P5 Interrogating a network to identify
network assets and configuration
Network Configuration is the process of setting up a networks control, flow and operations
which helps in supporting network communications.
Assets is either a device or a data of the environment that helps in supporting activities
which are related to information.
An example of Network Asset Configuration
Server 1:
Runs Windows Server 2008
Server name: ABQ Main Server
Full Computer Name: ABQ_main-server
Domain Name: ABQ.edu.om
IP address: 100.165.1.8
Roles Include: include Active directory, DNS, Domain Services, DHCP, Document services
Domain Controllers: It is a server computer which responds to security authentication requests such
as logging in inside a windows domain. It’s the running version of the Windows Server®
operating system and has Active Directory® Domain Services installed. If on server fails
another one replaces it as a backup.
Users: It includes individual user accounts, for managers who have no restriction on their access
such as a group of class students will have no access to school’s important details, but a group of
principal and other high-ranking members will.
DNS Domain Name: eduoasis.ABQ.edu.om
, P6 Routine Network Management Tasks
User account creation and deletion
Creating of user accounts and deletion of accounts is one of the most important part of
network management. Privileges and rights given to a user as a part of their account
contributes to:
The functions available for them
Any data or files they can access
Any thing they can customize or edit
Resources which are shared such as printers
Accounts need to be modified or deleted regularly as in an organization if a employee is
promoted from junior manager to senior manager so his privileges need to be updated and
if an employee leaves the company then his account needs to be deleted as it may be taking
up a lot of space and this can clear space for new employees.
Routine maintenance is very important for any organization and a routine backup is done
within the network and sometimes its stored to an external location. There are normally
two ways in which an organization can back up all documents and important files. A mirror
backup will be done the backup will be updated once the original file is edited or a copy of
an actual file is kept. Backups will be useful when data corrupts or if there is any natural
disaster. Routine maintenance includes anti-virus, backup of data, cleaning of files.
Virus scanning is a software needed to protect from unwanted viruses to be safe never open
email attachments which are unexpected even if you know the person. If the persons PC is
in control of a virus, then it can be auto generating malicious emails or may send you links to
infect your pc. Using of Secunia's Personal Software Inspector (PSI) which scans for any type
of vulnerabilities in any third-party programs. Using of Alt - F4 is better to close any pop ups
rather than clicking on the X button as it is mostly linking to even more pop ups.
Cleaning up of files in your device is important you can start from photos, music then videos.
Movies can also be deleted if they are taking too much space. Deleting unwanted
applications or unwanted software which aren’t used regularly, sometimes certain apps
aren’t deleted completely so may take up space.
network assets and configuration
Network Configuration is the process of setting up a networks control, flow and operations
which helps in supporting network communications.
Assets is either a device or a data of the environment that helps in supporting activities
which are related to information.
An example of Network Asset Configuration
Server 1:
Runs Windows Server 2008
Server name: ABQ Main Server
Full Computer Name: ABQ_main-server
Domain Name: ABQ.edu.om
IP address: 100.165.1.8
Roles Include: include Active directory, DNS, Domain Services, DHCP, Document services
Domain Controllers: It is a server computer which responds to security authentication requests such
as logging in inside a windows domain. It’s the running version of the Windows Server®
operating system and has Active Directory® Domain Services installed. If on server fails
another one replaces it as a backup.
Users: It includes individual user accounts, for managers who have no restriction on their access
such as a group of class students will have no access to school’s important details, but a group of
principal and other high-ranking members will.
DNS Domain Name: eduoasis.ABQ.edu.om
, P6 Routine Network Management Tasks
User account creation and deletion
Creating of user accounts and deletion of accounts is one of the most important part of
network management. Privileges and rights given to a user as a part of their account
contributes to:
The functions available for them
Any data or files they can access
Any thing they can customize or edit
Resources which are shared such as printers
Accounts need to be modified or deleted regularly as in an organization if a employee is
promoted from junior manager to senior manager so his privileges need to be updated and
if an employee leaves the company then his account needs to be deleted as it may be taking
up a lot of space and this can clear space for new employees.
Routine maintenance is very important for any organization and a routine backup is done
within the network and sometimes its stored to an external location. There are normally
two ways in which an organization can back up all documents and important files. A mirror
backup will be done the backup will be updated once the original file is edited or a copy of
an actual file is kept. Backups will be useful when data corrupts or if there is any natural
disaster. Routine maintenance includes anti-virus, backup of data, cleaning of files.
Virus scanning is a software needed to protect from unwanted viruses to be safe never open
email attachments which are unexpected even if you know the person. If the persons PC is
in control of a virus, then it can be auto generating malicious emails or may send you links to
infect your pc. Using of Secunia's Personal Software Inspector (PSI) which scans for any type
of vulnerabilities in any third-party programs. Using of Alt - F4 is better to close any pop ups
rather than clicking on the X button as it is mostly linking to even more pop ups.
Cleaning up of files in your device is important you can start from photos, music then videos.
Movies can also be deleted if they are taking too much space. Deleting unwanted
applications or unwanted software which aren’t used regularly, sometimes certain apps
aren’t deleted completely so may take up space.