SlideShare a Scribd company logo
A+ Guide to IT Technical Support, 9th
Edition
Chapter 17
Windows Resources on a Network
© Cengage Learning 2017
A+ Guide to IT Technical Support, 9th Edition
Objectives
• Support some client-server applications
• Share and secure files and folders on a network
• Support cloud computing services on a network
2
© Cengage Learning 2017
Supporting Client/Server Applications
• Client/Server applications expected to support:
– Internet Explorer
– Remote Desktop
– Other remote applications
• Also need to know how to use Group Policy to
configure Quality of Service (QoS)
– Also how to link a data source through a network to
database applications
A+ Guide to IT Technical Support, 9th Edition 3
© Cengage Learning 2017
Network Servers
• List of popular client-server resources:
– Mail server
– File server
– Print server
– DHCP server
– DNS server
– Proxy server
– Authentication server
– Web server
A+ Guide to IT Technical Support, 9th Edition 4
© Cengage Learning 2017
Internet Explorer
• Most popular client/server applications are a
browser and web server
• Internet Explorer (IE) version 11: latest version at
this writing
– Windows 10 features new Microsoft Edge browser
• Easy to upgrade by using Windows Update
• Tips when using IE window:
– To show the menu bar, press the Alt key
– HTTP Secure – look for https and a padlock icon
– If you have problems with IE11, you can disable it
A+ Guide to IT Technical Support, 9th Edition 5
© Cengage Learning 2017
Internet Explorer
• Use the Internet Options box to manage IE settings
– Click Tools icon and click Internet Options
• Internet Options box has several tabs with different
configuration options and settings
• General Tab
– Change the home page or add a second home page
– Protect your identity and surfing records
– Check Delete browsing history on exit if you want
your history cleared each time you close IE
– Manage IE cache
A+ Guide to IT Technical Support, 9th Edition 6
© Cengage Learning 2017
Internet Explorer
• Security Tab
– Set security level (medium-high is the default level)
• Prompts before downloading content
• Does not download ActiveX controls that are not signed
by Microsoft (virus can sometimes hide in an ActiveX
control)
– To customize security settings, click Custom level
A+ Guide to IT Technical Support, 9th Edition 7
© Cengage Learning 2017
Internet Explorer
• Privacy Tab and Content Tab
– Use Privacy Tab to block cookies that might invade
your privacy or steal identity
– Content tab contains settings for Family Safety,
certificates used by web sites, and how
AutoComplete and Feeds are handled
A+ Guide to IT Technical Support, 9th Edition 8
© Cengage Learning 2017
Internet Explorer
• Connections Tab and Proxy Settings
– Allows you to configure proxy server settings and
create a VPN connection
• Proxy server: intercepts requests that a browser makes
of a server and serves up request from a cache it
maintains
A+ Guide to IT Technical Support, 9th Edition 9
Figure 17-8 Enter the IP address of all proxy
servers on your corporate network
© Cengage Learning 2017
Internet Explorer
• Programs Tab
– Used to manage add-
ons (plug-ins)
• Add-ons: small apps
that help IE display
multimedia content,
manage email, translate
text, or other actions
A+ Guide to IT Technical Support, 9th Edition 10
Figure 17-9 Use the Programs Tab to
manage add-ons and default applications
used for Internet services
© Cengage Learning 2017
Internet Explorer
• Advanced Tab
– Contains several miscellaneous settings used to
control Internet Explorer
– One setting is useful when IE is giving problems
• If you suspect problems are caused by wrong settings,
click Reset to return IE to all default settings
A+ Guide to IT Technical Support, 9th Edition 11
© Cengage Learning 2017
Remote Desktop Connection (RDC)
• Remote Desktop gives a user access to a Windows
desktop from anywhere on the Internet
• To use Remote Desktop, the computer you want to
remotely access (the server) must be running
business or professional editions of Windows
8/7/Vista
– Computer accessing can be running any version of
Windows
• Computers set to serve up Remote Desktop are not
as secure
– You can use software that does not require opening
ports for a more secure solution
A+ Guide to IT Technical Support, 9th Edition 12
© Cengage Learning 2017
Remote Assistance
• Remote Assistance – a user on the server computer
can remain signed in during the remote session,
retains control of the session, and can see the
screen
– Helpful when troubleshooting problems
– User who needs help send an invitation by email or
chat to connect to their computer using Remote
Assistance
A+ Guide to IT Technical Support, 9th Edition 13
© Cengage Learning 2017
Remote Assistance
• Ways to initiate a Remote Assistance session:
– User saves an invitation file and send file to
technician
– User can send an automated email through the
Remote Assistance app
– User can use Easy Connect, which is the easiest
method to start Remote Assistance connection
• Both computers must support Easy Connect
– Technician can initiate a session
• Follow steps outlined in text to see how to initiate a
Remote Assistance connection using Easy Connect
A+ Guide to IT Technical Support, 9th Edition 14
© Cengage Learning 2017
Remote Assistance
• Things you can do during a Remote Assistance
session:
– Chat
– Request control
– Pause
– Disconnect or Stop sharing
– Log activity in a log file
– Change expiration of invitations
A+ Guide to IT Technical Support, 9th Edition 15
© Cengage Learning 2017
Remote Assistance
• If you have problems making the connection:
– Windows Firewall on the user’s computer might be
blocking Remote Assistance
• Verify Remote Assistance is checked as an exception
to blocked apps in Windows Firewall window
– If outside the user’s local network, the hardware
firewall protecting her network might be blocking
Remote Assistance
• Verify that port forwarding is enabled for Remote
Assistance
A+ Guide to IT Technical Support, 9th Edition 16
© Cengage Learning 2017
Use Group Policy to Improve QoS
Applications
• Group Policy (gpedit.msc)
– Used to control what users can do and how the system
can be used
– Only available in Windows professional and business
editions
– Works by:
• Making entries in registry
• Applying scripts to Windows startup, shutdown, and
logon processes
• Affecting security settings
A+ Guide to IT Technical Support, 9th Edition 17
© Cengage Learning 2017
Use Group Policy to Improve QoS
Applications
• Group Policy (cont’d)
– Can be applied to computer or user
• Computer policies are applied just before logon screen
• User policies are applied after login
– To use Group Policy to set the QoS level for an
application follow steps outlined in the text
– To get the most out of QoS, configure each router and
computer on the network to use QoS
A+ Guide to IT Technical Support, 9th Edition 18
© Cengage Learning 2017
Use Group Policy to Improve QoS
Applications
• Important options when creating a policy:
– Priority level is determined by a DSCP (Differentiated
Service Code Point) value
– Outbound traffic can be throttled to limit the
bandwidth assigned an application
– The policy can apply to all applications or a specific
program
– You can specify the source IP address and/or
destination IP address
– You can select the protocol (TCP or UDP) and port
numbers for the policy
A+ Guide to IT Technical Support, 9th Edition 19
© Cengage Learning 2017
ODBC Data Sources
• Open Database Connectivity (ODBC) – technology
used to create the data source
– Which provides access to the database and includes
the drivers required to interface between Access and
the data
– Drivers for Microsoft SQL Server must be installed on
the local computer
– Use the ODBC Data Sources tool in the
Administrative Tools group of Control Panel to
configure the data source
A+ Guide to IT Technical Support, 9th Edition 20
© Cengage Learning 2017
Controlling Access to Folders and Files
• Managing shared resources is accomplished by:
– Assigning rights to user accounts
– Assigning permissions to folders and files
A+ Guide to IT Technical Support, 9th Edition 21
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Principle of least privilege: An approach where
computer users are assigned the minimum rights
required to do their job
• Rights or privileges are established when you first
create a user account (based on account type)
– Rights can later be changed by changing the user
groups to which the account belongs
• User accounts are created from the Control Panel or
by using the Computer Management console
A+ Guide to IT Technical Support, 9th Edition 22
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Type of User Account
– Administrator account: has complete access to the
system and can make changes that affect the security
of the system and other users
– Standard user account: can use software and
hardware and make some system changes but
cannot make changes that affect the security of the
system or other users
A+ Guide to IT Technical Support, 9th Edition 23
© Cengage Learning 2017
Classify User Accounts and User
Groups
A+ Guide to IT Technical Support, 9th Edition 24
Figure 17-29 Create a new user
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Built-in User Groups
– Administrators and Users groups
– Guests group
• Has limited rights and is given a temporary profile that
is deleted when user logs off
– Backup Operators group
• Can back up and restore files on the system regardless
of its access permission to files
– Power Users group
• Windows XP group that can read from and write to
parts of the system, install apps, and perform limited
administrator tasks
A+ Guide to IT Technical Support, 9th Edition 25
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Windows might automatically assign one of these
built-in user groups to an account:
– Authenticated Users group: includes all user accounts
except the Guest account
– Everyone group: includes the Authenticated Users
group as well as the Guest account
– Anonymous users: users who have not been
authenticated on a remote computer
A+ Guide to IT Technical Support, 9th Edition 26
© Cengage Learning 2017
Classify User Accounts and User
Groups
• Customized User Groups
– Use Management Console in business and
professional editions of Windows to create custom
user groups
– Easier to assign permissions to user groups rather
than to individual accounts
• User groups work well when several users need the
same permissions
• Create a user group and then assign permission to the
user group
A+ Guide to IT Technical Support, 9th Edition 27
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Three general strategies for managing shared folder
and files in Windows
– Homegroup sharing: use when all users on a
network require the same access to all resources
– Workgroup sharing: offers better security than a
homegroup
– Domain controlling: if computer belongs to a
domain, all security is managed by the network
administrator for the entire network
A+ Guide to IT Technical Support, 9th Edition 28
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Tips on which folder to use to hold shared data:
– Private data for individual users
• C:Users folder for that user
– Data for all users to share
• C:UsersPublic folder
– For best security, create a folder not in either of the
above folders and assign permissions to that folder
and its subfolders
• Allow all users access or only certain users or user
groups
A+ Guide to IT Technical Support, 9th Edition 29
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Using workgroup sharing, Windows offers two
methods to share a folder
– Share permissions: grant permissions only to
network users and not to local users
• Apply to a folder and its contents, not to individual files
– NTFS permissions: apply to local users and network
users
• Apply to both folders and individual files
• Work on NTFS volumes only
A+ Guide to IT Technical Support, 9th Edition 30
© Cengage Learning 2017
Methods to Assign Permissions To
Folders and Files
• Tips when implementing permissions:
– If both share and NTFS permission are used, the
most restrictive permission applies
– If NTFS permissions are conflicting the more liberal
permission applies
– Permission propagation: when permissions are
passed from parent to child
– Inherited permissions: permissions attained from a
parent object
– When you move or copy an object to a folder, the
object takes on permissions of that folder
A+ Guide to IT Technical Support, 9th Edition 31
© Cengage Learning 2017
How to Share Folders and Files
• User and Group Information with the gpresult
Command
– Use the gpresult command to pull a list of all the
groups a user belongs to
– Information can be helpful when troubleshooting user
group issues or Group Policy problems
– Enter the command gpresult/scope user/user
username /r to retrieve information on a user other
than the one signed in
A+ Guide to IT Technical Support, 9th Edition 32
© Cengage Learning 2017
How to Share Folders and Files
• How to Use Share Permission
– For NTFS volume, use NTFS permission whenever
possible
A+ Guide to IT Technical Support, 9th Edition 33
Figure 17-45 Use the
sharing tab of a folder
properties box to set up
share permissions on a
FAT volume
© Cengage Learning 2017
Support and Troubleshoot Shared
Folders and Files
• Few tips about managing shared folders and files:
– Use advanced permissions settings if you need
further control of a user or group
• Click Advanced on the Security tab of a folder’s
Properties box
– Manage permissions using parent folder
• Subfolders inherit permissions of the parent folder
– Check the effective permissions
• To know for sure which permissions are in effect, see
Effective Permissions tab of Advanced Security
Settings box
A+ Guide to IT Technical Support, 9th Edition 34
© Cengage Learning 2017
Support and Troubleshoot Shared
Folders and Files
• Few tips about managing shared folders and files:
(cont’d)
– Take ownership of a folder
• Owner of a folder always has full permissions
– Use only one workgroup
• Performance improves when they are all in the same
workgroup
– Require passwords for all user accounts
– Use a mapped network drive
A+ Guide to IT Technical Support, 9th Edition 35
© Cengage Learning 2017
Support and Troubleshoot Shared
Folders and Files
A+ Guide to IT Technical Support, 9th Edition 36
Figure 17-50 Change the owner of a folder
© Cengage Learning 2017
How to Map a Network Drive or
Network Printer
• A network share is one of the most powerful and
versatile methods of communicating over a network
– Makes one computer (the client) appear to have a
new hard drive, such a drive E, that is really hard
drive space on another host computer
– Called mapping a drive
• Network File System (NFS) makes it possible for
files on the network to be accessed as easily as if
they are stored on the local computer
A+ Guide to IT Technical Support, 9th Edition 37
© Cengage Learning 2017
Hidden Network Resources and
Administrative Shares
• To protect confidential data from users on the
network:
– Disable File and Printer Sharing
– Hide a shared folder
• If you want to share a folder, but don’t want others to
see it add a $ to the end of the folder name
• Those that want to access the hidden folder must enter
the complete path to the folder (including $) in search
box
A+ Guide to IT Technical Support, 9th Edition 38
© Cengage Learning 2017
Hidden Network Resources and
Administrative Shares
A+ Guide to IT Technical Support, 9th Edition 39
Figure 17-54 (a) A $ on the share name hides the share unless the exact name is used to locate it;
(b) access a hidden, shared folder on the network by searching for its exact name
© Cengage Learning 2017
Hidden Network Resources and
Administrative Shares
• Local shares: folders and files on a computer that
are shared with others using local user accounts
• Administrative shares: folders that are shared by
default that administrator accounts at the domain
level can access
– Two types of administrative shares:
• The %systemroot% folder
• Any volume or drive
• Don’t share the /Windows folder or an entire drive
– Don’t want system files and folders exposed
A+ Guide to IT Technical Support, 9th Edition 40
© Cengage Learning 2017
Cloud Computing
• Cloud computing – when a third-party service or
vendor makes computer resources available to its
customers over the Internet
• Can provide many other types of resources:
– Applications
– Network services
– Websites
– Database servers
– Specialized developer applications
– Entire operating systems
A+ Guide to IT Technical Support, 9th Edition 41
© Cengage Learning 2017
Cloud Computing
• All cloud computing service models incorporate the
following elements:
– Service at any time
– Elastic services and storage
– Support for multiple client platforms
– Resource pooling and consolidation
– Measured service
A+ Guide to IT Technical Support, 9th Edition 42
© Cengage Learning 2017
Cloud Computing Categories
• Cloud computing service models are categorized by
the types of services they provide:
– IaaS (Infrastructure as a Service) – customer rents
hardware, including servers, storage, and networking
– PaaS (Platform as a Service) – customer rents
hardware, operating systems, and some applications
that might support other applications installed
– SaaS (Software as a Service) – customers rent
hardware, operating systems, and applications
specific to the customer’s needs
• Applications are provided through an online user
interface
A+ Guide to IT Technical Support, 9th Edition 43
© Cengage Learning 2017
Cloud Computing Categories
• Cloud computing service models are categorized by
the types of services they provide (cont’d):
– XaaS (Anything as a Service or Everything as a
Service) – the “X” represents an unknown
• Cloud can provide any combination of functions
• Another SaaS implementation that doesn’t fit the
official definition of SaaS is rentable software or
software by subscription
– Many companies are moving toward this
subscription model
A+ Guide to IT Technical Support, 9th Edition 44
© Cengage Learning 2017
Cloud Computing Categories
A+ Guide to IT Technical Support, 9th Edition 45
Figure 17-57 At each progressive level, the vendor takes over more computing responsibility for the customer
© Cengage Learning 2017
Deployment Models for Cloud
Computing
• Cloud computing deployment models:
– Public cloud – services are provided over the
Internet to the general public
– Private cloud – services are established on an
organization’s own servers
• Or established virtually for a single organization’s
private use
– Community cloud – services are shared between
multiple organizations, but not available publicly
– Hybrid cloud – a combination of public, private, and
community clouds used by same organization
A+ Guide to IT Technical Support, 9th Edition 46
© Cengage Learning 2017
Chapter Summary
• A client computer contacts a server to request
information or to perform a task
• The Internet Options dialog box is used to manage
many Internet Explorer settings
• Remote Desktop gives you access to your Windows
desktop from anywhere on the Internet
• A policy can be set using Group Policy to improve
Quality of Service (QoS) for an application
• Open Database Connectivity (OBDC) can create a
data source, which provides a remote database and
its drivers to a client computer
A+ Guide to IT Technical Support, 9th Edition 47
© Cengage Learning 2017
Chapter Summary
• Controlling access to folders and files on a network
is done by assigning rights to user accounts and
assigning permissions to files and folders
• Apply the principle of least privilege when assigning
rights to users
• Customized user groups that you create make it
easier to manage rights to multiple user accounts
• Three ways to share files and folders on the network
are to use homegroup sharing, workgroup sharing,
and domain controllers
A+ Guide to IT Technical Support, 9th Edition 48
© Cengage Learning 2017
Chapter Summary
• A mapped network drive makes it easier for users to
access drives and folders on the network
• Peer-to-peer networks use local shares, and a
Windows domain supports administrative shares
• Cloud computing is providing computing resources
over the Internet to customers
• Cloud computing service models, including IaaS,
PaaS, SaaS, and XaaS, are categorized by the
types of services they provide
A+ Guide to IT Technical Support, 9th Edition 49
© Cengage Learning 2017
Chapter Summary
• A public cloud service is available to the public, and
a private cloud service is kept on an organization’s
own servers or made available by a vendor only for
a single organization’s private use
A+ Guide to IT Technical Support, 9th Edition 50

More Related Content

PPTX
ppt ch10
PPTX
ppt ch18
PPTX
ppt ch15
PPTX
ppt ch13
PPTX
A+ Chapter 4 Review
PPTX
A+ Chapter 3 Review
PPT
ITE v5.0 - Chapter 5
ppt ch10
ppt ch18
ppt ch15
ppt ch13
A+ Chapter 4 Review
A+ Chapter 3 Review
ITE v5.0 - Chapter 5

What's hot (19)

PDF
Symantec Backup Exec 15 Administrator's Guide
PPT
ITE v5.0 - Chapter 4
PPT
ITE v5.0 - Chapter 3
PPT
It essentials pc hardware and software overview
PPTX
System Administration DCU
PPTX
The Cost of Managing IBM i Without Automation
PPT
ITE v5.0 - Chapter 9
PDF
Backup Exec 15: Designing Protection for the Future, Today
PPTX
introduction to system administration
PDF
Owny IT Desktop Monitoring Featurelist
PPT
Ite v5.0 chapter4
PPT
ITE v5.0 - Chapter 1
PPT
W982 05092004
DOC
Resume
DOC
IT system and network administrator
PPT
Computer system administrator
PPTX
Ict 9 module 3, lesson 2.5 basic computer configuration setup
PDF
What's New in Security for IBM i?
Symantec Backup Exec 15 Administrator's Guide
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 3
It essentials pc hardware and software overview
System Administration DCU
The Cost of Managing IBM i Without Automation
ITE v5.0 - Chapter 9
Backup Exec 15: Designing Protection for the Future, Today
introduction to system administration
Owny IT Desktop Monitoring Featurelist
Ite v5.0 chapter4
ITE v5.0 - Chapter 1
W982 05092004
Resume
IT system and network administrator
Computer system administrator
Ict 9 module 3, lesson 2.5 basic computer configuration setup
What's New in Security for IBM i?
Ad

Similar to ppt ch17 (20)

PPTX
ppt ch11
PPTX
ppt ch07
PDF
Careers in it
PDF
Mac OS X Server User Managment 1st edition by Apple Inc
PPTX
Technology
PDF
Internet Explorer 8
PPT
Network Administrator Career
PPTX
Ge powerpoint presentation group 4!
PPTX
ppt ch08
PPTX
HELP DESK interview questions and answers
PDF
How To Up-Skill in IT
PPTX
IT Career Development - An Introduction into the Industry
PDF
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
PPTX
IT Skills in Demand 2012 - 2013 | Top Computer Jobs & Career Tracks
DOCX
Jason segale resume
PPTX
IT ppt.pptx
PDF
Hp man sm9.30_application_patch_mgr_pdf
PPTX
Accidental Techie 11 16-2010
PDF
COC L1-4 sample.pdf
PDF
Network Security Expert Professional (002)
ppt ch11
ppt ch07
Careers in it
Mac OS X Server User Managment 1st edition by Apple Inc
Technology
Internet Explorer 8
Network Administrator Career
Ge powerpoint presentation group 4!
ppt ch08
HELP DESK interview questions and answers
How To Up-Skill in IT
IT Career Development - An Introduction into the Industry
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environment
IT Skills in Demand 2012 - 2013 | Top Computer Jobs & Career Tracks
Jason segale resume
IT ppt.pptx
Hp man sm9.30_application_patch_mgr_pdf
Accidental Techie 11 16-2010
COC L1-4 sample.pdf
Network Security Expert Professional (002)
Ad

More from sadejoseph (8)

PPTX
ppt ch16
PPTX
PPTX
Ex13 lesson04
PPTX
Ex13 lesson03
PPTX
Ex13 lesson02
PPTX
Ex13 lesson01
PPTX
OCP Booklet June 2015
PPTX
Ocp Booklet June 2015
ppt ch16
Ex13 lesson04
Ex13 lesson03
Ex13 lesson02
Ex13 lesson01
OCP Booklet June 2015
Ocp Booklet June 2015

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Spectroscopy.pptx food analysis technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectroscopy.pptx food analysis technology
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx

ppt ch17

  • 1. A+ Guide to IT Technical Support, 9th Edition Chapter 17 Windows Resources on a Network
  • 2. © Cengage Learning 2017 A+ Guide to IT Technical Support, 9th Edition Objectives • Support some client-server applications • Share and secure files and folders on a network • Support cloud computing services on a network 2
  • 3. © Cengage Learning 2017 Supporting Client/Server Applications • Client/Server applications expected to support: – Internet Explorer – Remote Desktop – Other remote applications • Also need to know how to use Group Policy to configure Quality of Service (QoS) – Also how to link a data source through a network to database applications A+ Guide to IT Technical Support, 9th Edition 3
  • 4. © Cengage Learning 2017 Network Servers • List of popular client-server resources: – Mail server – File server – Print server – DHCP server – DNS server – Proxy server – Authentication server – Web server A+ Guide to IT Technical Support, 9th Edition 4
  • 5. © Cengage Learning 2017 Internet Explorer • Most popular client/server applications are a browser and web server • Internet Explorer (IE) version 11: latest version at this writing – Windows 10 features new Microsoft Edge browser • Easy to upgrade by using Windows Update • Tips when using IE window: – To show the menu bar, press the Alt key – HTTP Secure – look for https and a padlock icon – If you have problems with IE11, you can disable it A+ Guide to IT Technical Support, 9th Edition 5
  • 6. © Cengage Learning 2017 Internet Explorer • Use the Internet Options box to manage IE settings – Click Tools icon and click Internet Options • Internet Options box has several tabs with different configuration options and settings • General Tab – Change the home page or add a second home page – Protect your identity and surfing records – Check Delete browsing history on exit if you want your history cleared each time you close IE – Manage IE cache A+ Guide to IT Technical Support, 9th Edition 6
  • 7. © Cengage Learning 2017 Internet Explorer • Security Tab – Set security level (medium-high is the default level) • Prompts before downloading content • Does not download ActiveX controls that are not signed by Microsoft (virus can sometimes hide in an ActiveX control) – To customize security settings, click Custom level A+ Guide to IT Technical Support, 9th Edition 7
  • 8. © Cengage Learning 2017 Internet Explorer • Privacy Tab and Content Tab – Use Privacy Tab to block cookies that might invade your privacy or steal identity – Content tab contains settings for Family Safety, certificates used by web sites, and how AutoComplete and Feeds are handled A+ Guide to IT Technical Support, 9th Edition 8
  • 9. © Cengage Learning 2017 Internet Explorer • Connections Tab and Proxy Settings – Allows you to configure proxy server settings and create a VPN connection • Proxy server: intercepts requests that a browser makes of a server and serves up request from a cache it maintains A+ Guide to IT Technical Support, 9th Edition 9 Figure 17-8 Enter the IP address of all proxy servers on your corporate network
  • 10. © Cengage Learning 2017 Internet Explorer • Programs Tab – Used to manage add- ons (plug-ins) • Add-ons: small apps that help IE display multimedia content, manage email, translate text, or other actions A+ Guide to IT Technical Support, 9th Edition 10 Figure 17-9 Use the Programs Tab to manage add-ons and default applications used for Internet services
  • 11. © Cengage Learning 2017 Internet Explorer • Advanced Tab – Contains several miscellaneous settings used to control Internet Explorer – One setting is useful when IE is giving problems • If you suspect problems are caused by wrong settings, click Reset to return IE to all default settings A+ Guide to IT Technical Support, 9th Edition 11
  • 12. © Cengage Learning 2017 Remote Desktop Connection (RDC) • Remote Desktop gives a user access to a Windows desktop from anywhere on the Internet • To use Remote Desktop, the computer you want to remotely access (the server) must be running business or professional editions of Windows 8/7/Vista – Computer accessing can be running any version of Windows • Computers set to serve up Remote Desktop are not as secure – You can use software that does not require opening ports for a more secure solution A+ Guide to IT Technical Support, 9th Edition 12
  • 13. © Cengage Learning 2017 Remote Assistance • Remote Assistance – a user on the server computer can remain signed in during the remote session, retains control of the session, and can see the screen – Helpful when troubleshooting problems – User who needs help send an invitation by email or chat to connect to their computer using Remote Assistance A+ Guide to IT Technical Support, 9th Edition 13
  • 14. © Cengage Learning 2017 Remote Assistance • Ways to initiate a Remote Assistance session: – User saves an invitation file and send file to technician – User can send an automated email through the Remote Assistance app – User can use Easy Connect, which is the easiest method to start Remote Assistance connection • Both computers must support Easy Connect – Technician can initiate a session • Follow steps outlined in text to see how to initiate a Remote Assistance connection using Easy Connect A+ Guide to IT Technical Support, 9th Edition 14
  • 15. © Cengage Learning 2017 Remote Assistance • Things you can do during a Remote Assistance session: – Chat – Request control – Pause – Disconnect or Stop sharing – Log activity in a log file – Change expiration of invitations A+ Guide to IT Technical Support, 9th Edition 15
  • 16. © Cengage Learning 2017 Remote Assistance • If you have problems making the connection: – Windows Firewall on the user’s computer might be blocking Remote Assistance • Verify Remote Assistance is checked as an exception to blocked apps in Windows Firewall window – If outside the user’s local network, the hardware firewall protecting her network might be blocking Remote Assistance • Verify that port forwarding is enabled for Remote Assistance A+ Guide to IT Technical Support, 9th Edition 16
  • 17. © Cengage Learning 2017 Use Group Policy to Improve QoS Applications • Group Policy (gpedit.msc) – Used to control what users can do and how the system can be used – Only available in Windows professional and business editions – Works by: • Making entries in registry • Applying scripts to Windows startup, shutdown, and logon processes • Affecting security settings A+ Guide to IT Technical Support, 9th Edition 17
  • 18. © Cengage Learning 2017 Use Group Policy to Improve QoS Applications • Group Policy (cont’d) – Can be applied to computer or user • Computer policies are applied just before logon screen • User policies are applied after login – To use Group Policy to set the QoS level for an application follow steps outlined in the text – To get the most out of QoS, configure each router and computer on the network to use QoS A+ Guide to IT Technical Support, 9th Edition 18
  • 19. © Cengage Learning 2017 Use Group Policy to Improve QoS Applications • Important options when creating a policy: – Priority level is determined by a DSCP (Differentiated Service Code Point) value – Outbound traffic can be throttled to limit the bandwidth assigned an application – The policy can apply to all applications or a specific program – You can specify the source IP address and/or destination IP address – You can select the protocol (TCP or UDP) and port numbers for the policy A+ Guide to IT Technical Support, 9th Edition 19
  • 20. © Cengage Learning 2017 ODBC Data Sources • Open Database Connectivity (ODBC) – technology used to create the data source – Which provides access to the database and includes the drivers required to interface between Access and the data – Drivers for Microsoft SQL Server must be installed on the local computer – Use the ODBC Data Sources tool in the Administrative Tools group of Control Panel to configure the data source A+ Guide to IT Technical Support, 9th Edition 20
  • 21. © Cengage Learning 2017 Controlling Access to Folders and Files • Managing shared resources is accomplished by: – Assigning rights to user accounts – Assigning permissions to folders and files A+ Guide to IT Technical Support, 9th Edition 21
  • 22. © Cengage Learning 2017 Classify User Accounts and User Groups • Principle of least privilege: An approach where computer users are assigned the minimum rights required to do their job • Rights or privileges are established when you first create a user account (based on account type) – Rights can later be changed by changing the user groups to which the account belongs • User accounts are created from the Control Panel or by using the Computer Management console A+ Guide to IT Technical Support, 9th Edition 22
  • 23. © Cengage Learning 2017 Classify User Accounts and User Groups • Type of User Account – Administrator account: has complete access to the system and can make changes that affect the security of the system and other users – Standard user account: can use software and hardware and make some system changes but cannot make changes that affect the security of the system or other users A+ Guide to IT Technical Support, 9th Edition 23
  • 24. © Cengage Learning 2017 Classify User Accounts and User Groups A+ Guide to IT Technical Support, 9th Edition 24 Figure 17-29 Create a new user
  • 25. © Cengage Learning 2017 Classify User Accounts and User Groups • Built-in User Groups – Administrators and Users groups – Guests group • Has limited rights and is given a temporary profile that is deleted when user logs off – Backup Operators group • Can back up and restore files on the system regardless of its access permission to files – Power Users group • Windows XP group that can read from and write to parts of the system, install apps, and perform limited administrator tasks A+ Guide to IT Technical Support, 9th Edition 25
  • 26. © Cengage Learning 2017 Classify User Accounts and User Groups • Windows might automatically assign one of these built-in user groups to an account: – Authenticated Users group: includes all user accounts except the Guest account – Everyone group: includes the Authenticated Users group as well as the Guest account – Anonymous users: users who have not been authenticated on a remote computer A+ Guide to IT Technical Support, 9th Edition 26
  • 27. © Cengage Learning 2017 Classify User Accounts and User Groups • Customized User Groups – Use Management Console in business and professional editions of Windows to create custom user groups – Easier to assign permissions to user groups rather than to individual accounts • User groups work well when several users need the same permissions • Create a user group and then assign permission to the user group A+ Guide to IT Technical Support, 9th Edition 27
  • 28. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Three general strategies for managing shared folder and files in Windows – Homegroup sharing: use when all users on a network require the same access to all resources – Workgroup sharing: offers better security than a homegroup – Domain controlling: if computer belongs to a domain, all security is managed by the network administrator for the entire network A+ Guide to IT Technical Support, 9th Edition 28
  • 29. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Tips on which folder to use to hold shared data: – Private data for individual users • C:Users folder for that user – Data for all users to share • C:UsersPublic folder – For best security, create a folder not in either of the above folders and assign permissions to that folder and its subfolders • Allow all users access or only certain users or user groups A+ Guide to IT Technical Support, 9th Edition 29
  • 30. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Using workgroup sharing, Windows offers two methods to share a folder – Share permissions: grant permissions only to network users and not to local users • Apply to a folder and its contents, not to individual files – NTFS permissions: apply to local users and network users • Apply to both folders and individual files • Work on NTFS volumes only A+ Guide to IT Technical Support, 9th Edition 30
  • 31. © Cengage Learning 2017 Methods to Assign Permissions To Folders and Files • Tips when implementing permissions: – If both share and NTFS permission are used, the most restrictive permission applies – If NTFS permissions are conflicting the more liberal permission applies – Permission propagation: when permissions are passed from parent to child – Inherited permissions: permissions attained from a parent object – When you move or copy an object to a folder, the object takes on permissions of that folder A+ Guide to IT Technical Support, 9th Edition 31
  • 32. © Cengage Learning 2017 How to Share Folders and Files • User and Group Information with the gpresult Command – Use the gpresult command to pull a list of all the groups a user belongs to – Information can be helpful when troubleshooting user group issues or Group Policy problems – Enter the command gpresult/scope user/user username /r to retrieve information on a user other than the one signed in A+ Guide to IT Technical Support, 9th Edition 32
  • 33. © Cengage Learning 2017 How to Share Folders and Files • How to Use Share Permission – For NTFS volume, use NTFS permission whenever possible A+ Guide to IT Technical Support, 9th Edition 33 Figure 17-45 Use the sharing tab of a folder properties box to set up share permissions on a FAT volume
  • 34. © Cengage Learning 2017 Support and Troubleshoot Shared Folders and Files • Few tips about managing shared folders and files: – Use advanced permissions settings if you need further control of a user or group • Click Advanced on the Security tab of a folder’s Properties box – Manage permissions using parent folder • Subfolders inherit permissions of the parent folder – Check the effective permissions • To know for sure which permissions are in effect, see Effective Permissions tab of Advanced Security Settings box A+ Guide to IT Technical Support, 9th Edition 34
  • 35. © Cengage Learning 2017 Support and Troubleshoot Shared Folders and Files • Few tips about managing shared folders and files: (cont’d) – Take ownership of a folder • Owner of a folder always has full permissions – Use only one workgroup • Performance improves when they are all in the same workgroup – Require passwords for all user accounts – Use a mapped network drive A+ Guide to IT Technical Support, 9th Edition 35
  • 36. © Cengage Learning 2017 Support and Troubleshoot Shared Folders and Files A+ Guide to IT Technical Support, 9th Edition 36 Figure 17-50 Change the owner of a folder
  • 37. © Cengage Learning 2017 How to Map a Network Drive or Network Printer • A network share is one of the most powerful and versatile methods of communicating over a network – Makes one computer (the client) appear to have a new hard drive, such a drive E, that is really hard drive space on another host computer – Called mapping a drive • Network File System (NFS) makes it possible for files on the network to be accessed as easily as if they are stored on the local computer A+ Guide to IT Technical Support, 9th Edition 37
  • 38. © Cengage Learning 2017 Hidden Network Resources and Administrative Shares • To protect confidential data from users on the network: – Disable File and Printer Sharing – Hide a shared folder • If you want to share a folder, but don’t want others to see it add a $ to the end of the folder name • Those that want to access the hidden folder must enter the complete path to the folder (including $) in search box A+ Guide to IT Technical Support, 9th Edition 38
  • 39. © Cengage Learning 2017 Hidden Network Resources and Administrative Shares A+ Guide to IT Technical Support, 9th Edition 39 Figure 17-54 (a) A $ on the share name hides the share unless the exact name is used to locate it; (b) access a hidden, shared folder on the network by searching for its exact name
  • 40. © Cengage Learning 2017 Hidden Network Resources and Administrative Shares • Local shares: folders and files on a computer that are shared with others using local user accounts • Administrative shares: folders that are shared by default that administrator accounts at the domain level can access – Two types of administrative shares: • The %systemroot% folder • Any volume or drive • Don’t share the /Windows folder or an entire drive – Don’t want system files and folders exposed A+ Guide to IT Technical Support, 9th Edition 40
  • 41. © Cengage Learning 2017 Cloud Computing • Cloud computing – when a third-party service or vendor makes computer resources available to its customers over the Internet • Can provide many other types of resources: – Applications – Network services – Websites – Database servers – Specialized developer applications – Entire operating systems A+ Guide to IT Technical Support, 9th Edition 41
  • 42. © Cengage Learning 2017 Cloud Computing • All cloud computing service models incorporate the following elements: – Service at any time – Elastic services and storage – Support for multiple client platforms – Resource pooling and consolidation – Measured service A+ Guide to IT Technical Support, 9th Edition 42
  • 43. © Cengage Learning 2017 Cloud Computing Categories • Cloud computing service models are categorized by the types of services they provide: – IaaS (Infrastructure as a Service) – customer rents hardware, including servers, storage, and networking – PaaS (Platform as a Service) – customer rents hardware, operating systems, and some applications that might support other applications installed – SaaS (Software as a Service) – customers rent hardware, operating systems, and applications specific to the customer’s needs • Applications are provided through an online user interface A+ Guide to IT Technical Support, 9th Edition 43
  • 44. © Cengage Learning 2017 Cloud Computing Categories • Cloud computing service models are categorized by the types of services they provide (cont’d): – XaaS (Anything as a Service or Everything as a Service) – the “X” represents an unknown • Cloud can provide any combination of functions • Another SaaS implementation that doesn’t fit the official definition of SaaS is rentable software or software by subscription – Many companies are moving toward this subscription model A+ Guide to IT Technical Support, 9th Edition 44
  • 45. © Cengage Learning 2017 Cloud Computing Categories A+ Guide to IT Technical Support, 9th Edition 45 Figure 17-57 At each progressive level, the vendor takes over more computing responsibility for the customer
  • 46. © Cengage Learning 2017 Deployment Models for Cloud Computing • Cloud computing deployment models: – Public cloud – services are provided over the Internet to the general public – Private cloud – services are established on an organization’s own servers • Or established virtually for a single organization’s private use – Community cloud – services are shared between multiple organizations, but not available publicly – Hybrid cloud – a combination of public, private, and community clouds used by same organization A+ Guide to IT Technical Support, 9th Edition 46
  • 47. © Cengage Learning 2017 Chapter Summary • A client computer contacts a server to request information or to perform a task • The Internet Options dialog box is used to manage many Internet Explorer settings • Remote Desktop gives you access to your Windows desktop from anywhere on the Internet • A policy can be set using Group Policy to improve Quality of Service (QoS) for an application • Open Database Connectivity (OBDC) can create a data source, which provides a remote database and its drivers to a client computer A+ Guide to IT Technical Support, 9th Edition 47
  • 48. © Cengage Learning 2017 Chapter Summary • Controlling access to folders and files on a network is done by assigning rights to user accounts and assigning permissions to files and folders • Apply the principle of least privilege when assigning rights to users • Customized user groups that you create make it easier to manage rights to multiple user accounts • Three ways to share files and folders on the network are to use homegroup sharing, workgroup sharing, and domain controllers A+ Guide to IT Technical Support, 9th Edition 48
  • 49. © Cengage Learning 2017 Chapter Summary • A mapped network drive makes it easier for users to access drives and folders on the network • Peer-to-peer networks use local shares, and a Windows domain supports administrative shares • Cloud computing is providing computing resources over the Internet to customers • Cloud computing service models, including IaaS, PaaS, SaaS, and XaaS, are categorized by the types of services they provide A+ Guide to IT Technical Support, 9th Edition 49
  • 50. © Cengage Learning 2017 Chapter Summary • A public cloud service is available to the public, and a private cloud service is kept on an organization’s own servers or made available by a vendor only for a single organization’s private use A+ Guide to IT Technical Support, 9th Edition 50