Time
5 hours 18 minutes
Difficulty
Intermediate
CEU/CPE
20

Video Transcription

00:04
M. C s a win December 2012 exam for 12
00:08
configure an advanced Windows server 2012 Service is
00:13
in this supplemental module we're gonna be talking about,
00:18
um, options for storage optimization
00:22
in this module will learn about enhanced oryx features such as file access, audited
00:29
network file system, data stores on data do duplication.
00:35
Also, we have a lab, This lab. We're gonna use partial command late to configure
00:40
day that do duplication. You can use server manager, but for the demonstration in this lab, we're gonna use powershell command lates
00:49
now
00:50
far access auditing
00:53
what, as far access or didn't do for you
00:56
File access Auditing Windows Server 2012 hour, too,
01:02
can be used to achieve a number of goals such as regulatory compliance.
01:07
Most organization of a regulatory organization that they have to be in compliance with with if you work for the hospital is deeper.
01:15
If you work for the stock exchange sec,
01:21
if it's the government's is the G a O which is government accountability organizations. Something like that,
01:26
um
01:29
also can be You can also help you with monitoring. You can monitor your data. You can mount a classified data to see was accessing it was making changes to it.
01:40
Also, um, five access are auditing allow you to
01:45
ah, for allow you to do forensic analysis. You can do a forensic analysis off your fouls
01:52
casing. Somebody hack your system. Somebody hacker data. You can see we're hacked in when they access it and stuff like that. So I'm also allow you to fall to do troubleshooting. You can actually troubleshoot
02:04
your data.
02:06
Um,
02:07
let's look at it. For example, if you
02:09
if you're running working on organizations such as the hospital,
02:14
you need to comply with the prep o violation that Australia has been, um,
02:20
you've been fine for that. But if you're using five access on it and allow you to audit were accessing file who wanted it? What do you do when the access our farm? What is their permission?
02:30
For example, if you're on you
02:32
file access auditing you window several 2012 hour, too.
02:38
I allow you to extend your security audit in strategy,
02:43
for example, when it usually with D A. C, allow you to create tag it Arctic policies
02:47
by using expression based,
02:51
um
02:53
such as, ah, use acclaim. computer claim,
02:57
um, resource claim.
03:00
For example, you can create an Arctic policy to track all read on right access to a class if I foul
03:07
to see was access it
03:09
the next time we're gonna be talking about his NFS data store.
03:15
NFS just called Network file system Data store
03:20
is supported in Windows Server 2012. Released too.
03:24
This is supported through the NFS Roll Service,
03:29
which NFL she allows a window based computer to act as the NFS server on. They can share files in the mix environment off.
03:38
Different computers are pretty systems and networks
03:42
once you install the roll service.
03:46
And if it's she Emmy can be called figured
03:49
when you fall their properties
03:51
on the NFS sharing tab.
03:54
Other users the organization Roni NFS client software can access directories
04:00
based on computers. Ryan, the NFS roll service.
04:06
You know, NFS years can be accessed in the same manner as you access local files.
04:13
Um, e organization.
04:15
The next topic is data do duplication.
04:18
What does that do duplication do for you?
04:21
For example, if you work in an environment a large empowerment
04:26
where you have a volumes of sheer fouls, there's a possibility you have duplicate files
04:31
or part of the files are duplicate files. What did I do? Duplication would do. It would try to Garrett of duplicate files.
04:40
Okay,
04:42
this one would do it. Will
04:44
it can. It's gonna chris on files into chunks in the small chunks. And with this small chunks, you can identify duplicate chunks.
04:54
These duplicates are replaced by a pointer to a single start. Copy. So if you're using, did I do duplication allow you to storm our data
05:03
because of redundant copies Are files will be
05:08
eliminated.
05:11
They're do duplication can become figure. Uses several manager out roll
05:15
feature, wizard.
05:17
Or you can use window partial command lates,
05:20
for example. Next lab
05:23
demonstration, we're gonna be using windows. Partial command lit itself using server manager to configure the role.

Up Next

Microsoft Certified Solutions Associate (MCSA) Certification

Our self-paced online Microsoft Certified Solutions Associate (MCSA) certification training course will teach you all you need to know for the certification exam: how to configure file and print services, how to deploy, manage and maintain Microsoft servers, and other relevant topics.

Instructed By

Instructor Profile Image
Michael Boberg
CEO of Broadline Enterprises, LLC
Instructor