WINTELSlide Created by,Anandharaj.JEmail id:anandharaj007@ymail.com
MINIMUM            MAXIMUM   RECOMMENDATEDRAM          64 MB              4 GB      128MBPROCESSOR    233 MHZ             ...
A PEER-TO-PEER COMPUTER NETWORK ISCALLED AS WORKGROUP.IS ONLY PREPARED BY CLIENT O.S.
SERVER          SWITCH/HUBWORK-                  WORK-STATION                STATION
WEB       STANDARD   ENTERPRISE DATA           EDITION   EDITION    EDITION    CENTRE                                     ...
ACTIVE DIRECTORY
Understanding Active Directory inWindows Server 2003
Contents   Active Directory   Features of Active Directory   Active Directory Logical Components   Active Directory Ph...
What Is Active Directory?                          Active DirectoryDirectory service                   Centralized managem...
Features   Store Information   Use DNS   Authentication and Authorization   Group policies   Replication
SINGLE POINT OF AUTHENTICATION  Before directory services                                          Server1                ...
Active Directory Logical Components     Domains     Trees     Forests     Organizational Units
Domains   Logical partition in Active Directory database   Collections of users, computers, groups, and so on   Manage ...
TREES , FOREST AND OU       Forest root     and tree root                                 ou   Domain tree                ...
Active Directory Physical Components   Domain Controllers   Sites
Domain Controllers   Writable copy of the AD database   Domain controllers provide authentication and    authorization s...
Sites   Collection of well connected ip subnets   Areas of “fast” network connectivity   Single site may contain many  ...
Global catalog     Global catalog The global catalog is a domain    controller that contains attributes for every object  ...
Flexible Single Master Operations   Most operations in Active Directory are multi-master,    meaning that any domain cont...
DOMAIN NAME SYSTEM
TABLE OF CONTENTS   Overview of DNS   DNS Responsibilities   DNS Delegation   DNS Queries   Root Hints & Forwarders ...
What is DNS?   Internet Protocol   Distributed database   Maps hierarchically organized keys to values     E.g. host n...
DNS Namespace                                 .(   root)       com    mil    org   edu    gov         net    arpa        u...
DNS Responsibilities   DNS Database is distributed       No one server is responsible for the whole namespace   Given n...
Delegation of Authority        Each primary and secondary name server is authoritative         for its domain. For exampl...
DNS Queries DNS is having two types queries : -  Recursive Queries  Iterative Queries
Recursive Queries        A recursive query is one where the DNS server        will fully answer the query or give an erro...
Iterative Queries   The response to an iterative query can be either the    name resolution that the client requested or ...
DNS Queries
Root hints and Forwarders   Root hints table provides IP addresses of name servers    for root domain     Starting point...
Name servers   A name server may be authoritative for more than one    zone   Should be a minimum of two name servers fo...
Active Directory IntegrationForward Lookup Zones      Stores all Resource Records for Zone      Translates FQDN into IP ...
Active Directory IntegrationReverse Lookup Zones         Stores all PTR records for Zone         Resolves IP Addresses t...
Installing and Managing DNSDNS Resource Records        Start of Authority (SOA)        Name Server (NS)        Host (A)...
Advantages of chosen AD DNS Setup   Main DNS remains secure   Host names controlled at central level   Client configura...
Disadvantages of chosen AD DNS Setup   DNS queries carry no information about the client that    triggered the name resol...
Installing and Managing DNSInstallation Wizard        Simplifies Configuration of Server Roles        Installs Only Requ...
Steps to Configure DNS onSubsequent Domain Controllers   Ensure the DNS setup on first DC is correct and working before  ...
Problem Expected in D-2-D Operations      Name Resolving      network connectivity      The scope of the problem      ...
DNS Server Monitoring Tool
Monitor DNS Server       Applications Manager provides in-        depth availability and performance monitoring of       ...
Daily checklist       Ensure that the operating system is properly working & is        in the domain.       Ensure that ...
SUMMARY      Name resolution is a process of converting a       computer name of address.      AD services requires DNS ...
Dynamic Host Configuration     Protocol (DHCP)
Objectives•   Outline the benefits of using DHCP•   Describe the DHCP lease and renewal process•   Install and authorize t...
What is DHCP?•   It stands for Dynamic Host Configuration Protocol•   DHCP automatically assign the IP address to the    c...
How to assign IP address to a computer?
Leasing an IP Address•   An IP address is leased during the boot process•   Default lease period is 8 days•   Maximum leas...
DORA Process•   DORA process means       DHCP DISCOVER       DHCP OFFER       DHCP REQUEST       DHCP ACK
Simple network                                                                    DHCP Server DHCP Clients           DHCP ...
DHCP Message Types DHCP Message                                  Use  DHCPDISCOVER   Client broadcast to locate available ...
Leasing an IP Address (continued)78
Renewing an IP Address    The IP address can either be permanent or timed    A permanent address is never reused for ano...
Renewing an IP Address (continued)80
Installation of DHCP•   Install DHCP on Windows Server 2003•   Make sure your network connection is statically    configur...
Installing DHCP service
Authorizing the DHCP Service
Authorizing the DHCP Service•   Unauthorized DHCP servers can hand out bad    information•   DHCP will not start unless au...
Creating a Scope•   Create a scope to distribute IP addresses to client    computers•   Manually enter the IP configuratio...
Configuring DHCP Scope•   Scope is a range of IP address•   Each scope is configured with:    •   Description    •   Start...
Configuring DHCP Scope
Configuring DHCP Scope•   Create a scope to distribute IP addresses to client    computers•   Manually enter the IP config...
Types of Scope •   Super Scopes •   Multicast Scopes
Super scopes•   It is a collection of individual scope•   Combine two scopes into a single logical unit using a    super s...
Super scopes
Multicast scopes•   It is used to deliver multicast address to a group of    computers•   It is defined by using the follo...
Creating DHCP Reservations•   Reservations are used to hand out a specific IP address to    a particular client•   Reserva...
Vendor and User classes   Used to differentiate between clients within a scope   Vendor classes are based on the operati...
Configuring Relay agents   DHCP packets cannot travel across a router   A relay agent is necessary in order to have a si...
Configuring DHCP Relay
Wintel vs. Unix
Comparison between Wintel and Unix                                  Wintel                            UnixEase of Use     ...
Comparison between Wintel and Unix(cont…)                                Wintel                        UnixReliability    ...
Comparison between Wintel and Unix(con…)                             Wintel                                UnixSoftware co...
Comparison between Wintel and Unix(con…)                                 Wintel                            UnixSecurity   ...
Advantage of Wintel and Unix             Wintel                                          UnixLots of software and games a...
Disadvantage of Wintel and Unix               Wintel                                  UnixVery bloated with many features...
ConclusionThe best way to choose between UNIX and windows is todetermine organizational needs. If an organization uses mos...
Windows Monitoring Tools
Microsoft having it’s own tools for monitoring     servers1.    Microsoft Operation Manager2.    Microsoft System Center O...
Microsoft Operations Manager   It helps improve the    availability, performance, and security of Windows ne    tworks an...
MOM 2005 helps:-1. Simplify identification of issues2. Streamlines the process for determining the root   cause of the pro...
Microsoft System Center OperationManager•   Operations Manager helps you to monitor your    infrastructure, applications, ...
Provides alerts generated according to some avail ability,performance, configuration or security situation beingidentified...
?Questions
THANK YOU
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Wintel
Upcoming SlideShare
Loading in...5
×

Wintel

765

Published on

This is about full information on win-tel...u can learn basics about windows and server maintenance...


Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
765
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
81
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Wintel"

  1. 1. WINTELSlide Created by,Anandharaj.JEmail id:anandharaj007@ymail.com
  2. 2. MINIMUM MAXIMUM RECOMMENDATEDRAM 64 MB 4 GB 128MBPROCESSOR 233 MHZ SPEEDHARD DISK 1.5 GB TO 2 GB 2 GB FREE SPACE FREE SPACEDISPLAY 800 * 640 PIXELSRESOLUTION
  3. 3. A PEER-TO-PEER COMPUTER NETWORK ISCALLED AS WORKGROUP.IS ONLY PREPARED BY CLIENT O.S.
  4. 4. SERVER SWITCH/HUBWORK- WORK-STATION STATION
  5. 5. WEB STANDARD ENTERPRISE DATA EDITION EDITION EDITION CENTRE EDITIONCPU 133MHZ – 133MHZ- 133MHZ- 400MHZ- 550 MHZ 550MHZ 733MHZ 733MHZRAM 128MB- 128MB- 128MB- 512MB- 256MB 256MB 256MB 1GBHARDDISK 1.5GB 1.5GB 1.5GB- 1.5GB-SPACE 2GB 2GB
  6. 6. ACTIVE DIRECTORY
  7. 7. Understanding Active Directory inWindows Server 2003
  8. 8. Contents Active Directory Features of Active Directory Active Directory Logical Components Active Directory Physical Components FSMO Roles
  9. 9. What Is Active Directory? Active DirectoryDirectory service Centralized managementfunctionality Organize Single point of Manage Resources administration Control
  10. 10. Features Store Information Use DNS Authentication and Authorization Group policies Replication
  11. 11. SINGLE POINT OF AUTHENTICATION Before directory services Server1 Server2 Server3 After directory services Active Directory Single sign-on
  12. 12. Active Directory Logical Components  Domains  Trees  Forests  Organizational Units
  13. 13. Domains Logical partition in Active Directory database Collections of users, computers, groups, and so on Manage objects Replication Windows 2000 or Windows Server 2003 Domain
  14. 14. TREES , FOREST AND OU Forest root and tree root ou Domain tree root parent ou HP .com MPHASIS .com child child . west HP .com . east HP.com39
  15. 15. Active Directory Physical Components Domain Controllers Sites
  16. 16. Domain Controllers Writable copy of the AD database Domain controllers provide authentication and authorization services Domain controllers replicate directory partitions Every domain controller in the forest has a replica of schema and configuration partition
  17. 17. Sites Collection of well connected ip subnets Areas of “fast” network connectivity Single site may contain many domains Single domain may span many sites Domain Site Domain controllers are associated with a given site
  18. 18. Global catalog Global catalog The global catalog is a domain controller that contains attributes for every object in the Active Directory. The commonly used attributes need in queries, such as a users first and last name, and logon name. All the information or records which are important to determine the location of any object in the directory. All the access related permissions for every object and attribute that is stored in the global
  19. 19. Flexible Single Master Operations Most operations in Active Directory are multi-master, meaning that any domain controller can write to the Active Directory database Some functionality must not be performed in multi- master fashion, so five single master operations roles are defined in Active Directory:  Schema master  Domain naming master  RID master  PDC emulator  Infrastructure master
  20. 20. DOMAIN NAME SYSTEM
  21. 21. TABLE OF CONTENTS Overview of DNS DNS Responsibilities DNS Delegation DNS Queries Root Hints & Forwarders DNS zones DNS Resource Record Advantage & Disadvantages Of DNS Installation Of DNS Configuration Of DNS Server to Client Summary
  22. 22. What is DNS? Internet Protocol Distributed database Maps hierarchically organized keys to values  E.g. host name to IP address  Mailer records Name space
  23. 23. DNS Namespace .( root) com mil org edu gov net arpa uk fr3com dell ati co ac ox ic oucs bnc chem
  24. 24. DNS Responsibilities DNS Database is distributed  No one server is responsible for the whole namespace Given name server is responsible for part of the namespace  Called a zone  Server is “authoritative” for the zone
  25. 25. Delegation of Authority  Each primary and secondary name server is authoritative for its domain. For example, if a DNS server contains the zone files for the Contoso.com domain, that server is the authoritative name server for that domain.  The authoritative name server, the server will not forward any queries about hosts in that zone to any other DNS server.
  26. 26. DNS Queries DNS is having two types queries : -  Recursive Queries  Iterative Queries
  27. 27. Recursive Queries  A recursive query is one where the DNS server will fully answer the query or give an error. DNS servers are not required to support recursive queries and both the resolver or another DNS acting recursively on behalf of another resolver negotiate use of recursive service using bits in the query headers.
  28. 28. Iterative Queries The response to an iterative query can be either the name resolution that the client requested or a referral to another DNS server that might be able to fulfill the request. In our example, the ISP’s DNS server sends an iterative query to a root server asking for the IP address for www.NAmerica.Contoso.com.
  29. 29. DNS Queries
  30. 30. Root hints and Forwarders Root hints table provides IP addresses of name servers for root domain  Starting point for iterative queries DNS server can be configured as forwarder  Queries for information about which it is not authoritative forwarded to other name servers.
  31. 31. Name servers A name server may be authoritative for more than one zone Should be a minimum of two name servers for a zone  One server is primary  “Start of authority” for zone  maintains a zone file which has information about the zone. Updates are made to the primary server  Others are secondarys  Updates to primary are replicated to secondarys (zone transfer) Stubs zones can be delegated to other name servers
  32. 32. Active Directory IntegrationForward Lookup Zones  Stores all Resource Records for Zone  Translates FQDN into IP Addresses  Required by AD to locate Services
  33. 33. Active Directory IntegrationReverse Lookup Zones  Stores all PTR records for Zone  Resolves IP Addresses to FQDN  Application Security
  34. 34. Installing and Managing DNSDNS Resource Records  Start of Authority (SOA)  Name Server (NS)  Host (A)  Alias (CNAME)  Mail Exchanger (MX)  Pointer (PTR)  Service Location (SRV)
  35. 35. Advantages of chosen AD DNS Setup Main DNS remains secure Host names controlled at central level Client configuration remains unchanged Only main DNS servers visible outside firewall Allows dynamic DNS for DCs  DCs need this most Can use Active Directory integrated zones  More secure  Multi master replication
  36. 36. Disadvantages of chosen AD DNS Setup DNS queries carry no information about the client that triggered the name resolution. Ability to handle names does not increase with availability of content.
  37. 37. Installing and Managing DNSInstallation Wizard  Simplifies Configuration of Server Roles  Installs Only Required Components  Ensures Secure Configuration
  38. 38. Steps to Configure DNS onSubsequent Domain Controllers Ensure the DNS setup on first DC is correct and working before installing other DCs Disable secure updates for all sub domains on first DC Ensure new server is configured to use only the first DC as DNS server in its TCP/IP configuration Promote server to domain controller Make sure that its entries are registered in DNS Enable secure updates for sub domains on first DC If desired, install DNS on new DC  Set as its own DNS server in TCP/IP config
  39. 39. Problem Expected in D-2-D Operations  Name Resolving  network connectivity  The scope of the problem  Try pinging a host Error  SRV , CNAME & Host file
  40. 40. DNS Server Monitoring Tool
  41. 41. Monitor DNS Server  Applications Manager provides in- depth availability and performance monitoring of DNS (Domain Name System). It also monitors individual attribute of DNS monitor such as Response Time, Record Type, Record Available, Search Field, Search Value, Search Value Status and Search Time.
  42. 42. Daily checklist  Ensure that the operating system is properly working & is in the domain.  Ensure that administrator account is well protected.  Ensure that the DNS machine has been configured so that no other service other than DNS is running.  Identify domains to be load balanced  Ensure delegate of sub domain on the primary DNS for use by the DNS Controller.  Ensure that all default shares have been unshared on that machine and that no anonymous access to the services is allowed.  Ensure that all unused ports are closed.
  43. 43. SUMMARY  Name resolution is a process of converting a computer name of address.  AD services requires DNS to function on the network.  Types of zones: Primary , secondary & stub zone.  AD integrated DNS services offers a more efficient & secure zone than a traditional DNS server.  Zone transfer occurs in traditional DNS zones.  Zone replication occurs in AD integrated zones
  44. 44. Dynamic Host Configuration Protocol (DHCP)
  45. 45. Objectives• Outline the benefits of using DHCP• Describe the DHCP lease and renewal process• Install and authorize the DHCP service• Configure DHCP scopes• Create DHCP reservations for client computers• Configure DHCP options• Understand and describe the purpose of a DHCP relay• Install and configure a DHCP relay
  46. 46. What is DHCP?• It stands for Dynamic Host Configuration Protocol• DHCP automatically assign the IP address to the computer• The ipconfig /all command will indicate whether the configuration came from a DHCP server computer
  47. 47. How to assign IP address to a computer?
  48. 48. Leasing an IP Address• An IP address is leased during the boot process• Default lease period is 8 days• Maximum lease period is 999 days• Leasing an IP address is performed by DORA process
  49. 49. DORA Process• DORA process means  DHCP DISCOVER  DHCP OFFER  DHCP REQUEST  DHCP ACK
  50. 50. Simple network DHCP Server DHCP Clients DHCP Clients DHCP Server DHCP protocol is a mainly 4-step process: Hello Mr. Server, I need to connect to the UDP Port UDP Port UDP Port DHCP server discover UDP Port Internet, could you be kind 68 68 68 67 Okme up with an IP in dude, I got some Broadcast to hook address?pool of address, I my lend you it. Check it out? DHCP server offer Your IP : 123.45.78.6 Thank you Mr. Server, I Router like your offer. I will use DHCP request it. Unicast You’re welcome, here is your configuration but DHCP acknowledge it’s only for 3 days. Internet 76
  51. 51. DHCP Message Types DHCP Message Use DHCPDISCOVER Client broadcast to locate available servers DHCPOFFER Server to client response offering configuration parameters DHCPREQUEST Client broadcast requesting offered parameters DHCPDECLINE Client to server notification that IP address is in use DHCPACK Server to client response confirming a request DHCPNAK Server to client response denying a request DHCPRELEASE Client to server request to relinquish IP address DHCPINFORM Client to server request for configuration parameters 77
  52. 52. Leasing an IP Address (continued)78
  53. 53. Renewing an IP Address The IP address can either be permanent or timed A permanent address is never reused for another client Timed leases expire after a certain amount of time Windows clients attempt to renew their lease after 50% of the lease time has expired A DHCP server may either honor or reject a renew request 79
  54. 54. Renewing an IP Address (continued)80
  55. 55. Installation of DHCP• Install DHCP on Windows Server 2003• Make sure your network connection is statically configured• Install the service using the Add/Remove Windows Components utility
  56. 56. Installing DHCP service
  57. 57. Authorizing the DHCP Service
  58. 58. Authorizing the DHCP Service• Unauthorized DHCP servers can hand out bad information• DHCP will not start unless authorized• If Active Directory is used, authorization takes place in Active Directory• DHCP servers are automatically authorized under certain conditions
  59. 59. Creating a Scope• Create a scope to distribute IP addresses to client computers• Manually enter the IP configuration settings as directed by the text• Create a new scope using the configuration settings provided
  60. 60. Configuring DHCP Scope• Scope is a range of IP address• Each scope is configured with: • Description • Starting IP address • Ending IP address • Subnet mask • Exclusions Range • Lease duration
  61. 61. Configuring DHCP Scope
  62. 62. Configuring DHCP Scope• Create a scope to distribute IP addresses to client computers• Manually enter the IP configuration settings as directed by the text• Create a new scope using the configuration settings provided
  63. 63. Types of Scope • Super Scopes • Multicast Scopes
  64. 64. Super scopes• It is a collection of individual scope• Combine two scopes into a single logical unit using a super scopes• First, create a second scope in addition to the scope already created in a previous activity• Create a super scopes to encompass the two scopes• Use the DHCP snap-in for this activity
  65. 65. Super scopes
  66. 66. Multicast scopes• It is used to deliver multicast address to a group of computers• It is defined by using the following parameters • Starting IP address • Ending IP address • TTL • Exclusions • Lease duration
  67. 67. Creating DHCP Reservations• Reservations are used to hand out a specific IP address to a particular client• Reservations are created based on MAC addresses
  68. 68. Vendor and User classes Used to differentiate between clients within a scope Vendor classes are based on the operating system User classes are defined based on network connectivity or the administrator You can use the ipconfig /setclassid command to set the DHCP user class ID
  69. 69. Configuring Relay agents DHCP packets cannot travel across a router A relay agent is necessary in order to have a single DHCP server handle all leases Relay agents receive broadcast DHCP packets and forward them as unicast packets to a DHCP server The DHCP relay cannot be installed on the same server as the DHCP service
  70. 70. Configuring DHCP Relay
  71. 71. Wintel vs. Unix
  72. 72. Comparison between Wintel and Unix Wintel UnixEase of Use Microsoft has made several Although the majority Linux advancements and changes that variants have improved have made it a much easier to dramatically in ease of use, use operating system, and Windows is still much easier to although arguably it may not be use for new computer users. the easiest operating system, it is still Easier than Linux.Open source Microsoft Windows is not open Many of the Linux variants and source and the majority of many Linux programs are open Windows programs are not open source and enable users to source. customize or modify the code however they wish to.
  73. 73. Comparison between Wintel and Unix(cont…) Wintel UnixReliability Although Microsoft Windows has The majority of Linux variants made great improvements in and versions are notoriously reliability over the last few reliable and can often run for versions of Windows, it still months and years without cannot match the reliability of needing to be rebooted. Linux.Software Because of the large amount of Linux has a large variety of Microsoft Windows users, there is available software programs and a much larger selection of utilities. However, Windows has available software programs, a much larger selection of utilities, and games for Windows. available software.
  74. 74. Comparison between Wintel and Unix(con…) Wintel UnixSoftware cost Although Windows does have Many of the available software software programs, utilities, and programs and utilities available on games for free, the majority of Linux are freeware and/or open the software the costs can be source. Even such complex considerable programs such as Gimp, Open Office, Star Office, and wine are available for free or at a low cost.Hardware Because of the amount of Linux companies and hardware Microsoft Windows users and manufacturers have made great the broader driver support, advancements in hardware support Windows has a much larger for Linux and today Linux will support for hardware devices support most hardware devices. and a good majority of hardware However, many companies still do manufacturers will support their not offer drivers or support for products in Microsoft Windows. their hardware in Linux.
  75. 75. Comparison between Wintel and Unix(con…) Wintel UnixSecurity Although Microsoft has made Linux is and has always been a great improvements over the years very secure operating system. with security on their operating Although it still can be attacked system, their operating system when compared to Windows, it continues to be the most much more secure. vulnerable to viruses and other attacks.Support Microsoft Windows includes its Although it may be more own help section, has vast amount difficult to find users familiar of available online documentation with all Linux variants, there and help, as well as books on each are vast amounts of available of the versions of Windows. online documentation and help, available books, and support available for Linux.
  76. 76. Advantage of Wintel and Unix Wintel UnixLots of software and games are developed for More control and flexibility.windows. Unix has greater built-in security andWindows is user friendly. permissions features than Windows.Simply stated, the main difference is Unix possesses much greater processingWindows uses a GUI (Graphical User power than Windows.Interface) and UNIX does not. In Windows oneuses the click of a mouse to execute a less administration and maintenance.command where as in UNIX one must type in acommand. Unix is more flexible and can be installed on many different types of machines, includingWindows can often more easily be installed main-frame computers, supercomputers andand configured to run on cheaper hardware to micro-computers.run a desired 3rd party product.Windows hosting is more easily madecompatible with UNIX-based programming
  77. 77. Disadvantage of Wintel and Unix Wintel UnixVery bloated with many features most Front Page Extensionspeople dont use, thus slowing down the If you are using Microsoft Front Page to developcomputer and takes excessive hard drive your website, you will need to make sure that yourspace. However this shouldnt be much of a Unix host offers Front Page extensions. If you don’tproblem with newer computers. have these extensions, you will not be able to use Front Page to its complete abilities. Most UnixThere are many viruses programmed for based hosts are now offering these extensions, butwindows. there are still several that do not. No .ASPCan get a little pricey. If you plan to use Active Server Pages or .ASP for your website, you will not be able to use thisWintel has lower built-in security and language on a Unix server. Since this scriptingpermissions features than Unix language is gaining in popularity, this can be a tremendous downside if you select a Unix basedUnix possesses much greater processing host.power than Windows. No Visual Basic Like .ASP, Visual Basic is not supported on Unix based hosting, so again, if you plan to use this, or
  78. 78. ConclusionThe best way to choose between UNIX and windows is todetermine organizational needs. If an organization uses mostlyMicrosoft products, such as access, front page, or vbscripts, itsprobably better to stick with windows.
  79. 79. Windows Monitoring Tools
  80. 80. Microsoft having it’s own tools for monitoring servers1. Microsoft Operation Manager2. Microsoft System Center Operation Manager
  81. 81. Microsoft Operations Manager It helps improve the availability, performance, and security of Windows ne tworks and applications. provides event-driven operations monitoring, performance tracking, security policy enforcement, and auditing capability.
  82. 82. MOM 2005 helps:-1. Simplify identification of issues2. Streamlines the process for determining the root cause of the problem3. Facilitates quick resolution to restore services and toprevent potential IT problems.
  83. 83. Microsoft System Center OperationManager• Operations Manager helps you to monitor your infrastructure, applications, and IT services, and to react to operational problems.• Shows state, health and performance information of computer systems.
  84. 84. Provides alerts generated according to some avail ability,performance, configuration or security situation beingidentified.It places an agent, on the computer to be monitored.The agent watches several sources on that computer,including the Windows Event Log, for specific eventsor alerts generated by the applications executing on themonitored computer.
  85. 85. ?Questions
  86. 86. THANK YOU
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×