Presentation is loading. Please wait.

Presentation is loading. Please wait.

Microsoft Windows XP Professional MCSE Exam 70-270.

Similar presentations


Presentation on theme: "Microsoft Windows XP Professional MCSE Exam 70-270."— Presentation transcript:

1 Microsoft Windows XP Professional MCSE Exam 70-270

2 Managing Data Storage Chapter Fourteen

3 Managing NTFS Compression Microsoft Windows XP File System (NTFS) compression enables you to compress files and folders. Microsoft Windows XP File System (NTFS) compression enables you to compress files and folders. Each file and folder on an NTFS volume has a compression state, which is either compressed or uncompressed. Each file and folder on an NTFS volume has a compression state, which is either compressed or uncompressed.

4 Using Compressed Folders The Compressed Folders feature is new in Windows XP Professional and provides the ability to create compressed folders and view their contents. The Compressed Folders feature is new in Windows XP Professional and provides the ability to create compressed folders and view their contents. The Compressed Folders feature in Windows XP Professional allows you to compress large files so that you can store more files on a floppy disk or hard drive. The Compressed Folders feature in Windows XP Professional allows you to compress large files so that you can store more files on a floppy disk or hard drive.

5 Using Compressed Files and Folders Compressed files can be read and written to by any Microsoft Windows-based or MS- DOS-based application without first being uncompressed by another program. Compressed files can be read and written to by any Microsoft Windows-based or MS- DOS-based application without first being uncompressed by another program. An application, such as Microsoft Word for Windows, or an operating system command, such as Copy, requests access to a compressed file, NTFS automatically uncompresses the file before making it available. An application, such as Microsoft Word for Windows, or an operating system command, such as Copy, requests access to a compressed file, NTFS automatically uncompresses the file before making it available.

6 Using Compressed Files and Folders NTFS allocates disk space based on the uncompressed file size. NTFS allocates disk space based on the uncompressed file size. If you copy a compressed file to an NTFS volume with enough space for the compressed file but not enough space for the uncompressed file, you might get an error message stating that there is not enough disk space for the file. The file will not be copied to the volume. If you copy a compressed file to an NTFS volume with enough space for the compressed file but not enough space for the uncompressed file, you might get an error message stating that there is not enough disk space for the file. The file will not be copied to the volume.

7 Compressing Files and Folders Using NTFS You can set the compression state of folders and files, and Windows XP will display the compressed files and folders in Windows Explorer with an alternate color. You can set the compression state of folders and files, and Windows XP will display the compressed files and folders in Windows Explorer with an alternate color.

8 In the Advanced Attributes NTFS encryption and compression are mutually exclusive. Therefore, if you select the Encrypt Contents To Secure Data check box, you can't compress the folder or file. NTFS encryption and compression are mutually exclusive. Therefore, if you select the Encrypt Contents To Secure Data check box, you can't compress the folder or file.

9 Compressing Files and Folders Using NTFS To change the compression state for a file or folder, you must have Write permission for that file or folder. To change the compression state for a file or folder, you must have Write permission for that file or folder. Always remember to APPLY for the changes to take effect. Always remember to APPLY for the changes to take effect.

10 Compressing Files and Folders Using NTFS Copying and Moving Compressed Files and Folders Copying and Moving Compressed Files and Folders –Specific rules determine whether the compression state of files and folders is retained when you copy or move them within and between NTFS and FAT volumes. Note rules on page 505

11 Copying and Moving Compressed Files and Folders

12 Using NTFS Compression Because some file types compress more than others, select file types to compress based on the anticipated resulting file size Because some file types compress more than others, select file types to compress based on the anticipated resulting file size Do not store compressed files, such as PKZIP files, in a compressed folder. Do not store compressed files, such as PKZIP files, in a compressed folder. Compress static data rather than data that changes frequently. Compress static data rather than data that changes frequently. NTFS compression can cause performance degradation when you copy and move files. NTFS compression can cause performance degradation when you copy and move files.

13 Practice: Pages 506 – 510 Managing NTFS Compression Managing NTFS Compression

14 Managing Disk Quotas Disk quotas allow you to allocate disk space usage based on the files and folders that users own. Disk quotas allow you to allocate disk space usage based on the files and folders that users own. You can set disk quotas, quota thresholds, and quota limits for all users and for individual users. You can set disk quotas, quota thresholds, and quota limits for all users and for individual users.

15 Understanding Disk Quota Management Disk usage is based on file and folder ownership. Disk usage is based on file and folder ownership. Disk quotas do not use compression. Disk quotas do not use compression. Free space for applications is based on quota limit. Free space for applications is based on quota limit. Disk quotas can be applied only to Windows XP NTFS volumes.

16 Disk quotas to monitor and control hard disk space usage Set quota limit to specify the amount of disk space for each user Set quota limit to specify the amount of disk space for each user Set warning to specify when Windows 2000 should log an event Set warning to specify when Windows 2000 should log an event Enforce disk quota limits and deny users access if they exceed their limit Enforce disk quota limits and deny users access if they exceed their limit Log an event when a user exceeds a specified disk space threshold. Log an event when a user exceeds a specified disk space threshold.

17 Setting Disk Quotas Enable Quota Management Enable Quota Management Deny Disk Space To Users Exceeding Quota Limit Deny Disk Space To Users Exceeding Quota Limit Do Not Limit Disk Usage Do Not Limit Disk Usage Limit disk space to users Limit disk space to users Set warning level to log an event Set warning level to log an event Log event when a user exceeds their limit Log event when a user exceeds their limit Log event when a user exceeds their warning Level Log event when a user exceeds their warning Level Quota entries Quota entries

18 Determining the Status of Disk Quotas You can determine the status of disk quotas in the Properties dialog box for a disk by checking the traffic light icon and by reading the status message to its right. You can determine the status of disk quotas in the Properties dialog box for a disk by checking the traffic light icon and by reading the status message to its right.

19 Status of disk quotas A Red traffic light indicates that disk quotas are disabled. A Red traffic light indicates that disk quotas are disabled. A Yellow traffic light indicates that Windows XP is rebuilding disk quota information. A Yellow traffic light indicates that Windows XP is rebuilding disk quota information. A Green traffic light indicates that the disk quota system is active. A Green traffic light indicates that the disk quota system is active.

20 Monitoring Disk Quotas Use the Quota Entries For window to view… Use the Quota Entries For window to view… –The amount of hard disk space that each user occupies. –Users who are over their quota-warning threshold, which is signified by a yellow triangle. –Users who are over their quota limit, which is signified by a red circle. –The warning threshold and the disk quota limit for each user.

21 Determining Best Uses of Disk Quotas Note the Guidelines for using disk quotas on pages 517. Note the Guidelines for using disk quotas on pages 517.

22 Practice: Page 517 – 521 Enabling and Disabling Disk Quotas Enabling and Disabling Disk Quotas

23 Increasing Security with EFS EFS encryption is public key-based and runs as an integrated-system service, making it easy to manage, difficult to attack, and transparent to the file owner. EFS encryption is public key-based and runs as an integrated-system service, making it easy to manage, difficult to attack, and transparent to the file owner.

24 Understanding EFS EFS allows users to encrypt NTFS files by using a strong public key-based cryptographic scheme that encrypts all files in a folder. Users with roaming profiles can use the same key with trusted remote systems. EFS allows users to encrypt NTFS files by using a strong public key-based cryptographic scheme that encrypts all files in a folder. Users with roaming profiles can use the same key with trusted remote systems.

25 Understanding EFS No administrative effort is needed to begin, and most operations are transparent. Backups and copies of encrypted files are also encrypted if they are in NTFS volumes. No administrative effort is needed to begin, and most operations are transparent. Backups and copies of encrypted files are also encrypted if they are in NTFS volumes.

26 Understanding EFS Files remain encrypted if you move or rename them, and encryption isn't defeated by temporary files created during editing and left unencrypted in the paging file or in a temporary file. Files remain encrypted if you move or rename them, and encryption isn't defeated by temporary files created during editing and left unencrypted in the paging file or in a temporary file. You can set policies to recover EFS- encrypted data when necessary. You can set policies to recover EFS- encrypted data when necessary. The recovery policy is integrated with overall Windows XP Professional security policy. The recovery policy is integrated with overall Windows XP Professional security policy.

27 Understanding EFS You can use EFS to encrypt and decrypt files on remote file servers but not to encrypt data that is transferred over the network. Windows XP Professional provides network protocols, such as Secure Sockets Layer (SSL) authentication, to encrypt data over the network. You can use EFS to encrypt and decrypt files on remote file servers but not to encrypt data that is transferred over the network. Windows XP Professional provides network protocols, such as Secure Sockets Layer (SSL) authentication, to encrypt data over the network.

28 Encrypting The recommended method to encrypt files is to create an NTFS folder and then encrypt the folder. The recommended method to encrypt files is to create an NTFS folder and then encrypt the folder. Folders that are marked for encryption aren't actually encrypted; only the files within the folder are encrypted. Folders that are marked for encryption aren't actually encrypted; only the files within the folder are encrypted.

29 Encrypting Compressed files can't be encrypted, and encrypted files can't be compressed. Compressed files can't be encrypted, and encrypted files can't be compressed. The file is encrypted in blocks, with a different file encryption key for each block. The file is encrypted in blocks, with a different file encryption key for each block. All of the file encryption keys are stored and encrypted in the Data Decryption Field (DDF) and the Data Recovery Field (DRF) in the file header. All of the file encryption keys are stored and encrypted in the Data Decryption Field (DDF) and the Data Recovery Field (DRF) in the file header.

30 North American Users Only By default, encryption provided by EFS is standard 56-bit encryption. For additional security, North American users can obtain 128-bit encryption by ordering the Enhanced CryptoPAK from Microsoft. By default, encryption provided by EFS is standard 56-bit encryption. For additional security, North American users can obtain 128-bit encryption by ordering the Enhanced CryptoPAK from Microsoft. Files encrypted by the CryptoPAK cannot be decrypted, accessed, or recovered on a system that supports only 56-bit encryption. Files encrypted by the CryptoPAK cannot be decrypted, accessed, or recovered on a system that supports only 56-bit encryption.

31 Decrypting Decrypting a folder or file refers to clearing the Encrypt Contents To Secure Data check box in a folder's or file's Advanced Attributes dialog box, which you access from the folder's or file's Properties dialog box. Decrypting a folder or file refers to clearing the Encrypt Contents To Secure Data check box in a folder's or file's Advanced Attributes dialog box, which you access from the folder's or file's Properties dialog box. The only reason you might want to decrypt a file would be if other people needed access to the folder or file; for example, if you want to share the folder or make the file available across the network. The only reason you might want to decrypt a file would be if other people needed access to the folder or file; for example, if you want to share the folder or make the file available across the network.

32 Sharing Encrypted Files To share encrypted files, the user must have already shared out a file on the same computer. To share encrypted files, the user must have already shared out a file on the same computer. Under the General Tab select Advanced. Under the General Tab select Advanced.

33 Sharing Encrypted Files In the Advanced Attributes select Details In the Advanced Attributes select Details In the Encryption Details select Add In the Encryption Details select Add

34 Sharing Encrypted Files Next add the user who has already encrypted a file on that computer. Next add the user who has already encrypted a file on that computer. Only users with a certificate can be allowed to share encrypted files. Only users with a certificate can be allowed to share encrypted files.

35 Using the Cipher Command The Cipher command-line utility provides the ability to encrypt and decrypt files and folders from a command prompt. The Cipher command-line utility provides the ability to encrypt and decrypt files and folders from a command prompt. cipher [/e | /d] [/s:folder_name] [/a] [/i] [/f] [/q] [/h] [/k] [file_name [...]] cipher [/e | /d] [/s:folder_name] [/a] [/i] [/f] [/q] [/h] [/k] [file_name [...]] Option list on page 525 Option list on page 525

36 Recovery Agent If the owner's private key is unavailable, a person designated as the recovery agent can open the file using his or her own private key, which is applied to the DRF to unlock the list of file-encryption keys. If the owner's private key is unavailable, a person designated as the recovery agent can open the file using his or her own private key, which is applied to the DRF to unlock the list of file-encryption keys. The default recovery agent is the administrator of the local computer unless the computer is part of a domain. The default recovery agent is the administrator of the local computer unless the computer is part of a domain. In a domain, the domain administrator is the default recovery agent. In a domain, the domain administrator is the default recovery agent.

37 Recovery Agent The recovery agent is on another computer in the network, send the file to the recovery agent. The recovery agent is on another computer in the network, send the file to the recovery agent. It is a good security practice to rotate recovery agents It is a good security practice to rotate recovery agents The person designated as the recovery agent has a special certificate and associated private key that allow data recovery The person designated as the recovery agent has a special certificate and associated private key that allow data recovery

38 Disabling EFS You can disable EFS for a domain, OU, or computer by applying an empty Encrypted Data Recovery Agent policy setting. Until Encrypted Data Recovery Agent settings are configured and applied through Group Policy, there is no policy, so the default recovery agents are used by EFS. You can disable EFS for a domain, OU, or computer by applying an empty Encrypted Data Recovery Agent policy setting. Until Encrypted Data Recovery Agent settings are configured and applied through Group Policy, there is no policy, so the default recovery agents are used by EFS.

39 Practice: Page 526 – 528 Encrypting and Decrypting Files Encrypting and Decrypting Files

40 Using Disk Defragmenter Analyze Analyze –Click this button to analyze the disk for fragmentation. After the analysis, the Analysis Display band provides a graphic representation of how fragmented the volume is. Defragment Defragment –Click this button to defragment the disk. After defragmentation, the Defragmentation Display band provides a graphic representation of the defragmented volume.

41 Defragmenting Disks

42 Using Disk Defragmenter Effectively 1. Run Disk Defragmenter when the computer will receive the least usage. 2. Educate users to defragment their local hard disks at least once a month to prevent accumulation of fragmented files. 3. Analyze the target volume before you install large applications and defragment the volume if necessary. 4. When you delete a large number of files or folders, your hard disk might become excessively fragmented, so be sure that you analyze it afterward.

43 Using Check Disk Check Disk attempts to repair file system errors, locate bad sectors, and recover readable information from those bad sectors. All files must be closed for this program to run. Check Disk attempts to repair file system errors, locate bad sectors, and recover readable information from those bad sectors. All files must be closed for this program to run.

44 Using Check Disk You can also use the command-line version of Check Disk. The command- line syntax for Chkdsk is as follows: You can also use the command-line version of Check Disk. The command- line syntax for Chkdsk is as follows: Chkdsk [volume[[path]filename]]] [/f] [/v] [/r] [/x] [/i] [/c] [/l[:size]]

45 Using Disk Cleanup You can use Disk Cleanup to free up disk space by deleting temporary files and uninstalling programs. Disk Cleanup lists the temporary files, Internet cache files, and unnecessary programs that you can safely delete. You can use Disk Cleanup to free up disk space by deleting temporary files and uninstalling programs. Disk Cleanup lists the temporary files, Internet cache files, and unnecessary programs that you can safely delete.

46 Using Disk Cleanup Disk Cleanup analysis your drive first. Disk Cleanup analysis your drive first. You can then view the files to be deleted. You can then view the files to be deleted.

47 Disk Cleanup Also More Options: Also More Options: –Windows Components –Installed Programs –System Restore

48 Practice: Page 539 – 542 Managing NTFS Compression Managing NTFS Compression


Download ppt "Microsoft Windows XP Professional MCSE Exam 70-270."

Similar presentations


Ads by Google