Reg:Server Configuration

Posted on 2009-04-19
Last Modified: 2013-11-21

We are a small company. We would like to run a server  and nodes configuration.  We want to control and monitor all the nodes through the server.Can you pls tell me how to establish such a setup.

at present we have 11 nodes.what i want is there should not be direct access to these nodes from each other....if a person wants to share some file with the other he must upload it in the server.There should be a folder created for each node in the server to upload the and share contents.So that the other person can take the file from the node where the file stays.....apart fromthis one user shd not have access to the other system except the server admin.

Also i want to log the time when each user uploads or downloads a file from the server.
Question by:whspider
    1 Comment
    LVL 5

    Accepted Solution

    It sounds like you are wanting to setup a pretty secure network.  If you haven't done this before and you are going to be the one responsible for when things get compromised, I would strongly recommend some professional security/network consultation along with the great answers you can find here at EE.

    To get started on your own I would recommend purchasing this book: (If 2003 server is what you will be running)

    Mastering Windows Server 2003
    ISBN 0-7821-4130-7

    Here are a few suggestions that I would start with as far as research, web or book:

    1) Active Directory Setup using specific user types and groups (OUs)
    2) Group Policy management of the above users and groups (local and domain)
    3) Create and manage file shares
    4) Test before you deploy if possible

    Sorry if this seems a little general but what you are asking involves about 40+ hours of setup by someone who knows what they are doing after you and your client have decided on what type of equipment and software you plan on running.  It is always good to see someone wanting to get rolling on server/node networks but care must be taken, especially if you are using someone elses resources and are being trusted by them to keep their data safe.

    Good luck and feel free to ask more questions.


    Featured Post

    Are end users causing IT problems again?

    You’ve taken the time to design and update all your end user’s email signatures, only to find out they’re messing up the HTML, changing the font and ruining the imagery. What can you do to prevent this? Find out how you can save your signatures from end users today.

    Join & Write a Comment

    This is my 3rd article on SCCM in recent weeks, the 1st ( dealing with installat…
    Have you considered what group policies are backwards and forwards compatible? Windows Active Directory servers and clients use group policy templates to deploy sets of policies within your domain. But, there is a catch to deploying policies. The…
    Need more eyes on your posted question? Go ahead and follow the quick steps in this video to learn how to Request Attention to your question. *Log into your Experts Exchange account *Find the question you want to Request Attention for *Go to the e…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now