Files, Folders, and Shares
|
|
- Jean Mosley
- 7 years ago
- Views:
Transcription
1 Files, Folders, and Shares One of the core functions of any server is to serve resources such as files and folders. In Windows Server 2008 R2, File Services is one of the key roles you can add. If you plan on sharing files and folders, it s important that you understand not only how to share the data but also how to protect it with permissions including both New Technology File System (NTFS) and share permissions. Although both sets of permissions work independently, they also interact with each other. 1
2 UNDERSTANDING THE FILE SERVICES ROLE The core component of any server is its ability to share files. Sharing resources means that you allow your users to access those resources from the network. No real processing goes into it as far as the server is concerned; it just hands out files and folders as they are. ADDING ROLE SERVICES 2
3 Server Manager includes several consoles that can be used to manage the different server roles including the File Services role. The File Services role includes several additional role services: File Server This is the primary role service required to support the File Services role. It is automatically added when a folder is shared. Distributed File System (DFS) DFS includes both DFS Replication and DFS Namespaces and is covered later. File Server Resource Manager (FSRM) The FSRM provides a rich set of additional tools that can be used to manage the storage of data on the server including configuring quotas, and generating storage reports. The File Services role includes several additional role services: Services for Network File System (NFS) This service enables you to grant access to files from Unix client computers. Windows Search Service The Windows Search Service uses indexing to perform quicker file searches. Windows Server 2003 File Services This includes the Indexing Service for backward compatibility with Windows Server 2003 File Services. 3
4 The File Services role includes several additional role services: BranchCache for Network Files BranchCache can be used in a multiple site environment to allow computers in branch offices to cache commonly downloaded files. BranchCache needs to be enabled on the shared folder. ADDING THE FILE SERVICES ROLE For this lab, take a linked clone of Server 2008, add in an extra hard drive (to be used for file shares) Set up a partition on the Drive using disk manager 4
5 You can add the File Services role by following these steps: Launch Server Manager by selecting Start Administrative Tools Server Manager. Select Roles, and click the Add Roles link. This image cannot currently be displayed. Review the information on the Before You Begin page, and click Next. Select the File Services role, and click Next. 5
6 Review the information on the Introduction to File Services page, and click Next. On the Select Role Services page, select the following role services File Server, File Server Resource Manager, and BranchCache for network files. Click Next. The Configure Storage Usage Monitoring page is used to identify which volumes you want to monitor. The File Server Resource Manager can monitor and generate storage reports on any volumes you choose to monitor. 6
7 Select the volume that you plan on using to share data. Select the second volume and Click Next. The Set Report Options page allows you to specify a location for storage reports. You can either accept the default location or browse to another location. You can also configure the reports to be ed if you have an SMTP server available to send the reports. For now, accept the default location, and click Next. 7
8 Review the information on the Confirmation page, and click Install. After a moment, the file services will be installed. Click Close. At this point, Server Manager includes the File Services role. Open Server Manager if it is not already open, It includes the Share and Storage Management node and several selections under the File Server Resource Manager 8
9 If you expand down to Share and Storage Management, the shared resources will be displayed Admin$ Windows Dir Inter Process Communication (IPC) share A network share on computers running Microsoft Windows. This share is used to facilitate communication between processes and computers, often to exchange authentication data between computers. CREATING SHARES There are several methods of creating shares First we will examine creating shares via server manager Once a share is created, it can be published to Active Directory to make it easy for users to locate the share. 9
10 CREATING SHARES WITH SERVER MANAGER The Share and Storage Management node includes a Provision a Shared Folder Wizard that you can use by following these steps: Launch Server Manager by selecting Start Administrative Tools Server Manager. Browse to the Roles File Services Share and Storage Management node, right click Share and Storage Management, and select Provision Share. 10
11 On the Shared Folder Location page, click Browse. Browse to a folder you want to share. You can create folders also in here Create a folder called Sales Click OK after browsing to and selecting a folder. Click Next. The provision storage button allows you to set up available free unallocated drive space. 11
12 The NTFS Permissions page gives you an opportunity to change the NTFS permissions if desired. Next to accept the NTFS permissions. On the Share Protocols page, you identify the protocols used to access the share and can also give the share a different share name. SMB is the primary protocol used by Windows clients to connect, and when this is selected, it allows both SMB version 1 and SMB version 2 depending on the client s capabilities. If you added NFS support for Unix clients, you could select NFS here. Accept the default of SMB, and click Next. The SMB Settings page allows you to manipulate some of the advanced settings by clicking the Advanced button. The User Limit option is set to Maximum Allowed by default, but you can limit it to a specific number of connections if desired. The Access based Enumeration setting is related to DFS and is disabled if the DFS role service isn t added. Offline Settings affects Offline Folders Click Next. 12
13 On the SMB Permissions page, you have the opportunity to change the default share permissions. By default, the Everyone group is granted Read access to the share. The Quota Policy page allows you to apply quotas to the share. If you wanted to ensure users were limited to no more than 100MB of storage space, you could create a quota policy to enforce the limit. The File Screen Policy page allows you to apply a file screen that can be used to monitor or block specific types of files from being saved on the share. You may want to ensure that users didn t store any audio and video files on the server, you could select the Block Audio and Video Files file screen. Click Next 13
14 If you re using DFS, you can publish an SMB share to a DFS namespace. Review the settings you ve selected, and click Create. After a moment, the wizard will complete the creation of the share and indicate success. Click Close. 14
15 PUBLISHING SHARES IN ACTIVE DIRECTORY The primary reason to publish a share to Active Directory is to allow users to easily find it. To publish a share, you need to be in the Active Directory Users and Computers Management Console. The share needs to have been created previously prior to publishing Right click the organizational unit of choice, and select New Shared Folder. 15
16 From there, you ll be asked to provide a name for this publication of the share and, of course, the actual share name. The share will then appear in ADUC Searching Active Directory If a client is a member of a domain, the Search Active Directory command appears on the Network console. You can launch Network by selecting Start Network on Windows Server 2008 R2. 16
17 MANAGING PERMISSIONS One of the great strengths of both NTFS formatted drives and shares is the ability to assign permissions and control who can access different files and folders. There are many similarities between NTFS and share permissions NTFS PERMISSIONS 17
18 NTFS permissions apply to any file or folder on a disk that has been formatted with NTFS. Read When a user is assigned Read permission, the user is allowed to view the contents, permissions, and attributes associated with a file or folder. Read and Execute The Read and Execute permission is used to grant permission for a user to execute files. If a user has only Read permission, and not Read and Execute, the files can t be executed. List Folder Contents The List Folder Contents permission allows a user to view the contents of a folder. It will allow a user to see that files exist in a folder, but will not apply Read permissions to those files. Write If a user is assigned Write permission to a file or folder, the user can modify the file or folder. This includes adding new files or folders to a folder or making changes to existing files or folders. However, it does not include deleting files from a folder. Modify Modify includes all of the permissions from Read, Read & Execute, and Change, and adds the ability to delete files and folders. Full Control Full Control is a combination of all the available permissions. It adds the ability to change permissions and take ownership of files or folders. SHARE PERMISSIONS Share permissions only apply to shares when they are accessed over the network. There are only three share permissions. Read Users granted Read permission can read files and folders within the share. Change Users granted Change permission can read, execute, modify, and delete files and folders within the share. Full Control Users granted Full Control permission have all the permissions from Change, and can also modify permissions on the share. 18
19 ASSIGNING ALLOW OR DENY If the permission is set to Allow for a user or group, the user or group has this permission. If the permission is set to Deny for a user or group, the user or group will not have the permission. Permissions are cumulative. If a user has multiple Allow permissions assigned (such as allow Read and Allow Change), the user has a combination of the assigned permissions. If both Allow and Deny permissions are assigned for a user, deny takes precedence. If there aren t any permissions assigned to a user, then the user does not have access to the object. This is referred to as an implicit deny. Both share permissions and NTFS permissions use the discretionary access control (DAC) model to control access. Each object has a discretionary access control list (DACL; pronounced as dackel ). The DACL is a list of access control entries (ACEs). Each ACE identifies a user or a group with their associated security identifier (SID) and Allow or Deny permission. 19
20 If multiple permissions apply to a user, the user has the combination of all the permissions. Deny Takes Precedence If both Allow and Deny for any permission are assigned to a user, Deny takes precedence. Implicit Deny If permissions aren t explicitly granted, they are implicitly denied. Anyone who is not given access, but also is not restricted access does not get any access by default, this is implicit deny 20
21 MODIFYING SHARE AND NTFS PERMISSIONS You can modify both the share and NTFS permissions using Server Manager, Computer Management, or Windows Explorer. Launch Server Manager, and browse to Roles File Services Share and Storage Management. 21
22 Right click the share, and select Properties. Click the Permissions tab, and then click the Share Permissions Tab. Choose either Share or NTFS permissions 22
23 Clicking on one of the buttons will open the relevant permissions (share or NTFS) accordingly Combining Share and NTFS Permissions Identifying permissions can be hard, keep it simple with these three steps: Determine the cumulative NTFS permissions. Determine the cumulative share permissions. Determine which of the two provides the least access (commonly called the most restrictive permission). Connecting to Shares Primarily, you connect to a share using the universal naming convention (UNC) of which follows the following syntax: \\ServerName\ShareName. You can also click Start and in the search box enter \\ServerName (using the server name of any server on your network) followed by a backslash, Once the operating system connects, it retrieves a list of shares available. 23
24 Mapping a drive You can map a drive letter to a share on your network. You can right click either Computer or Network from the Start menu and select Map Network Drive You can also right click on the share if you open up the server via its UNC and right click it and choose Map network drive COMMON SHARES C$, D$, and so on All drives, including CD ROM drives, are given a hidden share to the root of the drive. This share is what is called an administrative share. You cannot change the permissions or properties of these shares Only the Administrators and Backup Operators groups can connect to administrative shares 24
25 ADMIN$ The ADMIN$ share is another administrative share and it maps to the location of the operating system. PRINT$ Whenever you create a shared printer, the system places the drivers in this share. This allows the drivers to be easily downloaded when clients connect to the shared printer. IPC$ The IPC$ share is probably one of the most widely used shares in interserver communications though you will rarely interact with it directly. When you try to access shared resources on other computers (to read event logs, for example), the system uses named pipes. A named pipe is a piece of memory that handles a communication channel between two processes, whether local or remote, IPC$ is used by the named pipes. 25
26 NETLOGON The NETLOGON share is used in conjunction with processing logon requests from users. Once users successfully log in, they are given any profile and script information that they are required to run. SYSVOL The SYSVOL share is used to house Group Policy information and scripts that are accessed by clients on the network. You will always see SYSVOL shares on domain controllers, but they can be replicated to member servers. QUOTAS 26
27 Quotas allow you to monitor and limit the space users can consume on a volume or folder. When creating quotas, you have the ability to set warning limits, set enforcement limits, provide notification of reached limits via or event log entries, and even execute commands in response to any limit. You can use the quota policy to just monitor the usage. To manage Disk Quotas, you use File Services Resource Manager (FSRM), this is available via server manager roles, if you did not install it you can install it from Server manager Microsoft have included several quota templates in File Services Resource Manager (FSRM) that you can easily be applied as is, or you can modify them to fit your needs. You can even create your own templates. 27
28 Quota Types There are two types of quota hard or soft. A hard quota limit will enforce the limit and prevent users from exceeding the limit. A soft quota limit is just used for monitoring; it will provide notification but does not enforce the limit. To view Existing Quotas click Quotas under Quota Management Any existing quotas will be shown Creating a Quota from a template Launch Server Manager, and browse to the Roles File Services Share and Storage Management File Services Resource Manager Quota Management Quota Templates node. 28
29 Right click the 200 MB Limit Reports to User quota template, and select Create Quota from Template. Enter the path or click browse and browse to the folder you want to monitor in the Quota Path text box. View the properties 29
30 Click Create. The Quota will be created Modifying the Quota Select Quotas. Right click your new quota, and select Edit Quota Properties. The edit quota properties page appears 30
31 Select Quotas (right above Quota Templates in the Server Manager navigation tree). Right click your new quota, and select Edit Quota Properties. Change the Space Limit from 200MB to 500MB. Select the Warning (100%) notification threshold, and select Edit. 31
32 Review the information on the E mail Message, Event Log, and Command tabs. You may get a warning message indicating that an SMTP server is not configured Notice that you can modify the data on any of these tabs. The Tab The E mail Message tab allows you to configure an response if the threshold is reached. If you want an sent to an administrator, simply add the administrator s address on this page in the format of account@domain, admins@tombrett.local You can also configure it to send an to the user who exceeded the threshold simply by selecting a box. The templates include a preconfigured subject line and message body, and both can include variables (Source I/O Owner, Quota Path, Server etc.) When you can select any of these variables you can see a short explanation of what it is. 32
33 Event Log Tab You can configure the events to be logged in the Application log if desired. Selecting the Event Log tab and selecting the box to send the warning to the event log. Any events sent from here are logged into the Application log. Command Tab The command tab allows you to run a command or script when the limit is exceeded Report Tab You can configure reports to be generated in response to a threshold and automatically be sent via to administrators and/or the user. Reports can also be created on demand. 33
34 The reports are already configured. The Generate Reports check box is checked, and three reports are configured to be generated: Duplicate Files, Large Files, and Least Recently Accessed Files. Additionally, it s configured to send the report to the user exceeding the threshold. CREATING FILE SCREEN POLICIES File screens are used to filter or screen files to ensure certain types of files aren t stored on a server. You can create a file screen that will block users from saving specific types of files and generate notifications when anyone attempts to save these blocked files on the server. File screens can be created on entire volumes or specific folders, File screens also have templates. 34
35 Launch Server Manager, and browse to the File Screen Templates node. Right click the Block E mail Files template, and select Create File Screen from Template. Enter the volume name that you want to screen (such as C:\sales) in the File Screen Path text box. Click Create. 35
36 Select File Screens (right above File Screen Templates). Right click the new file screen you just created, and select Edit File Screen Properties. you can select either Active Screening or Passive Screening. Since you want to specifically block users from storing the files on the server, leave it as Active Screening. Click through the Message, Event Log, Command, and Report tabs. If a warning appears indicating that an SMTP server is not configured, review the information, and click Yes to continue. These are very similar to the tabs used with quotes. Only the notification content is changed. Click OK once you ve reviewed the tabs. 36
37 GENERATING REPORTS Several different reports are available. You can generate reports as part of any quota policy or file screen policy. You can also configure reports to be generated on a schedule or generate them on demand. The different reports available are Duplicate Files, File Screening Audit, Files by File Group, Files by Owner, Files by Property, Large Files, Least Recently Accessed Files, Most Recently Accessed Files, and Quota Usage. You can also save the reports in several different formats such as DHTML, HTML, XML, CSV, and text. 37
38 ACCESSING REPORTS Launch Server Manager. Right click the Storage Reports Management node within the File Server Resource Manager, and select Generate Reports Now. Click the Add button. 38
39 Browse to a drive or a folder, and click OK. You can add multiple drives and folders. You can select as many reports as you d like to view, if you select them all, be patient; they take some time to generate. Some of the reports have additional parameters that you can modify. if you select the Quota Usage report, you can click the Edit Parameters button and modify the minimum quota usage that will be included in the report. Click the Delivery tab. Notice you can add an address and send the reports via . Click OK. 39
40 Depending on the amount of data in the reports, this could take several minutes to complete. The relevant reports are created You can also schedule reports to run 40
41 The schedule tab appears Click Create schedule The Task Scheduler opens where you can schedule a new task by clicking new 41
42 BITLOCKER BitLocker Drive Encryption is a technology designed to provide protection for entire disk drives. BitLocker To Go is a newer technology that came out with Windows 7 and 2008 server and is designed to allow you to encrypt USB flash drives. Requirements A TPM 1.2 compatible chip Computers which don t have TPM 1.2. There are alternatives that can be used to encrypt drives with BitLocker: Password BitLocker can encrypt the drive, and a password can be used to unlock it. Smart Card BitLocker can encrypt the drive, and a smart card with a PIN can be used to unlock the drive. 42
43 Recovery Key Once TPM detects that it has been moved (or the hardware has been changed), it will lock the drive until the recovery key is used to unlock it. Enabling BitLocker Launch Server Manager. Select Features, and click Add Features. Select the BitLocker Drive Encryption check box Click Install. When prompted, restart your computer to complete the installation. After the reboot, log on. When the installation completes, click Close. Launch the Control Panel, and click System and Security. 43
SHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
More informationGroup Policy 21/05/2013
Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows
More informationEncrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
More informationHow To Manage Hard Disk Partitioning In Windows 8.1.2 (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl
Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not
More informationCreating and Managing Shared Folders
Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file
More information9 Administering Shared Folders
9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders
More informationMicrosoft Virtual Labs. Windows Server 2003 R2: Efficient Storage Management
Microsoft Virtual Labs Windows Server 2003 R2: Efficient Storage Management Table of Contents Windows Server 2003 R2: Efficient Storage Management... 1 Exercise 1 Using the Storage Manager for SANs Snap-in
More informationDIGILIANT Windows Storage Server 2012
DIGILIANT Windows Storage Server 2012 User s Guide Copyright 2012 Digiliant, LLC. All Rights Reserved. This User s Guide is provided AS IS and Digiliant, LLC makes no warranty as to its accuracies or use.
More informationObjectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationDriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationModule 12. Configuring and Managing Storage Technologies. Contents:
Configuring and Managing Storage Technologies 12-1 Module 12 Configuring and Managing Storage Technologies Contents: Lesson 1: Overview of Windows Server 2008 Storage Management 12-3 Lesson 2: Managing
More informationIn order to enable BitLocker, your hard drive must be partitioned in a particular manner.
ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationVirtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More information2. Using Notepad, create a file called c:\demote.txt containing the following information:
Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure
More informationExclaimer Signature Manager 2.0 User Manual
Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How does it Work?... 11 But That's Not All...... 12 And
More informationSymantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
More informationInstalling Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationHyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 / 2012 R2 Hyper-V support...
More informationInstalling the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
More informationVERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
More informationScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide
ScriptLogic Enterprise Security Reporter VERSION 3 Installation Guide ENTERPRISE SECURITY REPORTER 3 INSTALLATION GUIDE II Copyright 2011 by ScriptLogic Corporation All rights reserved. This publication
More informationHow to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationStarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003
StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003 www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationATX Document Manager. User Guide
ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationExclaimer Signature Manager 2.0 User Manual
Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How Does it Work?... 11 But That's Not All...... 12 And
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationEMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2
More informationUser Profile Manager 2.6
User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationHOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
More informationExam 70-411: Administrating Windows Server 2012 R2. Course Overview
Exam 70-411: Administrating Windows Server 2012 R2 Course Overview This course teaches students server deployment and image management, managing servers and updates, file and print services, configuring
More informationBasic Windows 2000/ Windows 2000 Server Installation and Configuration
d229466 Ch01.F 1/22/03 10:03 AM Page 11 CHAPTER 1 Basic Windows 2000/ Windows 2000 Server Installation and Configuration This chapter steps you through the installation process of your Windows-based Tiger
More informationMany home and small office networks exist for no
C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach
More informationHow To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationGFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationModule 11. Configuring and Managing Distributed File System. Contents:
Configuring and Managing Distributed File System 11-1 Module 11 Configuring and Managing Distributed File System Contents: Lesson 1: DFS Overview 11-3 Lesson 2: Configuring DFS Namespaces 11-15 Lesson
More informationGetting Started With Delegated Administration
Getting Started With Delegated Administration Delegated Administration (available with Websense v6.1 Corporate Editions) is a powerful tool for distributing filtering and reporting responsibilities for
More informationFaxCore Ev5 Email-To-Fax Setup Guide
1 FaxCore Ev5 - Email-To-Fax Setup Guide Version 1.0.0 FaxCore Ev5 Email-To-Fax Setup Guide 2 FaxCore Ev5 - Email-To-Fax Setup Guide Contents The Email To Fax Setup Guide... 3 FaxCore Email Integration
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationMCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources
MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationECA IIS Instructions. January 2005
ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate
More informationHyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom
More informationNovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationWorking with Administrative Tools
This final chapter considers a variety of administrative 12 tools and how to use them. Working with Administrative Tools Using Administrative Tools Once you go though Control Panel (assuming you haven
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationAppendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
More informationHow to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
More informationStarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012
StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationHow to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1
Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...
More informationTo install the SMTP service:
To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click
More informationUsing iscsi with BackupAssist. User Guide
User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationBitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationGetting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
More information+27O.557+! RM Auditor Additions - Web Monitor. Contents
RM Auditor Additions - Web Monitor Contents RM Auditor Additions - Web Monitor... 1 Introduction... 2 Installing Web Monitor... 2 Overview... 2 Pre-requisites for installation... 2 Server installation...
More informationMICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)
MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative
More informationActive Directory Software Deployment
APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This
More informationDigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description
More informationNovaBACKUP xsp Version 12.2 Upgrade Guide
NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More informationGFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationWindows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
More informationWindows Server 2003 Logon Scripts Paul Flynn
Creating logon scripts You can use logon scripts to assign tasks that will be performed when a user logs on to a particular computer. The scripts can carry out operating system commands, set system environment
More informationAdministering Windows Server 2012
WINDOWS 2012 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Administering Windows Server 2012 Course Title Administering Windows Server 2012 Course Code 20411D Days / Duration
More informationTeam Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
More informationMicrosoft Exchange 2010 and 2007
Microsoft Exchange 2010 and 2007 Download the server certificate and intermediate certificates. Perform the following procedure for each of the intermediate certificates and then for the server certificate.
More informationMigrating MSDE to Microsoft SQL 2008 R2 Express
How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,
More informationFileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
More informationNetop Remote Control User's Guide. Version 12.20
Netop Remote Control User's Guide Version 12.20 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
More informationInstall SQL Server 2014 Express Edition
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
More informationMigration Strategies and Tools for the HP Print Server Appliance
white paper HP Print Server Appliance 4250 July 2003 Migration Strategies and Tools for the HP Print Server Appliance (Web Jetadmin version 7.2 and above; PSA Firmware version 2.4.x and above) Overview
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationWeb. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
More informationInstalling and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2
Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2 Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 Assumptions...
More informationHow To Install And Configure Windows Server 2003 On A Student Computer
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
More informationExchange Mailbox Protection Whitepaper
Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange
More informationHow to Manage a Windows NT Server Computer Remotely
MCSE Server Enterprise Using Windows NT Server Tools CHAPTER 14 Windows NT Server Tools................. 541 NT Server Tools for Windows 95 Computers........ 541 Installing NT Server tools on a Windows
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationInstallation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
More informationCreating a New Domain Tree in the Forest
Creating Domain Trees and Forests 163 Creating a New Domain Tree in the Forest 1. Open the Active Directory Installation Wizard by clicking Start Run, and typing dcpromo. Click the Use Advanced Mode Installation
More informationImplementing Moodle on a Windows High Availability Environment
Implementing Moodle on a Windows High Availability Environment Implementing Moodle 1.9 on 2 Microsoft Load Balanced Web Front End Server and a Microsoft SQL Server 2008 R2 Cluster environment Written by:
More informationHOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
More informationStarWind iscsi SAN Configuring HA File Server for SMB NAS
Hardware-less VM Storage StarWind iscsi SAN Configuring HA File Server for SMB NAS DATE: FEBRUARY 2012 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind Software
More information