System Management Flashcards
Task Manager
Task Manager is a utility that comes with Microsoft Windows to allow users and administrators to do various tasks and perform system administration. With Task Manager you are able to perform tasks such as shut down applications that are not responding, view processes, view what applications are using system resources, view network usage, connected users, and other system functions. Open Task Manager by using any of the following methods:
- Press Ctrl+Shift+-Esc • Right-click an empty area of the taskbar and select Task Manager
- Press Ctrl+Alt+Delete and select Task Manager
Task Manager Tabs
Processes: The Processes tab is used to view the status of all current applications running on the computer. Use this tab to terminate unresponsive applications.
Performance: The Performance tab is used to view system-wide processor, memory, disk, and network statistics.
App History: The App History tab is used to monitor Windows Store apps running on the system.
Startup: The Startup tab is used to enable or disable applications that start automatically when the system boots.
Users: The Users tab is used to monitor users currently logged on to the system. Details: The Details tab is used to view the status of all current processes running on the computer, and the CPU and memory resources they use. Use this tab to modify the priority of a process or terminate unwanted processes. Services: The Services tab is used to view a list of services running on the computer. You can use this tab to start and stop a particular service.
Control panel applet: System and Security
- Security and Maintenance is used to review recent error messages and options for resolving issues.
- Windows Defender Firewall is used to check firewall status and allow apps through the Windows Firewall.
- System allows you to view RAM and processor speed, remote access, remote assistance, or to see the computer name.
- Power Options is used to change battery settings, change what the power buttons do, or change when the computer sleeps.
- File History is used to save backup copies of your files and to restore your files.
- Backup and Restore (Windows 7) is used to backup and restore with the legacy Windows 7 backup utility and to restore files using the legacy Windows 7 backup utility.
- BitLocker Drive Encryption is used to manage BitLocker settings and protect your files and folders from unauthorized access.
- Storage Spaces is used to save files to two or more drives to help protect you from drive failure.
- Work Folders is used to make your work files available on all devices you use, even when offline.
- Administrative Tools is used to clean up hard disk space, run defragmenter, optimize drives, format disks, view event logs, and schedule tasks
Control Panel Applet: Network and Internet
- Network and Sharing Center is used to view network status, connect to a network, and to view network computers and devices.
- Internet Options in Network & Internet contain the following tabs and they are used to:
- General tab to modify your browser home page, startup window, tabs, history, and appearance.
- Security tab to determine your security zone and security level
- Privacy tab to manage website privacy and enable and disable pop-ups and InPrivate Browsing.
- Content tab to view certificate, AutoComplete, and Feeds and Web Slices settings.
- Connections tab to set up an Internet connection.
- Programs tab to manage your default browser, add-ons, and other internet programs and file associations.
- Advanced tab to set and reset advanced browser settings.
Control panel applet: Hardware and Sound
Hardware and Sound is used to view and configure the current system sound settings, installed audio devices, sound cards, printer settings, and other hardware settings
Control panel applet: Programs
Programs is used to uninstall programs, turn Windows features on or off, view installed updates, run programs from previous versions of Windows, get additional programs, and change default settings for media and devices
Control panel applet: User accounts
User Accounts is used to view and modify user accounts, give users access to the computer, change account types, manage web credentials, and manage windows credentials
Control panel applet: Appearance and Personalization
Appearance and Personalization is used to configure navigation properties, modify the behavior of input and display devices to accommodate users with special needs, specify single or double click options, show or hide hidden files, and add or remove fonts on the computer
Control panel applet: Clock, Language, and Region
Clock, Language, and Region contains settings to configure various items such as language preference, default currency symbols, and date and time notation
Control panel applet: Ease of Access
Ease of Access is used to optimize visual display, modify sound and visual cues, change mouse and keyboard settings, and set up speech recognition or a microphone
With Sync Center, you are able to:
- Check the results of your recent sync activity.
- Have access to copies of your network files even when your computer isn’t connected to the network.
- Keep information in sync between your computer and files stored in folders on network servers, which are called Offline Files.
- Sync files between your PC and mobile devices that are compatible with Windows 10 Sync Center
Computer Management
Computer Management is a saved MMC console that includes common snap-ins used to manage your computer. Some common ways to start Computer Management include:
- Right-click Start and select Computer Management.
- Search for Computer Management
Microsoft Management Console (MMC)
The Microsoft Management Console (MMC) is a framework that provides a common user interface for performing system administration tasks. Management of a set of related features is done by adding snap-ins to the console. The MMC provides the shell for running these snap-ins, while the snap-ins provide the details for performing specific management tasks. Microsoft provides snap-ins for managing:
- Local Users and Groups
- Device Manager • Disk Management
- Print Management
- Component Services
- Windows Firewall with Advanced Security
To open a blank console, type mmc in the Run box (Press Windows+R). You can then add snap-ins to work with the configuration of your system. The console consists of three panes:
- The tree pane (on the left) organizes objects in a hierarchy.
- The results pane (in the middle) shows objects and configuration options.
- The actions pane (on the right) lists the actions you can take on objects.
You can save a console that includes the snap-ins you use most (saved consoles have the .msc extension). Microsoft provides a number of preconfigured consoles that include snap-ins for common tasks
System Information (Msinfo32.exe)
Use System Information to view hardware and configuration information for your computer. While much of this information is available through other tools, System Information provides a single location for viewing information such as:
- Operating system version
- Computer manufacturer, processor type, available memory
- Installed devices and drivers used
- Running tasks
- Applications that run at system startup
You can only view, not modify, configuration settings in System Information
Event Viewer
Use Event Viewer to view logs about programs, system events, and security. Each entry is listed as a warning, error, or information event. Events are added to the following logs:
- The Application log contains a list of all application-related events such as application installations, un-installations, and application errors.
- The System log contains a list of all system-related events such as system modifications, malfunctions, and errors.
- The Security log contains a list of all security-related events such as security modifications and user login events. Additional logs might be added by applications or services
Performance Monitor
Performance Monitor displays statistics that tell you about the operation of your computer.
- A counter identifies a specific statistic, such as % Processor Time or % Disk Free Space.
- You can add or remove counters to customize the statistics you can see.
- Real-time data are displayed in a graph
- Performance Monitor by itself does not save any data. To save statistics over time, use a data collector set
Reliability Monitor
Reliability Monitor maintains historical data that describe the operating system’s stability.
- Overall system stability is given a stability index that ranges from 1 to 10 (10 being the most stable). The stability rating is affected by application, hardware, Windows, and other failures.
- Reliability Monitor shows an historical chart that identifies when software installs/uninstalls and failures have occurred. By clicking on a day, you can view the changes to the system that have affected its stability
Windows Memory Diagnostics
The Windows Memory Diagnostic tests the Random Access Memory (RAM) on your computer for errors. This utility is not included with Windows and must be downloaded from Microsoft’s Online Crash Analysis website
General tab in Msconfig
The General tab is displayed by default when the System Configuration Utility is opened. There are three options under the General tab:
- Normal Startup is used to load all device drivers and services when Windows starts up
- Diagnostic Startup will load only the basic devices and services and is similar to starting Windows in safe mode
- Selective Startup allows the user to choose in more detail what should start with Windows
Boot tab in Msconfig
The Boot tab will show you the operating system that is installed on the computer. The tab contains some of the following options:
- Boot Options allow the user to select options such as Safe boot along with some additional options
- Timeout specifies the amount of seconds that Windows will wait in the Boot menu before loading the operating system, with the default being 30 seconds
Services tab in Msconfig
The Services tab displays all the Services configured to start up, when the operating system boots up. Uncheck services that you do not want Windows to start.
Startup tab in Msconfig
With Windows 10, the Startup tab in System Configuration Utility displays a shortcut to the Startup tab in Task Manager
Tools tab in Msconfig
The Tools tab will show you various utilities and tools that you can launch directly from the System Configuration Utility to the various tools available in Windows
Microsoft Registry Editor (Regedit.exe)
Microsoft Registry Editor is a tool for modifying entries in the Windows registry. The registry is a database that holds hardware, software, and user configuration settings.
- Whenever a change is made to preferences, software, hardware, and user-settings, those changes are stored and reflected in the registry.
- The preferred method of modifying the registry is to use the applications or management tools that write to the registry. For example, many Control Panel applets make changes to registry settings.
- There will be some advanced settings that can be made only by directly editing the registry
DirectX Diagnostic Tool (DxDiag)
DxDiag is a tool that shows information related to DirectX operation. DirectX is a set of programming interfaces for multimedia (video and audio). DxDiag displays information such as:
- Operating system version
- Processor and memory information
- DirectX version
- Settings and drivers used by display devices
- Audio drivers
- Input devices (mouse, keyboard, USB)
Command Prompt
Use the Command Prompt to execute command-line commands. To open a command prompt,
- On the taskbar, type CMD into the Search box.
- From the Start menu, go to Windows System and select Command Prompt.
Some commands launched from the command line require elevated privileges to run. If this is the case, run Command Prompt as Administrator
Services
A service is a program that processes requests from other applications or users. Services can start automatically and stay constantly running in the background, waiting for service requests. Use the Services snap-in to view and manage running services. The service startup behavior determines how the service is started.
- When set to Automatic, the service is started automatically by Windows when the system boots.
- When set to Manual, the service must be manually started.
- When Disabled, the service will not run.
MSTSC
The Microsoft Terminal Services Client is a remote management service. Mstsc.exe is the executable file that opens the Microsoft Terminal Services Client. The Microsoft Terminal Services Client, which is Remote Desktop Services, is a component of Microsoft Windows that allows users to take control of remote computers over a network connection. The three Windows components that use RDS are Windows Remote Assistance, Remote Desktop Connection, and Fast User Switching
Notepad
Notepad is a simple text editor for Microsoft Windows and a basic text-editing program which enables computer users to create documents. Notepad can be launched from the Start button, Windows Accessories, and selecting Notepad
Explorer
Explorer, or called File Explorer and formerly Windows Explorer, is a file manager application that comes with Microsoft Windows. File Explorer’s main purpose is to let you view, open, copy, move, and otherwise manage your files and folders
Disk Defragmenter
Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations. The process of doing this is called defragmentation
System Restore
System Restore is a recovery tool for Microsoft Windows that allows you to reverse certain changes made to the operating system. System Restore is used to return important Windows files and settings which might include drivers, registry keys, system files, and installed programs back to previous settings and versions.
Windows Update
Windows Update is a Microsoft service for Windows. It automates downloading and installing software updates over a network or the internet
Microsoft Register Server (Regsvr32.exe)
Microsoft Register Server is a command-line tool that registers .dll files as command components in the registry.
Data Sources
You use the ODBC (Open Database Connectivity) Data Source Administrator to create and manage ODBC data sources. To open the ODBC Data Source Administrator in Windows 10, do the following:
- Select Start.
- Select Windows System.
- Select Control Panel.
- In Control Panel, select System and Security.
- Select Administrative Tools.
- In Administrative Tools, select Data Sources (ODBC).
Advanced Security
Everyday configuration tasks for the Windows Firewall are completed using the Windows Firewall applet in Control Panel. However, advanced firewall configuration tasks can be performed using an MMC snap-in called Windows Firewall with Advanced Security. Windows Firewall with Advanced Security supports a more granular firewall configuration than can be created using the Windows Firewall applet in Control Panel. For example, it can filter traffic based on parameters such as:
- Source IP address
- Destination IP address
- Port number
- ICMP protocol
“expand” command
The expand command is used to expand compressed .cab files.
- expand -d [source_file] displays the contents of the specified .cab file.
- expand [source_file] [destination] expands all the files in the specified .cab file to the chosen destination.
- expand [source_file] f:[filename] [destination] extracts a single file from the specified .cab file to the chosen destination
“tasklist” command
The tasklist command displays a list of the processes that are currently running on the system. The output of the tasklist command includes a process ID (PID) that can be used to end the process
“taskkill” command
The taskkill command is used to end running processes.
- taskkill /im [image_name] kills the specified process by using its image name (e.g., mspaint.exe).
- taskkill /PID [pid_number] kills the specified process by using its PID (e.g., 3572).
Sometimes a process will not respond the taskkill command. If this is the case, use the /f option with the command, which forces the process to close
“mstsc” command
The mstsc command is used to establish a remote desktop session with another computer. To run the mstsc command, use the following syntax:
- mstsc /v:[server_ip]
“gpupdate” command
The gpupdate command refreshes local and Active Directory-based Group Policy settings, including security settings.
- /target: { computer | user } processes only the computer settings or the current user settings. By default, both the computer settings and the user settings are processed.
- /force ignores all processing optimizations and reapplies all settings.
- /wait: value identifies the number of seconds that policy processing waits to finish. The default is 600 seconds. 0 means “no wait”; -1 means “wait indefinitely.”
- /logoff logs off after the refresh has completed. This is required for those Group Policy client-side extensions that do not process on a background refresh cycle but that do process when the user logs on, such as user software installation and folder redirection. This option has no effect if there are no extensions called that require the user to log off.
- /boot restarts the computer after the refresh has completed. This is required for those Group Policy client-side extensions that do not process on a background refresh cycle but that do process when the computer starts up, such as computer software installation. This option has no effect if there are no extensions called that require the computer to be restarted.
-
/? displays help at the command prompt. To run the gpupdate command, use the following syntax:
- gpupdate [/target:{computer|user}] [/force] [/wait:value] [/logoff] [/boot]
“gpresult” command
The gpresult command displays Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer.
- /s computer specifies the name or IP address of a remote computer. (Do not use backslashes.) The default is the local computer.
- /u domain \ user runs the command with the account permissions of the user that is specified by user or domain\user. The default is the permissions of the current logged-on user on the computer that issues the command.
- /p password specifies the password of the user account that is specified in the /u parameter.
- /user target_user name specifies the user name of the user whose RSOP data is to be displayed.
- /scope { user | computer } displays either user or computer results. Valid values for the /scope parameter are user or computer. If you omit the /scope parameter, gpresult displays both user and computer settings.
- /v specifies that the output display verbose policy information.
- /z specifies that the output display all available information about Group Policy. Because this parameter produces more information than the /v parameter, redirect output to a text file when you use this parameter (for example, gpresult /z >policy.txt).
-
/? displays help at the command prompt. To run the gpresult command, use the following syntax:
- gpresult [/s computer [/u domain\user /p password]] [/user target_user name] [/scope {user|computer}] [/v] [/z]
“shutdown” command
The shutdown command is used to shutdown local and remote systems. The following options can be used with the shutdown command:
- /i opens the Remote Shutdown Dialog graphical interface window.
- /l logs off the current user from the local system.
- /r shuts down and restarts the local computer.
- /h causes the computer to hibernate.
- /t [xx] sets a delay time (in seconds) before the computer shuts down
“exit” command
The exit command ends the current command prompt session and closes the Command Prompt window
counter
A counter is a specific statistic you can monitor (such as the amount of free memory or the number of bytes sent on a network card).
object
An object is a statistic group, often corresponding to a specific type of hardware device or software process (such as the processor or memory).
% Processor Time (Processor Utilization)
Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks.
- Processor utilization should be relatively low, up to 40% on average.
- Processor utilization will spike (85 - 90% or higher) when a major task is launched or a significant task is performed.
- Utilization is reported for each processor in a multi-processor or multi-core system. A CPU that supports Hyper-Threading will show two utilization graphs for each processor.
- If the processor utilization is consistently high (over 90%), then the CPU is likely the bottleneck.
- Check the running processes to see the CPU use of each process. If possible, delay or pause non-critical processes or run them during off hours.
- A process that has hung could show 100% CPU use. If the process does not complete after a period of time and does not respond, end the process to return CPU use to normal.
- A computer with a virus might show an unknown process consuming most of the processor time. Use the internet to identify the function of unknown processes
- Configure the processor affinity to specify that a specific process use a certain processor in a multi-processor system.
- Upgrade to a faster CPU or add more cores to the system.
% Disk Time (Highest Active Time)
The % Disk Time statistic identifies the percentage of time that the disk subsystem is busy reading from and writing to disk. If this value is consistently over 90%, check the following other statistics to identify the source of the high disk activity:
- Average Disk Queue Length
- Memory statistics
Average Disk Queue Length
The disk queue holds read and write requests that are waiting to be processed by the disk controller. The average disk queue length tells you the number of read and write requests that are typically waiting to be processed.
- A high number indicates that the system has requested data from the hard disk, or has tried to save data to the hard disk, but that request could not be fulfilled immediately (i.e. it has to wait).
- This number should be below 2 times the number of disk spindles. Most physical hard disks have a single spindle (although some newer drives have 2 or 3). RAID arrays will have at least one spindle per physical disk. If this statistic shows consistently waiting read/write requests, you might need to upgrade your disks.
- Choose a faster disk (higher RPM and faster access time).
- Use a RAID-0 configuration to improve disk access
Available, Used, and Free Physical Memory
You can use Task Manager to quickly identify the use of physical memory in your system.
- The total installed memory value reflects the amount of memory available to the operating system. On a 32-bit system, this value will be less than 4 GB, even if you have 4 GB of memory installed. This value could also be slightly less than the amount of installed physical RAM if the video adapter shares the system memory. The amount of memory used for this purpose is displayed under hardware reserved.
- The cached value identifies memory that is being used for a disk cache to improve read/write operations from the hard disk.
- The available value identifies how much memory is unassigned. If the amount of memory in use is close to the amount of RAM installed, you might need to add RAM or quit some running programs to free up memory
Memory Committed Bytes (Commit Charge)
When a process runs, the operating system assigns memory to the process. The amount of committed memory identifies how much memory has been assigned to running processes. Be aware of the following conditions indicated by this statistic:
- If the value exceeds the amount of physical RAM, then the page file is being used instead of physical RAM. At some point, this will start to cause a bottleneck.
- To temporarily make more memory available, quit running programs or increase the page file size. However, the only permanent solution is to add more physical memory
Page File Usage
The page file usage identifies the amount or percentage of the page file that is being used.
- A common recommendation is for the page file to be 1.5 to 2 times larger than the physical memory. In most cases, you will let the system manage the page file size.
- It is normal for the page file to show some use, even when the system has sufficient physical memory.
- When the page file use percentage is near 100%, you can increase the page file size as a temporary measure. Adding more memory is the best permanent solution
Memory Pages per Second
The operating system allocates memory to processes in 4,096 KB blocks called pages.
- Instead of assigning physical memory addresses, the operating system assigns virtual memory addresses to shield the process from the details of the physical memory storage system.
- The paging supervisor is a process that maintains a table that correlates virtual memory addresses with the actual physical memory locations. When physical memory is low, data in RAM that is currently not being used by the CPU can be moved to the hard disk in order to free up memory for other processes.
- The area on the hard disk used for storing the contents of RAM is called the page file.
- When the CPU needs to access data in RAM, a page fault (also called a hard fault) occurs when that data does not exist in RAM but is instead in the page file.
- Paging is the process of moving data from RAM to disk and back. Before the CPU can work with data required by a process, that data must be placed into RAM The memory pages per second statistic identifies the number of hard faults that occur each second. A high number for this statistic accompanied by high disk activity (% Disk Time or the disk activity light constantly flashing) could indicate a condition known as thrashing.
- With thrashing, the demand for memory and the low amount of physical RAM means that the system must be constantly moving data from RAM, to disk, and back.
- The negative effects associated with paging increases as the amount of memory increases past the amount of physical RAM. While some paging is normal, as the demands on memory increase, the amount of paging will at some point reach a point where thrashing occurs and the effect on performance is noticeable–even to the point of making the system unusable.
- As a temporary solution, you can quit some running programs in order to decrease the demand for RAM. The only long-term solution is to add more physical RAM.
- Increasing the page file size will have no effect unless you are also experiencing out of memory errors. The problem is not that there isn’t sufficient combined memory, but that the amount of physical memory is insufficient
Network Utilization
Network utilization identifies the amount of traffic sent and received by a network connection.
- Utilization is listed as a percentage of the total available theoretical bandwidth (such as 100 Mbps for a Fast Ethernet connection).
- Poor performance that has low CPU, disk, and memory statistics but high network utilization could indicate a bottleneck at the network adapter
Active Directory
Active Directory is a centralized database that contains user account and security information. In a workgroup environment, authentication, security, and management all take place on each individual computer, with each device independently storing information about users and configuration settings. Using Active Directory, all computers share the same central authentication and configuration database