Lectures Principles Home Essentials Home |
Network AdministrationNetwork administration includes several interrelated areas. For example, it includes:
Group Accounts User Rights
Security Data protection Accounts
associated password and a set of rights to perform specific actions Usually created to organize people or resources. Rights and Permissions
Permissions deal with resourcesaccess. Can be granted to individual user accounts or to groups. Are cumulative, in NT the widest-reaching permission normally has priority. Account Management
Use the 'User Manager for Domains' (UM Utility) to change user passwords. Password Issues
How many characters should they be? Should failed logon result in an account lockout.? When should users be forced to change them?
NT Account Security
Logon days and hours can be restricted. Certain actions, such as logons, and object access, can be audited . Group Accounts
Local Groups exist exclusively in the local domain. Global Groups can access resources across domains. Managing Group Accounts
Global groups can include individual users. Local groups can include individual users and global groups. Trust Relationships
An arrangement in which one domain permits members of another domain to access its resources. One way relationship. Disabling and Deleting User Accounts
A deleted account' rights and permissions are gone. For a new user, you can copy or rename an existing account. Maintaining Network Performance
Queued commands. On Ethernet, the number of collisions per second. Security errors. Connections maintained to other devices. Network performance. System Management Hard Drive Performance Bytes read from and written to the server. Space available. Memory Use Hard Page Faults Maintain a Network History
Tension between too much and too little data Managing Network Security
including being able to replace data if its lost.
Threat identification. Questions include:
Whom or what do I need to protect data from? How likely is it that this threat will manifest itself? What is the cost of breached security? Security Models
Every object has an Access Control List (ACL) attached which represents Access Control Entries (ACE) that determine which accounts can access the object. NT security is user orientated. Tape Backup
Five types of backups.
Incremental (All files changed since last full or incremental backup) Differential (All files changed since last full backup.) Copy (Selected files with resetting archive bit.) Daily (All files changed that day.)
Devices, such as laser printers, can overload a UPS. An overload UPS may shut down without a power surge. Fault Tolerance
Disk Mirroring
The second drive contains the same information as the original. If a second controller is installed along with the second drive, it is called disk duplexing. Represent degrees of fault tolerance. Disk Striping with Parity
Also known as RAID Level 5. Creates the highest level of fault tolerance. |