SlideShare a Scribd company logo
1 of 26
Module 7:
Managing Data Storage
Overview


     Managing Data Compression
     Managing Disk Quotas
     Encrypting Data
     Using Disk Defragmenter
     Troubleshooting Data Storage
 Managing Data Compression


     Defining Compressed Files and Folders
     Compressing Files and Folders
     Copying and Moving Compressed Files and Folders
     Best Practices for Managing Data Compression
Defining Compressed Files and Folders
     Files and Folders Have a Compression State
     Windows 2003 Automatically Uncompresses Accessed
      Files
     Space Allocation Based on Uncompressed File Size
     Display Color Designates Compressed Files and Folders

      W             FolderA
                   Compressed


                                  FileA




                                  FileB        NTFS Partition
                                Compressed
More


     Use compression when you need more space on your
      hard-disk drive.
     Compressing files, folders, and programs decrease their
      size and reduces the amount of space they use on
      drives or removable storage device. You can also
      compress disk drives.
More


     Space allocation : when files are copied, NTFS
      calculates disk space based on the size of the
      uncompressed file. This is important because
      files are uncompressed during the copy process
      and the system must be sure there is enough
      space for the uncompressed file. If you copy a
      compressed file to an NTFS partition that does
      not have enough space for the uncompressed
      file, an error message notifies you that there is
      not enough disk space for the file.
Compressing Files and Folders
                                            Advanced Attributes

                                                    Choose the settings you want for this folder
FolderA Properties
                                                    When you apply these changes you will be asked if you
 General Web Sharing Sharing Security
                                                    want the changes to affect all subfolders and files as well.


                  FolderA                       Archive and Index attributes

                                                   Folder is ready for archiving
  Type:           File Folder
                                                   Index contents for fast file searching
  Location:       C:

  Size:           0 bytes                       Compress or Encrypt attributes (mutually exclusive)

  Size on disk:   2.00 KB (2,048 bytes)            Compress contents to save disk space

  Contains:       1 Files, 0 Folders               Encrypt contents to secure data


  Created:        Wednesday, September 16, 1998, 10:44:01 AM                         OK            Cancel


  Attributes:      Read-only                    Advanced...
                   Hidden


                            OK         Cancel         Apply
Copying and Moving Compressed Files and Folders
           NTFS Partition                  NTFS Partition
 A                                     B
                                             Move
            Copy

                   Inherits                    Retains

           NTFS Partition                  NTFS Partition


                            C   Copy
                                                       Inherits

                            D   Move



    No Compression on Non-NTFS Partitions or Floppy Disks
Best Practices for Managing Data Compression


   Determine Which File Types to Compress


   Do Not Compress Already Compressed Files


   Use Different Display Colors for Compressed Files and Folders


   Compress Static Data Rather Than Data That Changes Frequently
 Managing Disk Quotas = quantium


     Defining Disk Quotas
     Using Disk Quotas
     Setting Disk Quotas
     Monitoring Disk Quotas
     Best Practices for Managing Disk Quotas
Defining Disk Quotas


     Usage Calculation Based on File and Folder Ownership
     Compression Ignored When Calculating Usage
     Free Space Reported to Applications Is Based on Quota
     Windows 2003 Tracks Disk Quotas for Each NTFS
      Partition
     Only Available on NTFS Partitions
Using Disk Quotas

           Allocated to User1        Allocated to User2


                      NTFS                     Allocated to User3
                     Partition
                                               Allocated to User4
    Disk 50-MB disk quota
                                               Allocated to User5
   Quota 40-MB warning level




     Set Limits to Control Hard Disk Space Usage
     Monitor Partition Usage on a Per-User Basis
Setting Disk Quotas
                                              Local Disk Properties

                                                    General          Tools           Hardware        Sharing
           Set Quotas for All                       Security                Quota              Web Sharing
            Users
                                                         Status: Disk quota system is active
           Set Quotas for                               Enable quota management
            Individual Users                              Deny disk space to users exceeding quota limit
                                                    Select the default quota limit for new users on this volume:

    Quota Entries for Local Disk (C:)                    Do not limit disk usage

Quota    Edit      View       Help                       Limit disk space to       No Limit
                                                         Set warning level to      No Limit

Status      Name    Logon Name       Amount Used Select the quota Warningoptions forPercent Used
                                                  Quota Limit     logging Level     this volume:
                                                      Log event when a user exceeds their quota limit
   OK               DomainTom              36 MB           50 MB              40 MB                   72
   OK               DomainSue              17MB          Log event when a user exceeds their warning level
                                                            50 MB          40 MB                    34
   Warning          DomainJim              48MB           50 MB            40 MB               96
                                                                                       Quota Entries...
   Above Limit      DomainPeg              52MB           50 MB            40 MB              104
   OK               DomainAdmin           127MB          No Limit        OK Limit Cancel
                                                                           No                  N/A
                                                                                                Apply

5 total item(s), 1 selected
Monitoring Disk Quotas

    Quota Entries for Local Disk (C:)
Quota     Edit    View        Help


 Status    Name     Logon Name       Amount Used   Quota Limit   Warning Level    Percent Used
   OK              DomainTom              36 MB       50 MB            40 MB                 72
   OK              DomainSue              17MB        50 MB            40 MB                 34
   Warning         DomainJim              48MB        50 MB            40 MB                 96
   Above Limit     DomainPeg              52MB        50 MB            40 MB                104
   OK              DomainAdmin           127MB       No Limit         No Limit              N/A
5 total item(s), 1 selected


                                             Status Icons
             - OK               - Exceeds Warning Threshold                - Exceeds Limit
Best Practices for Managing Disk Quotas

   Set Quota Limits for Partitions on Shared Client Computers

   Log On as Administrator to Install Components and Applications

   Generate Disk Usage Information

   Set Restrictive Default Limits; Modify Specific Disk Quota Entries

   Set Quotas on Shared Partitions

   Enable Quotas Before a Partition Is Used

   Delete Quota Entries for Inactive Users
 Encrypting Data


     Defining the Encrypting File System
     Encrypting Files and Folders
     Copying and Moving Encrypted Files and Folders
     Best Practices for Encrypting Data
Defining the Encrypting File System

                                 Encryption
                       Hello



   User                                       *&^1

     Ensures Data
      Security
     Automatic
      Encryption and    Hello
      Decryption
                                      Decryption
Encrypting Files and Folders
                                        Confirm Attribute Changes

 Advanced Attributes                    You have chosen to make the following attribute change(s):

                                                 encrypt
       Choose the settings you want for this folder
       When you apply these changes Do you want to apply this change to this folder only, or do want to
                                        you will be asked if you
       want the changes to affect all subfolders and subfolders and files as well?
                                        apply it to all files as well.

   Archive and Index attributes                   Apply changes to this folder only
      Folder is ready for archiving               Apply changes to this folder, subfolders and files

      Index contents for fast file searching
                                                                                   OK           Cancel
   Compress or Encrypt attributes (mutually exclusive)

      Compress contents to save disk space
      Encrypt contents to secure data


                                        OK          Cancel
Copying and Moving Encrypted Files and Folders

          NTFS Partition                          NTFS Partition
                           Move

          Move                           Move
                            *&^1                          *&^1
  Hello    Copy             )-h@’        Copy             )-h@’
                     Encrypted                     Encrypted

          NTFS Partition                        Non-NTFS Partition


                                  Move
                                                        Hello
           Hello
                                  Copy
                                                Unencrypted
Best Practices for Encrypting Data


   Develop Encryption Policy for Non-Secured Data



   Educate Users About Data Security



   Create Encrypted Copies for Non-NTFS and Floppy Disk



   Encrypt Data Files
 Using Disk Defragmenter


     Defining Disk Defragmenter
     Defragmenting Partitions
     Best Practices for Using Disk Defragmenter
Defining Disk Defragmenter

     File and Folder Fragmentation Reduces Performance
     Disk Defragmenter Consolidates Fragmented Files and
      Folders
     Analyze a Hard Disk Before Defragmenting

                         Defragment
Defragmenting Partitions
  Disk Defragmenter
  Action View
 Volume                Session Status   File System          Capacity   Free Space   % Free Space
  (C:)            Defragmenting         NTFS             1.451 MB          374 MB           25%
  New Volume (D:)                       NTFS               549 MB          544 MB           99%




 Analysis Display:




 Defragmentation Display:




    Analyze      Defragment        Pause              Stop       View Report


    Fragmented files        Contiguous files      System files          Free space
Best Practices for Using Disk Defragmenter


   Defragment Hard Disks During Low Usage Times



   Educate Users to Defragment Their Local Hard Disks



   Analyze Hard Disks Before Installing Large Applications



   Defragment Partitions Based on the Role of the Computer
Troubleshooting Data Storage

Err or Cannot Save a Compressed File to a Partition


Err or Cannot Delete a Quota Entry


Err or File Encryption Fails


Err or Gaining Access to Resources Becomes Slow
Review


     Managing NTFS Compression
     Managing Disk Quotas
     Managing Encryption
     Using Disk Defragmenter
     Troubleshooting Data Storage

More Related Content

What's hot

Chapter06 Managing Disks And Data Storage
Chapter06      Managing  Disks And  Data  StorageChapter06      Managing  Disks And  Data  Storage
Chapter06 Managing Disks And Data StorageRaja Waseem Akhtar
 
cd&dvd&hdd
cd&dvd&hddcd&dvd&hdd
cd&dvd&hddsasipk
 
Partition Manager 11 - Paragon Software
Partition Manager 11 - Paragon SoftwarePartition Manager 11 - Paragon Software
Partition Manager 11 - Paragon Softwareguestcf43641
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis CollaborationCybera Inc.
 
Disk management server
Disk management serverDisk management server
Disk management serveranilinvns
 
Partition Manager 11 - Paragon Software
Partition Manager 11 - Paragon SoftwarePartition Manager 11 - Paragon Software
Partition Manager 11 - Paragon SoftwareParagon Software Group
 
CSC1100 - Chapter05 - Storage
CSC1100 - Chapter05 - StorageCSC1100 - Chapter05 - Storage
CSC1100 - Chapter05 - StorageYhal Htet Aung
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk managementTanveer Malik
 
We4IT lcty 2013 - infra-man - domino run faster
We4IT lcty 2013 - infra-man - domino run faster We4IT lcty 2013 - infra-man - domino run faster
We4IT lcty 2013 - infra-man - domino run faster We4IT Group
 
ServStation - CD/DVD Servers and Loaders
ServStation - CD/DVD Servers and LoadersServStation - CD/DVD Servers and Loaders
ServStation - CD/DVD Servers and LoadersPrime Array
 
Blu ray disks by.raman sanoria
Blu ray disks by.raman sanoriaBlu ray disks by.raman sanoria
Blu ray disks by.raman sanoriaRaman Sanoria
 
Blu rayind-by rsanoria
Blu rayind-by rsanoriaBlu rayind-by rsanoria
Blu rayind-by rsanoriaRaman Sanoria
 
Data storage devices
Data storage devicesData storage devices
Data storage devicesYukiNF
 
Disk management / hard drive partition management / create drive or partition...
Disk management / hard drive partition management / create drive or partition...Disk management / hard drive partition management / create drive or partition...
Disk management / hard drive partition management / create drive or partition...Ajay Panchal
 

What's hot (20)

Chapter06 Managing Disks And Data Storage
Chapter06      Managing  Disks And  Data  StorageChapter06      Managing  Disks And  Data  Storage
Chapter06 Managing Disks And Data Storage
 
operating system
operating systemoperating system
operating system
 
storage device
storage device storage device
storage device
 
Introduction
IntroductionIntroduction
Introduction
 
cd&dvd&hdd
cd&dvd&hddcd&dvd&hdd
cd&dvd&hdd
 
Booy Up
Booy UpBooy Up
Booy Up
 
Partition Manager 11 - Paragon Software
Partition Manager 11 - Paragon SoftwarePartition Manager 11 - Paragon Software
Partition Manager 11 - Paragon Software
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
 
Disk management server
Disk management serverDisk management server
Disk management server
 
Partition Manager 11 - Paragon Software
Partition Manager 11 - Paragon SoftwarePartition Manager 11 - Paragon Software
Partition Manager 11 - Paragon Software
 
CSC1100 - Chapter05 - Storage
CSC1100 - Chapter05 - StorageCSC1100 - Chapter05 - Storage
CSC1100 - Chapter05 - Storage
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
 
We4IT lcty 2013 - infra-man - domino run faster
We4IT lcty 2013 - infra-man - domino run faster We4IT lcty 2013 - infra-man - domino run faster
We4IT lcty 2013 - infra-man - domino run faster
 
Introduction to RAID
Introduction to RAIDIntroduction to RAID
Introduction to RAID
 
ServStation - CD/DVD Servers and Loaders
ServStation - CD/DVD Servers and LoadersServStation - CD/DVD Servers and Loaders
ServStation - CD/DVD Servers and Loaders
 
Blu ray disks by.raman sanoria
Blu ray disks by.raman sanoriaBlu ray disks by.raman sanoria
Blu ray disks by.raman sanoria
 
Blu rayind-by rsanoria
Blu rayind-by rsanoriaBlu rayind-by rsanoria
Blu rayind-by rsanoria
 
Data storage devices
Data storage devicesData storage devices
Data storage devices
 
Dual layer dvd
Dual layer dvdDual layer dvd
Dual layer dvd
 
Disk management / hard drive partition management / create drive or partition...
Disk management / hard drive partition management / create drive or partition...Disk management / hard drive partition management / create drive or partition...
Disk management / hard drive partition management / create drive or partition...
 

Viewers also liked

Advanced file system (encrypt,compress,disk quota)
Advanced file system (encrypt,compress,disk quota)Advanced file system (encrypt,compress,disk quota)
Advanced file system (encrypt,compress,disk quota)Sanjeev Gupta
 
Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System ManagementRaja Waseem Akhtar
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGene Carboni
 

Viewers also liked (6)

Advanced file system (encrypt,compress,disk quota)
Advanced file system (encrypt,compress,disk quota)Advanced file system (encrypt,compress,disk quota)
Advanced file system (encrypt,compress,disk quota)
 
1556 a 09
1556 a 091556 a 09
1556 a 09
 
1556 a 00
1556 a 001556 a 00
1556 a 00
 
Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System Management
 
Shadow copy
Shadow copyShadow copy
Shadow copy
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 

Similar to 1556 a 07

Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualizationSisimon Soman
 
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Ahmed El-Arabawy
 
Lesson four operating system basics
Lesson four operating system basicsLesson four operating system basics
Lesson four operating system basicsMik Endale
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03blusmurfydot1
 
Storage virtualisation loughtec
Storage virtualisation   loughtecStorage virtualisation   loughtec
Storage virtualisation loughtecLoughtec
 
Storage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talkStorage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talkSisimon Soman
 
101 2.1 design hard disk layout
101 2.1 design hard disk layout101 2.1 design hard disk layout
101 2.1 design hard disk layoutAcácio Oliveira
 

Similar to 1556 a 07 (20)

File system
File systemFile system
File system
 
Index file
Index fileIndex file
Index file
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualization
 
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1)
 
Shignled disk
Shignled diskShignled disk
Shignled disk
 
Drobo range ppt v.1.6
Drobo range ppt v.1.6Drobo range ppt v.1.6
Drobo range ppt v.1.6
 
Exchange Server 2013 High Availability - Site Resilience
Exchange Server 2013 High Availability - Site ResilienceExchange Server 2013 High Availability - Site Resilience
Exchange Server 2013 High Availability - Site Resilience
 
Lesson four operating system basics
Lesson four operating system basicsLesson four operating system basics
Lesson four operating system basics
 
06 File System
06 File System06 File System
06 File System
 
Windows file system
Windows file systemWindows file system
Windows file system
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
 
Storage virtualisation loughtec
Storage virtualisation   loughtecStorage virtualisation   loughtec
Storage virtualisation loughtec
 
Storage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talkStorage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talk
 
Shadow forensics print
Shadow forensics printShadow forensics print
Shadow forensics print
 
Storage Managment
Storage ManagmentStorage Managment
Storage Managment
 
101 2.1 design hard disk layout
101 2.1 design hard disk layout101 2.1 design hard disk layout
101 2.1 design hard disk layout
 
File system
File systemFile system
File system
 
File system
File systemFile system
File system
 

More from Lê Liêu

Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication securityLê Liêu
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocolsLê Liêu
 
Part04 basic cryptography
Part04 basic cryptographyPart04 basic cryptography
Part04 basic cryptographyLê Liêu
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authenticationLê Liêu
 
Part01 general security concepts
Part01 general security conceptsPart01 general security concepts
Part01 general security conceptsLê Liêu
 
Part06 infrastructure security
Part06 infrastructure securityPart06 infrastructure security
Part06 infrastructure securityLê Liêu
 

More from Lê Liêu (12)

1556 a 08
1556 a 081556 a 08
1556 a 08
 
1556 a 06
1556 a 061556 a 06
1556 a 06
 
1556 a 05
1556 a 051556 a 05
1556 a 05
 
1556 a 02
1556 a 021556 a 02
1556 a 02
 
1556 a 01
1556 a 011556 a 01
1556 a 01
 
1556 a 10
1556 a 101556 a 10
1556 a 10
 
Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication security
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
 
Part04 basic cryptography
Part04 basic cryptographyPart04 basic cryptography
Part04 basic cryptography
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authentication
 
Part01 general security concepts
Part01 general security conceptsPart01 general security concepts
Part01 general security concepts
 
Part06 infrastructure security
Part06 infrastructure securityPart06 infrastructure security
Part06 infrastructure security
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

1556 a 07

  • 2. Overview  Managing Data Compression  Managing Disk Quotas  Encrypting Data  Using Disk Defragmenter  Troubleshooting Data Storage
  • 3.  Managing Data Compression  Defining Compressed Files and Folders  Compressing Files and Folders  Copying and Moving Compressed Files and Folders  Best Practices for Managing Data Compression
  • 4. Defining Compressed Files and Folders  Files and Folders Have a Compression State  Windows 2003 Automatically Uncompresses Accessed Files  Space Allocation Based on Uncompressed File Size  Display Color Designates Compressed Files and Folders W FolderA Compressed FileA FileB NTFS Partition Compressed
  • 5. More  Use compression when you need more space on your hard-disk drive.  Compressing files, folders, and programs decrease their size and reduces the amount of space they use on drives or removable storage device. You can also compress disk drives.
  • 6. More  Space allocation : when files are copied, NTFS calculates disk space based on the size of the uncompressed file. This is important because files are uncompressed during the copy process and the system must be sure there is enough space for the uncompressed file. If you copy a compressed file to an NTFS partition that does not have enough space for the uncompressed file, an error message notifies you that there is not enough disk space for the file.
  • 7. Compressing Files and Folders Advanced Attributes Choose the settings you want for this folder FolderA Properties When you apply these changes you will be asked if you General Web Sharing Sharing Security want the changes to affect all subfolders and files as well. FolderA Archive and Index attributes Folder is ready for archiving Type: File Folder Index contents for fast file searching Location: C: Size: 0 bytes Compress or Encrypt attributes (mutually exclusive) Size on disk: 2.00 KB (2,048 bytes) Compress contents to save disk space Contains: 1 Files, 0 Folders Encrypt contents to secure data Created: Wednesday, September 16, 1998, 10:44:01 AM OK Cancel Attributes: Read-only Advanced... Hidden OK Cancel Apply
  • 8. Copying and Moving Compressed Files and Folders NTFS Partition NTFS Partition A B Move Copy Inherits Retains NTFS Partition NTFS Partition C Copy Inherits D Move  No Compression on Non-NTFS Partitions or Floppy Disks
  • 9. Best Practices for Managing Data Compression Determine Which File Types to Compress Do Not Compress Already Compressed Files Use Different Display Colors for Compressed Files and Folders Compress Static Data Rather Than Data That Changes Frequently
  • 10.  Managing Disk Quotas = quantium  Defining Disk Quotas  Using Disk Quotas  Setting Disk Quotas  Monitoring Disk Quotas  Best Practices for Managing Disk Quotas
  • 11. Defining Disk Quotas  Usage Calculation Based on File and Folder Ownership  Compression Ignored When Calculating Usage  Free Space Reported to Applications Is Based on Quota  Windows 2003 Tracks Disk Quotas for Each NTFS Partition  Only Available on NTFS Partitions
  • 12. Using Disk Quotas Allocated to User1 Allocated to User2 NTFS Allocated to User3 Partition Allocated to User4 Disk 50-MB disk quota Allocated to User5 Quota 40-MB warning level  Set Limits to Control Hard Disk Space Usage  Monitor Partition Usage on a Per-User Basis
  • 13. Setting Disk Quotas Local Disk Properties General Tools Hardware Sharing  Set Quotas for All Security Quota Web Sharing Users Status: Disk quota system is active  Set Quotas for Enable quota management Individual Users Deny disk space to users exceeding quota limit Select the default quota limit for new users on this volume: Quota Entries for Local Disk (C:) Do not limit disk usage Quota Edit View Help Limit disk space to No Limit Set warning level to No Limit Status Name Logon Name Amount Used Select the quota Warningoptions forPercent Used Quota Limit logging Level this volume: Log event when a user exceeds their quota limit OK DomainTom 36 MB 50 MB 40 MB 72 OK DomainSue 17MB Log event when a user exceeds their warning level 50 MB 40 MB 34 Warning DomainJim 48MB 50 MB 40 MB 96 Quota Entries... Above Limit DomainPeg 52MB 50 MB 40 MB 104 OK DomainAdmin 127MB No Limit OK Limit Cancel No N/A Apply 5 total item(s), 1 selected
  • 14. Monitoring Disk Quotas Quota Entries for Local Disk (C:) Quota Edit View Help Status Name Logon Name Amount Used Quota Limit Warning Level Percent Used OK DomainTom 36 MB 50 MB 40 MB 72 OK DomainSue 17MB 50 MB 40 MB 34 Warning DomainJim 48MB 50 MB 40 MB 96 Above Limit DomainPeg 52MB 50 MB 40 MB 104 OK DomainAdmin 127MB No Limit No Limit N/A 5 total item(s), 1 selected Status Icons - OK - Exceeds Warning Threshold - Exceeds Limit
  • 15. Best Practices for Managing Disk Quotas Set Quota Limits for Partitions on Shared Client Computers Log On as Administrator to Install Components and Applications Generate Disk Usage Information Set Restrictive Default Limits; Modify Specific Disk Quota Entries Set Quotas on Shared Partitions Enable Quotas Before a Partition Is Used Delete Quota Entries for Inactive Users
  • 16.  Encrypting Data  Defining the Encrypting File System  Encrypting Files and Folders  Copying and Moving Encrypted Files and Folders  Best Practices for Encrypting Data
  • 17. Defining the Encrypting File System Encryption Hello User *&^1  Ensures Data Security  Automatic Encryption and Hello Decryption Decryption
  • 18. Encrypting Files and Folders Confirm Attribute Changes Advanced Attributes You have chosen to make the following attribute change(s): encrypt Choose the settings you want for this folder When you apply these changes Do you want to apply this change to this folder only, or do want to you will be asked if you want the changes to affect all subfolders and subfolders and files as well? apply it to all files as well. Archive and Index attributes Apply changes to this folder only Folder is ready for archiving Apply changes to this folder, subfolders and files Index contents for fast file searching OK Cancel Compress or Encrypt attributes (mutually exclusive) Compress contents to save disk space Encrypt contents to secure data OK Cancel
  • 19. Copying and Moving Encrypted Files and Folders NTFS Partition NTFS Partition Move Move Move *&^1 *&^1 Hello Copy )-h@’ Copy )-h@’ Encrypted Encrypted NTFS Partition Non-NTFS Partition Move Hello Hello Copy Unencrypted
  • 20. Best Practices for Encrypting Data Develop Encryption Policy for Non-Secured Data Educate Users About Data Security Create Encrypted Copies for Non-NTFS and Floppy Disk Encrypt Data Files
  • 21.  Using Disk Defragmenter  Defining Disk Defragmenter  Defragmenting Partitions  Best Practices for Using Disk Defragmenter
  • 22. Defining Disk Defragmenter  File and Folder Fragmentation Reduces Performance  Disk Defragmenter Consolidates Fragmented Files and Folders  Analyze a Hard Disk Before Defragmenting Defragment
  • 23. Defragmenting Partitions Disk Defragmenter Action View Volume Session Status File System Capacity Free Space % Free Space (C:) Defragmenting NTFS 1.451 MB 374 MB 25% New Volume (D:) NTFS 549 MB 544 MB 99% Analysis Display: Defragmentation Display: Analyze Defragment Pause Stop View Report Fragmented files Contiguous files System files Free space
  • 24. Best Practices for Using Disk Defragmenter Defragment Hard Disks During Low Usage Times Educate Users to Defragment Their Local Hard Disks Analyze Hard Disks Before Installing Large Applications Defragment Partitions Based on the Role of the Computer
  • 25. Troubleshooting Data Storage Err or Cannot Save a Compressed File to a Partition Err or Cannot Delete a Quota Entry Err or File Encryption Fails Err or Gaining Access to Resources Becomes Slow
  • 26. Review  Managing NTFS Compression  Managing Disk Quotas  Managing Encryption  Using Disk Defragmenter  Troubleshooting Data Storage