Home: Authors: Deborah Timmons
Author and Writer

Status: Member since September 7, 2008
Location: United States of America
Articles: 128 Active Articles, resulting in 174125 views
Feedback: 2 comments on these 128 articles

Deborah Timmons is a Microsoft Certified Trainer and Microsoft Certified Systems Engineer. She came into the Microsoft technical field after six years in the adaptive technology field, providing technology and training for persons with disabilities. She is the President and co-owner of Integrator Systems Inc.

Patrick Timmons is a Microsoft Certified Systems Engineer + Internet. He has been working in the IT industry for approximately 15 years, specializing in network engineering, and has recently completed his Bachelor of Science degree, with a Major in Computer Science. Patrick is the CEO of Integrator Systems Inc., a company based in Ottawa, Ontario, Canada.Patrick and Deborah have four children--Lauren, Alexander, James and Katherine who take up a lot of their rare spare time.Integrator Systems Inc. designs and implements network solutions based on Microsoft and 3Com technology, produces custom applications based on customer needs, provides local and remote network troubleshooting and support, and provides courseware, training, and consultants to various horizontal and vertical markets. Integrator Systems is a Microsoft Certified Partner and 3Com Focus Partner. 

Monitor & optimize a server environment for application performance: Before you can optimize your system, you will need to monitor all the critical subsystems, such as memory, processor, disk and network, to see if anything needs to be changed or upgraded on your system. Server 2003 comes with two tools: System Monitor and Performance Logs and Alerts.
Manage a Web server, Manage Internet Information Services (IIS), Internet Information Services 6.0 is a book unto itself. What this section will do is try to give you a brief overview of what IIS 6.0 is, and what it can do for your organization.
The Server Environment has reviewed monitoring and analyzing tasks on a Windows Server 2003. We took a look at some of the tools you can use to do these tasks, including Event Viewer, System Monitor and Task Manager, as well as some of the specific counters you might use to gain an in-depth knowledge of what is happening on your servers and your network
Sharing Folders using the Command Line To share a folder using the command line, just open the command prompt by clicking on Start | Run | and entering cmd. Alternately, you can use Start | All Programs | Accessories then choose the Command
Files and folders may be audited by Network Administrators to enhance and secure network information. This is a great option to implement when you need to make certain documents and folders (let's say, Human Resource information stored in a folder on the network) remain secure. Group Policy can be used to audit files and folders.
Setting Procedure: Local computer Open your Local Security Settings by clicking on Start then Run type MMC. File then Add/Remove Snap-in. Add the Local Security Policy. To change the security settings click on Local
Configure file system permissions: Verify effective permissions when granting permissions. There are some very specific "best practices" that should be considered when granting permissions for Terminal Services: 1. Deny permissions should be used for certain special cases-to exclude a subset of a group that has Allowed permissions or to exclude one special permission when you have already granted full control to a user or group
Here are Top 15 Windows Server 2003 Access to Resources Review Questions and Answers.
The Server Environment Introduction: Let’s be honest. When it comes to monitoring servers, you either love it or you view it with all the enthusiasm of a visit to the dentist. If you fall into the second category, as I do, you pray that you work with someone who falls into the first category.
Access to Resources Introduction: Information Technology personnel working with Windows Server 2003 networks always face the task of assigning and maintaining access to network files and folders. The following chapter will show you how to configure shared folder access, manage shared folder permissions, troubleshoot Terminal Service error messages and configure File system permissions.
>