MC108 Lecture 1110 - PowerPoint PPT Presentation

1 / 26
About This Presentation
Title:

MC108 Lecture 1110

Description:

Presented by Phillip Schein for ComputerEd Institute, 2003 ... Bootable CDROM. Non-bootable CDROM. Network Installation. Attended using e.g., Dfs ... – PowerPoint PPT presentation

Number of Views:64
Avg rating:3.0/5.0
Slides: 27
Provided by: phillip68
Category:

less

Transcript and Presenter's Notes

Title: MC108 Lecture 1110


1
MC108Lecture 11/10
  • Chaps 3, 4, 5
  • Labs Remote Install

2
Thru 11/14 - 2nd Week
  • Tuesday and Wednesday
  • Please read Chapters 6 and 7.
  • We will create 10, 000 users and 1000 groups!
  • We will do all textbook labs in class.
  • Thursday (slack/review)
  • Chapter 8 (Printing) is a review!!
  • FridayMidterm (concept and practical)

3
Labs from last week
  • Complete Chapter 3, Exercise 1. We will return to
    this topic as an entire class in the chapter on
    application servers.
  • Please complete Chapter 4, Exercise 1. You are
    responsible for all material in this chapter.
  • Please complete Chapter 5, Exercise1. You are
    responsible for all material in this chapter.

4
Installations
  • Local Installation
  • Bootable CDROM
  • Non-bootable CDROM
  • Network Installation
  • Attended using e.g., Dfs
  • Unattended with answer file
  • FTP site providing support tools, drivers
  • ftp//ftp.microsoft.com

5
OEM
6
Chapters
Topics
  • Introduction
  • Installation
  • Unattended Installation
  • File Systems
  • File Systems
  • Active Directory
  • Server Administration Object Management
  • Print Services
  • Network Services
  • RRAS
  • Security
  • Reliability Disaster Recovery
  • Monitoring
  • Other Application Services

7
  • 01. Introduction
  • 02. Installation
  • 03. Unattended Installation
  • 04. File Systems
  • 05. File Systems
  • 06. Active Directory
  • 07. Server Administration
  • 08. Print Services
  • 12. Reliability
  • 13. Monitoring
  • 11. Security
  • 09. Network Services
  • 10. RRAS
  • 14. Other Application Services

Installation
File Organization
Maintenance
Maintenance
Policy
Infrastructure
Infrastructure
8
  • 01. Introduction
  • 02. Installation
  • 03. Unattended Installation
  • 04. File Systems
  • 05. File Systems
  • 06. Active Directory
  • 07. Server Administration
  • 08. Print Services
  • 12. Reliability
  • 13. Monitoring
  • 11. Security
  • 09. Network Services
  • 10. RRAS
  • 14. Other Application Services

11/5
11/7
11/10
11/12
11/17
Policy
Infrastructure
Infrastructure
9
Enterprise Management Plans
  • Phase 1 Installation and Configuration
  • Best Practices Design, Deploy, Test
  • Phase 2 Object management (People/Property)
  • Best Practices Design, Deploy, Test
  • Phase 3 Administration, Performance, and
    Security Policy management
  • Best Practices Design, Deploy, Test
  • Plans for Disaster Recovery, Security, etc.

10
Deployment Plan
  • Phase 1 Installation and Configuration
  • Best Practices Design
  • HowTo
  • Test / Assessment
  • Phase 2 People/Resource Management
  • Best Practices Design
  • HowTo
  • Test / Assessment
  • Phase 3 Ongoing Administration (Policy)
  • Best Practices Design
  • HowTo
  • Test / Assessment

11
To be continued
12
Organizational Objectives / Scope
  • People and property as objects
  • Each has attributes (values) and specific data
  • Each needs to be authenticated
  • Each has a list of access rights or permissions
  • Process
  • Between local machines, process/services need
    to be authenticated too!
  • Each assumes the role of an object in a process
    or workflow
  • Policy
  • Local and Global (Domain, Enterprise)

13
Legacy Single Domain Models
14
Generic Domain Relationships
Trusted Domain
User/Group Account
Trusting Domain
Token
Validation Request
ACL
ace ace ace ace
15
Windows 2000 Workgroups
16
Windows 2000 Domains
17
Domain Trees
18
Namespace
19
Organizational Units
20
Object Authentication
Logon
Logon Dialog Box CtrlAltDelete
Security Subsystem
User Mode
Kernel Mode
ACL
SAM/AD
Access Token
21
W2K Architectural Overview
22
Introduction
  • Design
  • Operating System features
  • Operating System architecture
  • Workgroup vs. Domain
  • Directory Services
  • Deployment
  • Installation Methods

23
Troubleshooting
  • Define the problem
  • Identify the context of the problem
  • Design and implement a solution
  • Replicate results to verify solution
  • Document problem and solution

24
Describe an Objective
  • Differences between
  • goals and objectives
  • unstructured and structured solutions
  • strategic and tactical plans
  • Objectives and Scope

25
Defining a Scope
  • Describe situation in terms of dimensions
  • who? Identify objects involved
  • where? Physical/Logical/Layer?
  • when? State a trigger, precedents
  • what? State a source, dependencies
  • how? State a mechanism
  • Use specific functional management areas to
    categorize the event. Use HowTos to
    identify/verify the above dimensions.

26
Building a HOWTO
  • Identify a single issue and an Immediate
    Solution to that specific issue.
  • Specify the procedure(s), in numbered steps, that
    will achieve the task/scope/objective.
  • Cite possible issues pertaining to any step in
    the HOWTO procedure
  • Summarize at least ONE Best Practices that
    pertains to this Immediate Solution
Write a Comment
User Comments (0)
About PowerShow.com