Business Model - Create and Thrustling Group Policy in Windows Vista
|
|
- Joleen Norris
- 3 years ago
- Views:
Transcription
1 Bandwidth with Policy-Based Quality of Service Page 1 of 11 Managing Windows Vista and Windows Server Longhorn Network Bandwidth with Policy-Based Quality of Service Abstract Policy-based Quality of Service (QoS) in Windows Vista and Windows Server Longhorn enables administrators, via Group Policy, to create flexible rules that can prioritize or throttle outbound network traffic without changes to existing applications and in conjunction with your existing network routing infrastructure. QoS policies can be applied based on any, or all, of the following conditions: sending application, source or destination IP address, protocol, and source or destination port. Additionally, QoS policies can be uniquely defined for sets of user or computer accounts through policy deployment. You will get hands-on experience in creating and managing QoS policies. Note that this lab is built using BETA software. Some steps in this lab document may not function as expected at all times. Objectives At the end of this lab, you will be able to: Adjust the priority of network traffic based on application name, ip address, port and protocol Implement QoS controls using Group Policy Monitor QoS controls to ensure they are functioning Scenario The company is implementing a mission-critical line-of-business application that requires a guaranteed amount of network bandwidth. Large file transfers, however, are starving out all other traffic on the LAN. The application was not originally designed to be QoS aware, and is not capable of reserving bandwidth on its own. Your LAN switches do not have QoS flow-control capabilities, although your routers do. You need to increase the application s priority while lowering the priority of all other traffic. You also need to restrict the flow of file transfer traffic on the LAN so that the application has enough bandwidth to operate. These settings must be applied at the transmitting source, by the client operating system.
2 Bandwidth with Policy-Based Quality of Service Page 2 of 11 Prerequisites You should be familiar with the following products or technologies before you begin this lab: Traffic shaping and quality of service, specifically the use of DSCP (Differentiated Services Code Point) NetBIOS and FTP file transfer protocols Active Directory Group Policy Objects Performance Monitor, Network Monitor, gpresult.exe and gpupdate.exe Duration This lab is 60 minutes in duration. Background Information VistaLabs_DC1: Windows Server 2003 Domain Controller/file server/ftp server, preconfigured with Network Monitor VistaLabs_Client1: Windows Vista client workstation For More Information Microsoft TechNet - Policy-based QoS Architecture in Windows Server "Longhorn" and Windows Vista Microsoft Download Center - Quality of Service in Windows Server "Longhorn" and Windows Vista 807e-97e8a0cb9703&displaylang=en Support Information This lab is built and supported by HynesITe, Inc. See what s possible at
3 Bandwidth with Policy-Based Quality of Service Page 3 of 11 Exercise 1 Throttle File Transfer Traffic with the QoS Policy Wizard In this exercise you will identify how much bandwidth a client NetBIOS file transfer consumes. You will then use the Windows Vista QoS Policy Wizard to create a policy to limit the amount of bandwidth clients can use when uploading to the file server. You will link this policy to an Active Directory organizational unit that contains the client computer account. You will then perform the test upload again and observe the results, verifying that the policy only applies to client NetBIOS file transfers. Prepare the lab In this task you will move the Client1 computer account into the Client Computers organizational unit in Active Directory. Note: Perform this Exercise on DC1. 1. Log on to DC1 as administrator@contoso.com with a password of P@ssw0rd. 2. On the Start menu, click Run. 3. In the Run dialog box type dsa.msc then click OK. 4. In the Active Directory Users and Computers console, under contoso.com domain, click the Computers container. 5. In the right-hand pane, right click Client1 and then click Move 6. In the Move dialog box, under contoso.com domain, expand the Managed Objects expand Client Computers and select the Desktops organizational unit and then click OK. 7. Close Active Directory Users and Computers. 8. Log off of DC1. Create a custom administrative tool In this task you will add Performance Diagnostic Tools to a customized console to facilitate the lab exercises. Note: Perform this Exercise on Client1. 1. Log on to Client1 as administrator@contoso.com with a password of P@ssw0rd. 2. On the Start menu, in Start Search type mmc then press ENTER. 3. On the File menu, click Add/Remove Snap-in. 4. Under Available snap-ins: select Performance Diagnostic Console. Click Add and then click OK. 5. In the Console1 window, expand Performance Diagnostics (Local)\Monitoring Tools and select Performance Monitor. 6. In the middle pane, right click the white graph area, and then click Add Counters.
4 Bandwidth with Policy-Based Quality of Service Page 4 of In the Add Counters dialog box, under Available Counters, expand Network Interface, and then select Bytes Sent/sec. You will have to scroll up to find Network Interface. 8. In the Instances of selected object scroll box, select Intel Based PCI Fast Ethernet Adapter (Emulated), click Add and then click OK. 9. In the Performance Monitor window, in the middle pane at the bottom, select the Bytes Sent/sec counter to highlight it and activate the Last and Maximum statistics boxes. Notice the little scroll buttons to the right of the counters. You may need to scroll down to see the Bytes Sent/sec counter. 10. In the Console1 menu, click File and then click Save As. 11. In the Save As dialog box, in the Save in: drop-down box select Desktop. In the File Name: text box type My Console and then click Save. 12. Leave My Console open and maximized. You should now have a Performance Monitor console shortcut on your desktop. Perform a test upload In this task you will map a drive to the file share on DC1 and perform a netbios test upload, using the monitoring tools to observe network utilization. 1. On the Client1 Start menu, in Start Search type cmd then press ENTER. 2. In the Command Prompt window, type net use x: \\DC1\files /persistent:yes then press ENTER. 3. In the Command Prompt window type copy /y C:\Windows\Media\*.wav x: then press ENTER to start uploading the *.wav files. 4. Quickly toggle back to My Console, and select Performance Monitor to observe the Last and Maximum number of Bytes Sent/sec being reported. 5. In My Console, select Performance Diagnostic (Local). 6. In the Resource Overview pane, observe the moving Network graph, and repeat Step 3 to cross-reference your findings with the Performance Monitor report. In our test lab, Performance Monitor reported a maximum rate of approximately 2 megabytes/sec. Performance Diagnostic Tools reported a peak rate in excess of 10 megabits/sec. Your numbers may be different. 7. Close My Console. If prompted to save changes, click No. 8. Close the Command Prompt. Create and deploy a bandwidth-throttling Group Policy In this task you will use the Group Policy Object Editor to create a policy to throttle netbios file transfer bandwidth. You will then use Group Policy Manager to link the policy to the Active Directory organizational unit that contains the client computer account.
5 Bandwidth with Policy-Based Quality of Service Page 5 of On the Client1 Desktop, launch My Console. 2. In the My Console window, click File, and then click Add/Remove Snap-in. 3. In the Add/Remove Snap-in dialog box, select Group Policy Management, click Add, and then click OK. 4. In the My Console window, expand Group Policy Management, expand Forest: contoso.com, expand Domains, expand contoso.com. 5. Under contoso.com, right click Group Policy Objects and click New. 6. In the New GPO dialog box, type Bandwidth Throttling Policy and click OK. 7. Under contoso.com, expand Group Policy Objects. 8. Right click Bandwidth Throttling Policy and click Edit. 9. In the Group Policy Object Editor window, under Computer Configuration, expand Windows Settings. It is important that you perform this under Computer Configuration, not User Configuration. 10. Right click Policy based QoS and create a new policy with the following information and then click Finish.: Policy Name: File Transfer Bandwidth Throttling Specify DSCP Value: 0 Specify throttle Rate: 64 KBps This QoS policy applies to: All Applications This QoS policy applies to: Any source IP address Only the following destination IP address: Select the protocol this QoS policy applies to: TCP Specify the source port number: From any source port Specify the destination port number: Close the Group Policy Object Editor. 12. In My Console, under the contoso.com domain, expand the Managed Objects organizational unit, and then expand the Client Computers organizational unit. 13. Right click the Desktops organizational unit, then click Link an Existing GPO. 14. Select Bandwidth Throttling Policy then click OK. 15. Close My Console. If prompted to Save changes, click Yes. Perform a new test In this task you will apply your new bandwidth throttling group policy and perform a new file transfer test, comparing the results to your earlier test. You will also verify the selectiveness of the policy by performing another file transfer using a different protocol. 1. On the Client1 Desktop, on the Start menu, in Start Search type cmd and then press ENTER. 2. In the Command Prompt window type gpupdate /force /target:computer, then press ENTER. Wait for the message that the refresh has completed successfully.
6 Bandwidth with Policy-Based Quality of Service Page 6 of Type gpresult then press ENTER to verify that the policy has been applied. 4. Scroll through the results. Under COMPUTER SETTINGS, under Applied Group Policy Objects you should see the policies listed in this order: 1. Bandwidth Throttling Policy 2. Default Domain Policy 5. In the Command Prompt window, type copy /y C:\Windows\Media\*.wav x: then press ENTER to start uploading the *.wav files. 6. On the Desktop quickly launch My Console and select Performance Monitor to observe the results. Has the bandwidth been throttled back to approximately 64 Kilobytes per second? 7. The answer should be yes. 8. In My Console select Performance Diagnostics (Local). 9. In the Resource Overview pane, observe the moving Network graph. Crossreference your findings with the Performance Monitor report. If necessary, repeat Step 3 to re-capture statistics. Wait until the file transfer is complete. 10. Verify that the bandwidth throttling policy does not apply to other kinds of traffic. In the Command Prompt window, type ftp When prompted for a username, type anonymous. When prompted for a password, press ENTER. 12. Type bin then press ENTER. 13. Type prompt then press ENTER. 14. Type mput c:\windows\media\*.wav then press ENTER 15. If Windows Security Alert asks if you want to keep blocking this program click Unblock. 16. Quickly switch to My Console, Performance Monitor, and then to Performance Diagnostics (Local) to observe the results. If necessary, repeat Steps 7 11 to recapture statistics. 17. Does the Bandwidth Throttling Policy also apply to an ftp upload? 18. The answer should be no, because ftp uses tcp port 20 to transfer data. 19. Close all windows. If prompted to Save My Console, click No. 20. Log off of Client1.
7 Bandwidth with Policy-Based Quality of Service Page 7 of 11 Exercise 2 Set the DSCP Value of a Line-Of-Business Application Using the QoS Policy Wizard Windows Vista QoS Policy Wizard gives the administrator new flexibility to manage traffic from the source. In this exercise, you will capture network traffic generated by a non-qos aware application named Newapp.exe to observe its default IP Type of Service priority setting. You will then create a group policy changing the differentiated services code point (DSCP) value of Newapp.exe to a high priority value. The local router can then use this value to place Newapp.exe s traffic in a high-priority queue. You will also create a new group policy setting the priority of all other traffic to a low best effort value. You will link these policies to the Client Computers organizational unit where the client computer account resides. You will then use Network Monitor to verify the results. Measure the default QoS setting for Newapp.exe traffic In this task you will use Network Monitor on DC1 to capture traffic generated by a line-ofbusiness application named Newapp.exe. You will examine the packets to determine the default priority value in the IP header s Type of Service field. Note: Perform these steps on DC1. 1. Log on to DC1 as administrator@contoso.com with a password of P@ssw0rd. 2. On the Start menu, click Administrative Tools, and then click Network Monitor. Note: If a message box pops up asking for a specific network, click OK. 3. In the Select a Network dialog box, expand Local Computer, click Internal, and then click OK. 4. In the Network Monitor window click Capture, and then click Start. 5. Leave Network Monitor running. Note: Perform these steps on Client1. 6. Log on to Client1 as administrator@contoso.com with a password of P@ssw0rd. 7. On the Start menu, in Start Search type cmd then press ENTER. 8. In the Command Prompt window type c:\testnewapp.cmd then press ENTER. For the purposes of our lab, testnewapp.cmd is a batch file that runs newapp.exe (a renamed copy of ftp.exe) 9. If Windows Security Alert notifies you that it is blocking this program, click Unblock. 10. The batch file tells you that newapp is running. When prompted, press any key. Wait until newapp is finished. Note: Perform these steps on DC1.
8 Bandwidth with Policy-Based Quality of Service Page 8 of On DC1 in the Network Monitor window, click Capture, and then click Stop and View. 12. In the Capture: 1 (Summary) Window, scroll down and double click any frame where: Dst Mac Address = LOCAL, Protocol = FTP, Description = Data Transfer to Server 13. In the middle pane, expand IP: Protocol = TCP. 14. Expand IP: Type of Service. 15. What is the IP Precedence? 16. The answer should be Routine, with a value that looks like this: IP: 000. = Precedence Routine 17. Close Network Monitor. If you are prompted to Save the capture, click No. Create and deploy the DSCP policies In this task you will use the Group Policy Object Editor to create a policy that will change the DSCP value of Newapp s traffic from a low best effort to a high priority. You will also create a new policy setting all other traffic to best effort. You will link both policies to the Active Directory organizational unit that contains the client computer account. You will then refresh the policy on the client. Note: Perform these steps on Client1. 1. On the Client1 Desktop launch My Console. 2. In the My Console window, expand Group Policy Management, expand Forest: contoso.com, expand Domains, and then expand contoso.com. 3. Under contoso.com right click Group Policy Objects, and then click New. 4. In the New GPO dialog box, type Newapp DSCP Policy, and then click OK. 5. Under contoso.com, expand Group Policy Objects, right click Newapp DSCP Policy, and then click Edit. 6. In the Group Policy Object Editor window, under Computer Configuration, expand Windows Settings. It is important that you perform this under Computer Configuration, not User Configuration. 7. Under Windows Settings, right click Policy-based QoS and create a new policy with the following information and then click Finish: Policy Name: DSCP for Newapp Specify DSCP Value: 18 Specify Throttle Rate: unselected Only applications with this executable name: newapp.exe This QoS policy applies to: Any source IP address This QoS policy applies to: Any Destination IP Address Specify the protocol this QoS policy applies to: TCP
9 Bandwidth with Policy-Based Quality of Service Page 9 of 11 Specify the source port number: From any source port Specify the destination port number: To any destination port 8. Close the Group Policy Object Editor. 9. In the My Console window under Group Policy Management, under contoso.com right click Group Policy Objects and then click New. 10. In the New GPO dialog box, type Default DSCP Policy, and then click OK. 11. Under Group Policy Objects, right click Default DSCP Policy, and then click Edit. 12. In the Group Policy Object Editor window, under Computer Configuration, expand Windows Settings. It is important that you perform this under Computer Configuration, not User Configuration 13. Under Windows Settings, right click Policy-based QoS and create a new policy with the following information and then click Finish: Policy Name: DSCP for All Other Traffic Specify DSCP Value: 0 Specify throttle Rate: unselected This QoS policy applies to: All applications This QoS policy applies to: Any source IP address This QoS policy applies to: Any Destination IP Address Select the protocol this QoS policy applies to: TCP Specify the source port number: From any source port Specify the destination port number: To any destination port 14. Close the Group Policy Object Editor. 15. In the My Console window, under Group Policy Management, under the contoso.com domain, expand the Managed Objects organizational unit, and then expand the Client Computers organizational unit. 16. Right click the Desktops organizational unit, then click Link an Existing GPO. 17. Select Newapp DSCP Policy then click OK. 18. Right click the Desktops organizational unit again and click Link an Existing GPO. 19. Select the Default DSCP Policy then click OK. 20. Click the Desktops organizational unit to highlight it. 21. In the middle Desktops pane, in the Linked Group Policy Objects tab, use the up/down arrow buttons to the left of the list to arrange the policies in the following Link Order: 1. Newapp DSCP Policy 2. Bandwidth Throttling Policy (created in the previous exercise) 3. Default DSCP Policy It is very important that the Newapp DSCP Policy be at the top of the list, with the Default DSCP Policy at the bottom. If they are not in this order, the test will not work as expected. If you no longer have the Bandwidth Throttling Policy, that s ok.
10 Bandwidth with Policy-Based Quality of Service Page 10 of Open the Command Prompt. 23. Type gpupdate /force /target:computer, then press ENTER. Wait for the message that the refresh has completed successfully 24. Type gpresult then press ENTER to verify that the policies have been applied. 25. Scroll through the results. Under COMPUTER SETTINGS, under Applied Group Policy Objects you should see the policies listed in this order: 1. Newapp DSCP Policy 2. Bandwidth Throttling Policy (created in the previous exercise) 3. Default DSCP Policy 4. Default Domain Policy 26. Close all windows Perform a new test In this task you will perform a new file transfer test, comparing the results to your earlier test. You will then verify the selectiveness of the policy by performing another file transfer using a different protocol. Note: Perform these steps on DC1. 1. On the DC1 open Network Monitor. 2. In the Microsoft Network Monitor window click Capture, and then click Networks. 3. If the Select a Network dialog box opens, expand Local Computer. Click Internal, and then click OK. 4. In the Network Monitor window click Capture, and then click Start. 5. Leave the Network Monitor packet capture running. Note: Perform these steps on Client1. 6. On Client1, open a Command Prompt. 7. Type c:\testnewapp.cmd then press ENTER. 8. If Windows Security Alert notifies you that it is blocking this program, click Unblock. 9. The batch file tells you that newapp is running. When prompted, press any key. Wait until newapp is finished. Note: Perform these steps on DC In DC1 s Network Monitor window click Capture, and then click Stop and View. 11. In the Capture: 1 (Summary) Window, scroll down and double click any frame where: Dst Mac Address = LOCAL, Protocol = FTP, Description = Data Transfer to Server 12. In the middle pane, expand IP: Protocol = TCP.
11 Bandwidth with Policy-Based Quality of Service Page 11 of Expand IP: Type of Service. 14. What is the IP Precedence this time? 15. The answer should be Immediate, with a value that looks like this: IP: 010. = Precedence Immediate 16. On the Network Monitor menu click File, and then click Close. 17. On the Network Monitor menu, click Capture, and then click Start. 18. If Network Monitor prompts you to save the previous capture, click No. It is important that you start a separate packet capture for the next file upload. In this beta version, trying to capture both uploads in a single packet capture does not work properly. 19. Leave the Network Monitor packet capture running. Note: Perform these steps on Client On Client1, open a Command Prompt. 21. Type copy /y c:\windows\media\*.wav x: then press ENTER. 22. As the files are uploading, check the packet capture on DC You need not wait for the entire upload to complete before moving on to the next step. Note: Perform these steps on DC In DC1 s Network Monitor window click Capture, and then click Stop and View. 25. In the Capture: 1 (Summary) Window, scroll down and double-click any frame where: Dst Mac Address = LOCAL, Protocol = SMB, Description = C Write & X 26. Is the IP: Type of Service now Precedence Routine? 27. The answer should be yes, with a value that looks like this: IP: 000. = Precedence Routine. 28. Close all Windows. If prompted to Save My Console, click No. 29. Log off of DC Log off of Client1.
Install the Production Treasury Root Certificate (Vista / Win 7)
Install the Production Treasury Root Certificate (Vista / Win 7) The Production Treasury Root Certificate should be maintained on your local workstations to use OTCnet Check Capture and Deposit Reporting.
More informationLab A: Deploying and Managing Software by Using Group Policy Answer Key
Lab A: Deploying and Managing Software by Using Group Policy Answer Key Exercise 1 Assigning Software This Answer Key provides the detailed steps for completing Lab A: Deploying and Managing Software by
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationDell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationNetwork Load Balancing
Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationLAB 1: Installing Active Directory Federation Services
LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation
More informationms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
More informationStep-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create
More informationMigrating Active Directory to Windows Server 2012 R2
Migrating Active Directory to Windows Server 2012 R2 Windows Server 2012 R2 Hands-on lab In this lab, you will complete a migration of a Windows Server 2008 R2 domain environment to Windows Server 2012
More informationDigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description
More informationWindows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products
Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationStep-by-Step Guide for Setting Up VPN-based Remote Access in a
Page 1 of 41 TechNet Home > Products & Technologies > Server Operating Systems > Windows Server 2003 > Networking and Communications Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test
More information138 Configuration Wizards
9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP
More informationDeploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
More informationCREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel
More informationCourse: WIN310. Student Lab Setup Guide. Summer 2010. Microsoft Windows Server 2003 Network Infrastructure (70-291)
Course: WIN310 Student Lab Setup Guide Summer 2010 Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 Published by Wiley & Sons 1 STUDENT COMPUTER SETUP Hardware Requirements
More informationHow To Install And Configure Windows Server 2003 On A Student Computer
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
More informationRSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
More informationCS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationUse 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network
How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible
More informationWindows Firewall Configuration with Group Policy for SyAM System Client Installation
with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
More informationIntroduction to DirectAccess in Windows Server 2012
Introduction to DirectAccess in Windows Server 2012 Windows Server 2012 Hands-on lab In this lab, you will configure a Windows 8 workgroup client to access the corporate network using DirectAccess technology,
More informationNETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationAppendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
More informationWindows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
More informationWavecrest Certificate
Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.
More informationDeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationSCCM Client Checklist for Windows 7
SCCM Client Checklist for Windows 7 1. The client workstation must have a supported operating system. Supported operating systems include Windows 7. To view information about the operating system version:
More informationStep-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab
Página 1 de 54 Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab This guide provides detailed information about how you can use five computers to create a test lab with which to configure
More informationConnection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
More informationAlpha High Level Description
Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global
More informationNETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationHow to configure MAC authentication on a ProCurve switch
An HP ProCurve Networking Application Note How to configure MAC authentication on a ProCurve switch Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. Configuring the ProCurve
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationQoS (Quality of Service)
QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality
More informationCreating and Issuing the Workstation Authentication Certificate Template on the Certification Authority
In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we
More informationInstalling and Configuring Login PI
Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To
More informationDeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
More informationUsing LifeSize systems with Microsoft Office Communications Server 2007. Server Setup
Using LifeSize systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server
More informationOutpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
More informationConnect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationENABLE LOGON/LOGOFF AUDITING
Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...
More informationUsing Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
More informationConfiguring the Windows XP SP2/Vista Firewall for UserLock
Configuring the Windows XP SP2/Vista Firewall for UserLock Due to the modification of the Firewall s activation setting, that occurs when Service Pack 2 is deployed on a XP workstation, all incoming network
More informationDeploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
More informationMicrosoft OCS with IPC-R: SIP (M)TLS Trunking. directpacket Product Supplement
Microsoft OCS with IPC-R: SIP (M)TLS Trunking directpacket Product Supplement directpacket Research www.directpacket.com 2 Contents Prepare DNS... 6 Prepare Certificate Template for MTLS... 6 1 Create
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationNexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
More informationWindows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies
Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Microsoft Corporation Published: October 2007 Author: Dave Bishop Editor: Scott Somohano Technical Reviewers: Sarah
More informationUsing DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
More informationDeploying Software Updates Using Windows Server Update Services
Deploying Software Updates Using Windows Server Update Services Learning Objectives Overview Prerequisites For more information Scenario After completing this lab, you will have learned: How to configure
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationComodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
More informationAPNS Certificate generating and installation
APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...
More informationSetting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
More informationHOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
More informationEVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State
EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for
More informationActive Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
More informationUsing Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security
More informationSetting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
More informationMagaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
More informationLab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
More informationCONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR
CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use
More informationInstalling Windows Rights Management Services with Service Pack 2 Step-by- Step Guide
Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationetoken Enterprise For: SSL SSL with etoken
etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the
More informationHow To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip
WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need
More information1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.
Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationReference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
More informationSophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
More informationBarracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationINSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES
INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not
More information12 NETWORK MANAGEMENT
12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking
More informationExchange Server Backup and Restore
WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationvtcommander Installing and Starting vtcommander
vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on
More informationAppendix E. Captioning Manager system requirements. Installing the Captioning Manager
Appendix E Installing and configuring the Captioning Manager The Mediasite Captioning Manager, a separately sold EX Server add-on, allows users to submit and monitor captioning requests through Automatic
More informationDriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationNB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1)
NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1) NB6 Series and Quality of Service (QoS) The following Quality of Service (QoS) settings offer a basic setup example, setting up 3 devices
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More information8 NETWORK SERVERS AND SERVICES FUNDAMENTALS
8 NETWORK SERVERS AND SERVICES FUNDAMENTALS PROJECTS Project 8.1 Project 8.2 Project 8.3 Project 8.4 Project 8.5 Understanding Key Concepts Comparing Network Operating Systems Understanding Basic Services
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment
ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...
More informationConfiguring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.
Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...
More informationS/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014
S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: October 08, 2014 Installing the Online Responder service... 1 Preparing the environment...
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More information