-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
1/30
www
.technocorp.co.in
www
.technocorp.co.in
Configuring andTroubleshooting Network F
and Print Services
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
2/30
www
.technocorp.co.in
Module Overview
Configuring and Troubleshooting File Shares Encrypting Network Files with EFS
Encrypting Partitions with BitLocker
Configuring and Troubleshooting Network Printing
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
3/30
www
.technocorp.co.in
Configuring and Troubleshooting FilShares
What Is a File Share? Demonstration: How to Create a File Share
What Are NTFS Permissions?
Demonstration: How to Configure NTFS Permissions
Troubleshooting Network File Access Permissions
What Is Access-Based Enumeration?
File Access Enhancements in Windows Server 2008
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
4/30
www
.technocorp.co.in
What Is a File Share?
A file share is a folder on a server that has been configured
for access over the network
File share permissions are:
Full Control
Change
Read
Access file shares by using:
A UNC path
Mapped drive letter
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
5/30
www
.technocorp.co.in
Demonstration: How to Create a FileShare
In the demonstration, you will see how to: Create a file share by using simplified interface
Create a file share by using advanced sharing
Configure advanced sharing for a file share
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
6/30
www
.technocorp.co.in
What Are NTFS Permissions?
The basic NTFS permissions are:
Read & Execute
NTFS permissions control which users or groups can access or modify files and folders
NTFS formatted partitions
List folder contents
Modify
Full Control
Read
Write
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
7/30
www
.technocorp.co.in
Demonstration: How to Configure NPermissions
In this demonstration, you will see how to: Configure NTFS permissions
View advanced NTFS permissions
View inherited permissions
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
8/30
www
.technocorp.co.in
Troubleshooting Network File AccesPermissions
The troubleshooting steps are:
Check effective NTFS permissions
Deny permission overrides allow permission
Verify share permissions Assigning Full Control to the Everyone group
simplifies permission assignment
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
9/30
www.technocorp.co.in
What Is Access-Based Enumeration
Access-based enumeration:
Hides files and folder that you do not have read access to
Simplifies file browsing for users
Is enabled automatically when sharing is enabled usingthe simplified sharing interface
Can be enabled and disabled in Share andStorage Management
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
10/30
www.technocorp.co.in
File Access Enhancements inWindows Server 2008
Windows Server 2008 includes SMB 2.0:
Windows Server 2008 R2 includes SMB 2.1:
Enhances performance over slow networks
Combines multiple commands into a single request
Large MTU support
Better support for sleep modes
Combines multiple commands into a single request
Client oplock leasing
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
11/30
www.technocorp.co.in
Encrypting Network Files with EFS
What Is EFS? How EFS works
Recovering EFS Encrypted Files
Demonstration: How to Encrypt a File by Using EFS
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
12/30
www.technocorp.co.in
What Is EFS?
EFS is a feature that can encrypt files stored on anNTFS formatted partition
EFS Encryption acts as an additional layer of security
EFS can be used with no configuration
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
13/30
www.technocorp.co.in
How EFS works
Symmetric encryption is used to protect the file data
File Encryption Key (FEK)
Public key encryption is used to protect the symmetric key
User certificate with public key and private key
Also certificate of recovery agent
EFS
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
14/30
www.technocorp.co.in
Recovering EFS Encrypted Files
To ensure you can recover EFS encrypted files:
Back up user certificates
Configure a recovery agent
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
15/30
www.technocorp.co.in
Demonstration: How to Encrypt a FiUsing EFS
In this demonstration, you will see how to: Verify that a computer account supports EFS on a network s
Use EFS to encrypt a file on a network share
View the certificate used for encryption
Test access to an encrypted file
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
16/30
www.technocorp.co.in
Encrypting Partitions with BitLocker
What Is BitLocker? How BitLocker Works
Recovering BitLocker Encrypted Drives
Demonstration: How to Encrypt a Partition by Using BitLock
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
17/30
www.technocorp.co.in
What Is BitLocker?A feature in Windows Server 2008 that allows you to encrypt entire partitions
Benefits for BitLocker are:
Data protection for stolen drives
Safe shipping of preconfigured servers
Easier decommissioning of drives
Maintaining system integrity
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
18/30
www.technocorp.co.in
How BitLocker Works
A Volume Master Key encrypts each partition
A Full Volume Encryption Key encrypts theVolume Master Keys
The Full Volume Encryption Key is stored in a TPM
To use BitLocker there must be two partitions:
System with boot files
Boot
with operating system files (C:)
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
19/30
ww
w.technocorp.co.in
Recovering BitLocker Encrypted DBitLocker encrypted drives can be recovered by using:
A recovery key from USB flash drive
Saved immediately after encryption
A data recovery agent Configured by using Group Policy
A recovery password
In Active Directory
Saved or printed immediately after encryption
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
20/30
ww
w.technocorp.co.in
Demonstration: How to Encrypt aPartition by Using BitLocker
In this demonstration, you will see how to:
Install the BitLocker feature
Configure Bitlocker to not require a TPM
Enable BitLocker when a TPM is unavailable
Access the recovery password
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
21/30
ww
w.technocorp.co.in
Configuring and Troubleshooting NePrinting
Benefits of Network Printing
Security Options for Network Printing
Demonstration: How to Create Multiple Configurations for aDevice
What Is Printer Pooling?
Deploying Printers to Clients
Discussion: Troubleshooting Network Printing
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
22/30
ww
w.technocorp.co.in
Benefits of Network Printing
Simplified troubleshooting
Lower total cost of ownership
Centralized management
Listing in Active Directory
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
23/30
ww
w.technocorp.co.in
Security Options for Network Printin
The available permissions are:
Print
Manage this printer
Manage documents
The default security allows:
Everyone to print
Everyone to manage their own
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
24/30
ww
w.technocorp.co.in
Demonstration: How to Create MultiConfigurations for a Print Device
In this demonstration, you will see how to:
Create a shared printer
Create a second printer using the same port
Increase the priority of the second printer
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
25/30
ww
w.technocorp.co.in
What Is Printer Pooling?
A printer pool:
Requires all printers be the same model
Requires all printers in the same location
Increases availability and scalability
Printer pooling is a way to combine multiple physical printers into a single logical unit
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
26/30
ww
w.technocorp.co.in
Deploying Printers to ClientsYou can deploy printers to clients by using:
Group Policy objects created by Print Management
Manual installation
Group Policy preferences
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
27/30
ww
w.technocorp.co.in
Discussion: Troubleshooting NetworPrinting
What are some common network
printing problems and their resolution?
5 min
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
28/30
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
29/30
ww
w.technocorp.co.in
Lab Scenario
You are configuring a new file server that will hold files shared by multiple d
The first two departments to move their files to this location are the MarketProduction departments. You need to configure the file share so that each dhas access to view and modify only their own files. In addition, users should and folder that they do not have access to.
Your organization would like to allow users to start encrypting files by using However, there are concerns about recoverability. To enhance the managemcertificates used for EFS, you are going to configure an internal certification issue certificates to users. You will also configure a recovery agent for EFS anthe recovery agent can recover files.
The Marketing department has a single central copy room that stores the prentire floor. Over the last year, the capacity of your printer has become a coparticular, when a user prints a large job, it prevents other users from obtainprint jobs for 10 or 15 minutes. To resolve this problem, you have purchasedidentical printers to configure as a printer pool for the Marketing departmen
-
7/22/2019 10 Configuring and Troubleshooting Network File and Print Services
30/30
ww
w.technocorp.co.in
Lab Review
In Exercise 1, why did Adam only see the Marketing folder?
In Exercise 2, why was the Administrator account able to opencrypted file?
When two ports are enabled for a printer, how do you knowprint job will be directed?