Preview

Lab 14

Satisfactory Essays
Open Document
Open Document
750 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 14
Lab 14
Remote Windows 7 Administration

Exercise 14.1
Create a Custom MMC Console
Overview

Rather than evaluate the system events on each workstation individually, you can create a customized Microsoft Management Console interface containing the Event Viewer snap-in for multiple computers.

Completion time
20 minutes

Question 1
How can you find out which port Windows Firewall opened up on NYC-CLb?
1. You can check by going to Control Panel>System and Security>Windows Firewall>Advanced Settings, locate the rule you are checking, Double click the rule and click the Protocols and Ports tab. The port used is located under this tab.
18. Take a screen shot of the Add or Remove Snap-ins dialog box, showing the two Event Viewer instances you added, by pressing Alt+Prt Scr, and then paste the resulting image into the Lab14_worksheet file in the page provided by pressing Ctrl+V.

Exercise 14.2
Configuring Remote Desktop Access
Overview

Before you can test the Remote Desktop program, both of the Windows 7 computers involved must be configured to allow secured connections to occur. In Exercise 14.2, both you and your partner configure the Remote Access settings on your individual computers.
Completion time
5 minutes

Question 2
When using Remote Assistance, why might it be necessary to impose a time limit on the invitation?
2. You should set a time limit on the remote assistance to limit the time someone has access to your PC and to prevent attack through the open port.
Exercise 14.3
Connecting to a Remote Workstation
Overview

The Remote Desktop feature in Windows 7 does not require a user to be present at the remote computer. In Exercise 14.3, you and your partner take turns connecting to each others’ computers and controlling them from a remote location.
Completion time
15 minutes

15. Take a screen shot of the NYC-CLb Remote Desktop Connection window by pressing Alt+Prt Scr, and then paste the resulting image into the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1330lab8worksheet

    • 1017 Words
    • 6 Pages

    In this exercise you will be configuring Group Policy to see its effects on a Winodws 7 machine (Workstation##) that is a member of the domain. You will also test the implementation of a Local GPO before you move on to testing Group Policy Objects (GPOs.)…

    • 1017 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Lab 10

    • 1213 Words
    • 5 Pages

    Take a screen shot of the Devices and Printers control panel with the new printer icon you created by pressing Alt+Prt Scr, and then paste the resulting image into the lab09_worksheet file in the page provided by pressing Ctrl+V.…

    • 1213 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    NT1230 Lab 10

    • 1546 Words
    • 8 Pages

    12. Take a screen shot showing of the Event Viewer console, showing the Critical & Warning custom view by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl + V.…

    • 1546 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 6

    • 690 Words
    • 3 Pages

    1. Run your model. Compare the queue statistics of the 3 processes with those obtained for Part C in the previous Lab. How have they changed and what conclusions can you draw? (Note the sums of all capacities for both cases are equivalent – 12 in each).…

    • 690 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Historically is was user to provide access to a remote host through the use of a command-line interface. This protocol will run on the computer and create a connection to the server on the network. Commands can then be entered through the Telnet application and it will then be executed as it the user entered them directly onto the server console. This will enable the user to control the server and then communicate this with other servers on the network. In order to start a Telnet session, the user would have to log in to a server by entering a valid username and password.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    This connection should be using Remote Desktop, but I could not establish a connection with server AD.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    nt1230

    • 905 Words
    • 6 Pages

    What other test could you perform to prove that it was your computer’s firewall that was blocking the connection and not the firewall on the computer you are using as a client?…

    • 905 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Lab 5

    • 2594 Words
    • 10 Pages

    In gymnosperms, pollination is the transfer of pollen (Fig. 2) from male cones (where pollen is produced) to female cones, which house eggs. In these plants, pollen is carried from male cones to female cones by wind - gymnosperms were the first plants to evolve that did not need free water to transfer sperm to egg, and were therefore able to thrive in terrestrial habitats. Pollen grains are also protected by tough coats. After fertilization, seeds are produced with developing embryos…

    • 2594 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Remote access implementations that are covered by this policy include, but are not limited to DSL, VPN, SSH.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    teamviewer

    • 785 Words
    • 3 Pages

    TeamViewer is a remote access program that is free and easy to download. It has many features that are not easily found in similar products. It is very easy to use and it can be installed on many devices. For instance, TeamViewer can be downloaded on Mac, Windows, Linux, and even a mobile device. This program allows its users to remotely reboot the computer into Safe Mode and after that, reconnect with the TeamViewer automatically. In order to set up TeamViewer, there is no need for router configurations. Also, the remote sessions can be recorded on a video file so that it can be viewed again by the users. TeamViewer permits its user to share one application window or the complete desktop with another user. By using either the file transfer tool or the clipboard function; images, files, folders, and screenshots can be transferred to computers and also transferred from computers. TeamViewer is a portable program which allows quick access or it can be installed to accept remote connections all the time.…

    • 785 Words
    • 3 Pages
    Satisfactory Essays