Compressing Files and Folders

To compress a file or folder, right-click it. Select Properties from the pop-up menu and then choose the Advanced button. There are four check boxes to choose from in the Advanced dialog box. Choose the Compress contents to save disk space check box and then click OK (see Figure 8.1). To uncompress a file or folder, simply remove the check mark from the check box and click OK. Figure 8.1 This is the Advanced Attributes dialog box for a folder on an NTFS volume. Figure 8.1 This is the Advanced...

Multilink and Bandwidth Allocation Protocol BAP

Another new feature of Windows 2000 is enhanced support for Multilink RAS clients. Multilink describes a RAS connection made over more than one phone or ISDN line. For example, a user with two 56-Kbps modems and two independent phone lines can call a multilink-enabled RAS server with both lines and get a total (theoretical) bandwidth of 112 Kbps. One of the properties you can control using a RAS profile is how a multilink-enabled client behaves when it is not using all of the bandwidth...

Administrative Shares

Depending on the configuration of the computer, some or all of the special shares may appear when Windows 2000 presents a list of shared resources. Special shares are created by the system and should not be deleted or modified. Windows 2000 creates several administrative shares by default. These shares are used for remote administration and are normally hidden from the nonadministrative users. All administrative shares end with a . Table 5.7 provides a list of administrative shares and their...

Routing Information Protocol RIP and Service Advertising Protocol SAP for IPX

Routing Information Protocol (RIP) and Service Advertising Protocol (SAP) are protocols used in a legacy NetWare network. (NetWare has also made the migration to IP, but it continues to support IPX). RIP for IPX is a protocol used to exchange routes across a network. It allows routers to learn about new networks so clients may connect to servers on those distant networks and vice versa. RIP is a distance vector protocol. This means that the router will exchange all its routing information on...

Figure Location of Folder Redirection options within a GPO

Jji Support USA GPO NARCOLEPSY.support2000.citrix.com Policy fcj) Scripts (Logon Logoff) + Security Settings File Folder File Folder File Folder File Folder _ Start Menu + _ Administrative Templates For each of the subdirectories listed beneath Folder Redirection, you can define network share points that will house the data for the affected users. For example, the user-specific portion of the Start menu (the icons above the dividing line in Start menu > Programs) can be redirected to a single...

Managing Disk Quotas

Disk quotas are similar to credit card limits. When you have a credit card that has a limit of 3,000, you can spend up to and including 3,000. However, if you have reached your credit limit and you want to charge anything else to your credit card, you need to pay off some of the balance first. Disk quotas are used to manage the growth and size of file storage for each user or groups of users. They allow you to determine how much disk space each user or groups of users receive (credit limits)...

Setting Up a Stand Alone DFS Root

The administrator for the corporation.com network must set up a stand-alone DFS root to be used as the intranet. This new DFS root incorporates both current DFS servers into a single namespace, and this namespace can then be incorporated into the existing fault-tolerant DFS root (via an Inter-DFS link). When the root has been set up, Microsoft Internet Information Server can be directed to use the combined DFS namespace for all intranet activity. The fact that the intranet is spread out among...

Backup and Recovery

Microsoft's included backup utility is a great improvement upon the one provided with earlier versions of its operating system. Before you rush out and purchase third-party programs to handle your backups, take a look at Microsoft's included utility,which is capable of performing backups even for large organizations. In addition to tape drives and hard drives, data can be backed up to a variety of magnetic as well as optical storage devices. Of course, it supports all the standard backup...

The Recovery Agent

Private keys are kept in a protective key store. If users lose their file encryption certificates and private keys, they can be recovered by using the recovery agent. The recovery agent, which can decrypt their files, is part of the recovery policy that is implemented when a user receives the first file encryption certificate. When the recovery agent receives the data recovery certificate, it should export it, store it in a safe place, and then delete the data recovery certificate from the...

Authoritative Restore

Once we restored our Windows 2000 computer in the previous exercise and then restarted the computer, the Active Directory will begin replicating directory objects across all domain controllers in this domain. If you remember, we can only restore the Active Directory on domain controllers. The Active Directory replicates similarly to the File Replication service. We performed nonauthoritative data recovery, which is the default method. Once restarted, this server will be brought up to date with...

Data Recovery

If the Encrypting File System is used, there will always be scenarios in which data recovery will be required for example, if a user loses a file and needs to restore it, or if users leave an organization and later have a need some for files they had worked on. EFS has built-in mechanisms to allow for many different situations that require data recovery. EFS accomplishes this by requiring that a recovery policy be set up before encryption is made available. This allows a person to be designated...

Copying and Moving Compressed Files and Folders

In Windows 2000, as in Windows NT 4.0, there are rules that determine the compression state when you move and copy files and folders within and between volumes. There are also rules that determine the compression state when you move and copy files and folders between FAT and NTFS partitions. Compression is a feature of NTFS volumes only and cannot be performed on a FAT volume. Copying compressed files and folders can cause performance degradation, because Windows 2000 uncompresses the file,...

Command Line Administration

As with most tasks in Windows NT Windows 2000, DFS administration can be done in several ways. The earlier examples used the DFS MMC snap-in to perform GUI administration. A command-line DFS administration tool ships with Windows 2000. This command-line tool can be used to script or automate the setup and maintenance of the DFS namespace, or can be used by an administrator who prefers to use the command line. The DFS command-line tool is called dfscmd.exe, and is located in systemroot system32....

Using Administrative Templates

Administrative templates, files with the extension .adm, are used in Windows 2000 to identify the registry settings that you can modify using the Group Policy snap-in. Windows NT 4.0 also used .adm files that were modified using the System Policy Editor. The .adm files used in Windows 2000 are similar to those used in Windows NT 4.0 in that they are ASCII files that are format compatible between the two operating systems. All .adm files consist of a hierarchy of categories and subcategories...

Setting the Special Access Permissions

The special access permissions are accessed much as are regular permissions. They can be thought of as advanced security settings. To set the special access permissions 1. Right-click the folder or file for which you want to change the permissions and select Properties. 3. Click the Advanced button to open the Access Settings dialog box see Figure 5.5 . 4. Ensure that the Permissions tab is selected. 5. Select the user for whom you want to change the permissions and click View Edit see Figure...