M. C s a win December 2012 exam for 12
configure an advanced Windows server 2012 Service is
in this supplemental module we're gonna be talking about,
um, options for storage optimization
in this module will learn about enhanced oryx features such as file access, audited
network file system, data stores on data do duplication.
Also, we have a lab, This lab. We're gonna use partial command late to configure
day that do duplication. You can use server manager, but for the demonstration in this lab, we're gonna use powershell command lates
what, as far access or didn't do for you
File access Auditing Windows Server 2012 hour, too,
can be used to achieve a number of goals such as regulatory compliance.
Most organization of a regulatory organization that they have to be in compliance with with if you work for the hospital is deeper.
If you work for the stock exchange sec,
if it's the government's is the G a O which is government accountability organizations. Something like that,
also can be You can also help you with monitoring. You can monitor your data. You can mount a classified data to see was accessing it was making changes to it.
Also, um, five access are auditing allow you to
ah, for allow you to do forensic analysis. You can do a forensic analysis off your fouls
casing. Somebody hack your system. Somebody hacker data. You can see we're hacked in when they access it and stuff like that. So I'm also allow you to fall to do troubleshooting. You can actually troubleshoot
let's look at it. For example, if you
if you're running working on organizations such as the hospital,
you need to comply with the prep o violation that Australia has been, um,
you've been fine for that. But if you're using five access on it and allow you to audit were accessing file who wanted it? What do you do when the access our farm? What is their permission?
For example, if you're on you
file access auditing you window several 2012 hour, too.
I allow you to extend your security audit in strategy,
for example, when it usually with D A. C, allow you to create tag it Arctic policies
by using expression based,
such as, ah, use acclaim. computer claim,
For example, you can create an Arctic policy to track all read on right access to a class if I foul
to see was access it
the next time we're gonna be talking about his NFS data store.
NFS just called Network file system Data store
is supported in Windows Server 2012. Released too.
This is supported through the NFS Roll Service,
which NFL she allows a window based computer to act as the NFS server on. They can share files in the mix environment off.
Different computers are pretty systems and networks
once you install the roll service.
And if it's she Emmy can be called figured
when you fall their properties
on the NFS sharing tab.
Other users the organization Roni NFS client software can access directories
based on computers. Ryan, the NFS roll service.
You know, NFS years can be accessed in the same manner as you access local files.
The next topic is data do duplication.
What does that do duplication do for you?
For example, if you work in an environment a large empowerment
where you have a volumes of sheer fouls, there's a possibility you have duplicate files
or part of the files are duplicate files. What did I do? Duplication would do. It would try to Garrett of duplicate files.
this one would do it. Will
it can. It's gonna chris on files into chunks in the small chunks. And with this small chunks, you can identify duplicate chunks.
These duplicates are replaced by a pointer to a single start. Copy. So if you're using, did I do duplication allow you to storm our data
because of redundant copies Are files will be
They're do duplication can become figure. Uses several manager out roll
Or you can use window partial command lates,
for example. Next lab
demonstration, we're gonna be using windows. Partial command lit itself using server manager to configure the role.