Administering windows 2000 server network
The user profile contains:. The user profile settings are saved on disk. They are loaded when the user logs on. The default user settings are used to create a new user's profile when the new user logs on the first time. The administrator may modify the contents of the Default User profile directory to change the settings for first time users of the system.
The Control Panel, System applet is used to copy user profiles. The " User Profiles " tab is used. The System applet is also used to delete user profiles. Shortcuts may be added to the Default User profile directory using Windows Explorer.
A hardware profile is a set of instructions that tells Windows which devices to start when you start your computer or what settings to use for each device. When you first install Windows , a hardware profile called Profile 1 for laptops, the profiles would be Docked Profile or Undocked Profile is created. By default, every device that is installed on your computer at the time you install Windows is enabled in the Profile 1 hardware profile.
Hardware profiles are especially useful if you have a portable computer. Most portable computers are used in a variety of locations, and hardware profiles will let you change which devices your computer uses when you move it from location to location. You can manage hardware profiles by double-clicking System in Control Panel, clicking the Hardware tab, and clicking Hardware Profiles.
If there is more than one hardware profile, you can designate a default profile that will be used every time you start your computer. You can also have Windows ask you which profile to use every time you start your computer. Once you create a hardware profile, you can use Device Manager to disable and enable devices that are in the profile. When you disable a device in a hardware profile, the device drivers for the device are not loaded when you start your computer.
Using Windows , you can make network files available while working offline for example, while working on a portable computer. Any shared network files or folders, including program files and Web pages, can be made available offline. By first setting up your computer to use Offline Files and then making your files available for offline use, you can disconnect your computer from the network and the files will still be available for use on your computer just as though you were still connected.
When you return your portable computer to its docking station, or when your network connection is restored, changes you made to files on your computer while you were disconnected are synchronized with those on the network. In addition, you can use Briefcase to save and synchronize network files quickly and easily, using either a Briefcase stored on a portable computer or a Briefcase stored on a removable disk.
If you are working offline either because you are disconnected from the network or because you undocked your portable computer , you can still browse network drives and shared folders in My Computer or My Network Places. A red X appears over any disconnected network drives. You will be able to see only those files that you made available offline and any files that you created after the network connection was lost.
Your permissions on the network files and folders remain the same whether you are connected to the network or working offline. For example, a read-only document on a mapped network drive would remain read-only if you were disconnected from the network.
When you are disconnected from the network, you can print to local printers, but you cannot print to shared printers on the network. Instead, the file is spooled and prints to your local printer when you are reconnected to the network. Once you reconnect to the network, Synchronization Manager updates the network files with changes that you made while working offline.
Group policies are linked to domains, organizational units, or sites in Active Directory. A policy must be linked to a container object in Active Directory to be effective. They are stored in any domain for storage but can be linked to other domains to make them effective there also.
The policy must be linked to the container site, domain, or OU that it is stored in to be effective in that container. One policy object can be linked to several containers. Several policy objects can be linked to one container. Two ways to set the encryption attribute on a file or folder are: 1. Use Windows Explorer 2. Run Cipher. Windows uses one driver to support printing for all applications.
Operating systems of the past required each application to support printing independently which required a print driver for each application or print functionality built into each application. When a shared print device made available as a remote printer, the printer is actually shared, not the print device. Therefore, one print device may have several printers associated with it. This allows various priorities and characteristics to be set up for different users on the same print device.
Two additional utilities called LPR. You'll enter the printer name or its IP address and the name of the print queue for the print device. Choose " Job Based " connection if more than one computer is using this printer. Choose " Continuous " connection if this is the only computer to use the printer. Select the divice from the list. If you capture the print device, this will be the only computer that can use the print device. Internet Explorer or the Printers folder can be used to manage these printers.
When NWLink is set to auto-detect the frame type, it will only detect one type and will go in this order: You can have any number of policies in a native Windows domain. When a caller connects,the policy conditions are evaluated one by one to see whether the caller gets in or not.
All of the conditions in the policy must match for the user to gain access. If there are multiple policies,they are evaluated according to an order you specify.
The three components of a remote access policy are its conditions, permissions and profile:. When the client sends the lease request, it then waits one second for an offer. If a response is not received, the request is repeated at 9, 13, and second intervals with additional 0 to milliseconds of randomness.
The attempt is repeated every 5 minutes thereafter. The client uses port 67 and the server uses port Client systems that are Windows 98 or later attempt to tell if another client is already using the address received from the DHCP server by pinging the address.
The DHCP server can be configured to pretest addresses by pinging them, but this will increase overhead and slow server response time. At If the lease expires, the client will send a request as in the initial boot when the client had no IP address. Additional messages include a DHCP decline message which is sent by the client if it decides the information from the server is not appropriate. A DHCP release message is used by the client to indicate to the server that the IP address is now released and available for use by other clients.
The client is in the renewing state when the lease is half expired. Client Reservation is used to be sure a computer gets the same IP address all the time. Exclusion range is used to reserve a bank of IP addresses so computers with static IP addresses, such as servers may use the assigned addresses in this range.
These addresses are not assigned by the DHCP server. Winipcfg is used with windows 9x systems. DHCP services must be on a member server or domain controller. This stops the DHCP service until done and may use much disk room. This can be accessed from administrative tools and is called "DHCP command". Windows clustering services allow redundant DHCP servers to provide DHCP fault tolerance with one acting as primary and the other acting as a backup. If more than 25 clients, DHCP should be used.
BOOTP or the bootstrap protocol can be used to boot diskless clients. An image file is sent from the boot server. The image file contains the image of the operating system the client will run. Clients that use remote access use either:. You can have any number of policies in a native Windows domain.
When a caller connects,the policy conditions are evaluated one by one to see whether the caller gets in or not. All of the conditions in the policy must match for the user to gain access. If there are multiple policies,they are evaluated according to an order you specify. The three components of a remote access policy are its conditions, permissions and profile:. If there are no Remote Access Policies, the connection is denied. The connection is allowed if it matches the conditions of one policy, but may be later denied if permissions or the profile are not met.
The order of the policies may be set using the "Routing and Remote Access" tool. The last component sets profiles rather than being met, however, if the dial-in client is not compatible with the profile, the connection is terminated.
The "Routing and Remote Access" administrative tool is used to enable routing on a Windows server that is multihomed has more than one network card. Windows professional cannot be a router.
These exams can no longer be taken, but if a retired exam is one of the requirements for a certification that has not been retired, it can be used to fulfill the certification requirements for up to one year after it retires. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Please rate your experience Yes No.
Any additional feedback?
0コメント