Jorge Orchilles , in Microsoft Windows seven Ambassador's Reference, 2010
Administrative Tools
The Authoritative Tools department includes the following options: Costless up disk space, Defragment your hard drive, Create and format hard disk partitions, View event logs, and Schedule tasks.
Choosing Free up disk space will launch the Disk Cleanup applet, every bit seen in Figure 5.11. The Deejay Cleanup applet will browse your system and determine what can be done to complimentary up space on your disks. You tin can delete Downloaded Program Files, Temporary Internet Files, Offline Webpages, files in the Recycle Bin, Setup Log Files, Temporary Files, Thumbnails, Per user archived Windows Error Reports, and System archived Windows Mistake Reports.
FIGURE 5.11. Deejay Cleanup
The Disk Cleanup applet also includes an selection to Make clean up system files. This option will crusade the Disk Cleanup applet to open with a tab called More than Options. On the More than Options tab yous take the option to remove programs that you do not employ. You also have to pick to remove older system restore points.
Choosing the Free upward disk space option will bring upward the Disk Defragmenter. The Disk Defragmenter can help improve performance of your drives. Fragmentation occurs when files split all over your disks. When this happens, yous deejay has to do more work to access files. The Deejay Defragmenter will motility your files to a face-to-face location. This will speed disk access operation.
Choosing the Create and format hard disk drive partitions option will bring upward the Disk Management console. You tin use the Disk Direction console to manage your hard disks and deejay partitions. You tin create partitions and format partitions. You can also configure fault tolerance for your disks.
Choosing the View event logs choice will open the Windows Effect Viewer. Yous can view the Windows logs: Application, Security, Setup, and System. Y'all can likewise view individual logs for sure Windows applications and Windows services. You can employ Event Viewer to view logs on the local system or a remote organisation.
Choosing the Schedule tasks selection volition launch Task Scheduler, as seen in Figure five.12. Using Task Scheduler, you can schedule tasks to run at specified times. This is great for authoritative and maintenance tasks that must be run on a regular basis.
Figure five.12. Task Scheduler
Task Scheduler offers great flexibility. You lot can use the Create Basic Task magician or manually create a task. Y'all can schedule tasks to run in one case, daily, weekly, monthly, when the computer starts, when a user logs on, or when a specific event is logged. The chore can be to run a program or script, ship an e-mail, or display a bulletin. Task Scheduler also allows you lot to import and export tasks. This is useful if you want to run the same job on multiple systems.
MCSA/MCSE seventy-291: The Dynamic Host Configuration Protocol
Deborah Littlejohn Shinder , ... Laura Hunter , in MCSA/MCSE (Exam 70-291) Study Guide, 2003
1.
Open the Authoritative Tools carte du jour and click Routing and Remote Access.
2.
Correct-click your server node and select Configure and Enable Routing and Remote Access. When the Routing and Remote Access Server Setup Wizard windows appears, click Next.
3.
On the Configuration page, click Custom Configuration and select Next.
4.
On the Custom Configuration page, click the LAN Routing check box, as shown in Figure 3.34, and click Side by side.
5.
On the Summary page, click Finish to complete the installation of RRAS.
six.
When prompted, select Yeah to showtime the RRAS service.
MCSA/MCSE 70–294: Working with Forests and Domains
Michael Cross , ... Thomas Westward. Shinder Dr. Technical Editor , in MCSE (Exam 70-294) Written report Guide, 2004
1.
Click Offset | Authoritative Tools | DNS.
2.
Expand the DNS server entry.
3.
Right-click the old DNS zone.
4.
Select New Alias (CNAME).
5.
In the Alias name box, blazon the original FQDN of the HTTP server.
6.
In the Fully qualified domain proper name for target host box, blazon the new FQDN of the HTTP server, and so click OK.
seven.
Test the new mapping by pinging the FQDN of the one-time HTTP server from a command prompt. The ping should be redirected automatically to the new FQDN of the HTTP server.
SQL Server Enterprise Director is the primary administrative tool for managing a SQL Server. Enterprise Manager is a complete SQL Server management tool based on SQL-DMO. With it you can:
■
Start and stop SQL Server.
■
Assign the system ambassador's password.
■
Schedule jobs.
■
Manage SQL Server users and security.
■
Configure servers.
■
Register servers, databases, and publications in Active Directory.
■
Monitor the server with alerts and email notification.
■
Manage all aspects of a SQL database.
Enterprise Manager organizes servers into server groups for simplification of administration. Using these groups, an administrator tin can limit access for users to those items inside a particular server group. The server groups tin can be used for applying commands across several servers at once, instead of a unmarried server at a time. SQL Servers are automatically placed within a default server group named SQL SERVER Group. To brand your own:
The Delegation of Administration Magician
In smaller organizations, many DBAs are given the task of managing a set of users for all their network needs, in add-on to handling database admission. These DBAs need to create new users, assign permissions, update the user accounts, and manage their general network apply. In the one-time Windows NT domain world, in that location was no pick merely to make these DBAs function of the Domain Admins group, thus granting the database administrators many more rights than were necessary for performing their jobs.
In Windows 2000, this is no longer an issue. Agile Directory enables an administrator to delegate rights to an OU. For DBAs with extended task functions, this ways that they tin exist granted their own OUs with their own user accounts and the right to manage those user accounts. This feature can exist executed with the Delegation of Administration Wizard every bit follows:
1.
To start the wizard, navigate to the OU that will be delegated to the DBA, and right-click it.
2.
Select Consul Command from the pop-upwards carte du jour.
iii.
Click Adjacent at the Welcome screen for the Delegation of Administration Wizard.
four.
The next screen volition inquire you for the user or group account to whom you lot want to give command. Click the Add button, and add together the user(south) and/or group(s) to the list past selecting the accounts and clicking the Add button for each, and so clicking OK to close the dialog box.
5.
Whenever possible, delegate control to a grouping and add the users to it, even if there is only a single user. This method makes information technology easier to adjust your administrative team later on. Click Next.
6.
The adjacent dialog box allows you lot to select the administrative functions that will be given to the accounts y'all selected in the previous dialog box. The most common administrative functions are listed with check boxes at the top, or you tin click the radio button to customize the abilities this authoritative group will have. When y'all're finished with your selections, click Next.
7.
Finally, review the information and verify that information technology is right, then click the Finish button.
1.
Log on as a user with authoritative privileges.
two.
Click Starting time | Programs | Microsoft SQL Server | Enterprise Manager.
three.
Right-click the Microsoft SQL Servers container.
iv.
Select New SQL Server Group from the pop-up card. The Create New Server Group dialog box shown in Effigy 6.nineteen will announced.
Figure 6.19. Creating a new server group.
5.
Type a name for the new server group. You lot as well have the option of placing this new server grouping into a hierarchy past making it a subgroup of some other server group. Otherwise, information technology should be a meridian-level grouping.
half dozen.
Click OK.
In one case the server group is created, you can populate information technology with servers. To practise then, right-click a server group, and select New SQL Server Registration from the popup carte. Click the Next button at the Welcome screen. Select a SQL Server from the available servers on your network. Click the Add button to move each server into the Added Servers list, then click Side by side. On the following screen, select the security blazon, and click Next. Select or create a server group, and click Adjacent. Review the information on the concluding screen, and click the Cease button to add together your server to the selected grouping. Click Close in the message box stating that your registration is successful.
At this betoken, you lot tin begin managing user accounts from within Enterprise Director. To grant a user account access to a SQL server:
1.
Log on as a user with administrative privileges.
2.
Click Outset | Programs | Microsoft SQL Server | Enterprise Manager.
3.
Navigate to the SQL Server y'all are administering, and expand the Security container.
4.
Open the Logins container.
5.
Right-click the Logins container.
half-dozen.
Select New Login from the pop-up menu.
7.
If the Hallmark type is correct (Windows Hallmark), click the ellipsis (…) button next to the name box to select a user or group business relationship from Active Directory. Otherwise, you will be limited to accounts inside SQL Server only.
eight.
Select the business relationship, click the Add button, and click OK to stop that dialog box.
9.
You volition be returned to the SQL Server Login Properties box, which is shown in Effigy half-dozen.20.
Figure 6.20. Login properties.
10.
Brand sure that the database and language are correct in the dialog box, or go out them every bit the defaults, then click the Server Roles tab.
11.
Select the office or roles that this user account will be granted by checking the appropriate boxes.
12.
Click the Database Admission tab.
13.
Select the databases to which y'all are granting admission with the role you selected.
14.
In the lower box of the window, select the type of role to grant to that particular database by checking the advisable boxes. (Public is the default.)
xv.
Click OK to complete the login creation process.
Logins are one method of granting Active Directory user accounts access to SQL Server databases. Within each database, yous tin can create user access that prompts new logins to exist created. All you need to do is:
1.
Open Enterprise Manager.
2.
Navigate to your selected database.
3.
Expand the database.
4.
Right-click the Users container.
5.
Select New Database User from the pop-upwardly carte du jour.
6.
Use the drop-downwardly box to select < new >, which will prompt the Login Properties box to open and create a new login.
vii.
When you have completed the new login, you volition see the login name listed in the drib-downward listing of the New User properties box, which is shown in Figure 6.21.
Figure vi.21. New user creation.
viii.
You can change the username if y'all desire, and select the database role permissions.
nine.
Click OK to complete the new user creation procedure.
Enterprise Managing director is also useful for administering component services of SQL Server. These services are:
■
Microsoft Distributed Transaction Coordinator (DTC)
■
Microsoft Search
■
SQL Server Agent
You are enabled to only showtime or stop the Microsoft Distributed Transaction Coordinator service within Enterprise Manager. To practise so, select the SQL Server and expand its container. Navigate to the Support Services container and expand that. Right-click Distributed Transaction Coordinator, and select Finish (or Outset, if the service has already been stopped) from the popular-up menu.
Microsoft search is located in the Support Services container as well as the DTC. The characteristic is called Full-Text Search. Y'all are granted more options with managing search: Yous can first and stop the service, clean up catalogs, and view the Microsoft search properties, which are shown in Effigy 6.22. All these options are available on the popular-up menu when y'all right-click the Full-Text Search icon.
Figure half-dozen.22. The Microsoft Full-Text Search Service properties dialog box.
The SQL Server Agent service is located inside a different container in Enterprise Managing director—the Management container located beneath your selected SQL Server. The SQL Server Amanuensis contains three other objects: Alerts, Operators, and Jobs. To manage the amanuensis itself, right-click information technology, and select Start or Stop to change the service's condition. Yous can also select Display Mistake Log or explore the options beneath the Multi-Server Administration option, in which yous tin make the server a chief or a target; create a new warning, operator, or job; or open the SQL Server Agent's Properties dialog box, which is shown in Figure 6.23.
Effigy 6.23. SQL Server Agent Properties.
Several tabs are available in the SQL Server Amanuensis Properties dialog box.Table 6.ane details the options inside each tab.
Table vi.1. SQL Server Agent Options
Tab
Options
General
Select the SQL Server Agent service startup business relationship, establish the post profile, and select or view the error log.
Advanced
Set the restart options for the service, configure event forwarding, set the CPU Idle settings to optimize performance.
Alert Organization
Format addressing of pager east-mails, establish a fail-prophylactic operator.
Task System
Adjust job history log settings, prepare job execution parameters, select a proxy business relationship.
Connection
Select the Hallmark type (Windows or SQL Server) and set login timeout, view SQL Server alias.
One of the other things that Enterprise Manager provides is a method for monitoring your replication between publishers and subscribers. You can also manage the agents that are involved in the various types of replication. To view these options, navigate to the SQL Server y'all accept selected. Open the Replication Monitor binder. You tin view publishers and right-click on each to manage them. Past correct-clicking on an agent listed beneath a publisher, you can push new subscriptions, reinitialize all of them, view the agent's backdrop, and refresh the settings.
MCSE 70-293: Implementing Windows Cluster Services and Network Load Balancing
Martin Grasdal , ... Dr. Thomas W. Shinder Technical Editor , in MCSE (Test 70-293) Written report Guide, 2003
Using the Cluster Administrator Tool
To access the Cluster Administrator utility, select Start | Authoritative Tools | Cluster Administrator. The Cluster Administrator utility, shown in Effigy ix.14, allows you to create a new server cluster, add nodes to an existing server cluster, and perform administrative tasks on a server cluster.
Figure 9.14. The Cluster Administrator Window
At the Open Connection to Cluster dialog box, shown in Figure 9.15, you can enter the name of a server cluster or browse for it.
Figure 9.15. The Open up Connection Dialog Box
If yous wish to create a new server cluster, select Create new cluster in the Action drop-downward list box and click OK. This will get-go the New Server Cluster Wizard, which volition step you through the procedure of creating a new server cluster. Selecting Add nodes to cluster in the Action drop-down list will commencement the Add Nodes Sorcerer. This Wizard lets y'all add nodes to an existing server cluster.
In How to Crook at Microsoft Vista Administration, 2007
Backup and Recovery
The Fill-in utility in Windows Vista is i of the administrative tools that has changed a lot from its Windows XP version. Do not confuse the Backup and Restore Center, located under the System and Maintenance group on the Control Panel, with the Backup Status and Configuration utility. Whereas yous use the Backup and Restore Center to configure backup jobs and schedule backups, the Backup Status and Configuration utility helps determine the status of scheduled backups. Yous tin configure automatic backups and change settings of previously fix upwards backups. When automatic backups are configured on the reckoner, this is the utility you will be using to view the condition of the backups. Some of the features of the Backup and Restore Eye include the following:
■
Utilise of optical media such as DVD-R and CD-R discs
■
Employ of external drives such as USB drives and other external difficult disks
■
The ability to dorsum upwards to a network share
■
The ability to create a consummate image of the PC or to restore the entire PC
■
The power to schedule backup jobs
Additionally, you can utilise the System Restore utility from the Fill-in and Restore Middle to create system restore points. Arrangement Restore helps you restore system files and settings to an earlier point in fourth dimension.
You can access the Backup and Restore Center from the Control Console by clicking Backup Your Computer under the Arrangement and Maintenance Grouping. If yous're using the classic view, click the Fill-in and Restore Center icon. From the Get-go card, type fill-in in the search box and click the Backup and Restore Middle link, which appears in the search results box.
If User Business relationship Control (UAC) is turned on, you lot will exist prompted for administrative confirmation. Figure v.ane shows the Fill-in and Restore Centre.
Figure 5.1. The Backup and Restore Center in Windows Vista
In Figure 5.1 y'all may observe that you can create a Complete PC Backup using the Support computer button. To use this feature, you volition need to create a Windows Consummate PC Backup image. You lot tin use this prototype subsequently to restore the entire computer in case there is a major hardware failure.
Note
It is important to notation that the Vista Backup Wizard will dorsum up merely the most common types of files. Some of the files not included in the backup are:
Files that have been encrypted using the Encrypting File System (EFS)
Files stored on Fatty volumes
Organization and Program files
User contour settings and Internet e-mail messages that are not stored locally
Temporary and Internet files
Files in the Recycle Bin
If you do non want to use the Backup Magician, y'all are gratis to choose whatsoever type of file and any type of fill-in media, such as a file, writable CD, or DVD. You can also use external difficult drives or USB drives every bit the backup location. Just brand sure you have sufficient space to store all the files you need to back up. As an additional note, call up that tape drives are non supported as fill-in media.
Different features of the Backup and Restore Heart are discussed in the following sections.
Backing Up and Restoring Files
Bankroll upwards and restoring files and folders in Windows Vista is as easy as clicking a few buttons. Click the Fill-in files button in the Backup and Restore Center and follow the instructions. UAC volition prompt y'all to confirm your action. In the next window, you tin select whether yous desire to back up to a hard disk, a CD, a DVD, or a network binder. Make your selection appropriately.
Some Independent Advice
When working with Windows Vista Backup, you will find that the utility is protected by UAC. A Windows Security Shield icon appears before the Dorsum up files and Back up computer buttons. UAC is a new feature in Windows Vista that prevents unauthorized running of any programs or utilities on the reckoner that make changes to the computer configuration. UAC is a dialog box that gives you lot a chance to check what activity is about to run on the reckoner. The bulletin you meet in the UAC dialog box depends on what action is being performed. Some examples of letters in the UAC dialog box are:
■
Windows needs your permission to continue This bulletin appears when someone attempts to employ a Windows role. This bulletin is accompanied past a Windows Security Shield icon.
■
A program needs your permission to go along This message appears when a program that is not a part of Windows merely has a valid digital signature attempts to start. This message is accompanied by an assertion betoken inside the Windows Security Shield icon.
■
An unidentified program wants access to your reckoner This message appears when an unidentified program without a valid digital signature attempts to start. This message is accompanied by a question marker within the Windows Security Shield icon.
■
This plan has been blocked This bulletin appears when a user tries to run a program that the administrator has specifically blocked from running. This bulletin is accompanied past a cherry Ten within the Windows Security Shield icon.
You must read the bulletin inside the UAC dialog box very carefully. The purpose of UAC is to forbid unauthorized changes to the estimator that may get in unstable. If you are logged on as an administrator, UAC asks you lot to confirm your actions past clicking the Continue push button in the UAC dialog box. If you are logged on with a nonadministrative business relationship, you will be prompted for the administrative password to go on.
Unlike Windows XP, Windows Vista does not give yous a take a chance to select which item files and folders yous want to back upwardly. Instead, the Fill-in Magician shows you a carte from which you tin select the types of files, every bit shown in Figure 5.2.
Figure 5.2. Selecting File Types for Backup
Referring back to Figure five.one, restoring files is like to bankroll up files. Click the Restore files button and follow the instructions. Yous can also click the Repair Windows using Organization Restore link to replace organisation files. Every bit a user, yous are supposed to restore but your own files or files backed up on the local computer. As an ambassador, you may exist required to restore files for all users of the estimator, or files backed up on another computer. To restore files for all users, click the Advanced restore link. This brings up the Backup Status and Configuration window, every bit shown in Effigy 5.3.
Figure 5.3. The Advanced Restore Link Opens the Backup Condition and Configuration Window
You can use the Backup Status and Configuration utility to schedule backup jobs, as discussed in the following section.
Scheduling Backup Jobs
When setting up a backup. chore, you lot can schedule the fill-in to run one time, or automatically at predetermined intervals. The Dorsum Up Files window allows you to gear up upwardly recurring backups on a daily, weekly, or monthly basis. You can also set the time when the fill-in. task will kickoff. When performing the backup for the first fourth dimension, the backup utility will make a full backup of the system.
The backup scheduler appears as soon as you click the Side by side button after selecting files. Effigy five.4 shows this dialog box.
Figure v.4. Scheduling the Backup Job
In this dialog box, you tin select how often (daily, weekly, or monthly) to back up, likewise as the day and the time when the backup process will start. If this is the commencement time you are creating a backup job, the backup utility will take a full fill-in of the system, including system files and your data files.
When yous have fabricated your selections, click the Save settings and start backup button.
Backup Estimator and Restore Computer
Perhaps the virtually important improvement of the Fill-in utility is its capability to create a complete epitome of the computer. The Backup and Restore Center includes Backup computer and Restore computer buttons for this purpose. Merely this feature comes with its ain limitations, some of which are equally follows:
■
It is available only on Vista Business, Ultimate, and Enterprise editions.
■
Information technology tin can support only if all volumes on the calculator are New Engineering science File System (NTFS) volumes.
■
The destination book must likewise be formatted using NTFS.
■
None of the hard drives should be a dynamic deejay. A combination of basic and dynamic disks will also non work.
In spite of all these limitations, "Fill-in computer" and "Restore reckoner" are good features. Microsoft recommends that y'all brand a consummate fill-in of the Vista computer when it is completely ready. This volition help you lot restore the complete prototype of the calculator in case something goes wrong with software or hardware settings at a later stage. For example, if you install an awarding or a device driver that makes your system unstable, or a virus infects your computer and deletes or corrupts arrangement files, the fill-in taken using the "Fill-in figurer" feature can help you restore the entire system. "Fill-in estimator" backs up all system settings, including the programme settings besides as device commuter configurations.
Backing Up the Calculator
The Backup and Restore Eye is where you can create a complete image of the computer immediately after setting it upwards. Click the Backup computer button and confirm your action when UAC prompts yous to do so. Follow the on-screen instructions to create the fill-in.
You lot also tin can perform a complete computer backup using the Fill-in Status and Configuration Wizard shown earlier in Figure 5.3. Click the Complete PC Backup button in the left-paw pane. Select a destination drive in the adjacent window and click Create Backup Now.
Notation
Interestingly, Consummate PC Backup can back up files either on a hd or onto a DVD. Windows Vista Backup does not let you lot to use CDs or tape drives for this purpose.
Restoring the Computer
If something happens to your calculator and y'all need to bring it up once again using Complete PC Backup, brand sure you have the following 2 items with y'all:
■
The original Windows Vista installation DVD
■
The DVD that contains the Complete PC Backup files
The procedure is as follows:
i.
Insert the Windows Vista installation DVD and restart the computer.
2.
Choose the Repair pick when prompted.
iii.
Select the operating system you wish to repair.
4.
The System Recovery Options bill of fare appears. Select Windows Complete PC Restore.
5.
Follow the on-screen instructions to complete the process.
System Restore
In case you or any user in your part has made some changes to the system configuration and the system is not responding as it should be, Arrangement Restore helps yous recover the arrangement settings. The Backup and Restore Heart contains links for creating and using the Arrangement Restore characteristic. System Restore is specifically useful when the system becomes unstable after:
■
Users make unwanted changes to program and device settings.
■
A new application is installed and it does not behave equally expected.
■
Device drivers are updated or some hotfixes are installed for applications.
One of the main differences between Complete PC Backup and System Restore is that Complete PC Backup includes system files as well every bit your personal files, whereas Organisation Restore contains only the system files required to run your organization. System restore points that help to restore the organisation to an earlier point in fourth dimension comprise only organisation settings specific to the operating organization configuration. For this reason, y'all cannot employ Organisation Restore in place of Complete PC Backup. Apply Consummate PC Fill-in when you intend to back up your personal files.
Equally discussed in the following sections, the System Restore utility can be a swell resource if any of the aforementioned situations ascend.
Notation
Past default, Windows Vista automatically creates organisation restore points at regular intervals using the System Protection characteristic. This includes principal organization files and settings stored in the Windows Registry. Fifty-fifty when the system identifies that a major alter has taken place, a split restore signal is created.
Creating a Arrangement Restore Point
A arrangement restore point is an image of the arrangement configuration and settings in the Windows Registry that helps in restoring the arrangement to an earlier date when the system was running perfectly. You can create a system restore signal manually from the Organization Protection tab of the System Backdrop window. The Backup and Restore Centre too takes you to the same window when yous click the Create a restore signal or Change settings button. The post-obit explains how yous can manually create a system restore point:
i.
Open the Control Panel from the Start carte.
2.
Click the Arrangement link in the System and Maintenance grouping.
3.
Click the System protection link.
4.
Click Continue in the User Account Control dialog box to ostend your action. Figure v.v shows the Arrangement Protection tab.
Figure five.5. Creating a System Restore Point
v.
You tin can turn on or off the default automatic creation of system restore points by immigration the checkboxes under Available Disks.
6.
If you desire to create a restore point for just i of the disks, clear the checkbox for the other.
seven.
Click the Create button and follow further instructions.
The system restore betoken is created on the same disk where the operating system is installed. It uses a maximum of 15 percent of the disk space; older files are automatically deleted in club to brand infinite for new files.
Using System Restore
You tin use the System Restore button in the System Protection tab of the Organization Properties Control Console to utilize a previously created system restore betoken. Alternatively, you tin can use Repair Windows Using System Restore from the Backup and Restore Eye. UAC prompts you to confirm your action before proceeding.
The Restore arrangement files and settings dialog box appears, as shown in Figure 5.6.Y'all can dick either the Recommended restore option or the Choose a different restore point pick.
Figure 5.6. The Recommended Restore Point in the System Restore Utility
The "Recommended restore" option is selected by default. The window provides details regarding the date and fourth dimension when the restore point was created and which application or update was installed that initiated the creation of the restore point. If you suspect that the system became unstable after installing this application, y'all can choose this option.
The 2nd choice in the System Restore window is "Choose a different restore point". If you wish to use a restore point created on some other date, choose this pick. This choice displays the Cull a restore point folio, as shown in Figure five.7. Select a date and time and click Adjacent. Follow the instructions to complete the process.
Figure 5.7. Manually Choosing a System Restore Point
You will need to restart the system after the restore procedure is consummate.
Shortcut . . .
Several Ways to Launch Command Console Utilities and Services
With Windows Vista, the chore of finding a detail Command Panel utility or a system service has become very easy with the search box in the Start menu. Typing simply a few messages of the utility proper name volition provide a list of all matching entries in the search results box, and from there you can select the utility yous wish to piece of work with. With Windows XP and older operating systems you must go through a number of steps to launch a utility. For example, if y'all wanted to open the Ability Options, y'all must first click Start | Control Panel and so click the Ability Options icon. In Windows Vista, all you demand to practice is click Start and type power in the search box. The link for the Power Options utility appears in the search results box under the Programs group. Similarly, if you want to open up the Print Direction snap-in, just blazon print in the search box and press the Enter key. Both the Printers and the Print Management links are shown in the search results box. Refer to Effigy 5.8 for a view of how to perform this play a trick on.
Figure 5.8. Using Shortcuts to Launch Vista Utilities
MCSE/MCSA 70–294: Creating User and Group Strategies
Michael Cross , ... Thomas Due west. Shinder Dr. Technical Editor , in MCSE (Exam 70-294) Study Guide, 2003
1.
From the Windows Server 2003 desktop, click Showtime | Administrative Tools | Active Directory Users and Computers.
2.
Right-click the domain yous want to administer, and so select Backdrop.
3.
Select the Default Domain Policy, and dick the Edit button.
4.
Navigate to the business relationship lockout policy by clicking Figurer Configuration | Windows Settings | Security Settings | Account Policies | Account Lockout Policy. You'll see the screen shown in Figure 3.7.
Effigy iii.7. Account Lockout Policy Objects
Using Business relationship Lockout Policy, you tin can configure the following settings:
■
Account lockout duration This option determines the amount of fourth dimension that a locked-out account will remain inaccessible. Setting this option to 0 means that the account will remain locked out until an administrator manually unlocks information technology. Select a lockout duration that will deter intruders without crippling your authorized users; thirty to hour is sufficient for nigh environments.
■
Account lockout threshold This option determines the number of invalid logon attempts that can occur before an business relationship will be locked out. Setting this pick to 0 means that accounts on your network volition never be locked out.
■
Reset account lockout counter after This selection defines the amount of time in minutes after a bad logon effort that the "counter" will reset. If this value is ready to 45 minutes, and user jsmith types his password incorrectly 2 times earlier logging on successfully, his running tally of failed logon attempts will reset to 0 afterward 45 minutes have elapsed. Be conscientious not to ready this option too loftier, or your users could lock themselves out through uncomplicated typographical errors.
five.
For each item that you want to configure, right-click the detail and select Properties. To illustrate, we create an Business relationship lockout threshold of three invalid logon attempts. In the screen shown in Figure three.8, identify a bank check mark side by side to Define this policy setting, and then enter the advisable value.
Figure 3.viii. Configuring the Business relationship Lockout Threshold
Michael Cross , ... Thomas Westward. Shinder Dr. Technical Editor , in MCSE (Test lxx-294) Study Guide, 2003
1.
Open the Windows Server 2003 Performance panel from Start | Programs | Authoritative Tools | Functioning.
2.
Select the Organisation Monitor node in the left pane.
three.
In the correct pane, right-click on the graph and select Add Counters… in the context carte du jour that appears. Annotation that you tin can also click the + push on the toolbar to a higher place the graph to add a new counter.
four.
In the Add Counters dialog box, select NTDS from the Performance object: drop-down box.
5.
In the Select counters from list: box, select the DS Search sub-operations/sec counter equally shown in Figure 11.13.
6.
Click the Add button.
vii.
Repeating steps 5 and half dozen after each addition, add the post-obit counters: LDAP Searches/sec, LDAP Client Sessions, NTLM Authentications, and Kerberos Authentications.
viii.
Click the Close push button in the Add Counters dialog box.
9.
Your new counters should appear in the listing in the right pane under the graph, as shown in Effigy 11.14. Select one of these counters past clicking on it in this listing.
10.
Printing Ctrl + H to highlight the counter in the graph every bit shown in Figure 11.fifteen. This tool is frequently used to display a large number of counters, making it very difficult to tell them apart in the graph. Using the highlight feature makes this much easier.
MCSA/MCSE 70-291: The Windows Server 2003 DNS Server
Deborah Littlejohn Shinder , ... Laura Hunter , in MCSA/MCSE (Test seventy-291) Written report Guide, 2003
Adding DNS Database Records
Your Windows Server 2003 DNS database consists of many different types of records used by DNS clients to query and locate network resources. These records can exist registered dynamically with your DNS server if information technology is configured to practice so, or y'all tin enter them manually as you had to practice in the Windows NT 4.0 version of DNS. Table six.1 lists the nigh common DNS record types you lot might find in your Windows Server 2003 DNS database.
Table half dozen.1. Common DNS Records
Record Proper name (Blazon)
Description
Host (A)
A tape used to map machine or resource host names to IP addresses.
Alias (CNAME)
A record used to copy the proper name of an already existing host name. This record points to that existing host record and not to an IP accost.
Postal service Exchanger (MX)
A record identifying the location of your Net mail server. This record points to the Host record of your mail server.
Pointer (PTR)
A record used for contrary lookup queries to resolve IP accost to names.
Service Location (SRV)
A Windows 2000/Server 2003 tape used to locate Active Directory infrastructure services.
To add DNS records to your database manually:
ane.
Click Offset | Administrative Tools | DNS to open up your DNS console.
2.
Expand your Forrad Lookup Zones folder and highlight the DNS zone name to which you want to add records.
iii.
Right-click your DNS zone name and select the record type you want to add as shown in Figure half-dozen.22; for instance New Host (A).
Figure 6.22. Manually Adding DNS Records
4.
In the New Host dialog window, type the name of your new host in the Proper name (uses parent domain if bare) field, and the hosts IP address in the IP Address field every bit shown in Figure vi.23.
Figure 6.23. Adding a New Host (A) Record
5.
Click Add Host, too shown in Figure six.23.
Note
To add together other types of DNS resource records manually, right-click on your DNS zones name and select Other New Records. A Resources Record Type dialog window will announced, giving you the ability to choose the type of resources record you want to enter. The most mutual are A, CNAME (allonym), and MX records, which is why they take a direct option to create them on the context drib-downwardly card.
You too take the option to create a Arrow (PTK) record if a reverse lookup zone for that network address space already exists. This tape is used for queries looking to resolve an IP address to your host proper noun. If you accept already created a reverse lookup zone as discussed earlier in this section, click the selection cheque box Create associated arrow (PTR) record.
In Practice half-dozen.02, nosotros showed you how to configure a domain zone file for a Windows Server 2003 member server. If you lot were to create the same DNS zone for a Windows Server 2003 Active Directory, your zone database would look slightly dissimilar because it is used to firm all of the domain controller's service, domain, and site locator records. For a look at the difference in appearance, refer to Figure half-dozen.24 and compare the folder containers to that of Figure half dozen.21. For more than of the dissimilar zone types and zones in general, refer to Chapter v.
Effigy 6.24. Viewing an Active Directory DNS Zone and Its Containers
You lot tin create two other types of forward lookup zones—secondary zones and stub zones. These zones were discussed in Chapter 5, merely for a quick refresher, they are defined here:
■
Secondary zone A secondary zone is a read-merely copy of some other delegated zone file. It continually updates its records from what is called a master server on a configured interval. It can exist used as a client's primary DNS server because it maintains an verbal copy of the original authoritative zone database. A secondary zone helps balance the load of master DNS servers and can exist used for error tolerance
■
Stub zone A stub zone is also a partial read-only copy of another zone file. Information technology contains the start of potency (SOA) resource record, proper noun server (NS) resource records, and the glue A resource records for the delegated subdomains. A glue record references a server that is authoritative for a subdomain. Gum records are used to enable DNS servers to send referrals directly to the DNS server authoritative for the child domain without having to forward the request up and downward the DNS hierarchy. Stub zones are not administrative for the zones they copy.
Test Day Tip
A secondary zone can be secondary to a main zone or to another secondary zone. As long equally the server to which it wants to transfer a file has given it the right say-so to practice then, a secondary zone tin can transfer zone files.
Test Twenty-four hour period Tip
Secondary and stub zone databases are read-only and cannot be edited. To create a record in a secondary zone file, it must be transferred from another zone in which the edit was fabricated.
Creating secondary or stub zones is very similar to creating a primary zone as you did in Exercise 6.02. The only difference is y'all have to tell the secondary or stub zone which server to pull zone transfer data from. This is chosen the zone's master server. A master server is simply a server that allows zone data to be transferred from itself to another secondary server. When configuring a secondary or stub zone, you volition be presented with another wizard prompting you to enter in the master server'south IP address. This is displayed in Figure 6.25.
Effigy half dozen.25. Configuring Secondary and Stub Zone Chief DNS Servers
0 Response to "Which Utility Can Be Used by a User With Administrative Rights in Order to Stage a Driver Manually?"
Post a Comment