Download presentation
Presentation is loading. Please wait.
1
Chapter 9 Chapter 9: Managing Server Folders, Permissions, and Software Installation
2
Chapter 9 Learning Objectives n Manage folders on a server, including: u Planning a folder structure u Viewing and creating folders u Setting folder properties such as attributes, permissions, auditing, and ownership u Setting up shared folders u Moving and copying files and folders n Install and manage application software continued
3
Chapter 9 Learning Objectives n Use the Registry to configure Windows NT Server and application software, and use Windows NT Diagnostics to view Registry contents n Set system policies using the System Policy Editor n Configure and use License Manager n Configure and use Directory Replicator
4
Chapter 9 Managing Folders n Designing a folder structure n Viewing and creating folders n Setting folder properties n Setting up a shared folder n Troubleshooting a security conflict n Moving and copying files and folders
5
Chapter 9 Designing a Folder Structure n A chaotic file structure makes it difficult to run or remove programs n Avoid confusion by having a place for: u Software applications u Confidential files shared by certain groups u Public files shared by everyone u Software utilities for all users u Server management utilities
6
Chapter 9 Folder Structure Design Considerations n Root folder should not be cluttered with files or too many folders n Each software application should have its own folder or subfolder n Similar information should be grouped n Folders should have names that clearly reflect their purpose
7
Chapter 9 A Sample Folder Structure Folders off the Root UsersDataWord Forms Manage Ntserver ContractsCourt Wills Tax Bankruptcy RealEstate Msoffice Winnt (created by NT Server setup) Access Clipart Excel Office Queries Templates Winword
8
Chapter 9 Viewing and Creating Folders n Viewing u Use My Computer or Windows NT Explorer u Display can be customized u or, the good ol’ command-line interface F “dir” command, or similar add-ons n Creating u Use My Computer or Windows NT Explorer u or, CLI
9
Chapter 9 Setting Folder Properties n General properties n Folder and permission security n Permissions n Auditing n Ownership
10
Chapter 9 General Properties n Descriptive information u Location u Size u Number of files/folders n Folder name and creation date n Folder attributes
11
Chapter 9 Attributes n A characteristic associated with a folder or file, used to help mange access and backups n Largely ignored by NT administrators (except for backup purposes) in favor of rights and permissions
12
Chapter 9 Windows NT Attributes
13
Chapter 9 Folder and Permission Security n Three security options u Permissions: Control access to the folder and its contents u Auditing: Enables administrator to audit activities on a folder or file u Ownership: Designates the folder owner who has full control of that folder
14
Chapter 9 NTFS Folder and File Permissions
15
Chapter 9 Directory Permissions Dialog Box Note: would usually have >1 group/username under “Name”.
16
Chapter 9 Microsoft Guidelines for Setting Permissions n Protect the Winnt folder that contains operating system files from general users (No Access or Read) but give Administrators Full Control access n Protect server utility folders with access permissions only for Administrators, and Server and Backup Operators continued
17
Chapter 9 Microsoft Guidelines for Setting Permissions n Protect software application folders with Add & Read n Create publicly used folders with Change access n Provide users Full Control of their own home directories n Remove the group Everyone from confidential folders
18
Chapter 9 Special Folder and Special File Access Options n Enable customization of folders or file access beyond standard permissions u different combinations of the aforementioned abilities F R, W, X, D, C, “take owner” u useful for special situations, if need be
19
Chapter 9 Auditing n Tracks access to folders and files n Directory Auditing dialog box enables auditing of a variety of successful and failed events F track success/fail, whichever is more important for that particular case F remember, auditing can be expensive -- that is, can dramatically affect server performance
20
Chapter 9 Ownership n Folder owners have Full Control permissions for the folders they create Taking ownership of a folder
21
Chapter 9 Setting Up a Shared Folder n Share permissions u No Access u Read u Change u Full Control n Can be overridden u NT uses most restrictive permission, whichever is stricter
22
Chapter 9 Setting Up a Shared Folder n Sharing can be limited by #users u software licensing u also provides some “extra” security n Shares can be hidden u put $ character at end of share name u both for security through obscurity as well as ease-of-use
23
Chapter 9 Troubleshooting a Security Conflict n Review folder permissions and share permissions for the account and for the groups to which the account user belongs n Careful planning of folder structure and user groups in light of server security needs saves time and user aggravation
24
Chapter 9 Moving and Copying Files and Folders n Creating, moving, or copying a file can affect the file and folder permissions u Moving: File is deleted from the original location placed in a different folder u Copying: Original file remains intact and a copy is made in another folder n New file permissions depend on F copy/create - inherit from folder F move - retain existing F unless move to different volume - like copy
25
Chapter 9 Installing and Managing Application Software n Software licensing n Network compatibility n Network performance n Location of temporary files n Software testing n Loading software from the network n Restrictions for MS-DOS-based software
26
Chapter 9 Software Licensing n Read and follow licensing agreement before loading software n Copy protect the software F user education important n License monitoring: A process used to ensure that the number of software licenses in use does not exceed the number for which the network is authorized
27
Chapter 9 Network Compatibility n Check all applications to be certain they are network-compatible, i.e., designed for multiuser access, often with network capabilities such as options to send files through e-mail u with popularity of the Internet, new applications generally are network-friendly u but remember, Internet features can be a security hole
28
Chapter 9 Network Performance n Closely monitor network activity and traffic associated with software applications u some applications have BIG effect on network traffic u remember, software is one consideration when choosing topology
29
Chapter 9 Location of Temporary Files n Determine what extra files are needed to run an application and where to store them n Teach software users how to deploy temporary and backup files created by software, and how to delete them when no longer needed F utilities exist to clean up files automatically
30
Chapter 9 Software Testing n Test each software installation before releasing it to users n An important way to determine that the software is working, is network compatible, and that the permissions are correctly set
31
Chapter 9 Loading Software from the Network n One option: Install software application files from network onto each client workstation n Another option: Install client software so that application files are loaded from server u Advantage: Save workstation disk space u Advantage: Ease of management u Disadvantage: Extra network traffic
32
Chapter 9 Installing Software Using Add/Remove Programs n Software configuration is stored in Windows NT Registry; configuration is easier and configuration information can be updated to an ERD n Registry tracks location of all files associated with software; easier to remove all program pieces
33
Chapter 9 Running Software Applications in User Mode n User mode u Used for running programs in a memory area kept separate from that used by the kernel u The program cannot directly access the kernel or operating system services except through an API n Kernel mode u Privileged environment in which Windows NT operating system kernel runs u Consists of protected memory area and privileges to directly execute system services, access CPU, run I/O operations, etc.
34
Chapter 9 Using the Registry to Configure System Setup and Software n Registry: Database that contains information the operating system needs about the entire server (configuration, program setup, devices, drivers, etc.) n Two editors to view Registry contents u Regedit u Regedt32
35
Chapter 9 The Five Root Keys n Root key (or subtree): Highest category of data contained in the Registry n The five root keys u HKEY_LOCAL_MACHINE u HKEY_CURRENT_USER u HKEY_USERS u HKEY_CLASSES_ROOT u HKEY_CURRENT_CONFIG
36
Chapter 9 The Five Root Keys
37
Chapter 9 Backing Up the Registry n The Registry is vitally important to Windows NT Server n Plan to back it up regularly when you back up other files F ERD - via RDISK F separately - via REGBACK F 3rd-party backup software often has specific options for registry
38
Chapter 9 Setting System Policies n Override registry settings in Windows NT Server n Used to set up special conditions for individual users F security F ease-of-use n Used to set up restrictions for all users F security F ease-of-use
39
Chapter 9 System Policies to Govern All Users n Control Panel display options n Desktop wallpaper and color schemes n Operating system shell restrictions F hiding drives, Net Neighborhood, etc. n System restrictions F run only certain programs, etc. n Windows NT Shell options n Windows NT System options
40
Chapter 9 System Policies to Govern Individual Users n Remote access settings n Creation of hidden drive shares n Network printer scheduling and error control options n Customized shared folder setup n Logon security and logon banner controls n File-naming options n User profile network time-out periods for slow network connections
41
Chapter 9 Setting Up and Using License Manager n “License” = right to use software F license terms differ by vendor F select the best option based on needs & price n Per seat licensing: Requires that there be enough licensees for all network client workstations n Per server licensing: Based on maximum number of clients that use an application at one time
42
Chapter 9 Setting Up and Using Directory Replicator n Directory replication services enable designated directories on one server to be copied to another server(s) or workstation(s) on the network n Export server: Server with the original directories n Import server: Computer that receives the directories and files
43
Chapter 9 Directory Replication Uses n To copy an update database on a member server in a client/server system to a reporting database on a different member server n To create a backup copy of account- related information
44
Chapter 9 Setting Up Export and Import Parameters
45
Chapter 9 Chapter Summary n Plan folder structure in advance. u Create distinct folders for user directories, software applications, server utilities, etc. u Set up folder properties F Set up permissions according to purpose of folder continued
46
Chapter 9 Chapter Summary n Before installing application software in a folder, make sure the software is network-compatible. n Use Add/Remove Programs tool to install software so that installation is coordinated with the Windows NT Registry. continued
47
Chapter 9 Chapter Summary n System policies offer another way to change Registry settings and to customize how users access Windows NT Server. n License Manager records and monitors the number of licenses. n Directory Replicator copies folders from a server to other network computers.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.