure for initially configuring your Internet Explorer (IE) browser to use Flash Chat. Note: If you
More informationWorkstation Configuration
Workstation Configuration December 12, 2017 - Version 9.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationLibraries. Multi-Touch. Aero Peek. Sema Foundation 10 Classes 2 nd Exam Review ICT Department 5/22/ Lesson - 15
10 Classes 2 nd Exam Review Lesson - 15 Introduction Windows 7, previous version of the latest version (Windows 8.1) of Microsoft Windows, was produced for use on personal computers, including home and
More informationAspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1
Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...
More informationWavecrest Certificate SHA-512
Wavecrest InstallationGuide Wavecrest Certificate SHA-512 www.wavecrest.net Copyright Copyright 1996-2018, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject
More informationWindows 7 Professional 64 bit Configuration for MassLynx Security
Windows 7 Professional 64 bit Configuration for MassLynx Security 1. Purpose This document outlines the procedure to configure Microsoft Windows 7 Professional 64 bit operating system in order for installations
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationWindows Server 2003 Installation and Configuration Lab Manual Presented by
Windows Server 2003 Installation and Configuration Lab Manual Presented by Table of Contents Module 2 - Installing Windows Server 2003 R2 and Configuration 3 Module 3 - Installing Hardware, Devices and
More informationWindows Me Navigating
LAB PROCEDURE 11 Windows Me Navigating OBJECTIVES 1. Explore the Start menu. 2. Start an application. 3. Multi-task between applications. 4. Moving folders and files around. 5. Use Control Panel settings.
More informationCisco Unified Serviceability
Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified
More informationStarWind Virtual SAN Configuring HA Shared Storage for Scale-Out File Servers in Windows Server 2016
One Stop Virtualization Shop StarWind Virtual SAN Configuring HA Shared Storage for Scale-Out File Servers in Windows Server 2016 FEBRUARY 2018 TECHNICAL PAPER Trademarks StarWind, StarWind Software and
More informationDirect Certification FTP Setup Instructions
Direct Certification FTP Setup Instructions Rev. 13-000 FOOD & NUTRITION MANAGEMENT SYSTEMS This instruction sheet provides instructions for installing our Direct Certification Automated FTP software to
More informationIBM Aspera Connect User Guide 3.8.0
IBM Aspera Connect User Guide 3.8.0 Windows Revision: 255 Generated: 06/11/2018 12:25 Contents Introduction... 3 Setting Up Connect...3 Installation...3 Network Environment...4 Basic Configuration... 7
More informationConfiguration of Microsoft Live Communications Server for Partitioned Intradomain Federation
Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation Domain Verification for LCS Servers, page 1 Enable Port 5060 on LCS Server, page 1 Configure a LCS Static Route
More informationForms/Distribution Acrobat X Professional. Using the Forms Wizard
Forms/Distribution Acrobat X Professional Acrobat is becoming a standard tool for people and businesses to use in order to replicate forms and have them available electronically. If a form is converted
More informationWorkstation Configuration
Workstation Configuration September 22, 2015 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationStarWind Virtual SAN Configuring HA SMB File Server in Windows Server 2016
One Stop Virtualization Shop StarWind Virtual SAN Configuring HA SMB File Server in Windows Server 2016 APRIL 2018 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind
More informationWanos on Hyper-V. Complete Lab Setup Guide
Wanos on Hyper-V Complete Lab Setup Guide This guide explains how to deploy a complete Wanos lab on Hyper-V. The step-by-step guide includes steps to create Head Office and Branch Wanos VM instances on
More informationTable of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1.
WebView v1.0 Installation Guide Revision 3 7/29/2003 WebView v1.0 Installation GuG ide Revision 3 7/29/2003 u Introduction Table of Contents Section 1: DocSTAR WebView v1.0 Requirements & Installation
More informationBrowser Settings. Updated 4/30/ SSF
Browser Settings Updated 4/30/2014 - SSF Contents How to Locate the Online Banking URL... 3 Initial Steps for Browser Settings... 8 Internet Explorer... 9 Firefox... 13 Chrome... 18 Safari 6.0.5 and up...
More informationInstallation & Administration Guide
Installation & Administration Guide Valerus SmartAnalytics ver. 5.4 XX306-00-00 Vicon Industries Inc. does not warrant that the functions contained in this equipment will meet your requirements or that
More informationThe Windows GUI and Control Panel
The Windows GUI and Control Panel Windows Desktop, Tools, and Applications After the OS has been installed, you can customize the computer desktop to suit individual needs. A computer desktop is a graphical
More informationAX Enterprise
AX Enterprise Axxess Identification Ltd 27-28 Shrivenham Hundred Business Park, Watchfield, Swindon, Wiltshire SN6 8TZ United Kingdom Tel: +44 (0)1793 784002 Fax: +44 (0)1793 784005 Email: info@axxessid.com
More informationEkran System v.5.2 Deployment Guide
Ekran System v.5.2 Deployment Guide Table of Contents About... 6 System Requirements... 7 Program Structure... 9 Deployment Process... 10 Server and Database... 11 About... 11 Database Types Comparison...
More informationOverview of Cisco UCS Manager GUI
Overview of Cisco UCS Manager GUI This chapter includes the following sections: Overview of Cisco UCS Manager GUI, page 1 Logging in to Cisco UCS Manager GUI through HTTPS, page 6 Logging in to Cisco UCS
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More informationPERFORMING A CUSTOM INSTALLATION
PERFORMING A CUSTOM INSTALLATION OF OBSERVEIT ObserveIT Performing a Custom Installation of ObserveIT 1 of 46 TABLE OF CONTENTS TABLE OF CONTENTS... 2 OVERVIEW... 4 DOCUMENT VERSIONS... 4 PRODUCT VERSION...
More informationKNOXPLANS for New Users
KNOXPLANS for New Users Version 9.1, October 2018 Contents KNOXPLANS for New Users... 1 Welcome to KnoxPlans, Version 9.1... 2 Recommended Client Hardware and O/S Specifications... 2 Browser Requirements...
More informationKaspersky Security for Windows Server
Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you
More informationCHAPTER 4: RECORD LINKS
Chapter 4: Record Links CHAPTER 4: RECORD LINKS Objectives The objectives are: Use Microsoft Dynamics NAV as the bridge to the company document management system. Create a link from a Microsoft Dynamics
More informationVMware vsphere: What s New Lab Manual ESXi 5.5 and vcenter Server 5.5
VMware vsphere: What s New Lab Manual ESXi 5.5 and vcenter Server 5.5 VMware Education Services VMware, Inc. www.vmware.com/education VMware vsphere: What s New ESXi 5.5 and vcenter Server 5.5 Part Number
More informationILTA HAND 6A. Implementing and Using. Windows Server In the Legal Environment
ILTA 2013 - HAND 6A Implementing and Using Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Getting Familiar with Windows
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent
More informationOverview of Cisco UCS Manager GUI
Overview of Cisco UCS Manager GUI This chapter includes the following sections: Overview of Cisco UCS Manager GUI, page 1 Logging in to Cisco UCS Manager GUI through HTTPS, page 6 Logging in to Cisco UCS
More information2 Administering Microsoft Windows Server 2003
2 Administering Microsoft Windows Server 2003 Exam Objectives in this Chapter: Manage servers remotely Manage a server by using Remote Assistance Manage a server by using Terminal Services remote administration
More informationNiceForm User Guide. English Edition. Rev Euro Plus d.o.o. & Niceware International LLC All rights reserved.
www.nicelabel.com, info@nicelabel.com English Edition Rev-0910 2009 Euro Plus d.o.o. & Niceware International LLC All rights reserved. www.nicelabel.com Head Office Euro Plus d.o.o. Ulica Lojzeta Hrovata
More informationPrinting Specification Document for Explorer 8 browsers. Version
Printing Specification Document for Explorer 8 browsers Version 01.00.02 Document Change History Issue/Revision Date Author Description V 01.00.00 2009-04-23 Documentation department Creation V 01.00.01
More informationFactSet 2016 (Breithorn) Framework Rev 10
Table of Contents FactSet Troubleshooting Utility (FTU)... 3 How do I access the FactSet Troubleshooting Utility?... 4 CITRIX XENAPP WITH NO PUBLISHED INTERNET BROWSER... 4 FactSet Connectivity Issues...
More informationOptional Lab: Customize Settings in Windows Vista
12.2.4 Optional Lab: Customize Settings in Windows Vista Introduction Print and complete this lab. This lab is comprised of five parts. This lab is designed to be completed in multiple lab sessions. Part
More informationCOPYRIGHTED MATERIAL. Contents. Assessment Test
Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home
More informationWorkshop on Windows Server 2012
Workshop on Windows Server 2012 Topics covered on Workshop DHCP Scope Splitting. A Dynamic Host Configuration Protocol (DHCP) split-scope configuration using multiple DHCP servers allows for increased
More information