Exchange of information between domains. Basic Windows Administration Tools Administration Tools

(2 hours)

GOAL OF THE WORK: studying the basic tools of Windows Server 2003 designed to manage the system and control user actions.

OBJECTIVES OF THE WORK

1. Learn the basics of building peer-to-peer networks and networks with a dedicated server.

2. Study the server system management tools.

3. Understand the principles of installing an Active Directory domain.

LIST OF SUPPORTING MEANS

2. Software: Oracle VirtualBox, Windows Server 2003 OS.

3. Educational and methodological literature.

General theoretical information

When building and configuring computer networks, their physical and logical topology is taken into account. A physical topology defines the set of networking equipment, including cabling and communications equipment, that is needed to physically connect computers into a network. The logical topology is determined by the settings of network protocols and programs that allow you to configure information flows between network computers.

A computer network can be built using one of three logical topologies:

Based on peer-to-peer nodes that combine client and server functions (peer-to-peer network);

Based on clients and servers (network with dedicated server);

Based on nodes of different types (hybrid network).

When configuring network nodes, you should consider what role they play: as a network server, as a network client node, or as a peer node.

Using special administration tools, you can create a logical group of network computers in a peer-to-peer network - workgroup.

Workgroup is a network environment support tool included with Microsoft Windows.

Workgroup computers share common resources such as files and printers.

When administering each computer, determine:

What resources of this computer will be shared (common);

Which network users will have access to these resources and with what rights.

In this case, each workgroup computer creates its own user databases and local computer security policies.

A workgroup is a convenient network environment for a small number of computers located close to each other.

In a peer-to-peer network, all computers have the same priority and independent administration.

Each computer has an installed operating system of the Microsoft Windows platform of any version or compatible with it. This operating system supports the Microsoft network client.

The user of each computer independently decides whether to provide access to his resources to other network users. This is the simplest network option that does not require special professional knowledge. Setting up such a network does not take much time.

In a network with a dedicated server, resource management of the server and workstations is centralized and carried out from the server. There is no need to bypass all computers on the network and configure access to shared resources. Bringing new computers and users onto the network is also easier. The security of using information online increases. This is convenient for networks with different categories of users and many shared resources.

To create a network with a dedicated server you need:

Install and configure a server operating system on one of the computers, for example Microsoft Windows Server 2003 (on this server a common database of accounts for all users is created, shared resources are assigned, and access to each is determined for categories or individual users);

Install the Windows XP Professional network operating system on client computers, which is configured to work with the server. When connecting to the network, each user registers on the server. Only registered users, i.e. registered on the server can access the network and shared network resources.

To build a peer-to-peer local network, it is enough to connect computers using a network cable (mount a cable system) and install, for example, Windows XP Professional on the computers. The Network Connection Wizard will help you make all the necessary operating system settings.

Changes to user accounts are made centrally by the network administrator on the server. In addition, users can be combined into groups and a separate network policy can be created for each group. This greatly simplifies the administrator's work when assigning access to shared resources.

A dedicated server often performs only one specific function (role), for example:

¾ file server (file server) is used to store files;

¾ print server (print server) provides printers for general use;

¾ application server provides users with network applications;

¾ Web servers provide shared access to data;

¾ router - to provide access to other networks and remote access to your network;

¾ email servers store user mailboxes and organize mail delivery over the network, etc.

In small local networks, as a rule, one server is installed that combines several server functions (roles). This is quite sufficient and economically justified.

Table 8.1

Table of advantages and disadvantages of two types of networks

Advantages Flaws
Peer-to-peer network
1.Easy to set up 1. Low level of security
2. No server software required 2. Difficulty solving administration problems
3. No qualified system administrator required 3. Performance degradation when sharing network resources
4. Low project cost 4. Lack of centralized network management
Dedicated server network
1. High level of security 1. Difficulty in setting up and administering server systems
2. Centralized network management 2. High cost of implementation
3. Simplified administration during operation 3. Lack of access to network resources when the server fails

In networks with dedicated servers, administration is carried out centrally. To simplify administration, any network computers and shared resources can be combined into groups called domains. A domain is a logical grouping of any computers on a network under one name.

A common database is created for the domain. In Windows Server 2003, this database is called a directory and is part of the Active Directory directory service. .

Objects stored in the directory include both users and network resources.

A domain can unite any computers located on a local network or located in different cities or countries. The physical connection of domain computers can be anything, including telephone lines, fiber optic lines, satellite communications, and others.

The Active Directory directory service is deployed on any server that is part of the network. Such a server receives an additional status - “ domain controller". Network administration and security policy management are carried out on the domain controller.

There can be several domains on a network, and each domain necessarily has one or more domain controllers.

If there are several domain controllers, then the Active Directory database is copied to each one. This increases fault tolerance and makes administration more convenient, because all changes made on one domain controller are reflected on others. This process is called replication.

Exercise

1. Study theoretical material on this topic.

2. Install an Active Directory domain (make the server a domain controller).

3. Check that the domain controller is installed correctly.

CREDIT REQUIREMENTS

1. For the test, you must provide the results of the work performed.

2. A report with a detailed description of the work performed.

3. Prepare answers to questions.

TECHNOLOGY for doing the work

Installing an Active Directory domain:

1. Start the virtual machine.

2. Launch the “Manage this server” program if it does not start automatically: “Start” – “Administration” – “Manage this server” (Fig. 8.1).

Rice. 8.1. Launching the “Manage this server” program

3. In the “Manage this server” window that opens, run the server setup wizard by selecting “Add or remove a role.”

4. In the “Preliminary Steps” window, carefully read the requirements.

5. In the dialog box, select “Settings”, check the “Special configuration” item and click the “Next” button.

6. Select the “Domain Controller (Active Directory)” role, then view and confirm the selected parameters.

7. The “Active Directory Installation Wizard” will start. Click the “Next” button.

9. In the “Domain Controller Type” dialog box, select the “Domain controller in a new domain” radio button and click the “Next” button (Fig. 8.2).

Rice. 8.2. Domain Controller Type window

10. In the “Create a new domain” dialog box, leave the radio button in the “New domain in a new forest” position.

11. In the New Domain Name dialog box, in the Full DNS Name of the new domain field, enter: name.is4.local(instead of the word " Name» insert a unique name consisting of Latin letters and numbers no longer than 63 bytes).

12. In the “NetBIOS Domain Name” dialog box, leave the default name.

13. In the “Database and Log Folders” dialog box, leave the suggested path C:\WINDOWS\NTDS for the database and C:\WINDOWS\NTDS for the log.

From the point of view of optimizing the operation of the domain controller, it is more profitable to place the database and log files on different physical disks.

14. In the “Sharing System Volume” dialog box, leave the suggested path C:\WINDOWS\SYSVOL.

It should be noted that the "SYSVOL" folder cannot be moved in the future. Therefore, you must ensure that there is enough space on the disk on which the installation is to be performed. This folder contains GPOs which cause it to take up a lot of space, and if there is not enough disk space, it will cause problems with domain functionality.

15. Carefully read the contents of the “DNS Registration Diagnostics” dialog box and, by setting the switch to the “The problem will be solved later by manually setting up DNS” position, continue the “Active Directory Installation Wizard”.

16. In the “Permissions” dialog box that appears, check the “Permissions compatible only with Windows 2000 or Windows Server 2003” option.

17. In the "Recovery Mode Administrator Password" dialog box, set the "Recovery Mode Password" field and the "Confirmation" field to the password " vo$t@nD#1", which will be used when restoring the Active Directory database.

You should not use the normal administrator password as the recovery password. The domain administrator password should be changed periodically, while the recovery mode password always remains the same. If you are installing an additional domain controller, you should select a different recovery password for it, such as " vo$t@nD#2».

18. In the Summary dialog box, check that all Active Directory domain settings are correct. If errors are identified, return to the dialog box and correct the necessary parameters. Click the “Next” button to start the further process of installing the domain controller.

19. Complete the installation by clicking the “Finish” button.

20. When the Active Directory Installation Wizard is finished, restart the computer.

Hello, today we’ll talk about such a phenomenon as Windows administration. Many users will be very interested to know how administration is carried out. There are quite a lot of tools that are used for this under Windows control and are available to any user.

Nowadays there are quite a large number of users who do not need to go into the details of this concept; all they need to do is play games and surf the Internet. But, if someone is still interested in administering Windows, then now we will try to sort this issue out with you.

Launching the Computer Control Panel

There is such a useful utility as the computer control panel. To open this type of tool, you can use two methods:

  1. From the Start menu, right-click on "Computer" and select "Control". If the Computer shortcut is on the desktop, then you can do the same from there.
  2. Press the keys Win+R and in the window that opens enter the command compmgmtlauncher. By the way, the command in this window will be saved and you don’t have to enter it several times.

The computer management window that opens has many tools that allow you to configure the computer as you wish; also, some services are launched separately, for example, through “Administration”.

Registry (Registry Editor)

Use is necessary if, for example, the system has been infected with some kind of malicious code, problems have arisen with programs, and even the system itself. You can also remove unnecessary traces of programs and viruses.


Many people know how to start the registry; this is done as follows (for those who don’t know): press the keys Win+R and enter the command regedit. Editing the registry is a very serious operation, because if you are not sure of what you are doing, then it is better to trust a professional. One wrong action and the system may not even start.

Local Users and Groups Editor

This tool allows you to edit users who have access to the system, as well as groups. You can configure access to the system or some components only for private users. The ability to prohibit the use of certain programs and other system features.


Services

The services tool gives us access to all services running on the system, including running and disabled ones. It is better not to interfere with the operation of some services, but you can work with some, for example, a third-party utility that takes up a lot of RAM can be disabled from there.


Disk management

A standard Windows tool that allows us to work with computer hard drives. For example, the tool will be useful when creating new sections, formatting, . You can disconnect partitions or entire disks, change partition letters. Sometimes, the tool helps solve some problems.


device Manager

A very useful utility that many people know about. Here we can manage installations of new equipment and solve some problems. For example, you inserted a new mouse, it will immediately appear in the device manager in the “Mice and other pointing devices” section.


In addition to the above, we can also disable some devices. You can find out some information about the device.

Task Manager

The well-known task manager tool. It has many capabilities, for example, you can find malicious programs and suspicious processes. Under Windows 8 and 10, you can use the and tab in the task manager, which are usually loaded along with the system.


Event Viewer

There is such a utility as event viewer. The tool may not be understandable even to an experienced user, however, it helps to identify many problems in the system. To use it, you need to have some knowledge, without which beginners have nothing to do there.


Task Scheduler

A useful tool that allows you to perform some tasks automatically. For example, you can schedule or check it.


System Monitor

A very useful utility that allows us to find out in real time the degree of load on computer components, namely the processor, RAM, and paging file. You can see for yourself how much useful information there is.


Resource Monitor

We could already see some data in the task manager, but in this tool we see more detailed information about the use of PC resources by all processes. You can find the resource monitor from the Control Panel, then go to "Administration" and there "Resource Monitor".



Firewall

The standard purpose of a firewall is network protection. It is advisable that it is always turned on, and in combination with a good antivirus, the computer will not be poorly protected. Using the settings of this tool can reduce the likelihood of your computer being hacked and malware entering the system. Sometimes, the firewall prevents some programs from launching, then you can add them to the exception list and everything will be fine.


Remote administration

As you can see, there are many tools for computer administration. Sometimes remote control of a computer may occur. Perhaps you want to help your friend with a computer, but you are not able to come to him, then you can use remote computer control.

There are many tools for remote administration, but the most popular is, of course, TeamViewer.


The program is very easy to use and even a beginner can handle it. It will be quite easy to gain access to another computer, you just need to enter the computer ID and password, the main thing is that the Internet connection is good enough for administration to take place without glitches and lags. This way you can help people wherever they are.

Bottom line

Today we looked at several Windows administration tools and understood why they are needed. Of course, many of the tools are already familiar to you. The most important thing is that you should not make changes to the system without the necessary knowledge, otherwise serious consequences may arise.

In this article we took a quick look at the process of installing components Active Directory, then I propose to consider the basic procedures for managing this directory system.

Disclaimer: I am not very strong in this topic, therefore, please do not take everything described below as dogma, this is more for information. In short - don't kick too hard :)

For a better understanding of management principles Active Directory, let's look at just a little theory.

Active Directory has a tree-like hierarchical structure, the basis of which is objects. Of the 3 types of objects, we are primarily interested in user and computer accounts.

This type of object includes several so-called classes (I can’t vouch for the terminology): Organizational Unit(OU, container, unit), Group(group), Computer(computer), User(user).

Some of them (for example OU or group) may contain other objects.

Each object has its own unique name and a set of rules and permissions (group policies).

Accordingly, administration at this level comes down to managing a tree of objects ( OU, group, user, computer) and managing their policies. Basic GUI management tools AD, are situated in Start -> Administrative Tools :

Today we’ll talk more about object management, and I’ll try to talk about group policies next Thursday.

To manage objects, I personally use the good old ““.

Here, by default, we will see standard containers in the root that are created during installation:

In the container " Users"We see the only active user" Administrator"and standard groups, each of which has its own policies and permissions:

To add a new administrator, we will need to create a user and add him to the group " Domain Admins«.

In order not to pour from empty to empty, let's look at a few banal examples.

In its freshly baked Active Directory I created a new container ( Organizational Unit) with the name TestOU.

For small infrastructure it is not necessary to create new ones OU, you can put everything in default containers at the root, but when you want to divide a large infrastructure, this becomes simply necessary.

So, let's create in our OU new domain user (right click on OU -> New -> User).

In the window that appears, fill in your first/last name and username to log in:

Set the initial password and check the required policies:

In my case, when logging in for the first time, the system will ask the user to voluntarily and compulsorily set a new password.

Check and press finish:

If you look at the properties of a domain user, you can see many interesting settings there:

Now let's add the user to the previously created group. Right by user -> Add to Group:

write the group name and click " Check Names"To check if we wrote everything correctly, then click OK.

By looking into the properties of the group, we can, among other things, see who is in it:

In general, all this is already intuitive and simple, but to complete the picture it will not be superfluous.

Well, with users and groups, in principle, everything is clear, now let’s look at the administration of computer accounts.

In concept Active Directory, a computer account is an entry in a container that contains information about the computer name, its ID, information about the operating system, etc., and serves to manage computers connected to the domain and apply various kinds of policies to them.

Computer accounts can be created either manually in advance or automatically when the computer is added to the domain.

Well, with the automatic option, everything is clear: we enter the computer into the domain under the domain administrator account and its (computer’s) account is automatically created in the container by default - Computers.

With manual creation things are a little different, let's look at an example where this can be useful.

For example, we need to grant the right to add a computer to the domain to a user who is not a domain administrator (this happens to me often).

Or, for example, if, when performing automated cloning of virtual machines, computers are entered into the domain using scripts and must be placed in a specific container, you can create ready-made accounts in the desired container and grant the right to enter them into the domain to a specific user.

Let's look at the process of creating a computer account using an example with pictures. Right-click on the desired container -> New -> Computer :

Select the user who will be the owner of the account:

Click OK-OK and get a ready-made computer account.

If we look at its properties, we will see that it is clean, because... does not contain information about a specific computer:

Accounts, groups and containers can be moved between other containers, but you need to remember that child objects are subject to the domain policies of parent objects.

We reviewed the tool " Active Directory Users and Computers“, but this is not the only possible option for administering objects. IN Windows Server 2008R2 for the same purposes you can use " Active Directory Administrative Center»:

In the picture we see what it looks like. I won’t say much about functionality, but at first glance it’s the same “ Users and Computers"in a slightly different shell. Perhaps (even most likely) it will be more convenient for everyday use, it’s a matter of habit.

In addition to the standard functionality " Active Directory Users and Computers» type, creating/deleting/changing users/groups/departments/computers, advanced filter functionality is implemented here for conveniently searching for objects and managing them.

Another, most hardcore and probably the most functional method of administration Active Directory — « Active Directory Module for Windows PowerShell". To be honest, I’ve never used it, the functionality of graphical utilities was enough. The command line is good, but I'm afraid that I'll have to spend a lot of time learning its functionality, it's not for everyone :)

That's all for today. To be continued;)

The main 1C:Enterprise system administration tools are implemented as part of the configurator. However, there are a number of mechanisms and utilities that are not included in the configurator, although they are also related to the administration of the 1C:Enterprise system. We list the most important mechanisms and tools included in the administration tools:



Authentication Mechanisms


a list of users


At the moment the next user connects to the application solution, the authentication mechanism allows you to find out which of the users listed in the list of users is connecting to the application solution. This information is used to authorize access to certain information, etc.


Allows you to describe the authority of various system users to access certain information.








Active users


Job mechanism


The list of active users allows you to obtain information about which users of the information base are currently working with it.


The task mechanism allows you to organize asynchronous execution of procedures of common modules, and automatic execution of procedures of common modules according to a schedule.


Lists of common infobases and shortcuts


Logbook


Lists of common infobases and shortcuts can greatly facilitate the administration of systems with a large number of users.


The log contains information about what events occurred in the infobase at a certain point in time or what actions were performed by a particular user.


Technology magazine



The technology log is designed to analyze technological problems of the system and analyze crashes of any applications of the 1C:Enterprise 8 system running on this computer.


The system allows you to upload the current infobase to a file on disk and load the infobase from a file.

Testing and correcting the information base

Infobase parameters

Various failures (power outages, computer freezes, etc.) that occur while users are working with the information base can lead to its incorrect state. To diagnose and correct the erroneous state of information bases, a special testing and correction procedure is used.

In 1C:Enterprise 8, it is possible to set infobase parameters: infobase lock wait time, minimum user password length, and complex password.

Regional information base settings

Configuration update

Configuring regional information base settings allows you to control the display format of date, time, numbers and logical constants in the application solution.

During the operation of an application solution, situations may arise that require changes to be made to the application solution. For example, a new version of an application solution may be released, or you may simply need to add new functionality to an existing application solution. In this case, the infobase administrator can update the configuration of the application solution.

Administration of a 1C:Enterprise server cluster

File Database Recovery Utility

To monitor 1C:Enterprise 8 servers, create and delete infobases, you can use both the Windows administration utility and cross-platform tools.

To offline check and restore the file database (without launching the configurator), use a special utility included in the delivery kit.

Running the configurator in batch mode

Work options

In addition to launching 1C:Enterprise by selecting the appropriate icon from the Start -Programs menu, you can launch the executable file of the client application by specifying the necessary parameters in the launch command line.

1C:Enterprise 8 provides work in two versions, which allow both one user and a large work group to work completely identically with the application solution.

1C:Performance Management Center

1C:Test Center

A tool for monitoring and analyzing the performance of information systems on the 1C:Enterprise 8 platform. Designed to evaluate system performance, collect detailed technical information about existing performance problems and analyze this information for the purpose of further optimization.

A tool for automating multi-user load tests of information systems on the 1C:Enterprise 8 platform. With its help, you can simulate the operation of an enterprise without the participation of real users, which allows you to evaluate the applicability, performance and scalability of an information system in real conditions.

1C: Quality Control Center

Equipment selection

A tool that guarantees efficient and reliable operation of the system on the 1C:Enterprise 8 platform through timely and correct maintenance of the system. This is especially important for implementations with high requirements for system performance and reliability. This tool was created based on the experience of maintaining hundreds of enterprise implementations.

This section contains recommendations for selecting equipment for working with 1C:Enterprise 8. It provides information on how the characteristics of the equipment affect the efficiency of using the system in various modes and provides recommendations for selecting equipment depending on the tasks being solved.

Authentication Mechanisms

In 2009, Microsoft introduced the new operating system Windows 7. In addition to a large number of innovations, this OS implemented many tools for managing almost all key settings of the Windows 7 system. System administration provides the ability to manage users, groups, files and folders, access to them, security system, printers, etc.

Types of Windows 7

There are several versions of the Windows 7 operating system. They are designed for different tasks and applications, and, accordingly, have different capabilities and administration tools.

The most common modifications of Windows are Ultimate, Professional and Home. Administration of Windows 7 has its own characteristics in each type of OS. The most complete administration package is presented in Windows 7 Ultimate, as it is universal for both work and entertainment tasks. Windows 7 Starter has the least amount of settings. It is designed to solve basic problems, is installed on low-power laptops or netbooks, and is often intended for pre-sale demonstration of the capabilities of computer equipment.

Why do you need administrator rights?

To fully administer Windows 7, you must have administrator rights. The user that is created when Windows is installed has fairly limited rights for security reasons. Malicious programs or viruses will not be launched under the current user account, important system files will not be accidentally deleted, and any significant damage to files necessary for the OS will not be caused. But there are also unpleasant moments. When installing some programs, for example, office ones, the user may encounter that the changes made in the system are not saved or the installed programs malfunction and do not save data. When determining the reasons, it turns out that the user does not have enough rights to certain operations, for example, to write files to the Program Files folder.

Ways to obtain administrator rights

To have more rights to administer Windows, you need to increase your permissions in the system. This can be done in different ways. The two most commonly used are:

Through the user management window. On the keyboard you need to type the combination “WIN + R”, in the window that opens, type the name of the snap-in lusrmgr.msc and click “OK”. In the “Local Users and Groups” window that opens, go to the “Users” item. On the administrator account, right-click to open the menu and select “Properties”, in which you uncheck the option to disable the account. Next, select completion, click “Ok” and reboot the device.

Administration of Windows 7 may be needed for a short period of time, for example, to run a program that is unstable in normal mode. To do this, right-click on the program and select “run as administrator” from the menu. In this case, the program will run with elevated rights.

To enable elevated rights for permanent operation, you need to launch the command line as an administrator, enter the line “net user Administrator / active: yes” (provided that you enable the administration of Windows 7 Russian version), and then press Enter. After rebooting, you will be able to select the Administrator account on the Welcome screen along with other accounts.

It must be taken into account that constant work under the administrator account is carried out with a very low level of protection, since all programs, including viruses and malware, will be launched with maximum privileges.

Logging into the computer control center

This is the place where administration in Windows 7 is most conveniently carried out through the main computer management tools. There are different ways to get there. The simplest is to right-click on the “My Computer” icon and select “Manage” or “Tools” individually. There are also options to launch through the “Administration” panel in or through the command line with the command compmgmtlauncher. This snap-in contains frequently used Windows 7 administration tools, such as service and disk management, event viewing, and other management tools. In case of system failures, experienced users and administrators can quickly find the problem by simply examining the system logs in the “Event Viewer” branch. Logs are kept for almost all events occurring in the system, from starting services when the computer is turned on and ending with recording user actions in the system.

Windows Service Management

On the service management tab you can see a list of services and their status. It is possible to change the mode and parameters of their operation and launch. Windows 7 service administration is often used when a computer is infected with viruses that add themselves as a service and start when the computer boots. To combat them, you need to stop the service and then remove it from the startup list.

and device manager

Equally important is the administration of Windows 7 disks. This makes it possible not only to create partitions on the hard drive, but also to change their sizes, assign them names and a letter identifier under which it is seen in the system. Look into this section of the control panel if the flash drive is not detected in the system or the drive letter is not specified. When connecting new disks in the snap-in, you can assign them sizes, perform formatting and other operations.

Information about your computer's hardware can be seen in Device Manager. There are times when new equipment is not detected by the system and you have to look for drivers for it in an unknown place. Administration in Windows 7 allows you to view information not only on installed devices, but also on those for which drivers were not found. The properties of each device indicate a unique identifier for the device and the group to which the device belongs. Using these parameters, you can easily find a driver for a new device. Most often, problems arise with video card drivers, Wi-Fi adapters, etc.

Remote administration tools allow you to perform system settings and troubleshoot errors in programs and the operating system remotely via an internal network or via the Internet. Remote administration of Windows 7 is not possible in all types of OS; the connection is configured only for corporate, professional and maximum versions (you can see the version of the operating system in “Computer Properties”).

The built-in Remote Desktop utility allows the administrator to connect to a computer and make certain settings on it without affecting the user's session. To activate the connection feature, you need to go to the Control Panel, and then make changes to the “Remote access settings” item in the system properties. With remote connections enabled and enabled, remote administration of Windows 7 is not particularly difficult.

Account administration

The operating system provides for the administration of Windows 7 accounts. It is possible to manage not only local accounts (creating new ones, editing, deleting existing ones, changing passwords, etc.), but also remote access user accounts. As mentioned above, for security reasons, it is recommended to create a user account and log in under it. Since it has reduced privileges, in the event of a virus infection or with little user experience, the damage to system files will be minimal.

If you have multiple users on your computer, you can create multiple accounts. The user is selected upon login in the welcome window. Each user can configure personal system settings, such as shortcuts and desktop backgrounds, which are stored in the user's personal profile. The administrator has the ability to work with all user profiles on the computer.

Network administration

Another important administration item is setting up network parameters. To start Windows 7, you need to go to the “Start - Control Panel - Network and Internet” menu. Most often, administration involves creating and configuring shared access to files and folders of home devices, as well as access to a printer on the home network.

There are also convenient options such as “Diagnostics and troubleshooting”, which allows you to quickly diagnose and search for network problems.