SlideShare una empresa de Scribd logo
1 de 22
Lecture 10: The User
Experience
Network Design & Administration
What aspects affect the user
most?
• Disk space
  • Local
  • Shared




                                     Network Design & Administration
• Printing
• Logging in/Access to resources
• Using applications
• Email
                                             2
• Overall speed of task completion
Disk Space
• User machines may have comparatively
  large disks
   • Temptation for users to store files locally




                                                   Network Design & Administration
   • Unlikely in ‘hot-desking’ situation
   • Problems?
• Better to use servers for storing user files
   • Better control of backup/restore
   • Can apply disk quotas                                 3
Windows Disk Quotas
Three stages:
1. Enabling disk quotas on a
    volume.
2. Configuring quota defaults.




                                 Network Design & Administration
3. Creating quota entries.

Step 1:
• Select NTFS volume for quota
  application using Explorer
  and open Properties dialog.
• Or use disk management
                                         4
  snap-in to MMC.
Windows Disk Quotas – Step 2
– Enable Management
• Enable
  management – has
  to be done volume




                               Network Design & Administration
  by volume
• Note that in this
  case, the system
  has been set to
  deny users disk
  space when Quota                     5

  exceeded
Windows Disk Quotas – Step 3
- Configuring
• You must select an
  appropriate default
  size
• You may also set a




                               Network Design & Administration
  size that generates a
  warning to the user
• You can also
  configure the system
  to log these events
                                       6
Windows Disk Quotas –
Creating quota entries[2]
• These are exceptions to the default rule
• Allow a user to be given more or less than
  the default




                                               Network Design & Administration
• Can create new entries, or modify existing
  ones (by double clicking the entry)
 • (Ensure you select appropriate units!)
• New quota entries can be generated by
  selecting a number of users at once, but             7
  the quotas are applied individually
Windows Disk Quotas –
Creating quota entries[1]




                            Network Design & Administration
                                    8
Linux Disk Quotas[3][4][5]
• Enable quotas by adding fields into etc/fstab file to allow
  usr/grp quotas e.g.
    /dev/hda2 /home ext3 defaults,usrquota,grpquota 1 1
• Remount the volume (umount, then mount – or simply




                                                                    Network Design & Administration
  reboot)
• Run quotacheck –avug to set up the quota files and check the
  volume for current usage (should re-run regularly to keep stats
  accurate)
• Assign quotas for users or groups using edquota
• Use repquota to generate reports on current quota usage
                                                                            9
Disk Quotas – impact on users
and administrators
• Users can find it frustrating if sizes set too low
  for typical usage
• Investigate how users function before setting
  level




                                                       Network Design & Administration
• Users can be given a warning – so need
  education as to how to act in response
• Administrators may get a lot of user complaints if
  set too low – but if not set, space may run out
  arbitrarily
                                                       10
• Managing and monitoring is time consuming
  (see in later session)
File Server Resource Manager[6]
• Provides finer grain control of quotas
• Provides more means to warn users
• Not covered here!




                                           Network Design & Administration
                                           11
Printing and the user
• As before, assume that we do not have
  individual printers for users
• Must balance need for users to have access to
  printing with costs of paper, ink, printers




                                                    Network Design & Administration
• Printer properties define default behaviour for
  all users of the printer
• For high throughput, may use printer pooling
• For more control, may use multiple logical
  printers for a single printer
                                                    12
Shared Printers
• Remember - that after
  installing the printer on
  the print server, have
  to share it, then




                              Network Design & Administration
  connect clients
• Printer properties has
  tab for sharing
• Additional drivers must
  be specified if clients
  running older O/S
                              13
Other Useful Information in Properties
• Printer location can be specified
• Users can check printer capabilities
• Paper of different sizes can be assigned to specific trays




                                                               Network Design & Administration
                                                               14
Client Access to Printers
• Make available via:
  • Add Printer Wizard (where Search can be specified)
  • Browsing via Windows Explorer
  • Searching Active Directory




                                                                    Network Design & Administration
• Can search with a range of criteria e.g. location, double-sided
  capable, stapling etc. – key to efficiency in a business
• However, users need to know that they can do this – must be
  trained.
• Must ensure (via printer permissions) that users cannot
  change default behaviour – though they may choose to set
  behaviour for a specific print job.
                                                                    15
Client Access to Printers using VB.Script
  • Can use a “logon” and “logoff” script.
  • Script associated to user account – put on a shared drive to
    allow all users access.
  • As soon as user logs in/out, script is executed.
Logon script:




                                                                                Network Design & Administration
sub loadprinters()
  set network = createobject("wscript.network")
  network.AddWindowsPrinterConnection printerservercolourlaser
  network.AddWindowsPrinterConnection printerserverbwlaser
end sub
Logoff script:
sub unloadprinters()
  set network = createobject("wscript.network")
  network.RemovePrinterConnection ("printerservercolourlaser", true, true)   16
  network.RemovePrinterConnection ("printerserverbwlaser", true, true)
end sub
Printer Pooling
• Multiple physical printers
  used as a single logical
  printer – so job appears
  on whichever printer




                               Network Design & Administration
  available
• All printers must be able
  to use same driver, since
  only 1 logical printer
• Should be physically close
  together since user will
  not know which one it
                               17
  prints to
Multiple Logical to Single
Physical Printer
• Used to allow different conditions to be set for different
  groups of users to a single physical printer
• Can set different priorities (99 highest, 1 lowest) to the
  logical printers




                                                               Network Design & Administration
• Can set different times for access
• Can also set different defaults e.g. trays/paper, double
  sided
• Need to ensure the different logical printers have their
  ACLs set appropriately (e.g. to allow Executives access to
  all, but Clerks access only to certain logical printers)
                                                               18
Advanced Printer Properties

                           Limits when
                           will print




                                         Network Design & Administration
Lowest priority




                                         19
User Profiles
• Allow user to have customised
  environment, independent of other users
• Contains:
  • User-stored documents and files




                                                Network Design & Administration
  • Application configurations and settings
  • Desktop and environment settings
  • Control Panel settings and configurations
• Can be Local, Roaming or Mandatory
                                                20
User Profiles[7]
• Local
   • Retained in Documents & Settings for that PC
• Roaming
   • Held on some server (if domain controller, always available,




                                                                          Network Design & Administration
     but if on member server, traffic less likely to delay domain
     authentications)
   • Local version in ntuser.dat compared with remote, and
     differences sent from server
   • Can get big and slow
   • If app stores info in Local Settings rather than Registry, that is
     not kept in Roaming Profile, so app can fail on other clients
• Mandatory                                                               21
   • Change ntuser.dat to ntuser.man – makes it read only
References
1. http://www.zdnetasia.com/techguide/windows/0,39044904
   ,61956452,00.htm
2. MOAC 290, Ch12
3. http://computingtech.blogspot.com/2008/09/ubuntu-linux-




                                                              Network Design & Administration
   disk-quotas.html
4. http://www.yolinux.com/TUTORIALS/LinuxTutorialQuotas.ht
   ml
5. http://www.redhat.com/docs/manuals/linux/RHL-8.0-
   Manual/admin-primer/s1-storage-quotas.html
6. http://technet.microsoft.com/en-us/library/cc754810.aspx
7. http://support.microsoft.com/kb/314478
                                                              22

Más contenido relacionado

La actualidad más candente

Virtualization (Distributed computing)
Virtualization (Distributed computing)Virtualization (Distributed computing)
Virtualization (Distributed computing)Sri Prasanna
 
Nutanix Always On-Solution-Brief
Nutanix Always On-Solution-BriefNutanix Always On-Solution-Brief
Nutanix Always On-Solution-BriefManny Carral
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Operating System
Operating SystemOperating System
Operating Systempuneet2home
 
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization1709123_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization170912Tanawit Chansuchai
 
4. Memory virtualization and management
4. Memory virtualization and management4. Memory virtualization and management
4. Memory virtualization and managementHwanju Kim
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompDigicomp Academy AG
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013Olav Tvedt
 
Windows 7 Deployment
Windows 7  DeploymentWindows 7  Deployment
Windows 7 DeploymentAlex de Jong
 
Dynamic Memory Management Hyperv 2008 R2 S
Dynamic Memory Management Hyperv 2008 R2 SDynamic Memory Management Hyperv 2008 R2 S
Dynamic Memory Management Hyperv 2008 R2 SEduardo Castro
 
Dynamic Memory Management HyperV R2 SP1
Dynamic Memory Management HyperV R2 SP1Dynamic Memory Management HyperV R2 SP1
Dynamic Memory Management HyperV R2 SP1Eduardo Castro
 
Virtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsVirtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsArun Shukla
 
5. IO virtualization
5. IO virtualization5. IO virtualization
5. IO virtualizationHwanju Kim
 

La actualidad más candente (18)

Virtualization (Distributed computing)
Virtualization (Distributed computing)Virtualization (Distributed computing)
Virtualization (Distributed computing)
 
Nutanix Always On-Solution-Brief
Nutanix Always On-Solution-BriefNutanix Always On-Solution-Brief
Nutanix Always On-Solution-Brief
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
ICTM 10
ICTM 10ICTM 10
ICTM 10
 
Operating System
Operating SystemOperating System
Operating System
 
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization1709123_metro_msvdi2012-afternoon_hybrid_virtualization170912
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
 
4. Memory virtualization and management
4. Memory virtualization and management4. Memory virtualization and management
4. Memory virtualization and management
 
Walter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicompWalter hofstetter xen client enterprise digicomp
Walter hofstetter xen client enterprise digicomp
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013
 
Windows 7 Deployment
Windows 7  DeploymentWindows 7  Deployment
Windows 7 Deployment
 
Live VM Migration
Live VM MigrationLive VM Migration
Live VM Migration
 
Lect13
Lect13Lect13
Lect13
 
Dynamic Memory Management Hyperv 2008 R2 S
Dynamic Memory Management Hyperv 2008 R2 SDynamic Memory Management Hyperv 2008 R2 S
Dynamic Memory Management Hyperv 2008 R2 S
 
Dynamic Memory Management HyperV R2 SP1
Dynamic Memory Management HyperV R2 SP1Dynamic Memory Management HyperV R2 SP1
Dynamic Memory Management HyperV R2 SP1
 
Virtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsVirtual Machine Migration & Hypervisors
Virtual Machine Migration & Hypervisors
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
Server virtualization 2
Server virtualization   2Server virtualization   2
Server virtualization 2
 
5. IO virtualization
5. IO virtualization5. IO virtualization
5. IO virtualization
 

Similar a Lecture 10 the user experience (1)

Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objectsWiliam Ferraciolli
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)diaryinc
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptxTadeseBeyene
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating SystemRashmi Bhat
 
Uklug 2011 client management
Uklug 2011 client managementUklug 2011 client management
Uklug 2011 client managementdominion
 
Soccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM ConnectionsSoccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM Connectionspanagenda
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxTadeseBeyene
 
8 operating system concept
8 operating system concept8 operating system concept
8 operating system conceptBaliThorat1
 
Servers.pptx
Servers.pptxServers.pptx
Servers.pptxChSheraz3
 
SimaPro-multiuser-basics.pdf
SimaPro-multiuser-basics.pdfSimaPro-multiuser-basics.pdf
SimaPro-multiuser-basics.pdfssuser4523c1
 
(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environmentBIOVIA
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10gameaxt
 
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 20161049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016panagenda
 
What's new in informix v11.70
What's new in informix v11.70What's new in informix v11.70
What's new in informix v11.70am_prasanna
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 

Similar a Lecture 10 the user experience (1) (20)

Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 
Chapter Two.pptx
Chapter Two.pptxChapter Two.pptx
Chapter Two.pptx
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
Shree Kolachina
Shree KolachinaShree Kolachina
Shree Kolachina
 
Uklug 2011 client management
Uklug 2011 client managementUklug 2011 client management
Uklug 2011 client management
 
Soccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM ConnectionsSoccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM Connections
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptx
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
8 operating system concept
8 operating system concept8 operating system concept
8 operating system concept
 
Servers.pptx
Servers.pptxServers.pptx
Servers.pptx
 
SimaPro-multiuser-basics.pdf
SimaPro-multiuser-basics.pdfSimaPro-multiuser-basics.pdf
SimaPro-multiuser-basics.pdf
 
itft_system admin
itft_system adminitft_system admin
itft_system admin
 
(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
 
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 20161049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
 
What's new in informix v11.70
What's new in informix v11.70What's new in informix v11.70
What's new in informix v11.70
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 

Más de Wiliam Ferraciolli (20)

Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 

Lecture 10 the user experience (1)

  • 1. Lecture 10: The User Experience Network Design & Administration
  • 2. What aspects affect the user most? • Disk space • Local • Shared Network Design & Administration • Printing • Logging in/Access to resources • Using applications • Email 2 • Overall speed of task completion
  • 3. Disk Space • User machines may have comparatively large disks • Temptation for users to store files locally Network Design & Administration • Unlikely in ‘hot-desking’ situation • Problems? • Better to use servers for storing user files • Better control of backup/restore • Can apply disk quotas 3
  • 4. Windows Disk Quotas Three stages: 1. Enabling disk quotas on a volume. 2. Configuring quota defaults. Network Design & Administration 3. Creating quota entries. Step 1: • Select NTFS volume for quota application using Explorer and open Properties dialog. • Or use disk management 4 snap-in to MMC.
  • 5. Windows Disk Quotas – Step 2 – Enable Management • Enable management – has to be done volume Network Design & Administration by volume • Note that in this case, the system has been set to deny users disk space when Quota 5 exceeded
  • 6. Windows Disk Quotas – Step 3 - Configuring • You must select an appropriate default size • You may also set a Network Design & Administration size that generates a warning to the user • You can also configure the system to log these events 6
  • 7. Windows Disk Quotas – Creating quota entries[2] • These are exceptions to the default rule • Allow a user to be given more or less than the default Network Design & Administration • Can create new entries, or modify existing ones (by double clicking the entry) • (Ensure you select appropriate units!) • New quota entries can be generated by selecting a number of users at once, but 7 the quotas are applied individually
  • 8. Windows Disk Quotas – Creating quota entries[1] Network Design & Administration 8
  • 9. Linux Disk Quotas[3][4][5] • Enable quotas by adding fields into etc/fstab file to allow usr/grp quotas e.g. /dev/hda2 /home ext3 defaults,usrquota,grpquota 1 1 • Remount the volume (umount, then mount – or simply Network Design & Administration reboot) • Run quotacheck –avug to set up the quota files and check the volume for current usage (should re-run regularly to keep stats accurate) • Assign quotas for users or groups using edquota • Use repquota to generate reports on current quota usage 9
  • 10. Disk Quotas – impact on users and administrators • Users can find it frustrating if sizes set too low for typical usage • Investigate how users function before setting level Network Design & Administration • Users can be given a warning – so need education as to how to act in response • Administrators may get a lot of user complaints if set too low – but if not set, space may run out arbitrarily 10 • Managing and monitoring is time consuming (see in later session)
  • 11. File Server Resource Manager[6] • Provides finer grain control of quotas • Provides more means to warn users • Not covered here! Network Design & Administration 11
  • 12. Printing and the user • As before, assume that we do not have individual printers for users • Must balance need for users to have access to printing with costs of paper, ink, printers Network Design & Administration • Printer properties define default behaviour for all users of the printer • For high throughput, may use printer pooling • For more control, may use multiple logical printers for a single printer 12
  • 13. Shared Printers • Remember - that after installing the printer on the print server, have to share it, then Network Design & Administration connect clients • Printer properties has tab for sharing • Additional drivers must be specified if clients running older O/S 13
  • 14. Other Useful Information in Properties • Printer location can be specified • Users can check printer capabilities • Paper of different sizes can be assigned to specific trays Network Design & Administration 14
  • 15. Client Access to Printers • Make available via: • Add Printer Wizard (where Search can be specified) • Browsing via Windows Explorer • Searching Active Directory Network Design & Administration • Can search with a range of criteria e.g. location, double-sided capable, stapling etc. – key to efficiency in a business • However, users need to know that they can do this – must be trained. • Must ensure (via printer permissions) that users cannot change default behaviour – though they may choose to set behaviour for a specific print job. 15
  • 16. Client Access to Printers using VB.Script • Can use a “logon” and “logoff” script. • Script associated to user account – put on a shared drive to allow all users access. • As soon as user logs in/out, script is executed. Logon script: Network Design & Administration sub loadprinters() set network = createobject("wscript.network") network.AddWindowsPrinterConnection printerservercolourlaser network.AddWindowsPrinterConnection printerserverbwlaser end sub Logoff script: sub unloadprinters() set network = createobject("wscript.network") network.RemovePrinterConnection ("printerservercolourlaser", true, true) 16 network.RemovePrinterConnection ("printerserverbwlaser", true, true) end sub
  • 17. Printer Pooling • Multiple physical printers used as a single logical printer – so job appears on whichever printer Network Design & Administration available • All printers must be able to use same driver, since only 1 logical printer • Should be physically close together since user will not know which one it 17 prints to
  • 18. Multiple Logical to Single Physical Printer • Used to allow different conditions to be set for different groups of users to a single physical printer • Can set different priorities (99 highest, 1 lowest) to the logical printers Network Design & Administration • Can set different times for access • Can also set different defaults e.g. trays/paper, double sided • Need to ensure the different logical printers have their ACLs set appropriately (e.g. to allow Executives access to all, but Clerks access only to certain logical printers) 18
  • 19. Advanced Printer Properties Limits when will print Network Design & Administration Lowest priority 19
  • 20. User Profiles • Allow user to have customised environment, independent of other users • Contains: • User-stored documents and files Network Design & Administration • Application configurations and settings • Desktop and environment settings • Control Panel settings and configurations • Can be Local, Roaming or Mandatory 20
  • 21. User Profiles[7] • Local • Retained in Documents & Settings for that PC • Roaming • Held on some server (if domain controller, always available, Network Design & Administration but if on member server, traffic less likely to delay domain authentications) • Local version in ntuser.dat compared with remote, and differences sent from server • Can get big and slow • If app stores info in Local Settings rather than Registry, that is not kept in Roaming Profile, so app can fail on other clients • Mandatory 21 • Change ntuser.dat to ntuser.man – makes it read only
  • 22. References 1. http://www.zdnetasia.com/techguide/windows/0,39044904 ,61956452,00.htm 2. MOAC 290, Ch12 3. http://computingtech.blogspot.com/2008/09/ubuntu-linux- Network Design & Administration disk-quotas.html 4. http://www.yolinux.com/TUTORIALS/LinuxTutorialQuotas.ht ml 5. http://www.redhat.com/docs/manuals/linux/RHL-8.0- Manual/admin-primer/s1-storage-quotas.html 6. http://technet.microsoft.com/en-us/library/cc754810.aspx 7. http://support.microsoft.com/kb/314478 22