70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management
|
|
- Philomena Walters
- 6 years ago
- Views:
Transcription
1 70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management
2 Objectives Understand and configure file and folder attributes Understand and configure advanced file and folder attributes Implement and manage disk quotas Understand and implement the Distributed File System Guide to MCSE , Enhanced 2
3 File and Folder Attributes Used since MS-DOS operating system Attributes describe files, folders, and their characteristics Applicable utilities include graphical tools and the ATTRIB command Four standard file and folder attributes Read-only Archive System hidden Guide to MCSE , Enhanced 3
4 Read-only Designates that the contents of a file cannot be changed and file cannot be deleted Available in all file systems (FAT, FAT32, NTFS partitions and volumes) FAT, FAT32 attributes can be changed by any user NTFS attribute can only be changed by a user with appropriate permissions Can be configured for a file or folder For folders, attribute pertains to the files it contains, not the folder itself Guide to MCSE , Enhanced 4
5 Read-only (continued) Guide to MCSE , Enhanced 5
6 Archive Marks which files and folders have been recently changed or created Recently modified files are marked as ready for archiving Important for backup Backup methods update the status of the archive attribute Viewing the attribute is done using Windows Explorer or command-line utilities (e.g., DIR, ATTRIB) Guide to MCSE , Enhanced 6
7 System Originally designed to identify O.S. in MS-DOS In Windows Server 2003 Used in conjunction with hidden attribute When system and hidden both true, file or folder is super hidden (not displayed in Windows Explorer interface) Treated as protected operating system files with specific alternate display options Can only be manipulated using ATTRIB command Guide to MCSE , Enhanced 7
8 Hidden Used to make files and folders less visible to users from Windows Explorer and command-line Default configuration in Windows Server 2003 displays hidden files as semi-transparent icons unless in conjunction with system attribute Hidden attribute can be configured from General tab of Properties Guide to MCSE , Enhanced 8
9 Hidden (continued) Visibility can be configured from View tab of Folder Options from Tools in Windows Explorer Show hidden file and folders Hidden files and folders appear in Windows Explorer as semi-transparent icons Do not show hidden files and folders Files with set hidden attributes do not appear in Windows Explorer Hide protected operating system files All files with both hidden and system attributes set are hidden in Windows Explorer when set Guide to MCSE , Enhanced 9
10 Hidden (continued) Guide to MCSE , Enhanced 10
11 The ATTRIB Command A command-line utility used to view, add or remove the four attributes of files and folders Only way to configure system attribute Supports wildcards (*) allowing multiple files or folders to be changed simultaneously Syntax View: attrib filename Set: attrib +attribute filename Remove: attrib attribute filename Guide to MCSE , Enhanced 11
12 Advanced Attributes Advanced attributes found on NTFS partitions or volumes Archive and Index attributes File is ready for archiving Indexing service Compress or Encrypt Compress contents to save disk space Encrypt contents to secure data Guide to MCSE , Enhanced 12
13 Advanced Attributes (continued) Guide to MCSE , Enhanced 13
14 File Compression Reduces amount of disk space needed for files and folders Automatically uncompressed when the resource is accessed Compressed resources displayed in different color in Windows Explorer (blue by default) Moving and copying resources can affect compression Guide to MCSE , Enhanced 14
15 Activity 7-3: (continued) Guide to MCSE , Enhanced 15
16 COMPACT Used with NTFS file system only Command-line utility for configuring the compression attribute Syntax COMPACT (to view) COMPACT switches resourcename (to set attributes) Switches /c (to compress resources) /u (to uncompress resources) Guide to MCSE , Enhanced 16
17 File Encryption Encrypting File System (EFS) uses public key cryptography to encrypt files and folders Only on NTFS file systems Transparent to user Implemented using 2 main types of keys File encryption key (FEK) Session key added to header of encrypted data (data decryption field) Public key encrypts DDF Guide to MCSE , Enhanced 17
18 File Encryption (continued) Main challenge for public key cryptography is when users leave organization Can rename user account Can use data recovery agent FEK also stored in data recovery field (DRF) Encrypted using data recovery agent s public key Default is administrator, additional recovery agents can be designated Moving or copying files can affect encryption Encrypted files cannot be compressed, vice versa Guide to MCSE , Enhanced 18
19 Sharing Encrypted Files In Windows 2000, only user and data recovery agent could access an encrypted file In Windows Server 2003, Advanced Attributes allows sharing with other specific named users Issues: Only for files, not folders Can only share with users, not groups Users must have a certificate on computer Users must have appropriate NTFS permissions Guide to MCSE , Enhanced 19
20 Sharing Encrypted Files (continued) Guide to MCSE , Enhanced 20
21 The CIPHER Command Command-line utility for file and folder encryption Used by administrator NTFS partitions and volumes only Syntax CIPHER (to view) CIPHER switches resourcename (to set attributes) Guide to MCSE , Enhanced 21
22 The CIPHER Command (continued) Guide to MCSE , Enhanced 22
23 Switches The CIPHER Command /e (to encrypt a folder) /d (to decrypt a folder) (continued) /a (to apply other switches to a file rather than a folder) Cannot encrypt files which have their read-only attribute set Can use the wildcard character (*) Guide to MCSE , Enhanced 23
24 Disk Quotas Disk quotas used to monitor and control user disk space Advantages Prevents users from consuming all disk space Encourages users to delete old files Allows monitoring for planning purposes Allows monitoring of individual users Disabled by default Implemented only on NTFS volumes Configured from Properties of a volume Guide to MCSE , Enhanced 24
25 Disk Quotas (continued) Guide to MCSE , Enhanced 25
26 Disk Quotas (continued) Guide to MCSE , Enhanced 26
27 Disk Quotas (continued) Guide to MCSE , Enhanced 27
28 Managing Disk Quotas from the Command Line FSUTIL QUOTA command-line utility can be used to manage disk quotas Can enable/disable, modify, display, track, report Example (to enable disk quotas on drive E) fsutil quota enforce e: Events written to System log (displayed in Event Viewer) every hour by default fsutil behavior command can change the interval Help available for fsutil quota and fsutil behavior commands in Help and Support Center Guide to MCSE , Enhanced 28
29 Managing Disk Quotas from the Command Line (continued) Guide to MCSE , Enhanced 29
30 Distributed File System Makes it appear that multiple shared-file resources are stored in a single hierarchical structure Users do not have to know which server a shared folder resides on Configured using the Distributed File System console in Administrative Tools menu Tree structure (root and DFS links) Guide to MCSE , Enhanced 30
31 Distributed File System (continued) Guide to MCSE , Enhanced 31
32 DFS Models Two models: Standalone DFS model (more limited capabilities) Domain-based DFS model Guide to MCSE , Enhanced 32
33 DFS Models (continued) Hierarchical structure is called DFS topology or logical structure, three elements to structure The DFS root Main container on host server The DFS links Pointers to physical location of shared folders Servers on which the DFS shared folders are replicated as replica sets Replica set is set of shared folders that is replicated across multiple servers Guide to MCSE , Enhanced 33
34 Managing DFS Tasks involved in managing DFS system Deleting a DFS root Removing a DFS link Adding root and link replica sets Checking the status of a root or link Replication capability provides fault tolerance and load balancing DFS replication options and topologies managed from Configure Replication wizard Guide to MCSE , Enhanced 34
35 Managing DFS (continued) DFS element status is indicated with colored icons Guide to MCSE , Enhanced 35
36 Summary File and folder attributes are: Read-only (can a resource be modified or deleted) Archive (has a resource recently been changed) System (does resource have specific display requirements, especially in conjunction with Hidden) Hidden (should the resource appear normally in Windows Explorer) File and folder attributes can be set through graphical tools or the ATTRIB command-line utility Guide to MCSE , Enhanced 36
37 Summary (continued) Advanced attributes on NTFS partitions or volumes include: Archiving (specifies whether to back up file) Indexing (makes resource searchable) Compression (saves disk space) Encryption (makes resources accessible only to those holding keys) Command-line utilities for advanced attributes include: COMPACT CIPHER Guide to MCSE , Enhanced 37
38 Summary (continued) Disk quotas allow management of disk space usage by individual users Managed from the Properties of a volume or using the FSUTIL command-line utility Distributed File System allows management of shared-file resources Appear as a single hierarchical structure Can be physically located on different servers 2 DFS models: standalone and domain-based Guide to MCSE , Enhanced 38
Configure Distributed File System (DFS)
Configuring Distributed File System (DFS) LESSON 4 70-411 EXAM OBJECTIVE Objective 2.1 Configure Distributed File System (DFS). This objective may include but is not limited to: install and configure DFS
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
COURSE OVERVIEW This course combines five days of instructor-led training with additional e-learning content to provide students with the knowledge and skills that are required to manage accounts and resources,
More informationWindows Server 2003 Network Administration Goals
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management
More informationFile systems security: Shared folders & NTFS permissions, EFS Disk Quotas
File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (March 23, 2016) Abdou Illia, Spring 2016 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS
More informationConfiguring File Server Resource Manager (FSRM)
Configuring File Server Resource Manager (FSRM) LESSON 5 70-411 EXAM OBJECTIVE Objective 2.2 Configure File Server Resource Manager (FSRM). This objective may include but is not limited to: install the
More informationFrequently asked questions from the previous class survey
CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [FILE SYSTEMS] Shrideep Pallickara Computer Science Colorado State University L27.1 Frequently asked questions from the previous class survey How many choices
More informationVeeam Endpoint Backup
Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationHELP Use the help command to list all the following supported commands:
Available commands within Windows Recovery Console The following commands are available within the Windows Recovery Console. The commands are not case-sensitive. HELP Use the help command to list all the
More informationChapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER
Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression
More informationAcronis Backup & Recovery 11 Beta Advanced Editions
Acronis Backup & Recovery 11 Beta Advanced Editions Quick Start Guide Table of contents 1 Main components... 3 2 Supported operating systems... 3 3 Where do I install the components?... 3 4 What you need
More informationIT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems
IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.
More informationUnit III: Working with Windows and Applications. Chapters 5, 7, & 8
Unit III: Working with Windows and Applications Chapters 5, 7, & 8 Learning Objectives In this unit, you will: Launch programs and navigate the Windows task bar. Perform common windows functions. Customize
More informationCOPYRIGHTED MATERIAL. Contents. Assessment Test
Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home
More informationMOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
MOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Course Overview This 5 day course instills students with the knowledge and skills to configure and troubleshoot Windows
More informationA+ Guide to Managing and Maintaining Your PC. Managing and Supporting Windows XP
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 16 Managing and Supporting Windows XP Security Using Windows NT/ 2000/XP Goals Secure system resources including hardware and software
More informationCDP Data Center Console User Guide CDP Data Center Console User Guide Version
CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you
More informationVeeam Endpoint Backup
Veeam Endpoint Backup Version 1.1 User Guide December, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationForensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation
Forensics Challenges Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation Introduction Encrypted content is a challenge for investigators Makes it difficult
More informationmakes floppy bootable o next comes root directory file information ATTRIB command used to modify name
File Systems File system o Designed for storing and managing files on disk media o Build logical system on top of physical disk organization Tasks o Partition and format disks to store and retrieve information
More informationms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm
Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the
More informationCSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 8: File Systems Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Objectives Investigative Process Analysis Framework File Systems FAT NTFS EXT2/EXT3 last
More informationThis guide describes how to use the Dfs Share Creation wizard.
Step-by-Step Guide to Distributed File System (Dfs) Because shared files are widely distributed across networks, administrators face growing problems as they try to keep users connected to the data they
More informationIBM Spectrum Protect HSM for Windows Version Administration Guide IBM
IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product
More informationWhat does a file system do?
System files What does a file system do? A file system is a method for storing and organizing computer files and the data they contain to make it easy to find and access them. File systems exist on hard
More informationWindows 2000 Disk Management
LAB PROCEDURE 25 Windows 2000 Disk Management OBJECTIVES 1. Use Disk Cleanup. 2. Backup a file. 3. Restore a backup. 4. Compress a file. 5. Encrypt a file. Troubleshooting RESOURCES 1. Marcraft 8000 Trainer
More informationWindows Server 2008 Administration
Hands-On Course Description This course provides hands on experience installing and configuring Windows Server 2008 to work with clients including Windows Vista. Students will perform full and core CD-based
More informationCOMP091 Operating Systems 1. File Systems
COMP091 Operating Systems 1 File Systems Media File systems organize the storage space on persistent media such as disk, tape, CD/DVD/BD, USB etc. Disk, USB drives, and virtual drives are referred to as
More informationEMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version
EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version Installation and Administration Guide P/N 300-007-130 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000
More informationLab - Create a Partition in Windows 8
Lab - Create a Partition in Windows 8 Introduction In this lab, you will create a FAT32 formatted partition on a disk. You will convert the partition to NTFS. You will then identify the differences between
More informationAdministration Guide - NetApp File Archiver
Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method
More informationAdministering. Windows Server 2012 R2. Exam Wiley. Patrick Regan
Administering Windows Server 2012 R2 Exam 70-411 Patrick Regan Wiley Contents j Lesson 1: Deploying and Managing Server Images 1 Using Windows Deployment Services 2 Installing the Windows Deployment Services
More informationNETWORK ADMINISTRATION USING MICROSOFT OBJECTIVE(42)
12 Pages Contestant Number Time Rank NETWORK ADMINISTRATION USING MICROSOFT OBJECTIVE(42) Regional 2011 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:
More informationManaging the Cisco APIC-EM and Applications
Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page
More informationServer Edition USER MANUAL. For Mac OS X
Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered
More informationAdvanced Security Measures for Clients and Servers
Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network
More informationNTFS Recoverability. CS 537 Lecture 17 NTFS internals. NTFS On-Disk Structure
NTFS Recoverability CS 537 Lecture 17 NTFS internals Michael Swift PC disk I/O in the old days: Speed was most important NTFS changes this view Reliability counts most: I/O operations that alter NTFS structure
More informationMCSA Windows Server 2012
MCSA Windows Server 2012 This course is developed for IT professionals who need to design, plan, implement, manage and support Microsoft Windows 2012 networks or who plan to take the related MCSE and MCSA
More informationMachine Language and System Programming
زبان ماشين وبرنامه نويسی سيستم Machine Language and System Programming جلسه دوازدھم دانشگاه صنعتی ھمدان پاييز 1389 Objectives Explain the purpose and structure of file systems Describe Microsoft file structures
More informationServer : Manage and Administer 3 1 x
Server : Manage and Administer 3 1 x Revised 2016/05/17 TestOut Server Pro: Manage and Administer English 3.1.x Videos: 56 (4:25:22) Demonstrations: 87 (10:14:13) Simulations: 63 Written Lessons: 72 Section
More informationAdvanced Operating Systems
Advanced Operating Systems File Systems: File Allocation Table, Linux File System, NTFS Lecture 10 Case Studies of File Systems File Allocation Table (FAT) Unix File System Berkeley Fast File System Linux
More informationDescription of the Windows XP Recovery Console for advanced users
Page 1 of 11 Article ID: 314058 - Last Review: September 22, 2008 - Revision: 5.4 Description of the Windows XP Recovery Console for advanced users System Tip This article applies to a different version
More informationServer Edition USER MANUAL. For Microsoft Windows
Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows
More informationNOTES ABOUT COMMANDS. ATTRIB.exe
ATTRIB.exe Display or change file attributes. Find Filenames. Syntax ATTRIB [ + attribute - attribute ] [pathname] [/S [/D]] Key + : Turn an attribute ON - : Clear an attribute OFF pathname : Drive and/or
More informationIT 05: Fundamental Operating Systems Online Study Questions
IT 05: Fundamental Operating Systems Online Study Questions CUR Question Answer 5.0 Introduction 1. What controls almost all functions on a computer? 5.1 Explain the purpose of an operating system 2. The
More informationSoftware Vulnerability Assessment & Secure Storage
Software Vulnerability Assessment & Secure Storage 1 Software Vulnerability Assessment Vulnerability assessment is the process of identifying flaws that reside in an OS, application software or devices
More informationExam : Implementing a Cloud Based Infrastructure
Exam 70-414: Implementing a Cloud Based Infrastructure Course Overview This course teaches students about creating the virtualization infrastructure, planning and deploying virtual machines, monitoring,
More informationServer Edition. V8 Peregrine User Manual. for Linux and Unix operating systems
Server Edition V8 Peregrine User Manual for Linux and Unix operating systems Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Red Hat is a registered trademark
More informationUsing Attix5 Pro with EFS
Using Attix5 Pro with EFS Windows has a built-in Encrypting File System (EFS), which is a component of NTFS. It allows users to encrypt files on disk, so that only they, and users who they provide keys
More informationvsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationIntroduction to the ICA OS/2 Client
C H A P T E R 2 Introduction to the ICA OS/2 Client Overview The ICA OS/2 Client lets you access a Citrix WinFrame or MetaFrame server from a client running IBM OS/2 Warp. When connected to a Citrix server,
More informationApple Exam 9L0-412 OS X Support Essentials 10.8 Exam Version: 6.3 [ Total Questions: 86 ]
s@lm@n Apple Exam 9L0-412 OS X Support Essentials 10.8 Exam Version: 6.3 [ Total Questions: 86 ] Question No : 1 You are logged into a MacBook Pro as a standard user. How can you display the OS X Mountain
More informationDesktop & Laptop Edition
Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion
More informationCOMPARATIVE STUDY OF TWO MODERN FILE SYSTEMS: NTFS AND HFS+
COMPARATIVE STUDY OF TWO MODERN FILE SYSTEMS: NTFS AND HFS+ Viral H. Panchal 1, Brijal Panchal 2, Heta K. Desai 3 Asst. professor, Computer Engg., S.N.P.I.T&RC, Umrakh, Gujarat, India 1 Student, Science
More informationContents. Notes Mail Link Page 1
Contents Contents... 1 About Notes Mail Link 6... 2 System requirements... 2 Installing Notes Mail Link - Overview... 3 Install Notes Mail Link... 3 Upgrade to newer version of Notes Mail Link... 3 New
More informationManaging File and Folder Attributes
Chapter 11 Sharing, Securing, and Accessing Files and Folders 731 Managing File and Folder Attributes Windows 2000 files and folders have various properties, called attributes, some of which the administrator
More informationNetwork+ Guide to Networks, Fourth Edition. Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking
Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking Objectives Discuss the functions and features of a network operating system Define
More informationBackup and Restore. About Backup and Restore
About, page 1 Back Up DNA Center, page 2 Restore DNA Center, page 4 Schedule a Backup, page 5 About The backup and restore procedures for DNA Center can be used for the following purposes: To create backup
More informationApptix Online Backup by Mozy User Guide
Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing
More informationMU2b Authentication, Authorization and Accounting Questions Set 2
MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2
More informationChapter 1: Windows Platform and Architecture. You will learn:
Chapter 1: Windows Platform and Architecture Windows 2000 product family. New features/facilities of. Windows architecture. Changes to the kernel and kernel architecture. New features/facilities. Kernel
More information5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP
5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP Introduction Print and complete this lab. In this lab, you will use administrative tools to monitor system resources. You will also
More informationLab B: Configuring Disk Compression and Quotas
Module 6: Managing Data by Using NTFS 33 Lab B: Configuring Disk Compression and Quotas Topic Objective To introduce the lab. Lead-in In this lab, you will configure disk compression and quotas. *****************************ILLEGAL
More informationMicrosoft Certified System Engineer
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Microsoft Certified System Engineer Program Summary This instructor-led program with a combination
More informationCox Business Online Backup Administrator Guide. Version 2.0
Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,
More informationWAFS/CDP v User Guide
WAFS/CDP v3.5.2 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical Support: (210)
More informationFile System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders
13 August 2002 File System Section Seven NTFS, EFS, Partitioning, and Navigating Folders NTFS DEFINITION New Technologies File System or NTFS was first applied in Windows NT 3.0 back in 1992. This technology
More informationUser Guide. Version R95. English
Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationWindows 2000 System Administration Handbook, 1/e
Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5
More informationInternal Commands COPY and TYPE
Internal Commands COPY and TYPE Ch 5 1 Overview Will review file-naming rules. Ch 5 2 Overview Will learn some internal commands that can be used to manage and manipulate files. Ch 5 3 Overview The value
More informationServer Edition. V8 Peregrine User Manual. for Microsoft Windows
Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft
More informationvsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationR5: Configuring Windows Server 2008 R2 Network Infrastructure
70-642 R5: Configuring Windows Server 2008 R2 Network Infrastructure Course Introduction Course Introduction Chapter 01 - Understanding and Configuring IP Lesson 1: Introducing the OSI Model Understanding
More informationMCSA Windows 10. A Success Guide to Prepare- Microsoft Configuring Windows Devices. edusum.com
70-697 MCSA Windows 10 A Success Guide to Prepare- Microsoft Configuring Windows Devices edusum.com Table of Contents Introduction to 70-697 Exam on Microsoft Configuring Windows Devices... 2 Microsoft
More informationDOS. 5/1/2006 Computer System Software CS 012 BE 7th Semester 2
DOS File System DOS The moment we turn the computer on, the computer loads a special program called the operating system into the computer s memory which provides an environment for us to run other programs.
More informationAcronis Disk Director 11 Home. Quick Start Guide
Acronis Disk Director 11 Home Quick Start Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone",
More informationCISNTWK-11. Microsoft Network Server. Chapter 5 Introduction Permissions i and Shares
CISNTWK-11 Microsoft Network Server Chapter 5 Introduction Permissions i and Shares 1 In a Nutshell Payroll Data? Payroll Data? Introduction A permission is a rule associated with an object, such as a
More information3 INSTALLING WINDOWS XP PROFESSIONAL
INSTALLING WINDOWS XP PROFESSIONAL.1 Preparing for installation Objectives.1.1 Windows XP Professional Hardware Requirements.1.2 Hardware Compatibility List (HCL) check.1. Hard Disk Partition.1.4 Required
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationManaging DFS Replication: Directories & Replicated Files
Managing DFS Replication: Directories & Replicated Files Instructions on how to setup, remove and manage directories within DFSR. Author: John Wieda, MCTS: SCOM, SCCM, SCVMM SystemCenterSpartan.wordpress.com
More informationFile Systems. What do we need to know?
File Systems Chapter 4 1 What do we need to know? How are files viewed on different OS s? What is a file system from the programmer s viewpoint? You mostly know this, but we ll review the main points.
More informationUser Guide. Version 2.1
Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT
More informationCaja File Manager. Desktop User Guide
Caja File Manager Desktop User Guide Desktop User Guide» Working with Files This chapter describes how to use the Caja file manager. Introduction Spatial Mode Browser Mode Opening Files Searching For Files
More informationThe safer, easier way to help you pass any IT exams. Exam : Designing Database Solutions for Microsoft SQL Server 2012.
http://www.51- pass.com Exam : 70-465 Title : Designing Database Solutions for Microsoft SQL Server 2012 Version : DEMO 1 / 4 1.Topic 1, Litware, Inc Overview You are a database administrator for a company
More informationFile Management. Ezio Bartocci.
File Management Ezio Bartocci ezio.bartocci@tuwien.ac.at Cyber-Physical Systems Group Institute for Computer Engineering Faculty of Informatics, TU Wien Motivation A process can only contain a limited
More informationAdministration Guide - Celerra File Archiver
Page 1 of 104 Administration Guide - Celerra File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method
More informationCourse Content of MCSA ( Microsoft Certified Solutions Associate )
Course Content of MCSA 2012 - ( Microsoft Certified Solutions Associate ) Total Duration of MCSA : 45 Days Exam 70-410 - Installing and Configuring Windows Server 2012 (Course 20410A Duration : 40 hrs
More informationWebsitePanel User Guide
WebsitePanel User Guide User role in WebsitePanel is the last security level in roles hierarchy. Users are created by reseller and they are consumers of hosting services. Users are able to create and manage
More informationExam: Title : Windows 2000 Pro. Ver :
Exam: 070-210 Title : Windows 2000 Pro Ver : 01.26.04 QUESTION 1 You purchase a USB board, ISDN terminal adapter for your Windows 2000 Professional portable computer. You plug the device into the USB port.
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationHP Data Protector 9.0 Deduplication
Technical white paper HP Data Protector 9.0 Deduplication Introducing Backup to Disk devices and deduplication Table of contents Summary 3 Overview 3 When to use deduplication 4 Advantages of B2D devices
More informationChapter 3 `How a Storage Policy Works
Chapter 3 `How a Storage Policy Works 32 - How a Storage Policy Works A Storage Policy defines the lifecycle management rules for all protected data. In its most basic form, a storage policy can be thought
More informationIndex. Mike Halsey and Andrew Bettany 2015 M. Halsey and A. Bettany, Windows File System Troubleshooting, DOI /
Index A Access control list (ACL), 128 129 Access-based enumeration (ABE), 66 67 Administrative and hidden shares built-in shares, 67 68 default (built-in) administrative, 68 69 public shared folders,
More informationVeritas NetBackup for Microsoft Exchange Server Administrator s Guide
Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup
More informationTime Matters. Time Matters v10 Endorsement Training Enhancements
Time Matters Time Matters v10 Endorsement Training Enhancements Enhancements Database Powered by SQL Backup functionality Time Matters Desktop Extensions Activity Power Views Merge Template Folders Enhanced
More informationWhat is software? Functional view. Functional view. System requirements of a software. Versions Free version: This is the free version
What is software? Session 04 Introduction to Software set of instructions that is written by human which runs on computer in order to do a useful task or tasks Types System Software Application Software
More informationSession 04 Introduction to Software
Session 04 Introduction to Software What is software? set of instructions that is written by human which runs on computer in order to do a useful task or tasks Types System Software Application Software
More informationCourse Outline. MCSA Configuring Windows 10 Devices (Course & Lab) ( Add-On ) MCSA Configuring Windows 10 Devices (Course & Lab)
Course Outline MCSA Configuring Windows 10 Devices (Course & Lab) 15 May 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions
More informationCityVault Client Manual
CityVault Client Manual Contents Preface: Preface...4 Chapter 1: Overview...5 Chapter 2: Installing CityVault...6 Downloading the CityVault Client...6 Installing the CityVault Client...6 Configuring CityVault...8
More informationEnterprise Server Edition
Enterprise Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft
More informationMCSA Windows 10 Lab (70697 Lab) Course Outline. 24 Nov
Course Outline MCSA Windows 10 Lab (70697 Lab) 24 Nov 2018 Contents 1. Course Objective 2. Expert Instructor-Led Training 3. ADA Compliant & JAWS Compatible Platform 4. State of the Art Educator Tools
More information