Objectives and Goals
○ Objectives:
• To explore the fundamental functions
and structures of various operating
systems.
• To understand the key differences
and use cases of Unix-like and
Windows systems.
○ Goals:
• Hold file system hierarchies and the
importance of Linux distributions.
• Learn essential and advanced Linux
commands for effective system Key Word
management.
System Administration
Sys Admin Network Administration NAME OR LOGO 2
Remember the following basic topics
System System Administrator Network administrator Administration Computer System
What? What is ? What is ? What is ? What is ?
Why? Who? Who? Who? Who?
Where? Where? Where? Where?
Sys Admin NAME OR LOGO 3
What is System ?
System ○ In system administration, the word
system is used to refer both to the
○ In system administration, the word
operating system of a computer and often,
system is used to refer both to the
collectively the set of all computers that
operating system of a computer and
cooperate in a network.
often, collectively the set of all
computers that cooperate in a
network.
Sys Admin NAME OR LOGO 4
Challenges in Operating Systems
○ Compatibility Issues:
Software and hardware may • Security Vulnerabilities: Cybersecurity
not work seamlessly across threats that can exploit OS weaknesses,
different OS platforms. highlighting the need for regular updates
and patches.
○ Learning Turn: Users • Resource Management: Efficiently
transitioning from one OS to allocating CPU, memory, and storage can
another may face significant be complex, especially in multi-user
hurdles in adapting. environments.
Sys Admin NAME OR LOGO 5
Common Practices
Best Practices for OS Management:
• Regular System Updates: Ensure the system is running the latest patches to
mitigate vulnerabilities.
• Data Backup Strategies: Implement automated backups and use cloud storage
solutions to safeguard data.
• User Education: Provide training on recognizing phishing attacks, malware, and safe
browsing practices.
• System Monitoring: Utilize tools for performance monitoring and logging to
preemptively address issues.
Sys Admin NAME OR LOGO 6
Overview of Operating Systems
Best Practices for OS Management:
• What is an Operating System?
• An OS is software that acts as an intermediary between computer hardware and the
user applications.
• Core Functions:
• Resource Management: Allocates hardware resources such as CPU time and
memory.
• User Interface: Provides graphical (GUI) or command-line (CLI) interfaces for user
interaction.
• Task Scheduling: Manages the execution of processes to optimize performance.
Sys Admin NAME OR LOGO 7
Types of Operating Systems
Categories of OS
• Batch Processing: Executes a series of jobs without manual
intervention (e.g., mainframe environments).
• Time-Sharing: Multiple users share system resources simultaneously
(e.g., UNIX).
• Real-Time Systems: Processes data as it comes in, often used in
critical applications (e.g., embedded systems in cars).
• Distributed Systems: Operate across multiple machines, sharing
resources and tasks (e.g., cloud computing platforms).
Sys Admin NAME OR LOGO 8
Overview of Unix-like Systems
Definition:
• Unix-like systems follow the design principles of the original Unix
OS, promoting multitasking and multi-user capabilities.
Features:
• Stability and Performance: Highly reliable for server
environments.
• Security: Strong user permissions and access controls.
• Modularity: Easy to customize and extend functionalities
through various tools and applications.
• Examples: Linux, BSD, AIX, Solaris.
Sys Admin NAME OR LOGO 9
Overview of Windows Systems
Introduction
• Windows is the leading desktop operating system globally, known
for its user-friendly design and extensive application ecosystem.
Key Features:
Graphical User Interface (GUI): In-built and accessible, making it popular
for non-technical users.
Software Compatibility: Vast library of applications, from productivity tools to
games.
Gaming Capabilities: Strong support for gaming hardware and software.
• Market Share: Windows holds a significant portion of the desktop
OS market, especially in business environments.
Sys Admin NAME OR LOGO 10
Comparative Analysis: Unix-like vs. Windows
Introduction
Strengths of Unix-like Systems:
Flexibility and Customization: Highly customizable for specific user needs.
Command-Line Proficiency: Powerful CLI for advanced users and scripting capabilities.
Strengths of Windows:
• User-Friendly: More accessible for beginners and non-technical users.
• Widespread Adoption: Extensive community support and a large knowledge
base.
Weaknesses:
Unix-like: Sudden learning curve, especially for users unfamiliar with CLI.
Windows: More frequent targets for malware and security breaches.
Sys Admin NAME OR LOGO 11
Linux Distributions Overview
What is a Linux Distribution?
A Linux distribution (distro) is a complete operating system built around the Linux kernel,
bundled with software and libraries.
Popular Distributions:
Ubuntu: Known for ease of use and community support; ideal for newcomers.
Fedora: Focuses on innovation and includes the latest features and technologies.
CentOS: A stable, enterprise-focused distribution derived from Red Hat Enterprise Linux.
Arch Linux: Targeted at advanced users who prefer a DIY approach to system
customization.
Sys Admin NAME OR LOGO 12
User Interfaces in Linux
Desktop Environments
• GNOME: Offers a modern and minimalist design, emphasizing user
experience.
• KDE Plasma: Highly customizable and feature-rich, appealing to power users.
• Xfce: Lightweight and efficient, ideal for older hardware or users seeking
speed.
• LXQt: Very lightweight, designed for performance on low-resource systems.
Sys Admin NAME OR LOGO 13
Network Administration
Network administration normally
includes the deployment,
configuration, maintenance and
monitoring of active network
equipment: switches, routers, firewalls,
etc and diagnoses problems network-
attached computers.
○ Network administration commonly
includes activities such as network
address assignment, assignment of
routing protocols and routing table
configuration as well as configuration
of authentication and
authorization
Sys Admin NAME OR LOGO 14
What is Systems
administration
○ Systems administration includes
computer systems and the ways
people use them in an
organization.
○ The task is performed by a system
administrator who monitors system
health, monitors and allocates
system resources like disk space,
performs backups, provides user
access, manages user accounts,
monitors system security and
System Administration
performs many other functions.
System administration refers to the
management of one or more hardware
Sys Admin and software systems NAME OR LOGO 16
What does System admin do?
Managing • Managing Windows, Linux, or Mac systems
Doing • Upgrading, installing, and configuring
application software and computer hardware
Giving • Troubleshooting and providing technical
support to employees
Privileging • Creating and managing system permissions and
user accounts
Performing • Performing regular security tests and security
monitoring
Maintaining • Maintaining networks and network file systems
Sys Admin NAME OR LOGO 16
User Account Management
What is user account management?
User account management is all about managing which users can access specific folders and files,
which requires providing specific access credentials to users who need who privileged access
○ User account management best practices ○ What are user accounts management tools
• Principle of Least Privilege • User accounts management tools are designed to help
streamline your Active Directory account management
• Data Ownership and make your account management as safe as
• Ongoing Monitoring and Adjustments possible
○ How does the user management software in ○ Why is user access control important
SolarWinds Access Rights Manager (ARM) work? • User access control is important to helping ensure
• SolarWinds Access Rights Manager (ARM) is built to system security. Without a smart approach to user
provide a centralized access management tool for account management, your system can easily become
efficient user account management. When you invest compromised by a user who has access to top-secret
in ARM, you can gain access to a highly intuitive, data, or by a cyber attacker who gets ahold of overly
visual tool that can allow you to quickly view and permissive access credentials.
adjust user credentials.
Sys Admin NAME OR LOGO 17
Hardware Management
What is Hardware Management ?
Is a set of applications that manage the lifecycle of all IT assets, such as desktop computers,
laptops, mouse devices, servers, printers, from acquisition to disposal.
Benefits of Hardware Asset Management (HAM)
○ Allows You to Save Costs ○ Provides Centralized Information Advantage
○ Manages the Lifespan of Assets ○ Prevents Asset Theft
○ Provides Return on Investment (ROI) ○ Makes Your Job Easier With the Reports It Provides
○ Increases Productivity and Business Agility ○ Alleviates User Anxiety
○ Saves Time
○ Increases Your Control Over IT Inventories
Sys Admin NAME OR LOGO 18
Data Backups
What is Backups?
Are storage devices like disks or Media which have the capability to store data's of different type
and capable to restore data's!
The other thing that a sys Admin can do is Data Backups
○ Planning Disk and backup media capacity ○ User Communication
○ Performance, network and System impact • Schedule, restore guarantees and procedures, loss
tolerance
• Disaster recovery
• Onsite/Offsite
• Periodic Copies / Snapshots
Sys Admin NAME OR LOGO 19
Software Installation /
Maintenance
A new way to engage with customers.
Sys Admin NAME OR LOGO 20
Software Installation / Maintenance Cont…
○ Evaluation of Software
○ Downloading and Building (Compiling and Tweaking)
○ Installation
○ Maintenance of Multiple Versions
○ Security
○ Patches and Updates
○ User Notification documentation
Sys Admin NAME OR LOGO 21
System Monitoring
○ Hardware and services functioning and operation
○ Capacity
• Disk, RAM, CPU, Network
○ Security
• Password
• Break-ins
○ System logs
• Examination
• Periodic rotation and truncation
Sys Admin NAME OR LOGO 22
Troubleshooting
When ? Why?
○ Problem discovery, diagnosis, and resolution
• Root cause analysis
• Often quite difficult
○ Often requires
• Broad and through system knowledge
• Outside experts
• Luck
○ Expediency (Practicality)
Sys Admin NAME OR LOGO 23
o Administrative Polices and Procedures
o Backup Media Locations
o Hardware
o Location
o Description, Configuration, connections
o Software
o Install media (or download location)
o Installation, build, and configuration details
o Patches installed
Local Documentation o Acceptable use policies
Each Network and System that needs
administration should be documented and
available to administrators for future use.
Sys Admin NAME OR LOGO 24
Security Concerns
○ System logging and auditing facilities
• Evaluating and implementation
• Monitoring and analysis
• Traps, auditing and monitoring programs
○ Unexpected or unauthorized use detection
○ Monitoring of security advisories
• Security holes and weaknesses
• Live exploits
Sys Admin NAME OR LOGO 25
Administrative Challenges
○ Need
• Broad knowledge of hardware and software
• To Balance conflicting requirements
• Short-term vs Long-term needs
• End-User vs Organizational requirements
• Service providers vs police model
• To work well and efficiently under pressure
• 24X7 availability
• Flexibility, tolerance and patience
• Good communication skills
Sys Admin ○ People think of sysadmins only when things don’t work NAME OR LOGO 27
The system administrators code of ethics
Ethics Morals
○ The Principles of conduct that ○ Proclamation of what is right and
governs a group of people good
○ Probably too late to help much
here
Policies concerning computer are generally
either for users or admins
Sys Admin NAME OR LOGO 28
• What is Network
• Advantage of network
• Types of network
• Network topologies
• OSI Reference Model
• IP Addressing and Sub
netting Summary
Review of Networks on Data
Communication, Advanced Network,
Sys Admin Network Design courses NAME OR LOGO 29
Thank
You