lesforgesdessalles.info Art MCSE NOTES SERVER 2003 PDF

Mcse notes server 2003 pdf

Thursday, February 14, 2019 admin Comments(0)

experience covers a number of products, including NetWare, Lotus Notes, tributed to several other exam guides in the Syngress Windows Server Mcse Notes - Free download as PDF File .pdf), Text File .txt) or read online for free Network O.S.: UNIX, Win NT server , Win server, Win server. Download as PDF, TXT or read online from Scribd . Microsoft Certified Systems Engineer MCSE Windows Server The Microsoft Certified . Mcse Notes.


Author: CELENA BILLAFUERTE
Language: English, Spanish, French
Country: Vietnam
Genre: Art
Pages: 103
Published (Last): 29.10.2015
ISBN: 457-9-38934-370-2
ePub File Size: 28.55 MB
PDF File Size: 20.53 MB
Distribution: Free* [*Regsitration Required]
Downloads: 44524
Uploaded by: LINN

Microsoft Windows Server Environment for an MCSE Certified on Windows to com- Note that deleting a group does not cause any members. Start Interim:This mode can have NT and . Mcse notes. 1. NET server was renamed as windows server WINDOWS WINDOWS FAMILY Microsoft MCSA 70 Complete PDF Questions With its release of Windows Server , and the revised MCSA and MCSE Take note of the questions that you did not understand and study the For these reasons, the entire contents of this Study Guide are supplied in PDF on the CD.

Logoff and logon from administrator now by following the above steps and the administrator too. Only the mouse clicks and key stokes are sent to the TSRequirements of Terminal server: If we select incremental back up it is faster and restoration is slower. Forceful replication: ATM Switches 4. DEC Net: The first DC installed acts as a schema master in the entire forest.

Supports header compression PPTP: Point to Point Tunneling Protocol: Terminal Services: Terminal Server is a server used for centralizing the management of applications. It provides remote administration for administrators. It is used when a company cannot upgrade their client machines, hardware infrastructure.

During the session the terminal server uses the protocol called RDP. Only the mouse clicks and key stokes are sent to the TS. If we want to configure T. Application mode offers remote administration as well as applications. In win we can install T. Fully secured mode: Fully Relaxed mode: Provides access to registry and other system resources useful when the security is not criteria or for performing remote administration. By default when we install T. It is a free license provided by T.

License manager: When a T. Licensing mode: There are 2 modes 1. Domain Licensing mode 2. Enterprise licensing mode. Domain Licensing mode: Enterprise license mode: Only one T. On client machine C: Session on both T. Remote control: If the administrator selects this option, the remote control session will be give only used for monitoring users.

Remote Control: To have remote control of the user, an administrator has to login to the TS and only through the TS he can take the remote control of the user. Login as administrator In terminal session Start — p — admin tools Open terminal services manager Right click on user — remote control Select the release keys ex.

Notepad, cmd, etc. ISA Internet Security Accelerator It is useful to speedup internet access and to protect private network from public network. Types of firewalls: Hardware firewall Software firewall Hardware firewall: Software firewall: Foot printing 2. Scanning 3. Dos attack denial of service 4. Exploits ex. Cgi scripts, perl scripts etc. Trojan horses ex: Port scanner.

Foot printing: By using a combination of tools and techniques the hacker can take up the system and determine its IP address and domain names. Scanning the system for bugs and loopholes in OS. Hacker uses scanning technique to determine which ports are open what services are running and what is the OS Ex: DOS attack: Denial of service attack which is an attempt to get the service or the server down by overflowing the buffer.

Win spoof a7, my spoof. Exploits are usually bugs in applications or OS which can be exploited by using a piece of code often referred as scripts. CGI scripts, perl scripts etc.. Trojan Horses: Trojan horses are a program that pretends to be a useful tool but actually installs malicious or damaging software. Trojan Horses can be used to take over the remote system sending viruses to steal the data. Netbus, Bo2k. Port scanner: Scanning the port to get into the application ex: ISA can be configured as firewall or proxy server.

If it is configured as a firewall, Packet filtering: Packets are allowed or dropped through the device depending on the access control list. If it is configured as proxy it acts like a web server Application gateway: Packets are allowed based on type of application and IP address. Application level gateways can also be used to log user activity and logins. Server deployment stand-alone only multiple servers with centralized management.

ISA server requirements: ISA server models: Cache mode: With the help of some protocol rules and policy elements we can set the security. We can also control the type of traffic to be allowed in or allowed-out.

Key features of ISA: Expand policy elements Right click on client address set New — set name of the set — ex. Sales Add the range of available IP adds.

Including ISA — ok. Creating a destination set: Expand policy elements Right click on destination set New set - specify the destination Website name — click on add — specify the destination name Which site we want to block — Ok.

Move on to private network Try to access yahoo. Move onto private network Typing the source website we should find the redirected website. Yahoo redirected to google. Images Apply — ok Move onto private network Open the website We should notice no images.

Requirements of RIS: Client side Requirements. When it is doing so it client broadcasts network broadcast, MAC address on the network. DHCP Server: DNS Server: With the help of these services can perform remote installation of OS on to the requested client. RIS services: Boot Information Negotiation Layer: Responsible for overall management of RIS. Trivial File Transfer Protocol Demon: Responsible for downloading the O. It is responsible for efficient management of Hard Disk space.

Whenever there is a repetition of file copying occurs, it omits copying file, instead it creates a pointer and this pointer will be pointing to the actual files. CD image Next — finish.

Implementing RIS: Performing remote install on client On the client machine Boot from pxe enabled NIC or remote bootable floppy. Press F12 key when the system prompts and installation proceeds. Next — answer further questions. Once it is over the riprep image is ready. We can also implement software rate, and disk analysis. To open Disk manager Start — run — diskmgmt. Start — run — diskmgmt.

NTFS Next — finish. Creating extended partition:. Right click on the green color partition New — logical — drive — next — alter the size Next — drive letter Type of file system Next — finish. Dynamic disks: Basic Disk: These are referred to partitions. Using basic disks we can create partitions like primary, extended, logical.

Basic disks are useful for providing backward compatibility with older OS. Like DOS, 95, 98 etc.. Basic disks are useful while implementing clustering and when we want to have dual OS in our computers. Basic disks can have 1primary, 1 extended and logical partition Or four primary or 3 primary 1 extended and so on. Basic disks can be converted to dynamic disks For converting it requires 1MB of free space.

We can convert form basic to dynamic but not vice versa. Possible when we get advanced. Converting from basic to Dynamic: Volume is made up of free space club or merged fro more than one H. Easy to administer. Dynamic volume: Dynamic disks refer to volumes.

Using dynamic disks we can implement and extend volumes and implement raid. Dynamic disk can be attached or detached on the file. Simple Volumes: Span volumes offer extending of volume. Do not offer fall tolerance Maximum 32 Hdds Min 2 Hdds. Open disk management Right click on the black bar New — volume Select simple volume Alter the space — next Drive letter File system Check box perform quick format Next — finish.

Drive letter — next Perform — quick format — finish. Extending volume: Right click on the volume we want to extend Extend volume - next Select the drive on which we want to extend the volume Specify the size - next — finish.

Fault Tolerance: It is a technique used for protecting data against hardware failures. Software RAID: It can be implemented from the OS. Which is not a guaranteed fault tolerance?

Hardware RAID: Offers highest fault tolerance. Requires min 2 Hdds, max 32 Hdds. Offers no fault tolerance Suitable when performance is criteria. Data is written evenly on to all drives If any one of the drives fails whole data is lost.

Space selected on all the drives should be of identical size. Requires min. If one drive fails data is still available in the second drive. Break mirror: Breaks the mirror and retains the partition and data and changes the drive letter Right click on desired drive Select break mirror. Requires min 3Hdds max 32 Hdds.

Notes server 2003 pdf mcse

Offers highest fault tolerance Data is written evenly on to all member striped volumes and Parity information is also added. Parity bit: It is mathematical calculation added to every piece of data and used for regenerating the data when any HDD fails. Reading and writing both are fast. Using mounting: We find here folder name with a drive icon. Volume shadow copy services: It is a new feature available only in flavor. Useful for taking online backup and access recent versions of files and folders.

Useful when the users inadvertently delete their files from network share and want them back. In case an administrator had taken a snapshot of the volume can retrieve the recent versions of the files.

Implimenting VSCS: Click on shadow copies Select the volume Click on enable Click on create now Apply -ok. To restore a deleted file Access the network share from my network places Right click on the share folder Properties Previous versions Click on restore Apply — ok. Try to access the network share from client machine We should notice the deleted file restored.

It is a new feature of This leads to network traffic To overcome this problem we have to use a separate server configure as SUS, which is connected to Internet and obtains updates.

Client machines instead of contacting Internet for updates contact the intranet SUS server for updates. This can be scheduled. To schedule the updates; Double click o configure automatic updates Specify the schedule. It is a service responsible for preparing a report which reveals a loop holes and draw backs of the OS and the applications installed in the server. Using this report an administrator can take some precautions. It is also freely available software in internet. We can download it.

Notes server pdf mcse 2003

File name is mbsa. Using MBSA: It is a new feature of using which we can gather all the policies implemented by group policy in the entire forest. Generates the reports for the users who all have logged in and effected with the policy. It is a new feature in which centralizes the management of group policies for ex. Gathering of group policies implemented in the entire forest is easy.

Implementing Group policy is also very easy Back and restore of G. Software available in internet.

MCSE Windows 2003.pdf

Filename is gpmc. Mcse Notes Uploaded by Abhishek kapoor. Flag for inappropriate content. Related titles. Windows Server Interview Questions and Answers. Jump to Page. Search inside document. Sharing of license Network is a collection of computers connected together to get benefited from networking. Networking is a process of communication among systems. Types of Networks: Components of LAN: Components of MAN: Components of WAN: Same as MAN: Networking devices: Disadvantage of a Hub: Router is a device connects two different networks.

You might also like: SAP NOTES AS PDF

Network Topologies: The architecture of a network is called topology E. Bus, Star, Ring, and Mesh Topologies. Bus Topology: Components of Bus Topology: Star Topology: Ring Topology: Logical Topologies: Work group. Domain Workgroup peer to peer: Windows Enterprise Editions: Windows Data Center Edition: There are two versions of IPs 1. Organizations responsible for assigning IPs to clients.

Free Certification Study Guides and Tutorials

The first two bits of first octet are reserved as 10 Class C: The first three bits of first octet are reserved as Class D: The first four bits of first octet are reserved as Class D: Domain Controller D. A server where A. Functionality of A. Purpose of A. Features of A. Evolution of LDAP: It is based on OSI model. Active Directory Domains and Trusts: Domain controller security policy: Domain security policy: Sites provide replication There are 2 types of replications 1.

Intersite replication Intrasite Replication: Implementing sites: Forceful replication: Creating a Site link: DIT C: Directory Information Tree It is a file logically divided into four partitions.

FSMO roles: Flexible Single Master Operations: Forest wide Master Operation 1. Schema master 2. Infrastructure master Schema Master: There can be only one schema master in the entire forest Domain Naming Master: PDC emulator: RID master: Infrastructure master: There can be only one infrastructure master per domain The term flexibility means we can transfer any of the 5 roles from DC to ADC. The primary functions of GC To maintain universal group membership information, to easily locate the objects with in the AD.: Configuring a Global catalog server.

Server 2003 notes pdf mcse

Installing Child DC: Installing New Domain tree in an existing forest: Functional Levels: Domain Functional Level: Forest Functional Level: Windows mixed: This mode can have NT and Useful when we upgrade NT to Windows server: This mode supports only server family.

Establishing Trusts: The Domain where we have user accounts is called trusted domain. The domain where we have resource is called trusting domain. Trust between parent and Grandchild domain is called implicit trust. One-way trust or Non-transitive Trust: Win server Level: Universal groups Group nesting Domain renaming tools. Benefits of Forest Functional Level: Domain renaming Implimenting Forest Level: Member Servers are used Load balancing Load sharing form DCs A member server can be configured as any of the following servers.

Configuring a member server Requirements: Configuring win or XP professional as a client: Sharing a resource: Zoom Computer name Creating a share through command line: On member server Go to command prompt net use z: Permissions Using permissions an administrator can either allow or deny access to a resource. Resource can be a network resource or local resource Permissions are of two types 1. Share level 2.

NTFS Features: Owners will have full control access Taking ownership of a folder: Local profile Roaming profile Mandatory profile Local profile: Active session Creating a mandatory profile: Move on to client machine Login as user Make some desktop changes Create a folder or delete a folder For removing mandatory profile just rename ntuser. We can implement security by using NTFS settings.

It is a root server, which maintains links from other file servers Requirements: DFS link: One group policy object can be linked with multiple objects like site, domains, DCs, OUs, etc… The order in which the group policy is applied. Block policy inheritance is useful for blocking the inheritance of the policy from its parent object Note: No over ride is opposite to block policy inheritance; Important group policies User configuration Administration templates Windows components Windows explorer -Prevent access to drive -No entire network -Remove map drive Under user configuration Administrative templates Expand system -Run only allowed windows applications -Do not run specified applications Group policies are of two types.

Users do not lose their data Implementing folder redirection: Move on to member server Log in as a user We should notice a welcome message Backup: Normal Check the box disables volume shadow copy Next — finish Verifying Delete the backed up folder Restoring the backed up folder: Internet Protocols There are two versions in IP 1.

IP leasing process: DHCP requirements: Creating a Scope: Releasing an existing IP: Right click on server Say new super scope Specify the super scope name Select 2 scopes by holding ctrl key Next — finish Address Pool: For NT — 66servers addresses - for - 77 Server options: Name Resolvers: There are 2 types of name resolvers: Computer that requests DNS resolution.

Query is a request to find an address of the DNS there are 2 types of queries. Contains host record, which contain host names to IP, address mapping information Reverse Lookup zone: DNS requirements: Creating a host record: Right click on the zone you have created - new host — specify the servers address —and IP Add host - ok - done 2.

Creating an alias record: Start - run — cmd — ping www. Right click on the R-L zone New zone — next - zone type - next — specify the IP address — zone file — next — allow both — next — finish Creating a PTR record Right click on reverse lookup zone.

New- pointer — specify IP Browse host record — ok Verification: Secondary zone is a back up for primary zone Zone transfer: Creating stub zones: Record types: Creating a secondary zone for DC domain name zone: Disadvantages of Bus: If anything goes wrong with backbone cable whole network is down. Follows a serial communication.

Outdated these days. Star Topology: Star topology is an advanced version over bus topology. It uses connecters called Recommend Jack - RJ45Star topology offers faster data transfer or processing.

Ring Topology: Ring topology is useful when we want redundancy fault tolerance we go withthis type of topology. Ring topology uses a device called MSAU. Multi Station Access Unit It is a unit inside which a logical ring is formed. This ring ensures the availabilityof Network.

The availability of ring ensures availability of network. It was basically implemented in IBM networks. Logical Topologies: Work group. Domain Workgroup peer to peer: Collection of computers connected together to share the resources. No servers are used. Only Client OS is mostly used.

Suitable for smaller organizations. Where security is not the criteria. No administrator is required Where we are not using client server based applications. Like oracle, SQL and exchange etc. Provides centralized administration. Domain offers security and provides logon authentication. Suitable if security is criteriaRequires an administrator.

Desktop O. Network O. Win NT 3. Windows Enterprise Editions: Windows DataCenter Edition: There are two versions of IPs1. IP version 4: IP version 6: IP address is used for identifying the system and provides communication. IP address is of 32 bits divided in four octets. Each Octet is of 8 bits, separated by a. Numbers range between Organizations responsible for assigning IPs to clients. Internet Assign Naming Authority. Internet Corporation assigning for name Numbers.

Class A: Class D: H The first octet is reserved for network ID. The first bit of first octet is always 0. Class B: The first two octets are reserved for Network IDs. The first two bits of first octet are reserved as 10 Class C: The first three octets are reserved as network portions.

The first three bits of first octet are reserved as Class D: Used for Multicasting. The first four bits of first octet are reserved as Class D: Used for Experimentation. Packet Internet Groper 7. Is a centralized database where it contains the information about theobjects like users, groups, computers, printers etc. AD is a centralized hierarchical Directory Database. AD is a searchable Database. We have to install A. Domain Controller D. A server where A. Functionality of A. Using A. It provides single point of administration.

Purpose of A. Provides user logon authentication services. Features of A. Fully integrated security system with the help of Kerberos. Easy administration using group policy. Extensible modify the schema New features in 6. Cross —forest trust relationship. Site-to-Site replication is faster. Evolution of LDAP: It is an industry standarddirectory access protocol used for querying and providing communication amongthe objects in A.

It is directory access protocol. It runs on the port no. It is based on OSI model. Windows O.

Active Directory Domains and Trusts: Domain controller security policy: Domain security policy: Logical structure is useful for organizing the network. Logical components cannot be seen Physical structure is useful for representing our organization for developing the organizational structure.

It reflects the organization mirrors Physical structure can be seen. A tree is a group of domains which share contiguous name space. If more than one domain exits we can combine the multiple domains intohierarchical tree structures.

The first domain created is the root domain of the first tree. Additional domains in the same domain tree are child domains.

A domain immediately above another domain in the same domain tree is itsparent. Multiple domain trees within a single forest do not form a contiguous namespace. The two forest wide predefined groups — Enterprise. Administrators and schema administrators reside in this domain.

Sites provide replicationThere are 2 types of replications 1. Intrasite replication 2.

Mcse Notes | Active Directory | Network Topology

Intersite replicationIntrasite Replication: It is a replication with in the same site. Intersite Replication: It is a replication between two different sites. Intersite replication is implemented when the sites are away from each other. Implementing sites: Forceful replication: Creating a Site link: Knowledge Consistency Checker: It is a service of A. Directory Information TreeIt is a file logically divided into four partitions. Schema partition 2. Configuration partition 3. Domain partition 4.

Ad is constructed with the help of classes and attributes. Forms the database structures in which data is stored. Collection of objects is called class. Piece of information about the object is called attribute.

Configuration Partition: Logical partition in AD database. Domain Partition: Collections of users, computers, groups etc. Units of replication. Domain controllers in a domain replicate with each other and contain a full copy of the domain partition for their domain. DCs do not replicate domain partition information for other domains4. Application Partition: It is a newly added partition in win It can be added or removed It can be replicated only to the specified DCs.

FSMO roles: Flexible Single Master Operations: Forest wide Master Operation1. Schema master 2. Domain Naming masterDomain wide master operation3. PDC emulator4.

RID master5. Infrastructure master Schema Master: Responsible for overall management of the entire schema in a forest. The first DC installed acts as a schema master in the entire forest. There can be only one schema master in the entire forestDomain Naming Master: It maintains the uniqueness of domain names.

There can be only one DNM in the entire forest. PDC emulator: Ifit is running in mixed mode PDC updates the password changes made by the users. It is also responsible for synchronizing the time. There can be only one PDC emulator per domain. RID master: Responsible for assigning unique IDs to the objects created in the domain.

It is divided into two parts. DID Domain Identifier 2. Infrastructure master: It also maintains universal group membership. There can be only one infrastructure master per domainThe term flexibility means we can transfer any of the 5 roles from DC to ADC. Transfer of Roles: We can transfer the roles for some temporary maintenance issues on to ADCand again we can transfer back the roles onto DC.

We can transfer the roles in two ways 1. Command mode 2. Graphical mode Global Catalog runs on the port number All types of queries are first heard on this port number and forward the query toport no. Maintains the complete information about the objects withinthe same domain and partial information about other domains. GC communicates to infrastructure master.

The primary functions of GCTo maintain universal group membership information, to easily locate the objectswith in the AD.: Configuring a Global catalog server. Installing ChildDC: Installing New Domain tree in an existing forest: Forest initial domain controller or root domain controller On member server or stand-alone machine. Select Domain tree in an existing forest. Trust is a process of enabling resources of one domain to beaccessed by another domain.

Functional Levels: Domain Functional Level: Forest Functional Level: Windows mixed: This mode supports older versions of win We can add NT, flavors in networks. Windows native: This mode can have NT and Useful when we upgrade NT to Windows server: This mode supports only server family.

Trust relationships in Windows server Default two way transitive Kerberos trusts intra forest Shortcut — one or two away transitive Kerberos trusts intraforest Reduce authentication requestsForest-one or two way- transitive Kerberos trusts.

External — one way non-transitive NTLM trusts. Realm — one or two way non-transitive Kerberos trusts. Establishing Trusts: The Domain where we have user accounts is called trusted domain. The domain where we have resource is called trusting domain. Trust between parent and child is two way transitive trusts. Ex; A trusts B, automatically B trusts A this is a two way trust. Trust between parent and Grandchild domain is called implicit trust.

One-way trust or Non-transitive Trust: It means A is getting the resources from B and B is offering the resources. One way out going trust: A is offering resources to B and B is getting resources from A Benefits of Domain Functional Level: Win server Level: The moment we raise the functional level, form mixed mode to win modewe get the following benefits. Universal groupsGroup nestingDomain renaming tools. Benefits of Forest Functional Level: Win levelWe get complete benefits of when we raise the level from to win server.

We can implement forest trusts. Acceleration of global catalog replication information. Domain renamingImplimentingForest Level: Raising Domain Functional in both the machines: Member Server: A server, which is a part of DC, is called Member Server. Server, which is part of the Domain, is called Member Server. Member Servers are usedLoad balancingLoad sharing form DCsA member server can be configured as any of the following servers.

Configuring a member serverRequirements: DCStand alone server flavorOn Stand-alone server: Configuring win or XP professional as a client: Same as configuring member server;Server: NT, , Client: Select Windows Classic. Click Apply. Click OK. Customize Start Menu Option: Right click on Taskbar. Uncheck Group Similar Taskbar buttons. Click Start Menu. Click Classic Start Menu. Click Customize.

Mcse Notes

Check following Advance Start Menu Options: Display Administrative Tools. Display Favorites. Display Log Off. Display Run. Enable Dragging and dropping. Use Personalized Menus. Click Ok. Customize files, folders and windows. Double-click My Computer. Select Icons. Folder Options. General Tab Select followings: Use windows classic folders. Open each folder in the same window.

Apply to all folders. Disable user switching and enable offline files. You must have a computer administrator account on a computer that is a member of a workgroup or is stand-alone computer to turn on or turn off the User Fast User Switching feature. Fast User Switching is not available on computers that are members of a network domain.

You can make network files available offline by sorting shared files on your computer so this can be helpful when you use a portable computer to accomplish most of your work or if your stand-alone computer is frequently disconnected from the network. When you reconnect to the network, any changes that you made to files while working offline are updated to the network. This process is called synchronization. If you and someone else on the network made changes to the same file, you cane save your version of the file to the network, keep the other version, or save both.

If you share folders on your computer with others on the network, they can work offline with those folders. To protest files in your shared folders, you can specify whether other users can change your documents or just view them. You can also control which shared files users can access offline. Enable offline files: Double-click my computer. Offline files tab. Check Enable offline files.

Sharing and security settings. Folder options. Advance settings: Uncheck use simple file sharing recommended. Assigning IP address and display network icon in notification area: Double-click my network places. Right-click on local area connection. Check following Options from general tab: Show icon in Notification area when connected.

Notify me when this connection has limited or No known drug allergies Connectivity. Select use the following ip address: IP address: Subnet mask: Set up hardware profiles for different hardware configuration. At startup, you can choose the profile you want to use. Hardware profiles provide a way for you to set up and store different hardware configuration. You can set up hardware profiles for different hardware configuration. Right-click on my computer. Hardware Tab. Hardware profiles.

Select Profiles 1 Current from available hardware profile: Copy profiles name to: Right-click on My Computer. Advance Tab. Startup and Recovery: Select Default operating system. Uncheck following from system startup: Time to display list of operating systems: Time to display recovery options when needed: Double-click My computer.

Select show hidden files and folders. Uncheck following from Advance settings: Hide extensions for known file types. Hide protected operating system files recommended. Ok GotoC: Auto exec.

When your computer hibernates it stores whatever it has in memory on your hard disk and then shuts down. When your computer comes out of hibernation, it returns to its previous state. Remove pagefile. Restart computer to take effect. After restart the file will more to drive D: Crate Answering file for XP installation.

Create New. Modify Existing. Select Create New. Type of Setup. Unattended Setup. Sysprep Setup. Remote installation Service RIS. General Settings. Tariq Abbasi. Display Settings Use windows default. Product Key. Administrator Password. Check encrypt the Administrator password in the answer file. Check when a destination computer starts, automatically log on as administrator.

Number of times to log on automatically. Networking components. Select Custom Settins. Click properties. Select Use the following IP Address: Workgroup or Domain. D efault selected workgroup and Next. Advanced Settings. Telephony nill. Regional Settings.

Default English Unitd States. Select Western Europe and United States. Browser and Shell Settings. Default Next. Installation folder. Default A folder named windows. Install Printers. Network Printer name: Run Once nil. Additional Commands nil. Setup Manager. Enter path and file name. Completing Setup Manager. Close X Cancel. System Preparatin. For Example: Requirement for Sysprep: PC of same company i.

Same size of company Hard Disk. Use only one partition ie C or D or E. After making answer file winnt. Now, then system is shut down automatically. Then make image of C Drive. Sharing Right. For sharing right first users to be created on Server PC.

We can creat users by goto: Now access the server by go through on PC 8. Click ok. It means that Server is accessed through PC8. Now we want that no use can directly access the server or ther PC of user. But require password. So we set a password from server PC. NTFS rights. These rights are applicable on folders of users from Server PC Admin. First create 5 users on Server PC. Now logoff and logon from admin again.

But the folder will not access again. Logoff and logon from admin. Now try to remove the administrator of PC3, but it will not removed. Now logoff and logon from user1. Sharing folder is accessed, but when we access a file data in it, then access is denied. Because we add only user1, not added the administrator. Logoff and logon from administrator now by following the above steps and the administrator too.

Specifies that the contents of file or folder be encrypted. Only the user who encrypts the file or folder can access the content. However, files and folders might be decrypted depending on how they are moved or copied. Encrypted files and folders cannot be compressed. Logon as a administrator and create a folder on D: Logoff a administrator and logon as a user 1 to encrypt file.

Now logoff as a user and logon as a administrator and try to open shared folder file. This file will not be opened because encrypted file can not be opened by administrator. It means that user work against the policy of administrator. To block user1.

Now user1 can not access the encrypted shared folder of administrator. Logon as a administrator and advised the user1 again. Remote desktop to access computer remotely from other computer. With remoter desktop on Windows XP Professional, you can have access to a windows session that is running on your computer when you are at another computer.

This means, for example, that you can connect to your work computer from home and have access to all of your applications, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you can see your desktop at work displayed on your home computer, with the same programs running.

Remote desktop also allows more that one user to have active sessions on a single computer. This means that multiple users can leave their applications running and preserve the state of their windows session even while others are logged on. To use remote desktop, you need the following: Modem, or virtual private network vpn connection. This computer must have remote desktop connection, formerly called the terminal services client, installed.

Appropriate user accounts and permissions. Optional local resources. Save as. Save on desktop. File name PC2. Double-click on PC2. Remote assistance is a convenient way for friend in another location to connect to your computer from another computer running a compatible operating system, such as Microsoft windows XP. After your friend is connected, he will be able to view your computer screen and chant online with you in real time about what you both see.

With your permission, your friend can even use his or her mouse and key board to work with you on your computer. Both you and your assistant must be using either windows messenger or a MAPI complaint e-mail account such as Microsoft outlook or outlook express. You and your assistant need to be connected to the internet while using remote assistance.

If windows firewall is turned on, remote assistance will temporarily open firewall ports. If you are working on a corporate or local area network, firewalls might stop you from using remote assistance, in this case, check with your network administrator before using remote assistance. If the other user accepts your invitation by clicking yes then you can access his PC or send messages or files etc to each other.

Files and Settings transfer Wizard FastWiz. The files and settings transfer wizard helps you move your data files and personal settings from your old computer to your new one, without having to go through much of the same configuration you did with your old computer. For example, you can take your personal display properties, folder and taskbar options, and internet browser and e-mail settings from your old computer and place them on the new one.

The wizard will also move specific files or entire folders, such ad my documents, My Pictures, and Favorites. Passwords are not moved with program settings when you use the files and settings transfer wizard. This is a feature of the files and settings transfer wizard that helps to keep your passwords confidential. We recommend that you install a virus detection program on the new computer before transferring files over from the old computer.

This can help protect your new computer form viruses that may be contained in the files transferred over from your old computer. It will create USMT2.

UNC folder on Desktop copy this folder to other PC that you want to deploy settings and follow the following steps: Quota the amount of disk space available to a user. In organization level all users can see data i. Logon as administrator. Now create 5 users. Right-Click on my computer. Local Users and groups.

Right-click on users. Select new user. User name: Confirm Password: Uncheck user must change password at next logon. User cannot change password. Password never expires.