SlideShare a Scribd company logo
Module 10
Configuring and
Troubleshooting Network
File and Print Services
Module Overview
• Configuring and Troubleshooting File Shares
• Encrypting Network Files with EFS
• Encrypting Partitions with BitLocker
• Configuring and Troubleshooting Network Printing
Lesson 1: Configuring and Troubleshooting File
Shares
• What Is a File Share?
• Demonstration: How to Create a File Share
• What Are NTFS Permissions?
• Demonstration: How to Configure NTFS Permissions
• Troubleshooting Network File Access Permissions
• What Is Access-Based Enumeration?
• File Access Enhancements in Windows Server 2008
What Is a File Share?
A file share is a folder on a server that has been configured
for access over the network
• File share permissions are:
• Full Control
• Change
• Read
• Access file shares by using:
• A UNC path
• Mapped drive letter
Demonstration: How to Create a File Share
In the demonstration, you will see how to:
• Create a file share by using simplified interface
• Create a file share by using advanced sharing
• Configure advanced sharing for a file share
What Are NTFS Permissions?
The basic NTFS permissions are:
• Read & Execute
NTFS permissions control which users or groups can access or
modify files and folders on NTFS formatted partitions
• List folder contents
• Modify
• Full Control
• Read
• Write
Demonstration: How to Configure NTFS Permissions
In this demonstration, you will see how to:
• Configure NTFS permissions
• View advanced NTFS permissions
• View inherited permissions
Troubleshooting Network File Access Permissions
The troubleshooting steps are:
• Check effective NTFS permissions
• Deny permission overrides allow permission
• Verify share permissions
• Assigning Full Control to the Everyone group
simplifies permission assignment
What Is Access-Based Enumeration?
Access-based enumeration:
• Hides files and folder that you do not have read access to
• Simplifies file browsing for users
• Is enabled automatically when sharing is enabled using
the simplified sharing interface
• Can be enabled and disabled in Share and
Storage Management
File Access Enhancements in Windows Server 2008
Windows Server 2008 includes SMB 2.0:
Windows Server 2008 R2 includes SMB 2.1:
• Enhances performance over slow networks
• Combines multiple commands into a single request
• Large MTU support
• Better support for sleep modes
• Combines multiple commands into a single request
• Client oplock leasing
Lesson 2: Encrypting Network Files with EFS
• What Is EFS?
• How EFS works
• Recovering EFS Encrypted Files
• Demonstration: How to Encrypt a File by Using EFS
What Is EFS?
• EFS is a feature that can encrypt files stored on an
NTFS formatted partition
• EFS Encryption acts as an additional layer of security
• EFS can be used with no configuration
How EFS works
• Symmetric encryption is used to protect the file data
• File Encryption Key (FEK)
• Public key encryption is used to protect the symmetric key
• User certificate with public key and private key
• Also certificate of recovery agent
EFS
Recovering EFS Encrypted Files
To ensure you can recover EFS encrypted files:
• Back up user certificates
• Configure a recovery agent
Demonstration: How to Encrypt a File by Using EFS
In this demonstration, you will see how to:
• Verify that a computer account supports EFS on a network
share
• Use EFS to encrypt a file on a network share
• View the certificate used for encryption
• Test access to an encrypted file
Lesson 3: Encrypting Partitions with BitLocker
• What Is BitLocker?
• How BitLocker Works
• Recovering BitLocker Encrypted Drives
• Demonstration: How to Encrypt a Partition by Using
BitLocker
What Is BitLocker?
A feature in Windows Server 2008 that allows you to encrypt
entire partitions
Benefits for BitLocker are:
• Data protection for stolen drives
• Safe shipping of preconfigured servers
• Easier decommissioning of drives
• Maintaining system integrity
How BitLocker Works
• A Volume Master Key encrypts each partition
• A Full Volume Encryption Key encrypts the
Volume Master Keys
• The Full Volume Encryption Key is stored in a TPM
• To use BitLocker there must be two partitions:
• System – with boot files
• Boot – with operating system files (C:)
Recovering BitLocker Encrypted Drives
BitLocker encrypted drives can be recovered by using:
• A recovery key from USB flash drive
• Saved immediately after encryption
• A data recovery agent
• Configured by using Group Policy
• A recovery password
• In Active Directory
• Saved or printed immediately after encryption
Demonstration: How to Encrypt a Partition by
Using BitLocker
In this demonstration, you will see how to:
• Install the BitLocker feature
• Configure Bitlocker to not require a TPM
• Enable BitLocker when a TPM is unavailable
• Access the recovery password
Lesson 4: Configuring and Troubleshooting
Network Printing
• Benefits of Network Printing
• Security Options for Network Printing
• Demonstration: How to Create Multiple Configurations for
a Print Device
• What Is Printer Pooling?
• Deploying Printers to Clients
• Discussion: Troubleshooting Network Printing
Benefits of Network Printing
• Simplified troubleshooting
• Lower total cost of ownership
• Centralized management
• Listing in Active Directory
Security Options for Network Printing
• The available permissions are:
• Print
• Manage this printer
• Manage documents
• The default security allows:
• Everyone to print
• Everyone to manage their own
Demonstration: How to Create Multiple
Configurations for a Print Device
In this demonstration, you will see how to:
• Create a shared printer
• Create a second printer using the same port
• Increase the priority of the second printer
What Is Printer Pooling?
A printer pool:
• Requires all printers be the same model
• Requires all printers in the same location
• Increases availability and scalability
Printer pooling is a way to combine multiple physical printers into
a single logical unit
Deploying Printers to Clients
You can deploy printers to clients by using:
• Group Policy objects created by Print Management
• Manual installation
• Group Policy preferences
Discussion: Troubleshooting Network Printing
What are some common network
printing problems and their
resolution?
5 min
Lab: Configuring and Troubleshooting Network
File and Print Services
• Exercise 1: Creating and Configuring a File Share
• Exercise 2: Encrypting and Recovering Files
• Exercise 3: Creating and Configuring a Printer Pool
Logon information
Virtual machine
6421B-NYC-DC1
6421B-NYC-CL1
User name ContosoAdministrator
Password Pa$$w0rd
Estimated time: 75 minutes
Lab Scenario
• You are configuring a new file server that will hold files shared by
multiple departments. The first two departments to move their files
to this location are the Marketing and Production departments. You
need to configure the file share so that each department has access
to view and modify only their own files. In addition, users should not
see files and folder that they do not have access to.
• Your organization would like to allow users to start encrypting files
by using EFS. However, there are concerns about recoverability. To
enhance the management of the certificates used for EFS, you are
going to configure an internal certification authority to issue
certificates to users. You will also configure a recovery agent for EFS
and verify that the recovery agent can recover files.
• The Marketing department has a single central copy room that stores
the printer for the entire floor. Over the last year, the capacity of
your printer has become a concern. In particular, when a user prints
a large job, it prevents other users from obtaining their print jobs for
10 or 15 minutes. To resolve this problem, you have purchased two
new identical printers to configure as a printer pool for the Marketing
department.
Lab Review
• In Exercise 1, why did Adam only see the Marketing
folder?
• In Exercise 2, why was the Administrator account able to
open the encrypted file?
• When two ports are enabled for a printer, how do you
know where a print job will be directed?
Module Review and Takeaways
• Review Questions
• Tools

More Related Content

What's hot

MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
Computer Networking
 
Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07
gameaxt
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
gameaxt
 
MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
Computer Networking
 
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
Best MCSA - SQL SERVER 2012 Training Institute in DelhiBest MCSA - SQL SERVER 2012 Training Institute in Delhi
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
Information Technology
 
Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13
gameaxt
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
Raja Waseem Akhtar
 
MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09
Computer Networking
 
6421 b Module-02
6421 b Module-026421 b Module-02
6421 b Module-02
Bibekananada Jena
 
Microsoft Offical Course 20410C_09
Microsoft Offical Course 20410C_09Microsoft Offical Course 20410C_09
Microsoft Offical Course 20410C_09
gameaxt
 
Chapter08 Implementing And Managing Printers
Chapter08      Implementing And  Managing  PrintersChapter08      Implementing And  Managing  Printers
Chapter08 Implementing And Managing Printers
Raja Waseem Akhtar
 
MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06
Computer Networking
 
Windows server
Windows serverWindows server
Windows server
Hideo Amezawa
 
6421 b Module-03
6421 b Module-036421 b Module-03
6421 b Module-03
Bibekananada Jena
 
MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01
Computer Networking
 
windows server 2012 internal monitoring tools
windows server 2012 internal monitoring toolswindows server 2012 internal monitoring tools
windows server 2012 internal monitoring tools
24x7 server monitoring
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and Managing
Gabriella Davis
 
Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02
gameaxt
 
10135 b 08
10135 b 0810135 b 08
10135 b 08
Wichien Saisorn
 

What's hot (20)

MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
 
MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
 
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
Best MCSA - SQL SERVER 2012 Training Institute in DelhiBest MCSA - SQL SERVER 2012 Training Institute in Delhi
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
 
Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
 
MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09MCSA 70-412 Chapter 09
MCSA 70-412 Chapter 09
 
6421 b Module-02
6421 b Module-026421 b Module-02
6421 b Module-02
 
Microsoft Offical Course 20410C_09
Microsoft Offical Course 20410C_09Microsoft Offical Course 20410C_09
Microsoft Offical Course 20410C_09
 
Chapter08 Implementing And Managing Printers
Chapter08      Implementing And  Managing  PrintersChapter08      Implementing And  Managing  Printers
Chapter08 Implementing And Managing Printers
 
MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06
 
Windows server
Windows serverWindows server
Windows server
 
6421 b Module-03
6421 b Module-036421 b Module-03
6421 b Module-03
 
MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01
 
windows server 2012 internal monitoring tools
windows server 2012 internal monitoring toolswindows server 2012 internal monitoring tools
windows server 2012 internal monitoring tools
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and Managing
 
Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02
 
10135 b 08
10135 b 0810135 b 08
10135 b 08
 

Viewers also liked

CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar RazCODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
CODE BLUE
 
Perl Development (Sample Courseware)
Perl Development (Sample Courseware)Perl Development (Sample Courseware)
Perl Development (Sample Courseware)
Garth Gilmour
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
ernestlithur
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
Coffeyville Community College
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
ernestlithur
 
ccna
ccnaccna
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Sangeetha Rangarajan
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
ernestlithur
 
US Pmp Overview 2008
US Pmp Overview 2008US Pmp Overview 2008
US Pmp Overview 2008
Jaydeep Adhikari
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
Aerohive Configuration guide.
Aerohive Configuration guide. Aerohive Configuration guide.
Aerohive Configuration guide.
armaan7139
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
Atlantic Training, LLC.
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 

Viewers also liked (20)

CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar RazCODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
 
Perl Development (Sample Courseware)
Perl Development (Sample Courseware)Perl Development (Sample Courseware)
Perl Development (Sample Courseware)
 
Chapter5ccna
Chapter5ccnaChapter5ccna
Chapter5ccna
 
70 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 04100970 640 Lesson05 Ppt 041009
70 640 Lesson05 Ppt 041009
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
ccna
ccnaccna
ccna
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
US Pmp Overview 2008
US Pmp Overview 2008US Pmp Overview 2008
US Pmp Overview 2008
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Aerohive Configuration guide.
Aerohive Configuration guide. Aerohive Configuration guide.
Aerohive Configuration guide.
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 

Similar to 6421 b Module-10

Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and Libraries
Gene Carboni
 
Module 4 sharing files by using windows 7
Module 4   sharing files by using windows 7Module 4   sharing files by using windows 7
Module 4 sharing files by using windows 7
xeroxk
 
Mcts chapter 6
Mcts chapter 6Mcts chapter 6
Mcts chapter 6
Sadegh Nakhjavani
 
Cloud storage solution technical requirement
Cloud storage solution  technical requirementCloud storage solution  technical requirement
Cloud storage solution technical requirement
taotao1240
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Tanveer Malik
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Ahmed El-Arabawy
 
Windows_Installation.pptx
Windows_Installation.pptxWindows_Installation.pptx
Windows_Installation.pptx
LearyJohn
 
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdfHsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
AAFREEN SHAIKH
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7
aesthetics00
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file system
Tanveer Malik
 
System software and its types
System software and its typesSystem software and its types
System software and its types
samina khan
 
Digitally Transform (And Keep) Your On-Premises File Servers
Digitally Transform (And Keep) Your On-Premises File ServersDigitally Transform (And Keep) Your On-Premises File Servers
Digitally Transform (And Keep) Your On-Premises File Servers
Aidan Finn
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
LeahRachael
 
System calls in OS.pptx
System calls in OS.pptxSystem calls in OS.pptx
System calls in OS.pptx
DivyaKS18
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
PoornimaGhodke3
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
Irsandi Hasan
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
solarisyourep
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
Sam Bowne
 

Similar to 6421 b Module-10 (20)

Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and Libraries
 
Module 4 sharing files by using windows 7
Module 4   sharing files by using windows 7Module 4   sharing files by using windows 7
Module 4 sharing files by using windows 7
 
Mcts chapter 6
Mcts chapter 6Mcts chapter 6
Mcts chapter 6
 
Cloud storage solution technical requirement
Cloud storage solution  technical requirementCloud storage solution  technical requirement
Cloud storage solution technical requirement
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)
 
Windows_Installation.pptx
Windows_Installation.pptxWindows_Installation.pptx
Windows_Installation.pptx
 
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdfHsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file system
 
System software and its types
System software and its typesSystem software and its types
System software and its types
 
Digitally Transform (And Keep) Your On-Premises File Servers
Digitally Transform (And Keep) Your On-Premises File ServersDigitally Transform (And Keep) Your On-Premises File Servers
Digitally Transform (And Keep) Your On-Premises File Servers
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
 
System calls in OS.pptx
System calls in OS.pptxSystem calls in OS.pptx
System calls in OS.pptx
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
 

More from Bibekananada Jena

6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
Bibekananada Jena
 
6421 b Module-08
6421 b Module-086421 b Module-08
6421 b Module-08
Bibekananada Jena
 
6421 b Module-07
6421 b Module-076421 b Module-07
6421 b Module-07
Bibekananada Jena
 
6421 b Module-06
6421 b Module-066421 b Module-06
6421 b Module-06
Bibekananada Jena
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
Bibekananada Jena
 
6421 b Module-04
6421 b Module-046421 b Module-04
6421 b Module-04
Bibekananada Jena
 
Course 6421B introduction
Course 6421B introduction Course 6421B introduction
Course 6421B introduction
Bibekananada Jena
 
6421 b Module-01 Planning and Configuring IPv4
6421 b Module-01 Planning and Configuring IPv46421 b Module-01 Planning and Configuring IPv4
6421 b Module-01 Planning and Configuring IPv4
Bibekananada Jena
 

More from Bibekananada Jena (8)

6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
6421 b Module-08
6421 b Module-086421 b Module-08
6421 b Module-08
 
6421 b Module-07
6421 b Module-076421 b Module-07
6421 b Module-07
 
6421 b Module-06
6421 b Module-066421 b Module-06
6421 b Module-06
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
 
6421 b Module-04
6421 b Module-046421 b Module-04
6421 b Module-04
 
Course 6421B introduction
Course 6421B introduction Course 6421B introduction
Course 6421B introduction
 
6421 b Module-01 Planning and Configuring IPv4
6421 b Module-01 Planning and Configuring IPv46421 b Module-01 Planning and Configuring IPv4
6421 b Module-01 Planning and Configuring IPv4
 

Recently uploaded

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 

Recently uploaded (20)

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 

6421 b Module-10

  • 1. Module 10 Configuring and Troubleshooting Network File and Print Services
  • 2. Module Overview • Configuring and Troubleshooting File Shares • Encrypting Network Files with EFS • Encrypting Partitions with BitLocker • Configuring and Troubleshooting Network Printing
  • 3. Lesson 1: Configuring and Troubleshooting File Shares • What Is a File Share? • Demonstration: How to Create a File Share • What Are NTFS Permissions? • Demonstration: How to Configure NTFS Permissions • Troubleshooting Network File Access Permissions • What Is Access-Based Enumeration? • File Access Enhancements in Windows Server 2008
  • 4. What Is a File Share? A file share is a folder on a server that has been configured for access over the network • File share permissions are: • Full Control • Change • Read • Access file shares by using: • A UNC path • Mapped drive letter
  • 5. Demonstration: How to Create a File Share In the demonstration, you will see how to: • Create a file share by using simplified interface • Create a file share by using advanced sharing • Configure advanced sharing for a file share
  • 6. What Are NTFS Permissions? The basic NTFS permissions are: • Read & Execute NTFS permissions control which users or groups can access or modify files and folders on NTFS formatted partitions • List folder contents • Modify • Full Control • Read • Write
  • 7. Demonstration: How to Configure NTFS Permissions In this demonstration, you will see how to: • Configure NTFS permissions • View advanced NTFS permissions • View inherited permissions
  • 8. Troubleshooting Network File Access Permissions The troubleshooting steps are: • Check effective NTFS permissions • Deny permission overrides allow permission • Verify share permissions • Assigning Full Control to the Everyone group simplifies permission assignment
  • 9. What Is Access-Based Enumeration? Access-based enumeration: • Hides files and folder that you do not have read access to • Simplifies file browsing for users • Is enabled automatically when sharing is enabled using the simplified sharing interface • Can be enabled and disabled in Share and Storage Management
  • 10. File Access Enhancements in Windows Server 2008 Windows Server 2008 includes SMB 2.0: Windows Server 2008 R2 includes SMB 2.1: • Enhances performance over slow networks • Combines multiple commands into a single request • Large MTU support • Better support for sleep modes • Combines multiple commands into a single request • Client oplock leasing
  • 11. Lesson 2: Encrypting Network Files with EFS • What Is EFS? • How EFS works • Recovering EFS Encrypted Files • Demonstration: How to Encrypt a File by Using EFS
  • 12. What Is EFS? • EFS is a feature that can encrypt files stored on an NTFS formatted partition • EFS Encryption acts as an additional layer of security • EFS can be used with no configuration
  • 13. How EFS works • Symmetric encryption is used to protect the file data • File Encryption Key (FEK) • Public key encryption is used to protect the symmetric key • User certificate with public key and private key • Also certificate of recovery agent EFS
  • 14. Recovering EFS Encrypted Files To ensure you can recover EFS encrypted files: • Back up user certificates • Configure a recovery agent
  • 15. Demonstration: How to Encrypt a File by Using EFS In this demonstration, you will see how to: • Verify that a computer account supports EFS on a network share • Use EFS to encrypt a file on a network share • View the certificate used for encryption • Test access to an encrypted file
  • 16. Lesson 3: Encrypting Partitions with BitLocker • What Is BitLocker? • How BitLocker Works • Recovering BitLocker Encrypted Drives • Demonstration: How to Encrypt a Partition by Using BitLocker
  • 17. What Is BitLocker? A feature in Windows Server 2008 that allows you to encrypt entire partitions Benefits for BitLocker are: • Data protection for stolen drives • Safe shipping of preconfigured servers • Easier decommissioning of drives • Maintaining system integrity
  • 18. How BitLocker Works • A Volume Master Key encrypts each partition • A Full Volume Encryption Key encrypts the Volume Master Keys • The Full Volume Encryption Key is stored in a TPM • To use BitLocker there must be two partitions: • System – with boot files • Boot – with operating system files (C:)
  • 19. Recovering BitLocker Encrypted Drives BitLocker encrypted drives can be recovered by using: • A recovery key from USB flash drive • Saved immediately after encryption • A data recovery agent • Configured by using Group Policy • A recovery password • In Active Directory • Saved or printed immediately after encryption
  • 20. Demonstration: How to Encrypt a Partition by Using BitLocker In this demonstration, you will see how to: • Install the BitLocker feature • Configure Bitlocker to not require a TPM • Enable BitLocker when a TPM is unavailable • Access the recovery password
  • 21. Lesson 4: Configuring and Troubleshooting Network Printing • Benefits of Network Printing • Security Options for Network Printing • Demonstration: How to Create Multiple Configurations for a Print Device • What Is Printer Pooling? • Deploying Printers to Clients • Discussion: Troubleshooting Network Printing
  • 22. Benefits of Network Printing • Simplified troubleshooting • Lower total cost of ownership • Centralized management • Listing in Active Directory
  • 23. Security Options for Network Printing • The available permissions are: • Print • Manage this printer • Manage documents • The default security allows: • Everyone to print • Everyone to manage their own
  • 24. Demonstration: How to Create Multiple Configurations for a Print Device In this demonstration, you will see how to: • Create a shared printer • Create a second printer using the same port • Increase the priority of the second printer
  • 25. What Is Printer Pooling? A printer pool: • Requires all printers be the same model • Requires all printers in the same location • Increases availability and scalability Printer pooling is a way to combine multiple physical printers into a single logical unit
  • 26. Deploying Printers to Clients You can deploy printers to clients by using: • Group Policy objects created by Print Management • Manual installation • Group Policy preferences
  • 27. Discussion: Troubleshooting Network Printing What are some common network printing problems and their resolution? 5 min
  • 28. Lab: Configuring and Troubleshooting Network File and Print Services • Exercise 1: Creating and Configuring a File Share • Exercise 2: Encrypting and Recovering Files • Exercise 3: Creating and Configuring a Printer Pool Logon information Virtual machine 6421B-NYC-DC1 6421B-NYC-CL1 User name ContosoAdministrator Password Pa$$w0rd Estimated time: 75 minutes
  • 29. Lab Scenario • You are configuring a new file server that will hold files shared by multiple departments. The first two departments to move their files to this location are the Marketing and Production departments. You need to configure the file share so that each department has access to view and modify only their own files. In addition, users should not see files and folder that they do not have access to. • Your organization would like to allow users to start encrypting files by using EFS. However, there are concerns about recoverability. To enhance the management of the certificates used for EFS, you are going to configure an internal certification authority to issue certificates to users. You will also configure a recovery agent for EFS and verify that the recovery agent can recover files. • The Marketing department has a single central copy room that stores the printer for the entire floor. Over the last year, the capacity of your printer has become a concern. In particular, when a user prints a large job, it prevents other users from obtaining their print jobs for 10 or 15 minutes. To resolve this problem, you have purchased two new identical printers to configure as a printer pool for the Marketing department.
  • 30. Lab Review • In Exercise 1, why did Adam only see the Marketing folder? • In Exercise 2, why was the Administrator account able to open the encrypted file? • When two ports are enabled for a printer, how do you know where a print job will be directed?
  • 31. Module Review and Takeaways • Review Questions • Tools