Encrypting and Sharing Encrypted Files

Right click the file or folder to be encrypted. Select Properties. Select Advanced. Select Encrypt contents to secure data. Click OK. Use the buttons below to navigate through the lesson The file is now encrypted, note the green lettering; this identifies all encrypted files. Sharing Encrypted Files Right Click the encrypted file to be shared.…

Read More

Network Monitor 2008

Troubleshooting complex problems requires gaining insight into the inner workings of an application. When you are troubleshooting network problems, one of the best ways to gain insight is to capture and analyze the network communications using a protocol analyzer. Microsoft provides Network Monitor a powerful protocol analyzer. Network Monitor is not included with Windows, but…

Read More

Monitoring Performance and Reliability

Performance and reliability monitoring is useful in several scenarios: Improving the performance of servers by identifying the performance bottleneck and then upgrading the bottlenecked resource. Identifying the source of critical performance problems that make services unusable or completely unavailable. Correlating events, such as application installations, with failures. Use the buttons below to navigate through the…

Read More

Creating an Event Subscription

Expand Event Viewer. right click Subscriptions. Select Create Subscription. Enter Subscription Name. Use the buttons below to navigate through the lesson You can create two types of subscriptions: Collector initiated – The collecting computer co ntacts the source computers to retrieve events. Source computer initiated – The forwarding computers contact the collecting computer. Select Collector…

Read More

Monitoring Event Logs

Windows has always stored a great deal of important information in the event logs. Unfortunately, with versions of Windows released prior to Windows Vista, that information could be very hard to access. Event logs were always stored on the local computer, and finding important events among the vast quantity of informational events could be very…

Read More

Reports

You can view detailed information about updates, computers, and synchronization using the Reports node in the Update Services console. Use the buttons below to navigate through the lesson Update Status Summary this report displays detailed information about every update that you choose to report on, including the full description (provided by Microsoft), the computer groups…

Read More

Configure Client-side Targeting

You use Group Policy objects (GPOs) to add computers to computer groups when you enable client-side targeting. First, configure the WSUS server for client-side targeting. Use the buttons below to navigate through the lesson Select Options and then Computers. Select Use Group Policy or Registry settings on computer. Then click OK. Select Group Policy Management.…

Read More

Install and Configure WSUS

Right click Roles. Then select Add Roles. Click Next. Select Windows Server Update Services. Select Add Required Role Services. Click Next. Click Next. Select any further IIS components. Click Next. Click Next. Click Install. The Server must be connected to the internet to update the service. CAUTION the installation will fail if no internet connection…

Read More

Logging for Windows Firewall

If you are ever unsure about whether Windows Firewall is blocking or allowing traffic, you should enable logging, re-create the problem you’re having, and then examine the log files. Use the buttons below to navigate through the lesson Right click Windows Firewall with Advanced Security. Select Properties. Click Customize. Enable logging by selecting Yes from…

Read More

Creating an Outbound Filter

By default, Windows Firewall allows all outbound traffic. Allowing outbound traffic is far less risky than allowing inbound traffic. However, outbound traffic still carries some risk: Use the buttons below to navigate through the lesson If malware infects a computer, it might send outbound traffic containing confidential data (such as content from a Microsoft SQL…

Read More