Windows Server 2008 Network Infrastructure, Configuring
Encrypting and Sharing Encrypted Files
Right click the file or folder to be encrypted. Select Properties. Select Advanced. Select Encrypt contents to secure data. Click OK. Use the buttons below to navigate through the lesson The file is now encrypted, note the green lettering; this … Continue reading
Network Monitor 2008
Troubleshooting complex problems requires gaining insight into the inner workings of an application. When you are troubleshooting network problems, one of the best ways to gain insight is to capture and analyze the network communications using a protocol analyzer. Microsoft … Continue reading
Monitoring Performance and Reliability
Performance and reliability monitoring is useful in several scenarios: Improving the performance of servers by identifying the performance bottleneck and then upgrading the bottlenecked resource. Identifying the source of critical performance problems that make services unusable or completely unavailable. Correlating … Continue reading
Creating an Event Subscription
Expand Event Viewer. right click Subscriptions. Select Create Subscription. Enter Subscription Name. Use the buttons below to navigate through the lesson You can create two types of subscriptions: Collector initiated – The collecting computer co ntacts the source computers to … Continue reading
Monitoring Event Logs
Windows has always stored a great deal of important information in the event logs. Unfortunately, with versions of Windows released prior to Windows Vista, that information could be very hard to access. Event logs were always stored on the local … Continue reading
Reports
You can view detailed information about updates, computers, and synchronization using the Reports node in the Update Services console. Use the buttons below to navigate through the lesson Update Status Summary this report displays detailed information about every update that … Continue reading
Configure Client-side Targeting
You use Group Policy objects (GPOs) to add computers to computer groups when you enable client-side targeting. First, configure the WSUS server for client-side targeting. Use the buttons below to navigate through the lesson Select Options and then Computers. Select … Continue reading
Install and Configure WSUS
Right click Roles. Then select Add Roles. Click Next. Select Windows Server Update Services. Select Add Required Role Services. Click Next. Click Next. Select any further IIS components. Click Next. Click Next. Click Install. The Server must be connected to … Continue reading
Logging for Windows Firewall
If you are ever unsure about whether Windows Firewall is blocking or allowing traffic, you should enable logging, re-create the problem you’re having, and then examine the log files. Use the buttons below to navigate through the lesson Right click … Continue reading
Creating an Outbound Filter
By default, Windows Firewall allows all outbound traffic. Allowing outbound traffic is far less risky than allowing inbound traffic. However, outbound traffic still carries some risk: Use the buttons below to navigate through the lesson If malware infects a computer, … Continue reading
No comments:
Post a Comment