Presentation is loading. Please wait.

Presentation is loading. Please wait.

(ITI310) By Eng. BASSEM ALSAID SESSIONS 4: Disks, Files and Folders SAT 21-Nov-2015.

Similar presentations


Presentation on theme: "(ITI310) By Eng. BASSEM ALSAID SESSIONS 4: Disks, Files and Folders SAT 21-Nov-2015."— Presentation transcript:

1 (ITI310) By Eng. BASSEM ALSAID SESSIONS 4: Disks, Files and Folders SAT 21-Nov-2015

2 SESSION 4: “Disks, Files and Folders” Session Abstract: Within an enterprise environment, managing and organizing the access to disk spaces is a very important task. It becomes critical when big number of users uses the system daily and consume huge amount of shared spaces. Learning Objectives: Upon completion of this part, the student will be able to: – Configure disk quotas – Set permissions to files and folders – Configure system audit – Schedule shadow copy

3 Disk Quotas Disk Quotas: Definition ‘Disk quotas’ is a feature of NTFS disk file system proposed by Microsoft since 1998 with NT4. However, the characteristics and the tools proposed to manage disk quota has been developed through the development of Windows operating system. By definition, disk quotas allow administrators to control disk space usage on each disk volume (per-volume). This functionality can be deployed in different ways: – Disk Usage Monitoring. – Disk Usage Monitoring and Warning. – Disk Usage Enforcement.

4 Disk Quotas Quotas are applied to all users of the volume unless exceptions are configured for individual users in special cases where users could have specific applications that need largest amount of disk spaces. Disk Quotas: Configuration Any volume on which quotas are proposed to be configured must be formatted as NTFS.

5 PRACTICE I: – How to reach disk quotas menu. – How to customize quota for a user. – How to increase quota limits for a user.

6 Repairing and Defragmenting Check Disk tool: The Check Disk tool can be used either to scan for and report errors on a file system, or to locate and fix errors. Defragment disk tool: Windows Server 2008 provides the option to defragment disk drives automatically as a background task.

7 OptionDescription /FAnalyze the disk and fix any errors detected. /BReevaluate clusters marked as bad on the volume. /C Do not check for cycles (a situation where a directory points to itself) within the folder structure. NTFS only. /IPerform a minimum check of indexes. NTFS only /L[:Size] Change the size of the transaction log file default size: 4096 KB. NTFS only. /R Analyze the disk and fix any errors, check for bad sectors and mark them as bad. /V List the full path of every file on the volume on FAT/FAT32. Displays messages related to fixing errors on NTFS volumes. /XForce the volume to dismount if currently mounted. The chkdsk utility accepts a number of command line options which govern the tasks performed during execution. These options are outlined in the following table:

8 OptionDescription -APerform an analysis of the specified volume. -CDefragment all disks. -F Force defragmentation of a volume even when low on space. -R Perform a partial defragmentation, consolidating fragments smaller than 64 MB (default). -V Set verbose mode for detailed output during analysis and/or defragmentation. -W Performs full defragmentation, consolidating all fragments regardless of fragment size. Disk defragmentation may be analyzed and repaired from the command prompt using the “defrag” command. This command supports a number of command-line options as described in the following table:

9 PRACTICE II: – How to invoke Check Disk tool (graphical form, command prompt “chkdsk”). – How to invoke Defragment Disk tool (graphical form, command prompt “defrag”). – How to start the defragmentation manually. – How to schedule disk defragmentation.

10 Ownership In term of resource access, ownership means: Having full control. Grant access. Being (often but not always) the resource creator. Ownership could be taken by either: The administrator. Any user that has the permission of Take ownership. Any user with the right to Restore Files and Directories. Any member of the Backup Operators group.

11 PRACTICE III: – How to take ownership of a file or folder.

12 Standard and Public File Sharing Windows Server 2008 supports two types of file sharing, referred to as public file sharing and standard file sharing. In the case of public file sharing any files to be shared must be copied to the server's Public folder located at %SystemDrive%\Users\Public. Once placed in this folder the files are accessible to any users logged locally onto the machine and, if enabled, to any network users. Standard file sharing, which is only permitted on NTFS volumes, allows individual folders, files and volumes to be shared to specific users. This provides far greater levels of security over network access through a combination of NTFS file and folder permissions and share permissions, and avoids the necessity to move files from their existing location in order to share them.

13 Enabling Windows Server 2008 File Sharing File sharing in Windows Server 2008 is managed from the Network and Sharing Center, accessed by selecting Start  Network and clicking on the Network and Sharing Center button in the toolbar. Once invoked, the Network and Sharing Center will list the current file sharing configuration and options.

14 PRACTICE IV: – How to manage File sharing in Windows Server 2008.

15 Creating Shared Folders Shared folders can be configured using Windows Explorer, simply by navigating to the folder to be shared, right clicking on the folder and selecting Properties from the menu. In the properties dialog, click on the Sharing tab to display and modify the current shared folder settings.

16 PRACTICE V: – How to Create Shared Folder in Windows Server 2008 with Windows Explorer. – Creating Shared Folders with Computer Management. – Creating Hidden Shares (Shares are made hidden by placing a $ at the end of the share name).

17 Share Permissions Windows Server 2008 provides two levels of permissions for shared files and folders, namely share permissions and file and folder permissions. In the case of network access to shared files and folders, the shared permissions are applied first, followed by any file and folder permissions. Share permissions are granted on a per user and per group basis.

18 File and Folder Permission Inheritance When a file or a folder is created in an existing folder it inherits, by default, all of the permissions of the original folder (called parent folder). Similarly, when the permissions on a folder are changed, these changes are automatically transmitted by inheritance to all files and folders contained within the parent.

19 PRACTICE VI: – View and change a folder permissions.

20 Basic File and Folder Permissions NTFS provides two levels of permissions: Basic permissions. Special permissions.

21 PRACTICE VII: – Change Basic Permissions on a file or folder. – Add Basic Permissions to users or groups who are not listed. – Change or edit Special Permissions on a file or folder. – Add Special Permissions to users or groups who are not listed.

22 The following tables lists the Basic Folder Permissions: Folder PermissionDescription Full Control  Read/Write/Change.  Delete files and sub-folders. Modify  Read/Write to files in the folder.  Delete current folder. List Folder Contents  Get List of files and folders Read and Execute  List files and folders  Execute files Write  Create new files and folders Read  List files and folders

23 The following tables lists the Basic File Permissions: File PermissionDescription Full Control  Read/Write/Change.  Delete the file. Modify  Read/Write.  Delete the file. Read and Execute  View files contents.  Execute file. Write  Write to the file. Read  View the files contents.

24 There are 14 special permission options, each of which may be allowed or denied: PermissionDescription Traverse folder/Execute file  Access to a folder.  Execute a file. List folder/Read data  View file and folder names.  View contents of files. Read attributes  Read attributes of a file or folder. Read extended attributes  Read extended attributes of a file. Create files/Write data  Create/Move/Copy of files in a folder.  Overwrite data in a file to be overwritten. Create folders/Append data  Create sub-folders in current folder.  Append Data to an existing file. Write attributes  Write attributes of a file or folder. Write extended attributes  Write extended attributes of a file. Delete subfolders and files  Delete subfolders and files in a current folder. Delete  Allows a file or folder to be deleted. Read permissions  Read both basic and special permissions of files and folders. Change permissions  Change both basic and special permissions of a file or folder Take ownership  Take ownership of a file or folder

25 Enabling File and Folder Auditing File and folder auditing is enabled and disabled using either Group Policy (for auditing domains, sites and organizational units) or local security policy (for single servers). First, we have to activate the file and folders auditing process. Audit may focus on the successful operations performed on files or folders or on the failed ones, or on both.

26 PRACTICE VIII: – Activate the file and folders auditing process. – Configure auditing for a specific file or folder.

27 Shadow Copy Shadow copies are a low-cost way to recover from many file- related accidents caused by human error, such as accidentally deleting, corrupting, or editing a file. Shadow Copies of Shared Folders helps alleviate data loss by creating shadow copies of files or folders that are stored on network file shares at pre-determined time intervals. In essence, a shadow copy is a previous version of the file or folder at a specific point in time.

28 Shadow Copy There are a number of issues that need to be considered when implementing shadow copy for shared folders: 1.The shared shadowed folders need to be identified 2.A location to be stored must be allocated. 3.The shadow copy system requires 300MB of available space, before any shadowing. 4.The total amount of space required will depend on the size of the folder to be shadowed. 5.The time and frequency of the volume snapshots needs to be defined. By default, this is performed twice a day at 7:00am and 12:00pm. 6.Once the Shadow Copy system has been configured the shadow copy client needs to be set up on the systems of any users that are likely to need to be able to restore files in shared folders.

29 PRACTICE IX: Using Computer Management to Enable and Configure Volume Shadow Copies.

30 You are tasked with recommending a strategy that allows users to retrieve previous versions of files without intervention by an administrator. If a disk fails, you should be able to restore individual files. All servers are running Windows Server 2008. What should you do? (Choose all that apply.) A.Perform a daily backup of data. B.Enable Shadow Copies, and store them on the same volume. C.Enable Shadow Copies, and store them on a different volume. D.Enable clustering on the server. EXERCISE I

31 NEXT SESSION Date: Saturday 28-Nov-2015 C2: 12:00 C3: 13:30 Title: “IP Addressing” THANKS


Download ppt "(ITI310) By Eng. BASSEM ALSAID SESSIONS 4: Disks, Files and Folders SAT 21-Nov-2015."

Similar presentations


Ads by Google