0% found this document useful (0 votes)
21 views3 pages

Day 4

The document outlines various aspects of network management, including sharing permissions, DHCP, DNS, and Group Policy configurations. It discusses the differences between protocols like SMB and NFS, the importance of separation of duties, and the management of shared folders and user permissions. Additionally, it covers Group Policy settings, security policies, and tools for managing and troubleshooting network configurations.

Uploaded by

Barca To End
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Day 4

The document outlines various aspects of network management, including sharing permissions, DHCP, DNS, and Group Policy configurations. It discusses the differences between protocols like SMB and NFS, the importance of separation of duties, and the management of shared folders and user permissions. Additionally, it covers Group Policy settings, security policies, and tools for managing and troubleshooting network configurations.

Uploaded by

Barca To End
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

 Why Sharing Permissions ?

Only one backup


 Sharing vs Security
 Separation of Duties
 All Partition are hidden shared
 $
 Kerberos
 Shared Folders  Computer Management
 Standard User Can’t Share
 How to share file from user’s machine  Computer Management
 SMB Protocol (User Authentication) vs NFS Protocol (Computer Authentication)
 Branch cache role
 Storage Space
 DHCP
 Add DHCP Role
 Authorize
 Add Scope
 Wireshark (DORA , Renew)
 RARP, Bootp, DHCP
 Add to Reservation
 ipconfig /setclassid [adapter] [ClassID]
 Server Options, Scope Options, Reservation Options
 DHCP Failover (Load Balance, Hot Standby)
 DNS
 Root Hints
 IPConfig /displayDNS
 Dnscmd /Clearcache
 Ipconfig /flushdns
 DNS Forwarder
 Authoritative vs NonAuthoritative
 Nslookup
 Recursive (TCP) vs Iterative (UDP)
 Zone Lookup Types (Forward, Reverse)
 Ipconfig /registerdns
 Zones Types (Primary, Secondary, Stub)
 DNS Records
 Reverse Lookup Zone
 Suffix = Domain name (From Joining Domain)
 Register this connection's addresses in DNS // Secure Update
 Secondary DNS Server and DNS Transfer
 TTL
 STUP Zone and Glue Record : Trust Relationship and Resources Exchange
 Conditional Forwarder vs Stup Zone
 Round Robin
---------------------------------------------------------------------------------------------------
 Gpedit.msc  Local GPO
 Computer Configuration vs User Configuration
 Always Read Description of GP
 Filter By State (Enabled, Disabled)
 Apply local Group policy on specific user
 Domain GPO
 Create OU (Put the user beside his Computer)
 You Can Apply Group Policy  Locally – Site – Domain – Parent OU – Child OU
 Default Domain Controller Policy vs Default Domain Policy
 New GPO then Link
 Filter and Google
 Linked Enabled
 Starter GPO (Template)
 Settings Tab to show your applied policies  Resultant Set of Policy (RSoP)
 Authenticated Users (Forest) vs Domain Users (Domain)
 Delegation Tab
 Backup : Save Cabinet or Backup all
 Show All Policies in GPO (Settings Tab)
 ADMX Files : C:\Windows\PolicyDefinations
 SysVol
 Administrative Template files (ADMX/ADML) for Microsoft Office
 LSDOU
 Enforced
 Disabled vs Not Configured
 Link Order
 LoopBack Processing (User Configuration vs Computer Configuration) – Replace,
Merge
 Details Tab
 Gpupdate
 Group Policy Update (Push Update - Must Include Computers in OU)
 90m + 30m Random
 User Configuration : Sign Out + Sign in
 Computer Configuration: Restart
 Security Policies Updates Directly
 Password Policy
 Account Lookout Policy
 Fine grained Password
 Security Options : Force Logout when logon hours expire
 Security Group : Computer Management of user
 Restricted Groups : Add users to groups from DC
 Audit Object access : Shared Folders
 Prevent access to drivers
 Windows Settings  Folder Redirection  Put shared folder on server
 Software Installation
 Login Scripts : Map Network Drive
 Prefernces
 WMI Filter  Targeting by Code
 Software Restrictions : Computer Configuration  Policies  Windows Settings
 Security Settings  Software Restriction Policies  New  Additional Rules

Path Rule : Deny Application


Hah Rule : Deny Script

 Group Policy Modeling and Results : Report about Group Policies Applied on
Specific Computer
 Set Group Policy Refresh Interval (90m + 30m)
 Dcgpofix --- dcgpofix /target:domain ---- dcgpofix /target:dc
 For Reset Group Policy Management

You might also like