Essay PreviewMore ↓
In this first part of class we covered the entire Windows 2000 Professional operating system. We covered everything that you would need to know to install, use and administer Windows 2000 Professional. All of the labs we did helped us further understand the Windows 2000 operating system. We did everything from installing Windows to encrypting files. I liked the labs where we had to set up user profiles and permissions. Philip was my partner for any labs that required a partner. The labs made for very good hands on experience with Windows 2000 and really helped me to know and understand the operating system much better.
Lab1: Installing Microsoft Windows 2000 Professional
The topic of lab one was to install Windows 2000 Professional. Once the jumper settings on the hard drive were set to cable select Windows could be installed. Before Windows was installed the hard drive had to be partitioned. Windows was then installed from a CD. The Windows 2000 Professional install is pretty easy. Setup gives you the option to create and format a partition, therefore eliminating the need to use fdisk. Going through Setup and all of the different options is also fairly easy. After Windows was installed it had to become part of a domain. I logged on as Administrator and added Administrative Tools to the Programs menu. After that I joined my computer to the Corp2.Corp.com domain. After that was complete I could then log on to the domain. At the end of lab one Windows 2000 Professional was installed and the computer was part of the domain.
Lab 2: Creating a Customized Console with Microsoft Management Console
The topic of lab two was to start using and get familiar with using Microsoft MMC. The first exercise was to create a custom console. First, mmc needed to be opened. From there I added the Removable Storage Management snap-in on my local computer and saved it. Next, I added the same snap-in on my partners’ computer. By adding this snap-in you can perform remote administration to a networked computer, rather than being in front of the computer. The lab had us test the consoles we created. I checked the removable storage device on my computer locally and my partners’ computer remotely.
How to Cite this Page
"Windows 2000 Professional Summary." 123HelpMe.com. 20 Feb 2020
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- An Introduction to Windows 2000 Professional Reliability Windows 2000 Professional is up to 30 percent faster and, according to National Software Testing Labs (NSTL) tests, 13 times more reliable than Windows 98. The operating system is the most reliable version of Windows ever produced. Memory conflicts and missing or altered system files caused many of the system crashes prior to Windows 2000. To put an end to these problems, Microsoft changed Windows 2000 memory management to reduce the chance that software applications will interfere with one another.... [tags: Essays Papers]
3290 words (9.4 pages)
- An Operating system is system software that controls the system’s hardware that interacts with users and the application software. As we all may know, Windows Microsoft has always been a commercial high-level sale in the retail industry and an in domain operating system used today. But there are more operating systems than just Windows Microsoft than the general population may assume. Linux is another well-known operating systems, which is free and open-source software. Linux is also used in companies we would have never thought of like Google, NASA, USPS, Amazon and many more companies.... [tags: Microsoft Windows, Windows Vista, Operating system]
2315 words (6.6 pages)
- Backing up Active Directory in Windows 2000 Generally speaking, the backup of mission critical data is the most important part of any IT engineer’s job. While recovering the missing data is important, additional consideration needs to be given to getting the network framework back up and running quickly so that employees can get back to work, saving the company the added cost of lost man-hours. We also need to ensure that the network structure that gets restored is one that the employees are use to using.... [tags: Computer programming Windows Directory]
1937 words (5.5 pages)
- Windows 2000 Windows NT Workstation 5.0 is now called Windows 2000 Professional Windows NT Server 5.0 is now Windows 2000 Server Windows NT Server Enterprise Edition becomes Windows 2000 Advanced Server Plus there is a new offering: Windows 2000 Datacenter Server Windows 2000 Professional will be limited to support only two processors. Windows 2000 Server will be able to support up to four processors. Windows 2000 Advanced Server will support up to eight processors. And Windows 2000 Datacenter Server will support up to 32 processors and additional clustering functions.... [tags: Free Essay Writer]
513 words (1.5 pages)
- The World of Samba vs. Windows 7 The average individual looking for a computer looks for what’s on sale or what’s popular most of the time. You have to remember, just because it’s expensive doesn’t mean it will work great for you. You can buy too much computer, if your needs are met with a very similar computer. Let’s break down what Windows 7 and Samba has to offer. Let me start off with talking about Windows 7. The name Windows is known more than Samba to the average consumer. Windows 7 Starter Edition comes on netbooks, with is already preinstalled.... [tags: Windows Vista, Windows 7, Microsoft Windows]
1662 words (4.7 pages)
- Have you ever wondered where Microsoft will go next with Windows, well now it is time for you to find out. Microsoft has almost completed Windows 2000, which will be the new era for software around the world. In the last year computers have grow dramatically, with the new Pentium II chip and processors with the speeds up to 450MHZ. Almost every family home in America today has at least one personal computer. Whether it is for business or pleasure, more and more people are realizing the significance of computers.... [tags: essays research papers]
712 words (2 pages)
- Introduction Micro Widgets, Incorporated is the world leader in widgets for every aspect of industry. To support the organization, the IT department supports fifty Microsoft Windows 2008 Servers that are used for web services, file and print services, domain name system services (DNS), dynamic host configuration protocol services (DHCP), and domain controllers. At the request of department manager David L. Roth, this document serves to propose an upgrade to the environment that takes advantage of the benefits of upgrading the servers to Microsoft Windows Server 2012.... [tags: Windows Deployment Services]
1291 words (3.7 pages)
- Comparison of Windows 2000 and Knoppix Linux Boot Disk Introduction What is X Windows. The X Window System, often known as X, is a windowing system for graphics workstations developed at MIT with support from DEC, Indiana University (1997-2005). What is the Microsoft counterpart. Microsoft's Windows Graphic Device Interface or (GDI) performs the same functionality for Windows as X Windows does for UNIX or Linux operating systems. We begin the journey by separating out the Windows manager (KDM) from the X Windows (XFree86) on the Knoppix Linux disk.... [tags: Compare Contrast Technology Essays]
803 words (2.3 pages)
- Should this business update to Windows 2000 from Windows 98 for its office PCs. In the business world today, computers and the software applications that run on them basically control an well-organized business. Every major company is equipped with a computer, or network that connects through different branches throughout the firm. To keep up with the fastest technology that dominates the market is to be a sensible buyer. A system can be outdated in a matter of two years time. Therefore, it is necessary for the business to update to Windows 2000 from Windows 98 for its office PCs.... [tags: essays research papers]
472 words (1.3 pages)
- Windows Networking How does DDNS replace WINS in Windows 2000 and later. DDNS replaces WINS by allowing DNS clients to update information in the DNS database files. IP Addresses and DNS records stay in synch so that you can use DNS and DHCP together seamlessly. WINS listens to NBT broadcasts and can not update IP Address information if the DHCP lease expires since the NBT broadcasts registers the machines IP Address with the WINS Server at boot up. NetBIOS is not routable which further complicates things.... [tags: Technology Networking Windows Report]
1897 words (5.4 pages)
Lab 3: Using Task Scheduler
The topic of lab three is to use task scheduler and to configure the advanced options of task scheduler. To start the task scheduler I used the Scheduled Tasks icon in Control Panel. I configured Solitaire to start when I log on to the Computer. I then logged off and back on to make sure it worked and played a game of Solitaire. The lab then had us change some settings in the task scheduler for Solitaire.
Lab 4: Using Control Panel to Change Operating System Settings
The first thing the lab had us do was change the resolution of the screen with the Display icon in Control Panel. I also changed the font size to small fonts. The computer was then restarted so the changes I made would take effect. The next part of the lab was calculating how much RAM is installed in the computer. I found out that the computer has 256 MB of RAM installed. Next, I used Control Panel to configure Accessibility Options. I selected to use Sticky Keys. I think Accessibility Options is a good idea, but personally don’t use it or like it. Using Sticky Keys does not make using Windows any faster for me. The last exercise in the lab had us configure startup and recovery options. First, I changed system startup to 15 seconds from 30. In the System Failure group box I selected to write event to system log and send administrative alert. I chose these options to aide in troubleshooting and administration of the computer.
Lab 5: Using the Registry Editor
The topic of lab five is to get us familiar with using the registry editor. The first exercise had us view information in the registry by using regedt32. I checked to see what HAL was installed and saw that the computer had an Intel processor installed in it. The next exercise had us use the registry’s find key command to search the registry. I did a search for the word windows. The final exercise had us view the registry on our partners’ computer. To do this you open regedt32 and use select computer from the registry menu. I used the registry on my partners’ computer to find out that there is a 3Com NIC installed in that computer.
Lab 6: Working with Dynamic Storage
The first thing the lab had us do was use Disk Management to upgrade to a dynamic disk from a basic disk. This lab ended up being the one that would cause the most trouble for me. The first time I installed Windows I used all one partition, therefore having no unallocated disk space. I also ran into problems when installing Windows 2000 Server. My hard drive was a dynamic disk and since that can’t be used to multi-boot I had to fdisk my drive before installing Windows 2000 Server. The second time I installed Windows 2000 Professional I was sure to leave about 9 GB of unallocated space. I was now ready to upgrade to a dynamic disk by right clicking my hard drive from the Computer Management window. The next part of the lab had us create a simple volume, which is created from unallocated disk space. I made a simple volume of 50 MB. The next exercise had us create a custom console in mmc. I added the Disk Management snap-in and pointed to my partner’s computer and saved it as Remote Disk Man. Finally I used the console I just created to create a simple volume on my partners’ computer.
Lab 7: Configuring TCP/IP
All of lab seven worked with configuring TCP/IP different ways. In the first exercise I viewed and verified that my computers TCP/IP configuration was correct. I opened a command prompt and ran ipconfig /all to view my current TCP/IP configuration. I then did a ping of my own machine using the IP of 127.0.0.1 to make sure my computer was properly configured. The next part of the lab had us configure TCP/IP to use static IP and static DNS server addresses. This was done by going to the properties of TCP/IP. I changed the IP address and selected to use a DNS server. I pinged my partners’ computer to test the changes I had made. Next, I configured TCP/IP to automatically obtain an IP address and a DNS server address. I used TCP/IP properties to make all necessary changes. I used ping to determine the IP assigned to my computer. Next we worked together to use Automatic Private IP Addressing. I released my ipconfig settings then renewed them and used ipconfig to review the changes. The last exercise had us obtain an IP address from a DHCP server.
Lab 8: Installing Additional Protocols
This lab had us install the non-routable protocol NetBEUI. This protocol was installed from the Local Area Connections window. I selected install, protocol and then selected NetBEUI. Other protocols can also be installed in the same way.
Lab 9: Working with Network Bindings
This lab helped to get us familiar with working with protocols. The first thing I did was change the binding order of the protocols on my computer. I changed my bindings to have TCP/IP bound first then NetBEUI bound second. The lab then had us unbind TCP/IP by un-checking the box next to it. I then removed the NetBEUI protocol and then bound the TCP/IP protocol by putting a check in the box next to TCP/IP. The computer was then restarted so the changes I made would take effect.
Lab 10: Searching Microsoft Windows 2000 Active Directory Directory Services
This lab helped to get us familiar with searching the Active Directory services on another computer. I searched the active directories of the Instructor2 computer and my partners’ computer. Next I searched Active Directory for a user. I did a search for people under Search for Other Items and did a search for my partner.
Lab 11: Creating Local User Accounts
This lab was the first lab that dealt with creating user accounts. The first thing I had to do in this lab was to create four user accounts. I used Computer Management and selected Local Users and Groups. I entered in all of the users and password information by right clicking in Users and selecting New User. This proved to be a process that would be repeated many times during lab. The lab ended by having us test one of the accounts that had just been created.
Lab 12: Creating and Managing Local Groups
This was the first lab where local user groups were created. I opened Computer Management and selected Groups. I viewed a list of groups that currently existed.
The lab then reminded us that a group name could contain, as many as 256 characters and that the backslash character is illegal in naming groups. I then created the groups Engineers and Helpdesk. User1 and User4 are members of the Engineers group and User1, User2, User3, and User4 are all members of the Helpdesk group. The lab pointed out the difference between holding the shift or control key while selecting users. Holding down shift will select all users in between the selected users. Holding down the Control key will only select the users that are clicked on and not the ones in between. The next exercise had us add and remove members from local groups. I added User2 and User3 to the Engineers group. I then removed User1 and User4 from the Engineers group.
Lab 13: Installing a Network Printer
In this lab I added and shared a local printer. I selected printers from the settings menu and started the Add Printer wizard. I created a local HP LaserJet 5Si printer on LPT1. I then shared the printer as 3EastMail. I reviewed the summary of instillation choices and finished the Add Printer Wizard. Windows then copied the printer files and placed a hand under the printer icon indicating that the printer had been shared.
Lab 14: Managing Printers
This lab helped us get familiar with managing printers. I selected the properties of the HP LaserJet 5Si that I had previously created. From there I told the printer to use the Lower Paper Tray and Legal size paper from the Device Settings tab. On the Advanced tab I selected the Separator Page button. I selected the Sysprint.sep file to be the separator page between print jobs. Next, the lab had us take ownership of a printer. In the properties of the HP LaserJet 5Si I clicked the Security tab and then clicked the Advanced button. Then I clicked the owner tab and then took ownership of the printer.
Lab 15: Managing Documents
The first step of this lab was to take the HP LaserJet 5Si I had been working with previously offline. I selected the HP LaserJet 5Si and on the file menu selected Use Printer Offline. The printer icon is now grayed out showing that the printer is offline. The lab then demonstrated how a document is held when trying to print to the HP LaserJet 5Si since the printer is offline. I then set up a notification to be sent to User1 when the document is printer. Selecting the document properties and changing the priority number can change the priority of a document. The higher the number the greater priority the document has. To cancel a document waiting to be printed select the document and click cancel on the Document menu or by selecting the document and pressing the delete key.
Lab 16: Planning and Assigning NTFS Permissions
This lab took me longer to complete than any other lab and had more planning and setup associated with the lab. Before the lab could even be started I needed to create three new local groups and six new users. I also had to create a few new directories. This lab was different from all of the others in that it did not have a specific procedure on what was to be done in the lab. The lab consisted of details of what was to be accomplished. It took a while to fill out the table for all of the different directories, but did prove to be helpful. Creating the groups and users was not too difficult, but placing the users in the proper group and assigning the correct permissions was a bit time consuming. The parts of the lab where I assigned and tested NTFS permissions were straighter forward since the lab guided me through it. This lab was a bit harder, but was also a good lab in that you actually had to do planning and setting up user accounts like a real administrator would.
Lab 17: Managing NTFS Permissions
In order for this lab to have been done the previous lab had to be completed correctly. In the first part of the lab I created a text document and viewed the default permissions of the file. I then assigned the Take Ownership permission to a user account, then took and tested ownership of the file. Next I created folders that did not allow Inheritable Permissions. I then denied access to a file from a certain group, so that group could not access that file. But I found out that a user in the group I denied access to can work with that file from dos.
Lab 18: Managing Shared Folders
In the first part of this lab I created and shared a folder. I then viewed and removed permissions for a group to the folder I just created and shared. I then added a different group to the shared folder and assigned the Full Control permission.
My partner then made sure that my shared folder was set up correctly by accessing the folder over the network. Next, I changed the permissions of the folder and had my partner connect to my shared folder to notice the differences. Next I mapped a network drive to my partners shared folder. Mapping a network drive can be convenient in that you don’t have to browse the network every time you log on to find the files you need. At the end of the lab I stopped the sharing on the folder that I had been sharing in the lab.
Lab 19: Auditing Resources and Events
This was the first lab where we worked with audit policies. The first exercise had us use the Local Security Policy to use the Audit Policy. I set it up so the computer would audit certain events and then restarted the computer for the changes to take effect. I then created a new user and then went to the security log and saw that the Event Viewer had recorded that I had created a new user. I then saved the security log and then cleared the security log. Saving the security log for certain days or weeks can help in the administration process of a network. Finally I archived the security log by saving the security log as file type “Security Log”.
Lab 20: Configuring Account Policies
In the first part of this lab I configured the minimum password length for the system. I opened MMC and expanded the Group Policy tree to Account Policies and changed the password length to seven characters. I then tested my local security policy settings by removing my computer from the domain. Next I configured Account Policies settings to make each user change his password every four weeks, gave the password a minimum age of two days, and the user must have at least four different passwords. I then set up the Account Lockout Policy to lockout a user after four failed logon attempts and the lockout duration to zero minutes so the administrator has to unlock the account. I then tested my settings by locking a user account by logging on four consecutive times with the wrong password. I then had to log on as administrator and unlock the account from Computer Management.
Lab 21: Configuring Security Settings
This lab had us configure Security Options on my computer. I used Administrative Tools and browsed to Local Policies and configured the following settings. Users need to log on in order to shut down the computer; Users must press Ctrl+Alt+Delete to log on to the computer; Windows does not display the last user that was logged on the computer. After these settings were changed I rejoined the domain of Corp2.Corp.com. Changing these settings help to increase the security of windows and to keep unwanted personnel from using certain computers.
Lab 22: Managing NTFS Compression
Having lab 16 done was a prerequisite for starting this lab. The first thing I did in this lab was to view the capacity and free space of the partition I installed Windows 2000 professional on. I then compressed a folder by going to the properties of the folder, which will save disk space. I then used Folder Options to display compressed folder names in a different color to make it easier to distinguish between compressed and uncompressed folders. I then found out that copying a compressed file to an uncompressed folder would uncompress the file. I also found out that when an uncompressed file is copied to a compressed folder the file becomes compressed. A folder or file can be compressed or uncompressed by going to the properties of the folder or file.
Lab 23: Enabling and Disabling Disk Quotas
The first part of this lab was configuring and testing quota management settings. First, I created a new local user account. Next I enabled Quota Management by going to the properties of my hard drive. I limited user disk space to 10 MB and to give a warning at 6 MB. I added User5 to a New Quota Entry and set the disk space to 20 MB and warning level at 16 MB. I tested Quota Management by copying files to a folder that was created by User5. I could not copy all of the files I selected because the files exceeded the 20 MB limit set to User5. I then disabled Quota Management by going to the properties of my hard drive.
Lab 24: Encrypting and Decrypting Files
This was the first lab where we worked with encrypting and decrypting files. First I created a new folder and a new text file inside the new folder. I then went to the properties of the file and selected to encrypt the file. An encryption warning came up that allowed me to also encrypt the folder that the file is contained in, which I did. I then logged on as a different user and tried to view the contents of the encrypted file, but could not since another user encrypt it. I then logged on as administrator and decrypted the file by going to the properties of the file and clearing the Encrypt Contents check box.
Lab 25: Defragmenting a Hard Disk
This lab had us use Disk Defragmenter in System Tools. After Disk Defragmenter was opened I first analyzed the disk and then defragmented my hard drive. After the hard drive was defragmented I view and save the report.
Lab 26: Backing Up Files
This was the first lab where we used the Backup wizard. First, I used the backup wizard to backup my boot.ini file. During the backup wizard I had to make lots of configuration choices for the backup. At the end of the backup job I viewed a backup report. Next, I created a backup job to be performed later by using task scheduler. By doing this I can choose all of my configuration options and then let the backup run by itself unattended.
Lab 27: Restoring Files
In order to complete this lab I had to have had completed the previous lab or have some files on my hard drive backed up. First, I started Backup from the System Tools menu. I then used the restore wizard button and chose to restore the backup of my boot.ini file I had made in the pervious lab. I also went through the entire wizard and made the proper configuration selections. At the end of the restore I viewed a restore report and verified that the file had been properly restored.
Lab 28: Managing Shared Folders
In this lab we were working with shared folders on our partners computer. First I opened Computer Management to view all of the shared folders on my computer. Then I created a new shared folder to be used with this lab. I then connected to my partners’ computer and viewed and opened the shared folder he just made on his computer. Since my partner was doing the same thing I was I could see the shared folder he had opened on my computer through Computer Management. At the end of the lab I disconnected all used from my computer so no one could have any more access to any shared files or folders on my computer.
Lab 29: Creating Shared Folders
In this lab I used Computer Management to create a shared folder, selected the default permissions and did not create another shared folder. Next, I created a custom console on my partners’ computer using MMC and saved the console. Then using the custom console I just created I made a shared folder on my partners’ computer. Finally I used a custom MMC console to choose which computer I want to create and manage shares on.
Lab 30: Sending Console Messages
In this lab we learned how to send console messages in Computer Management from one computer to another. This lab proved to be the most useful of all of the other labs. This tool can be useful for administrators to let users know that the server will be shutting down at a certain time.
Lab 31: Configuring an Inbound Connection
In this lab I used the Network Connections wizard to make and configure an inbound connection. I selected the Accept Incoming Connections radio button in the wizard then configured the connection. This is a useful tool in that it will allow users or administrators access to a computer from a remote site.
Lab 32: Configuring an Outbound Connection
In this lab I used the Network Connections wizard to make and configure an outbound connection. I selected the Connect To A Private Network Through The Internet radio button in the wizard then configured the connection. This is a useful tool in that it will allow users or administrators access to another computer at a remote site.
Lab 33: Installing and Using the Microsoft Windows 2000 Recovery Console
In the first part of this lab I viewed the files that are used by Windows in the boot process. Next, I installed the Windows 2000 Recovery Console by running cmdcon. Now when I restart my computer I have the choice of going into Windows 2000 Professional or the Windows 2000 Recovery Console.
Lab 34: Installing and Using the Microsoft Windows 2000 Installation Deployment Tools
In the first part of the lab I extracted the deployment tools from the network to my computer. After doing this my computer had all of the Deploy files needed. I then used Setup Manager to create an unattended setup script. I went through the setup and selected all of the configuration options that would be needed to have windows do a full-unattended install. Setting up the Setup Manager does take some time and planning, but can be well worth if you have to install Windows 2000 on several computers and don’t have the time to sit at each one and guide it through setup.
Lab 35: Using the System Preparation Tool
In this lab I used the Windows 2000 Setup Manager to create a new Answer file for Sysprep.
This time when I ran the Setup Manager I chose to create a new Answer file. I went through the configuration and selected the proper settings and created the new file. The file I just made can now be used to create a master disk image and install Windows 2000 Professional.
Lab 36: Configuring Offline Folders and Files
This lab was used to configure offline files and folders to be used when a computer is not attached to the network. First, I had to make sure that Enable Offline Files and Synchronize All Offline Files Before Logging Off were enabled. Next I created a shared folder and a text document and configured it to be used offline by other users. Then I used the Synchronization Manager to configure my computer to synchronize files every time a user logs on or off. Finally my partner and I made a number of modifications to the text files we each created to test the file synchronization.
Lab 37: Configuring Power Options
In this lab I used Control Panel to configure Power options. I created and configured a new power scheme to be used for a laptop. This can be a very useful tool especially for a laptop so that no needed power is wasted.
Lab 38: Using Device Manager and System Information
In this lab I used the Device Manager to view devices on my computer and their status. A nice feature in the Device Manager is a troubleshooting help file that can be used to find out what is wrong with device attached to the computer. I also used MMC to view system information like which IRQ is assigned to which device. I like that Microsoft added the Device Manager to Windows 2000. It makes installing, configuring and troubleshooting devices much easier.
Lab 39: Using the Windows Signature Verification Utility
In this lab I used the File Signature utility to view driver signing on my computer. This utility can also be used to troubleshoot driver signing. When the utility was finished a SigVerif message popped up telling me that all of my files were scanned and verified as digitally signed.
Microsoft Windows 2000 Professional Book