0% found this document useful (0 votes)
72 views19 pages

Chapter 10: Implementing File and Print Services: Windows Platform I CH 10

This chapter discusses implementing file and print services in Windows including securing files and folders with NTFS permissions and shared folders, protecting shared files with shadow copies, and configuring network printing with options like printer pooling and branch office direct printing.

Uploaded by

aya ghoury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views19 pages

Chapter 10: Implementing File and Print Services: Windows Platform I CH 10

This chapter discusses implementing file and print services in Windows including securing files and folders with NTFS permissions and shared folders, protecting shared files with shadow copies, and configuring network printing with options like printer pooling and branch office direct printing.

Uploaded by

aya ghoury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Windows Platform I CH 10

Chapter 10: Implementing File and Print


Services

-0-
Windows Platform - CH 10

Subject Page Number


Lesson 1: Securing Files and Folders 3
What Are NTFS Permissions? 4
What Are Shared Folders? 4
Permissions Inheritance 5
Effective Permissions 5
What Is Access-Based Enumeration? 6
What Are Offline Files? 6
Demonstration: Creating and Configuring a 7
Shared Folder
Lesson 2: Protecting Shared Files and Folders 8
using Shadow Copies
What Are Shadow Copies? 9
Considerations for Scheduling Shadow 9
Copies
Restoring Data from a Shadow Copy 10
Demonstration: Restoring Data from a 10
Shadow Copy
Lesson 3: Configuring Network Printing 11
Benefits of Network Printing 12
What Is Enhanced Point and Print? 12
Security Options for Network Printing 13
Demonstration: Creating Multiple 13
Configurations for a Print Device
What Is Printer Pooling? 14
What Is Branch Office Direct Printing? 14
Deploying Printers to Clients 15

-1-
Windows Platform I CH 10

Module Overview
 Securing Files and Folders
 Protecting Shared Files and Folders using Shadow Copies
 Configuring Network Printing

-2-
Windows Platform - CH 10

Lesson 1: Securing Files and Folders


 What Are NTFS Permissions?
 What Are Shared Folders?
 Permissions Inheritance
 Effective Permissions
 What Is Access-Based Enumeration?
 What Are Offline Files?
 Demonstration: Creating and Configuring a Shared Folder

-3-
Windows Platform I CH 10

What Are NTFS Permissions?


NTFS permissions control access for files and folders on NTFS-formatted storage
volumes
NTFS Permissions:
 Are assigned to files or folders
 Can be allowed or denied
 Are inherited from parent folders
Permissions conflict precedence:
1. Explicitly assigned Deny
2. Explicitly assigned Allow
3. Inherited Deny
4. Inherited Allow

What Are Shared Folders?


Shared folders are folders that grant network access to their contents

 Folders can be shared, but individual files cannot


 You can manage shared folders:
 Through Server Manager
 In Windows Explorer
 By using Netsh from a command line

-4-
Windows Platform - CH 10

Permissions Inheritance
Inheritance is used to manage access to resources without assigning explicit
permissions to each object
By default, permissions are inherited in a parent/child relationship
Blocking inheritance:
 You can block permission inheritance
 You can apply blocking at the file or folder level
 You can set blocking on a folder to propagate the new permissions to child
objects

Effective Permissions
When combining shared folder and NTFS permissions, the most restrictive
permission is applied
Example: If a user or group is given the shared folder permission of Read and the
NTFS permission of Write, the user or group will only be able to read the file
because it is the more restrictive permission.
Both the share and the NTFS file and folder permissions must have the correct
permissions, otherwise the user or group will be denied access to the resource

-5-
Windows Platform I CH 10

What Is Access-Based Enumeration?


Access-based enumeration allows an administrator to control the visibility of shared
folders according to the permissions set on the shared folder
Access Based Enumeration is:
 Built into Windows Server 2012
 Available for shared folders
 Configurable on a per shared folder basis

What Are Offline Files?


Offline file settings allow client computer to cache network files locally for offline use
when they are disconnected from the network

-6-
Windows Platform - CH 10

Demonstration: Creating and Configuring a Shared Folder


In this demonstration, you will see how to:
 Create a shared folder
 Assign permissions for the shared folder
 Configure access based enumeration
 Configure Offline Files

-7-
Windows Platform I CH 10

Lesson 2: Protecting Shared Files and Folders using Shadow Copies


 What Are Shadow Copies?
 Considerations for Scheduling Shadow Copies
 Restoring Data from a Shadow Copy
 Demonstration: Restoring Data from a Shadow Copy

-8-
Windows Platform - CH 10

What Are Shadow Copies?


Shadow copies:
 Allow access to previous versions of files
 Are based on tracking disk changes
 Disk space is allocated on the same volume
 When the space is full, older shadow copies are removed
 Are not a replacement for backups
 Are not suitable for recovering databases

Considerations for Scheduling Shadow Copies


 Default schedule is 7:00 A.M. and noon
 Create a shadow copy schedule based on:
 Volume of changes
 Importance of changes
 Storage limitations

-9-
Windows Platform I CH 10

Restoring Data from a Shadow Copy


 Previous versions are accessible from the Properties window of a file or folder
 Administrators can restore previous versions directly on the server
 Users can restore previous versions over the network
 All users can:
 Restore a file or folder
 Copy a file or folder to an alternate location
 Browse previous versions to select the correct version

Demonstration: Restoring Data from a Shadow Copy


 In this demonstration, you will see how to:
 Configure shadow copies
 Create a new file
 Create a shadow copy
 Modify the file
 Restore the previous version

- 10 -
Windows Platform - CH 10

Lesson 3: Configuring Network Printing


 Benefits of Network Printing
 What Is Enhanced Point and Print?
 Security Options for Network Printing
 Demonstration: Creating Multiple Configurations for a Print Device
 What Is Printer Pooling?
 What Is Branch Office Direct Printing?
 Deploying Printers to Clients

- 11 -
Windows Platform I CH 10

Benefits of Network Printing


 Centralized management
 Simplified troubleshooting
 Lower total cost of ownership
 Listing in AD DS

What Is Enhanced Point and Print?


 Enhanced Point and Print uses the v4 driver model to provide a simplified
management structure for network printer drivers
 Enhanced Point and Print provides the following benefits:
 Print servers do not need to store client print drivers
 Driver files are isolated, preventing file naming conflicts
 A single driver can support multiple devices
 Driver packages are smaller and install faster
 The print driver and the printer user interface can be deployed
independently

- 12 -
Windows Platform - CH 10

Security Options for Network Printing


 The default security allows everyone to:
 Print
 Manage their own print jobs
 The available permissions are:
 Print
 Manage this printer
 Manage documents

Demonstration: Creating Multiple Configurations for a Print


Device
 In this demonstration, you will see how to:
 Create a shared printer
 Create a second shared printer using the same port
 Increase printing priority for a high priority print queue

- 13 -
Windows Platform I CH 10

What Is Printer Pooling?


Printer pooling combines multiple physical printers into a single logical unit
A printer pool:
 Increases availability and scalability
 Requires that all printers use the same driver
 Requires that all printers are in the same location

What Is Branch Office Direct Printing?


Branch Office Direct Printing enables client computers to print directly to network
printers that are shared on a print server

- 14 -
Windows Platform - CH 10

Deploying Printers to Clients


You can deploy printers to clients by using:
 Group Policy preferences
 GPO created by Print Management
 Manual installation

- 15 -
Windows Platform I CH 10

Lab: Implementing File and Print Services


 Exercise 1: Creating and Configuring a File Share
 Exercise 2: Configuring Shadow Copies
 Exercise 3: Creating and Configuring a Printer Pool

- 16 -
Windows Platform - CH 10

Module_10

Question: How does implementing access-based enumeration benefit the users of


the Data shared folder in this lab?
Answer: With access-based enumeration, users see only the folders for their
department, which creates a more streamlined navigation experience. It also makes
for a more secure network browsing experience, as users are unaware of other
folders and files that exist in the directory tree to which they have not been granted
access.

Question: Is there another way you could recover the file in the shadow copy
exercise? What benefit do shadow copies provide in comparison?
Answer: Within the lab itself, the user could recover the file from the Recycle Bin.
However, in a real-world scenario, if the Recycle Bin has been emptied, or if the file
has been changed more than once, then the file cannot be recovered using this
method.
In comparison, shadow copies maintain multiple, persistent copies of modified files
that can be recovered by an administrator or by an end user.

Question: In Exercise 3, how could you configure Branch Office Direct Printing if you
were in a remote location and did not have access to the Windows Server 2012 GUI
for the print server?
Answer: You could configure Branch Office Direct Printing by connecting remotely
using Windows PowerShell® from a Windows 8 or Windows Server 2012 computer.
Then, you could use the Set-Printer cmdlet to change the configuration.

Question: How does inheritance affect explicitly assigned permissions on a file?


Answer: While inherited permissions accumulate with explicit permissions, explicitly
assigned permissions always supersede inherited permissions.

- 17 -
Windows Platform I CH 10

Question: Why should you not use shadow copies as a means for data backup?
Answer: While shadow copies can store copies of files and protect against issues
like accidental deletion, they are still reliant on the local files system and Windows
Server 2012 for their functionality. Hard drive corruption, or destruction of the local
machine renders shadow copies useless in a disaster recovery situation.

Question: In which scenarios could Branch Office Direct Printing be beneficial?


Answer: Branch Office Direct Printing is typically best used when the WAN
connection between a printer and a print server is slow or unreliable. When clients
are located in the same physical location as the printer and they use Branch Office
Direct Printing, time to print is decreased and network bandwidth use is reduced
because print jobs are sent from the client computer directly to the printer and not to
the central server and then back to the branch office printer.

- 18 -

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy