IT tutorials
 
Technology
 

Windows Vista : Providing User Data Protection (part 2) - Putting data protection in place - Enabling the Distributed File System

10/29/2013 9:15:30 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

2. Putting data protection in place

To put the data protection strategy in place, you need to perform several tasks:

  1. Prepare the central server share(s) and the groups that will support folder redirection.

  2. Enable the Distributed File System to make the share available in all locations (optional).

  3. Enable roaming profiles and exclude specific folders from the profile.

  4. Enable the folder redirection Group Policy Object (GPO).

  5. Test the strategy before applying it to users.

Each operation requires care and structure in its application. The following sections outline how each step is performed.

Preparing for data protection

Because both folder redirection and roaming user profiles rely on networked storage, you need to make sure your storage locations will be ready before you begin the redirection process. Although roaming profiles are a function of the user account in Active Directory, folder redirection is a function of Group Policy. In addition, Group Policy can control how the roaming profile will be managed as well as how profiles are managed in general.

If you only have a single, central site, then it will be easy to configure both folder redirection and roaming profiles. Just direct each to the same network share to store the contents under folders created for each user in the organization. If, however, there are multiple sites or locations in your organization, then you'll have to consider creating redirection folders in each location. After all, you don't want users to synchronize folders or profiles over the wide area network (WAN), do you?

Both systems allow for either central or regional redirection. Roaming user profiles are the easiest to set up because they are set as a property of the user account. But with folder redirection, you need to prepare two elements before you can support regional users:

  • You must prepare special AD groups that will regroup users in each location. In many cases, you may already have these groups in place. Using groups allows you to create a single GPO for folder redirection. If you want to create multiple GPOs, you can create one GPO for each region and assign them to Organizational Units (OU) that represent the regions and contain the accounts for the users located in that region.

  • You need to prepare shared folders in each location.

You might also want to use this strategy if you want to direct user folders from different departments to different file servers even if all your users are in a single location.

Use the following steps to create the groups in AD and then create the file shares. You will need Account Operator rights in AD to perform this task.

  1. Use Active Directory Users and Computers to create the appropriate groups. Because these groups will contain users, they should be Global Security groups. For regional folder redirection support, create regional groups that contain the accounts of all of the users in a given regional site. For departmental redirection, create departmental groups to contain the users. In most organizations, groups with this purpose will already have been created. If not, create them. Use a clear naming convention to make them easy to identify.

    NOTE

    When you work with groups in Active Directory, you should rely on the AGLP rule. AGLP stands for Accounts which go into Global Groups, which are then inserted into Local Groups. Finally, Permissions are assigned to the Local Groups.

  2. Create file shares. Because users will not be accessing these file shares because they will access data through folders on their desktops, such as Documents, you do not need to make these shares visible to users. Therefore, you can create the shares using the $ character in the name of the share, effectively hiding it from normal network browsing. Two share structures are required; one for folder redirection and one for roaming profiles. Begin with the first.

  3. Create the first share structure. On a file server will sufficient space for each user, create a top-level share named FolderRedir$. Set Everyone Full Control in the share permissions and assign Authenticated Users modify or change permissions at the NTFS level.

  4. Create the second share structure. On the same file server, create a top-level share named RoamingProf$. Set Everyone Full Control in the share permissions and assign Authenticated Users modify or change permissions at the NTFS level.

  5. Repeat the process if either regional or departmental share structures are required.

Both the required groups and the shares are ready. Proceed to the next step.

Enabling the Distributed File System

This step is optional and really only applies to organizations that use remote sites and expect to have to support users roaming from one office location to another. When users rely on folder redirection and roaming profiles and move from one office to another during the performance of their work, they can find themselves in situations where they need to load their profile from a remote location instead of from the local network. There is however an easy way to avoid this situation.

Windows Server 2003 R2 and Windows Server 2008 both include a very powerful technology called the Distributed File System (DFS). Although DFS is not new to these versions of Windows Server, its implementation in these versions has changed so much that it is basically a completely different product. DFS includes two different components:

  • DFS Namespaces: This component is designed to replace the traditional letter-based network share mapping. Instead of using a traditional universal naming convention (UNC) shares in the \\servername\sharename format, DFS Namespaces uses domain-based shares in the \\domainname\sharename format. The file share name is therefore based on the name of the Active Directory domain instead of on a single server's name. Domain-based DFS Namespaces are then assigned targets or specific servers that host a copy of the share. Organizations that have remote sites assign a target for the share in each site. Each target contains the same files. Users that move from site to site continue to address the share through the domain-based UNC but do so through Active Directory's site identification. They are automatically directed to a local target for the share, avoiding WAN communications to access data.

  • DFS Replication: This component is used to maintain consistency between the contents of one target with all others. DFS Replication uses delta-based compressed replication, replicating only changed data blocks from one location to the other instead of replicating entire files, to keep the target content up to date.

Together, these two technologies ensure that users can access the same content from any location without having to cross the WAN. For travelling users relying on roaming folders and folder redirection, DFS is a boon because it can be used to make their data available automatically in any of the offices in which they can find themselves.

If you decide to rely on DFS to provide data availability to your traveling users, then you need to perform several tasks:

  1. Identify which users roam from office to office. Ideally, you can put these users into a special "roaming" Global Security group in AD.

  2. Create the DFS Namespace. Use the same share names as with non-roaming users, but make them domain-based DFS shares.

  3. Assign targets to the DFS Namespace. Assign one target per remote site along with one target in the central office.

  4. Configure DFS Replication for the Namespace. Doing this ensures that each target has the same content.

  5. Use the new DFS Namespace to assign the Group Policies that will enable folder redirection and redirect users' roaming profiles to the DFS Namespace share.

Proceed as follows to perform these activities. You need Server Operator permissions to perform this task.

  1. Begin by logging onto the File Server Management console. Either this can be done on a server where the File Server role has been deployed including the DFS components or, preferably, on a desktop that has the Remote Server Administration Tools (RSAT) deployed.

    NOTE

    To use the RSAT for Windows Server 2008 on Vista, you must have Vista Service Pack 1 deployed.

  2. Connect to a File Server and then move to the File Server Management => DFS Management => Namespaces node in the Tree pane of the console.

  3. Right-click on Namespaces or use the Action pane to select New Namespace. Doing this launches the New Namespace wizard.

  4. Assign a server to host the Namespace by typing in the name of the server or using the Browse button to select the server. Click Next. If the server's DFS service is not running, the wizard will offer to start it. Click Yes. (Note that any server that will host a target will do to host the namespace.)

  5. Create the namespace. You only need to type in the latter part of the share name since the domain name will automatically be assigned. Two Namespaces are required: RoamingProf and FolderRedir. Assign the first name, and then repeat the procedure to assign the second name.

    NOTE

    DFS Namespaces cannot be hidden, therefore you do not need to add the $ sign at the end of the Namespace names.

  6. Click Edit Settings to modify the share permissions. In the Edit Settings dialog box, click Browse to place the share on the appropriate disk and folder. Click OK and then click Next. Shares should be on a data disk, usually D: and should be placed within a special DFSRoots folder to properly identify them. Also, assign permissions so that administrators have full control and users have read and write privileges (see Figure 3).

    Figure 3. Setting DFS Namespace location and permissions
  7. Make sure that you select Domain-based namespace. This ensures that the Namespace is stored within the directory and is made available to any location in your network. This dialog box lists the share name for your Namespace; make note of it. Click Next.

  8. Review the changes to perform and click Create. Click Previous if you need to modify the settings.

  9. Review the tasks the wizard performed and click Close.

  10. Repeat the procedure for the second namespace.

Now you're ready to assign targets to the Namespace. Once again, this is done in the File Server Management console.

  1. Select the Namespace to which you want to add targets.

  2. Click Add Namespace Server in the Action pane.

  3. In the Add Namespace Server dialog box, click Browse to locate the servers you want to add as targets.

  4. Again, click Edit Settings to assign the folder to the appropriate location and set proper permissions. Use the same settings as in the previous procedure. Click OK to assign the new target. If the server's DFS service is not running, the wizard will offer to start it. Click Yes.

  5. Repeat the previous step to assign additional servers to this Namespace. Repeat the entire procedure to assign targets to the other Namespace.

Now you're ready to set replication rules for the targets for each Namespace. Once again, this is done in the File Server Management console.

  1. Move to the File Server Management => DFS Management => Replication node in the tree pane of the console.

  2. Right-click on Replication or use the action pane to select New Replication Group. This launches the New Replication Group wizard.

  3. In the first page of the wizard, select Multipurpose replication group. Selecting this enables you to set replication to keep content synchronized between locations.

  4. Click Next, name the Group, and click Next again. For example, you can use Roaming Data Protection for the group name and assign a description.

  5. Use the Add button to select replication group member servers. Add all of the target servers in the Namespaces you created earlier. Click Next.

  6. Select the Full mesh replication topology and click Next. This step ensures that all members can initiate replication to all other members and will maintain identical content in each location.

  7. Select how much bandwidth replication will be allowed to use and identify the schedule.

    1. If your users spend entire days in remote offices when they travel, then you can use a daily replication schedule because they won't need to access their data in another location for 24 hours.

    2. If your users are in several different offices in a single day, then you should use a more frequent replication schedule. In addition, you should throttle replication.

    3. Use a value that is in keeping with the WAN links and available bandwidth on each link. Normally, 64 Mbps is sufficient.

    4. Select Replicate during the specified days and times, and then click Edit Schedule.

  8. In the Schedule window, you can use the schedule which best fits your needs. Select the bandwidth to use, and then select the available times for this bandwidth. Click on Details to view the results of the schedule you set (see Figure 4). Click OK and then Next when done.

    Figure 4. Setting a Replication schedule
  9. Select the primary replication member and click Next. This server will be the initial master during the first replication pass.

  10. Select the folders to replicate. Click Add to select the first folder, use the Browse button to locate the folder, use the same name as the target and make sure Permissions are set to Existing permissions. Click OK and repeat to add the second folder. Click Next when done.

  11. Select the local paths on target servers for each folder you replicate and then select the target server, click Edit, Enable replication, and click Browse to identify the local path. This should be the same path as the Namespace path on each target server.

  12. Click OK and repeat for each target server. Click Next when Done.

  13. Repeat the selection of local paths for the second folder to replicate.

  14. Review your choices and click Create when ready. Click Previous to make modifications to your settings if needed.

  15. Click Close when ready. Windows displays a replication delay message indicating that replication will not begin until the target servers pick up the configuration from Active Directory. For example, in large organizations with extensive replication latency, this configuration would not be picked up by members until the latency period has passed. This is okay because you are still not ready to replicate data because your configuration is not yet complete.

  16. Click OK. Your DFS strategy is complete.

 
Others
 
- Windows Vista : Providing User Data Protection (part 1) - Completing a data protection strategy
- Windows Vista : Protecting User Data - Protecting User Profiles
- SharePoint 2013 : Associate a Workflow with a List or Library
- SharePoint 2013 : Track the Progress of a Workflow
- SharePoint 2013 : Start a Workflow
- What's New in Microsoft Lync Server 2013 : Voice Enhancements - Inter-Trunk Routing
- What's New in Microsoft Lync Server 2013 : Client Features - Tabbed Conversations, OneNote
- What's New in Microsoft Lync Server 2013 : Server Features - Hybrid and On-Premise Deployment Integration
- What's New in Microsoft Lync Server 2013 : High-Availability and Disaster Recovery Changes
- What's New in Microsoft Lync Server 2013 : Conferencing Improvements
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us