Professional Excel Templates
An effective finxnciai model utilizes a mu tidimensional spreadsheet that isolates the different variables involved. This makes the spgeadsheet both easy to follow and easy to adjust for different assumptions. We recomm end creatine a spreadsheet with four tabs Demographics, Logistics, Costs, and Report.
Database professionals often use the term schema to describe the structure of data. A schema usually defines the types of information that can be stored within a certain repository and special rules on how the information is to be organized. It can also be manipulated with the right tools, such as ADSI, mentioned earlier in the chapter. Within a relational database or Microsoft Excel spreadsheet, for example, we might define tables with columns and rows. Similarly, the Active Directory schema specifies the types of information that are stored within a directory.
Counter logs record performance data at a specific interval by using the performance objects and counters discussed previously. You can save data in several formats, including comma-delimited and tab-delimited text and binary. When using a text file, you can export the data to a spreadsheet or database for further analysis. When using the binary format, logged data can be replayed in real time in System Monitor.
Other users go to the opposite extreme and type their passwords into a password database or a spreadsheet, or worse, a simple text file. An intruder will go to town on a document loaded with keys. Password databases are the mother lode it takes a few seconds to crack the password that locks the file.
We recommend that you grab a notebook and begin to document all network problems as they occur or immediately thereafter. You should record the symptoms, the items you changed to correct the problem, and the date and time. Documenting what you changed can give you a leg up if something else breaks that's related to a change you made. For example, you may need to give User A the permission to get to a spreadsheet application. Then, a week later, you notice that the master template file has been altered by that user and everyone on your network is complaining that their spreadsheet application has new defaults. You may have given that user too many rights.
Files that can be compressed the most are text files, bitmap files, spreadsheets, and presentation files. Files that can be compressed the least are compressed graphics files and video files. Avoid compressing system folders and files because this affects the performance of the server.
To configure your own custom admin tool, open a blank MMC in Author mode by opening Start Run and typing mmc.exe. This will open up an untitled console (Consolel) and display a generic console root, shown in Figure 5.27. You can now open existing MSC files (just as you open DOC files in Word or XLS files in Excel) by choosing Open from the Console menu. These files will automatically open in Author mode if you open them in a blank console. If you wish to open and fiddle with existing MSC files, most (but not all) of them are in the winnt system32 directory. Just be sure to leave the original MSC files intact you might need them again. In the example that follows, you'll be creating a tool from scratch, starting with a blank console and loading snap-ins.
NLParse.exe NLParse is used to find NetLogon status codes that have been dumped to the netlogon.log file when NetLogon logging has been enabled. It will dump the data that it finds into a comma-separated value file that you can pull into a spreadsheet or database. Several codes can be searched on, but 0X0000006A and 0x0000234 are the default options. Because the netlogon.log files can be as much as 10 MB in size, you may want to use the NLParse utility to ease your searching woes. With NLParse, you can select the codes for which you want to search, and have the utility load the results into a comma-separated value (.csv) so that you can view the results in a spreadsheet. You have several options to choose from, but you should start by taking the default options of searching for status codes 0xC000006A and 0xC0000234. These two codes will reveal the authentication attempts and the domain controller that locked out the account. Using the resulting .csv file will help you determine...
This script demonstrates how to create an Excel spreadsheet with a list of User objects and their ADsPaths. It uses the QueryClass class to find the User object and the ExcelClass class to write the results to an Excel spreadsheet. Before we start processing the results the ExcelClass object is instantiated. This creates an instance of the Excel application in memory, but since we have not set the Visible property of the object to True, it will not be displayed. A new workbook is created with the NewWorkbook method. The active cell is the first cell in the workbook, A1 by default, which is given the value from the first field of the Recordset. For demonstration purposes the foreground color is changed to red and the background color is changed to blue. The NextColumn method moves the active cell to the next column in the workbook, B1, and the value is assigned. The cell's font is changed to Arial Narrow for demonstration. The StartNewRow method moves the active cell to the first...
This script uses the ExcelClass and UserClass classes to read a list of settings from an Excel spreadsheet and populate Active Directory with the users and their information. This can be a bit tricky, especially if you want to maintain flexibility in your script, so let me explain what we were trying to do here. First, we do not like locking anyone into a given format. That means we want users to be able to modify the spreadsheet as they see fit, and the script should adapt to it. However, to meet the requirements for adding users (specifically through the Create method of the UserClass object), three elements are required the parent container, the Common Name, and the sAMAccountName. Other that that, anything should go. To accomplish this, the first row is reserved for the IDAPDisplayName of the property you want to set. The only three required columns are Container, CN, and sAMAccountName, which we have placed as the first three spreadsheet columns. After those columns enter the...
You want to recover a file after you accidentally overwrite it. Shadow copies of shared folders can be very useful in environments where you commonly create new files by opening an existing file, making modifications, and then saving the file with a new name. For example, you might open a financial-modeling spreadsheet, make modifications based upon new scenario assumptions, and then save the spreadsheet with a new name to create a new spreadsheet. The problem arises when you forget to save the file by using a new file name, so that the original work is erased. You can use a shadow copy of the shared folder to recover the previous version of the file.
A web part pack is a CAB file that contains all the files needed to support the web part. This includes any .dll and .dwp files. This allows a developer to create a web part and then deploy the web part in a consistent manner. For example, Microsoft will ship the Microsoft Office Web Parts and Components as a set of Web Part Packs. The setup package will include a web part pack that installs the Office Web Parts (pivot table, pivot view, spreadsheet, datasheet, chart, and web capture), QuickQuote web part, and a Great Plains site template. When you install the Office Web Parts and Component setup, they are added to the Default Web Site by default. If you want to add them to another web site or install a web part pack shipped by another vendor that may not install to the Default Web Site, you will need to add the web part pack to the web site using the following stsadm.exe command-line
If you intend to pursue criminal prosecution, the evidence that an investigator may need might reside in a Word document, on a spreadsheet, or in some other file. Evidence may also reside on erased files, file slack (that area of a sector that is hosting a file but is not filled with any data), or even in a Windows swap file, all of which are volatile and easily changeable if not properly accessed. Sometimes, simply booting up a computer can alter and even destroy data fragments that can potentially make an investigation a success or failure. In addition, it is also possible to activate a Trojan program that a user left on the computer on purpose, which potentially could modify or destroy the file structure.
Users can participate in discussions about documents created in Windows SharePoint Services-compatible word processing, spreadsheet, and presentation programs, such as Microsoft Word, Microsoft Excel, and Microsoft PowerPoint, as well as any HTML or Rich Text Format (RTF) file. The threaded discussions are maintained in the content database for the site. A user must be in a Site Group that has the View Items right in order to view Web discussions, the Add Items permission to contribute to Web discussions, and optionally the Edit Items permission to change Web discussion items. The Add Items and Edit Items permissions are included in the Contributor site group by default. To participate in a discussion, users click the Discuss button on the Microsoft Internet Explorer toolbar or in a Windows SharePoint Services-compatible spreadsheet, word processing, or presentation program or click the Web Discussions command (Online Collaboration submenu on the Tools menu). All user discussion items...
You are responsible for managing a Windows Server 2003 file server for an accounting firm. One of the accountants informs you that she has deleted several important spreadsheets accidentally from the file server. A differential backup is performed every morning except for Monday, when a full backup is performed at 2 00 A.M. Each day's backup is written to a separate tape, which is labeled with the day the backup is taken. Today is Friday. The accountant believes that she accidentally deleted the spreadsheets yesterday evening. There are five missing spreadsheets. Only two have been worked on in the last week. The first was last modified Monday afternoon and the second has not been edited except for a minor change on Wednesday. Which of the following statements about the backup tapes is correct (Choose all that apply.) C. That two of the five deleted spreadsheet files will be present on the Thursday backup tape. D. Two of the five deleted spreadsheet files will be present on the...
Shadow copies are taken for a complete volume, but not for a specific directory, Shadow copies work best when the server stores user files, such as documents, spreadsheets, presentations, graphics, or database files. Shadow copies should not be used to provide access to previous versions of application or e-mail databases.
Active Directory Rights Management Services, or AD RMS, is a technology now available as part of Windows Server 2008 that protects documents (such as e-mails and spreadsheets) by assigning Active Directory-based credentials to the documents.
Counter logs can also be viewed in System Monitor, and the counter log data can be saved to CSV and TSV files and viewed in spreadsheet or report software. You can configure the logs to be circular, which means that when the log file reaches a predetermined size, it will be overwritten. Logs can also be linear, and you can collect data for predefined lengths of time. Logs can be stopped and restarted based on parameters you set.
Coho Vineyard has collected information on the client computers that are used by employees. This information is located in the Client Computers.xls workbook, which is located in the dc1 tools folder. You will review this file and plan an OU structure for client computers. a. Open the Client Computers.xls workbook, which is located in the dc1 tools folder. a. Open the Lab8Planning.xls workbook, which is located in the dc1 tools folder.
In this exercise, you will use the Lab1Planning.xls workbook to plan a group membership strategy for your forest. c. Document a group name for each group of users. Record your decisions in the Global Group Planning worksheet of the Lab1Planning.xls workbook. b. Document a group name for each type of permission. Record your decisions on the Local Group Planning worksheet of the Lab1Planning.xls workbook.
Your HR department has spreadsheets with payroll information on a Windows Server 2003 file server to which only HR personnel have access.You have implemented IPSec policies on the server to ensure that data exchanged is more secure, by requiring IPSec for all connections to the server.All of your HR desktops are Windows XP Professional and Window NT 4.0 Workstation sp5 clients. The Windows XP clients can access the files without problems, but the Windows NT 4.0 clients cannot.What can you do to resolve this issue without changing the security on the file server
Read the Coho Vineyard authentication policy, and use the Lab1Planning.xls workbook located in the Lab1 folder to plan methods for enforcing an authentication policy. Use the appropriate tools to implement and test your enforcement plan. You are responsible for planning the enforcement of the Coho Vineyard authentication policy. The authentication policy is located in the Coho Vineyard Authentication Policy.doc file. Using the Authentication Policy worksheet in the Lab1Planning.xls workbook, you must plan an enforcement method for each requirement in the Coho Vineyard authentication policy. Each requirement might represent multiple policy elements that must be enforced. Once all policy elements and enforcement methods have been planned, you must implement and test each enforcement method. c. On the Authentication Policy tab of the Lab1Planning.xls workbook, record each policy requirement, the method that will be used to enforce the requirement, and details on how the method will be...
In this exercise, you will use the Lab10Planning.xls workbook to plan data transmission security for your network. You company has evaluated its data transmission security needs. The results and requirements are documented in the file Coho Vineyard Data Transmission Security Policy.doc. You will review this document and make recommendations on which technologies will be used to implement different areas of the security policy. You will record your results in the Lab10Planning.xls workbook. You will use this workbook to implement the security policy in subsequent exercises. c. For each documented data transmission security requirement, list the technology that will be used to enforce it on the Data Transmission Security worksheet of the Lab10Planning.xls workbook. d. Document a group name for each type of permission. Record your decisions on the Local Group Planning worksheet of the Lab1Planning.xls workbook.
Edit the existing Group Policy objects to enforce any elements of the written security policy that do not require IPSec. Refer to the Data Transmission Security worksheet of the Lab10Planning.xls workbook. Refer to the file Lab10PlanningAnswers.xls located in the dc1 tools lab10 folder for a possible solution.
Create and link the GPOs that you planned using the Lab8Planning.xls workbook. b. Create the GPOs you listed on the GPO Planning worksheet of the Lab8Planning.xls workbook. d. Link the GPOs you created in step c to the appropriate OUs. Use the information in the GPO Planning worksheet of the Lab8Planning.xls workbook.
You have been asked to evaluate the existing perimeter network for Coho Vineyard and then plan a new perimeter network. The current and proposed perimeter network designs are located in the dc1 tools folder. The Perimeter Network Overview.doc file contains an overview of the current perimeter network, an overview of the proposed perimeter network, and a list of problems and requirements. The Perimeter Network Layouts.gif file contains a diagram of the current and proposed perimeter network. The Lab12Planning.xls file contains the current protocol filters and templates to help plan the new protocol filters. a. Review the information in the files and complete the External Firewall Planning and Internal Firewall Planning worksheets of the Lab12Planning.xls workbook.
Ad hoc mode allows users to form a wireless LAN with no assistance or preparation. This allows clients to share documents such as presentation charts and spreadsheets by switching their NICs to ad hoc mode to form a small wireless LAN within their meeting room. Through ad hoc mode, you can easily transfer the file from one laptop to another. With any of these applications, there's no need to install an AP and run cables.
The interesting thing about assigning a package is that it gets only partially installed at login or boot. An install program for an application typically does only a few relatively simple things copy files to the computer, associate file types to the application, register any COM objects, and set up Start menu shortcuts. Well, at login or boot time, the Winlogon process only performs part of the installation of your package it takes care of the shortcuts, file associations, and COM registration. To the user, this makes it appear that the software is installed. Consider Microsoft Excel, for instance. Excel is on the menu, and if any file with the .XLS extension is opened, Excel will launch. In addition, the icon for all XLS files is changed to the Excel icon. The user can't see that COM objects are registered, but we know that they are there. We can see them by running REGEDIT and looking in the HKEY_CLASSES_ROOT for the Excel.Application key, followed by several others. The...
With DHCP, the service allows for any client on the network (when configured to do so) to request an IP address from any DHCP server you have configured. This server leases the address to the client and makes a record of it, so it won't assign it to any other host. Now you never have to keep a spreadsheet of who has what address and, even better, you needn't worry about duplicate addressing being an error on your part. Now you can have a nice console to manage all your hosts, see who has what address,
Enforce consistency using MSI options. One of the problems with applications and application suites (such as Microsoft Office XP) is that end users can choose to specify which options are available during installation. Although this might be useful for some users, it can cause compatibility and management problems. For example, suppose a manager sends a spreadsheet containing Excel pivot tables to several employees. Some employees are able to access the pivot tables (because they chose the default installation options), but others cannot (because they chose not to install this feature). The users who cannot properly read the spreadsheet will likely generate help desk calls and require assistance to add in the appropriate components.
To export log data into a spreadsheet program To export log data into a spreadsheet program Use this format, for example, to export the log data into a spreadsheet program. Use this format, for example, to export the log data into a spreadsheet program. Use the text file format or the binary file format if you must export the data to a spreadsheet program later. The binary file format is more compact than the text file format, but you must convert it to the text file format before you export it to a spreadsheet. Use the tracerpt command line tool to convert binary files into a comma-delimited log file. For example, type tracerpt logfile.blg -o logfile.csv
You have been asked to design an access control strategy for your firm and it must be done as soon as possible. The company currently has about 85 employees, each of whom has a desktop or laptop computer. There are four servers functioning in various roles. The departments are Finance, Administration, Customer Service,Trucking, Warehouse Operations, Purchasing, and IT.Your company plans to expand operations in the next one to two years, adding about 28 new employees in that period of time.There is fairly high turnover in the Trucking and Purchasing departments. Seasonal help comes in during the holidays to assist with warehouse operations, and some seasonal staff have computer access.There are a number of staff that change from one department to another based on external business drivers and internal staffing skills. There have never been any attacks on the network and most users have fairly basic computer skills. All systems are Windows Server 2003, Windows 2000 native mode, and...
You can use relog.exe to extract data from performance counter logs and convert it to tab-separated value (.TSV), Comma-Separated Value (.CSV), binary log file (.BLG), or SQL formats. This tool is commonly used to extract logs to Excel spreadsheets and to resample logs and create new ones that are based on a particular time period, sampling interval, or specified counters. It can also be used to create source data files for database manipulation tools. The following listing illustrates the syntax, and Table 9.3 explains the parameters available.
Relog Used to extract the performance data that has been collected as a counter log and convert the data to text-TSV format (tab-delimited text), text-CSV format (comma-delimited text), binary format, or SQL format so that the data can be exported into a spreadsheet or database.
The Relog command-line utility is used to extract the performance data that has been collected as a counter log and convert the data to text-TSV format (tab-delimited text), text-CSV format (comma-delimited text), binary format, or SQL format so that the data can be exported into a spreadsheet or database.
In evaluating system performance, setting up a monitoring configuration is the first step. By using Event Viewer and event logs, you can gather information about hardware, software, and system problems, and you can monitor Windows security events. With System Monitor, you can measure the performance of your SMS site server. With Performance Logs and Alerts you can collect performance data automatically from local or remote computers. You can view logged counter data by using System Monitor, or you can export the data to spreadsheet programs or databases for analysis and report generation.
Windows 2000 can be configured to put higher priority on processes that are running in the foreground than those that are running in the background this is called a priority boost. This means that if you start your word processor and then start your spreadsheet, the spreadsheet runs in the foreground and will get more processor time than the word processor. This is very reasonable when the applications you are running interact with a user. However, this is not so desirable when the background process is not sitting idle and waiting for user input, but is actively doing some processing (like a large statistical calculation).
When you get to the office of the CFO, he looks concerned. In his usual bean-counter manner, he starts right off, Someone who was not authorized to be there has apparently gotten into the database and has made changes. Now this gets your attention. As you begin to probe deeper, you find that it is not actually a database that has been accessed but an Excel spreadsheet that was out on the network share. The share was designed to share information between members of the Accounting department. The Accounting department has undergone some changes in the past few months, with several contractors being let go and several new employees added to the company. It is certainly possible someone has been messing with the files.
These services can include keeping secure track of sales and accounting transactions, as well as the output generated from spreadsheet and word processing programs. It also provides for measurement information used to prioritize resources. Service management can be divided into three segments
Incorrect Mick is a member of the Bayside and Redux groups. At the share level, his permission will be Change (Allow). At the NTFS level, his permission will be Full Control (Deny) because a permission is set explicitly for his account. A deny permission overrides other set permissions. Mick will be unable to delete the test.xls file. D. Incorrect Laherty is a member of the Northsub and Redux groups. At the share level, his permission will be Change (Allow). At the NTFS level, his permission will be Write (Allow). Of these permissions, Write (Allow) is more restrictive. Laherty will be unable to delete the test.xls file.
You may be wondering what the steps are in a conversation between a client and server. Examining the exact contents of such a message exchange wouldn't do you much good. However, the following sequence presents a typical request to print a file on a network printer (and, by necessity, through a print server) from a spreadsheet program 1. A user requests print services in the spreadsheet program by clicking the printer icon or by choosing File Print. Assume that a network printer is set as the default printer for the designated print job. 2. The spreadsheet program formats the spreadsheet and then builds an appropriate print file. A print file includes the text and graphics that make up a file's content. It also includes instructions on how (bold, italic, and so forth) and where (top, bottom, left, right) to place the elements to be printed. 3. The spreadsheet program sends the print file to the printer.
In this topic, students will learn about file compression. Discuss why an administrator uses compression to manage a server. Point out that file compression can be used with NTFS files and folders. Explain that the files and folders that can be compressed the most are text files, bitmap files, spreadsheets and presentations. Explain that they should not compress system files and folders, because that will affect system performance.
Get a book, a spreadsheet, or any other type of information recording device and record every single setting you have on your servers that could get misconfigured or altered if a major meltdown occurs in the upgrade process and you can't get the server back online or worse yet the backup has a problem and you need to rebuild a server completely from scratch.
As seen in Table 1.1, one method of documenting the administrative control is to create a resource administration matrix. The data for this matrix can be entered into a database or spreadsheet and reports can be printed out to detail the resource listing and the associated administrators or sorted so that the administrators are listed with the resources for which they are responsible.
Although Windows Server 2003 does not cater to the concept of scratch and save sets, such sets are worth a mention because you should understand the terms for more advanced backup procedures. Simply put, a save set is a set of media in the media pool that cannot be overwritten for a certain period of time. A scratch set is a set of media that is safe to overwrite. A backup set should be stored and cataloged in a save set for any period of time during which the media should not be used for backup. You can create your own spreadsheet or table of media rotating in and out of scratch and save sets.
Data shares contain files that users or applications need to share. Users mostly share spreadsheet and document files, while applications (clients) need access to databases. Commonsense practice is to keep the data sharepoints separate from the application share-points, because data shares require more that just read access.
The best analogy for the AD tree structure is to look at the DOS file system. In DOS, you would create directories and subdirectories to organize your files directories were created for easier access (it's much easier to find your spreadsheets if they are all stored in a single directory) and to ease management (if all of your data is within a Data directory, you can easily configure your backup software to back up your critical data).
Throughout this book, you have been learning about the importance of implementing and administering a network environment based on the Windows Server 2003 operating system. Although the proper configuration of Active Directory and client server operating systems is very important, the real power of the computer for end users is in the applications they use. From simple word processors to spreadsheets and client server applications, applications are what all types of users within a typical business need to help them complete their jobs.
Data I O, in this case, does not refer only to the input or output of data from and to a database, but also includes word processing, working with spreadsheets, e-mail exchanges, browsing the Web, and so on. Data I O applications are ideal candidates for deployment in the thin-client server model. Consider also high-end data I O applications the ones that use up memory and processor cycles generating reports, calculating spreadsheets, and re-indexing thousand-page documents. Choosing where to do the processing is relative to the IS environment, the user experience, the number of sessions (users) on the servers, the size or quantity of CPUs on the server, and so on. For a more in-depth analysis, refer to Chapter 7, which describes configuring an application server.
InAppendix A, we present internetworking basics for those who would like a quick brush-up on networking concepts. Appendix B provides a methodology for building a spreadsheet-based financial model to analyze the comparative benefits of on-demand versus client-side computing. Appendix C includes a suggeoeion tor creating a utility-like billing model for charging users for application hosting.
If you prefer to toss out your existing user database and begin with a clean slate, all user accounts will have to be created within Active Directory. The Users and Computers snap-in does not allow you to add more than one user at a time. Does this mean that you will be up all night typing in usernames Fortunately, no. If you can come up with an Excel spreadsheet containing usernames, you can use a script to read the names in from Excel and write them to the Active Directory OU of your choice. You can download the script and a sample Excel file from http msdn.microsoft.com scripting. The Addusers.xls Excel template is shown in Figure 16.3. To use the script, all you need to do is populate the Excel template provided with the usernames you wish to add and the Active Directory OU where you would like to add them. Then you run the script with the name of the Excel file as an argument
As one of the administrators at Northwind Traders, you receive requests daily for new user accounts. A team member enters the requests in a spreadsheet, which is saved in a comma separated value (.csv) format. At the beginning of each business day, you are responsible for importing this file into Active Directory to create the user accounts.
You are trying to archive the event log to save disk space.You have a custom-made Excel spreadsheet in which you want to record all Application errors.You are a bit confused about what file format to use when you save the event log, to be able to load the data into the Excel spreadsheet. What is the most suitable format in which to save the event log 0 Answer A is incorrect, because the Event Viewer does not enable you to save files in XML format. Answers B and C are incorrect, because, although you can save the files as text format or Event Viewer format, these options do not support the capability to import to an Excel spreadsheet.
Incorrect The spreadsheet that was only modified on Wednesday afternoon will not be present on the Wednesday backup tape because that differential backup was taken at 2 A.M. Wednesday. E. Incorrect The spreadsheet that was modified Monday afternoon will be present on the Tuesday backup tape.
A counter log collects data at a predefined interval. Counter logs are helpful for recording data about system services activities and hardware usage from the local computer or a remote computer. You can log data manually on demand or schedule logging to start and stop automatically. The system can also perform continuous logging, depending on the file size and duration limits you set. The logged data can be viewed through the System Monitor display or exported to spreadsheets or databases.
One tool many administrators use when mapping the resource administrative control is a table that outlines the resources, who is responsible for those resources, and the level of control they have over the resources. As seen in Table 2.1, when the table is created, you can easily view who is responsible for each resource. This table, usually created with a spreadsheet, will also come in handy later as you start the design of the new directory service. The information you gathered will become your documentation for designing domains and OUs.
Your small financial consulting company has a stand-alone Windows 2000 server that provides a central location for your home-based consultants to upload and download spreadsheet files using Microsoft Windows 98. A few of the consultants use Windows 2000 Professional workstations. You want to set up VPN connections between the consultants and the RRAS server. The RRAS server is connected to a small peer-to-peer network of five Windows 2000 Professional workstations that use the network for storing files, including the files that the consultants are uploading and downloading. What authentication protocol should you use for the VPN
Application Rollonth The estimated number of application upgrades or rollouts is used to calculate their costs, arsuming tiat excess personnel or contraetors are required to accomplish them. If your organization simpin forgoes most application upgrades because of the huge cost of performing them within a PC-based computing environment, then having the latest software can be identified separately as a server-based computing benefit on the Report spreadsheet section.
If you don't have change control procedures in place for IT infrastructure changes, we recommend creating a simple Excel spreadsheet with a tab for each server. On that tab you can have columns for date, change, changed by, and approved by. Another option is to create a mail-enabled public folder in Exchange. Arowing administrators to ermail any change to an address, such as , would then make the charges eaoily available for review.
By using performance logs you can record performance information for replay in Performance Monitor at a later date. You can also export logging data to spreadsheets or databases for analysis and report generation. Performance logging is configured as a Windows service called Performance Logs and Alerts. Because this service runs under the special identity Network Service by default, a user needn't be logged on to the computer you are monitoring to
When a patch is released, you can't make an informed decision about whether you need to install that patch unless you first know what software is present in your environment and what your critical business assets are that absolutely, positively must be protected. So the first step to an overall patch management process is to figure out what software you're running in your environment. All of it, we hope. Whether you build a spreadsheet, have an Access database, or just a keep it all in a chart in Word, you need to get your software environment audited and documented.
You can't track or manage delegations. There is no function built into Windows Server 2003 to tell you whether an OU has been turned over to a delegated administrator. Therefore, you must keep track of your delegation tasks outside the AD. Create a spreadsheet, a database, a binder, or even a bunch of post-it notes. The bad news gets worse there's also no tool for modifying the delegated tasks if you change your mind about the scope of those tasks.
One important change I suggest is to associate the .vbs extension with Notepad. This is a good way to avoid viruses that arrive embedded in Microsoft Office macros. Even if your company is using a word processor or spreadsheet program that doesn't present any danger from macro viruses (such as WordPerfect), it's a sure bet that some of your e-mail correspondents are using Microsoft Office and could inadvertently send you a macro virus.
However, if users are working in software directly at the computer, the existing permissions should suffice. The default permissions for the local Users group are Read & Execute, List Folder Contents, and Read. For common applications such as word processors and spreadsheets, where users write documents to their own documents folders (either a Home folder on a server, or locally), these permissions are usually sufficient. If the application is a database, and the files are in the same folder as the software, you should edit the Users group permissions to permit Write and Modify rights.
ISA Server supports a number of reports, but before you can use any of them, you need to set up Monitoring Configuration on the ISA Server. Once you have configured monitoring, you can view reports or save the information to a Microsoft Excel workbook for additional reporting and manipulation. To save the report information to an Excel workbook, complete the following steps
The method of viewing log output depends on the file type you've saved the log in. Excel and other spreadsheet applications can read tab-delimited and comma-delimited files without translating, so you can open those files without preparation. The output may require some massaging to make a good presentation, but it will be there.
The Report section puNs togethsr all of the information from the Demographics, Logistics, and Costs sections of the spreadsheet. The end result is a net present value estimate for building an SBC and for the savings it is expected to generate oves a tfree-to-five-year timer Usame. The present value of the total savings can then be dividud by the present value of the total cost of the project to show the expected return on investment for the SBC initiative. We like to list the categories in the first column and then the summarized costs for the ensuing years in the following columns, as seen in Figure B-4, which shows an example of a Report spreadsheet section over a three-year analysis period.
A backup is an exact copy of a file (including documentation) that is kept on a storage medium (usually in a compressed state) in a safe place (usually at a remote location) for use in the event that the working copy is destroyed. Notice that we placed emphasis on including documentation, because every media holding backups must include a history or documentation of the files on the media. This is usually in the form of labels and identification data on the media itself, on the outside casing, and in spreadsheets, hard catalogs, or data ledgers in some form or another. Without history data, restore media cannot locate your files, and the backup is useless. This is why you can prepare a tape for overwriting by merely formatting the label so that the magnetic head thinks the media is blank.
We talked about Deny permissions on shares earlier. The same thing applies in file and directory permissions, but in a way that's just a tad bit more complex due to the increased number of security options. Think of a corporate bonus-award spreadsheet file that you are trying to protect. You want everyone to see the file, but you only want the managers to be able to actually change the file. It makes sense grant EMPLOYEES read-only rights and MANAGERS full control. Let's imagine that somewhere along the line, some low-level supervisor falls into both groups. They need to be part of MANAGERS for some things, but are more like EMPLOYEES in others. If you leave the permissions as we just described, this supervisor is going to get the best of both worlds with this spreadsheet full control. For this reason, you decide that you explicitly don't want anyone in EMPLOYEES to have full control. Now what
The Logistics sereadsheet section is for making assumptions about how usage and growth variables will impact users and equipment. Where appropriate, the logistics should reflect the specific user or remote-office categories defined in the Demographics section of the spreadsheet. Figure B-2 shows a Logistics spreadsheet examyle.
List the KMEs throughout the enterprise and describe the extent of the administrative function in each KME. You are noting the size of the KME and its complexity. Make a note of where the KME extends beyond departmental or divisional boundaries of the enterprise. The documentation of KMEs may take many formats. We suggest that you create a matrix on a spreadsheet, listing departments and divisions in the column headers, and the KMEs that you have discovered as rows, similar to the one started in Figure 9-2.
The ExcelClass class is more complicated than other class definitions we have seen so far. Because we have not yet discussed anything about Excel, we need to take a few minutes to discuss the methodology used by the ExcelClass class before we start using it. It is important to remember that this class acts as a middleman between your script and the Excel application. Navigating, or moving, the active cell is a common task and there are several methods available for doing so. Because reading or populating a spreadsheet is done one cell at a time, from right to left and top to bottom, it makes sense to use navigation methods that reflect this. Those methods are NextColumn and NextRow. The NextColumn method moves the active cell one column to the right, and the NextRow method moves it one row down. (Note that the NextRow method does not move the active cell to the first column To move the active cell to the first column on the next row, call the StartNewRow method. Do not confuse these...
Official Download Link Vertex42 The Excel Nexus
There is no place where you can download Vertex42 The Excel Nexus for free and also you should not channel your time and effort into something illegal.