1. Dynamic Disk Management
After you convert a basic disk to a dynamic disk, administrators can create more flexible spanned volumes, striped volumes, mirrored volumes to meet different scenarios
mirrored volumes, striped volumes, and spanned volumes are supported only when the disk is a dynamic disk.
The mirrored volume requires 2 disks, the data is fully synchronized on both disks, and the start-up interoperability function
Striped volumes, data access speed increased
RAID5 Implementation Principle 1+1=2, disk interest rate 2/3,1/3 disk as storage data verification information
2. ISCSI Target
by using ISCSI Target, an administrator can create a disk that is accessed over the network, in a cluster of highly available scenarios, with a lot of applications.
3. managing VHDs
with Disk Management tools, administrators can easily create and manage VHD virtual disk, which is more efficient when you use Vhdtool to create a large-capacity VHD disk
4. managing NTFS file Permissions
by specifying the file or folder NTFS permissions, administrators can determine that a particular user can only perform specific actions on a file to ensure the security of the file.
5. EFS Encrypt
EFS Encryption by encrypting the file itself, while the encrypted key is protected by the user's certificate, further improve the security of the file, to avoid the loss of sensitive information in the enterprise
6. Share Files
The offline use of shared files allows users to maintain the consistency of user experience in a state where the network and server are not unblocked, and to synchronize in the background to ensure the consistency of the data.
The principle of offline files is to copy the shared files to a local, which can be viewed in the synchronization center of the system.
With shadow copies of Shared folders, users can view shared files and folders that existed at a past point in time to access or restore previous versions of the files.
7. Disk Quotas
With disk quotas enabled, administrators can set the disk space that each user can use, and can monitor user usage.
8. file Quotas
By using File Server Resource Manager, administrators can achieve folder-level quota settings, and can quickly apply quota templates to improve deployment efficiency.
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/59/BB/wKiom1TdcWiQYBIfAADUzcTeFwc677.jpg "title=" Qq20150213113750.jpg "alt=" Wkiom1tdcwiqybifaaduzctefwc677.jpg "/>
9. file masking, file management tasks
administrators can set the file types that users can store in a shared folder, such as the ability to store office documents only, not the video files, and improve the effective utilization of the shared folder disks.
Implementing a file type through File Server Resource Manager
After a shared folder has been in use for a period of time, the administrator may maintain it uniformly, such as purging old files, or archiving files, and using file management tasks, administrators can make maintenance plans, once settings, and automatically manage
. DFS
Use DFS namespace, administrators can create a unified portal for users, reducing the difficulty of users accessing shared folders.
in multiple sites, multiple file server scenarios, using DFS replication, you can easily synchronize or centralize the implementation of the data.
Mainly for the unified management of distributed shared files
One by one . NFS
using the Network file service The NFS role service allows administrators to share files to Unix clients to meet the needs of file-sharing services in heterogeneous environments.
. Windows Search Server
The Windows Search service, which can create indexes on files stored in a file server for fast lookups
. hosted cache mode
by using The BranchCache feature enables users of branch offices to cache the data they access when they access shared files in the datacenter, thereby enhancing the user experience and reducing WAN traffic between branch offices and data centers .
Use Branche Distributed cache mode, administrators do not need to deploy cache hosts at branch offices, and caches are stored on Windows 7 clients.
. RMS Server
AD RMS encrypts documents with digital certificates and user authentication technology, which restricts specific users from having specific access rights, ensuring the security of access to data files during the distribution process.
This article is from the "Banging blog" blog, please be sure to keep this source http://weadyweady.blog.51cto.com/3012956/1614253
Windows File and Storage management