Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 9 Chapter 9: Managing Server Folders, Permissions, and Software Installation.

Similar presentations


Presentation on theme: "Chapter 9 Chapter 9: Managing Server Folders, Permissions, and Software Installation."— Presentation transcript:

1 Chapter 9 Chapter 9: Managing Server Folders, Permissions, and Software Installation

2 Chapter 9 Learning Objectives n Manage folders on a server, including: u Planning a folder structure u Viewing and creating folders u Setting folder properties such as attributes, permissions, auditing, and ownership u Setting up shared folders u Moving and copying files and folders n Install and manage application software continued

3 Chapter 9 Learning Objectives n Use the Registry to configure Windows NT Server and application software, and use Windows NT Diagnostics to view Registry contents n Set system policies using the System Policy Editor n Configure and use License Manager n Configure and use Directory Replicator

4 Chapter 9 Managing Folders n Designing a folder structure n Viewing and creating folders n Setting folder properties n Setting up a shared folder n Troubleshooting a security conflict n Moving and copying files and folders

5 Chapter 9 Designing a Folder Structure n A chaotic file structure makes it difficult to run or remove programs n Avoid confusion by having a place for: u Software applications u Confidential files shared by certain groups u Public files shared by everyone u Software utilities for all users u Server management utilities

6 Chapter 9 Folder Structure Design Considerations n Root folder should not be cluttered with files or too many folders n Each software application should have its own folder or subfolder n Similar information should be grouped n Folders should have names that clearly reflect their purpose

7 Chapter 9 A Sample Folder Structure Folders off the Root UsersDataWord Forms Manage Ntserver ContractsCourt Wills Tax Bankruptcy RealEstate Msoffice Winnt (created by NT Server setup) Access Clipart Excel Office Queries Templates Winword

8 Chapter 9 Viewing and Creating Folders n Viewing u Use My Computer or Windows NT Explorer u Display can be customized u or, the good ol’ command-line interface F “dir” command, or similar add-ons n Creating u Use My Computer or Windows NT Explorer u or, CLI

9 Chapter 9 Setting Folder Properties n General properties n Folder and permission security n Permissions n Auditing n Ownership

10 Chapter 9 General Properties n Descriptive information u Location u Size u Number of files/folders n Folder name and creation date n Folder attributes

11 Chapter 9 Attributes n A characteristic associated with a folder or file, used to help mange access and backups n Largely ignored by NT administrators (except for backup purposes) in favor of rights and permissions

12 Chapter 9 Windows NT Attributes

13 Chapter 9 Folder and Permission Security n Three security options u Permissions: Control access to the folder and its contents u Auditing: Enables administrator to audit activities on a folder or file u Ownership: Designates the folder owner who has full control of that folder

14 Chapter 9 NTFS Folder and File Permissions

15 Chapter 9 Directory Permissions Dialog Box Note: would usually have >1 group/username under “Name”.

16 Chapter 9 Microsoft Guidelines for Setting Permissions n Protect the Winnt folder that contains operating system files from general users (No Access or Read) but give Administrators Full Control access n Protect server utility folders with access permissions only for Administrators, and Server and Backup Operators continued

17 Chapter 9 Microsoft Guidelines for Setting Permissions n Protect software application folders with Add & Read n Create publicly used folders with Change access n Provide users Full Control of their own home directories n Remove the group Everyone from confidential folders

18 Chapter 9 Special Folder and Special File Access Options n Enable customization of folders or file access beyond standard permissions u different combinations of the aforementioned abilities F R, W, X, D, C, “take owner” u useful for special situations, if need be

19 Chapter 9 Auditing n Tracks access to folders and files n Directory Auditing dialog box enables auditing of a variety of successful and failed events F track success/fail, whichever is more important for that particular case F remember, auditing can be expensive -- that is, can dramatically affect server performance

20 Chapter 9 Ownership n Folder owners have Full Control permissions for the folders they create Taking ownership of a folder

21 Chapter 9 Setting Up a Shared Folder n Share permissions u No Access u Read u Change u Full Control n Can be overridden u NT uses most restrictive permission, whichever is stricter

22 Chapter 9 Setting Up a Shared Folder n Sharing can be limited by #users u software licensing u also provides some “extra” security n Shares can be hidden u put $ character at end of share name u both for security through obscurity as well as ease-of-use

23 Chapter 9 Troubleshooting a Security Conflict n Review folder permissions and share permissions for the account and for the groups to which the account user belongs n Careful planning of folder structure and user groups in light of server security needs saves time and user aggravation

24 Chapter 9 Moving and Copying Files and Folders n Creating, moving, or copying a file can affect the file and folder permissions u Moving: File is deleted from the original location placed in a different folder u Copying: Original file remains intact and a copy is made in another folder n New file permissions depend on F copy/create - inherit from folder F move - retain existing F unless move to different volume - like copy

25 Chapter 9 Installing and Managing Application Software n Software licensing n Network compatibility n Network performance n Location of temporary files n Software testing n Loading software from the network n Restrictions for MS-DOS-based software

26 Chapter 9 Software Licensing n Read and follow licensing agreement before loading software n Copy protect the software F user education important n License monitoring: A process used to ensure that the number of software licenses in use does not exceed the number for which the network is authorized

27 Chapter 9 Network Compatibility n Check all applications to be certain they are network-compatible, i.e., designed for multiuser access, often with network capabilities such as options to send files through e-mail u with popularity of the Internet, new applications generally are network-friendly u but remember, Internet features can be a security hole

28 Chapter 9 Network Performance n Closely monitor network activity and traffic associated with software applications u some applications have BIG effect on network traffic u remember, software is one consideration when choosing topology

29 Chapter 9 Location of Temporary Files n Determine what extra files are needed to run an application and where to store them n Teach software users how to deploy temporary and backup files created by software, and how to delete them when no longer needed F utilities exist to clean up files automatically

30 Chapter 9 Software Testing n Test each software installation before releasing it to users n An important way to determine that the software is working, is network compatible, and that the permissions are correctly set

31 Chapter 9 Loading Software from the Network n One option: Install software application files from network onto each client workstation n Another option: Install client software so that application files are loaded from server u Advantage: Save workstation disk space u Advantage: Ease of management u Disadvantage: Extra network traffic

32 Chapter 9 Installing Software Using Add/Remove Programs n Software configuration is stored in Windows NT Registry; configuration is easier and configuration information can be updated to an ERD n Registry tracks location of all files associated with software; easier to remove all program pieces

33 Chapter 9 Running Software Applications in User Mode n User mode u Used for running programs in a memory area kept separate from that used by the kernel u The program cannot directly access the kernel or operating system services except through an API n Kernel mode u Privileged environment in which Windows NT operating system kernel runs u Consists of protected memory area and privileges to directly execute system services, access CPU, run I/O operations, etc.

34 Chapter 9 Using the Registry to Configure System Setup and Software n Registry: Database that contains information the operating system needs about the entire server (configuration, program setup, devices, drivers, etc.) n Two editors to view Registry contents u Regedit u Regedt32

35 Chapter 9 The Five Root Keys n Root key (or subtree): Highest category of data contained in the Registry n The five root keys u HKEY_LOCAL_MACHINE u HKEY_CURRENT_USER u HKEY_USERS u HKEY_CLASSES_ROOT u HKEY_CURRENT_CONFIG

36 Chapter 9 The Five Root Keys

37 Chapter 9 Backing Up the Registry n The Registry is vitally important to Windows NT Server n Plan to back it up regularly when you back up other files F ERD - via RDISK F separately - via REGBACK F 3rd-party backup software often has specific options for registry

38 Chapter 9 Setting System Policies n Override registry settings in Windows NT Server n Used to set up special conditions for individual users F security F ease-of-use n Used to set up restrictions for all users F security F ease-of-use

39 Chapter 9 System Policies to Govern All Users n Control Panel display options n Desktop wallpaper and color schemes n Operating system shell restrictions F hiding drives, Net Neighborhood, etc. n System restrictions F run only certain programs, etc. n Windows NT Shell options n Windows NT System options

40 Chapter 9 System Policies to Govern Individual Users n Remote access settings n Creation of hidden drive shares n Network printer scheduling and error control options n Customized shared folder setup n Logon security and logon banner controls n File-naming options n User profile network time-out periods for slow network connections

41 Chapter 9 Setting Up and Using License Manager n “License” = right to use software F license terms differ by vendor F select the best option based on needs & price n Per seat licensing: Requires that there be enough licensees for all network client workstations n Per server licensing: Based on maximum number of clients that use an application at one time

42 Chapter 9 Setting Up and Using Directory Replicator n Directory replication services enable designated directories on one server to be copied to another server(s) or workstation(s) on the network n Export server: Server with the original directories n Import server: Computer that receives the directories and files

43 Chapter 9 Directory Replication Uses n To copy an update database on a member server in a client/server system to a reporting database on a different member server n To create a backup copy of account- related information

44 Chapter 9 Setting Up Export and Import Parameters

45 Chapter 9 Chapter Summary n Plan folder structure in advance. u Create distinct folders for user directories, software applications, server utilities, etc. u Set up folder properties F Set up permissions according to purpose of folder continued

46 Chapter 9 Chapter Summary n Before installing application software in a folder, make sure the software is network-compatible. n Use Add/Remove Programs tool to install software so that installation is coordinated with the Windows NT Registry. continued

47 Chapter 9 Chapter Summary n System policies offer another way to change Registry settings and to customize how users access Windows NT Server. n License Manager records and monitors the number of licenses. n Directory Replicator copies folders from a server to other network computers.

48


Download ppt "Chapter 9 Chapter 9: Managing Server Folders, Permissions, and Software Installation."

Similar presentations


Ads by Google