Tải bản đầy đủ (.pdf) (8 trang)

Tài liệu Appendix. pdf

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (37.68 KB, 8 trang )

What’s on
the CD-ROM
T
his appendix provides an overview of the software
included on the Windows 2000 Server Bible CD and
explains how to install the software from the CD.
Aelita
The Windows 2000 Server Bible CD includes several utilities
from Aelita, described in the following sections. These prod-
ucts are included in the Aelita Enterprise Suite. Aelita’s Web
site is located at

.
Delegation Manager
Delegation Manager is targeted at medium- to large-size net-
works where managing security for domains, member servers,
and workstations can be difficult because of the sheer number
of accounts involved. Delegation Manager adds access control
over user accounts and groups, enabling an administrator to
delegate routine administrative tasks with limited permissions
to other users. For example, you might delegate the ability
to re-enabled locked accounts or change passwords to a
specified user or group of users.
Delegation Manager lets you represent any subset of adminis-
trative authority as a custom access template containing col-
lections of elementary permissions. You can then use the
template to easily and quickly grant administrative authority
to other users without giving them full administrative rights
and permissions.
4667-8 app.f.qc 5/15/00 2:20 PM Page 941
942


What’s on the CD-ROM
Delegation Manager uses a client/server architecture to enable this security delega-
tion. The Server component runs as a secure service on a Windows 2000 Server or
Professional computer. The Delegation Manager Client runs on the client side and
passes administrative requests to the Delegation Server, which controls whether
or not the user can perform the specified tasks.
ERDisk
The Rdisk utility included with Windows NT provided a means of backing up the
registry and creating an emergency repair disk (ERD) for NT systems. The Windows
2000 Backup utility provides much the same capability, enabling you to back up the
system state data and create an emergency repair disk (though arguably a less use-
ful ERD than that created by NT’s Rdisk). Aelita’s ERDisk utility broadens the ability
to create repair disks, enabling you to create disks for remote servers and worksta-
tions across the network from a central location, simplifying system administration.
ERDisk can store the repair information on a network server for security, and you
can use the files for a given server or workstation (or class of computers) to repair
the system if it becomes necessary.
Enterprise Directory ReporterAelita’s Enterprise Directory Reporter (formerly
Virtuosity) comprises three tools: the Virtuosity Wizard, Virtuosity Classic, and
Domain Migration Wizard. The Virtuosity Wizard puts a more user-friendly face on
Virtuosity Classic, both of which enable you to store in an Access or SQL database
network-wide information about users, groups, account security configuration,
access permissions, password settings, and a wide range of other data collected
from the network. In addition to providing a means of collecting and analyzing the
data, Virtuosity also enables you to apply changes to settings across the enterprise.
The Domain Migration Wizard is particularly useful for organizations moving from
Windows NT domains to Windows 2000 domains and the Active Directory. The
wizard is targeted at domain reconfiguration tasks such as domain consolidation,
domain split, transition from multi-master model to multi-resource model, and
other changes.

ClockWatch
Beagle Software’s ClockWatch 1.3.4 enables you to synchronize the time on
multiple systems running Windows 2000, Windows NT, and Windows 95/98.
The software provides separate server and client components. All clients can
synchronize the system time from a ClockWatch server (running the Server
component) or communicate with the National Institute of Standards and
Technology (NIST) or other Internet time server to synchronize time. Beagle’s
Web site is located at

.
4667-8 app.f.qc 5/15/00 2:20 PM Page 942
943
What’s on the CD-ROM
Diskeeper
Diskeeper 5, from Executive Software, is an advanced disk defragmenter applica-
tion. It can defragment volumes on remote computers, and can be set to defrag-
ment volumes according to a schedule.
Full Armor Zero Administration 2000
The Full Armor Zero Administration kit (FAZAM) enables you to analyze and plan
Group Policy implementation, which helps avoid potential problems in applying
group policies that can have an unintended affect on a large number of users. You
can use the tool to perform what-if analysis on policies to determine what impact
they’ll have on users in the enterprise before you apply the policy changes. You also
can use FAZAM to analyze existing policies to troubleshoot problems and provide
help desk support. Full Armor’s Web site is located at

.
CrondSys Scheduling System
CrondSys provides a means of scheduling any Windows NT or Windows 2000 appli-
cation for unattended execution at specified dates and times by Windows 95/98,

Windows NT, and Windows 2000 clients. The crondSys Scheduling Engine runs as
a Windows 2000 service on the target system and uses the security inherent in
the network domain/workgroup structure to allow or deny users the ability to
execute applications. Administrators can specify which users or groups of users
can schedule tasks with crondSys.
The crondSys client provides an interface through which users can create, view,
and manage tasks on the local or remote systems running the crondSys Scheduling
Engine. In addition to enabling you to schedule tasks in much the same way that the
AT command provides, crondSys lets you send keystrokes to applications, develop
your own applications through VB, Java, or other scripting languages, generate
notifications through SMTP, and much more. #ifdef’s Web site is located at
http:
//www.ifdef.com
.
KeyServer
KeyServer 5.1, from Sassafras Software, Inc., is a software sentry and software asset
manager for your network. This product specializes in metering software use through-
out the enterprise, which ensures licensing is adhered to, and that software access is
not being abused by anyone.
4667-8 app.f.qc 5/15/00 2:20 PM Page 943
944
What’s on the CD-ROM
In addition to metering, this product offers protection from piracy. Anyone who
attempts to steal software from the corporate network will not be able to use his
or her loot without the key server in the loop. KeyServer supports both convenient
and secure metering choices. KeyServer’s auto-discovery tool allows automatic
monitoring and/or control of any applications. And KeyServer will continue to
add newly installed applications as they are used by end-users
The product is especially useful in the world of thin-client/server and application
service providers. It is the only software license metering system that has the capa-

bility to simultaneously support thin-client desktops and traditional desktops.
Sassafras’ Web site is located at

.
RecoverNT
RecoverNT 3.1, LC Technology International scans a drive sector-by-sector,
enabling you to rebuild a drive and recover lost data. RecoverNT enables you to
restore deleted files and directories. Changes are made in memory, giving you an
opportunity to review them before committing them to disk. You can view the
recovered data as text or in hex. Because RecoverNT works above the file system
driver level, it can restore data from stripe sets, RAID volumes, and NTFS volumes.
LC Technology’s Web site is located at

.
Liquid Time
Liquid Time, from Code Blue Technologies, is a utility for Windows NT and
Windows 2000 designed for creating and scheduling executable programs,
batch files, and scripts. Liquid Time incorporates several features:
✦ Administrator Console: GUI for creating, editing, and managing batch jobs.
You also use the Administrator Console for viewing log files and templates.
✦ GUI Diagramming Editor: Use this tool to graphically design and view batch
jobs using a flow chart analogy.
✦ Server Scripts: Use server scripts in batch programs to perform higher-level
functions such as accessing the file system or databases, generating e-mail,
and so on.
✦ Server Script Editor: Use this tool to write and debug server scripts.
✦ Batch Job Triggers: Triggers let your batch programs watch for events and
initiate tasks when the events occur.
4667-8 app.f.qc 5/15/00 2:20 PM Page 944
945

What’s on the CD-ROM
✦ Agents: Use agents to distribute execution of batch programs across the net-
work, using multiple systems to provide increased CPU power for the task.
✦ Navigator: This folder provides a graphical view of the Liquid Time server
and current/pending jobs.
You’ll find Code Blue’s Web site at

.
DirectoryAnalyzer
NetPro Computing, Inc., specializes in the health of directory services. Directory
Analyzer 1.02, for Active Directory , monitors and troubleshoots all critical compo-
nents of Active Directory, including domain controllers, domains, sites, and certain
DNS functions. DirectoryAnalyzer provides the peace of mind you need to deploy
Active Directory in a rapid timeframe.
The product monitors all critical functions of the directory service, from replication
latency and replication topology problems to high LDAP loads and DNS inconsisten-
cies. The product also monitors and alerts you immediately to critical infrastructure
problems. You’ll find NetPro’s Web site at

.
ScriptLogic
ScriptLogic 2.5, from Inteletek, Inc., builds on the KiXtart logon scripting language to
enable you to build sophisticated logon scripts that provide validation logic of drive
mappings, path control, printer deployment, shell folders, Internet access, service
pack installations, anti-virus signature updates, mail profile creation, and many other
automated tasks. In addition to providing a GUI for building scripts, ScriptLogic
includes a GUI for managing replication of scripts, an important aspect of logon script
management. See the company’s Web site at

.

Support Aide
Support Aide 1.01, from Lakeside Software, Inc., is a system metrics tool that
records and analyzes the applications and system resources that are accessed
by users as they perform their day-to-day work. It allows a system planner to find
out key information such as what applications and application versions each user
executes, what system resources these applications consume, what level of service
users are receiving, and the effect that users and applications have on overall
system performance.
4667-8 app.f.qc 5/15/00 2:20 PM Page 945

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×