Work task implementation
1, create "work order two" in the user and user groups (information, sales and financial user groups only two users can be established);
(1) Bulk create user groups, users, and add users to user groups
650) this.width=650; "title=" Picture 1.png "src=" Http://s3.51cto.com/wyfs02/M01/5F/F9/wKiom1UqcknRspp2AAK5rdl_ S3g698.jpg "width=" 622 "height=" 515 "alt=" Wkiom1uqcknrspp2aak5rdl_s3g698.jpg "/>
(2) Save desktop, change extension to. bat, run
650) this.width=650; "title=" Picture 2.png "src=" http://s3.51cto.com/wyfs02/M00/5F/F5/ Wkiol1uqc7bsdidbaaiaiwggl88017.jpg "alt=" Wkiol1uqc7bsdidbaaiaiwggl88017.jpg "/>
650) this.width=650; "title=" Picture 3.png "src=" http://s3.51cto.com/wyfs02/M01/5F/F6/ Wkiol1uqc9xgtoswaaiytibsm-g723.jpg "width=" 626 "height=" 485 "alt=" Wkiol1uqc9xgtoswaaiytibsm-g723.jpg "/>
2. Set up a shared folder named "Share" in the C drive, and create a folder with the name of the group in the folder, each folder in the name of their own folder;
(1) Set up a shared folder named "Share" in the C drive, right-click Properties Advanced Sharing
650) this.width=650; "title=" Picture 4.png "src=" http://s3.51cto.com/wyfs02/M01/5F/FB/ Wkiom1uqcrixnwf0aagkcnl2ywy295.jpg "alt=" Wkiom1uqcrixnwf0aagkcnl2ywy295.jpg "/>
(2) Create a folder with the name of the group name
650) this.width=650; "style=" width:629px;height:504px; "title=" Picture 5.png "src=" http://s3.51cto.com/wyfs02/M02/5F/FB/ Wkiom1uqcupd8qtoaahgcyf18fg913.jpg "width=" 659 "height=" 530 "alt=" wkiom1uqcupd8qtoaahgcyf18fg913.jpg "/>
(3) Create a folder with the name of the employee in each folder
650) this.width=650; "style=" WIDTH:637PX;HEIGHT:97PX; "title=" Picture 6.png "src=" http://s3.51cto.com/wyfs02/M00/5F/FC/ Wkiom1uqcysh_xlgaaerv81apkg416.jpg "width=" 658 "height=" 107 "alt=" Wkiom1uqcysh_xlgaaerv81apkg416.jpg "/>
Here's the same.
3, to ensure that employees in each department can only remotely access the contents of their own folders in another computer, such as the Ministry of Information sales can read the contents of the Information Department folder, but can not read the contents of the Finance Department folder;
(1) Right-click Folder properties, security options, advanced settings, change permissions, remove parent inherited permissions
650) this.width=650; "title=" Picture 8.png "src=" http://s3.51cto.com/wyfs02/M02/5F/FE/ Wkiom1uqc4nii0gxaaixstqkwwq207.jpg "width=" 632 "height=" 443 "alt=" wkiom1uqc4nii0gxaaixstqkwwq207.jpg "/>
(2) Add owner, change to this part
650) this.width=650; "title=" Picture 9.png "src=" http://s3.51cto.com/wyfs02/M02/5F/FE/ Wkiom1uqc8aqdz5waahzejiaid4592.jpg "alt=" Wkiom1uqc8aqdz5waahzejiaid4592.jpg "/>
650) this.width=650; "title=" Picture 12.png "src=" http://s3.51cto.com/wyfs02/M00/60/00/ Wkiom1uqdcgrhir1aahk9sawi8g174.jpg "alt=" Wkiom1uqdcgrhir1aahk9sawi8g174.jpg "/>
4, each department employees can create any new files and folders under their own folder, the creation of the document can be renamed as "my daily Report", can read the contents of other users of the department, but cannot be modified, can not delete the files that have been created, finance manager Kirk Private subfolders only financial managers can access, and create a file in it, any other user account is inaccessible;
(1) Take the information department as an example. Modify the employee's MAK permissions to modify write Read permissions
650) this.width=650; "title=" Picture 13.png "src=" http://s3.51cto.com/wyfs02/M02/5F/FC/wKioL1UqdZ_ Dggneaaf2550smsg833.jpg "alt=" Wkiol1uqdz_dggneaaf2550smsg833.jpg "/>
(2) Information section Properties, add Information Group, modify permissions for read
650) this.width=650; "title=" Picture 14.png "src=" http://s3.51cto.com/wyfs02/M01/60/01/ Wkiom1uqdizr10x0aaghbfheyvu412.jpg "alt=" Wkiom1uqdizr10x0aaghbfheyvu412.jpg "/>
(3) Information manager Ziho Private subfolder only information manager can access and create files in it, no other user account is accessible
1) Remove its inherited parent permissions, click Delete 650) this.width=650; "title=" Image 15.png "src=" http://s3.51cto.com/wyfs02/M00/60/02/ Wkiom1uqdk6xxsqlaahs-lzeujc051.jpg "width=" 519 "height=" 382 "alt=" Wkiom1uqdk6xxsqlaahs-lzeujc051.jpg "/>
5, the financial department of the Private Sub-folder only Wen can access, and create files in it, any other user account is inaccessible;
(1) Modify the permissions of the scratch folder, inherit the parent permission, select Delete
650) this.width=650; "title=" Picture 17.png "src=" http://s3.51cto.com/wyfs02/M01/60/04/ Wkiom1uqdwlrnvgqaaiis7csel0027.jpg "width=" 517 "height=" 367 "alt=" wkiom1uqdwlrnvgqaaiis7csel0027.jpg "/>
(2) giving permission to Wen
650) this.width=650; "title=" Picture 16.png "src=" http://s3.51cto.com/wyfs02/M02/60/00/ Wkiol1uqds6cunw7aagy-94zggo622.jpg "alt=" Wkiol1uqds6cunw7aagy-94zggo622.jpg "/>
(3) Create a file in it, because the file inherits superior permissions, so do not modify permissions
650) this.width=650; "style=" width:522px;height:425px; "title=" Picture 19.png "src=" http://s3.51cto.com/wyfs02/M01/60/01 /wkiol1uqdzdcjfkfaanc1hvdooa135.jpg "width=" 626 "height=" 498 "alt=" Wkiol1uqdzdcjfkfaanc1hvdooa135.jpg "/>
6. Set up the network drive disk mapping for manager Kevin in the client, the map drive letter is "Z:" Disk.
(1) Open the client, right-click the network, tap Map Network Drive
650) this.width=650; "style=" width:526px;height:435px; "title=" Picture 20.png "src=" http://s3.51cto.com/wyfs02/M02/60/07 /wkiom1uqdinc0shsaahgqaep15y317.jpg "width=" 637 "height=" 528 "alt=" wkiom1uqdinc0shsaahgqaep15y317.jpg "/>
(2) Click Browse folder and select Share Share on the server.
650) this.width=650; "style=" WIDTH:533PX;HEIGHT:517PX; "title=" Picture 21.png "src=" http://s3.51cto.com/wyfs02/M02/60/07 /wkiom1uqdmhsfdt2aaj47fcbjqi593.jpg "width=" 570 "height=" 539 "alt=" wkiom1uqdmhsfdt2aaj47fcbjqi593.jpg "/>
(4) Mapping completed
1. What is the role of public folders?
Easy access to all users under the computer
2. What is the difference between "private network" and "Public network"?
Public networks provide services to all people and can use this network as long as they meet the requirements of the Internet owner.
A private network is owned by one or several departments, and it serves only the owner, which does not provide services to persons other than the owner. LAN is generally a private network.
3, what is shadow copy, what is the role of shadow copy?
A shadow copy, also known as a snapshot, is a point-in-time copy of a replica stored on the Data Protection Manager (DPM) server.
Shadow copies overview by backing up, you can create a shadow copy backup and an identical copy of the file, including all open files.
4. How does the network computer enable the shadow Copies of Shared Folders feature?
By default, the Volume Shadow Copy Service feature is not enabled for Windows Server 2003. For data security reasons, we recommend that you enable the Volume Shadow Copy service.
5. How does the client access the files in the shadow copy?
Disk properties, select the previous version.
But if you have multiple copies, there will be many versions under the file version.
A standalone server is temporarily configured FILESVR