Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Lecture 2
Diagnostic
1-System information
tools
Lecture 2
2-Event Viewer
• Event Viewer maintains logs about
program, security, and system
events on your computer. You can
use Event Viewer to view and
manage the event logs, gather
information about hardware and
software problems, and monitor
Windows security events.
Notes
To open Event Viewer, click Start, click Control Panel, double-click
Administrative Tools, and then double-click Event Viewer.
OR Clikc run and then write eventvwr in test box
Lecture 2
3- Performance Monitor
• You can use Performance to collect
performance data automatically from local
or remote computers. You can define start
and stop times for automatic log
generation, manage multiple logging
sessions from a single console window,
and set an alert on a computer, allowing a
message to be sent or a log to be started
when your criteria is met.
Notes
Open run command and the write perfmon dialogue box
Lecture 2
Installation
There are two typos of Installation
• Attendant
• Un- attendant
Lecture 3
Remote Installation services
Pre-Requists for RIS
Domain Name Server
Active Directory Services
DHCP
Installation of DHCP and DNS
– Goto start – settings – control panel – add remove programs -
add remove windows components – networking services – then
choose DNS and DHCP
• Installation of RIS
• Gotostart – settings – control panel – add remove programs - add
remove windows components – choose RIS from List (a RIS wizard
Lecture 4
System Properties Dialogue
Box
Driver Signage
Digital Signature (WHQL) Active Directory Services
use run-sigverif
Right click on My computer and then clikc Hardware and then
choose Driver signage
change the policy to block (by default warn) \// aplicable for
local computer only
For Group Policy (applicable for all the systems in DNS environment)
Start – Open Active Directory users {(start – run- dsa.msc) or start –
administrative tools – active directory users and computers }
Step 2: Open Domain Property Dialog Box (MCSE.com)
Step 3: Modify Default Domain Policy
Group policy – Computer Configuration – windows settings – security
setting – local policy – security option – devices: unsigned driver
Lecture 4
System Properties
Topic: Driver Signage
Windows hardware qualified lab (WHQL)
System Properties-Hardware-Driver Signage
Three actions
•Ignore
•warn
•block
Group Policy
To control whole environment in LAN
File Signature Verify Tool (run – Sigverif)
Lecture 4
System Properties
Environment Variable (variable : Source of Shortcut
• Environment variables are a vital scheme for both querying and setting
vital information for serious software applications. They are one of the
techniques that when you master, you will be able to perform tasks that
are totally un-accomplishable using *ANY* other technique
• .
• Environment variables are strings that save information about the
entire environment in your system. These string values are dynamic
and they can affect the way your system will behave on. Environment
variables can be classified into two main types:
• System Variables: They affect the entire system whatever the current
user is. They are defined by Windows and saved in the registry. You
need to be an administrator to be able to modify them. You usually
need to restart your computer to make these changes effective.
• User Variables: They affect the current environment of the current
system user. They can be deleted, modified, and added by any system
user. They are used by Windows setup, by some programs, and by
users. Changes to these variables are saved to the registry and be
effective immediately.
Lecture 5
System Properties
You can add new environment variable, modify or delete an existing one using one
of the following ways.
• -Right click my computer, and then click Properties.
-Choose the Advanced tap in the System Properties dialog box.
-Click the Environment Variables button. The Environment dialog will appear as
shown in figure1.
-Select the variable you need to modify or delete, then click the suitable button.
• Example
• Local Environment Variables
• %USERNAME%: represents the current user name.
System Environment Variables
• %SYSTEMDRIVE%: represents the drive that contains the Windows root
directory.
Lecture 6
User Profile
Roaming Profile
A roaming profile is the default profile type within the department; it will follow you to any computer
that you work on. Every time you log on, your roaming profile is checked with Demeter, one of our
domain controllers. Any changed files are at synchronized at this point. Each person has his/her
own individual profile stored on Demeter in the profiles directory under his/her username. Logging
on to a computer accesses your profile and loads it to make it available to you. You are then able to
use that computer as it if were your personal computer even if it is not. At the end of your session
when you log off, your roaming profile is updated on Demeter with any changes you have made on
that computer though a few cache directories are excluded. You will be able to access your new
profile from any other computer you want to work on.
Mandatory Profile
Lecture 6
Hub: - A hub is a "unintelligent" broadcast device -- any packet entering any port is
broadcast out on every port. Hubs do not manage any of the traffic that comes
through their ports. Since every packet is constantly being sent out through every
Cabling
port, you end up with packet collisions, which greatly impede the smooth flow of
traffic on your LAN. Provides Shared bandwidth. It is physical layer device. Single
collision Domain. Multiport Repeater. No VLAN (Virtual LAN).
Switch:-A switch, on the other hand, isolates ports -- every received packet is
sent out only to the port on which the target may be found (one caveat - if the
proper port cannot be determined, then the switch will broadcast the packet to
• Topic 3 Types of Cabling all ports). Essentially, a switch is a router, but one operating at the MAC level
rather than the IP level. Since the switch is intelligently sending packets only
• Straight Cabling where they need to go, and not everywhere willy-nilly, the performance speed
• Cross Cabling of your network can be greatly increased. Provide Full bandwidth.Datalink layer
Device. Multiple Collision Domains. Forward & Filtering Decision. VLAN
• Roll-over Cabling available.
• NTFS is more powerful than FAT or FAT32, and includes features required for hosting
Active Directory as well as other important security features. You can use features such as
Active Directory and domain-based security only by choosing NTFS as your file system.
• It is easy to convert partitions to NTFS. The Setup program makes conversion easy, whether
your partitions used FAT, FAT32, or the older version of NTFS. This kind of conversion keeps your
files intact (unlike formatting a partition). If you do not need to keep your files intact and you
have a FAT or FAT32 partition, it is recommended that you format the partition with NTFS rather
than convert from FAT or FAT32. Formatting a partition erases all data on the partition and
allows you to start with a clean drive. Whether a partition is formatted with NTFS or converted
using the convert command, NTFS is the better choice of file system. For more information
about Convert.exe, after completing Setup, click Start, click Run, type cmd, and then press
ENTER. In the command window, type help convert and then press ENTER.
• In order to maintain access control on files and folders and support limited accounts, you must
use NTFS. If you use FAT32, all users will have access to all files on your hard drive, regardless
of their account type (administrator, limited, or standard.)
• NTFS is the file system that works best with large disks. (The next best file system for large
disks is FAT32.)
• When you work with encrypted files and folders, keep in mind the following
information:
• Only files and folders on NTFS volumes can be encrypted. Because WebDAV works
with NTFS, NTFS is required when encrypting files over WebDAV.
• Files or folders that are compressed cannot also be encrypted. If the user marks a file
or folder for encryption, that file or folder will be uncompressed.
• Encrypted files can become decrypted if you copy or move the file to a volume that is
not an NTFS volume.
• Moving unencrypted files into an encrypted folder will automatically encrypt those
files in the new folder. However, the reverse operation will not automatically decrypt
files. Files must be explicitly decrypted.
• Files marked with the System attribute cannot be encrypted, nor can files in the
systemroot directory.
• Encrypting a folder or file does not protect against deletion or listing files or
directories. Anyone with the appropriate permissions can delete or list encrypted
• By
• Parameters
• /c Compresses the specified directory or file.
• /u Uncompresses the specified directory or file. /s[:Dir] Specifies that the requested
action (compress or uncompress) be applied to all subdirectories of the specified
directory, or of the current directory if none is specified.
/a Displays hidden or system files.
• /i Ignores errors.
• /f Forces compression or uncompression of the specified directory or file. This is used
in the case of a file that was partly compressed when the operation was interrupted
by a system crash. To force the file to be compressed in its entirety, use the
• /c and
• /f parameters and specify the partially compressed file.
• /q Reports only the most essential information. FileName Specifies the file or
directory. You can use multiple file names and wildcard characters (* and ?).
• /? Displays help at the command prompt.
You can add more space to existing primary partitions and logical drives by extending them into adjacent, contiguous unallocated
05-06- Lecture 8
Disk Management- basic disk
Basic Disks – partition – primary partition – extended – Logical partitions
primary partition
• A type of partition that you can create on basic disks. A primary partition is a portion of a physical disk that
functions as though it were a physically separate disk. On basic master boot record (MBR) disks, you can
create up to four primary partitions on a basic disk, or three primary partitions and an extended partition
with multiple logical drives. On basic GUID partition table (GPT) disks, you can create up to 128 primary
partitions. Also known as a volume.
Extended partition
• A type of partition that you can create only on basic master boot record (MBR) disks. Extended partitions are
useful if you want to create more than four volumes on a basic MBR disk. Unlike primary partitions, you do
not format an extended partition with a file system and then assign a drive letter to it. Instead, you create
one or more logical drives within the extended partition. After you create a logical drive, you format it and
assign it a drive letter. An MBR disk can have up to four primary partitions or three primary partitions, one
extended partition, and multiple logical drives.
Logical drive
• A volume that you create within an extended partition on a basic master boot record (MBR) disk. Logical
drives are similar to primary partitions, except that you are limited to four primary partitions per disk,
whereas you can create an unlimited number of logical drives per disk. A logical drive can be formatted and
assigned a drive letter.
05-06- Lecture 8
Disk Management- basic disk
• To open Computer Management, click Start, click Control Panel, double-click Administrative Tools, and then
double-click Computer Management.
• You can create primary partitions, extended partitions, and logical drives only on basic disks. You should create
basic volumes instead of dynamic volumes if this computer also runs MS-DOS, Windows 95, Windows 98,
Windows Millennium Edition, Windows NT 4.0, or Windows XP Home Edition.
• On a master boot record (MBR) disk, you can create up to four primary partitions, or three primary partitions, one
extended partition, and unlimited logical drives.
• On a GUID partition table (GPT) disk, you can create up to 128 primary partitions.
Note: You cannot format system, boot, OEM, or unknown partitions. File compression
is supported only on NTFSvolumes with cluster sizes 4 KB and smaller.
Converting dynamic disks to basic disks. After you convert a basic disk into a dynamic disk, you cannot change the dynamic
volumes back to partitions. Instead,
you must move or back up your data, delete all dynamic volumes on the disk andONLY FOR
then convert the disk. For more information,
Installing the Windows Server 2003 family of operating systems. WIN XP
2K3
SERVER
There are five types of volumes 2K Server
11. Simple Volume Required minimum one Dynamic Disk &
12. Spanned Volume Required HD min: 2 Max 32 2K3
15. Stripped Volume Required HD min: 2 Max 32
16. Mirrored Volume Required HD Only two dynamic disk
17. RAID-5 Volume Required HD min: 3 Max 32
There are five types of dynamic volumes: simple, spanned, striped, mirrored, and RAID-5. Mirrored and RAID-5 volumes are
fault tolerant and are available only
on computers running Windows 2000 Server, Windows 2000 Advanced Server, Windows 2000 Datacenter Server, or the Windows
Server 2003 family of
operating systems. You can, however, use a computer running Windows XP Professional to remotely create mirrored and RAID-5
volumes on these
operating systems.
June 5, Lecture 8
Disk Management- Dynamic Disk
Simple Volumes:
simple volumes are similar to partitions which can be created only one Hard disk which do not offer fall tolerance.
A dynamic volume made up of disk space from a single dynamic disk. A simple volume can consist of a single region on a disk or
multiple regions of the same disk
that are linked together. If the simple volume is not a system volume or boot volume, you can extend it within the same disk or
onto additional disks. If you
extend a simple volume across multiple disks, it becomes a spanned volume. You can create simple volumes only on dynamic
disks. Simple volumes are not fault
tolerant, but you can mirror them to create mirrored volumes on computers running the Windows 2000 Server or Windows
Server 2003 families of operating
systems.
Open disk management - Right click on the black bar - New – volume - Select simple volume - Alter the space – next
- Drive letter - File system
Check box perform quick format
Spanned Volume:
A volume can be created by selecting the free space from more than 1 Hdd
A dynamic volume consisting of disk space on more than one physical disk. You can increase the size of a spanned volume by
extending it onto additional
A dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated
alternately and evenly (in stripes)
across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but
they do not provide fault
tolerance. If a disk in a striped volume fails, the data in the entire volume is lost. You can create striped volumes
only on dynamic disks.
Striped volumes are not fault tolerant and cannot be extended or mirrored.
You need at least two dynamic disks to create a striped volume. You can create a striped volume onto a maximum of
32 disks.
A fault-tolerant volume that duplicates data on two physical disks. A mirrored volume provides data redundancy by
using two identical volumes,
which are called mirrors, to duplicate the information contained on the volume. A mirror is always located on a
different disk. If one of the
physical disks fails, the data on the failed disk becomes unavailable, but the system continues to operate in the
mirror on the remaining disk. You
can create mirrored volumes only on dynamic disks on computers running the Windows 2000 Server or Windows
Server 2003 families of
operating systems. You cannot extend mirrored volumes.
You need two dynamic disks to create a mirrored volume.
Both copies (mirrors) of the mirrored volume share the same drive letter.
Implementation of mirror:
• Create a simple volume ex: 100mb
• Right click on S.V. and add mirror
A fault-tolerant volume with data and parity striped intermittently across three or more physical disks. Parity is a calculated value
that is used to reconstruct
data after a failure. If a portion of a physical disk fails, Windows recreates the data that was on the failed portion from the
remaining data and parity. You can
create RAID-5 volumes only on dynamic disks on computers running the Windows 2000 Server or Windows Server 2003 families
of operating systems. You
cannot mirror or extend RAID-5 volumes. In Windows NT 4.0, a RAID-5 volume was known as a striped set with parity.
• You can create RAID-5 volumes only on computers running Windows 2000 Server, Windows 2000 Advanced Server,
Windows 2000 Datacenter Server, or the Windows Server 2003 family of operating systems.
• You need at least three (but no more than 32) dynamic disks to create a RAID-5 volume.
• RAID-5 volumes provide fault tolerance at a cost of only one additional disk for the volume. For example, if you use three
10-GB disks to create a RAID-5 volume, the volume will have a 20-GB capacity. The remaining 10-GB is used for parity.
• RAID-5 volumes cannot be extended or mirrored.
Parity
• A calculated value that is used to reconstruct data after a failure. RAID-5 volumes stripe data and parity intermittently
across a set of disks. When a disk fails, some server operating systems use the parity information together with the data on
• Folder auditing
– to check security & EVETNS
– Monitoring of folders
R.C on properties – security – advanced
Steps
Open active director – domain properties – modify default domain policy –
refresh group policy – verify
Run- dsa.msc
A: computer configuration – administrative- windows component –
June 10,
Program Compatibility
Wizard
June 10,
Boot Process OR Booting
In computing, booting (booting up) is a bootstrapping process that starts operating systems when the user
turns on a computer system. A boot sequence is the initial set of operations that the computer performs
when power is switched on. The bootloader typically loads the main operating system for the computer.
Boot process:
June 12,
Boot loader
• A computer's central processor can only execute program code found in Read-Only Memory (ROM) and
Random Access Memory (RAM). Modern operating systems and application program code and data are
stored on nonvolatile data storage devices, such as hard disc drives, CD, DVD, USB flash drive, and
floppy disk. When a computer is first powered on, it does not have an operating system in ROM or RAM. The
computer must initially execute a small program stored in ROM along with the bare minimum of data needed
to access the nonvolatile devices from which the operating system programs and data are loaded into RAM.
• The small program that starts this sequence of loading into RAM, is known as a bootstrap loader, bootstrap or
boot loader. This small boot loader program's only job is to load other data and programs which are then
executed from RAM. Often, multiple-stage boot loaders are used, during which several programs of
increasing complexity sequentially load one after the other in a process of chain loading.
Boot Disk
• A boot disk is a removable digital data storage medium from which a computer can load and run (boot) an
operating system or utility program. The computer must have a built-in program which will load and execute
a program from a boot disk meeting certain standards.
• Boot disks are used for:
– Operating system installation.
– Data recovery.
– Data purging.
– Hardware or software troubleshooting.
– Customizing an operating environment.
– Software demonstration.
– Administrative access in case of lost password is possible with an appropriate boot disk with some
operating systems.
Configuring the BOOT.INI File
If you are using an x86-based system, it is critical that the BOOT.INI file be configured properly.
This file is created during the Windows XP Professional installation and is stored in the system
root partition. The BOOT.INI file contains the information required by NTLDR to create and
display the boot startup menu.
The information that is contained in the BOOT.INI file includes:
• The path to the boot partition
• Descriptive text that should be displayed on the boot startup menu
• Optional parameters for managing computer startup
• Optional support for multiple boot configurations if other Microsoft operating systems
have been installed in separate partitions
The BOOT.INI file contains two main sections for configuration: the Boot Loader and Operating Systems. Options that
are configured in the Boot Loader section are applied to all Windows installations on the computer. Settings in the
Operating Systems section are applied only to the
specific Windows installation that is referenced within the Operating Systems section.
The following is an example of text that you might see in a BOOT.INI file.
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1) \Windows
[operating systems]
multi(0)disk(0)rdisk(0)partition(1) \Windows=”Microsoft Windows XP
Professional” /fastdetect
In the following sections, you will learn about Boot Loader configuration options, ARC
naming conventions, BOOT.INI operating system parameters, options for editing the BOOT.INI