1 / 22

Module 5: Configuring and Managing File Systems

Module 5: Configuring and Managing File Systems. Overview. Working with File Systems Managing Data Compression Securing Data by Using EFS. Working with File Systems. Using FAT or FAT32 Using NTFS Selecting a File System Converting File Systems. Windows XP Professional. Windows 98.

Download Presentation

Module 5: Configuring and Managing File Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Module 5: Configuring and Managing File Systems

  2. Overview • Working with File Systems • Managing Data Compression • Securing Data by Using EFS

  3. Working with File Systems • Using FAT or FAT32 • Using NTFS • Selecting a File System • Converting File Systems

  4. Windows XP Professional Windows 98 FAT/FAT32 Using FAT or FAT32 FAT or FAT32: • Works well on small disks with simple folder structures • Supports dual-boot configurations

  5. Using NTFS NTFS provides: • Improved reliability by identifying and not using bad sectors • Enhanced security by using EFS and file permissions • Improved management of storage growth • Support for large volume sizes

  6. Selecting a File System When selecting a file system, determine: • How the computer is used • The number and size of locally installed hard disks • Security considerations • The need for advanced file system features

  7. Converting File Systems From: To: Windows XP Conversion not necessary NTFS on Windows 2000 NTFS volume Automatic conversion during upgrade NTFS on Windows NT NTFS volume Use convert command FAT NTFS volume FAT NTFS volume No conversion

  8. Managing Data Compression • Defining Compressed Files and Folders • Compressing Files and Folders • Copying and Moving Compressed Files and Folders • Best Practices for Managing Data Compression

  9. FileA NTFS partition FileB Defining Compressed Files and Folders • NTFS files and folders have a compression state • When accessed, files are automatically uncompressed • Space allocation is based on uncompressed file size • Compressed files and folders can be designated by color

  10. Compressing Files and Folders

  11. NTFS volume NTFS volume Inherits Retains NTFS volume NTFS volume Inherits Copying and Moving Compressed Files and Folders Copy Move Copy between volumes Move between volumes

  12. Determine which file types to compress Avoid compressing system or executable files Compress static data rather than data that changes frequently Use different display colors for compressed files and folders Best Practices for Managing Data Compression

  13. Lab A: Configuring Disk Compression

  14. Securing Data by Using EFS • Introduction to EFS • Encrypting a Folder or File • Adding Authorized Users • Decrypting a Folder or File • Recovering an Encrypted Folder or File • Best Practices for Implementing EFS

  15. ~~~~ ~~~~~ ~~~~~ ~~~~~ Introduction to EFS • Is transparent to users and applications • Is accessible only to authorized users • Enables specification of a data recovery agent • Encrypts files locally or across the network • Enables encrypted files and folders to be designated by color

  16. Encrypting a Folder or File Encrypt contents to secure data When file is saved, it is encrypted by using file encryption keys ~~~ ~~~~ ~~~~ ~~~~ The user’s file encryption key is stored in the Data Decryption Field ~~~ ~~~~ ~~~~ ~~~~ DDF If designated, the recovery agent’s file encryption key is stored in the Data Recovery Field in the file header ~~~ ~~~~ ~~~~ ~~~~ DRF

  17. 1 2 Adding Authorized Users

  18. EFS automatically detects encryption and locates user certificate and associated private key ~~~~ ~~~~ ~~~~ ~~~~ Your private key is applied to the DDF ~~~~ ~~~~~ ~~~~~ ~~~~~ DDF File content appears on the screen in plaintext Decrypting a Folder or File

  19. Owner’s key is unavailable ~~~~ ~~~~~ ~~~~~ ~~~~~ Recovery agent uses his private key to recover file ~~~~ ~~~~~ ~~~~~ ~~~~~ Recovering an Encrypted Folder or File

  20. Encrypt the My Documents folder Encrypt folders rather than individual files Secure and archive keys and certificates Implement a recovery agent archive Best Practices for Implementing EFS

  21. Lab B: Securing Files by Using EFS

  22. Review • Working with File Systems • Managing Data Compression • Securing Data by Using EFS

More Related