Chapter 10: Implementing File and Print Services: Windows Platform I CH 10
Chapter 10: Implementing File and Print Services: Windows Platform I CH 10
-0-
Windows Platform - CH 10
-1-
Windows Platform I CH 10
Module Overview
Securing Files and Folders
Protecting Shared Files and Folders using Shadow Copies
Configuring Network Printing
-2-
Windows Platform - CH 10
-3-
Windows Platform I CH 10
-4-
Windows Platform - CH 10
Permissions Inheritance
Inheritance is used to manage access to resources without assigning explicit
permissions to each object
By default, permissions are inherited in a parent/child relationship
Blocking inheritance:
You can block permission inheritance
You can apply blocking at the file or folder level
You can set blocking on a folder to propagate the new permissions to child
objects
Effective Permissions
When combining shared folder and NTFS permissions, the most restrictive
permission is applied
Example: If a user or group is given the shared folder permission of Read and the
NTFS permission of Write, the user or group will only be able to read the file
because it is the more restrictive permission.
Both the share and the NTFS file and folder permissions must have the correct
permissions, otherwise the user or group will be denied access to the resource
-5-
Windows Platform I CH 10
-6-
Windows Platform - CH 10
-7-
Windows Platform I CH 10
-8-
Windows Platform - CH 10
-9-
Windows Platform I CH 10
- 10 -
Windows Platform - CH 10
- 11 -
Windows Platform I CH 10
- 12 -
Windows Platform - CH 10
- 13 -
Windows Platform I CH 10
- 14 -
Windows Platform - CH 10
- 15 -
Windows Platform I CH 10
- 16 -
Windows Platform - CH 10
Module_10
Question: Is there another way you could recover the file in the shadow copy
exercise? What benefit do shadow copies provide in comparison?
Answer: Within the lab itself, the user could recover the file from the Recycle Bin.
However, in a real-world scenario, if the Recycle Bin has been emptied, or if the file
has been changed more than once, then the file cannot be recovered using this
method.
In comparison, shadow copies maintain multiple, persistent copies of modified files
that can be recovered by an administrator or by an end user.
Question: In Exercise 3, how could you configure Branch Office Direct Printing if you
were in a remote location and did not have access to the Windows Server 2012 GUI
for the print server?
Answer: You could configure Branch Office Direct Printing by connecting remotely
using Windows PowerShell® from a Windows 8 or Windows Server 2012 computer.
Then, you could use the Set-Printer cmdlet to change the configuration.
- 17 -
Windows Platform I CH 10
Question: Why should you not use shadow copies as a means for data backup?
Answer: While shadow copies can store copies of files and protect against issues
like accidental deletion, they are still reliant on the local files system and Windows
Server 2012 for their functionality. Hard drive corruption, or destruction of the local
machine renders shadow copies useless in a disaster recovery situation.
- 18 -