File resource management in Windows2000

Source: Internet
Author: User
Tags disk usage disk defragmenter

The main management tool is computer management, which includes three management features:

1. System Tools: Manages computers running Windows, including server, Domain Controller, client computer, event viewer, system information, and other tools.
2. Storage: disk management tools, including disk management, disk deframenter, and logical drives
3. Services and application: includes network service management, such as DHCP, IIS, and DNS.

In the Active Directory users and computers release Folder:

Provides fast resource access and security mechanisms for access. Resources that can be released in Active Directory include users, computers, printers, files, folders, and network services. Right-click domain ----> New ----> shared folder.

Note the differences between shared folder and published folder. Shared Folder is server-based and resource access is relatively difficult (you must know the name of the server). Published folder is published in Active Directory, so it is easy to search resources.

Use DFS to manage shared folders:

DFS allows you to create a single logical directory tree from multiple physical systems. This makes it easy for you to search for resources without having to log on to multiple servers, it also facilitates administrators to manage multiple shared folders in a single location. DFS has been applied in windowsnt4.0 and enhanced in Win2000.

You can configure two types of DFS:
1. Stand-alone DFS: saves the DFS topology on a single computer. However, if the computer or DFS topology that stores shared files fails, fault tolerance is not provided.
2. Fault-Tolerant DFS: Save the DFS topology in Active Directory. This DFS allows its (domain DFS) subnodes to point to multiple identical shared folders for fault tolerance. In addition, it supports DNS naming and file replication.

Set DFS root:
The first step to create a DFS is to set the DFS root. DFS can be created on fat and NTFS partitions, but it does not provide advanced security on NTFS when created on FAT partition.

Set child nodes (DFS link ):
After the DFS root is created, you can add the DFS link to point to other shared folders.

Manage disk quotas on NTFS volumes:

Disk quotas of Windows2000 tracks and controls the use of Disks Based on per user or per volume. It has the following features:
1. disk usage is based on the ownership of files and folders. When a user copies or saves a new file on an NTFS Volume, or obtains ownership of the file and folder, Win2000 calculates the disk space of the file on the user's quota.
2. disk quotas does not use compression. The user quota is calculated based on the number of uncompressed bytes, regardless of the disk space actually used
3. ApplicationProgramThe remaining space used is based on the user's quota limit.
4. Windows2000 tracks each NTFS Volume independently, even if multiple volumes are on one physical hard disk
5. You can only use the disk quota on the NTFS partition.
You can set the disk quota. When the limit is approaching, a warning is issued and recorded in the event log. You can also set the limit when the limit is exceeded, whether access is allowed or not, set the disk quota in the disk attribute. For example, configure the space that can be used and the threshold value of the alarm.


Use EFs (Encrypting File System) to improve security:
EFS provides the ability to encrypt files stored in the NTFS partition. EFS encryption technology is based on public keys and runs as an integrated system service. It has the advantages of easy management, difficult attack, and transparent to file owners.

EFS has the following features:

1. Transparent encryption process. Users (File owners) are not required to perform encryption and decryption each time they use it.
2. Powerful encryption technology. Public Key-Based Encryption
3. Complete data recovery. The list file of the encryption key is re-encrypted by the public key of the "recovery proxy". Multiple Recovery proxies can be created, each with a different public key.
4. Protect temporary files and page files
5. The file encryption key resides in the kernel of the operating system and is saved in non-Paging Ram.

Hard Disk sorting:

Use Disk Defragmenter. It analyzes and provides suggestions before sorting.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.