SlideShare a Scribd company logo
1 of 50
A+ Guide to IT Technical Support, 9th
Edition
Chapter 17
Windows Resources on a Network
© Cengage Learning 2017
A+ Guide to IT Technical Support, 9th Edition
Objectives
• Support some client-server applications
• Share and secure files and folders on a network
• Support cloud computing services on a network
2
© Cengage Learning 2017
Supporting Client/Server Applications
• Client/Server applications expected to support:
– Internet Explorer
– Remote Desktop
– Other remote applications
• Also need to know how to use Group Policy to
configure Quality of Service (QoS)
– Also how to link a data source through a network to
database applications
A+ Guide to IT Technical Support, 9th Edition 3
© Cengage Learning 2017
Network Servers
• List of popular client-server resources:
– Mail server
– File server
– Print server
– DHCP server
– DNS server
– Proxy server
– Authentication server
– Web server
A+ Guide to IT Technical Support, 9th Edition 4
© Cengage Learning 2017
Internet Explorer
• Most popular client/server applications are a
browser and web server
• Internet Explorer (IE) version 11: latest version at
this writing
– Windows 10 features new Microsoft Edge browser
• Easy to upgrade by using Windows Update
• Tips when using IE window:
– To show the menu bar, press the Alt key
– HTTP Secure – look for https and a padlock icon
– If you have problems with IE11, you can disable it
A+ Guide to IT Technical Support, 9th Edition 5
© Cengage Learning 2017
Internet Explorer
• Use the Internet Options box to manage IE settings
– Click Tools icon and click Internet Options
• Internet Options box has several tabs with different
configuration options and settings
• General Tab
– Change the home page or add a second home page
– Protect your identity and surfing records
– Check Delete browsing history on exit if you want
your history cleared each time you close IE
– Manage IE cache
A+ Guide to IT Technical Support, 9th Edition 6
© Cengage Learning 2017
Internet Explorer
• Security Tab
– Set security level (medium-high is the default level)
• Prompts before downloading content
• Does not download ActiveX controls that are not signed
by Microsoft (virus can sometimes hide in an ActiveX
control)
– To customize security settings, click Custom level
A+ Guide to IT Technical Support, 9th Edition 7
© Cengage Learning 2017
Internet Explorer
• Privacy Tab and Content Tab
– Use Privacy Tab to block cookies that might invade
your privacy or steal identity
– Content tab contains settings for Family Safety,
certificates used by web sites, and how
AutoComplete and Feeds are handled
A+ Guide to IT Technical Support, 9th Edition 8
© Cengage Learning 2017
Internet Explorer
• Connections Tab and Proxy Settings
– Allows you to configure proxy server settings and
create a VPN connection
• Proxy server: intercepts requests that a browser makes
of a server and serves up request from a cache it
maintains
A+ Guide to IT Technical Support, 9th Edition 9
Figure 17-8 Enter the IP address of all proxy
servers on your corporate network
© Cengage Learning 2017
Internet Explorer
• Programs Tab
– Used to manage add-
ons (plug-ins)
• Add-ons: small apps
that help IE display
multimedia content,
manage email, translate
text, or other actions
A+ Guide to IT Technical Support, 9th Edition 10
Figure 17-9 Use the Programs Tab to
manage add-ons and default applications
used for Internet services
© Cengage Learning 2017
Internet Explorer
• Advanced Tab
– Contains several miscellaneous settings used to
control Internet Explorer
– One setting is useful when IE is giving problems
• If you suspect problems are caused by wrong settings,
click Reset to return IE to all default settings
A+ Guide to IT Technical Support, 9th Edition 11
© Cengage Learning 2017
Remote Desktop Connection (RDC)
• Remote Desktop gives a user access to a Windows
desktop from anywhere on the Internet
• To use Remote Desktop, the computer you want to
remotely access (the server) must be running
business or professional editions of Windows
8/7/Vista
– Computer accessing can be running any version of
Windows
• Computers set to serve up Remote Desktop are not
as secure
– You can use software that does not require opening
ports for a more secure solution
A+ Guide to IT Technical Support, 9th Edition 12
© Cengage Learning 2017
Remote Assistance
• Remote Assistance – a user on the server computer
can remain signed in during the remote session,
retains control of the session, and can see the
screen
– Helpful when troubleshooting problems
– User who needs help send an invitation by email or
chat to connect to their computer using Remote
Assistance
A+ Guide to IT Technical Support, 9th Edition 13
© Cengage Learning 2017
Remote Assistance
• Ways to initiate a Remote Assistance session:
– User saves an invitation file and send file to
technician
– User can send an automated email through the
Remote Assistance app
– User can use Easy Connect, which is the easiest
method to start Remote Assistance connection
• Both computers must support Easy Connect
– Technician can initiate a session
• Follow steps outlined in text to see how to initiate a
Remote Assistance connection using Easy Connect
A+ Guide to IT Technical Support, 9th Edition 14
© Cengage Learning 2017
Remote Assistance
• Things you can do during a Remote Assistance
session:
– Chat
– Request control
– Pause
– Disconnect or Stop sharing
– Log activity in a log file
– Change expiration of invitations
A+ Guide to IT Technical Support, 9th Edition 15
© Cengage Learning 2017
Remote Assistance
• If you have problems making the connection:
– Windows Firewall on the user’s computer might be
blocking Remote Assistance
• Verify Remote Assistance is checked as an exception
to blocked apps in Windows Firewall window
– If outside the user’s local network, the hardware
firewall protecting her network might be blocking
Remote Assistance
• Verify that port forwarding is enabled for Remote
Assistance
A+ Guide to IT Technical Support, 9th Edition 16
© Cengage Learning 2017
Use Group Policy to Improve QoS
Applications
• Group Policy (gpedit.msc)
– Used to control what users can do and how the system
can be used
– Only available in Windows professional and business
editions
– Works by:
• Making entries in registry
• Applying scripts to Windows startup, shutdown, and
logon processes
• Affecting security settings
A+ Guide to IT Technical Support, 9th Edition 17
© Cengage Learning 2017
Use Group Policy to Improve QoS
Applications
• Group Policy (cont’d)
– Can be applied to computer or user
• Computer policies are applied just before logon screen
• User policies are applied after login
– To use Group Policy to set the QoS level for an
application follow steps outlined in the text
– To get the most out of QoS, configure each router and
computer on the network to use QoS
A+ Guide to IT Technical Support, 9th Edition 18
© Cengage Learning 2017
Use Group Policy to Improve QoS
Applications
• Important options when creating a policy:
– Priority level is determined by a DSCP (Differentiated
Service Code Point) value
– Outbound traffic can be throttled to limit the
bandwidth assigned an application
– The policy can apply to all applications or a specific
program
– You can specify the source IP address and/or
destination IP address
– You can select the protocol (TCP or UDP) and port
numbers for the policy
A+ Guide to IT Technical Support, 9th Edition 19
© Cengage Learning 2017
ODBC Data Sources
• Open Database Connectivity (ODBC) – technology
used to create the data source
– Which provides access to the database and includes
the drivers required to interface between Access and
the data
– Drivers for Microsoft SQL Server must be installed on
the local computer
– Use the ODBC Data Sources tool in the
Administrative Tools group of Control Panel to
configure the data source
A+ Guide to IT Technical Support, 9th Edition 20
© Cengage Learning 2017
Controlling Access to Folders and Files
• Managing shared resources is accomplished by:
– Assigning rights to user accounts
– Assigning permissions to folders and files
A+ Guide to IT Technical Support, 9th Edition 21
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Principle of least privilege: An approach where
computer users are assigned the minimum rights
required to do their job
• Rights or privileges are established when you first
create a user account (based on account type)
– Rights can later be changed by changing the user
groups to which the account belongs
• User accounts are created from the Control Panel or
by using the Computer Management console
A+ Guide to IT Technical Support, 9th Edition 22
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Type of User Account
– Administrator account: has complete access to the
system and can make changes that affect the security
of the system and other users
– Standard user account: can use software and
hardware and make some system changes but
cannot make changes that affect the security of the
system or other users
A+ Guide to IT Technical Support, 9th Edition 23
© Cengage Learning 2017
Classify User Accounts and User
Groups
A+ Guide to IT Technical Support, 9th Edition 24
Figure 17-29 Create a new user
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Built-in User Groups
– Administrators and Users groups
– Guests group
• Has limited rights and is given a temporary profile that
is deleted when user logs off
– Backup Operators group
• Can back up and restore files on the system regardless
of its access permission to files
– Power Users group
• Windows XP group that can read from and write to
parts of the system, install apps, and perform limited
administrator tasks
A+ Guide to IT Technical Support, 9th Edition 25
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Windows might automatically assign one of these
built-in user groups to an account:
– Authenticated Users group: includes all user accounts
except the Guest account
– Everyone group: includes the Authenticated Users
group as well as the Guest account
– Anonymous users: users who have not been
authenticated on a remote computer
A+ Guide to IT Technical Support, 9th Edition 26
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Customized User Groups
– Use Management Console in business and
professional editions of Windows to create custom
user groups
– Easier to assign permissions to user groups rather
than to individual accounts
• User groups work well when several users need the
same permissions
• Create a user group and then assign permission to the
user group
A+ Guide to IT Technical Support, 9th Edition 27
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Three general strategies for managing shared folder
and files in Windows
– Homegroup sharing: use when all users on a
network require the same access to all resources
– Workgroup sharing: offers better security than a
homegroup
– Domain controlling: if computer belongs to a
domain, all security is managed by the network
administrator for the entire network
A+ Guide to IT Technical Support, 9th Edition 28
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Tips on which folder to use to hold shared data:
– Private data for individual users
• C:Users folder for that user
– Data for all users to share
• C:UsersPublic folder
– For best security, create a folder not in either of the
above folders and assign permissions to that folder
and its subfolders
• Allow all users access or only certain users or user
groups
A+ Guide to IT Technical Support, 9th Edition 29
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Using workgroup sharing, Windows offers two
methods to share a folder
– Share permissions: grant permissions only to
network users and not to local users
• Apply to a folder and its contents, not to individual files
– NTFS permissions: apply to local users and network
users
• Apply to both folders and individual files
• Work on NTFS volumes only
A+ Guide to IT Technical Support, 9th Edition 30
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Tips when implementing permissions:
– If both share and NTFS permission are used, the
most restrictive permission applies
– If NTFS permissions are conflicting the more liberal
permission applies
– Permission propagation: when permissions are
passed from parent to child
– Inherited permissions: permissions attained from a
parent object
– When you move or copy an object to a folder, the
object takes on permissions of that folder
A+ Guide to IT Technical Support, 9th Edition 31
© Cengage Learning 2017
How to Share Folders and Files
• User and Group Information with the gpresult
Command
– Use the gpresult command to pull a list of all the
groups a user belongs to
– Information can be helpful when troubleshooting user
group issues or Group Policy problems
– Enter the command gpresult/scope user/user
username /r to retrieve information on a user other
than the one signed in
A+ Guide to IT Technical Support, 9th Edition 32
© Cengage Learning 2017
How to Share Folders and Files
• How to Use Share Permission
– For NTFS volume, use NTFS permission whenever
possible
A+ Guide to IT Technical Support, 9th Edition 33
Figure 17-45 Use the
sharing tab of a folder
properties box to set up
share permissions on a
FAT volume
© Cengage Learning 2017
Support and Troubleshoot Shared
Folders and Files
• Few tips about managing shared folders and files:
– Use advanced permissions settings if you need
further control of a user or group
• Click Advanced on the Security tab of a folder’s
Properties box
– Manage permissions using parent folder
• Subfolders inherit permissions of the parent folder
– Check the effective permissions
• To know for sure which permissions are in effect, see
Effective Permissions tab of Advanced Security
Settings box
A+ Guide to IT Technical Support, 9th Edition 34
© Cengage Learning 2017
Support and Troubleshoot Shared
Folders and Files
• Few tips about managing shared folders and files:
(cont’d)
– Take ownership of a folder
• Owner of a folder always has full permissions
– Use only one workgroup
• Performance improves when they are all in the same
workgroup
– Require passwords for all user accounts
– Use a mapped network drive
A+ Guide to IT Technical Support, 9th Edition 35
© Cengage Learning 2017
Support and Troubleshoot Shared
Folders and Files
A+ Guide to IT Technical Support, 9th Edition 36
Figure 17-50 Change the owner of a folder
© Cengage Learning 2017
How to Map a Network Drive or
Network Printer
• A network share is one of the most powerful and
versatile methods of communicating over a network
– Makes one computer (the client) appear to have a
new hard drive, such a drive E, that is really hard
drive space on another host computer
– Called mapping a drive
• Network File System (NFS) makes it possible for
files on the network to be accessed as easily as if
they are stored on the local computer
A+ Guide to IT Technical Support, 9th Edition 37
© Cengage Learning 2017
Hidden Network Resources and
Administrative Shares
• To protect confidential data from users on the
network:
– Disable File and Printer Sharing
– Hide a shared folder
• If you want to share a folder, but don’t want others to
see it add a $ to the end of the folder name
• Those that want to access the hidden folder must enter
the complete path to the folder (including $) in search
box
A+ Guide to IT Technical Support, 9th Edition 38
© Cengage Learning 2017
Hidden Network Resources and
Administrative Shares
A+ Guide to IT Technical Support, 9th Edition 39
Figure 17-54 (a) A $ on the share name hides the share unless the exact name is used to locate it;
(b) access a hidden, shared folder on the network by searching for its exact name
© Cengage Learning 2017
Hidden Network Resources and
Administrative Shares
• Local shares: folders and files on a computer that
are shared with others using local user accounts
• Administrative shares: folders that are shared by
default that administrator accounts at the domain
level can access
– Two types of administrative shares:
• The %systemroot% folder
• Any volume or drive
• Don’t share the /Windows folder or an entire drive
– Don’t want system files and folders exposed
A+ Guide to IT Technical Support, 9th Edition 40
© Cengage Learning 2017
Cloud Computing
• Cloud computing – when a third-party service or
vendor makes computer resources available to its
customers over the Internet
• Can provide many other types of resources:
– Applications
– Network services
– Websites
– Database servers
– Specialized developer applications
– Entire operating systems
A+ Guide to IT Technical Support, 9th Edition 41
© Cengage Learning 2017
Cloud Computing
• All cloud computing service models incorporate the
following elements:
– Service at any time
– Elastic services and storage
– Support for multiple client platforms
– Resource pooling and consolidation
– Measured service
A+ Guide to IT Technical Support, 9th Edition 42
© Cengage Learning 2017
Cloud Computing Categories
• Cloud computing service models are categorized by
the types of services they provide:
– IaaS (Infrastructure as a Service) – customer rents
hardware, including servers, storage, and networking
– PaaS (Platform as a Service) – customer rents
hardware, operating systems, and some applications
that might support other applications installed
– SaaS (Software as a Service) – customers rent
hardware, operating systems, and applications
specific to the customer’s needs
• Applications are provided through an online user
interface
A+ Guide to IT Technical Support, 9th Edition 43
© Cengage Learning 2017
Cloud Computing Categories
• Cloud computing service models are categorized by
the types of services they provide (cont’d):
– XaaS (Anything as a Service or Everything as a
Service) – the “X” represents an unknown
• Cloud can provide any combination of functions
• Another SaaS implementation that doesn’t fit the
official definition of SaaS is rentable software or
software by subscription
– Many companies are moving toward this
subscription model
A+ Guide to IT Technical Support, 9th Edition 44
© Cengage Learning 2017
Cloud Computing Categories
A+ Guide to IT Technical Support, 9th Edition 45
Figure 17-57 At each progressive level, the vendor takes over more computing responsibility for the customer
© Cengage Learning 2017
Deployment Models for Cloud
Computing
• Cloud computing deployment models:
– Public cloud – services are provided over the
Internet to the general public
– Private cloud – services are established on an
organization’s own servers
• Or established virtually for a single organization’s
private use
– Community cloud – services are shared between
multiple organizations, but not available publicly
– Hybrid cloud – a combination of public, private, and
community clouds used by same organization
A+ Guide to IT Technical Support, 9th Edition 46
© Cengage Learning 2017
Chapter Summary
• A client computer contacts a server to request
information or to perform a task
• The Internet Options dialog box is used to manage
many Internet Explorer settings
• Remote Desktop gives you access to your Windows
desktop from anywhere on the Internet
• A policy can be set using Group Policy to improve
Quality of Service (QoS) for an application
• Open Database Connectivity (OBDC) can create a
data source, which provides a remote database and
its drivers to a client computer
A+ Guide to IT Technical Support, 9th Edition 47
© Cengage Learning 2017
Chapter Summary
• Controlling access to folders and files on a network
is done by assigning rights to user accounts and
assigning permissions to files and folders
• Apply the principle of least privilege when assigning
rights to users
• Customized user groups that you create make it
easier to manage rights to multiple user accounts
• Three ways to share files and folders on the network
are to use homegroup sharing, workgroup sharing,
and domain controllers
A+ Guide to IT Technical Support, 9th Edition 48
© Cengage Learning 2017
Chapter Summary
• A mapped network drive makes it easier for users to
access drives and folders on the network
• Peer-to-peer networks use local shares, and a
Windows domain supports administrative shares
• Cloud computing is providing computing resources
over the Internet to customers
• Cloud computing service models, including IaaS,
PaaS, SaaS, and XaaS, are categorized by the
types of services they provide
A+ Guide to IT Technical Support, 9th Edition 49
© Cengage Learning 2017
Chapter Summary
• A public cloud service is available to the public, and
a private cloud service is kept on an organization’s
own servers or made available by a vendor only for
a single organization’s private use
A+ Guide to IT Technical Support, 9th Edition 50

More Related Content

What's hot

Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4Irsandi Hasan
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3Irsandi Hasan
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overviewAhmed Sultan
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCUKhalid Rehan
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationHelpSystems
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9Irsandi Hasan
 
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodayBackup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodaySymantec
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administrationgamme123
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1Irsandi Hasan
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administratorTheZayne92
 
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupIct 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupYonel Cadapan
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?HelpSystems
 

What's hot (19)

Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
 
Ch 19
Ch 19Ch 19
Ch 19
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCU
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodayBackup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, Today
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
Resume
ResumeResume
Resume
 
IT system and network administrator
IT system and network administratorIT system and network administrator
IT system and network administrator
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
 
Ict 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setupIct 9 module 3, lesson 2.5 basic computer configuration setup
Ict 9 module 3, lesson 2.5 basic computer configuration setup
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 

Similar to ppt ch17

Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022TechSoup
 
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsMicrosoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsTechSoup
 
3 modern desktop - office 365 pro plus deployment + servicing
3   modern desktop - office 365 pro plus deployment + servicing3   modern desktop - office 365 pro plus deployment + servicing
3 modern desktop - office 365 pro plus deployment + servicingAndrew Bettany
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopIT Masterclasses
 
Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle databaseSaikot Roy
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMike Taylor
 
BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8Janice Robinson
 
Social Networking Platform to Share Travel Experiences
Social Networking Platform to Share Travel ExperiencesSocial Networking Platform to Share Travel Experiences
Social Networking Platform to Share Travel ExperiencesMike Taylor
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage AnalysisThousandEyes
 
A Quick Introduction to E-Forms
A Quick Introduction to E-FormsA Quick Introduction to E-Forms
A Quick Introduction to E-FormsRich Medina
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft TechNet
 

Similar to ppt ch17 (20)

Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022Microsoft Cloud Solutions Webinar April 2022
Microsoft Cloud Solutions Webinar April 2022
 
Microsoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for NonprofitsMicrosoft Cloud Solutions for Nonprofits
Microsoft Cloud Solutions for Nonprofits
 
3 modern desktop - office 365 pro plus deployment + servicing
3   modern desktop - office 365 pro plus deployment + servicing3   modern desktop - office 365 pro plus deployment + servicing
3 modern desktop - office 365 pro plus deployment + servicing
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
20703-1B_00.pptx
20703-1B_00.pptx20703-1B_00.pptx
20703-1B_00.pptx
 
Manish Kumar
Manish KumarManish Kumar
Manish Kumar
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle database
 
ppt ch11
ppt ch11ppt ch11
ppt ch11
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
Mobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal ApplicationMobile Responsive Social Corporate Intranet Portal Application
Mobile Responsive Social Corporate Intranet Portal Application
 
GotmanCV_R1
GotmanCV_R1GotmanCV_R1
GotmanCV_R1
 
BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8BSAD 372 SPRING 2017 CH 8
BSAD 372 SPRING 2017 CH 8
 
Social Networking Platform to Share Travel Experiences
Social Networking Platform to Share Travel ExperiencesSocial Networking Platform to Share Travel Experiences
Social Networking Platform to Share Travel Experiences
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage Analysis
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
A Quick Introduction to E-Forms
A Quick Introduction to E-FormsA Quick Introduction to E-Forms
A Quick Introduction to E-Forms
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Microsoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network AccessMicrosoft Windows 7 Improved Network Access
Microsoft Windows 7 Improved Network Access
 

More from sadejoseph

More from sadejoseph (10)

ppt ch16
ppt ch16ppt ch16
ppt ch16
 
ch14
ch14ch14
ch14
 
ppt ch08
ppt ch08ppt ch08
ppt ch08
 
ppt ch07
ppt ch07ppt ch07
ppt ch07
 
Ex13 lesson04
Ex13 lesson04Ex13 lesson04
Ex13 lesson04
 
Ex13 lesson03
Ex13 lesson03Ex13 lesson03
Ex13 lesson03
 
Ex13 lesson02
Ex13 lesson02Ex13 lesson02
Ex13 lesson02
 
Ex13 lesson01
Ex13 lesson01Ex13 lesson01
Ex13 lesson01
 
OCP Booklet June 2015
OCP Booklet June 2015OCP Booklet June 2015
OCP Booklet June 2015
 
Ocp Booklet June 2015
Ocp Booklet June 2015Ocp Booklet June 2015
Ocp Booklet June 2015
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

ppt ch17

  • 1. A+ Guide to IT Technical Support, 9th Edition Chapter 17 Windows Resources on a Network
  • 2. © Cengage Learning 2017 A+ Guide to IT Technical Support, 9th Edition Objectives • Support some client-server applications • Share and secure files and folders on a network • Support cloud computing services on a network 2
  • 3. © Cengage Learning 2017 Supporting Client/Server Applications • Client/Server applications expected to support: – Internet Explorer – Remote Desktop – Other remote applications • Also need to know how to use Group Policy to configure Quality of Service (QoS) – Also how to link a data source through a network to database applications A+ Guide to IT Technical Support, 9th Edition 3
  • 4. © Cengage Learning 2017 Network Servers • List of popular client-server resources: – Mail server – File server – Print server – DHCP server – DNS server – Proxy server – Authentication server – Web server A+ Guide to IT Technical Support, 9th Edition 4
  • 5. © Cengage Learning 2017 Internet Explorer • Most popular client/server applications are a browser and web server • Internet Explorer (IE) version 11: latest version at this writing – Windows 10 features new Microsoft Edge browser • Easy to upgrade by using Windows Update • Tips when using IE window: – To show the menu bar, press the Alt key – HTTP Secure – look for https and a padlock icon – If you have problems with IE11, you can disable it A+ Guide to IT Technical Support, 9th Edition 5
  • 6. © Cengage Learning 2017 Internet Explorer • Use the Internet Options box to manage IE settings – Click Tools icon and click Internet Options • Internet Options box has several tabs with different configuration options and settings • General Tab – Change the home page or add a second home page – Protect your identity and surfing records – Check Delete browsing history on exit if you want your history cleared each time you close IE – Manage IE cache A+ Guide to IT Technical Support, 9th Edition 6
  • 7. © Cengage Learning 2017 Internet Explorer • Security Tab – Set security level (medium-high is the default level) • Prompts before downloading content • Does not download ActiveX controls that are not signed by Microsoft (virus can sometimes hide in an ActiveX control) – To customize security settings, click Custom level A+ Guide to IT Technical Support, 9th Edition 7
  • 8. © Cengage Learning 2017 Internet Explorer • Privacy Tab and Content Tab – Use Privacy Tab to block cookies that might invade your privacy or steal identity – Content tab contains settings for Family Safety, certificates used by web sites, and how AutoComplete and Feeds are handled A+ Guide to IT Technical Support, 9th Edition 8
  • 9. © Cengage Learning 2017 Internet Explorer • Connections Tab and Proxy Settings – Allows you to configure proxy server settings and create a VPN connection • Proxy server: intercepts requests that a browser makes of a server and serves up request from a cache it maintains A+ Guide to IT Technical Support, 9th Edition 9 Figure 17-8 Enter the IP address of all proxy servers on your corporate network
  • 10. © Cengage Learning 2017 Internet Explorer • Programs Tab – Used to manage add- ons (plug-ins) • Add-ons: small apps that help IE display multimedia content, manage email, translate text, or other actions A+ Guide to IT Technical Support, 9th Edition 10 Figure 17-9 Use the Programs Tab to manage add-ons and default applications used for Internet services
  • 11. © Cengage Learning 2017 Internet Explorer • Advanced Tab – Contains several miscellaneous settings used to control Internet Explorer – One setting is useful when IE is giving problems • If you suspect problems are caused by wrong settings, click Reset to return IE to all default settings A+ Guide to IT Technical Support, 9th Edition 11
  • 12. © Cengage Learning 2017 Remote Desktop Connection (RDC) • Remote Desktop gives a user access to a Windows desktop from anywhere on the Internet • To use Remote Desktop, the computer you want to remotely access (the server) must be running business or professional editions of Windows 8/7/Vista – Computer accessing can be running any version of Windows • Computers set to serve up Remote Desktop are not as secure – You can use software that does not require opening ports for a more secure solution A+ Guide to IT Technical Support, 9th Edition 12
  • 13. © Cengage Learning 2017 Remote Assistance • Remote Assistance – a user on the server computer can remain signed in during the remote session, retains control of the session, and can see the screen – Helpful when troubleshooting problems – User who needs help send an invitation by email or chat to connect to their computer using Remote Assistance A+ Guide to IT Technical Support, 9th Edition 13
  • 14. © Cengage Learning 2017 Remote Assistance • Ways to initiate a Remote Assistance session: – User saves an invitation file and send file to technician – User can send an automated email through the Remote Assistance app – User can use Easy Connect, which is the easiest method to start Remote Assistance connection • Both computers must support Easy Connect – Technician can initiate a session • Follow steps outlined in text to see how to initiate a Remote Assistance connection using Easy Connect A+ Guide to IT Technical Support, 9th Edition 14
  • 15. © Cengage Learning 2017 Remote Assistance • Things you can do during a Remote Assistance session: – Chat – Request control – Pause – Disconnect or Stop sharing – Log activity in a log file – Change expiration of invitations A+ Guide to IT Technical Support, 9th Edition 15
  • 16. © Cengage Learning 2017 Remote Assistance • If you have problems making the connection: – Windows Firewall on the user’s computer might be blocking Remote Assistance • Verify Remote Assistance is checked as an exception to blocked apps in Windows Firewall window – If outside the user’s local network, the hardware firewall protecting her network might be blocking Remote Assistance • Verify that port forwarding is enabled for Remote Assistance A+ Guide to IT Technical Support, 9th Edition 16
  • 17. © Cengage Learning 2017 Use Group Policy to Improve QoS Applications • Group Policy (gpedit.msc) – Used to control what users can do and how the system can be used – Only available in Windows professional and business editions – Works by: • Making entries in registry • Applying scripts to Windows startup, shutdown, and logon processes • Affecting security settings A+ Guide to IT Technical Support, 9th Edition 17
  • 18. © Cengage Learning 2017 Use Group Policy to Improve QoS Applications • Group Policy (cont’d) – Can be applied to computer or user • Computer policies are applied just before logon screen • User policies are applied after login – To use Group Policy to set the QoS level for an application follow steps outlined in the text – To get the most out of QoS, configure each router and computer on the network to use QoS A+ Guide to IT Technical Support, 9th Edition 18
  • 19. © Cengage Learning 2017 Use Group Policy to Improve QoS Applications • Important options when creating a policy: – Priority level is determined by a DSCP (Differentiated Service Code Point) value – Outbound traffic can be throttled to limit the bandwidth assigned an application – The policy can apply to all applications or a specific program – You can specify the source IP address and/or destination IP address – You can select the protocol (TCP or UDP) and port numbers for the policy A+ Guide to IT Technical Support, 9th Edition 19
  • 20. © Cengage Learning 2017 ODBC Data Sources • Open Database Connectivity (ODBC) – technology used to create the data source – Which provides access to the database and includes the drivers required to interface between Access and the data – Drivers for Microsoft SQL Server must be installed on the local computer – Use the ODBC Data Sources tool in the Administrative Tools group of Control Panel to configure the data source A+ Guide to IT Technical Support, 9th Edition 20
  • 21. © Cengage Learning 2017 Controlling Access to Folders and Files • Managing shared resources is accomplished by: – Assigning rights to user accounts – Assigning permissions to folders and files A+ Guide to IT Technical Support, 9th Edition 21
  • 22. © Cengage Learning 2017 Classify User Accounts and User Groups • Principle of least privilege: An approach where computer users are assigned the minimum rights required to do their job • Rights or privileges are established when you first create a user account (based on account type) – Rights can later be changed by changing the user groups to which the account belongs • User accounts are created from the Control Panel or by using the Computer Management console A+ Guide to IT Technical Support, 9th Edition 22
  • 23. © Cengage Learning 2017 Classify User Accounts and User Groups • Type of User Account – Administrator account: has complete access to the system and can make changes that affect the security of the system and other users – Standard user account: can use software and hardware and make some system changes but cannot make changes that affect the security of the system or other users A+ Guide to IT Technical Support, 9th Edition 23
  • 24. © Cengage Learning 2017 Classify User Accounts and User Groups A+ Guide to IT Technical Support, 9th Edition 24 Figure 17-29 Create a new user
  • 25. © Cengage Learning 2017 Classify User Accounts and User Groups • Built-in User Groups – Administrators and Users groups – Guests group • Has limited rights and is given a temporary profile that is deleted when user logs off – Backup Operators group • Can back up and restore files on the system regardless of its access permission to files – Power Users group • Windows XP group that can read from and write to parts of the system, install apps, and perform limited administrator tasks A+ Guide to IT Technical Support, 9th Edition 25
  • 26. © Cengage Learning 2017 Classify User Accounts and User Groups • Windows might automatically assign one of these built-in user groups to an account: – Authenticated Users group: includes all user accounts except the Guest account – Everyone group: includes the Authenticated Users group as well as the Guest account – Anonymous users: users who have not been authenticated on a remote computer A+ Guide to IT Technical Support, 9th Edition 26
  • 27. © Cengage Learning 2017 Classify User Accounts and User Groups • Customized User Groups – Use Management Console in business and professional editions of Windows to create custom user groups – Easier to assign permissions to user groups rather than to individual accounts • User groups work well when several users need the same permissions • Create a user group and then assign permission to the user group A+ Guide to IT Technical Support, 9th Edition 27
  • 28. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Three general strategies for managing shared folder and files in Windows – Homegroup sharing: use when all users on a network require the same access to all resources – Workgroup sharing: offers better security than a homegroup – Domain controlling: if computer belongs to a domain, all security is managed by the network administrator for the entire network A+ Guide to IT Technical Support, 9th Edition 28
  • 29. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Tips on which folder to use to hold shared data: – Private data for individual users • C:Users folder for that user – Data for all users to share • C:UsersPublic folder – For best security, create a folder not in either of the above folders and assign permissions to that folder and its subfolders • Allow all users access or only certain users or user groups A+ Guide to IT Technical Support, 9th Edition 29
  • 30. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Using workgroup sharing, Windows offers two methods to share a folder – Share permissions: grant permissions only to network users and not to local users • Apply to a folder and its contents, not to individual files – NTFS permissions: apply to local users and network users • Apply to both folders and individual files • Work on NTFS volumes only A+ Guide to IT Technical Support, 9th Edition 30
  • 31. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Tips when implementing permissions: – If both share and NTFS permission are used, the most restrictive permission applies – If NTFS permissions are conflicting the more liberal permission applies – Permission propagation: when permissions are passed from parent to child – Inherited permissions: permissions attained from a parent object – When you move or copy an object to a folder, the object takes on permissions of that folder A+ Guide to IT Technical Support, 9th Edition 31
  • 32. © Cengage Learning 2017 How to Share Folders and Files • User and Group Information with the gpresult Command – Use the gpresult command to pull a list of all the groups a user belongs to – Information can be helpful when troubleshooting user group issues or Group Policy problems – Enter the command gpresult/scope user/user username /r to retrieve information on a user other than the one signed in A+ Guide to IT Technical Support, 9th Edition 32
  • 33. © Cengage Learning 2017 How to Share Folders and Files • How to Use Share Permission – For NTFS volume, use NTFS permission whenever possible A+ Guide to IT Technical Support, 9th Edition 33 Figure 17-45 Use the sharing tab of a folder properties box to set up share permissions on a FAT volume
  • 34. © Cengage Learning 2017 Support and Troubleshoot Shared Folders and Files • Few tips about managing shared folders and files: – Use advanced permissions settings if you need further control of a user or group • Click Advanced on the Security tab of a folder’s Properties box – Manage permissions using parent folder • Subfolders inherit permissions of the parent folder – Check the effective permissions • To know for sure which permissions are in effect, see Effective Permissions tab of Advanced Security Settings box A+ Guide to IT Technical Support, 9th Edition 34
  • 35. © Cengage Learning 2017 Support and Troubleshoot Shared Folders and Files • Few tips about managing shared folders and files: (cont’d) – Take ownership of a folder • Owner of a folder always has full permissions – Use only one workgroup • Performance improves when they are all in the same workgroup – Require passwords for all user accounts – Use a mapped network drive A+ Guide to IT Technical Support, 9th Edition 35
  • 36. © Cengage Learning 2017 Support and Troubleshoot Shared Folders and Files A+ Guide to IT Technical Support, 9th Edition 36 Figure 17-50 Change the owner of a folder
  • 37. © Cengage Learning 2017 How to Map a Network Drive or Network Printer • A network share is one of the most powerful and versatile methods of communicating over a network – Makes one computer (the client) appear to have a new hard drive, such a drive E, that is really hard drive space on another host computer – Called mapping a drive • Network File System (NFS) makes it possible for files on the network to be accessed as easily as if they are stored on the local computer A+ Guide to IT Technical Support, 9th Edition 37
  • 38. © Cengage Learning 2017 Hidden Network Resources and Administrative Shares • To protect confidential data from users on the network: – Disable File and Printer Sharing – Hide a shared folder • If you want to share a folder, but don’t want others to see it add a $ to the end of the folder name • Those that want to access the hidden folder must enter the complete path to the folder (including $) in search box A+ Guide to IT Technical Support, 9th Edition 38
  • 39. © Cengage Learning 2017 Hidden Network Resources and Administrative Shares A+ Guide to IT Technical Support, 9th Edition 39 Figure 17-54 (a) A $ on the share name hides the share unless the exact name is used to locate it; (b) access a hidden, shared folder on the network by searching for its exact name
  • 40. © Cengage Learning 2017 Hidden Network Resources and Administrative Shares • Local shares: folders and files on a computer that are shared with others using local user accounts • Administrative shares: folders that are shared by default that administrator accounts at the domain level can access – Two types of administrative shares: • The %systemroot% folder • Any volume or drive • Don’t share the /Windows folder or an entire drive – Don’t want system files and folders exposed A+ Guide to IT Technical Support, 9th Edition 40
  • 41. © Cengage Learning 2017 Cloud Computing • Cloud computing – when a third-party service or vendor makes computer resources available to its customers over the Internet • Can provide many other types of resources: – Applications – Network services – Websites – Database servers – Specialized developer applications – Entire operating systems A+ Guide to IT Technical Support, 9th Edition 41
  • 42. © Cengage Learning 2017 Cloud Computing • All cloud computing service models incorporate the following elements: – Service at any time – Elastic services and storage – Support for multiple client platforms – Resource pooling and consolidation – Measured service A+ Guide to IT Technical Support, 9th Edition 42
  • 43. © Cengage Learning 2017 Cloud Computing Categories • Cloud computing service models are categorized by the types of services they provide: – IaaS (Infrastructure as a Service) – customer rents hardware, including servers, storage, and networking – PaaS (Platform as a Service) – customer rents hardware, operating systems, and some applications that might support other applications installed – SaaS (Software as a Service) – customers rent hardware, operating systems, and applications specific to the customer’s needs • Applications are provided through an online user interface A+ Guide to IT Technical Support, 9th Edition 43
  • 44. © Cengage Learning 2017 Cloud Computing Categories • Cloud computing service models are categorized by the types of services they provide (cont’d): – XaaS (Anything as a Service or Everything as a Service) – the “X” represents an unknown • Cloud can provide any combination of functions • Another SaaS implementation that doesn’t fit the official definition of SaaS is rentable software or software by subscription – Many companies are moving toward this subscription model A+ Guide to IT Technical Support, 9th Edition 44
  • 45. © Cengage Learning 2017 Cloud Computing Categories A+ Guide to IT Technical Support, 9th Edition 45 Figure 17-57 At each progressive level, the vendor takes over more computing responsibility for the customer
  • 46. © Cengage Learning 2017 Deployment Models for Cloud Computing • Cloud computing deployment models: – Public cloud – services are provided over the Internet to the general public – Private cloud – services are established on an organization’s own servers • Or established virtually for a single organization’s private use – Community cloud – services are shared between multiple organizations, but not available publicly – Hybrid cloud – a combination of public, private, and community clouds used by same organization A+ Guide to IT Technical Support, 9th Edition 46
  • 47. © Cengage Learning 2017 Chapter Summary • A client computer contacts a server to request information or to perform a task • The Internet Options dialog box is used to manage many Internet Explorer settings • Remote Desktop gives you access to your Windows desktop from anywhere on the Internet • A policy can be set using Group Policy to improve Quality of Service (QoS) for an application • Open Database Connectivity (OBDC) can create a data source, which provides a remote database and its drivers to a client computer A+ Guide to IT Technical Support, 9th Edition 47
  • 48. © Cengage Learning 2017 Chapter Summary • Controlling access to folders and files on a network is done by assigning rights to user accounts and assigning permissions to files and folders • Apply the principle of least privilege when assigning rights to users • Customized user groups that you create make it easier to manage rights to multiple user accounts • Three ways to share files and folders on the network are to use homegroup sharing, workgroup sharing, and domain controllers A+ Guide to IT Technical Support, 9th Edition 48
  • 49. © Cengage Learning 2017 Chapter Summary • A mapped network drive makes it easier for users to access drives and folders on the network • Peer-to-peer networks use local shares, and a Windows domain supports administrative shares • Cloud computing is providing computing resources over the Internet to customers • Cloud computing service models, including IaaS, PaaS, SaaS, and XaaS, are categorized by the types of services they provide A+ Guide to IT Technical Support, 9th Edition 49
  • 50. © Cengage Learning 2017 Chapter Summary • A public cloud service is available to the public, and a private cloud service is kept on an organization’s own servers or made available by a vendor only for a single organization’s private use A+ Guide to IT Technical Support, 9th Edition 50