Submit Search
Upload
ppt ch17
•
1 like
•
255 views
S
sadejoseph
Follow
A+ guide to IT Technical Support
Read less
Read more
Technology
Report
Share
Report
Share
1 of 50
Recommended
ppt ch10
ppt ch10
sadejoseph
ppt ch18
ppt ch18
sadejoseph
ppt ch15
ppt ch15
sadejoseph
ppt ch13
ppt ch13
sadejoseph
Ch 20
Ch 20
National American University
A+ Chapter 4 Review
A+ Chapter 4 Review
Amy McMullin
A+ Chapter 3 Review
A+ Chapter 3 Review
Amy McMullin
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
Irsandi Hasan
Recommended
ppt ch10
ppt ch10
sadejoseph
ppt ch18
ppt ch18
sadejoseph
ppt ch15
ppt ch15
sadejoseph
ppt ch13
ppt ch13
sadejoseph
Ch 20
Ch 20
National American University
A+ Chapter 4 Review
A+ Chapter 4 Review
Amy McMullin
A+ Chapter 3 Review
A+ Chapter 3 Review
Amy McMullin
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
Irsandi Hasan
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec
Ch 19
Ch 19
National American University
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
Irsandi Hasan
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
Irsandi Hasan
It essentials pc hardware and software overview
It essentials pc hardware and software overview
Ahmed Sultan
System Administration DCU
System Administration DCU
Khalid Rehan
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
HelpSystems
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
Irsandi Hasan
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, Today
Symantec
introduction to system administration
introduction to system administration
gamme123
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
Ite v5.0 chapter4
Ite v5.0 chapter4
Kazi Rafsun Shaanto
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
Irsandi Hasan
W982 05092004
W982 05092004
Sumit Tambe
Resume
Resume
Ravi C L
IT system and network administrator
IT system and network administrator
Muhammad Nasir ( MCSA/ MCTS / MCITP)
Computer system administrator
Computer system administrator
TheZayne92
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Yonel Cadapan
What's New in Security for IBM i?
What's New in Security for IBM i?
HelpSystems
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022
TechSoup
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for Nonprofits
TechSoup
3 modern desktop - office 365 pro plus deployment + servicing
3 modern desktop - office 365 pro plus deployment + servicing
Andrew Bettany
More Related Content
What's hot
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec
Ch 19
Ch 19
National American University
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
Irsandi Hasan
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
Irsandi Hasan
It essentials pc hardware and software overview
It essentials pc hardware and software overview
Ahmed Sultan
System Administration DCU
System Administration DCU
Khalid Rehan
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
HelpSystems
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
Irsandi Hasan
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, Today
Symantec
introduction to system administration
introduction to system administration
gamme123
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
Ite v5.0 chapter4
Ite v5.0 chapter4
Kazi Rafsun Shaanto
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
Irsandi Hasan
W982 05092004
W982 05092004
Sumit Tambe
Resume
Resume
Ravi C L
IT system and network administrator
IT system and network administrator
Muhammad Nasir ( MCSA/ MCTS / MCITP)
Computer system administrator
Computer system administrator
TheZayne92
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Yonel Cadapan
What's New in Security for IBM i?
What's New in Security for IBM i?
HelpSystems
What's hot
(19)
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Ch 19
Ch 19
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
It essentials pc hardware and software overview
It essentials pc hardware and software overview
System Administration DCU
System Administration DCU
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, Today
introduction to system administration
introduction to system administration
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
Ite v5.0 chapter4
Ite v5.0 chapter4
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
W982 05092004
W982 05092004
Resume
Resume
IT system and network administrator
IT system and network administrator
Computer system administrator
Computer system administrator
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setup
What's New in Security for IBM i?
What's New in Security for IBM i?
Similar to ppt ch17
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022
TechSoup
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for Nonprofits
TechSoup
3 modern desktop - office 365 pro plus deployment + servicing
3 modern desktop - office 365 pro plus deployment + servicing
Andrew Bettany
W7 Enterprise
W7 Enterprise
aralves
W7 for IT Professionals
W7 for IT Professionals
guest632c73
20703-1B_00.pptx
20703-1B_00.pptx
BenAissaTaher1
Manish Kumar
Manish Kumar
Manish Kumar
Windows 7 Optimized Desktop
Windows 7 Optimized Desktop
IT Masterclasses
Library Management System using oracle database
Library Management System using oracle database
Saikot Roy
ppt ch11
ppt ch11
sadejoseph
Windows 7 for IT Professionals
Windows 7 for IT Professionals
Rishu Mehra
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
Mike Taylor
GotmanCV_R1
GotmanCV_R1
Gotman Parningotan P .
BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8
Janice Robinson
Social Networking Platform to Share Travel Experiences
Social Networking Platform to Share Travel Experiences
Mike Taylor
Microsoft Outage Analysis
Microsoft Outage Analysis
ThousandEyes
3 tier architecture
3 tier architecture
baabtra.com - No. 1 supplier of quality freshers
A Quick Introduction to E-Forms
A Quick Introduction to E-Forms
Rich Medina
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network Access
Microsoft TechNet
Similar to ppt ch17
(20)
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for Nonprofits
3 modern desktop - office 365 pro plus deployment + servicing
3 modern desktop - office 365 pro plus deployment + servicing
W7 Enterprise
W7 Enterprise
W7 for IT Professionals
W7 for IT Professionals
20703-1B_00.pptx
20703-1B_00.pptx
Manish Kumar
Manish Kumar
Windows 7 Optimized Desktop
Windows 7 Optimized Desktop
Library Management System using oracle database
Library Management System using oracle database
ppt ch11
ppt ch11
Windows 7 for IT Professionals
Windows 7 for IT Professionals
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
GotmanCV_R1
GotmanCV_R1
BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8
Social Networking Platform to Share Travel Experiences
Social Networking Platform to Share Travel Experiences
Microsoft Outage Analysis
Microsoft Outage Analysis
3 tier architecture
3 tier architecture
A Quick Introduction to E-Forms
A Quick Introduction to E-Forms
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network Access
More from sadejoseph
ppt ch16
ppt ch16
sadejoseph
ch14
ch14
sadejoseph
ppt ch08
ppt ch08
sadejoseph
ppt ch07
ppt ch07
sadejoseph
Ex13 lesson04
Ex13 lesson04
sadejoseph
Ex13 lesson03
Ex13 lesson03
sadejoseph
Ex13 lesson02
Ex13 lesson02
sadejoseph
Ex13 lesson01
Ex13 lesson01
sadejoseph
OCP Booklet June 2015
OCP Booklet June 2015
sadejoseph
Ocp Booklet June 2015
Ocp Booklet June 2015
sadejoseph
More from sadejoseph
(10)
ppt ch16
ppt ch16
ch14
ch14
ppt ch08
ppt ch08
ppt ch07
ppt ch07
Ex13 lesson04
Ex13 lesson04
Ex13 lesson03
Ex13 lesson03
Ex13 lesson02
Ex13 lesson02
Ex13 lesson01
Ex13 lesson01
OCP Booklet June 2015
OCP Booklet June 2015
Ocp Booklet June 2015
Ocp Booklet June 2015
Recently uploaded
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Recently uploaded
(20)
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
ppt ch17
1.
A+ Guide to
IT Technical Support, 9th Edition Chapter 17 Windows Resources on a Network
2.
© Cengage Learning
2017 A+ Guide to IT Technical Support, 9th Edition Objectives • Support some client-server applications • Share and secure files and folders on a network • Support cloud computing services on a network 2
3.
© Cengage Learning
2017 Supporting Client/Server Applications • Client/Server applications expected to support: – Internet Explorer – Remote Desktop – Other remote applications • Also need to know how to use Group Policy to configure Quality of Service (QoS) – Also how to link a data source through a network to database applications A+ Guide to IT Technical Support, 9th Edition 3
4.
© Cengage Learning
2017 Network Servers • List of popular client-server resources: – Mail server – File server – Print server – DHCP server – DNS server – Proxy server – Authentication server – Web server A+ Guide to IT Technical Support, 9th Edition 4
5.
© Cengage Learning
2017 Internet Explorer • Most popular client/server applications are a browser and web server • Internet Explorer (IE) version 11: latest version at this writing – Windows 10 features new Microsoft Edge browser • Easy to upgrade by using Windows Update • Tips when using IE window: – To show the menu bar, press the Alt key – HTTP Secure – look for https and a padlock icon – If you have problems with IE11, you can disable it A+ Guide to IT Technical Support, 9th Edition 5
6.
© Cengage Learning
2017 Internet Explorer • Use the Internet Options box to manage IE settings – Click Tools icon and click Internet Options • Internet Options box has several tabs with different configuration options and settings • General Tab – Change the home page or add a second home page – Protect your identity and surfing records – Check Delete browsing history on exit if you want your history cleared each time you close IE – Manage IE cache A+ Guide to IT Technical Support, 9th Edition 6
7.
© Cengage Learning
2017 Internet Explorer • Security Tab – Set security level (medium-high is the default level) • Prompts before downloading content • Does not download ActiveX controls that are not signed by Microsoft (virus can sometimes hide in an ActiveX control) – To customize security settings, click Custom level A+ Guide to IT Technical Support, 9th Edition 7
8.
© Cengage Learning
2017 Internet Explorer • Privacy Tab and Content Tab – Use Privacy Tab to block cookies that might invade your privacy or steal identity – Content tab contains settings for Family Safety, certificates used by web sites, and how AutoComplete and Feeds are handled A+ Guide to IT Technical Support, 9th Edition 8
9.
© Cengage Learning
2017 Internet Explorer • Connections Tab and Proxy Settings – Allows you to configure proxy server settings and create a VPN connection • Proxy server: intercepts requests that a browser makes of a server and serves up request from a cache it maintains A+ Guide to IT Technical Support, 9th Edition 9 Figure 17-8 Enter the IP address of all proxy servers on your corporate network
10.
© Cengage Learning
2017 Internet Explorer • Programs Tab – Used to manage add- ons (plug-ins) • Add-ons: small apps that help IE display multimedia content, manage email, translate text, or other actions A+ Guide to IT Technical Support, 9th Edition 10 Figure 17-9 Use the Programs Tab to manage add-ons and default applications used for Internet services
11.
© Cengage Learning
2017 Internet Explorer • Advanced Tab – Contains several miscellaneous settings used to control Internet Explorer – One setting is useful when IE is giving problems • If you suspect problems are caused by wrong settings, click Reset to return IE to all default settings A+ Guide to IT Technical Support, 9th Edition 11
12.
© Cengage Learning
2017 Remote Desktop Connection (RDC) • Remote Desktop gives a user access to a Windows desktop from anywhere on the Internet • To use Remote Desktop, the computer you want to remotely access (the server) must be running business or professional editions of Windows 8/7/Vista – Computer accessing can be running any version of Windows • Computers set to serve up Remote Desktop are not as secure – You can use software that does not require opening ports for a more secure solution A+ Guide to IT Technical Support, 9th Edition 12
13.
© Cengage Learning
2017 Remote Assistance • Remote Assistance – a user on the server computer can remain signed in during the remote session, retains control of the session, and can see the screen – Helpful when troubleshooting problems – User who needs help send an invitation by email or chat to connect to their computer using Remote Assistance A+ Guide to IT Technical Support, 9th Edition 13
14.
© Cengage Learning
2017 Remote Assistance • Ways to initiate a Remote Assistance session: – User saves an invitation file and send file to technician – User can send an automated email through the Remote Assistance app – User can use Easy Connect, which is the easiest method to start Remote Assistance connection • Both computers must support Easy Connect – Technician can initiate a session • Follow steps outlined in text to see how to initiate a Remote Assistance connection using Easy Connect A+ Guide to IT Technical Support, 9th Edition 14
15.
© Cengage Learning
2017 Remote Assistance • Things you can do during a Remote Assistance session: – Chat – Request control – Pause – Disconnect or Stop sharing – Log activity in a log file – Change expiration of invitations A+ Guide to IT Technical Support, 9th Edition 15
16.
© Cengage Learning
2017 Remote Assistance • If you have problems making the connection: – Windows Firewall on the user’s computer might be blocking Remote Assistance • Verify Remote Assistance is checked as an exception to blocked apps in Windows Firewall window – If outside the user’s local network, the hardware firewall protecting her network might be blocking Remote Assistance • Verify that port forwarding is enabled for Remote Assistance A+ Guide to IT Technical Support, 9th Edition 16
17.
© Cengage Learning
2017 Use Group Policy to Improve QoS Applications • Group Policy (gpedit.msc) – Used to control what users can do and how the system can be used – Only available in Windows professional and business editions – Works by: • Making entries in registry • Applying scripts to Windows startup, shutdown, and logon processes • Affecting security settings A+ Guide to IT Technical Support, 9th Edition 17
18.
© Cengage Learning
2017 Use Group Policy to Improve QoS Applications • Group Policy (cont’d) – Can be applied to computer or user • Computer policies are applied just before logon screen • User policies are applied after login – To use Group Policy to set the QoS level for an application follow steps outlined in the text – To get the most out of QoS, configure each router and computer on the network to use QoS A+ Guide to IT Technical Support, 9th Edition 18
19.
© Cengage Learning
2017 Use Group Policy to Improve QoS Applications • Important options when creating a policy: – Priority level is determined by a DSCP (Differentiated Service Code Point) value – Outbound traffic can be throttled to limit the bandwidth assigned an application – The policy can apply to all applications or a specific program – You can specify the source IP address and/or destination IP address – You can select the protocol (TCP or UDP) and port numbers for the policy A+ Guide to IT Technical Support, 9th Edition 19
20.
© Cengage Learning
2017 ODBC Data Sources • Open Database Connectivity (ODBC) – technology used to create the data source – Which provides access to the database and includes the drivers required to interface between Access and the data – Drivers for Microsoft SQL Server must be installed on the local computer – Use the ODBC Data Sources tool in the Administrative Tools group of Control Panel to configure the data source A+ Guide to IT Technical Support, 9th Edition 20
21.
© Cengage Learning
2017 Controlling Access to Folders and Files • Managing shared resources is accomplished by: – Assigning rights to user accounts – Assigning permissions to folders and files A+ Guide to IT Technical Support, 9th Edition 21
22.
© Cengage Learning
2017 Classify User Accounts and User Groups • Principle of least privilege: An approach where computer users are assigned the minimum rights required to do their job • Rights or privileges are established when you first create a user account (based on account type) – Rights can later be changed by changing the user groups to which the account belongs • User accounts are created from the Control Panel or by using the Computer Management console A+ Guide to IT Technical Support, 9th Edition 22
23.
© Cengage Learning
2017 Classify User Accounts and User Groups • Type of User Account – Administrator account: has complete access to the system and can make changes that affect the security of the system and other users – Standard user account: can use software and hardware and make some system changes but cannot make changes that affect the security of the system or other users A+ Guide to IT Technical Support, 9th Edition 23
24.
© Cengage Learning
2017 Classify User Accounts and User Groups A+ Guide to IT Technical Support, 9th Edition 24 Figure 17-29 Create a new user
25.
© Cengage Learning
2017 Classify User Accounts and User Groups • Built-in User Groups – Administrators and Users groups – Guests group • Has limited rights and is given a temporary profile that is deleted when user logs off – Backup Operators group • Can back up and restore files on the system regardless of its access permission to files – Power Users group • Windows XP group that can read from and write to parts of the system, install apps, and perform limited administrator tasks A+ Guide to IT Technical Support, 9th Edition 25
26.
© Cengage Learning
2017 Classify User Accounts and User Groups • Windows might automatically assign one of these built-in user groups to an account: – Authenticated Users group: includes all user accounts except the Guest account – Everyone group: includes the Authenticated Users group as well as the Guest account – Anonymous users: users who have not been authenticated on a remote computer A+ Guide to IT Technical Support, 9th Edition 26
27.
© Cengage Learning
2017 Classify User Accounts and User Groups • Customized User Groups – Use Management Console in business and professional editions of Windows to create custom user groups – Easier to assign permissions to user groups rather than to individual accounts • User groups work well when several users need the same permissions • Create a user group and then assign permission to the user group A+ Guide to IT Technical Support, 9th Edition 27
28.
© Cengage Learning
2017 Methods to Assign Permissions To Folders and Files • Three general strategies for managing shared folder and files in Windows – Homegroup sharing: use when all users on a network require the same access to all resources – Workgroup sharing: offers better security than a homegroup – Domain controlling: if computer belongs to a domain, all security is managed by the network administrator for the entire network A+ Guide to IT Technical Support, 9th Edition 28
29.
© Cengage Learning
2017 Methods to Assign Permissions To Folders and Files • Tips on which folder to use to hold shared data: – Private data for individual users • C:Users folder for that user – Data for all users to share • C:UsersPublic folder – For best security, create a folder not in either of the above folders and assign permissions to that folder and its subfolders • Allow all users access or only certain users or user groups A+ Guide to IT Technical Support, 9th Edition 29
30.
© Cengage Learning
2017 Methods to Assign Permissions To Folders and Files • Using workgroup sharing, Windows offers two methods to share a folder – Share permissions: grant permissions only to network users and not to local users • Apply to a folder and its contents, not to individual files – NTFS permissions: apply to local users and network users • Apply to both folders and individual files • Work on NTFS volumes only A+ Guide to IT Technical Support, 9th Edition 30
31.
© Cengage Learning
2017 Methods to Assign Permissions To Folders and Files • Tips when implementing permissions: – If both share and NTFS permission are used, the most restrictive permission applies – If NTFS permissions are conflicting the more liberal permission applies – Permission propagation: when permissions are passed from parent to child – Inherited permissions: permissions attained from a parent object – When you move or copy an object to a folder, the object takes on permissions of that folder A+ Guide to IT Technical Support, 9th Edition 31
32.
© Cengage Learning
2017 How to Share Folders and Files • User and Group Information with the gpresult Command – Use the gpresult command to pull a list of all the groups a user belongs to – Information can be helpful when troubleshooting user group issues or Group Policy problems – Enter the command gpresult/scope user/user username /r to retrieve information on a user other than the one signed in A+ Guide to IT Technical Support, 9th Edition 32
33.
© Cengage Learning
2017 How to Share Folders and Files • How to Use Share Permission – For NTFS volume, use NTFS permission whenever possible A+ Guide to IT Technical Support, 9th Edition 33 Figure 17-45 Use the sharing tab of a folder properties box to set up share permissions on a FAT volume
34.
© Cengage Learning
2017 Support and Troubleshoot Shared Folders and Files • Few tips about managing shared folders and files: – Use advanced permissions settings if you need further control of a user or group • Click Advanced on the Security tab of a folder’s Properties box – Manage permissions using parent folder • Subfolders inherit permissions of the parent folder – Check the effective permissions • To know for sure which permissions are in effect, see Effective Permissions tab of Advanced Security Settings box A+ Guide to IT Technical Support, 9th Edition 34
35.
© Cengage Learning
2017 Support and Troubleshoot Shared Folders and Files • Few tips about managing shared folders and files: (cont’d) – Take ownership of a folder • Owner of a folder always has full permissions – Use only one workgroup • Performance improves when they are all in the same workgroup – Require passwords for all user accounts – Use a mapped network drive A+ Guide to IT Technical Support, 9th Edition 35
36.
© Cengage Learning
2017 Support and Troubleshoot Shared Folders and Files A+ Guide to IT Technical Support, 9th Edition 36 Figure 17-50 Change the owner of a folder
37.
© Cengage Learning
2017 How to Map a Network Drive or Network Printer • A network share is one of the most powerful and versatile methods of communicating over a network – Makes one computer (the client) appear to have a new hard drive, such a drive E, that is really hard drive space on another host computer – Called mapping a drive • Network File System (NFS) makes it possible for files on the network to be accessed as easily as if they are stored on the local computer A+ Guide to IT Technical Support, 9th Edition 37
38.
© Cengage Learning
2017 Hidden Network Resources and Administrative Shares • To protect confidential data from users on the network: – Disable File and Printer Sharing – Hide a shared folder • If you want to share a folder, but don’t want others to see it add a $ to the end of the folder name • Those that want to access the hidden folder must enter the complete path to the folder (including $) in search box A+ Guide to IT Technical Support, 9th Edition 38
39.
© Cengage Learning
2017 Hidden Network Resources and Administrative Shares A+ Guide to IT Technical Support, 9th Edition 39 Figure 17-54 (a) A $ on the share name hides the share unless the exact name is used to locate it; (b) access a hidden, shared folder on the network by searching for its exact name
40.
© Cengage Learning
2017 Hidden Network Resources and Administrative Shares • Local shares: folders and files on a computer that are shared with others using local user accounts • Administrative shares: folders that are shared by default that administrator accounts at the domain level can access – Two types of administrative shares: • The %systemroot% folder • Any volume or drive • Don’t share the /Windows folder or an entire drive – Don’t want system files and folders exposed A+ Guide to IT Technical Support, 9th Edition 40
41.
© Cengage Learning
2017 Cloud Computing • Cloud computing – when a third-party service or vendor makes computer resources available to its customers over the Internet • Can provide many other types of resources: – Applications – Network services – Websites – Database servers – Specialized developer applications – Entire operating systems A+ Guide to IT Technical Support, 9th Edition 41
42.
© Cengage Learning
2017 Cloud Computing • All cloud computing service models incorporate the following elements: – Service at any time – Elastic services and storage – Support for multiple client platforms – Resource pooling and consolidation – Measured service A+ Guide to IT Technical Support, 9th Edition 42
43.
© Cengage Learning
2017 Cloud Computing Categories • Cloud computing service models are categorized by the types of services they provide: – IaaS (Infrastructure as a Service) – customer rents hardware, including servers, storage, and networking – PaaS (Platform as a Service) – customer rents hardware, operating systems, and some applications that might support other applications installed – SaaS (Software as a Service) – customers rent hardware, operating systems, and applications specific to the customer’s needs • Applications are provided through an online user interface A+ Guide to IT Technical Support, 9th Edition 43
44.
© Cengage Learning
2017 Cloud Computing Categories • Cloud computing service models are categorized by the types of services they provide (cont’d): – XaaS (Anything as a Service or Everything as a Service) – the “X” represents an unknown • Cloud can provide any combination of functions • Another SaaS implementation that doesn’t fit the official definition of SaaS is rentable software or software by subscription – Many companies are moving toward this subscription model A+ Guide to IT Technical Support, 9th Edition 44
45.
© Cengage Learning
2017 Cloud Computing Categories A+ Guide to IT Technical Support, 9th Edition 45 Figure 17-57 At each progressive level, the vendor takes over more computing responsibility for the customer
46.
© Cengage Learning
2017 Deployment Models for Cloud Computing • Cloud computing deployment models: – Public cloud – services are provided over the Internet to the general public – Private cloud – services are established on an organization’s own servers • Or established virtually for a single organization’s private use – Community cloud – services are shared between multiple organizations, but not available publicly – Hybrid cloud – a combination of public, private, and community clouds used by same organization A+ Guide to IT Technical Support, 9th Edition 46
47.
© Cengage Learning
2017 Chapter Summary • A client computer contacts a server to request information or to perform a task • The Internet Options dialog box is used to manage many Internet Explorer settings • Remote Desktop gives you access to your Windows desktop from anywhere on the Internet • A policy can be set using Group Policy to improve Quality of Service (QoS) for an application • Open Database Connectivity (OBDC) can create a data source, which provides a remote database and its drivers to a client computer A+ Guide to IT Technical Support, 9th Edition 47
48.
© Cengage Learning
2017 Chapter Summary • Controlling access to folders and files on a network is done by assigning rights to user accounts and assigning permissions to files and folders • Apply the principle of least privilege when assigning rights to users • Customized user groups that you create make it easier to manage rights to multiple user accounts • Three ways to share files and folders on the network are to use homegroup sharing, workgroup sharing, and domain controllers A+ Guide to IT Technical Support, 9th Edition 48
49.
© Cengage Learning
2017 Chapter Summary • A mapped network drive makes it easier for users to access drives and folders on the network • Peer-to-peer networks use local shares, and a Windows domain supports administrative shares • Cloud computing is providing computing resources over the Internet to customers • Cloud computing service models, including IaaS, PaaS, SaaS, and XaaS, are categorized by the types of services they provide A+ Guide to IT Technical Support, 9th Edition 49
50.
© Cengage Learning
2017 Chapter Summary • A public cloud service is available to the public, and a private cloud service is kept on an organization’s own servers or made available by a vendor only for a single organization’s private use A+ Guide to IT Technical Support, 9th Edition 50