13
Module 8 : Configuration II Jong S. Bok ([email protected] )

Module 8 : Configuration II Jong S. Bok ([email protected])[email protected]

Embed Size (px)

Citation preview

Page 1: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Module 8 : Configuration II

Jong S. Bok ([email protected])

Page 2: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Contents

• Configuring Regional Settings

• Configuring Usage Analysis• Configuring Antivirus Protection• Configuring Blocked File Extensions

Page 3: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Demo: Configuring Demo: Configuring Regional SettingsRegional Settings

Page 4: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Contents

• Configuring Regional Settings

• Configuring Usage Analysis

• Configuring Antivirus Protection• Configuring Blocked File Extensions

Page 5: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Configuring Usage Analysis

• Allow you to track how Web sites on your server are being used.

• Whether or not to log usage data.– By default, is not enabled.– Log files are created daily to track usage information.

• Where the log files are stored and how many log files to create.– By default, the log files are in C:\Windows\system32\

LogFiles\STS.– Can specify that up to 30 log files are created.– Must be sure to give the STS_WPG user group Read,

Write and Update permissions to the directory.

Page 6: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Configuring Usage Analysis (Cont.)

• Whether or not to process the usage logs and when to do so.– By default, the log files are set to be processed every

day at 1:00 A.M.– Usage analysis data is gathered from the front-end Web

servers and collected into temporary files.– When the daily log processing takes place, the data is

merged into the content databases on the back-end servers.

– Usage data is kept for up to three months in the database for historical purpose.

– Daily information is stored for 31 days and monthly information for 24 months.

Page 7: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Demo: Configure Demo: Configure usage analysis usage analysis processing for a processing for a serverserver

Page 8: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Contents

• Configuring Regional Settings• Configuring Usage Analysis

• Configuring Antivirus Protection

• Configuring Blocked File Extensions

Page 9: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Configuring Antivirus Protection

• Allow you to help protect your users from uploading or downloading files that contain viruses.

• When you enable the antivirus protection feature, files are checked for viruses when a user adds a document to a document library or list, or when a user views a document in a document library or list.

• If a virus is found, the scanner attempts to clean the file, or if the file cannot be cleaned, blocks the file from being added or viewed.

• If a file is uploaded, and is later identified as containing a virus, users will not be able to open the file.

• Users may still be able to save the file locally and open it from their computer.

• Must install WSS-compatible antivirus software.

Page 10: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Demo: Enable Demo: Enable antivirus protection antivirus protection for your server or for your server or server farmserver farm

Page 11: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Contents

• Configuring Regional Settings• Configuring Usage Analysis• Configuring Antivirus Protection

• Configuring Blocked File Extensions

Page 12: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Configuring Blocked File Extensions

• Provides the ability to restrict certain kinds of files from being uploaded or retrieved, based on the file extensions.

• Does not prevent all exploits based on file types, nor is it designed to do so.

• By default, several standard file extensions are blocked, including any file extensions that are treated as executable files by Windows Explorer.

• Can block additional file extensions (up to 1024 file types) by adding them.

Page 13: Module 8 : Configuration II Jong S. Bok (blueexpert@hotmail.com)blueexpert@hotmail.com

Demo: Add or remove Demo: Add or remove a file type from the list a file type from the list of blocked file of blocked file extensionsextensions