What’s on the CD-ROM This appendix provides an overview of the software included on the Windows 2000 Server Bible CD and explains how to install the software from the CD.. Aelita The Win
Trang 1What’s on the CD-ROM
This appendix provides an overview of the software
included on the Windows 2000 Server Bible CD and explains how to install the software from the CD
Aelita
The Windows 2000 Server Bible CD includes several utilities from Aelita, described in the following sections These prod-ucts are included in the Aelita Enterprise Suite Aelita’s Web site is located at http://www.aelita.com
Delegation Manager
Delegation Manager is targeted at medium- to large-size net-works where managing security for domains, member servers, and workstations can be difficult because of the sheer number
of accounts involved Delegation Manager adds access control over user accounts and groups, enabling an administrator to delegate routine administrative tasks with limited permissions
to other users For example, you might delegate the ability
to re-enabled locked accounts or change passwords to a specified user or group of users
Delegation Manager lets you represent any subset of
adminis-trative authority as a custom access template containing
col-lections of elementary permissions You can then use the template to easily and quickly grant administrative authority
to other users without giving them full administrative rights and permissions
Trang 2Delegation Manager uses a client/server architecture to enable this security delega-tion The Server component runs as a secure service on a Windows 2000 Server or Professional computer The Delegation Manager Client runs on the client side and passes administrative requests to the Delegation Server, which controls whether
or not the user can perform the specified tasks
ERDisk
The Rdisk utility included with Windows NT provided a means of backing up the registry and creating an emergency repair disk (ERD) for NT systems The Windows
2000 Backup utility provides much the same capability, enabling you to back up the system state data and create an emergency repair disk (though arguably a less use-ful ERD than that created by NT’s Rdisk) Aelita’s ERDisk utility broadens the ability
to create repair disks, enabling you to create disks for remote servers and worksta-tions across the network from a central location, simplifying system administration ERDisk can store the repair information on a network server for security, and you can use the files for a given server or workstation (or class of computers) to repair the system if it becomes necessary
Enterprise Directory ReporterAelita’s Enterprise Directory Reporter (formerly Virtuosity) comprises three tools: the Virtuosity Wizard, Virtuosity Classic, and Domain Migration Wizard The Virtuosity Wizard puts a more user-friendly face on Virtuosity Classic, both of which enable you to store in an Access or SQL database network-wide information about users, groups, account security configuration, access permissions, password settings, and a wide range of other data collected from the network In addition to providing a means of collecting and analyzing the data, Virtuosity also enables you to apply changes to settings across the enterprise The Domain Migration Wizard is particularly useful for organizations moving from Windows NT domains to Windows 2000 domains and the Active Directory The wizard is targeted at domain reconfiguration tasks such as domain consolidation, domain split, transition from multi-master model to multi-resource model, and other changes
ClockWatch
Beagle Software’s ClockWatch 1.3.4 enables you to synchronize the time on multiple systems running Windows 2000, Windows NT, and Windows 95/98
The software provides separate server and client components All clients can synchronize the system time from a ClockWatch server (running the Server component) or communicate with the National Institute of Standards and Technology (NIST) or other Internet time server to synchronize time Beagle’s Web site is located at http://www.beaglesoft.com
Trang 3Diskeeper 5, from Executive Software, is an advanced disk defragmenter applica-tion It can defragment volumes on remote computers, and can be set to defrag-ment volumes according to a schedule
Full Armor Zero Administration 2000
The Full Armor Zero Administration kit (FAZAM) enables you to analyze and plan Group Policy implementation, which helps avoid potential problems in applying group policies that can have an unintended affect on a large number of users You can use the tool to perform what-if analysis on policies to determine what impact they’ll have on users in the enterprise before you apply the policy changes You also can use FAZAM to analyze existing policies to troubleshoot problems and provide help desk support Full Armor’s Web site is located at http://www.fullarmor.com
CrondSys Scheduling System
CrondSys provides a means of scheduling any Windows NT or Windows 2000 appli-cation for unattended execution at specified dates and times by Windows 95/98, Windows NT, and Windows 2000 clients The crondSys Scheduling Engine runs as
a Windows 2000 service on the target system and uses the security inherent in the network domain/workgroup structure to allow or deny users the ability to execute applications Administrators can specify which users or groups of users can schedule tasks with crondSys
The crondSys client provides an interface through which users can create, view, and manage tasks on the local or remote systems running the crondSys Scheduling Engine In addition to enabling you to schedule tasks in much the same way that the
AT command provides, crondSys lets you send keystrokes to applications, develop your own applications through VB, Java, or other scripting languages, generate notifications through SMTP, and much more #ifdef’s Web site is located at http:
//www.ifdef.com
KeyServer
KeyServer 5.1, from Sassafras Software, Inc., is a software sentry and software asset manager for your network This product specializes in metering software use through-out the enterprise, which ensures licensing is adhered to, and that software access is not being abused by anyone
Trang 4In addition to metering, this product offers protection from piracy Anyone who attempts to steal software from the corporate network will not be able to use his
or her loot without the key server in the loop KeyServer supports both convenient and secure metering choices KeyServer’s auto-discovery tool allows automatic monitoring and/or control of any applications And KeyServer will continue to add newly installed applications as they are used by end-users
The product is especially useful in the world of thin-client/server and application service providers It is the only software license metering system that has the capa-bility to simultaneously support thin-client desktops and traditional desktops Sassafras’ Web site is located at http://www.sassafras.com
RecoverNT
RecoverNT 3.1, LC Technology International scans a drive sector-by-sector, enabling you to rebuild a drive and recover lost data RecoverNT enables you to restore deleted files and directories Changes are made in memory, giving you an opportunity to review them before committing them to disk You can view the recovered data as text or in hex Because RecoverNT works above the file system driver level, it can restore data from stripe sets, RAID volumes, and NTFS volumes
LC Technology’s Web site is located at http://www.lc-tech.com
Liquid Time
Liquid Time, from Code Blue Technologies, is a utility for Windows NT and Windows 2000 designed for creating and scheduling executable programs, batch files, and scripts Liquid Time incorporates several features:
✦ Administrator Console: GUI for creating, editing, and managing batch jobs.
You also use the Administrator Console for viewing log files and templates
✦ GUI Diagramming Editor: Use this tool to graphically design and view batch
jobs using a flow chart analogy
✦ Server Scripts: Use server scripts in batch programs to perform higher-level
functions such as accessing the file system or databases, generating e-mail, and so on
✦ Server Script Editor: Use this tool to write and debug server scripts
✦ Batch Job Triggers: Triggers let your batch programs watch for events and
initiate tasks when the events occur
Trang 5✦ Agents: Use agents to distribute execution of batch programs across the
net-work, using multiple systems to provide increased CPU power for the task
✦ Navigator: This folder provides a graphical view of the Liquid Time server
and current/pending jobs
You’ll find Code Blue’s Web site at http://www.liquidtime.com
DirectoryAnalyzer
NetPro Computing, Inc., specializes in the health of directory services Directory Analyzer 1.02, for Active Directory , monitors and troubleshoots all critical compo-nents of Active Directory, including domain controllers, domains, sites, and certain DNS functions DirectoryAnalyzer provides the peace of mind you need to deploy Active Directory in a rapid timeframe
The product monitors all critical functions of the directory service, from replication latency and replication topology problems to high LDAP loads and DNS inconsisten-cies The product also monitors and alerts you immediately to critical infrastructure problems You’ll find NetPro’s Web site at http://www.netpro.com
ScriptLogic
ScriptLogic 2.5, from Inteletek, Inc., builds on the KiXtart logon scripting language to enable you to build sophisticated logon scripts that provide validation logic of drive mappings, path control, printer deployment, shell folders, Internet access, service pack installations, anti-virus signature updates, mail profile creation, and many other automated tasks In addition to providing a GUI for building scripts, ScriptLogic includes a GUI for managing replication of scripts, an important aspect of logon script management See the company’s Web site at http://www.scriptlogic.com
Support Aide
Support Aide 1.01, from Lakeside Software, Inc., is a system metrics tool that records and analyzes the applications and system resources that are accessed
by users as they perform their day-to-day work It allows a system planner to find out key information such as what applications and application versions each user executes, what system resources these applications consume, what level of service users are receiving, and the effect that users and applications have on overall system performance
Trang 6As a system metrics tool, Support Aide aids system administrators in medium- and large-scale Windows NT/2000 installations The product is scalable and can provide information on thousands of systems from a single console It collects data from each system and automatically maintains a hierarchy of databases Administrators can analyze the entire organization or can drill all the way down to an individual system You’ll find Lakeside Software on the Web at http://www.lakesidesoftware.com
UltraAdmin
UltraAdmin 1.5, from Dorian Software Creations, Inc., bundles several common administrative tasks into a single GUI, giving you a central point of control over
a wide variety of system and network administration tasks The program automati-cally shows all systems in a specified workgroup or domain in the main UltraAdmin window You can right-click on a computer in the list and choose one of several commands on its context menu to view administrative shares, reboot the computer, send a message to it, and manage several other aspects such as file shares, services, connected users, open files, printers, and so on You can use UltraAdmin as a replace-ment to the Network Neighborhood since it displays all computers in the domain or workgroup and lets you browse to them
UltraAdmin’s SID Wizard is a useful feature, as well You can use the wizard to view the SIDs of user or computer accounts and export SIDs to an ODBC-compliant database such as Access or SQL Server You also can export the SIDs to a comma-delimited text file for import into other applications such as Excel or other databases
Dorian Software Creations’ Web site is located at http://www.doriansoft.com
W Quinn Associates
Windows 2000 Server Bible includes four utilities from W Quinn Associates for
managing disks and quotas and preventing unwanted files from being downloaded
to a server or workstation The company’s Web site is located at http://www wquinn.com
DiskAdvisor 4.1
DiskAdvisor provides a means of monitoring your file systems and recovering wasted space The program offers 18 standard reports on wasted space, quotas, disk space usage, and file security You can use the Custom Report Writer to create your own reports as well DiskAdvisor can help you identify such things as dupli-cate files, outdated files, oversized files, insecure files, and view space usage by user, group, share, quota, or directory
Trang 7FileScreen 2000/FileScreen 2000 ODBC
FileScreen 2000 lets you prevent specific types of files from being stored on your servers or workstations The program screens files by type and/or file name and prevents specified files from being written to the system For example, you can use FileScreen 2000 to prevent mp3, video, or other types of files from being downloaded to the computer The ODBC version uses an ODBC database
to maintain the list of prohibited files and file types, enabling you to use
a centralized database to manage FileScreen behavior across the network
QuotaAdvisor 4.1
QuotaAdvisor expands Windows 2000’s quota management capabilities for NTFS volumes The program enables you to define varying levels of quotas for users and groups and supports automatic quota assignment, user disk space management policies, hard and soft quotas, up to five threshold settings, SMTP support, and several other features that make it a solid quota management package
StorageCeNTral Enterprise Server 4.1
StorageCeNTral combines the features of the other Quinn tools into one application that provides quota management, disk storage management, disk security, and related features In addition to Quota Manager and DiskAdvisor, StorageCeNTral includes a copy of Trend Analysis, which provides data collection and reporting capabilities to help you analyze disk storage needs, use, and statistics Trend Analysis supports ODBC, enabling you to store collected data in any ODBC-compliant database
NTDMatch
Shareware product NTDMatch (ver 2.0.0.7) is a 32-bit native Windows NT/95/98/2000 program that is supported by Larry Waibel of Leading the Way Larry can be reached
at lwaibel@cwia.com The product was apparently inspired by the DirMatch utility
originally published some time back in PC Magazine We included it here because
despite all the lofty features of Windows 2000 Server, we still found that something
as basic as a utility to compare folders and their contents (and be deductive) was absent from the visual applets The command line programs that support folder comparison are cryptic and they are not too informative
The tool compares directories based on filters which allow it to only show, for example, those files which exist in both, but the file in one has been modified It allows file manipulations such as copy, delete, edit, and so on, on all or selected files A useful feature of this product is that it can be used to take a snapshot of the directories, which can be used later to compare to the same directory This
is handy for determining which files were changed when a new software package
is installed
Trang 8Adobe Acrobat Reader
Adobe’s Acrobat Reader is a helpful program that will enable you to view the two bonus appendixes included on this CD-ROM in the same page format as the actual book To install Adobe Acrobat Reader, follow these steps:
1 Open the Acrobat Reader folder.
2 In the Acrobat folder, double-click rs40eng.exeand follow the instructions presented on-screen for installing Adobe Acrobat Reader
Extras
This folder provides the complete template deployment plan described in Chapter
4 The document provides placeholders for items such IP addresses and subnets, domain names and site-specific information to include in the plan The document
is in Word 97 format and is a document template
Two bonus appendixes are provided on the CD-ROM:
✦ Appendix A: Windows 2000 Command Line Reference
✦ Appendix B: Windows 2000 Resource Kit These appendixes are provided in PDF format, and can be read using the Adobe Acrobat Reader found on this CD-ROM
✦ ✦ ✦