Windows 2000 – Events
This course is included in our On-demand training solution.
To demonstrate how to configure events in Windows 2000 to manage resource usage and security, to troubleshoot Windows 2000 services and applications, and show how to configure auditing to implement, manage, and troubleshoot Windows 2000 resource usage, network, and security policies
Students preparing for Microsoft exam 70-215 and/or 70-210
Working knowledge of Windows 95, Windows 98, or Windows NT Workstation 4.0 from administrative, support, and architectural perspectives
Windows 2000 – Eventsrecognize the purpose of events, define the principal types of events, and recognize how to use the Event Viewer and the Filter and Find features to access events.access the event log on a remote computer and use the Filter feature to find all error events in the Application log within a certain timeframe.recognize how to limit the size of event logs, define the overwrite options for older logs, and identify how to archive a log.set the Application Log to overwrite events older than 14 days, archive the Application Log contents and save the file in log file format.diagnose system problems, assess network security by using the Security Log and Find feature to analyze successful and failed security events, and identify how to unlock a user account.use the Find feature in an event log to locate a successful object access event and view its properties.recognize the purpose and the requirements for creating an audit policy, identify how to keep recording events when the event log becomes full, and diagnose errors that prevent events from appearing in the Security Log.identify how to set and enable an audit policy on the computer, and recognize how to set an audit policy on the domain controllers on a network.set an audit policy for the server to track failed access to objects on the network, and use the command prompt to enable the audit policy set on a member server.determine how to set an audit policy on network files and folders, list the steps for enabling an auditing policy to track changes to permissions for network computers, and recognize how to set up an audit policy to audit object access for printer setting changes.enable the auditing of successful attempts by all users to delete files or folders.