Managing & Supporting Windows XP

Size: px
Start display at page:

Download "Managing & Supporting Windows XP"

Transcription

1 UI 9 Managing & Supporting Windows X

2 Definitions User - individual granted access to the system roups - logical collection of users Accounts - ogical construct containing all information that defines a user to the windows environment Resources - All equipment attached to the workstation or network

3 Definitions ome Directories - dedicated locations on a file server for a specific user to store files olicy - a set of configurations that allows an administrator to restrict a user s access and rights rofile - file containing a user s environmental settings and preferences can be local, mandatory or roaming

4 User/roup ame Rules he name must be unique to the machine for local accounts (or unique to the domain in the case of domain accounts). he username cannot be the same as a group name he name may be up to 0 characters, upper or lowercase or a combination of both.

5 User/roup ame Rules o avoid confusion with special syntax characters, names may not include any of the following: " / \ [ ] : ; =, + *? < > he name may include spaces and periods, but may not consist entirely of spaces or periods. : ames including spaces have to be enclosed in quotes for both scripting or command-line use. Better to avoid using spaces.

6 Users ach user must have an account to access a computer running the windows operating system User properties roups associated with the user rofile path ogin script ome directory

7 asswords Account asswords ase sensitive an be up to characters ptional (but required by default) omplexity rules enforced by default ocal accounts live in the %systemroot%:\winnt\system3\config directory in the SAM file

8 assword omplexity reate passphrases pneumonic for a phrase Use uppercase, lowercase, and non alphanumeric characters an enforce password complexity with roup olicy

9 User Account ptions User Must hange assword at ext ogon - Forces a user to change their password the next time they log on and afterward the box will be unchecked. User annot hange assword - If checked, prevents the user from changing the account s password.

10 User Account ptions assword ever xpires - If checked, the user account ignores the password expiration policy, and the password for the account never expires Account Is Disabled - If checked, the account is disabled and no one can log on to it until it is enabled (it is not, however, removed from the database).

11 AUIAI ocal Machine Authentication rocess Security Accounts Manager (SAM) Resources Access oken User identification roup memberships User rights assigned

12 ADMIISRAR Full control of computer, domain or forest depending on the context Used to establish administrative structure and create other accounts Should be renamed Should be secured with a complex password an be disabled, but cannot be deleted Should not be used for every day user tasks

13 US AU Designed to allow temporary access to the network Disabled by default, but cannot be deleted Should be secured with a complex password if enabled

14 ollections of user accounts Simplify access to resources an be used for security and messaging (Active Directory) RUS Resources Users Access oken ermissions and/or Resource As ocal roups

15 ontrol anel User Accounts

16 ontrol anel User Manager

17 omputer Management

18 Recommend Best ractices ive administrators a limited account for non administrative use imit the number of users in the Administrators group Rename or disable the Administrator account Rename and leave the uest account disabled bserve the principle of least privilege

19 User Rights

20 assword olicy

21 Account ockout

22 Disk Quotas ou can setup disk quota on a partition or volume to monitor or limit disk space taken by users Any space used by a user will be charged against his/her quota If a file is compressed the uncompressed size will be charged When you enable disk quota you can set the quota default size (all users) Members of the administrator group are exempt from the quota limits ou can configure Windows to generate a system event when users exceed the warning or the quota limits

23 Disk Quotas

24 File ncryption Users can encrypt their files and folders giving them another layer of security Files are encrypted and decrypted on the fly When you encrypt files and folders, other users can see the list but can not open them When a user encrypts a file, only the user and the recovery agent can access it ou can use the cipher command to have a greater degree of functionality

25 ocking the omputer ress the windows key + l to lock the workstation

26 Windows Firewall

27 omponents hat Use the Registry User rofiles Windows Kernel (SKR ) Registry ditor [K_A_MAI on ocal Machine] Registry dit ree View Security ptions Window elp K_A_MAI ardware SAM Security Software System Registry ardware rofiles Device Drivers ardware Data Setup rograms

28 Registry ierarchical database containing windows system configuration information Supports remote administration hanges to the registry can be made from: ontrol anel Setup programs Administrative tools Registry editor Booting process an contain ext (including complete files) Binary data xecutable code

29 Set up into five subtrees called IVS A ive is a binary file that contains all of the keys and values within a branch of the registry ach hive has two files associated with it (hive-name, hivename.log) Registry

30 Registry ives K_URR_USR - contains all configuration information for the specific user or users currently logged on to the computer K_USRS - contains all configuration information for all users who have ever logged on to the computer K_ASSS_R - contains and file association information

31 Registry ives K_URR_FI - contains additional information about the current system configuration K_A_MAI - contains the configuration information on the local machine for ARDWAR SAM SURI SFWAR SSM

32 Registry Data ypes Reg_Binary - binary data stored as hex pairs representing byte values (x digits gives a range of 0-55 per byte0 Reg_Dword - stored as 4 bit number (word) for a range of 0-4B, the 3-bit address range Reg_sz - string value Reg_multi_sz - multiple string appears as a list Reg_expand_sz - expandable string %system Root%

33 Registry ontrol Sets urrent - successful boot Default - to be used the next time the computer reboots Failed - failed control sets astknownood - last control to produce a successful logon before the current logon

34 Registry Backup Backups should be made before making registry changes Use regback.exe found in the /000/X resource kit xport the entire registry or individual keys as text files

35 System Information ools

36 ustom MM onsole

37 3 4 Windows Boot Sequence re - Boot Sequence ower on self test (S) oads Master boot record (MBR), points to to DR Boot sector from active partition is is loaded into memory oads DR Boot Sequence DR changes microprocessor from real mode (8-bit) to to the 3-bit flat memory model needed to to address 4 B of of RAM oads a mini file system to to read the hard drives (FA or or FS as needed) rocesses the Boot.ini file oads the selected operating system AS KW D option is is available at at this point -this option points to to either ontrol Set or or in in the Registry Runs D.M oad and initialize Windows 000

38 Windows Boot Sequence (continued) oad Sequence oads SKR oads A (ardware Abstract ayer) oads the System ive Initializes the kernel aints the screen blue hanges the screen font oads device drivers - a series of of dots runs across the screen oad Sequence Starts the device drivers - DS & windows configuration and session manager to to read the the entries that are stored in in the registry key oads the WI3 Subsystem Starts WI ogon Verifies that the Windows services are started Starts the ogon rocess

39 Mandatory Startup Files DR bootstrap code D.M performs a complete hardware inventory B.II contains path to operating system kernel and other startup options SKR.X operating system executable A.D hardware abstraction layer

40 roubleshooting ools ast Known ood Safe Mode System Restore allows restoration of a previous configuration but must be able to boot Recovery onsole Automated Recovery System set of disks to restore the system partition to the state at the time the disks were created Reinstall the operating system X startup Disk create a dos boot disk with recovery tools

Windows NT/2000/XP Troubleshooting

Windows NT/2000/XP Troubleshooting UI Windows /000/X roubleshooting DW roubleshooting Strategy Identify the problem Diagnose the problem ropose a solution Implement the solution Verify the problem is solved Document the entire process DW

More information

Updating The Operating System & User Accounts

Updating The Operating System & User Accounts U Updating he perating ystem & User Accounts P PAG YM UPA Update A minor revision to a software product, usually intended to address specific performance issues rather than add new features Upgrade A major

More information

Introduction to Active Directory

Introduction to Active Directory UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is

More information

C UNIT 4. Active Directory User Accounts

C UNIT 4. Active Directory User Accounts UN 4 Active irectory User Accounts 2005-2010 efinitions User individual granted access to the system with the following User properties Groups associated with the user Profile path Login script Home directory

More information

E T UNIT 10 P C T E C H O N O L O G Y. Troubleshooting DPW

E T UNIT 10 P C T E C H O N O L O G Y. Troubleshooting DPW UI 0 roubleshooting DW roubleshooting ools Basic computer repair kit round strap aperclip Bootable floppy, flash drive or D with troubleshooting utilities perating system installation disk DW Basic roubleshooting

More information

The Microsoft Windows. User Interface

The Microsoft Windows. User Interface U 7 he icrosoft Windows User nterface he Desktop nterface Desktop tart button askbar otification and system ray area Desktop Components tart button Contains access menus to applications, data folders,

More information

Chapter 1: Windows Platform and Architecture. You will learn:

Chapter 1: Windows Platform and Architecture. You will learn: Chapter 1: Windows Platform and Architecture Windows 2000 product family. New features/facilities of. Windows architecture. Changes to the kernel and kernel architecture. New features/facilities. Kernel

More information

A+ Guide to Managing and Maintaining Your PC. Managing and Supporting Windows XP

A+ Guide to Managing and Maintaining Your PC. Managing and Supporting Windows XP A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 16 Managing and Supporting Windows XP Security Using Windows NT/ 2000/XP Goals Secure system resources including hardware and software

More information

COPYRIGHTED MATERIAL. Contents. Assessment Test

COPYRIGHTED MATERIAL. Contents. Assessment Test Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home

More information

Lesson 2: Editing the Registry

Lesson 2: Editing the Registry Lesson 2: Editing the Registry Lesson 2 Editing the Registry 4-15 Windows XP Professional stores hardware and software settings centrally in a hierarchical database called the Registry, which replaces

More information

Full file at Chapter 2: Securing and Troubleshooting Windows Vista

Full file at   Chapter 2: Securing and Troubleshooting Windows Vista Chapter 2: Securing and Troubleshooting Windows Vista TRUE/FALSE 1. An elevated command prompt can only be attained by an administrator after he or she has responded to a UAC box. T PTS: 1 REF: 70 2. There

More information

Legal Notices. AccessData Corp.

Legal Notices. AccessData Corp. Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability

More information

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced. Chapter 7: Advanced File System Management 70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management Objectives Understand and configure file and folder attributes Understand

More information

Symantec Encryption (PGP) Installation Guide

Symantec Encryption (PGP) Installation Guide System Requirements Symantec Encryption (PGP) Installation Guide Windows 8 (32 and 64 bit versions) Windows 7 (32 and 64 bit versions)] Windows Vista (32- and 64-bit editions) Additional Requirements Boot

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment COURSE OVERVIEW This course combines five days of instructor-led training with additional e-learning content to provide students with the knowledge and skills that are required to manage accounts and resources,

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

Product Administration Guide

Product Administration Guide Product Dependable MSI and Application Virtualization Packaging, Workflow, and Package Editing IT Asset Management Tools for the Cloud Era www.scalable.com Page 4 Page 14 Page 43 Table of Contents Product

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Exam Questions

Exam Questions Exam Questions 70-685 Pro: Windows 7, Enterprise Desktop Support Technician https://www.2passeasy.com/dumps/70-685/ 1.Portable computer users report that they can use Internet Explorer to browse Internet

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY

More information

Copyright Notice David A. Solomon and Mark Russinovich

Copyright Notice David A. Solomon and Mark Russinovich Unit OS11: Performance Evaluation 11.3. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Copyright Notice 2000-2005 David A. Solomon and Mark Russinovich

More information

Preparing for and Dealing With Windows NT Start-up Problems

Preparing for and Dealing With Windows NT Start-up Problems Preparing for and Dealing With Windows NT Start-up Problems Agilent ChemStation Products "Success depends on preparation." Read this document now; schedule regular backups and perform disk maintenance

More information

Deploying Lightspeed User Agent v

Deploying Lightspeed User Agent v Deploying Lightspeed User Agent v2.01.14 The LS User Agent can be deployed via most application deployment utilities. This guide will focus on Group Policy Software installation policies. Please read over

More information

INSTALL VERITAS BACKUP EXEC v ON WINDOWS SERVER 2019 DOMAIN CONTROLLER

INSTALL VERITAS BACKUP EXEC v ON WINDOWS SERVER 2019 DOMAIN CONTROLLER INSTALL VERITAS BACKUP EXEC v20.3.1188 ON WINDOWS SERVER 2019 DOMAIN CONTROLLER First download trial copy from Veritas site or from this link https://www.teamos-hkrg.com/index.php?threads/symantec-veritas-backup-exec-20-2-1188-1650-

More information

2272 : Implementing and Supporting Microsoft Windows XP Professional

2272 : Implementing and Supporting Microsoft Windows XP Professional 2272 : Implementing and Supporting Microsoft Windows XP Professional Introduction The purpose of this course is to address the implementation and desktop support needs of customers that are planning to

More information

Microsoft Windows Server Administration Fundamentals. Download Full Version :

Microsoft Windows Server Administration Fundamentals. Download Full Version : Microsoft 98-365 Windows Server Administration Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/98-365 installation from a master computer to the destination computers. The

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Chapter 2 INSTALLATION SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC.

Chapter 2 INSTALLATION SYS-ED/ COMPUTER EDUCATION TECHNIQUES, INC. hapter 2 INSTALLATION SYS-ED/ OMPUTER EDUATION TEHNIQUES, IN. Objectives: You will learn: Windows 2000 system requirements. Hardware and software compatibility issues. Upgrading versus performing a new

More information

INSTALL GUIDE BIOVIA INSIGHT 2016

INSTALL GUIDE BIOVIA INSIGHT 2016 INSTALL GUIDE BIOVIA INSIGHT 2016 Copyright Notice 2015 Dassault Systèmes. All rights reserved. 3DEXPERIENCE, the Compass icon and the 3DS logo, CATIA, SOLIDWORKS, ENOVIA, DELMIA, SIMULIA, GEOVIA, EXALEAD,

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

SolidWorks Enterprise PDM Installation Guide

SolidWorks Enterprise PDM Installation Guide SolidWorks Enterprise PDM Installation Guide Contents Legal Notices...vi 1 SolidWorks Enterprise PDM Installation Guide...7 2 Installation Overview...8 Required Installation Components...8 Optional Installation

More information

Windows 7, Configuring

Windows 7, Configuring Windows 7, Configuring Microsoft 70-680 Dumps Available Here at: /microsoft-exam/70-680-dumps.html Enrolling now you will get access to 493 questions in a unique set of 70-680 dumps Question 1 Your company

More information

MS Operating Systems and Networks

MS Operating Systems and Networks In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. 3. Send this assessment with the answers via: a. FAX to (212) 967-3498. Or b. Mail the answers

More information

C UNIT 7. Using Group Policy

C UNIT 7. Using Group Policy UN 7 Using Group Policy 2005-2010 opics for this Unit Group policy security settings Audit policies in Windows Server 2008 Folder redirection Managing software using Group Policy he software life cycle

More information

Configuring File Server Resource Manager (FSRM)

Configuring File Server Resource Manager (FSRM) Configuring File Server Resource Manager (FSRM) LESSON 5 70-411 EXAM OBJECTIVE Objective 2.2 Configure File Server Resource Manager (FSRM). This objective may include but is not limited to: install the

More information

Desktop Maintenance via the Registry

Desktop Maintenance via the Registry ch06.qxd 3/21/2000 9:42 AM Page 107 P A R T T W O Desktop Maintenance via the Registry In This Part CHAPTER 6 System and Startup Settings CHAPTER 7 Configuring Quality of Life Settings CHAPTER 8 Managing

More information

Veritas System Recovery 16 Readme

Veritas System Recovery 16 Readme Veritas System Recovery 16 Readme About this readme Getting help while using Veritas System Recovery 16 What's new in Veritas System Recovery 16 Features No Longer Supported in Veritas System Recovery

More information

The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system.

The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. In this Article: Preparing a The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. Customer.inf setup is a comprehensive installation

More information

User Profile Manager 2.0

User Profile Manager 2.0 User Profile Manager 2.0 User Guide ForensiT Limited, 75 Riverside III, Sir Thomas Longley Road, Rochester, Kent, ME2 4BH England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44

More information

POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo New Deployments Only Windows Deployment

POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo New Deployments Only Windows Deployment POC Installation Guide for McAfee EEFF v4.2.x using McAfee epo 4.6 and epo 5.0.1 New Deployments Only Windows Deployment 1 Table of Contents 1 Introduction 4 1.1 System requirements 4 1.2 High level process

More information

Windows Server 2008 Administration

Windows Server 2008 Administration Hands-On Course Description This course provides hands on experience installing and configuring Windows Server 2008 to work with clients including Windows Vista. Students will perform full and core CD-based

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Password Changer User Guide

Password Changer User Guide Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative

More information

3 INSTALLING WINDOWS XP PROFESSIONAL

3 INSTALLING WINDOWS XP PROFESSIONAL INSTALLING WINDOWS XP PROFESSIONAL.1 Preparing for installation Objectives.1.1 Windows XP Professional Hardware Requirements.1.2 Hardware Compatibility List (HCL) check.1. Hard Disk Partition.1.4 Required

More information

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017 ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference. July 2017

ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference. July 2017 ZENworks 2017 Update1 Full Disk Encryption Emergency Recovery Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Advanced Operating Systems

Advanced Operating Systems Advanced Operating Systems File Systems: File Allocation Table, Linux File System, NTFS Lecture 10 Case Studies of File Systems File Allocation Table (FAT) Unix File System Berkeley Fast File System Linux

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

User Migration Tool. User Migration Tool Prerequisites

User Migration Tool. User Migration Tool Prerequisites Prerequisites, page 1 Features, page 2 Migration Scenarios, page 2 Internationalization (I18n) and Localization (L10n) Considerations, page 3 Security Considerations, page 3 User Migration Steps, page

More information

EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version

EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version Installation and Administration Guide P/N 300-007-130 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage Linux+ Guide to Linux Certification, Third Edition Chapter 2 Linux Installation and Usage Objectives Install Red Hat Fedora Linux using good practices Outline the structure of the Linux interface Enter

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Windows 7, Enterprise Desktop Support Technician Course 50331D; 5 days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills needed to isolate,

More information

FarStone RestoreIT Users Guide

FarStone RestoreIT Users Guide FarStone RestoreIT 2014 Users Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without

More information

x CH03 2/26/04 1:24 PM Page

x CH03 2/26/04 1:24 PM Page 03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your

More information

C UNIT 3. Global Catalog & Flexible Single Master Operations (FSMO)

C UNIT 3. Global Catalog & Flexible Single Master Operations (FSMO) UN 3 Global atalog & Flexible Single Master perations (FSM) PW PW onna Warren 2005-2010 opics for this Unit Functions of the Global atalog Functions of Universal Group Membership aching he Five FSM roles

More information

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders 13 August 2002 File System Section Seven NTFS, EFS, Partitioning, and Navigating Folders NTFS DEFINITION New Technologies File System or NTFS was first applied in Windows NT 3.0 back in 1992. This technology

More information

Using the Offline Diagnostic Monitor Menu

Using the Offline Diagnostic Monitor Menu APPENDIX B Using the Offline Diagnostic Monitor Menu During the boot process, you can access the Offline Diagnostic Monitor (Offline DM) Main menu. The Offline DM Main menu allows you to perform the following

More information

An Analysis of Local Security Authority Subsystem

An Analysis of Local Security Authority Subsystem An Analysis of Local Security Authority Subsystem Shailendra Nigam Computer Science & Engineering Department DIET, Kharar Mohali(Punjab) India. Sandeep Kaur Computer Science & Engineering Department BBSBEC,

More information

REDCENTRIC AGENT FOR LINUX (64-BIT) VERSION

REDCENTRIC AGENT FOR LINUX (64-BIT) VERSION REDCENTRIC AGENT FOR LINUX (64-BIT) VERSION 8.11.5251 RELEASE NOTES, NOVEMBER 30, 2016 Agent for Linux (64-bit) Version 8.11.5251 Release Notes, November 30, 2016 Contents 1 OVERVIEW 1.1 Release History

More information

Server. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2

Server. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2 Local and Domain Logon User accounts and groups Access tokens Objects and security descriptors The Register Some features in Windows 7 and Windows 8 Windows XP evolved from Windows 2000 Windows 10, 8,

More information

BitLocker Group Policy Settings

BitLocker Group Policy Settings BitLocker Group Policy Settings Updated: September 13, 2013 Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 This reference topic for the IT professional describes the function,

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

MBS Microsoft Oracle Plug-In 6.82 User Guide

MBS Microsoft Oracle Plug-In 6.82 User Guide MBS Microsoft Oracle Plug-In 6.82 User Guide 10 Oracle Plug-In This version of the Oracle Plug-In supports Windows Agents. It is an add-on that allows you to perform database backups on Oracle databases.

More information

6 Months Training Module in MS SQL SERVER 2012

6 Months Training Module in MS SQL SERVER 2012 6 Months Training Module in MS SQL SERVER 2012 Module 1 Installing and Configuring Windows Server 2012 Installing and Managing Windows Server 2012 Windows Server 2012 Overview Installing Windows Server

More information

UBDR GOLD VERSION 3.0 USER GUIDE

UBDR GOLD VERSION 3.0 USER GUIDE UBDR GOLD VERSION 3.0 USER GUIDE UBDR Gold Version 3.0 User Guide The software described in this guide is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

Magic Card User Manual

Magic Card User Manual Table of Contents Magic Card User Manual Magic Card Introduction 2 What is Magic card? 2 Magic Card Features 2 Working Modes 3 Magic card editions 3 Installation 4 System Requirements 4 Pre-installation

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

Windows 2000 Flavors Windows 200 ws 0 Profess 0 P ional Windows 2000 Server Windows 200 ws 0 Advan 0 A ced Server Windows 2000 Datacen ter Server 2

Windows 2000 Flavors Windows 200 ws 0 Profess 0 P ional Windows 2000 Server Windows 200 ws 0 Advan 0 A ced Server Windows 2000 Datacen ter Server 2 Copyright 2006 Heathkit Company, Inc. All Rights Reserved Lab 9-3 Windows 2000 Pre-Installation Windows 2000 Flavors Windows 2000 Professional Windows 2000 Server Windows 2000 Advanced Server Windows 2000

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

LexisNexis Citation Tools Installation Instructions

LexisNexis Citation Tools Installation Instructions LexisNexis Citation Tools Installation Instructions Table of Contents Read This First....................................... 2 Minimum Requirements................................ 2 Installation Scenarios..................................

More information

HIPAA Controls. Powered by Auditor Mapping.

HIPAA Controls. Powered by Auditor Mapping. HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard

More information

COPYRIGHTED MATERIAL. What Is a Registry and Why? Chapter 1

COPYRIGHTED MATERIAL. What Is a Registry and Why? Chapter 1 Chapter 1 What Is a Registry and Why? Some users of Windows know exactly what the registry is a system designed to cause users and administrators to lose their hair. I know this is true because I can no

More information

E T ET127 P C PC TECHNOLOGY T E C H O N O L O G Y DPW

E T ET127 P C PC TECHNOLOGY T E C H O N O L O G Y DPW Donna. Warren ducation AS Accounting BS lectrical ngineering MS omputer Science Work xperience 8 years as etwork ngineer and owner of a small I consulting company years as networking instructor 5 years

More information

Remote Device Mounting Service

Remote Device Mounting Service HOW TO USE REMOTE DEVICE MOUNTING SERVICES The Remote Data Mounting Services (RDMS) lets you acquire live evidence from active and remote network computers. You can gather many types of active information

More information

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Vendor: Microsoft Exam Code: 70-682 Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Version: DEMO QUESTION 1 Scenario 1 For your convenience, the scenario is repeated

More information

Course Content of MCSA ( Microsoft Certified Solutions Associate )

Course Content of MCSA ( Microsoft Certified Solutions Associate ) Course Content of MCSA 2012 - ( Microsoft Certified Solutions Associate ) Total Duration of MCSA : 45 Days Exam 70-410 - Installing and Configuring Windows Server 2012 (Course 20410A Duration : 40 hrs

More information

Practical 23 Manage Desktop Configuration using group policy and remote installation services.

Practical 23 Manage Desktop Configuration using group policy and remote installation services. Practical 23 Manage Desktop Configuration using group policy and remote installation services. Group Policy Collection:- Group Policy is an infrastructure that allows you to implement specific configurations

More information

MS SQL Server 2016 Installation rev1704

MS SQL Server 2016 Installation rev1704 MS SQL Server 2016 Installation rev1704 This document provides the steps required to install MS SQL Server 2016 Standard Edition on a Windows Server 2016 for use with DataSelf Analytics solutions. MS SQL

More information

IT S NE VER DONE THAT BEFORE!

IT S NE VER DONE THAT BEFORE! IT S NE VER DONE THAT BEFORE! A Guide to Troubleshooting Windows XP by John Ross San Francisco 3 WHAT TO DO WHEN WINDOWS WON T START You know the routine: Turn on the computer, a bunch of text scrolls

More information

Internet Script Editor

Internet Script Editor ISE Application, page 1 ISE Functionality, page 1 ISE Requirements, page 2 TLS Requirements for ISE, page 2 ISE Installation and Upgrades, page 5 Troubleshooting Tools for, page 7 ISE Application You can

More information

Jetico Central Manager Administrator Guide

Jetico Central Manager Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Acronis Backup 11.7 Update 1 INSTALLATION GUIDE. For Windows Server For PC APPLIES TO THE FOLLOWING PRODUCTS

Acronis Backup 11.7 Update 1 INSTALLATION GUIDE. For Windows Server For PC APPLIES TO THE FOLLOWING PRODUCTS Acronis Backup 11.7 Update 1 APPLIES TO THE FOLLOWING PRODUCTS For Windows Server For PC INSTALLATION GUIDE Table of contents 1 Before installation...3 1.1 About using the product in the trial mode...

More information

Windows 2000 System Administration Handbook, 1/e

Windows 2000 System Administration Handbook, 1/e Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5

More information

Backup using Quantum vmpro with Symantec Backup Exec release 2012

Backup using Quantum vmpro with Symantec Backup Exec release 2012 Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address

More information

FileVault 2 Decoded. Rich Trouton Howard Hughes Medical Institute, Janelia Farm Research Campus

FileVault 2 Decoded. Rich Trouton Howard Hughes Medical Institute, Janelia Farm Research Campus FileVault 2 Decoded Rich Trouton Howard Hughes Medical Institute, Janelia Farm Research Campus Similar Names, Different Beasts Apple has completely revamped FileVault in Lion Grown from a encryption solution

More information

User & Groups, Permissions and Printing

User & Groups, Permissions and Printing nit 7 ser & roups, ermissions and rinting DW DW opics for this nit sers and groups inux ermissions inux rinting DW DW sers and roups DW DW oot is the superuser which means root is the system administrator

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information