Chapter 04 - End of Year Review Sheet - RBMA-IT

advertisement
Lesson 4
Lesson 4 - Managing Applications, Services, Folders,
and Libraries
Learning Objectives
Students will learn to:
 Understand Local versus Network Applications
 Remove or Uninstall an Application
 Understand Group Policy and Application Installation
 Understand Service Startup Types
 Understand Service Accounts
 Understand Service Dependencies
 Understand MSCONFIG
 Understand FAT, FAT32, and NTFS
 Add Multiple Local Locations to a Library
 Add Networked Locations
 Understand Encrypting File System (EFS)
 Understand Security (Encryption)
 Understand Compression
 Understand BitLocker
ODN Skills














Understanding local versus network applications.
Removing or uninstalling applications.
Understanding Group Policy.
Understanding service startup types.
Understanding service accounts.
Understanding service dependencies.
Understanding MSCONFIG.
Understanding FAT, FAT32, and NTFS.
Adding multiple local locations to a library.
Adding networked locations.
Understanding Encrypting File System (EFS).
Understanding security (encryption).
Understanding compression.
Understanding BitLocker.
3.1.1
3.1.3
3.1.2
3.4.1
3.4.2
3.4.3
1.3.5
4.1.1
4.4.2
4.4.3
4.3.2
5.2.2
4.3.3
4.3.1
Lesson Summary
A program that runs “on top” of the operating system or from a server and helps a user
perform a specific task, such as word processing, appointment scheduling, or accounting.
You install applications, or programs, either at the local level or the network level. A
1-1
Lesson 4
local installation results in the software files running directly from a computer. Installing
over a network generally means the software files are made available from an application
server on a network. The network method, along with Group Policy, gives an
administrator more efficient control over who can use the software and who can remove
it.
In a Windows network (a domain environment), administrators can use Group Policy to
ease the burden of administering and managing many users and client computers. Group
Policy lets you control who may install software, and on which computers. It helps you
push software updates and security configurations across the network. Group policies
also exist in Windows 7 and other Windows operating systems. They are referred to as
Local Group Policies and affect only the users who log on to a particular computer.
Windows 2008 R2 Active Directory Domain Services (AD DS) uses Group Policy to
push applications to users or computers. Using Group Policy, you can assign or publish
an application to all users or computers in a designated site, domain, organizational unit
(OU), or to a local, individual user or computer.
Important concepts:

If you set up Group Policy to assign the software on each computer, the software
is installed the next time the computer starts and any users with the correct
permissions who log on to the computer may run the software.

If you use Group Policy to assign the software to users, the next time an
authorized user clicks the Microsoft Office shortcut or menu item, the software
installs on the user’s computer and Office opens.

If you publish an application to users, the next time a user logs on, he can choose
to install the software from a dialog box that appears.
Services run in the background on a Windows system to help the operating system run
other programs. The Services console is the central management point of services in
Windows Vista and Windows 7. There are different service startup types:

Automatic (Delayed Start): The service starts approximately two minutes after
the system has completed starting the operating system.

Automatic: The service starts as the operating system starts.

Manual: The service must be started manually, by a user, a dependent service, or
a program.

Disabled: The service is disabled and will not start.
The System Configuration Utility, also known as MSCONFIG, lets you enable or disable
startup services, set boot options such as booting into Safe Mode, access tools like Action
Center and Event Viewer, and more.
There are three primary types of file systems for Windows: FAT, FAT32, and NTFS. It’s
best to use NTFS-formatted disks for Windows Vista and Windows 7 because NTFS
handles small to very large hard disks, provides better security, and is the most reliable.
1-2
Lesson 4
You can convert from one file system to another, but some conversions destroy existing
data. You should back up data before converting a disk from one file system to another.
Windows 7 libraries - are virtual folders that can display content from different locations
(folders, for example) on your computer or an external drive. A library looks like an
ordinary folder but simply points to files and folders that are located elsewhere. You
access libraries in Windows Explorer, just like you do files and folders. The default
libraries are: Documents, Music, Pictures, and Videos. You can also create a new library.
Encrypting File System (EFS) - is a file system that is “scrambled” but still readable and
usable by the user who encrypted the file; that user —and any other authorized users—
can open and change the file as necessary. However, an unauthorized user who tries to
open the file or copy it receives an “Access Denied” message. Only the original owner
and the computer’s designated recovery agent can access encrypted files. This encryption
is accomplished with an encryption key and certificate. This key can be backed up in
case access is needed and you are unable to access the files..
Compression is the process of decreasing the size of files or folders without affecting the
files’ content. The purpose of compression is to decrease large files that would otherwise
use a lot of storage space. Because files often include a lot of redundant, repeated data,
compressing them replaces repeated data with pointers to the data. The pointers take up
much less space than the repeated data, so the size of the file is reduced.
BitLocker Drive Encryption encrypts an entire fixed disk to prevent access by
unauthorized users. BitLocker To Go protects removable drives, such as external flash
drives. You can encrypt drives with BitLocker in Windows Ultimate and Enterprise
editions only. When you add new files to a BitLocker-encrypted disk, the files are
encrypted automatically. If you copy the files to another drive, BitLocker automatically
decrypts the files, which means they’re no longer protected. Some computers have a
Trusted Platform Module (TPM) chip on the motherboard. If the chip is present,
BitLocker uses the TPM chip to protect the BitLocker keys.
Case Scenarios
Scenario 4-1: Resolving Technical Problems
One of your co-workers reports that the network printer won’t print. She says she has sent
a print job at least 10 times but nothing prints, and she’s sure the printer has paper and
toner. As an IT technician, what do you do to resolve this problem?
Scenario 4-2: Protecting Laptop Computers
Henry, a traveling salesperson at your company, left his laptop at the airport on his last
trip. The laptop was never recovered. His new laptop arrived yesterday and you installed
Windows 7 Enterprise and productivity applications and restored data from a backup.
What should you do to the laptop to protect all programs and data on the computer in the
event of loss or theft?
Scenario 4-3: Uninstalling Local Software
Henry, the salesperson, left on an extended business trip to Asia. He called you one day
and asked if the voice transcription software could be deleted from his computer. He
1-3
Lesson 4
doesn’t use it after all and doesn’t want it taking up space. What do you tell Henry to help
him remove the software on his own?
Scenario 4-4: Adding Locations to a Library
Maria has two folders named AP and AR at the root of her hard disk (located at C:\). She
wants to access them when she opens the Documents library. How do you advise Maria?
1-4
Download