TECH DOC

Категории

Books [36]
Soft [7]

Map

Теги

Статистика

Онлайн всего: 1
Гостей: 1
Пользователей: 0

Поделиться

Каталог файлов

Главная » Файлы

Всего материалов в каталоге: 43
Показано материалов: 21-30
Страницы: « 1 2 3 4 5 »

With the increasing demand on storage resources, as organizations rely more heavily on data than ever before, IT administrators face the challenge of overseeing a larger and more complex storage infrastructure, while at the same time, tracking the kind of information available in it. Today, managing storage resources not only includes data size and availability but also the enforcement of company policies and a very good understanding of how existing storage is being used, allowing for sound strategic planning and proper response to organizational changes. File Server Resource Manager is a suite of tools that allows administrators to understand, control, and manage the quantity and type of data stored on their servers. By using File Server Resource Manager, administrators can place quotas on volumes, actively screen files and folders, and generate comprehensive storage reports. This set of advanced instruments not only helps the administrator to efficiently monitor existing storage resources, but it also aids in the planning and implementation of future policy changes.

Step-by-step | Просмотров: 774 | Загрузок: 211 | Добавил: Kogr | Дата: 24.11.2009

Server Manager is a new tool available with Windows Server® 2008 that guides information technology administrators through the process of installing, configuring, and managing server roles and features that are part of Windows Server 2008. This step-by-step guide provides an overview of Server Manager and walkthroughs of several common scenarios for using Server Manager in your enterprise, focusing on new and enhanced features of Server Manager. This guide helps you learn about how Server Manager functions as a server role deployment, decommissioning, and management tool. The guide also describes how Server Manager helps improve productivity, so IT pros can spend less time deploying, managing, and maintaining their infrastructures, and spend more time using Windows Server 2008 software packages to add business value. The scenarios described in this step-by-step guide include initial server configuration tasks as well as deployment, management, and removal of server roles and features.

Step-by-step | Просмотров: 901 | Загрузок: 212 | Добавил: Kogr | Дата: 24.11.2009

Windows Server® 2008 Terminal Services Gateway (TS Gateway) is a role service that enables authorized remote users to connect to resources on an internal corporate or private network, from any Internet-connected device that can run the Remote Desktop Connection (RDC) client. The network resources can be terminal servers, terminal servers running RemoteApp™ programs, or computers with Remote Desktop enabled. TS Gateway encapsulates Remote Desktop Protocol (RDP) within RPC, within HTTP over a Secure Sockets Layer (SSL) connection. In this way, TS Gateway helps improve security by establishing an encrypted connection between remote users on the Internet and the internal network resources on which their productivity applications run. The procedures in this guide will help you set up a TS Gateway server, enabling remote users to access terminal servers, terminal servers running RemoteApp programs, or computers with Remote Desktop enabled on your internal corporate or private network.

Step-by-step | Просмотров: 1115 | Загрузок: 219 | Добавил: Kogr | Дата: 24.11.2009

This step-by-step walks you through the process of setting up a working licensing-only Active Directory Rights Management Services (AD RMS) cluster in a test environment. During this process you install a database server, install the AD RMS server role, configure the AD RMS licensing-only cluster, and configure the AD RMS-enabled client computer to acquire licenses from the licensing-only cluster.
Step-by-step | Просмотров: 746 | Загрузок: 222 | Добавил: Kogr | Дата: 24.11.2009

This step-by-step guide will assist you in using Active Directory Rights Management Services (AD RMS) with Active Directory® Federation Services (AD FS) in a test environment. Specifically, this guide will look at how to implement AD RMS if you have also deployed AD FS in your organization and have established a trust relationship with another organization that has not deployed AD RMS. Using the information in this guide, you can extend the basic AD RMS deployment to use AD FS credentials to establish trusted user accounts. This will enable you to share access to rights-protected content with another organization without having to establish a separate trust.

Step-by-step | Просмотров: 762 | Загрузок: 225 | Добавил: Kogr | Дата: 24.11.2009

Storage Manager for SANs is a Microsoft Management Console (MMC) snap-in that helps you create and manage logical unit numbers (LUNs) on Fibre Channel and Internet SCSI (iSCSI) disk drive subsystems that support Virtual Disk Service (VDS) in your storage area network (SAN). Before you deploy Storage Manager for SANs on a production server, we recommend that you use this guide to first familiarize yourself with the different LUN management options in Storage Manager for SANs by installing and running it on a test server.

Step-by-step | Просмотров: 870 | Загрузок: 226 | Добавил: Kogr | Дата: 24.11.2009

Services for Network File System (NFS) provides a file-sharing solution for enterprises that have a mixed Windows and UNIX environment. Services for NFS enables users to transfer files between computers running the Windows Server® 2008 operating system and UNIX-based computers using the NFS protocol.

 

Step-by-step | Просмотров: 739 | Загрузок: 228 | Добавил: Kogr | Дата: 24.11.2009

This step-by-step guide illustrates how to deploy Active Directory® Group Policy objects (GPOs) to configure Windows Firewall with Advanced Security in Windows Vista® and Windows Server® 2008. Although you can configure a single server locally by using Group Policy Management tools directly on the server, that method is not consistent or efficient when you have many computers to configure. When you have multiple computers to manage, create and edit GPOs, and then apply those GPOs to the computers in your organization. The goal of a Windows Firewall with Advanced Security configuration in your organization is to improve the security of each computer by blocking unwanted network traffic from entering the computer. Network traffic that does not match the rule set of Windows Firewall with Advanced Security is dropped. You can also require that the network traffic which is allowed must be protected by using authentication or encryption. The ability to manage Windows Firewall with Advanced Security by using Group Policy allows an administrator to apply consistent settings across the organization in a way that is not easily circumvented by the user. In this guide, you get hands-on experience in a lab environment using Group Policy management tools to create and edit GPOs to implement typical firewall settings. You also configure GPOs to implement common server and domain isolation scenarios and see the effects of those settings.

Step-by-step | Просмотров: 816 | Загрузок: 229 | Добавил: Kogr | Дата: 24.11.2009

This step-by-step guide walks you through the process of creating and deploying Active Directory Rights Management Services (AD RMS) policy templates in a test environment. During this process you create a rights policy template, deploy this template to a client computer running Windows Vista® and Microsoft® Office Word 2007, and verify that the client computer can rights-protect a document by using the newly-created rights policy template. Once complete, you can use the test lab environment to assess how AD RMS rights policy templates can be created with Windows Server® 2008 and deployed within your organization. As you complete the steps in this guide, you will: · Create an AD RMS rights policy template. · Deploy the rights policy template. · Verify AD RMS functionality after you complete the configuration. The goal of an AD RMS deployment is to be able to protect information, no matter where it is moved. Once AD RMS protection is added to a digital file, the protection stays with the file. By default, only the content owner is able to remove the protection from the file. The owner can grant rights to other users to perform actions on the content, such as the ability to view, copy, or print the file.
Step-by-step | Просмотров: 784 | Загрузок: 233 | Добавил: Kogr | Дата: 24.11.2009

Данный файл необходим для обнуления лицензии подключения к терминальному серверу.
Other | Просмотров: 867 | Загрузок: 243 | Добавил: Kogr | Дата: 17.11.2009

Поиск

Vir Actiy

IP

Узнай свой IP адрес

Scan File

Scan URL

+

Бесплатный анализ сайта

Статьи , новости информационных технологий , обзоры , описание ошибок , Операционные системы , системные ошибки , новые технологии , аутсорсинг , windows , Linux , VoIP , FreeBSD , Cisco , информационная безопасность , Win7 , Win8 , server , проблемы с серверами , ИТ , управление инфраструктурой и многое другое…