ALL >> System-Network-Administration >> View Article
Managing Active Directory Performance

This chapter shows you how to monitor and troubleshoot Active Directory, tasks you'll perform CompTIA A+ Practical Application often as a system administrator. To effectively monitor and trouble-shoot, you must know how to interpret the directory and file replication service logs in the Event Viewer console to handle errors, warnings, and informational messages generated by Active Directory and the Pile Replication service (FRS). You must also be able to set up System Monitor to sample Active Directory and FRS replication performance by using the NTDS, FileReplicaConn, and FileReplicaSet performance objects, The practices and labs in this chapter help you gain the skills and confidence you'll need to effectively monitor and troubleshoot Active Directory and FRS replication.
Before You Begin
To complete the lessons in this chapter, you must
Prepare your test environment according to the descriptions given in the "Getting Started" section of "About This Book"
Complete the practices for installing and configuring Active Directory as discussed in Chapter 2, "Installing ...
... and Configuring Active Directory"
Learn to use Active Directory administration tools as discussed in Chapter 3,"Administering Active Directory"
What needs to be done to track accesses or attempts to access the folders containing Tailspin's confidential documents?
To track access attempts at the folder level, use auditing. The folders must reside on an NTFS partition, and Object Access auditing must be enabled. This can be accomplished using Group Policy directly, or by Network+ certification configuring our Security Template accordingly. A very important and often overlooked step is configuring the actual folder to be audited. Enabling Object Access auditing for the server is necessary, but by itself, will not cause anything to be audited! You must also configure auditing on the individual folders.
6.How should the file servers that contain confidential documents be configured to meet Tailspin's requirements regarding the security log?
Lisa Jacobson indicated that all attempts to access data must be audited without exception. She also indicated that the security log entries must never be overwritten. The appropriate setting for the Event Viewer security logs on these servers is Do Not Overwrite Events. By itself, this setting will cause the security log to fill up and a prompt to appear on the screen indicating that the log is full. While the log is full, no further access attempts will be audited. To alleviate this issue, raise the maximum size of the Event Viewer security log. Doing so allows more entries to be recorded. One last setting that should be considered is the Audit: Shut Down The System Immediately If Unable To Log Security Audits. Recall that if the security log fills up, and we don't allow events to be overwritten, no further audits can be made until an administrator intervenes. This setting gives up some stability in exchange for extra audit assurance. If this setting is made, it is critical that the comptia network exam logs are archived or cleared manually before they fill up. Otherwise, just as the setting says, the system will shut down.
Add Comment
System/Network Administration Articles
1. Fiber Cable Cutting Machine: Precision And Efficiency In Fiber Optic ProcessingAuthor: Ryan
2. Evolution Of Ethernet And Fiber Optic Termination: A Look At Sc Vs. Lc Connectors
Author: Ryan
3. Understanding Mpo Cables: Essential Guide To Fiber Optic Connectivity
Author: Ryan
4. Oracle Erp Cloud Consulting Company - Rite
Author: Rite
5. Is On Grid Solar The Smartest Way To Cut Your Electricity Bills?
Author: Seo Globo
6. Understanding Boc Package Substrate: Revolutionizing Semiconductor Technology
Author: Ryan
7. Revolutionizing Connectivity: The Benefits And Applications Of Flexible Printed Circuits
Author: Ryan
8. A Comprehensive Guide To Al₂o₃ (alumina) Pcb
Author: Ryan
9. Your Information May Already Be On The Dark Web
Author: Reinfosec
10. Fbt Optical Fiber Splitter Vs. Plc Optical Fiber Splitter
Author: Ryan
11. Know More About The Optical Fiber Alignment System
Author: Ryan
12. Fiber Optic Pigtail: What Is It And What Are Its Types?
Author: Ryan
13. Comprehensive Introduction Of Fiber Optic Splitter
Author: Ryan
14. Know About The Fiber Polishing Parameters
Author: Ryan
15. Basic Introduction To Ic Substrate China
Author: Ryan