Module 8 : Configuration II Jong S. Bok

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Two Downloading and Installing Software.
Advertisements

Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
1 Anti Virus System i-Specific Anti-Virus Product.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Michael Donovan, River Campus Libraries – 12/03 DocuShare Overview and Training.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Maintaining and Updating Windows Server 2008
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Definitions Collaboration – working together on team projects and sharing information, often through ad-hoc processes, to accomplish project goals. Document.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
CONTENTS:-  What is Event Log Service ?  Types of event logs and their purpose.  How and when the Event Log is useful?  What is Event Viewer?  Briefing.
Deploying and Managing Software by Using Group Policy.
Microsoft ® Official Course Module 9 Configuring Applications.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Cyber Patriot Training
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Module 13: Configuring Availability of Network Resources and Content.
Module 11 : Backup and Restore Jong S. Bok
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Session 10 Windows Platform Eng. Dina Alkhoudari.
Tutorial 10 Adding Spry Elements and Database Functionality Dreamweaver CS3 Tutorial 101.
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
Module 13: Maintaining Software by Using Windows Server Update Services.
Creating Multimedia Interaction with Windows Media Technologies 7.
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Course ILT Printer and virus management Unit objectives Perform various printing tasks, including installing printer drivers, printing documents, monitoring.
Module 4 : Installation Jong S. Bok
What’s new in Kentico CMS 5.0 Michal Neuwirth Product Manager Kentico Software.
Module 5: Configuring Internet Explorer and Supporting Applications.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Module 7 : Configuration I Jong S. Bok
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
May 7, We manage documents and their changes with versioning and check out/check in procedures.
NT4 SP4 Security Jack Schmidt - Fermilab
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Module 6: Deploying and Managing Software by Using Group Policy.
Lec4 (Practical) Computer Security-Safe Use Windows Vista Parental Settings.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Search Overview Search Features: WSS and Office Search Architecture Content Sources and.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Legal Issues Legal issues include copyright / intellectual property infringements, libel / defamation, disability discrimination and data protection. Any.
Vinay Paul. CONTENTS:- What is Event Log Service ? Types of event logs and their purpose. How and when the Event Log is useful? What is Event Viewer?
Microsoft FrontPage 2003 Illustrated Complete Integrating a Database with a Web Site.
Module 5 : Security I Jong S. Bok
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
NetTech Solutions Protecting the Computer Lesson 10.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Administration - I Jong S. Bok
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
Windows Administration How to protect your computer.
Add/Remove/Update a list column All columns including lookup and calculated columns, in addition to many types of updates, such as a type change or.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
Maintaining and Updating Windows Server 2008 Lesson 8.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
ConfigMgr Discovering and Organizing Resources Mariusz Zarzycki, Phd, MCT, MCTS, MCITP, MCSE, MCSA.....
Managing Windows Security
Microsoft FrontPage 2003 Illustrated Complete
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
RMS with Microsoft SharePoint
What Is Sharepoint? Mohsen Ashkboos
Configuring Internet-related services
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Module 8 : Configuration II Jong S. Bok

Contents Configuring Regional Settings Configuring Usage Analysis Configuring Antivirus Protection Configuring Blocked File Extensions

Demo: Configuring Regional Settings

Contents Configuring Regional Settings Configuring Usage Analysis Configuring Antivirus Protection Configuring Blocked File Extensions

Configuring Usage Analysis Allow you to track how Web sites on your server are being used. Whether or not to log usage data. –By default, is not enabled. –Log files are created daily to track usage information. Where the log files are stored and how many log files to create. –By default, the log files are in C:\Windows\system32\LogFiles\STS. –Can specify that up to 30 log files are created. –Must be sure to give the STS_WPG user group Read, Write and Update permissions to the directory.

Configuring Usage Analysis (Cont.) Whether or not to process the usage logs and when to do so. –By default, the log files are set to be processed every day at 1:00 A.M. –Usage analysis data is gathered from the front-end Web servers and collected into temporary files. –When the daily log processing takes place, the data is merged into the content databases on the back-end servers. –Usage data is kept for up to three months in the database for historical purpose. –Daily information is stored for 31 days and monthly information for 24 months.

Demo: Configure usage analysis processing for a server

Contents Configuring Regional Settings Configuring Usage Analysis Configuring Antivirus Protection Configuring Blocked File Extensions

Configuring Antivirus Protection Allow you to help protect your users from uploading or downloading files that contain viruses. When you enable the antivirus protection feature, files are checked for viruses when a user adds a document to a document library or list, or when a user views a document in a document library or list. If a virus is found, the scanner attempts to clean the file, or if the file cannot be cleaned, blocks the file from being added or viewed. If a file is uploaded, and is later identified as containing a virus, users will not be able to open the file. Users may still be able to save the file locally and open it from their computer. Must install WSS-compatible antivirus software.

Demo: Enable antivirus protection for your server or server farm

Contents Configuring Regional Settings Configuring Usage Analysis Configuring Antivirus Protection Configuring Blocked File Extensions

Provides the ability to restrict certain kinds of files from being uploaded or retrieved, based on the file extensions. Does not prevent all exploits based on file types, nor is it designed to do so. By default, several standard file extensions are blocked, including any file extensions that are treated as executable files by Windows Explorer. Can block additional file extensions (up to 1024 file types) by adding them.

Demo: Add or remove a file type from the list of blocked file extensions