Network and Security Services

- For DIEP account, use Account Expires attribute, Logon Hours attribute and User can not must change password attribute.

Lesson 2: With the network system as in exercise 1. Want to grant permissions to users according to the following requirements:

- TUNG account has the right to add, delete, edit user accounts.

- DIEP account has the right to backup server.

- TUAN account has printer management rights. Instructions

- To grant permissions to the TUNG account, Add the account to the Account Operators group.

- To grant permissions to the DIEP account, add the account to the Backup Operators group.

- To grant permissions to the TUAN account, add the account to the Print Operators group.

Exercise 3: With the accounts already in exercise 1, grant permissions to users according to the following requirements:

- Only the Administrators and Diep groups have the right to join the computer to the Domain.

- Diep account has the right to backup data.

- Tuan account has local login rights at Domain Controller and has the right to remotely shutdown Domain Controller.

Instruct

- To allow Diep account to use Add workstations to Domain attribute, Back up Files and directories attribute.

- To let Tuan account use the Allow Log on Locally property, Shut down the System Properties property, Force Shutdown from a remote System property

- After completing, you need to update the system policy by typing the command GPUPDATE /FORCE

Lesson 4: For user accounts in the Domain. Set up password requirement policies as follows:

- Password is only valid for 30 days

- The new password cannot be the same as the previous password.

- Password must be at least 3 characters long. Please configure the system according to the above requirements.

Lesson 5: For user accounts in the Domain. Configure the system so that when a user logs into the network incorrectly 3 times, the account will be locked until the administrator reopens it.

Instruct

- To lock the account if you log in incorrectly 3 times, use the Account Lockout threshold property.

- To lock the account until the administrator unlocks it, use the Account Lockout Duration property.

- After completing, you need to update the system policy by typing the command GPUPDATE /FORCE

Lesson 6: With a network system based on the Domain model, the Director wants to record the work process of everyone in the system.

Please configure the system to meet the above requirements.

Instruct

- To set up a policy to monitor the time of logging in and out of the Domain, you use the Audit Account Logon events property.

- To see when accounts log into the system, go to the Event Viewer tool, you will see the values ​​recorded in the Security section.

Lesson 7: With the network system modeled below, configure the system according to the following requirements:

- Everyone accessing the Internet must go through a Proxy Server, and is not allowed to change the Proxy address.

- On the working computer, when people log into the system, the shared folder and private folder in the network will be automatically mapped to the computer.

Please configure the system in the simplest way to meet the above requirements.

Assumed information

The directory structure on the Domain Controller is as follows:

Each user will use 2 folders on the Domain Controller:

- The public folder is the BaoCao folder mapped to drive H:

- A private folder is a folder with the same name as the account name that is mapped to drive K:. For example, the private folder of the Diep account is the Diep folder.

Instruct

To install Proxy addresses on all computers in the network, you need to use Domain Group Policy.

- Select Users Configuration Windows settings à Internet Explorer Maintenance Connection. In the Proxy Settings property, check the Enable Proxy settings box, and enter the Proxy address for the required computers (192.168.1.1:8080).

- To prevent users from changing the Proxy address, configure in Users Configuration Administrative Templates Windows Component Internet Explorer and select the Disable Changing Proxy Settings property.

To create a logon script for a user, perform the following steps in sequence:

- Write drive mapping script for users

- Use Domain Group Policy to execute the newly created Script when the user logs into the network system.

To take effect when the user logs in, simply ask the user to log out of the system and log back in, for settings that affect the computer, a computer restart is required.

Lesson 8: With the existing network system in exercise 1, set up group policy for the Customer OU according to the following requirements:

- OU Khachhang includes Hung and Long accounts

- These accounts only allow running Internet Explorer and Wordpad programs.

- These accounts cannot use Control Panel.

- These accounts do not have these settings applied.

Configure the system in the simplest way to meet the above requirements. Instructions

- Need to create OU Khachhang, and move the corresponding user accounts into this OU.

- Then set up Group Policy for the OU according to the requirements of the problem and this OU does not inherit the Domain's Group Policy.

- select Users Configuration Administrative Templates System and select the Run only allowed Windows Applications property to set up the programs allowed to execute.

- select Users Configuration Administrative Templates Control Panel and select Prohibit Access to the Control Panel to not allow the use of Control Panel.

Lesson 9: Assume that the Server has 4 80GB hard drives. Divide and create volumes according to the following requirements:

- Volume OS is used to install the operating system, taking up 40GB of Disk0

- Volume Software is used to contain software, this volume is in Mirror format including 40GB of Disk0 and 40GB of Disk1.

- Raid-5 Data Volume includes 40GB of 3 disks Disk1, Disk2 and Disk3. Instructions:

- Install the operating system on the first hard drive – Disk0 with a Partition size of 40Gb.

- After the installation is complete, use the Disk Management program to convert the hard drives from Basic to Dynamic.

- Create Volumes according to the requirements of the assignment.

Lesson 10: Based on lesson 9, suppose Disk 3 is damaged, and a new hard disk has been replaced. Let's re-sync the data to the newly installed hard disk.

Instruct:

- Install the new drive into the computer and convert the drive to Dynamic Disk format.

- Right-click on one of the drives participating in RAID-5 and select Repair Volume, in the Repair RAID-5 volume dialog box, select the newly added drive.

Lesson 11: With the network system as in exercise 7, you want to create a shared resource so that everyone can send weekly work reports. You want everyone to only be able to leave data on that resource up to 10MB, but the director has no limit. Configure the system to meet the above requirements.

Instruct

- Set Quota on the drive containing the BaoCao folder - drive D - and grant a quota of 10MB.

- Use the Quota Entries… attribute to allocate unlimited quota to the GiamDoc account

Lesson 12: Drive D containing documents on the File Server is almost full, and the system keeps reporting that the disk has no more free space.

Please configure the system to temporarily fix the above problem while waiting for the hard drive to be installed.

Lesson 13: Due to work requirements, the Director wants only he to be able to read some of the content contained in the computer. Even if he removes this hard drive to another computer, he still cannot read its content.

Using the utility available on Windows Server 2003, guide the Director to perform this task.

Lesson 14: Use the Windows Backup utility to do this.


Day

Backup type

Saturday

Full backup (normal)

Sunday

Company holiday

Monday

Incremental, only backup data (files, folders)

Tuesday

Incremental, only backup data (files, folders)

Wednesday

Incremental, only backup data (files, folders)

Thursday

Incremental, only backup data (files, folders)

Friday

Incremental, only backup data (files, folders)

Maybe you are interested!

Perform data backup (Full backup, Incremental backup)

- Restore data

- Backup System State

Lesson 15: On the File Server there are user accounts and groups as follows:

- The Board of Directors includes: Hung, Trong

- The Employee group includes: Diep, Tuan, Tung. Create a folder structure as shown below.

Then grant access to the user as required:

- Each user has full rights to his own dedicated folder.

- The head of each department will be able to read the data of other members in the department. The head of the department is the first account in the list of each group.

- The Public folder is a shared folder, everyone can write data to it but can only delete data they created.

- People can access the Public folder from their local computer or from another computer on the network.

Instruct:

For the user accounts directory, the following should be taken into account:

- If you want people to be able to access the Data folder, you need to allow the everyone account to have Read permission on the Data folder.

- Each group's folder can only be accessed by group members. Thus, in the BanGiamDoc folder, only the BanGiamDoc group has Read permission. Similarly, in the NhanVien folder, only the NhanVien group has Read permission.

- In each person's folder, only the corresponding account has full permissions, and only the team leader account has read permissions.

For the Public folder:

- Users have the right to create files and folders but only delete what they created. You only need to allow users to have the right to create files/folders, and the right to delete will be granted to the Creator Owner account.

- Users can work on the local computer or work remotely, then you need to share the resource. You need to edit the Sharing permission so that the everyone account has full permissions - Full.

Lesson 16: On the D: drive of the File Server, there is a Public folder shared for all users. You need to monitor the data deletion operations of IN users on this folder.

Instruct

- Configure monitoring of Trong's data deletion operations

- Allows the system to record events related to file/folder objects

- Review Trong's delete actions in Event Viewer

Lesson 17: On the existing network system, shared resources are scattered across different Servers.

- On the File Server machine, the Public folder is being shared.

- On Tuan's computer, the Software folder is being shared.

- On Diep's computer, the Music folder is being shared.

Want users to access a shared resource on the Server with IP address 192.168.1.250. From there, everyone can access the above resources.

Please configure the system as per the above requirements.

Instruct

- Build DFS Root on machine 192.168.1.250.

- On DFS Root, create connections to shared resources on the network

Chapter 3: NETWORK AND SECURITY SERVICES

3.1. Disk and printer management

3.1.1. Disk configuration and management

One of the tasks involved in managing a computer is disk management. Knowing what tools are available to install and manage disks and what features are provided with Windows Server 2003 will allow you to better manage disks and configure advanced features, such as enforcing default tolerance or assigning a new partition to a Folder on an existing partition instead of assigning a new drive letter to it.

Microsoft Windows Server 2003 provides two types of disks: basic and dynamic. Basic disks use partitions familiar to users of previous versions of Windows and MS-DOS, while dynamic disks use volumes, which allow for more efficient use of space than partitions in computers with multiple hard disks, in addition to providing options for rich data. Understanding basic and dynamic disks will help you configure hard disks efficiently on a Windows Server 2003-based computer.

1) Types of disk management on Windows Server

When configuring the disks on your computer, you must decide whether to implement basic or dynamic disks, the type of hard disk you choose, and how you can choose the amount of free space on the hard disk. Dynamic disks provide more flexibility in how you install your hard disks than basic hard disks.

a) Basic disks

When you install a new disk, Windows Server 2003 recognizes it and configures it as a basic disk. Basic disks are the default storage media used by Windows Server 2003 and provide limited capabilities for configuring disks. Use basic disks when multiple operating systems are installed and dual booting is required, because Windows 2003 is the only operating system that recognizes dynamic disks.

- Characteristics of a basic disk: Characteristics of a basic disk include

A basic disk can contain 4 partitions, Each partition is a logical part of a hard drive that can have a drive letter assigned to it. Partitions can be created on a basic disk.

A basic disk in Windows Server 2003 is compatible with other types of disk storage, including partitions and RAID-5 (redundant array of independent disks), strip sets, and existing volume sets from Microsoft Windows NT 4.0 or other operating systems.

Comment


Agree Privacy Policy *