Chapter 12 Network Administration and Support

Size: px
Start display at page:

Download "Chapter 12 Network Administration and Support"

Transcription

1 Chapter 12 Network Administration and Support

2 Objectives Manage networked accounts Monitor network performance Protect your servers from data loss Guide to Networking Essentials, Fifth Edition 2

3 Managing Networked Accounts The main tasks of network management Make sure all users can access resources they re allowed to access Prevent users from accessing resources they don t have permission to access User account: collection of information about a user, including account name, associated password, and set of access permissions for network resources Group: named collection of user accounts Resource sharing specific to group s needs Guide to Networking Essentials, Fifth Edition 3

4 Creating User Accounts Windows Server OSs come with two predefined accounts: Administrator and Guest Users are discouraged from using these accounts Assign the Administrator account a strong password and guard it carefully It can be disabled (not recommended) or renamed Before you begin to create accounts, you must make some network administration decisions User names, passwords, logon hours, auditing, security Guide to Networking Essentials, Fifth Edition 4

5 User Account Creation in Windows Guide to Networking Essentials, Fifth Edition 5

6 User Account Creation in Windows Guide to Networking Essentials, Fifth Edition 6

7 User Account Creation in Linux Guide to Networking Essentials, Fifth Edition 7

8 Creating and Managing Groups in Windows Assigning permissions with group accounts rather than user accounts is preferable Group accounts are easier to keep track of Two methods for adding users to a group Open the account s Properties dialog box, select the Member Of tab, and add the group(s) Create a group account and add user accounts to it In a Windows Server 2003 domain environment, there are multiple classifications of groups Domain local, global, and universal groups Guide to Networking Essentials, Fifth Edition 8

9 Creating and Managing Groups in Windows Recommended guidelines for Windows domains Global groups should include users from the same domain and other global groups in the same domain Domain local groups can include users from any domain but should usually contain only global groups or other domain local groups Domain local groups are used to assign rights and permissions to users who are members of global groups Universal groups can contain one or more user accounts or global groups Guide to Networking Essentials, Fifth Edition 9

10 Creating and Managing Groups in Windows Guide to Networking Essentials, Fifth Edition 10

11 Creating and Managing Groups in Windows Guide to Networking Essentials, Fifth Edition 11

12 Creating and Managing Groups in Linux Guide to Networking Essentials, Fifth Edition 12

13 Creating and Managing Groups in Linux Guide to Networking Essentials, Fifth Edition 13

14 Auditing With auditing, you can keep track of what s happening on a network (server) by configuring the server so that it records certain actions How much you should audit depends on how much information you can store efficiently Use auditing sparingly because it can adversely affect the availability of system resources In Windows, auditing is enabled by using the Security Policy editor in Administrative Tools Logs can be viewed in Event Viewer s Security log In Linux, logs are stored in /var/log Guide to Networking Essentials, Fifth Edition 14

15 Monitoring Network Performance When monitoring a network, ensure that cables are operational and network cards don t conflict Additional parameters to monitor Data read from and written to server each second Security errors (errors accessing data) Connections currently maintained to other servers (server sessions) Network performance parameters Guide to Networking Essentials, Fifth Edition 15

16 Data Reads and Writes Number of bytes read from and written to a server provides a useful measure of the server s activity Or count amount of data that can t be read or written On a Windows network, the server attempts to take large data streams not as sets of packets, but as streams of raw data unbroken by header information Server s refusal to accept many streams of raw data is a possible indication of server memory problems Guide to Networking Essentials, Fifth Edition 16

17 Security Errors A high rate of failed logons, failed access to objects, or failed changes to security settings could indicate a security risk on your network Errors are events to watch for, and auditing helps you see who s causing the errors A protocol analyzer is a combination of hardware and software that can capture network traffic and create reports and graphs from the data it collects Helps you find the source of errors, in case a user is being spoofed Guide to Networking Essentials, Fifth Edition 17

18 Server Sessions You can draw conclusions about server activity by observing details of server sessions E.g., connections between network devices and server, rate at which connections to the server are made, and how they are broken (normal logoff, an error, or a server timeout) Errors and timeouts can indicate that server is overloaded and is refusing connections or is unable to service them quickly enough More RAM could solve the problem, or you might need to update other hardware Guide to Networking Essentials, Fifth Edition 18

19 Network and System Performance Windows Server 2003 performance monitoring Event Viewer Task Manager Performance Monitor Network Monitor Linux servers have numerous comparable utilities Guide to Networking Essentials, Fifth Edition 19

20 Event Viewer Guide to Networking Essentials, Fifth Edition 20

21 Task Manager Guide to Networking Essentials, Fifth Edition 21

22 Performance Monitor Guide to Networking Essentials, Fifth Edition 22

23 Network Monitor Guide to Networking Essentials, Fifth Edition 23

24 Total System Management Events on the network aren t the only influence Must also consider what s happening on the server side in hard drive performance and memory use Guide to Networking Essentials, Fifth Edition 24

25 Hard Drive Performance Performance Monitor is most useful for monitoring hard drives on a Windows network To monitor HD performance, view: Disk space remaining Speed at which requests are serviced How often the disk is busy When monitoring drives, notice whether you re viewing the physical or the logical disk object Guide to Networking Essentials, Fifth Edition 25

26 Memory Use Another major server issue: amount of memory available to service incoming requests When the server has to page too much data (compared to a baseline performance), consider installing more memory Page faults can be soft or hard If too many hard page faults occur, response time slows considerably The best measure of memory shortages is the rate of hard page faults Guide to Networking Essentials, Fifth Edition 26

27 CPU Utilization Monitoring CPU utilization (percentage of time CPU stays busy on average) is important Can measure CPU utilization at a specific moment or over a longer period Don t let peaks at that level be a cause for alarm When evaluating system health, best to monitor the % Processor Time counter for Processor object Constant rates of 90% or higher might indicate the machine is overloaded Evaluate other counters (e.g., Memory pages/sec) to make sure high utilization isn t a secondary symptom Guide to Networking Essentials, Fifth Edition 27

28 Network Statistics You can monitor network statistics in Performance Monitor or Network Monitor on a Windows system Performance Monitor: checks statistics for the Network Interface and protocol stack objects Network Monitor: views error rates and investigates specific packets or errors Utilization rates can also be meaningful An average 80% utilization over time on a token ring network is perfectly acceptable, but the same utilization on an unswitched Ethernet network is not Guide to Networking Essentials, Fifth Edition 28

29 Maintaining a Network History Both Performance Monitor and Event Viewer can prepare log data you can use to keep longterm records of network performance and events Long-term records are useful mostly for determining trends or noticing new problems As with other forms of troubleshooting, to recognize sick, you must know what healthy looks like Baseline: performance statistics of a healthy system Guide to Networking Essentials, Fifth Edition 29

30 Avoiding Data Loss Another aspect of data security involves protecting data from loss/destruction and unauthorized access Protecting data on corporate computer systems should be an administrator s top priority The chances of a hard drive failing are probably higher than the risk of a break-in In most cases, you can best protect data with a three-tiered scheme that reduces the chance of data loss, makes quick recovery from data loss easy, and, if all else fails, allows you to completely rebuild lost or corrupted data Guide to Networking Essentials, Fifth Edition 30

31 Tape Backup Backing up regularly and often is essential Backup types Normal Incremental Differential Copy Daily Post backup schedule and assign a person to perform the backups and sign off on them daily Make sure you can restore data Tapes should be stored in a cool, dry, dark place Most useful as part of a regular backup schedule Guide to Networking Essentials, Fifth Edition 31

32 System Repair or Recovery in Windows Windows systems occasionally fail to boot, or exhibit problems or errors after booting that indicate the system is damaged or corrupted and possibly needs repair Windows network OSs include repair utilities to correct these problems Recovery Console Last Known Good Configuration System Restore Driver Rollback Guide to Networking Essentials, Fifth Edition 32

33 Recovery Console The Recovery Console repair utility in Windows 2000/2003/XP is powerful Command-line console supports 27 commands you can use on the system, such as repairing its partition table or replacing specific files and folders Other commands: replace the Master Boot Record (fixmbr), write a new boot sector (fixboot), format hard disks (format), manage disk partitions (diskpart) Guide to Networking Essentials, Fifth Edition 33

34 Last Known Good Configuration Guide to Networking Essentials, Fifth Edition 34

35 System Restore Restores a system to a previous state Monitors all drives and partitions and records changes made to system files, such as the Registry, and some applications When major changes are made, it creates a restore point so that the computer can be restored to its operating parameters before the changes, in case something goes wrong with a driver installation, application install, or Registry change Users can create their own restore point Can run from a regular boot or a Safe Mode boot Guide to Networking Essentials, Fifth Edition 35

36 Driver Rollback Included in Windows XP and Windows Server 2003, the Driver Rollback feature is used when a new driver installed for an existing device causes a problem with the system To run this feature: Open Device Manager Double-click the device you want to roll driver back Click the Driver tab Click the Roll Back Driver button Guide to Networking Essentials, Fifth Edition 36

37 Uninterruptible Power Supply UPS: device with a built-in battery, power conditioning, and surge protection A standby UPS normally supplies power to plugged-in devices by passing the AC power directly from the wall outlet to the device receptacle An online UPS supplies power continuously to pluggedin devices through the UPS battery, which is recharged by the wall outlet power Power conditioning cleans the power, removing noise caused by other devices on the same circuit Surge protection keeps the computer from being affected by sags or spikes in power flow Guide to Networking Essentials, Fifth Edition 37

38 Fault-Tolerant Systems Fault-tolerant disk configurations: another method of data protection (hardware or software) Two most popular configurations are disk mirroring (or duplexing) and disk striping with parity These disk structures are based on redundant array of independent disks (RAID), so they can be built from standard hard disks using specialized disk controllers to create and manage special features associated with the type of RAID in use Guide to Networking Essentials, Fifth Edition 38

39 Fault-Tolerant Systems Guide to Networking Essentials, Fifth Edition 39

40 RAID 1: Disk Mirroring Disk mirroring: two disks working in tandem When data is written to one disk, it is also written to second disk, thus creating a constant backup of data You can mirror a system disk so that if the boot disk crashes, the second one can take over Normally, involves two HDs on a single controller Disk duplexing is disk mirroring in which each disk has its own controller Protects from controller failures and disk failures Requires twice as much as the amount of data Guide to Networking Essentials, Fifth Edition 40

41 RAID 5: Disk Striping with Parity Guide to Networking Essentials, Fifth Edition 41

42 Intellimirror Intellimirror: client/server application that runs on Windows Server 2000/2003 Creates smart backup copy of a system on a server If a user wants to log on to another machine on the network, that user s home desktop can be recreated Copies only items that the user requests More capable than a system recovery or backup access mechanism Can deploy, recover, restore, or replace user data, software, and personal settings Guide to Networking Essentials, Fifth Edition 42

43 Summary Main task of network management: ensure users can access resources they are allowed to access but can t access what they don t have permission to access Windows groups in a Windows domain can be domain local, global, or universal Permissions can be granted to user accounts or groups to control access to objects and resources on network Monitor the performance of a Windows 2000/2003 Server network using Event Viewer, Performance Monitor, Task Manager, and Network Monitor Guide to Networking Essentials, Fifth Edition 43

44 Summary Avoid data loss by making regular data backups, using Intellimirror, and installing fault-tolerant system components Windows 2000/2003/XP provides strong repair and recovery tools, such as Recovery Console, Last Known Good Configuration, System Restore, and Driver Rollback Guide to Networking Essentials, Fifth Edition 44

Maintaining a Microsoft Windows Server 2003 Environment

Maintaining a Microsoft Windows Server 2003 Environment Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.

More information

12 NETWORK MANAGEMENT

12 NETWORK MANAGEMENT 12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking

More information

Managing and Maintaining a Windows Server 2003 Network Environment

Managing and Maintaining a Windows Server 2003 Network Environment Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.

More information

Installing and Upgrading to Windows XP

Installing and Upgrading to Windows XP Installing and Upgrading to Windows XP Although Windows XP was released many years ago, you will still see it in the field and might need to install it as well, or upgrade older Windows computers to XP.

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4

Exam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4 Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of

More information

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1 RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc. Microsoft Windows 7 Administration Instant Reference William Panek WILEY Wiley Publishing, Inc. Introduction xix PART I: Installation 1 Chapter 1: Installing Windows 7 3 Understand Windows 7's New Features

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Introduction to Windows Server 2003

Introduction to Windows Server 2003 CHAPTER Introduction to Windows Server 2003 After reading this chapter and completing the exercises, you will be able to: Differentiate between the different editions of Windows Server 2003 Explain Windows

More information

High Availability Essentials

High Availability Essentials High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. 1 Contents 3 RAID Utility User s Guide 3 Installing the RAID Software 4 Running

More information

Hands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability

Hands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability Hands-On Microsoft Windows Server 2008 Chapter 12 Managing System Reliability and Availability Objectives Understand general problem-solving strategies Resolve boot problems Use and configure Event Viewer

More information

Maintaining a Microsoft Windows Server 2003 Environment

Maintaining a Microsoft Windows Server 2003 Environment Maintaining a Microsoft Windows Server 2003 Environment Key Data Course #: 2275C Number of Days: 3 Format: Instructor-Led Certification Exams: None Certification Track: Exam 70-290: Managing and Maintaining

More information

NSS Volume Data Recovery

NSS Volume Data Recovery NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

Windows Server 2008 R2 Essentials

Windows Server 2008 R2 Essentials Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution

More information

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 11 Managing and Monitoring a Windows Server 2008 Network

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 11 Managing and Monitoring a Windows Server 2008 Network MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network Objectives Use management consoles to maintain Windows

More information

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft

More information

Deploying a File Server Lesson 2

Deploying a File Server Lesson 2 Deploying a File Server Lesson 2 Skills Matrix Technology Skill Objective Domain Objective # Adding a New Disk Configure storage 1.5 File Server The most basic and the most universal type of application

More information

If you re the unofficial administrator of your home or small

If you re the unofficial administrator of your home or small C H A P T E R Monitoring Your Network If you re the unofficial administrator of your home or small office network, I imagine you re already saddled with a fairly long to-do list of network chores: adding

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

Actualtests.com - The Power of Knowing

Actualtests.com - The Power of Knowing Explanation: We should use Global Security groups. QUESTION 87 You are the network administrator for Certkiller.com. Your network consists of a single Active Directory domain named Certkiller.com. All

More information

84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff

84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff 84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT.

More information

Backups. Backup Plan. How to use the Backup utility to back up files and folders in Windows XP Home Edition

Backups. Backup Plan. How to use the Backup utility to back up files and folders in Windows XP Home Edition Backups Backups are your insurance against data loss. Most organizations have an Information Technology Department (IT) which may be responsible for backing up organizational data and that is handled well

More information

Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Course Overview... 3 Section 0.1: Introduction... 5 Section 0.2:

More information

MANAGING DISK STORAGE

MANAGING DISK STORAGE 1 Chapter 12 MANAGING DISK STORAGE Chapter 12: MANAGING DISK STORAGE 2 CHAPTER OVERVIEW Understand disk-storage concepts and terminology Distinguish between basic and dynamic storage Identify the types

More information

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the

More information

SiS964 RAID. User s Manual. Edition. Trademarks V1.0 P/N: 91-187-U49-M2-0E

SiS964 RAID. User s Manual. Edition. Trademarks V1.0 P/N: 91-187-U49-M2-0E SiS964 RAID User s Manual Edition V1.0 P/N: 91-187-U49-M2-0E Trademarks All brand or product names mentioned are trademarks or registered trademarks of their respective holders. CONTENTS Introduction...

More information

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS TECHNOLOGY BRIEF August 1999 Compaq Computer Corporation Prepared by ISSD Technology Communications CONTENTS Executive Summary 1 Introduction 3 Subsystem Technology 3 Processor 3 SCSI Chip4 PCI Bridge

More information

How To Recover From A Disaster In An Exchange 5.5 Server

How To Recover From A Disaster In An Exchange 5.5 Server 9 Backup and Recovery Operations Systems do not always run as smoothly as you would like. Hardware failures, software failures, human error, hacker attacks, and sometimes even natural disasters can disrupt

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Tape RAID Option Guide r11.5 D01183-1E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's

More information

WD My Cloud EX4 Personal Cloud Storage Release Notes for Firmware 1.03.39

WD My Cloud EX4 Personal Cloud Storage Release Notes for Firmware 1.03.39 WD My Cloud EX4 Personal Cloud Storage Release Notes for Firmware 1.03.39 These release notes provide information on the WD My Cloud EX4 personal cloud storage. Information on the firmware is provided

More information

2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual

2-Bay Raid Sub-System Smart Removable 3.5 SATA Multiple Bay Data Storage Device User's Manual 2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75211R/VPMA-75211R) Operates... 1 1-1 SteelVine

More information

SiS S-ATA User s Manual. Quick User s Guide. Version 0.1

SiS S-ATA User s Manual. Quick User s Guide. Version 0.1 SiS S-ATA User s Manual Quick User s Guide Version 0.1 Edition April 2003 Copyright Trademarks SiS is a registered trademark of Silicon Integrated Systems Corp. All brand or product names mentioned are

More information

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility

More information

SiS 180 S-ATA User s Manual. Quick User s Guide. Version 0.1

SiS 180 S-ATA User s Manual. Quick User s Guide. Version 0.1 SiS 180 S-ATA User s Manual Quick User s Guide Version 0.1 Edition April 2003 Copyright Trademarks SiS is a registered trademark of Silicon Integrated Systems Corp. All brand or product names mentioned

More information

Secure Perfect RAID Recovery Instructions

Secure Perfect RAID Recovery Instructions Secure Perfect RAID Recovery Instructions Contents Overview Dell PowerEdge 2500 RAID Level 1 Recovery Instructions Overview NOTE If you possess a previous version of this document, you may notice changes

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

MONITORING MICROSOFT WINDOWS SERVER 2003

MONITORING MICROSOFT WINDOWS SERVER 2003 1 Chapter 3 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3: MONITORING MICROSOFT WINDOWS SERVER 2003 2 CHAPTER OVERVIEW Use Event Viewer to monitor system logs. Configure Task Manager to display performance

More information

5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual

5-Bay Raid Sub-System Smart Removable 3.5 SATA Multiple Bay Data Storage Device User's Manual 5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75511R/VPMA-75511R) Operates... 1 1-1 SteelVine

More information

WINDOWS PROCESSES AND SERVICES

WINDOWS PROCESSES AND SERVICES OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.

More information

Using RAID Admin and Disk Utility

Using RAID Admin and Disk Utility Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under

More information

REMOTE OFFICE BACKUP

REMOTE OFFICE BACKUP REMOTE OFFICE BACKUP Remote offices present IT managers with a number of technical challenges. Often businesses use remote offices to expand into either new markets, or into new geographical areas. Many

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

SmartSync Backup Efficient NAS-to-NAS backup

SmartSync Backup Efficient NAS-to-NAS backup Allion Ingrasys Europe SmartSync Backup Efficient NAS-to-NAS backup 1. Abstract A common approach to back up data stored in a NAS server is to run backup software on a Windows or UNIX systems and back

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

RAID User Guide. Edition. Trademarks V1.0 P/N: 91-187C51GME0-00

RAID User Guide. Edition. Trademarks V1.0 P/N: 91-187C51GME0-00 RAID User Guide Edition V1.0 P/N: 91-187C51GME0-00 Trademarks All brand or product names mentioned are trademarks or registered trademarks of their respective holders. Contents NVIDIA RAID...1 RAID Arrays...1

More information

How to register. Who should attend Services, both internal HP and external

How to register. Who should attend Services, both internal HP and external mm Servicing HP Rack and Tower Server Solutions - Rev 12.31 Course data sheet Certification: Exam(s): The Learning Center: Format: Recommended Duration: How to register HP ATP - Rack and Tower Server Solutions

More information

ESATA PCI CARD. User s Manual

ESATA PCI CARD. User s Manual ESATA PCI CARD User s Manual Introduction... 3 System Requirements... 3 RAID Introduction... 3 BIOS Configuration Utility... 5 Configuring Arrays... 5 RAID Mode Definitions... 5 BIOS Configuration Utility...

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

Best practices for operational excellence (SharePoint Server 2010)

Best practices for operational excellence (SharePoint Server 2010) Best practices for operational excellence (SharePoint Server 2010) Published: May 12, 2011 Microsoft SharePoint Server 2010 is used for a broad set of applications and solutions, either stand-alone or

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

Hands-On Microsoft Windows Server 2008

Hands-On Microsoft Windows Server 2008 Hands-On Microsoft Windows Server 2008 Chapter 9 Server and Network Monitoring Objectives Understand the importance of server monitoring Monitor server services and solve problems with services Use Task

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Windows Server 2008 Essentials. Installation, Deployment and Management

Windows Server 2008 Essentials. Installation, Deployment and Management Windows Server 2008 Essentials Installation, Deployment and Management Windows Server 2008 Essentials First Edition. This ebook is provided for personal use only. Unauthorized use, reproduction and/or

More information

HighPoint Technologies, Inc. Web RAID Management Software (WebGUI)

HighPoint Technologies, Inc. Web RAID Management Software (WebGUI) HighPoint Technologies, Inc. Web RAID Management Software (WebGUI) Table of Contents 1 Array Management... 3 Creating an Array... 3 Deleting an Array... 4 Adding Disk to Array... 5 Verifying an Array...

More information

MCSA Security + Certification Program

MCSA Security + Certification Program MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.

More information

Product Review ControlUp

Product Review ControlUp Product Review ControlUp Februari 2012 Wilco van Bragt Control-UP Page 2 of 15 Introduction While Citrix Resource Manager was not perfect in earlier version of Citrix Presentation Server, many Citrix administrators

More information

Troubleshooting Citrix MetaFrame Procedures

Troubleshooting Citrix MetaFrame Procedures Troubleshooting Citrix MetaFrame Procedures Document name Troubleshooting a Citrix MetaFrame environment v1.0.doc Author Marcel van As Last Revision Date 28 February 2006 Edited and released by: www.dabcc.com

More information

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration

More information

Designing Security for Network Managers

Designing Security for Network Managers 3 Designing Strategies for Security Management............................................... Terms you ll need to understand: Remote desktop administration Telnet Emergency Management Services Software

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Understanding Backup and Recovery Methods

Understanding Backup and Recovery Methods Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore

More information

How to Configure Double-Take on Microsoft Exchange Server

How to Configure Double-Take on Microsoft Exchange Server High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x published August 2002 NSI and Double-Take are registered

More information

Wazza s QuickStart 15. Leopard Server - Disaster Backup

Wazza s QuickStart 15. Leopard Server - Disaster Backup Wazza s QuickStart 15. Leopard Server - Disaster Backup About the Document This document is the 15th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Installation Guide July 2009

Installation Guide July 2009 July 2009 About this guide Edition notice This edition applies to Version 4.0 of the Pivot3 RAIGE Operating System and to any subsequent releases until otherwise indicated in new editions. Notification

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Managing and Supporting Windows XP Chapter #16

Managing and Supporting Windows XP Chapter #16 Managing and Supporting Windows XP Chapter #16 Amy Hissom Key Terms Backup Operator A Windows 2000/XP user account that can back up and restore any files on the system regardless of its having access to

More information

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

TimeIPS Server. IPS256T Virtual Machine. Installation Guide TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision

More information

Advanced Certificate in Networking (Microsoft) G5J9 17. Group Award Requirements

Advanced Certificate in Networking (Microsoft) G5J9 17. Group Award Requirements Advanced Certificate in Networking (Microsoft) G5J9 17 Group Award Requirements Advanced Certificate in Networking (NT4) Professional Development Award (PDA) Advanced Certificate in Networking Group Award

More information

esxreplicator Contents

esxreplicator Contents esxreplicator Contents esxreplicator... 2 Release Notes... 2 Known Issues with this Release... 2 About esxreplicator... 4 Purpose... 4 What is meant by real-time?... 5 Can I Replicate Over a WAN Connection?...

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012 Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x

More information

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

HighPoint RAID Management User s Guide

HighPoint RAID Management User s Guide HighPoint RAID Management User s Guide Revision: 1.0 Date: August 2009 HighPoint Technologies, Inc. HighPoint RAID Management User s Guide 1 - HighPoint RAID Management Utilities (HRM) Installation The

More information

(Exam 70-680): Configuring

(Exam 70-680): Configuring Microsoft MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows? Ian McLean Orin Thomas Contents Introduction Lab Setup Instructions Hardware Requirements Using the DVD xxv How to Install the

More information

Intel RAID Controllers

Intel RAID Controllers Intel RAID Controllers Best Practices White Paper April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial release. Modifications

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

Planning Domain Controller Capacity

Planning Domain Controller Capacity C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a

More information

HP MediaSmart Server Software Upgrade from v.1 to v.3

HP MediaSmart Server Software Upgrade from v.1 to v.3 HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare

More information

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems Fault Tolerance & Reliability CDA 5140 Chapter 3 RAID & Sample Commercial FT Systems - basic concept in these, as with codes, is redundancy to allow system to continue operation even if some components

More information

How To Set Up A Raid On A Hard Disk Drive On A Sasa S964 (Sasa) (Sasa) (Ios) (Tos) And Sas964 S9 64 (Sata) (

How To Set Up A Raid On A Hard Disk Drive On A Sasa S964 (Sasa) (Sasa) (Ios) (Tos) And Sas964 S9 64 (Sata) ( SiS964/SiS180 SATA w/ RAID User s Manual Quick User s Guide Version 0.3 Edition December 2003 Copyright 2003 Silicon Integrated Systems Corp. Trademarks SiS is a registered trademark of Silicon Integrated

More information

SiS964/SiS180 SATA w/ RAID User s Manual. Quick User s Guide. Version 0.3

SiS964/SiS180 SATA w/ RAID User s Manual. Quick User s Guide. Version 0.3 SiS964/SiS180 SATA w/ RAID User s Manual Quick User s Guide Version 0.3 Edition December 2003 Copyright 2003 Silicon Integrated Systems Corp. Trademarks SiS is a registered trademark of Silicon Integrated

More information

: HP HP0-771. Version : R6.1

: HP HP0-771. Version : R6.1 Exam : HP HP0-771 Title : Designing & Implementing HP Enterprise Backup Solutions Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

LearnKey's Windows Server 2003 Managing a Network Environment with Aaron Spurlock

LearnKey's Windows Server 2003 Managing a Network Environment with Aaron Spurlock LearnKey's Windows Server 2003 Managing a Network Environment with Aaron Spurlock Syllabus Course Description 5 Sessions - 15 Hours of Interactive Training The Windows Server 2003 Managing a Network Environment

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Maintenance Best Practices for Adaptec RAID Solutions

Maintenance Best Practices for Adaptec RAID Solutions Maintenance Best Practices for Adaptec RAID Solutions Note: This document is intended to provide insight into the best practices for routine maintenance of Adaptec RAID systems. These maintenance best

More information

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted

More information

Block1. Block2. Block3. Block3 Striping

Block1. Block2. Block3. Block3 Striping Introduction to RI Team members: 電 機 一 94901150 王 麒 鈞, 電 機 一 94901151 吳 炫 逸, 電 機 一 94901154 孫 維 隆. Motivation Gosh, my hard disk is broken again, and my computer can t boot normally. I even have no chance

More information