Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

a. Discuss what the Reliability and Performance Monitor does in Windows Server 2

ID: 665930 • Letter: A

Question

a. Discuss what the Reliability and Performance Monitor does in Windows Server 2008 and how to access it and what are all its functions. What are data collector sets and how to work with them?

b. Discuss what is WSUS and how it is beneficial to a network. What are the key considerations involved in managing WSUS clients?

c. Discuss the different types of network authentication and how the IPSec driver works and discuss all the steps in the security negotiation process.

d. Discuss the deployment considerations for IPSec. List different ways to manage and monitor IPSec.

Explanation / Answer

A)

Discuss what the Reliability and Performance Monitor does in Windows Server 2008 and how to access it and what are all its functions. What are data collector sets and how to work with them?

     In general terms, performance is the measure of how quickly a computer completes application and system tasks. Overall system performance might be limited by the access speed of the physical hard disks, the amount of memory available to all running processes, the top speed of the processor, or the maximum throughput of the network interfaces.

After identifying hardware performance limitations, IT professionals can monitor individual applications and processes to assess how much of the available resources they use. IT professionals can use a comprehensive analysis of performance of both application impact and overall capacity to help plan for deployment and grow system capacity with increasing demands.

Windows Reliability and Performance Monitor enables you to track the performance impact of applications and services, and to generate alerts or take action when user-defined thresholds for optimum performance are exceeded.

The reliability of a system is the measure of how often the system operates as it is configured and expected to perform. Reliability can be reduced when applications stop responding, services stop and restart, drivers fail to initialize, or in the worst case, when operating systems fail.

Reliability Monitor provides you with a quick, visual view of the average stability of your system. In addition, it tracks events that will help you identify what causes reductions in reliability. By recording not only failures (including memory, hard disk, application, and operating system failures), but also key events regarding the configuration of your system (including the installation of new applications and operating system updates), you can see a timeline of changes in both the system and reliability, and can identify how to get your system back to optimal reliability when it does not behave as expected.

B)

Discuss what is WSUS and how it is beneficial to a network. What are the key considerations involved in managing WSUS clients?

If the network includes mobile users who log on to the network from different locations, you can configure WSUS to let roaming users update their client computers from the WSUS server that is closest to them geographically. Figure 7 shows one WSUS server deployed in each region, and each region is a DNS subnet. All client computers are directed to the same WSUS server, which resolves in each subnet to the nearest physical WSUS server.

C)

Discuss the different types of network authentication and how the IPSec driver works and discuss all the steps in the security negotiation process.

In this section

In the Microsoft Windows Server 2003 operating system, Internet Protocol security (IPSec) helps provide defense-in-depth against network-based attacks from untrusted computers. IPSec provides protection from attack in host-to-host, virtual private network (VPN), site-to-site (also known as gateway-to-gateway or router-to-router), and secure server environments. You can configure IPSec policies to meet the security requirements of a computer, an organizational unit, a domain, a site, or a global organization.

IPSec uses packet filtering and cryptography. Cryptography provides user authentication, ensures data confidentiality and integrity, and enforces trusted communication. The strong cryptographic-based authentication and encryption support that IPSec provides is especially effective for securing traffic that must traverse untrusted network paths, such as those on a large corporate intranet or the Internet. IPSec also is especially effective for securing traffic that uses protocols and applications that do not provide sufficient security for communications.

To successfully deploy IPSec for Windows Server 2003, you must ensure the following:

D)

Discuss the deployment considerations for IPSec. List different ways to manage and monitor IPSec.

Remote management and monitoring of IPSec is supported only for computers running the same version of the Windows operating system. To remotely manage and monitor IPSec on a computer that is running a different version of Windows than the version of Windows that is running on your computer, use Terminal Services. For example, if your computer is running the Windows Server 2003 family, and you plan to remotely manage and monitor IPSec on computers running Windows 2000 or Windows XP, use Terminal Services to gain remote access to these computers.

If your computer is running the Windows Server 2003 family, and you plan to manage and monitor IPSec on computers that are also running the Windows Server 2003 family, you can run the IPSec Policy Management console and IP Security Monitor, or you can use the Netsh command-line tool remotely.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at drjack9650@gmail.com
Chat Now And Get Quote