You are on page 1of 5

processor suport

prof---two prosser
server---four processor
adserver---eight process
data center server---16 process

ntfs

compression
disk quota
file and folder security
encryption

perseat

client req a call

per server

connection req a call

global area of resources admin,authentication of user---domain (feel it)

information are stored in individual system---client (sam datadbase)

information are stored in centralized system---server (ads database)

driver sign---sign verif---new software overides the system file so this


can causes system utility

h/w profile---specify the h/w device and service that are loaded on startup

environment varible---specify the location of temp that are used by os

user ev---only for that particular user

system ev---common for all user

before upgrade---backup driver,registory,update e.r.d ,remove virus


scanner,disconnect serial cable
to ups

config display---allow to customise the display colour,font,wallpaper,screensaver

startup recovery---to indicate which os the user which is start first

regional option---to change the date ,time ,currency,number system and metric
system

accessibility---we can change the appearance and behaviour of windows2000 or other


special needs
without additional h/w or s/w

add or rem--- we can add or remove the application

internet properties
to attach novell---client service for n/ware
ipconfig---to display ipaddress of a computer

0.0.0.0---ip is already used on the network

169.254.x.x---it doesnot receive any ip from dchp server

ping 127.0.0.1 --- verify the tcp/ip

ping add---verify the ipadd configuration

ping add of gateway---can communicate with local n/w

ping add of the remote host---can communicate through the router

useraccount---enable a user to logon to a computer or domain

local user---allow the user to acess local resources

domain user---allow the user to access the domain resources

roming user---allow the user to access the same profile at anywhere on the n/w

mandatoryuser---doesnot allow the user to change the desktop setting

group

security group---to assign permission /can be used as a email distribution list

distibution group---cant be used to assign pre " " "" ""

group scops

global --- to organise user who share similar n/w access req

domain local---to assign permission to domain resources

universal --- to assign permission to related resources in a multiple domain

ntfs

permission are cumulative


file permission overrides the folder permission
deny overides the otherpermission
inheritance , prevent inheritance
moving file and folder in same ,diff and other partation
ownership,special acess permission
compress file and folder move or copy in same ,diff and other partation
disk quota
efs is also possible

shared---shared folder,permission and administrative shared

dfs---organise the data in a tree format


dfs tree doesnt need to know the name of the server just specify the
tree directory
if dfs fails we can move the shared folder from one server to another
set gain permission
event

event log is used to monitor system operation


like hw,sw,sys problen and security

syslog---monitor sys component---driver failure or other system comp while startup

applog---this log contains events loged by app or programs


(data base prog records a file error)

seclog---this log records see events such as valid and invalid attempts
(creating opening and deleting files and folders)

information---successfull operation
warning---not necessory but it will create feature problem
error---prob in sys operation and lose of data and loss functionality

taskmanager---to monitor system resources(like monitor prog,proecess and


perfomance)

system monitor---we need more details than task manager use system monitor
(monitor system perfomance)

object---major component h/w or major process


instances---instance are multiple of same object
counter---gather the data on different aspect of object
alert---to notify a user or admin when a process exceeds a limit
n/w monitor---to monitor the data streem

mod sec settings

acc pol---configure pwd and acc lockput policy


local pol---conf user rights ,auditing and sec options
public key pol---conf encrip data,recover agent,domain root trusted
ceritficate authority
ipsec policy---conf ip sec policy on n/w
restrited groups---conf group membership for sec sensitive group
system service---conf sec and startup settings for service runing
on a computer
registry---conf security on reg key
file system---conf sec on specfic file paths

event---allow u to track user and os activity


acc logon---dc receives a req to validation a user acc
acc manage---admin creates,changes and delete the user or groups
directory service---user gains access to an A D object
logon---log on or off a local computer
object acess---user gains access to file folder or printer
policy change---change is made to the user sec option,user rights or
audit policy

privilage use---user excercises a rights,such taking ownership of a file

process traking---application perform on action

system---user restart and shutdown the computer


power saving option

stand by---for short period of non use


mon--hdd turn off automatically os continus to run in a low power state

hibrenate---for extend period of non use


the desktop saved to hdd m and hdd turn off automatically,system shutdown

making file available for offline

it allows user to gain access to files stored on a n/w shared folder


when it is disconnected from the n/w

basic disks

can have 4partation 3 primary or one extended then one or more logical
create,delete and format without restart

logical partation of hdd to which u assign a drive letter or mnt point

dynamic volumes---can be extended in nom continious space on my availabe


disk no limit on number of volumes per disk

simple volume---contains a diskspace from a single disk

stripped volume---combines the area of free space from two or more


up to 32 hdd support---spreed equally improve perfomance

spanned volume---same but when we write the data in spanned vol


a portation of sp.vol resides on the first then the data is written to next disk

mirrod volume--- two identical copies of simple volume

RAID 5--are fault tolerancement stripped vol

disaster---any event that affects the computer to start

fault tolerance---predefined solution of system problem

disaster recovery---it is a process of restoring the computer after a computer


disaster occurs

raid 0---stripped volume


raid 1---mirred volume---min 2
raid 5---stripped volume with parity---min 3hdd
with the help of this parity it will reconstruct the data

backup and restore

normal---file and folder---clear marks---nort look


copy---neither looks nor clear
differential---not clear
incremental---not clear
daily---neither looks nor clear

disaster recovery

sfm---load basic device driver


sfm with nw---including nw service and driver
sfc---load basic and cmd mode
enable boot login---create a log file for driver and service(ntbtlog.txt)
enable vga---load basic vga driver
last good conf---uses lastgood one
directory service restore mode---allow ads restore on domain controller
debuging mode---sends the debug information to another computer through a
serial calble

recovering a computer through recovery console

to start and stop service


r/w the data on local hdd
format the hdd and display the hidden system files

help
fixmbr---to repair the mbr
fixboot---write the new partation boot sector
systemroot---set the current folder to the sys root
exit

recovering computer using ERD

create erd in backup and recovery


start the system from cdrom use option erd
saved in system root /repair folder
we can repair---registry,system files,partation,boot sector and startup
environment

You might also like