Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
1 RAVEENDAR SWAMINATHAN
Agenda
2
Configuring Hardware on a Computer Running Microsoft Windows XP Professional Managing Disks Configuring and Managing File Systems Configuring the Desktop Environment
Installing a Device Driver Using Device Manager Installing a Printer Determining Which Hardware Resources are required Determining Available Hardware Resources are required
Managing Disks
6
Working with Disk Management Working with Basic Disks Working with Dynamic Disks Preparing Disks When Upgrading to Windows XP Professional Managing Disks Defragmenting Volumes
Disk Management
7
Disk Management
8
To open Disk Management window, at run prompt, type compmgmt.msc It is also available at Administrative Tools in Control Panel as Computer Management We can perform Creating and deleting a partition
Basic 9Disks
Basic storage uses normal partition tables supported by MS-DOS, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows Millennium Edition (Me), Microsoft Windows NT, Microsoft Windows 2000, and Windows XP. A disk initialized for basic storage is called a basicdisk. A basic disk contains basic volumes, such as primary partitions, extended partitions, and logical drives. Additionally, basic volumes include multidisk volumes that are created by using Windows NT 4.0 or earlier, such as volume sets, stripe sets, mirror sets, and stripe sets with parity. Windows XP does not support these multidisk basic volumes. Any volume sets, stripe sets, mirror sets, or stripe sets with parity must be backed up and deleted or converted to dynamic disks before you install Windows XP Professional.
Dynamic Disks
10 Dynamic storage is supported in Windows 2000 and Windows XP Professional. A disk initialized for dynamic storage is called a dynamic disk. A dynamic disk contains dynamic volumes, such as simple volumes, spanned volumes, striped volumes, mirrored volumes, and RAID-5 volumes.
NOTE: Dynamic disks are not supported on portable computers or on Windows XP Home Edition-based computers.
You cannot create mirrored volumes or RAID-5 volumes on Windows XP Home Edition, Windows XP Professional, or Windows XP 64-Bit Edition-based computers. You can use a Windows XP Professional-based computer to create a mirrored or RAID-5 volume on remote computers that are running Windows 2000 Server, Windows 2000 Advanced Server, or Windows 2000 Datacenter Server. You must have administrative privileges on the remote computer to do this. Storage types are separate from the file system type. A basic or dynamic disk can contain any combination of FAT16, FAT32, or NTFS partitions or volumes. A disk system can contain any combination of storage types. However, all volumes on the same disk must use the same storage type.
Dynamic Disks
11
A volume is a storage unit made from free space on one or more disks. It can be formatted with a file system and assigned a drive letter. Volumes on dynamic disks can have any of the following layouts: simple, spanned, mirrored, striped, or RAID-5. A simple volume uses free space from a single disk. It can be a single region on a disk or consist of multiple, concatenated regions. A simple volume can be extended within the same disk or onto additional disks. If a simple volume is extended across multiple disks, it becomes a spanned volume. A spanned volume is created from free disk space that is linked together from multiple disks. You can extend a spanned volume onto a maximum of 32 disks. A spanned volume cannot be mirrored and is not fault-tolerant. A striped volume is a volume whose data is interleaved across two or more physical disks. The data on this type of volume is allocated alternately and evenly to each of the physical disks. A striped volume cannot be mirrored or extended and is not fault-tolerant. Striping is also known as RAID-0. A mirrored volume is a fault-tolerant volume whose data is duplicated on two physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If one of the disks fails, the data can still be accessed from the remaining disk. A mirrored volume cannot be extended. Mirroring is also known as RAID-1. A RAID-5 volume is a fault-tolerant volume whose data is striped across an array of three or more disks. Parity (a calculated value that can be used to reconstruct data after a failure) is also striped across the disk array. If a physical disk fails, the portion of the RAID-5 volume that was on that failed disk can be re-created from the remaining data and the parity. A RAID-5 volume cannot be mirrored or extended. The system volume contains the hardware-specific files that are needed to load Windows (for example, Ntldr, Boot.ini, and Ntdetect.com). The system volume can be, but does not have to be, the same as the boot volume. The boot volume contains the Windows operating system files that are located in the %Systemroot% and %Systemroot%\System32 folders. The boot volume can be, but does not have to be, the same as the system volume.
Operating System
Windows XP Professional
12
In the lower-right pane, right-click the basic disk that you want to convert, and then click Convert to Dynamic Disk. Select the check box that is next to the disk that you want to convert (if it is not already selected), and then click OK. Click Details if you want to view the list of volumes in the disk. Click Convert. Click Yes when you are prompted to convert the disk, and then click OK. After you convert a basic disk to a dynamic disk, local access to the dynamic disk is limited to Windows 2000 and Windows XP Professional. Additionally, after you convert a basic disk to a dynamic disk, the dynamic volumes cannot be changed back to partitions. You must first delete all dynamic volumes on the disk and then convert the dynamic disk back to a basic disk. If you want to keep your data, you must first back up the data or move it to another volume.
Defragmenting Volumes
14
Fragmentation occurs when the operating system cannot or will not allocate enough contiguous space to store a complete file as a unit, but instead puts parts of it in gaps between other files Defragmentation is a process that reduces the amount of fragmentation in file systems.
Defragmenting Volumes
Option 1 15 Open My Computer. Right-click the local disk volume that you want to defragment, and then click Properties. On the Tools tab, click Defragment Now. Click Defragment. Option 2 Start Computer Management MMC (Compmgmt.msc). Click Disk Defragmenter. Click the volume that you want to defragment, and then click Defragment. Option 3 Start Disk Defragmenter MMC (Dfrg.msc). Click the volume that you want to defragment, and then click Defragment. Limitations It can defragment only local volumes. It can defragment only one volume at a time. It cannot defragment one volume while it is scanning another. It cannot be scheduled.
Working with File Systems Managing Data Compression Securing Data by Using EFS
Windows 2000
Windows NT 4.0*
MS-DOS
17
20
Format Options
Formatting a Volume 21 You choose a file system when you format a volume. During the format, Windows XP Professional places key file system structures on the volume. These structures include the boot sector, the file allocation table (for FAT volumes), and the master file table (for NTFS volumes). Depending on the program you use to format a volume, you can also choose one or more of the following formatting options.
Format Option
Where the Option Is Available My Computer or Windows Explorer Available for all volumes.
Where the Option Is Available Disk Management Available for all volumes.
Where the Option Is Available Format Command Use the /v:label parameter to specify the volume label.
Volume label
Quick format
Available for all volumes. No option to compress the volume. Uses the default cluster size only.
Available for all volumes. Available for NTFS volumes. Offers all available cluster sizes.
Use the /q parameter to specify the quick format option. Use the /c parameter to enable compression for NTFS volumes. Use the /a:size parameter to specify the cluster size.
Offers default cluster sizes for FAT volumes and cluster sizes up to 4 KB for NTFS volumes.
22
See files and subfolders in the folder and view folder ownership, permissions, and attributes (such as Read-Only, Hidden, Archive, and System)
Modify
Delete the folder plus perform actions permitted by the Write permission and the Read & Execute permission
Full Control
Change permissions, take ownership, and delete subfolders and files, plus perform actions permitted by all other NTFS folder permissions
You can deny permission to a user account or group. To deny all access to a user account or group for a folder, deny the Full Control permission.
Read
Read the file, and view file attributes, ownership, and permissions
Write
Overwrite the file, change file attributes, and view file ownership and permissions
Modify
Modify and delete the file, plus perform the actions permitted by the Write permission and the Read & Execute permission
Full Control
Change permissions and take ownership, plus perform the actions permitted by all other NTFS file permission
24
Access Control List
NTFS stores an access control list (ACL) with every file and folder on an NTFS volume. The ACL contains a list of all user accounts and groups that have been assigned permissions for the file or folder, as well as the permissions that they have been assigned. When a user attempts to gain access to a resource, the ACL must contain an entry, called an access control entry (ACE), for the user account or a group to which the user belongs. The entry must allow the type of access that is requested (for example, Read access) for the user to gain access. If no ACE exists in the ACL, the user can't access the resource.
Effective Permissions
A user's effective permissions for a resource are the sum of the NTFS permissions that you assign to the individual user account and to all of the groups to which the user belongs. If a user has Read permission for a folder and is a member of a group with Write permission for the same folder, the user has both Read and Write permissions for that folder.
Overriding Permissions
25
Inherit Permissions
26
Shared Folders
29
Shared Folder Permissions apply to folders only Apply to Users who connect to folder from network only Default if Full Control and available for Everyone Permissions
Multiple Deny NTFS
Create compressed files both on FAT and NTFS You can directly open from the compressed folders You can encrypt compressed folders You can compress without decreasing performance When you have selected the option of Encrypting your folder, we cannot do Compression You can also Compress your drive or Volume
Disk Quota
31
Tracks and control quota on per user per volume basis Ignores Compression when calculating space Free space reports on XP will show the space free on available Users Quota SA can do the following
Set a disk quota limit to specify the amount of disk space for each user. Set a disk quota warning to specify when Windows XP Professional should log an event, indicating that the user is nearing his or her limit. Enforce disk quota limits and deny users access if they exceed their limit, or allow them continued access. Log an event when a user exceeds a specified disk space threshold. The threshold could be when users exceed their quota limit or when they exceed their warning level.
32
Disk Quota
33
Status
A red traffic light indicates that disk quotas are disabled. A yellow traffic light indicates that Windows XP Professional is rebuilding disk quota information. A green traffic light indicates that the disk quota system is active.
Monitoring
The amount of hard disk space that each user uses Users who are over their quota warning threshold, signified by a yellow triangle Users who are over their quota limit, signified by a red circle The warning threshold and the disk quota limit for each user
The Microsoft Encrypting File System (EFS) provides encryption for data in NTFS files stored on disk. This encryption is public key-based and runs as an integrated system service, making it easy to manage, difficult to attack, and transparent to the file owner. If a user who attempts to access an encrypted NTFS file has the private key to that file, the file can be decrypted so that the user can open the file and work with it transparently as a normal document. A user without the private key is denied access. Windows XP Professional also includes the Cipher command, which provides the ability to encrypt and decrypt files and folders from a command prompt. Windows XP Professional also provides a recovery agent. In the event that the owner loses the private key, the recovery agent can still recover the encrypted file.
35
In EFS, file encryption does not require the file owner to decrypt and re-encrypt the file on each use. Decryption and encryption happen transparently on file reads and writes to disk.
36
Decrypting
Decrypting a folder or file refers to clearing the Encrypt Contents To Secure Data check box in a folder's or file's Advanced Attributes dialog box, which you access from the folder's or file's Properties dialog box. Once decrypted, the file remains so until you select the Encrypt Contents To Secure Data check box. The only reason you might want to decrypt a file would be if other people needed access to the folder or file-for example, if you want to share the folder or make the file available across the network.
Recovery Agent
Default Recovery Agent is the Administrator
Configuring IP Addresses Troubleshooting IP Addresses Determining TCP/IP Name Resolution Methods Configuring a DNS and WINS Client Connecting to a Remote Host
Configuring IP Addresses
38
Configure TCP/IP to use a static IP address Configure TCP/IP to obtain an IP address automatically Explain Automatic Private IP Addressing Disable Automatic Private IP Addressing