1 / 85

Configuring and Troubleshooting Access

Configuring and Troubleshooting Access. Lesson 12. Skills Matrix. Skills Matrix. Skills Matrix. Skills Matrix. Understanding and Configuring Remote Assistance.

temple
Télécharger la présentation

Configuring and Troubleshooting Access

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Configuring and Troubleshooting Access Lesson 12

  2. Skills Matrix

  3. Skills Matrix

  4. Skills Matrix

  5. Skills Matrix

  6. Understanding and Configuring Remote Assistance • Remote Assistance– Enables a technology professional or other user to connect to your computer remotely. The connected user (herein called the assistant, also called an expert) can view your computer screen and chat using text messages. Understanding and Configuring Remote Assistance

  7. Configuring Remote Assistance Settings Locally • Click Start, right-click Computer, and then click Properties. • Click Remote settings in the task list. • Provide credentials, and then click OK. • Click the Remote tab. Understanding and Configuring Remote Assistance

  8. Configuring Remote Assistance Settings Locally (cont.) Remote Assistance Settingsdialog box Understanding and Configuring Remote Assistance

  9. Inviting Remote Assistance • Click Start. In the Start Search text box, key msra and then press Enter.The Windows Remote Assistance Wizard appears. • Click Invite someone you trust to help you. The How do you want to invite someone to help you? page appears. Understanding and Configuring Remote Assistance

  10. Inviting Remote Assistance (cont.) • Click one of the following: • Use e-mail to send an invitation • Save this invitation as a file • Click an existing invitation Understanding and Configuring Remote Assistance

  11. Inviting Remote Assistance (cont.) • On the Choose a password for connecting to your computer page, key a password in the Password text box and confirm it. Click Next. • Your mail client appears with a pre-created message and subject. The invitation file is automatically attached. Understanding and Configuring Remote Assistance

  12. Offering Remote Assistance • Three conditions must be met in order to offer Remote Assistance. • You must be added to the list of helpers in the Offer Remote Assistance Group Policy setting. • Windows Firewall must except msra.exe and raserver.exe. • Windows Firewall must allow communication on DCOM port 135 (TCP). Understanding and Configuring Remote Assistance

  13. Offering Remote Assistance (cont.) • This procedure assumes that you are a support professional offering to assist a user. • Click Start. In the Start Search text box, key msra, and then press Enter. The Windows Remote Assistance Wizard appears. • Click Offer to help someone. The Choose a way to connect to the other person’s computer page appears. Understanding and Configuring Remote Assistance

  14. Offering Remote Assistance (cont.) • Do one of the following: • Use the Enter an invitation file location text box. • Select an existing invitation. • Use the Type a computer name or IP address option. Understanding and Configuring Remote Assistance

  15. Configuring Remote Assistance Through Group Policy • You access Remote Assistance Group Policy settings in the Windows Settings > Administrative Templates > System > Remote Assistance node in Group Policy objects. Understanding and Configuring Remote Assistance

  16. Remote Desktop • Remote Desktop – Enables you to connect to a computer (computer A) from a remote computer (computer B) over a network. Remote Desktop can be an excellent tool for remote administration of servers. Using Remote Desktop

  17. Remote Desktop (cont.) • Before you can connect to a computer using Remote Desktop, you must first: • Add the user account with which you want to connect to the target computer to the Remote Desktop Users group of the target computer. • Configure the firewall to allow Remote Desktop connections. • Ensure that the target computer allows Remote Desktop connections. Using Remote Desktop

  18. Configuring Remote Desktop Settings Locally • In the Remote Desktop section, select one of the following: • Don’t allow connections to this computer • Allow connections from computers running any version of Remote Desktop (less secure) • Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) Using Remote Desktop

  19. Configuring Remote Desktop Settings Locally (cont.) • Network Level Authentication (NLA) – A reordering of the normal authentication process. Ordinarily, to authenticate to a server, you contact the server and then provide your credentials. In NLA, you provide your user name and password first. Only after that procedure is completed is the server contacted for authentication. Using Remote Desktop

  20. Configuring Remote Desktop Settings Locally (cont.) • Click Select Users. • To enable a user or group to connect to this computer remotely, click Add. • In the Enter the object names to select text box, key the user or group name, and then click Check Names. Using Remote Desktop

  21. Using Remote Desktop Configuring Remote Desktop Settings Locally (cont.) To search for a user, click Advanced. Add as many users and groups as you want, and then click OK.

  22. Configuring Remote Desktop Session Settings Locally Settings on the General tab of the Remote Desktop Connectiondialog box Using Remote Desktop

  23. Configuring Remote Desktop Session Settings Locally (cont.) Settings on the Display tab of the Remote Desktop Connectiondialog box Using Remote Desktop

  24. Configuring Remote Desktop Session Settings Locally (cont.) Settings on the Local Resources tab of the Remote Desktop Connectiondialog box Using Remote Desktop

  25. Configuring Remote Desktop Session Settings Locally (cont.) Settings on the Programs tab of the Remote Desktop Connectiondialog box Using Remote Desktop

  26. Configuring Remote Desktop Session Settings Locally (cont.) Settings on the Experience tab of the Remote Desktop Connection dialog box Using Remote Desktop

  27. Configuring Remote Desktop Session Settings Locally (cont.) Settings on the Advanced tab of the Remote Desktop Connectiondialog box Using Remote Desktop

  28. Connecting to a Computer Using Remote Desktop • Open the Remote Desktop Connection dialog box. • In the General tab in the Computer combo box, type the FQDN or the IP address of the computer to which you want to connect. • Click Connect. Using Remote Desktop

  29. Using Remote Desktop Connecting to a Computer Using Remote Desktop (cont.) In the User Name text box, key the user name of the user that you want to use to connect to the target computer in the form domain/user name. Click OK.

  30. Configuring Remote Desktop Through Group Policy • You can configure Terminal Services Group Policy settings in the Computer Configuration > Administrative Templates > Windows Components > Terminal Services folder and sub-folders of GPOs. Using Remote Desktop

  31. Virtual Private Networks • Virtual private network(VPN)– Private network established within a public network, most frequently the Internet. In an enterprise, it is most often used by users logging in from remote locations, such as their homes, to the enterprise domain through the Internet. Understanding and Configuring Virtual Private Networks

  32. Virtual Private Networks (cont.) • To emulate point-to-point links, VPNs encapsulate data in a package that contains a header with routing information and a payload of encrypted data. Understanding and Configuring Virtual Private Networks

  33. Virtual Private Networks (cont.) • From an implementation standpoint, there are three basic requirements for establishing a VPN. • User Authentication and Auditing • IP Address Assignment • Data Encryption Understanding and Configuring Virtual Private Networks

  34. Enabling a User to Connect to a VPN Server Using ADUC Dial-in tab of an example user’s Properties dialog box Understanding and Configuring Virtual Private Networks

  35. Connecting to a VPN Server Through RRAS • From the Routing and Remote Access console, Expand ServerName. • Right-click Remote Access Policies, and then click New Remote Access Policy. • Click Next. The Policy Configuration Method page appears. Understanding and Configuring Virtual Private Networks

  36. Connecting to a VPN Server Through RRAS (cont.) • Ensure that Use the wizard to set up a typical policy for a common scenario is selected. • In the Policy name text box, key a name for the policy. • Click Next. The Access Method page appears. Understanding and Configuring Virtual Private Networks

  37. Connecting to a VPN Server Through RRAS (cont.) • Select one of the following options: • VPN • Dial-up • Wireless • Ethernet Understanding and Configuring Virtual Private Networks

  38. Connecting to a VPN Server through RRAS (cont.) • Select one of the following: • User– Select this option to accept users according to the settings for each user. • Group– Select this option to add a group to the list of groups to authenticate, and then click Add. You can add more than one group. Understanding and Configuring Virtual Private Networks

  39. Connecting to a VPN Server Through RRAS (cont.) • Select one of the following to choose which authentication scheme to use. • Extensible Authentication Protocol (EAP)– EAP is typically used for wireless network authentication, but is falling out of use in favor of WEP and WEP2. Understanding and Configuring Virtual Private Networks

  40. Understanding and Configuring Virtual Private Networks Connecting to a VPN Server Through RRAS (cont.) Select one of the following to choose which authentication scheme to use (cont.). • Microsoft Encrypted Authentication version 2 (MS-CHAPv2)– This is the default. • Microsoft Encrypted Authentication (MS-CHAP)– This is used for backward-compatibility reasons.

  41. Connecting to a VPN Server Through RRAS (cont.) • Configure the following check boxes according to which encryption methods you want to support. • Basic encryption (IPSec 56-bit DES or MPEE 40-bit) • Strong encryption (IPSec 56-bit DES or MPPE 56-bit) • Strongest encryption (IPSec Triple DES or MPPE 128-bit) Understanding and Configuring Virtual Private Networks

  42. Configuring a VPN Client Connection In the Internet addresstext box, key the IP address of your VPN server (for example, 10.21.23.54) or its fully qualified domain name (FQDN) (for example, vpn12.contoso.com). Using Remote Desktop

  43. Connecting to a Domain Using a VPN Connection • Click Start, and then click Connect To. The Connect to a Network Wizard appears. • Select the VPN connection in the list of network connections, and then click Connect. • A Connect ConnectionName Connection dialog box may appear. Provide your credentials, and then click Connect. Understanding and Configuring Virtual Private Networks

  44. Local and Network Resources • Resources in an enterprise come in two varieties. • Localresources– Include anything on or connected to your computer that is not part of a network • Networkresources– Include shared folders and files, printers, routers, gateways, DHCP servers, and many others Accessing Local and Network Resources

  45. Understanding Permissions • NTFS– File system used by Windows Vista and other, more recent versions of Windows to determine how data is stored on the hard-drives • NTFS permissions– Part of NTFS that controls user access and control over files and folders Accessing Local and Network Resources

  46. Understanding Permissions (cont.) • Each file or folder in NTFS has separate permissions. The permissions are determined by access control entries (ACEs). There is an ACE for each user and each permission on each object. Files and folders can also have ACEs for groups as well as individual users. Accessing Local and Network Resources

  47. Understanding Permissions (cont.) The permissions under Permissions for Garrett Vargasare examples of standard permissions. Accessing Local and Network Resources

  48. Configuring Permissions for a Folder Security tab in the Properties dialog box of an example folder Accessing Local and Network Resources

  49. Configuring Permissions for a Folder (cont.) Permissions dialog box for an example folder Accessing Local and Network Resources

  50. Configuring NTFS Permissions for a Folder Permission Entrydialog box for an example folder Accessing Local and Network Resources

More Related