logo

pdf Advanced Administration for Microsoft® Windows® 2000

This course provides students with the knowledge and skills necessary to perform advanced administration tasks in a Microsoft® Windows® 2000 network. The course focuses on the administrative tasks required to centrally manage large numbers of users and computers. The course also provides students with the strategies and tools necessary to delegate administrative tasks to other administrators or user

pdf Module 10: Implementing Disaster Recovery

This module provides students with the knowledge and skills to repair member servers and domain controllers and recover data if a network disaster should occur. Students will learn how to use advanced startup options and the Recovery Console. Students will also learn how to restore Active Directory™ directory service and specific Active Directory objects.

pdf Module 8: Implementing Security in a Windows 2000 Network

This module provides students with the necessary knowledge and skills to implement security in a Microsoft® Windows® 2000 network by using security policies and auditing and by recovering encrypted files. In the lab in this module, students will have a chance to create a customized Microsoft Management Console (MMC) console for configuring security settings and creating a new security template. Then they will analyze and configure the security settings for a computer.

pdf Module 5: Using Group Policy to Manage User Environments

Instructor Setup for a Lab This section provides setup instructions required to prepare the instructor computer or classroom configuration for a lab. Lab A: Using Administrative Templates to Assign Registry-Based Policies No setup required for the instructor computer. Lab B: Assigning Script Policies to Users and Computers ??To prepare for the lab Ensure that students can access the \\london\scripts shared folder and that this folder contains the contents of the Student\Labfiles\Lab05\Scripts folder. This folder should have been created during classroom setup....

pdf Module 4: Implementing Group Policy

This module provides students with an introduction to Group Policy in Microsoft® Windows® 2000 and the general knowledge and skills to implement Group Policy settings. Students will learn about the structure of Group Policy, and Group Policy inheritance. This will provide students with the knowledge that they need to correctly set up Group Policy in their networks. Students will also learn how to delegate control of Group Policy objects (GPOs).

pdf Module 3: Administering Active Directory

Module Strategy Use the following strategy to present this module: ?? Introduction to Administering Active Directory In this topic, you will introduce the concept of centralized management and decentralized administration in Active Directory. Emphasize that centralized management allows you to access network resources from a single location, and decentralized administration allows you to delegate administrative control of portions of your network. Do not spend too much time explaining these concepts because they were covered earlier in the course....

pdf Module 2: Strategies for Administering a Windows 2000 Network

Customization Information This section identifies the lab setup requirements for a module and the configuration changes that occur on student computers during the labs. This information is provided to assist you in replicating or customizing Microsoft Official Curriculum (MOC) courseware.

pdf Administering Microsoft® Windows® 2000

This course provides the knowledge and skills necessary to perform day-to-day administration tasks in a single-domain, Microsoft® Windows 2000®–based network. It also provides students with prerequisite knowledge and skills required for course 1557, Installing and Configuring Microsoft Windows 2000.

pdf Module 10: Backing Up and Restoring Data

Use the following strategy to present this module: !" Introduction to Backing up and Restoring Data Provide an overview of the processes of backing up and restoring data. This topic has an animated slide. Use it to explain why data backup is an important task. Then, discuss the media to which students can back up data and the permissions required to perform a backup. !" Preparing to Back Up Data Introduce the various issues involved in formulating a backup plan. Then explain the characteristics of the different backup types in detail and their advantages. Use the topic on examples of backup types to explore the benefits of combining different backup...

pdf Module 9: Monitoring Event Logs

Customization Information This section identifies the lab setup requirements for a module and the configuration changes that occur on the student computers during the labs. This information is provided to assist you in replicating and customizing this module with other Microsoft Official Curriculum (MOC) courseware.

pdf Module 8: Remote Administration of Shared Folders

This module provides students with the knowledge and skills that are necessary to monitor and administer shared folders on local and remote computers. The module discusses how to use Computer Management to view a list of all shared folders on a computer and the users who have established active sessions on the computer.

pdf Module 7: Managing Data Storage

Use the following strategy to present this module: !" Managing Data Compression Provide an overview of data compression management. Describe the characteristics of compressed files and folders. Describe and demonstrate how to compress files and folders. Explain the compression state of files and folders that are copied and moved within and between partitions. The topic on copying and moving compressed files and folders has an animated slide.

pdf Module 6: Administering Printer Resources

Tham khảo tài liệu 'module 6: administering printer resources', công nghệ thông tin, hệ điều hành phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

pdf Module 5: Administering User Accounts

After you set up a user account, you might have to make modifications to it. Company business needs and personnel changes might require you to modify user accounts. For example, you might need to rename an existing user account for a new employee so that the employee has the same permissions and network access as his or her predecessor.

pdf Module 4: Administering File Resources

When providing access to file resources on a computer running Microsoft® Windows® 2000 Server, you control who has access to resources and the nature of the access that they have. To control access to files and folders, you assign NTFS file system permissions to user accounts and groups. NTFS is a file system designed for use with Windows 2000 and Windows NT operating systems. It supports file system recovery, very large storage media, long file names, and other features.

pdf Module 3: Using Groups to Organize User Accounts

There is a class discussion in this module, in which you will work through a scenario about applying groups in a single domain. Review the slides and corresponding questions and solutions. This section describes how to present this interactive discussion.

pdf Module 2: Setting Up User Accounts

Use the following strategy to present this module: !" Introduction to User Accounts Provide an overview of the purpose of a user account and how it authenticates a user. Then, introduce the different types of user accounts and explain the differences between them. !" Requirements for New User Accounts Emphasize the importance of understanding the practices that are in place in the existing network in regard to creating user accounts. Explain to students that they must follow the established guidelines to ensure the smooth running of the network. To achieve this, they must familiarize themselves with the naming conventions, password requirements, and default account options for user accounts that are in...

pdf Module 1: Introduction to Windows 2000 Administration

This module provides students with an overview of a Microsoft® Windows® 2000 network, the basic resources that it provides (file, print, and Web), and the directory service infrastructure (user accounts, permissions, and authentication) that provides and controls user access to these resources.

pdf Developers's Guide_ Linux

The Developer’s Guide describes intermediate and advanced development topics, such as building database applications, writing custom components, and creating Internet Web server applications using Kylix, Delphi for the Linux operating system. The Developer’s Guide assumes you are familiar with using Linux and understand fundamental programming techniques. For an introduction to Kylix programming and the integrated development environment (IDE), see the online Help and the Quick Start manual.

pdf Windows 2000 Active Directory

This book will provide you with detailed explanations and case studies that will answer the most challenging questions regarding Active Directory. How can you configure the inner-workings of this directory service to make the most of your IT investment? What is the best approach to a migration? How do you use the features such as Group Policies, to simplify your administration? And what can you do to prepare for a disaster?

Tổng cổng: 1284 tài liệu / 65 trang

DMCA.com Protection Status Copyright by webtailieu.net