- Symbols
-
$ADEvent
, 346
-
$Event
, 341
-
$ISOPath
, 258
-
$NewUserHT
, 87
-
$Printer
, 247
-
$Profile
, 11
-
$PSHome
, 9
-
$PSISE
, 11
-
$PSVersionTable
, 12
-
$RegEvent
, 344
-
$SB2
, 107
-
$Users
, 97, 98
- A
- access control entries (ACEs), 154–155, 160, 206
- access control lists (ACLs), 76, 84–85, 86, 154, 155, 157–158, 162, 198, 199, 206
- account, global, domain, local permissions (AGDLP) approach, 85
- Active Directory (AD)
- adding users to via CSV, 96–100
- aspects of not covered in this book, 58
- best practices in, 57–58
- configuring cross‐forest trust, 75–86
- configuring Just Enough Administration (JEA), 100–109
- described, 56–57
- establishment of forest root domain, 60–66
- installing child domain, 70–75
- installing replica DC, 66–70
- management of, 55–109
- managing AD users, computers, and OUs, 86–96
- naming practices in, 57
- objects likely to use in, 86–96
- publishing printer in, 238–240
- using latest version of module for, 54
- Active Directory Administrative Center (ADAC), 94
- Active Directory Certificate Services (AD CS), 56
- Active Directory: Designing, Deploying, and Running Active Directory (Desmond), 58
- Active Directory Domain Service (AD DS), 56
- Active Directory Federation Services (AD FS), 56
- Active Directory Lightweight Directory Services (AD LDS), 56
- Active Directory Rights Management Services (AD RMS), 56
- Active Directory Users and Computers MMC console, 94
- Active Script consumer, as permanent event handler, 347
- AD (Active Directory). See Active Directory (AD)
- AD computer object
- adding computer to AD, 95
- displaying computers in AD domain, 95–96
- as one of four sets of AD objects likely to use, 86
- AD CS (Active Directory Certificate Services), 56
- AD Domain Service feature, installation of, 61, 76–77
- AD DS (Active Directory Domain Service), 56
- AD FS (Active Directory Federation Services), 56
- AD group object
- creating and viewing group membership, 93
- creation of, 92–93
- displaying group membership, 94
- make all users in IT members of IT team group, 94
- make new group to IT team, 93
- as one of four sets of AD objects likely to use, 86
- AD LDS (Active Directory Lightweight Directory Services), 56
- AD organizational unit (OU) object
- creating user in, 89
- creation of for IT, 88
- defined, 88
- moving users into, 88
- as one of four sets of AD objects likely to use, 86
- AD RMS (Active Directory Rights Management Services), 56
- AD RSAT tools, 155, 160, 255
- AD user object
- adding two additional users, 89
- creating hash table for general user attributes, 87
- creating OU for IT, 88
- creating two users, 87–88
- creating user in OU, 89
- moving users into OU, 88–89
- as one of four sets of AD objects likely to use, 86
- removing user directly, 91
- removing user with
Get | Remove
pattern, 90
- updating and displaying of, 91–92
- viewing existing users, 90
- AD WMI provider, 348
- ADAC (Active Directory Administrative Center), 94
-
Add‐ADGroupMember
, 93, 345
-
Add‐ClusterSharedVolume
, 226
-
Add‐Computer
, 269
-
ADD‐DHCPSecurityGroup
, 122
-
Add‐DhcpServerV4Failover
, 130, 131
-
Add‐DnsServerPrimaryZone
, 139
-
Add‐DnsServerResourceRecord
, 142
-
Add‐NTFSAccess
, 160, 161
-
AD‐Domain‐Services
, 61
-
Add‐Printer
, 237
-
ADDSDeployment
module, 61–62
-
Add‐VMHardDiskDrive
, 261, 276
-
Add‐VMScsiController
, 275
- administrative shares, defined, 197
- AGDLP (account, global, domain, local permissions) approach, 85
-
Audio and Video Files
, 183
- automatic new version notification, 3
- automatic private IP addressing (APIPA), 114
- B
- Background Intelligent Transfer Service (BITS), 235
- binary modules, described, 39
- C
- CA certificate, 30
- cache
- FS‐BranchCache, 192
- module analysis cache, 47–48
- Cascadia Code (font)
- downloading of, 17–18
- installation of, 18
- as new Microsoft font, 15
- cdmlet definition over XML feature, 246
- certificate authority (CA), 30
- certificates
- CA certificate, 30
- copying of to Trusted Publisher and Trusted Root stores, 33–34
- creation of self‐signed certificates, 31
- signing certificate, 30
- viewing of, 31–32
- X.509 digital certificates, 30
-
C:\
Foo folder, 7, 14, 15, 20
-
Checkpoint1
, reverting to, 287–288
-
Checkpoint2
, rolling forward to, 289
- checkpoints
-
Checkpoint1
, 287–288
-
Checkpoint2
, 289
- production checkpoint, 282
- standard checkpoint, 282
- use of term, 286
- use of VM checkpoints, 282–291
-
Checkpoint‐VM
, 284, 286
- child domain
- adding AD DS features to UKDC1, 72–73
- creation of, 73
- importing Server Manager module, 71
- installation of, 70–75
- verifying that DC1 can be resolved, 71–72
- viewing of, 74–75
- viewing updated AD forest, 73–74
-
C:\
HW, 26
- CIM (Common Information Model), 315
- CIM cmdlets
- as component of WMI architecture, 317
- use of, 319–320
- CIM Database (CIMDB), as component of WMI architecture, 318
- CIM Object Manager (CIMOM), as component of WMI architecture, 318
-
CimClassMethods
, 335
-
‐CimSession
, 326
- cluster shared volume (CSV), 226. See also CSV files
- cluster test tool, 222
- cmdlets
- CIM cmdlets, 317, 319–320
-
Foreach‐Object
cmdlet, 2
-
Get‐AuthenticodeSignature
cmdlet, 35
-
Import‐Module
cmdlet, 6, 40, 48, 49, 50, 167, 258
- redevelopment of, 2
- SMB cmdlets, 319
-
‐CodeSigningCert
parameter, 34
- code‐signing environment, creation of, 30–35
- Command Line consumer, as permanent event handler, 347, 348
-
CommandLineEventConsumer
, 352
- commands, as contained within modules, 37
- Common Information Model (CIM), 315
- compatibility issue work‐arounds, 54
- compatibility layer/solution
- described, 2
- introduction to, 48–50
-
Complete‐VMFailover
, 303
- Component Object Model (COM), 315
-
_ComputerName
property, 334
- computers, reporting on AD users and computers, 359–365
- conditional DNS forwarder, 79, 82
- conditional DNS forwarding, 80–81, 82
-
Connect‐VMNetworkAdapter
, 267
-
Constructor
qualifier, 335
-
CreateTrustRelationship()
, 84–85
- cross‐forest trust
- adjusting DNS to resolve Reskit.Org from KAPDC1, 79
- configuration of, 75–86
- connecting two independent forests with, 57–58
- creating credentials to run a command on DC1, 81
- creating script block to adjust ACL of a file on DC1, 84
- defined, 76
- establishment of, 84
- getting domain detail objects, 82
- importing AD DS deployment module, 77–78
- importing Server Manager module, 76
- installing AD Domain Services feature and management tools, 76–77
- invoking script block on DC1, 81–82
- promoting KAPDC1, 78
- running script block on DC1 to demonstrate, 85–86
- setting up conditional forwarder on Reskit.Org, 80–81
- setting WinRM, 81
- testing conditional DNS forwarding, 80
- testing network connectivity with DC1, 77
- viewing Kapoho forest details, 83–84
- viewing Kapoho.com forest details, 78–79
- viewing Reskit forest details, 83
- CSV files. See also cluster shared volume (CSV)
- adding users to, 98
- adding users to AD via, 96–100
- creation of, 97
- importing and viewing of, 97–98
- moving iSCSI disk into CSV, 226
- viewing all users in Reskit.Org, 98–100
- Current User Current Host profile, 11, 14
- D
- data collector
- creation of, 375
- starting built‐in data collector, 385–386
- waiting for data collector to finish, 386
- data collector set, 374, 376–378
- DC (Domain Controller)
- every domain in forest as having at least one, 58
- installation of replica DC, 66–70
- reviewing of in Reskit.Org domain, 69–70
- testing connectivity to, 118
-
DC1.Reskit.Org
- checking basic connectivity to, 118
- checking DNS zones on, 140–141
- configuring quorum share on, 224–225
- creating credential to run command on, 81
- creating script block to adjust ACL of a file on, 84
- as first DHCP server, 130
- invoking script block on, 81–82
- registering DNS records for, 140
- running script block on to demonstrate cross‐forest trust, 85–86
- as Windows Server 2019 host, 4–5
-
DC2.Reskit.Org
- counting namespaces/classes on, 327–328
- installing DHCP server feature on, 128–129
- installing DNS feature on, 134
- letting DHCP know it is fully configured on, 129
- as new DHCP server, 130
- registering DNS records for, 140
- DCOM (Distributed COM), 315, 319
- default shares, disabling of, 197
- Deployment Image Servicing and Management (DISM) module, importing of, 258
- Desmond, Brian (author)
- Active Directory: Designing, Deploying, and Running Active Directory, 58
- DFS Namespace (DFSN), 192
- DHCP (Dynamic Host Configuration Protocol). See Dynamic Host Configuration Protocol (DHCP)
- DHCP failover
- authorizing second DHCP server in AD, 129
- configuration of, 128–133
- configuration of and load balancing, 130–131
- installing DHCP server feature on DC2, 128–129
- letting DHCP know it is fully configured on DC2, 129
- viewing active leases from both DHCP servers, 131–132
- viewing authorized DHCP servers, 129–130
- viewing DHCP server statistics, 132
- DHCP scope
- configuring scope‐specific options, 126
- configuring server‐wide options, 126
- creation of, 125
- defined, 124
- getting scopes from DHCP server, 125–126
- testing DHCP service in operation, 127
- Directory Server Entry (DSE), viewing of, 63–64
-
Disable‐NTFSAccessInheritance
, 161
- disks
- adding iSCSI disk to cluster, 225–226
- adding one to VM, 276
- creating an F: volume in disk 1, 150
- creating iSCSI virtual disk, 211–212
- creating new virtual disk, 275–276
- creating partition in disk 2, 150–151
- creating second partition, 151
- ensuring iSCSI disks are connected, 225
- examining virtual disk details, 310–311
- getting information about physical disks on SRV1, 148–149
- getting partitions on SRV1, 153–154
- initializing new disks, 149
- management of, 147–154
- moving iSCSI disk into CSV, 226
- setting disk online and making it read/write, 216
- viewing initialized disks, 149
- viewing iSCSI virtual disk, 216
- viewing SalesTarget iSCSI disk, 214
- viewing SCSI disks inside HVDirect, 277
- DISM (Deployment Image Servicing and Management) module, importing of, 258
- Distributed COM (DCOM), 315, 319
- Distributed Management Task Force (DMTF), 315
- DLL, 236, 248
- DNS (Domain Name Service). See Domain Name Service (DNS)
- DNS conditional forwarder, 79–80
- DNS forward, creating DNS forward lookup zone, 139
- DNS forwarder, configuration of, 136
- DNS Security (DNSSEC), 135
- DNS settings, viewing of, 65–66
- domain, described, 57
- Domain Admins group, 363
- Domain Controller (DC). See DC (Domain Controller)
- Domain Local groups, 85
- Domain Name Service (DNS)
- adding DNS RR to Cookham.Net Zone, 141–142
- checking DNS RRs in Cookham.Net zone, 142–143
- checking DNS zones on DC1, 140–141
- configuration of, 135–136
- configuring DNS zones and resource records, 138–144
- creating DNS forward lookup zone, 139
- creating reverse lookup zone, 139–140
- installing DNS feature on DC2, 134
- overview, 133–135
- registering DNS records for DC1, DC2, 140
- restarting DNS service, 142
- testing DNS server resolution, 143–144
- viewing key DNS server options, 136–138
- dot sourcing, 39
-
ds_group
WMI class, 344
- DSC resource, invoking of, 3, 53
- DSE (Directory Server Entry), viewing of, 63–64
- Dynamic Host Configuration Protocol (DHCP)
- authorizing DHCP server in AD, 122
- authorizing second DHCP server in AD, 129
- checking DHCP service, 123–124
- completing DHCP configuration, 123
- configuring DHCP failover, 128–133
- configuring DHCP failover and load balancing, 130–131
- configuring DHCP scopes, 124–127
- configuring scope‐specific options, 126
- configuring server‐wide options, 126
- creating DHCP scope, 125
- getting scopes from DHCP server, 125–126
- installation of, 121–122
- letting DHCP know it is fully configured on DC2, 129
- restarting DHCP service, 123
- setting options for, 126
- testing DHCP service in operation, 127
- use of, 113
- viewing active leases from both DHCP servers, 131–132
- viewing authorized DHCP servers, 129–130
- viewing DHCP server statistics, 132
- dynamic method, 319
- dynamic modules, described, 39
- E
- EDNS (Extended DNS), 135
-
Enable‐PSRemoting
, 104
-
Enable‐VMMigration
, 308
-
Enable‐VMReplication
, 294
-
Enable‐VMResourcedMetering
, 312
- Enterprise Admins group, 345–346, 353, 363
- enterprise resource planning (ERP) tool, 96
- error messages, 2
- error views, simplification of, 2–3
- event consumer, 352
- event filter, 352, 353–355
- event logs
- counting event logs, 397
- creating logon type summary, 400
- displaying logon events by logon type, 401
- examining RDP logons, 401
- getting all Windows Security log events, 399
- getting event counts in key logs, 398
- getting logon events, 399
- getting total number of event records, 397–398
- reviewing of, 395–401
- Exchange Server, 48
- execution policy
- enabling of, 6
- resetting of, 35
- setting of, 32
- use of, 30
- experimental features, 3
- Extended DNS (EDNS), 135
- extrinsic events, 339, 342–343
- F
- failover clustering, 206, 218, 222, 224, 302
- failover test, 288, 299, 300, 301
-
FailoverClusters
module, 222
- file groups, 184–185
- file screening
- changing notification limits, 189
- creating new file folder, 186
- creating new file screen, 186–187
- examining existing file screen templates, 184–186
- management of, 183–190
- setting up active file screen, 187–188
- testing active file screen, 189
- testing of, 187
- viewing active file screen email, 189–190
- viewing notification limits, 188
- File Server Resource Manager (FSRM)
- building FSRM action, 179. See also FSRM action
- building FSRM quota, 180–181
- creating FSRM quote template, 178
- creating FSRM threshold, 180
- creating new file folder, 186
- creating new folder, 179
- creating scheduled FSRM report task, 370–371
- described, 365
- examining existing FSRM file groups, 184
- examining FSRM email, 181
- installation of, 175–176
- leveraging of to generate reports on spool folder, 240
- managing file screening, 183–190
- report types supported by, 365
- reporting in, 357
- sending test email, 176–177
- setting up SMTP settings for, 176
- testing 85% quota threshold, 181
- testing hard quota limit, 181–182
- using FSRM XML output, 369–370
- viewing available FSRM quota templates, 178
- viewing folder contents, 183
- viewing FSRM report output files, 368
- viewing FSRM reports, 367–368
- File System Freeze, 282
-
FileAndStorage‐Services
, 191
-
File‐Services
feature, 226
- filestore quotas
- building FSRM action, 179
- building FSRM quota, 180–181
- creating FSRM quote template, 178
- creating FSRM threshold, 180
- creating new folder, 179
- examining FSRM email, 181
- installing FS Resource Manager feature, 175–176
- management of, 175–183
- sending test email, 176–177
- setting up SMTP settings for FSRM, 176
- testing 85% quota threshold, 181
- testing hard quota limit, 181–182
- viewing available FSRM quota templates, 178
- viewing folder contents, 183
- filesystem reporting
- creating scheduled FSRM report task, 370–371
- creating scheduled report, 371
- creating storage report, 366
- removing reports and scheduled task, 374
- running report interactively, 372
- types of reports supported by FSRM, 365
- using FSRM XML output, 369–370
- viewing FSRM report output files, 368
- viewing FSRM reports, 367–368
- viewing Large Files Report, 368–369
- viewing report, 372–373
- viewing report scheduled task, 371–372
-
_FilterToConsumerBinding
, 352, 353
- Flexible Single Master Operation (FSMO), 60, 64, 65, 74
- folder enumeration mode, 201
- folders
-
C:\
Foo folder, 7, 14, 15, 20
- creating module working folder, 26
- installation folder, 9–10
- repository folder, 25–26
- role capabilities folder, 101
- spool folder, 240–245
- transcript folder, 101, 107–108
-
Foo
folder, 7, 14, 15, 20
-
‐Force
parameter, 11
-
Foreach‐Object
cmdlet, 2
-
Foreach‐Object‐Parallel
, 52, 100
- forest (in AD), defined, 57
- forest root domain
- creating forest root domain controller, 62
- defined, 57
- establishment of, 60–66
- getting details of, 65
- importing Server Manager module, 60
- installing AD Domain Services feature, 61
- loading AD DS Deployment module explicitly, 61–62
- viewing details of new AD DS forest, 64–65
- viewing Directory Server Entry (DSE), 63–64
- viewing DNS settings, 65–66
- forest root domain controller, 60, 62–63
-
Foxit Reader PDF Printer
, 233
-
FS1.Reskit.Org
- adding clustering features to, 221–222
- adding file server features to, 194–195
- creating volume on, 216–217
- restarting of, 222
- setting up, 200
- using iSCSI drive on, 217–218
- viewing shares from, 228–229
-
FS2.Reskit.Org
- adding clustering features to, 221
- adding file server role to, 221
- configuring iSCSI portal for, 219–220
- restarting of, 222
- setting up iSCSI portal for, 219
- FS‐BranchCache, 192
- FS‐Data‐Deduplication, 192
- FS‐DFS‐Namespace, 192
- FS‐DFS‐Replication, 192
- FS‐FileServer, 192
- FS‐iSCSITarget‐Server, 192
- FSMO (Flexible Single Master Operation). See Flexible Single Master Operation (FSMO)
- FS‐NFS‐Service, 192
- FS‐Resource‐Manager, 192
- FSRM (File Server Resource Manager). See File Server Resource Manager (FSRM)
- FSRM action, 179, 180, 188
- FSRM threshold, 180
- FS‐SyncShareService, 192
- FS‐VSS‐Agent, 192
- G
- GC (Global Catalog), 64
-
Get |
Remove pattern, 90
-
Get‐ADDomain
, 65, 70
-
Get‐ADForest
, 64
-
Get‐ADGroupMember
, 93, 94
-
Get‐ADRootDSE
, 63
-
Get‐ADUser
, 90, 91, 92
-
Get‐AuthenticodeSignature
cmdlet, 35
-
Get‐ChildItem
, 29, 34, 47–48, 217, 284, 288, 289, 291, 389
-
Get‐CimClass
, 322, 324, 328, 329, 330, 335
-
Get‐CimInstance
, 246, 326, 331, 332, 334, 338, 374
-
Get‐Counter
, 374
-
Get‐DHCPServer4Scope
, 125
-
Get‐DhcpServerInDC
, 129
-
Get‐DhcpServerv4ScopeStatistics
, 132
-
Get‐Disk
, 148
-
Get‐DNSServer
, 136
-
Get‐DNSServerZone
, 140
-
Get‐Event
, 341
-
Get‐FsrmFileGroup
, 184
-
Get‐FsrmFileScreenTemplate
, 184
-
Get‐FsrmQuotaTemplate
, 178
-
Get‐FsrmSetting
, 188
-
Get‐HelloWorld
, 40, 41, 42, 45
-
Get‐HelloWorld2
, 46
-
Get‐HW
, 102, 106, 107, 108
-
Get‐IsciTargetServerSettings
, 210
-
Get‐Module
, 39
-
Get‐NetIPAddress
, 115
-
Get‐NetIPConfiguration
, 266, 268
-
Get‐NTFSAccess
, 157, 162, 204, 205
-
Get‐Partition
, 154
-
Get‐Printer
, 240, 246, 249
-
Get‐PrinterUsage
, 390
-
Get‐PSRepository
command, 28
-
Get‐PSSessionCapability
, 104
-
Get‐ReskitUser
, 360, 361
-
Get‐ScheduledTask
, 371
-
Get‐SmbServerConfiguration
, 195
-
Get‐SmbShare
, 200
-
Get‐SMBShare
, 336
-
Get‐SRPartnership
, 171
-
Get‐VM
, 296, 301, 303, 305, 307, 308, 310
-
Get‐VMCheckpoint
, 286, 290
-
Get‐VMHardDiskDrive
, 306, 307
-
Get‐VMNetworkAdapter
, 268
-
Get‐VMReplicationServer
, 295
-
Get‐VMScsi
, 277
-
Get‐VMSnapShot
, 286
-
Get‐Volume
, 151, 154
-
Get‐WindowsImage
, 259
-
Get‐WinEvent
, 340, 395, 397
-
Get‐WMINameSpaceEnum
, 323
-
Get‐WMIPE
, 353
-
GHW
alias, 27
- Global Catalog (GC), 64
-
Grant‐SmbShareAccess
, 202
- Group Policy, as AD feature, 58
- Group Policy: Fundamentals, Security, and the Managed Desktop (Moskowitz), 58
- Group Policy objects, 119
- GUID Partition Table (GPT), 145
- H
- Hardware Compatibility List (HCL), 218
- hash tables, 7, 19, 39, 41, 42, 62–63, 87, 88, 98, 100, 256, 303, 337, 391, 392, 393, 396
-
HelloJEA World
, 108
- help information
- viewing installation file help information, 8
- viewing starting PowerShell 7 help information, 12
- hot standby, 128, 131
-
HV1
- checking VMs on, 310
- configuration of for delegation, 293–294
- creating new VM in, 260
- getting VM details from, 298–299
- installation of Hyper‐V feature on, 255
- rebooting of, 255, 294
- starting failover from HV1 to HV2, 302
- stopping HVDirect on, 302
-
HV2
- checking VMs on, 310
- configuration of for delegation, 293–294
- getting VM details from, 299–300
- rebooting of, 294
- starting failover from HV1 to HV2, 302
- viewing VM status on after failover, 298
- viewing VMs on, 308
-
HVDirect
- checking Hyper‐V in, 281–282
- creating another file in, 287
- creating content in, 285
- creating credentials for, 313
- displaying details of HVDirect VM, 263
- examining C: in HVDirect VM, 283
- as running on
HV1
host, 265
- stopping of on HV1, 302
- turning off of, 272
- viewing checkpoint details for, 286
- viewing HVDirect VM, 305
- viewing IP address inside of, 268–269
- viewing SCSI disks inside of, 277
-
HW.psd1
, 28
- Hyper‐V. See also Hyper‐V Manager MMC; Hyper‐V Replica (HVR); Hyper‐V status report
- adding disk to VM, 276
- adding ISO image to VM, 261
- adding SCSI controller, 275
- adding VHD to VM, 261
- building configuration hash table, 256
- checking of in HVDirect, 281–282
- configuring VM hardware, 271–277
- configuring VM networking, 265–271
- connecting VM to switch, 267
- creating credential for VM, 266
- creating folders to hold VM disks and VM details, 255–256
- creating Hyper‐V VM, 257–262
- creating new virtual disk, 275–276
- creating new VM in HV1, 260
- creating variables, 257–258
- creating VHDX file for VM, 260
- creating virtual switch, 267
- enabling MAC spoofing, 268
- getting host name of HVDirect VM, 271
- getting NIC details, 266–267
- getting virtual NIC details from HVDirect, 265
- implementing nested virtualization, 277–282
- installation and configuration of, 254–257
- installation of in HVDirect VM, 280
- installation of on HV1, 255
- installing Windows Server 2019, 261–262
- joining Reskit domain, 269–270
- management of, 251–314
- Microsoft's introduction of and support for, 251
- mounting ISO image, 259
- rebooting HV1, 255
- rebooting VM, 270–271
- restarting VM, 275
- reviewing key VM host settings, 256–257
- setting hardware startup order, 273
- setting socket count, 273–274
- setting VM memory, 274
- starting VM, 261
- turning off HVDirect VM, 272
- using PowerShell Direct, 262–264
- using VM checkpoints, 282–291
- using VM replication, 291–305
- verifying that ISO image exists, 258
- viewing IP address inside HVDirect, 268–269
- viewing ISO image contents, 259–260
- viewing results of installing Windows Server 2019, 262
- viewing SCSI disks inside HVDirect, 277
- viewing VM network information, 268
- VM movement, 305–311
- VM replication, 291–305
- VM resource usage, 311–314
- Hyper‐V Manager MMC, 261
- Hyper‐V Replica (HVR), 291–305
- Hyper‐V status report
- adding current CPU usage, 392
- adding host details to report, 391
- adding memory assigned to VMs, 393
- adding PowerShell and OS version, 391–392
- adding processor count, 392
- adding report object to the report, 393
- adding total Hyper‐V host physical memory, 393
- completing report, 394
- creating array for VM details, 394
- creating basic report object hash table, 391
- creating host report object, 393
- creating report header, 393
- creation of, 390–395
- getting VM details, 394
- viewing report, 395
- I
- ICMP (Internet Control Message Protocol) Echo Reply, 117, 118
- ICMP (Internet Control Message Protocol) Echo Request, 117, 118, 120
-
Implemented
qualifier, 335
- implicit remoting, 48
-
Import‐Module
cmdlet, 6, 40, 48, 49, 50, 167, 258
-
Import‐PSSession
, 48
-
Initialize‐Disk
, 149
-
Install‐ADDSDomain
, 73
- installation folder, examination of, 9–10
- installation script, 7–8, 9, 15
-
Install‐Module
, 6, 24
-
Install‐PowerShell
script, 9
-
Install‐VSCode
script, 15
-
Install‐VSCode.ps1
file, 16
-
Install‐WindowsFeature
, 68, 121, 134, 167, 234
- instance method, 334
- Internet Control Message Protocol (ICMP) Echo Reply, 117, 118
- Internet Control Message Protocol (ICMP) Echo Request, 117, 118, 120
- intrinsic events, 339
-
Invoke‐CimMethod
, 336, 338
-
Invoke‐Command
, 225, 263, 264, 266, 283
- IP addressing
- automatic private IP addressing (APIPA), 114
- checking adapter details, 114–115
- configuration of, 115
- overview, 113
- setting DNS server details, 116
- validating new IP configuration, 116
- verifying new IP address, 115
- iSCSI
- adding iSCSI disk to cluster, 225–226
- configuring iSCSI service on SRV2, 213
- connecting to the target on SRV2, 215
- creating folder on SRV2, 210–211
- creating iSCSI disk target mapping on SRV2, 213
- creating iSCSI target on SRV2, 212–213
- creating volume on FS1, 216–217
- creation and use of iSCSI target, 207–218
- described, 207
- ensuring iSCSI disks are connected, 225
- exploring iSCSI target server settings, 210
- installing iSCSI target feature on SRV2, 209–210
- setting disk online and making it read/write, 216
- setting up iSCSI portal, 213–214
- setting up iSCSI portal for FS2, 219
- using iSCSI drive on FS1, 217–218
- viewing iSCSI virtual disk, 216
- viewing SalesTarget iSCSI disk, 214
- iSCSI initiator, 207
- ISE (Windows PowerShell Integrated Scripting Environment), 1
- ISO image
- adding of to VM, 261
- mounting of, 259
- verifying existence of, 258
- viewing ISO image contents, 259–260
- J
- JerryG, 93, 101, 105
- JSON file/document, 18, 19
- Just Enough Administration (JEA)
- checking what the user can do, 104–105
- configuration of, 100–109
- creating credentials for JerryG, 105
- creating JEA session configuration file, 102–103
- creating role capabilities file, 101–102
- creating role capabilities folder, 101
- creating three script blocks to test, 105–106
- creating transcript folder, 101
- enabling remoting and creating JEA session endpoint, 103–104
- examining JEA transcript, 108–109
- get DNSServer command available in JEA session, 107
- how many commands exist in a JEA session? 106–107
- invoking JEA‐defined function, 107
- testing session configuration file, 103
- viewing transcripts folder, 107–108
- K
-
KAPDC1
, 59, 75–86
- Kapoho.Com, 3, 59, 76, 77, 78–79, 80, 82, 83–84, 85
- Kerberos, 295
- L
- language operators, three new sets of, 2
-
LanmanServer
, 194
-
LastLogonDate
, 362
-
Layout.XML
file
- building of, 20
- importing of, 20–21
- LDAP ports, checking connectivity to, 119
- Line Printer Daemon (LPD) service, 231
- Line Printer Remote (LPR) service, 231
- load balancing, 130–131
- Local Machine Trusted Publisher store, 34
- Local Machine Trusted Root store, 34
- Log File consumer, as permanent event handler, 347
- M
- MAC spoofing, enabling of, 268, 278–279
- Mail Exchange (MX), 138
- managed entity, as component of WMI architecture, 318
- manifest file, 39
- manifest modules, described, 39
- Markdown, 14
- Master Boot Record (MBR), 145
-
Measure‐VM
, 313, 314
-
Measure‐VMReplication
, 296, 297
- method
- defined, 319, 334
- dynamic method, 319
- instance method, 334
-
Invoke‐CimMethod
, 336, 338
- static method, 334, 335
- viewing class methods, 329–330
- viewing WMI class methods, 329–330
- WMI methods. See WMI methods
- Microsoft Evaluation Center, 257
- Microsoft Hyper‐V Server. See Hyper‐V
- Microsoft Virtual PC, 251
- Microsoft Virtual Server, 251
- module analysis cache, viewing of, 47
- module autoload, use of, 46–47
- module load deny list, use of, 50
- module manifest
- creation of, 27–28
- using PowerShell module manifests, 41
- module versioning, 43
- modules
- commands as contained within, 37
- creating module manifest, 27
- creating module with multiple versions, 43–44
- creating module working folder, 26
- creating simple module, 26
- creation of, 39–40
- defined, 38
- determining which ones support .NET Core, 23
- discovering PowerShell Gallery modules, 22–23
- downloading and installing NTFSSecurity module, 155
- examining PowerShell modules, 38–48
-
FailoverClusters
, 222
- finding commands in NTFSSecurity module, 155
- finding NTFS modules, 23–24
- finding of, 30
- importing AD DS deployment module, 77–78
- importing DISM module, 258
- importing PowerShell modules, 40–41
- importing Server Manager module, 60, 67, 71, 76
- installing NTFSSecurity module, 24
- loading AD DS Deployment module explicitly, 61–62
- loading and testing of, 27
- naming of, 42–43
- Print Management module, 236
- publishing of, 29
- understanding types of, 39
- using module load deny list, 50
- using module versions, 44–46
- viewing module folder locations, 10–11
- viewing new locations for module folders, 13
-
Monitor.ps1
, 351, 353, 354
- Moskowitz, Jeremy (author)
- Group Policy: Fundamentals, Security, and the Managed Desktop, 58
-
Move‐VM
, 309
-
Move‐VMStorage
, 307
- MSI file, 8
- MX (Mail Exchange), 138
-
MyModule 1
, 40, 41, 43
-
MyModule 2
, 45, 46
- N
-
_NAMESPACE
class, 320, 321, 323
-
_NAMESPACE
parameter, 330
- nested virtualization
- configuring virtual processor, 278
- creating credentials, 279
- defined, 277
- described, 252
- enabling MAC address spoofing, 278–279
- implementation of, 277–282
- installing Hyper‐V in HVDirect VM, 280
- restarting VM, 279, 280–281
- stopping HVDirect VM, 277–282
- .NET objects, 82–83, 249, 316, 319, 331, 335
- .NET Core, 23, 37, 48, 52, 53, 241, 382
- .NET Framework, 9, 34, 37, 52, 155, 199, 240, 316, 317, 382
- network connectivity
- checking connectivity to SMB and LDAP ports, 119
- checking of, 67–68
- examining path to remote server, 119–121
- testing connectivity to DC, 118
- testing of, 117–121
- testing of with DC1, 77
- verifying that SRV2 and loopback are working, 117–118
- Network File System (NFS) protocol, 192
- Network Interface Card (NIC)
- configuring VM with two NICs, 4
- getting NIC details, 266–267
- updating configuration of, 268
- networking
- configuring DHCP failover, 128–133
- configuring DHCP scopes, 124–127
- configuring DNS service, 133138
- configuring DNS zones and resource records, 138–144
- configuring VM networking, 265–271
- installing DHCP service, 121–124
- IP addressing, 113–116
- management of, 111–144
- testing of network connectivity, 117–121
- new version notification, 3
-
New‐ADGroup
, 92
-
New‐ADuser
, 98
-
New‐CimInstance
, 352
-
New‐Cluster
, 224
-
New‐FSRMQuota
, 180
-
New‐FsrmScheduledTask
, 370
-
New‐FSRMStorageReport
, 366, 371
-
New‐IscisTargetPortal
, 213
-
New‐IscsiServerTarget
, 212
-
New‐IscsiVirtualDisk
, 211–212
-
New‐Item
, 7, 242, 255
-
New‐ModuleManifest
, 39
-
New‐NetIPAddress
, 116
-
New‐Object
, 241, 266, 279, 283, 375
-
New‐Partition
, 147, 150, 151, 152
-
NewProcessEvent
, 341
-
New‐SelfSignedCertificate
, 30–31
-
New‐SMBShare
, 26
-
New‐SRPartnership
, 170
-
New‐VHD
, 260, 275
-
New‐VM
, 260
-
New‐VMSwitch
, 267
-
New‐Volume
, 147, 150, 152
- NFS (Network File System) protocol, 192
- NIC (Network Interface Card)
- configuring VM with two NICs, 4
- getting NIC details, 266–267
- updating configuration of, 268
- Non‐Volatile Memory Express (NVMe), 145
- notification limits
- changing of, 189
- viewing of, 188
- NT Event Log consumer, as permanent event handler, 347
- NTFS inheritance, removing of, 205–206
- NTFS modules, finding, 23–24
- NTFS permissions
- adding full control for domain admins, 160
- adding Sales group access to folder, 161
- creating new folder and file, 157
- creating Sales group, 159
- displaying Sales group, 159–160
- downloading and installing NTFSSecurity module, 155
- finding commands in NTFSSecurity module, 156–157
- management of, 154–163
- removing default file ACE, 160
- removing folder's inherited rights, 161
- reviewing of, 204–205
- setting NTFS ACL to match share, 205
- viewing default ACL on file, 158
- viewing default folder ACL, 157–158
- viewing permissions on file, 162–163
- viewing permissions on folder, 162
- NTFSSecurity module
- downloading and installation of, 155
- finding commands in, 156–157
- installation of, 24
- use of to manage NTFS file and folder security, 6
- viewing available commands in, 24
- NuGet
- installing latest version of, 6–7
- requirements of, 27
- Null coalescing operators, 2
- NVMe (Non‐Volatile Memory Express), 145
- O
-
OneNote
printer, 233
- options, defined, 126
-
Out‐File
, 182
-
Out‐Printer
, 389
- P
-
‐Parallel
switch, 2
-
perfmon.exe
, 378
- performance, enhancements in, 2
- Performance Logs and Alerts (PLA). See PLA (Performance Logs and Alerts)
- performance monitoring graph
- adding performance data to chart, 384
- creating chart object, 383
- creation of, 382–385
- defining chart area, 383
- defining chart dimensions, 383
- identifying date/time column, 383
- importing performance data, 382
- loading forms assembly, 382
- saving chart image, 384
- viewing chart image, 384–385
- permanent event handling, 347, 348
- permissions
- AGDLP (account, global, domain, local permissions) approach, 85
- defining required permissions for printing, 242
- NTFS permissions. See NTFS permissions
- setting of, 85
- Pipeline chain operators, 2
- PLA (Performance Logs and Alerts)
- adding performance counters to collector set, 376
- collecting performance information using, 374–378
- combining CPU measurements, 381
- creating and starting data collector set, 376–377
- creating data collector, 375
- creating performance monitoring graph, 382–385
- creating schedule, 376
- creating second data collector set, 377–378
- creating Systems Diagnostic Report, 385–387
- defining counters, 375–376
- determining 95th percentile, 380–381
- displaying CPU statistics, 381–382
- fixing data collection problem, 380
- importing performance counter data, 379
- importing performance counters, 379
- obtaining CPU statistics, 380
- reporting on PLA performance data, 379–382
- viewing collector sets, 378–379
- PowerShell 7
- compatibility issue work‐arounds, 54
- compatibility layer/solution of, 37, 48–50
- compatibility with Windows PowerShell, 37, 48–50
- console, 6, 9, 12, 14, 17, 19–20
- creating shortcut for PowerShell 7 console, 19–20
- downloading PowerShell 7 installation script, 7–8
- installation folder, 9–10
- installation of, actual installation, 8–9
- installation of, preparation for, 5–8
- modules. See modules
- as .NET application, 37
- new features of, 2–3
- operating systems that support, 5
- starting, 12
- things that do not work with, 51–54
- PowerShell and WMI (Siddaway), 316
- PowerShell Core, 48
- PowerShell Direct (PS Direct)
- creating variables for use with, 262–263
- displaying details of HVDirect VM, 263
- invoking command based on VM ID, 264
- invoking command using WMName, 263–264
- use of, 262–264
- PowerShell Gallery
- described, 1, 21–22
- discovering PowerShell Gallery modules, 22–23
- use of, 6, 21–24
- PowerShell ISE, described, 14
- PowerShellGet, installing latest version of, 6–7
- PowerShellGet module, 1, 22
- PowerShellGet repository, creation of, 24–30
- print device, use of term, 231
- Print Management module, 236
- Print Manager GUI, 236
- Print Server feature, installation of on PSRV, 234–235
- Print Services feature, components of, 231
- print spooler, 231, 240–245
- printer, use of term, 231
- printer pool
- creation of, 248–249
- defined, 248
- printer usage
- creating print output, 389
- defining
Get‐PrinterUsage
, 388–389
- reporting on AD users and computers, 387–390
- turning on print job logging, 388
- viewing of, 390
- viewing PDF output files, 389–390
- printing
- adding new printer, 237
- adding new printer port, 236–237
- adding printer port, 248
- changing spool folder, 240–245
- changing spool folder path, 242
- checking initial publication status, 239
- committing change in spool folder path, 243
- configuring new spool folder, 244
- creating another spool folder, 244
- creating folder for print drivers, 235
- creating new spool folder, 242
- creating print server objects, 242
- creating printer pool, 248–249
- creating printer pool for
SalesPrinter1
, 248–249
- defining required permissions, 242
- displaying initial spool folder, 241
- displaying number of printers defined, 246
- displaying printer's details, 247
- downloading printer drivers, 235
- expanding ZIP file, 235
- getting printer object, 239
- getting printer objects from WMI, 246
- getting Sales group printer WMI object, 246
- installing and sharing printers, 233–238
- installing drivers, 236
- loading
System.Printing
namespace, 241
- management of, 231–249
- publishing printer in AD, 238–240
- publishing printer to AD, 239
- restarting spooler service, 243, 244
- reviewing printer configuration, 237–238
- reviewing spooler folder, 243
- sharing printer, 237
- stopping spooler service, 244
- of test page, 245–247
- viewing printer publication status, 240
- viewing resulting details, 249
- viewing results of updated spool directory, 245
-
PrintTestPage
, 245, 247
-
printui.dll
, 236, 248, 249
- production checkpoint, defined, 282
- profile files
- creating sample personal profile file, 17
- viewing profile file locations, 11–12
- profiles, viewing new locations for, 13
- property, defined, 319
- protocol transport, as component of WMI architecture, 317–318
- provider, as component of WMI architecture, 318
- PS Direct (PowerShell Direct). See PowerShell Direct (PS Direct)
-
.PSD1
file, 27–28, 39, 41, 42
- .
PSM1
file, 26, 27, 39, 40, 42, 45
-
PSModulePath
variable, 46, 47
-
PSRV.Reskit.Org
, 232, 234, 236, 237, 238, 239, 241, 243, 245, 248, 359, 390
- public repositories, use of, 24
-
Publish‐Module
command, 29
-
pwsh.exe
, 9, 348
- R
- RAID (Redundant Array of Independent Disks), 206, 207, 208, 212, 228–229
-
Receive‐Job
, 339
- ReFS filesystem, 145–146
-
Register‐CimEvent
, 339
-
Register‐CimIndicationEvent
, 339, 340, 345
-
Register‐DnsClient
, 140
-
Register‐PSRespository
command, 28
-
Register‐PSSessionConfiguration
, 104
- remoting
- enabling of, 103–104
- implicit remoting, 48
-
Remove‐ADUser
, 91
-
Remove‐NTFSAccess
, 160
-
Remove‐WMIPE
, 354
- Renouf, Alan, 323
- replica DC (Domain Controller)
- adding AD DS features on DC2, 68
- checking network connectivity, 67–68
- importing Server Manager module, 67
- installation of, 66–70
- promoting DC2, 69
- rebooting DC2, 69
- reviewing DCs in Reskit.Org domain, 69–70
- viewing Reskit.Org domain, 70
- replica failover, testing of, 297
- replication. See VM replication
- reporting
- on AD users and computers, 359–365
- adding privileged users to report, 363–364
- building report header, 361
- collecting performance information using PLA, 374–378
- creating performance monitoring graph, 382–385
- creating Systems Diagnostic Report, 385–387
- defining a function to retrieve user accounts, 360–361
- described, 357
- determining privileged users, 362–363
- on disabled users, 361
- displaying report, 364–365
- getting
Reskit
users, 361
- Hyper‐V status report, 390–395
- on invalid password attempts, 362
- 365–374
- on PLA performance data, 379–382
- on printer usage, 387–390
- reviewing event logs, 395–397
- on unused accounts, 362
- repositories
- trusting of, 28
- use of public repositories, 24
- viewing configured repositories, 28–29
- repository folder
- creation of, 25–26
- sharing of, 26
- viewing of, 29
-
Reskit.Org
, 3, 58–59, 62, 64, 69–70, 83. See also
DC1.Reskit.Org
;
DC2.Reskit.Org
;
FS1.Reskit.Org
;
FS2.Reskit.Org
;
PSRV.Reskit.Org
;
SRV2.Reskit.Org
;
UK.Reskit.Org
-
Resolve‐DNSName
, 127
- resource metering, 311
- resource records (RRs), 65, 138–144
-
Restart‐Service
, 243
-
Restart‐VM
, 270
-
Restore‐VMCheckpoint
, 287, 289
-
Revoke‐SmbShareAccess
, 202
-
RKDNSAdmins
group, 92, 93, 101, 102, 104, 105
-
RKRepo
repository, 29
- role capabilities file, creation of, 101–102
- role capabilities folder, creation of, 101
- Root Directory Services Entry (Root DSE), viewing of, 63–64
-
root\
CIMV2 namespace, 322, 324, 329
-
root\
directory
\
LDAP namespace, 324
-
ROOT/root
, 320, 321
- round robin, 135
- RRs (resource records), 65, 138–144
- RSAT‐AD tools, 155, 160
-
rundll32.exe
, 236, 248–249
- S
- Sales group
- adding Sales group access to folder, 161
- creation of, 159
- displaying of, 159–160
- granting access of share to, 203–204
-
SalesPrinter1
, 239, 240, 246, 248–249
- Samba project, 194
- SAN (storage area network), 207, 228–229
- scale‐out file server (SOFS)
- adding clustering features to FS1/FS2, 221–222
- adding continuously available share, 227
- adding file server role to FS2, 221
- adding iSCSI disk to cluster, 225–226
- adding SOFS role to cluster, 226
- configuring iSCSI portal for FS2, 219–220
- configuring quorum share on DC1, 224–225
- creating cluster, 224
- creating folder, 227
- ensuring iSCSI disks are connected, 225
- moving iSCSI disk into CSV, 226
- restarting FS1 and FS2, 222
- setting cluster witness, 225
- setting up clustered scale‐out file server, 218–229
- setting up iSCSI portal for FS2, 219
- testing cluster nodes, 222
- viewing cluster validation test results, 222–224
- viewing shares from FS1, 228
- Schema Admins group, 363
- script modules, described, 39
- script signing, requirements for, 30
- scripts
- attempt to run one, 32
- creating script for event handler to run:
Monitor.ps1
, 351
- execution policy for running of, 6
- installation script, 7–8, 9, 15
-
Install‐PowerShell
script, 9
-
Install‐VSCode
script, 15
- running of signed script, 34–35
- server VM build scripts, 4
- signing of, 33
- signing of again, 34
- testing digital signature of, 35
- SCSI (Small Computer Systems Interface), 207
-
Secure.Txt
, 160
-
Select‐Object
, 137, 329
- self‐signed certificate, creation of, 31
- Sender Protected Framework (SPF), 138
-
Send‐FsrmTestEmail
, 176
- Server Manager module, importing of, 60, 67, 71, 76
- Server Message Block (SMB) protocol, 191, 194
- server VM build scripts, 4
- session configuration file
- creation of, 102–103
- testing of, 103
-
Set‐ACL
, 155
-
Set‐ADComputer
, 293
-
Set‐ADUser
, 91
-
Set‐AuthenticodeSignature
, 30, 33
-
Set‐Disk
, 216, 220
-
Set‐FSRMSetting
, 189
-
Set‐ItemProperty
, 244, 343
-
Set‐Location
, 3
-
Set‐Printer
, 239
-
Set‐SmbShare
, 201
-
Set‐VMBios
, 273
-
Set‐VMDvdDrive
, 261
-
Set‐VMHost
, 256, 308
-
Set‐VMMemory
, 274
-
Set‐VMNetworkAdapter
, 278
-
Set‐VMNetworkadapterFailoverConfiguration
, 301
-
Set‐VMPProcessor
, 273, 278
-
Set‐VMReplicationServer
, 294
- shared data
- creating and securing SMB shares, 198–206
- creating and using iSCSI target, 207–218
- management of, 191–229
- setting up and securing SMB file server, 194–198
- setting up clustered scale‐out file server, 218–229
-
Shell.Application
COM object, 18
- Siddaway, Richard (author)
- signing certificate, 30
- Simple Object Access Protocol (SOAP), 53
-
‐SkipEditionCheck
parameter, 50
- Small Computer Systems Interface (SCSI), 207
- SMB (Server Message Block) protocol, 191, 194
- SMB cmdlets, 319
- SMB file server
- adding file server features to FS1, 194–195
- disabling default shares, 197
- enabling SMB signing and SMB encryption, 197
- ensuring that SMB1 is disabled, 195–197
- getting settings for, 195
- restarting SMB server service, 198
- reviewing updated SMB server configuration, 198
- setting up and securing of, 194–198
- turning off server announcements, 198
- SMB ports, checking connectivity to, 119
- SMB shares
- adding full system access, 203
- adding Reskit/domain admins to, 202–203
- creating and securing of, 198–206
- creation of, 200–201, 336–337
- discovering existing ones, 200
- giving the creator/owner full access, 203
- granting Sales group access, 203–204
- removing all access to Sales1 share, 202
- removing NTFS inheritance, 205–206
- removing of, 338–339
- requiring encryption for, 201–202
- reviewing of NTFS permissions, 204–205
- reviewing share access, 204
- setting folder enumeration mode, 201
- setting NTFS ACL to match, 205
- setting share description, 201
- setting up FS1, 200
- use of SMB cmdlets to manage, 319
- viewing folder ACL, 206
- viewing of using
Get‐CimInstance
, 338
- viewing of using
Get‐SMBShare
, 337
- SMTP, setting up SMTP settings for FSRM, 176
- SMTP Event consumer, as permanent event handler, 347
- snap‐ins, 52
- snapshot, use of term, 286
- SOAP (Simple Object Access Protocol), 53
- SOFS (scale‐out file server). See scale‐out file server (SOFS)
- SPF (Sender Protected Framework), 138
- Spiceworks, 96
- splatting, 7
- spool folder, changing of, 240–245
- SR (Storage Replica). See Storage Replica (SR)
-
SRV1.Reskit.Org
- getting information about physical disks on, 148–149
- getting partitions on, 153–154
- viewing volumes on, 151–152
-
SRV2.Reskit.Org
- configuring iSCSI service on, 213
- connecting to the target on, 215
- counting namespaces/classes on, 326–327
- creating folder on, 210–211
- creating iSCSI disk target mapping on, 213
- creating iSCSI target on, 212–213
- examining volumes of, 174
- installing iSCSI target feature on, 209–210
- testing DHCP service using, 127
- verifying that it is working, 117–118
- standard checkpoint, defined, 282
-
Start‐VM
, 275, 303, 312
-
Start‐VMFailOver
, 297, 302
-
Start‐VMInitialReplication
, 296
- static method, 334, 335
-
Static
qualifier, 335
-
Stop‐Service
, 244
-
Stop‐VM
, 277
-
Stop‐VMFailover
, 300
- storage
- creating storage report, 366–367
- disk management, 147–154
- management of, 145–190
- managing file screening, 183–190
- managing filestore quotas, 175–183
- managing NTFS permissions, 154–163
- managing storage replica, 163–174
- migrating VM storage, 307
- volume management, 147–154
- storage area network (SAN), 207, 228–229
- Storage Replica (SR)
- adding of to source, 166–167
- adding of to the target, 167
- checking content on the target, 166
- creating content on F:, 165
- creating Storage Replica partnership, 170–171
- examining SRV2 volumes, 174
- examining volumes on the target, 172–173
- management of, 163–174
- measuring new content, 165–166
- restarting the source, 167
- restarting the target, 168
- reversing the replication, 173
- testing configuration of, 168
- viewing partnership, 171–172
- viewing topology test report, 169–170
- viewing updated replication group status, 173
-
sysdm.cpl
applet, 46
- System Center Operations Manager, 347
- System Diagnostics Reports, 357
-
System.DirectoryServices.Active Directory
, 83
-
System.Printing
namespace, loading of, 241
-
System.Printing.PrintServer
, 240, 244
- Systems Diagnostic Report
- creation of, 385–387
- saving report as HTML, 386
- starting built‐in data collector, 385–386
- viewing of, 386–387
- waiting for data collector to finish, 386
- T
- taskbar, updating of, 21
- temporary event handling, 347
- Ternary language operator, 2
-
Test‐Cluster
, 222, 224
-
Test‐Connection
, 117, 118
-
Test‐NetConnection
, 117, 119, 121
-
Test‐Path
, 258
-
Test‐PSSessionConfiguration
, 103
-
Test‐SRTopology
, 168, 169, 170
-
Tiger
, 270, 271, 300, 304
- Time Sharing System OS (TSS), 251
- transcript folder
- creation of, 101
- viewing of, 107–108
- tree (in AD), defined, 57
- Trusted Hosts list, 81
- Trusted Publisher certificate store, 33
- Trusted Root certificate store, 33
- U
-
UK.Reskit.Org
, 70–75
-
Unregister‐Event
, 342, 344
- user settings, updating VS Code user settings, 18–19
- users
- adding privileged users to report, 363–364
- defining a function to retrieve user accounts, 360–361
- determining privileged users, 362–363
- getting
Reskit
users, 361
- reporting on AD users and computers, 359–365
- reporting on disabled users, 361
- V
-
‐Verbose
, 27, 28, 45, 131
- VHDX file, creating new one for VM, 260
- virtualization
- Visual Studio Code (VS Code). See VS Code (Virtual Studio Code)
- VM checkpoints
- checking VM data files after removing checkpoints, 291
- creating another file in HVDirect, 287
- creating content in HVDirect, 285
- creating credentials, 283
- creation of, 284
- examining C: in HVDirect VM, 283
- examining checkpoint files, 284–285
- examining files supporting checkpoints, 286–287
- removing checkpoints, 291
- reverting to
Checkpoint1
, 287–288
- rolling forward to
Checkpoint2
, 289
- taking second checkpoint, 286
- use of, 282–291
- viewing checkpoint details for HVDirect, 286
- viewing checkpoints in VM, 290–291
- viewing VM files, 287–288
- viewing VM files after rolling forward, 289–290
- VM internet access, 4
- VM movement
- checking VMs on HV1, 310
- checking VMs on HV2, 310
- configuring VM migration, 308
- displaying migration time, 309–310
- enabling VM migration, 308
- examining virtual disk details, 310–311
- getting VM configuration location, 306
- getting VM hard drive locations, 306–307
- management of, 305–311
- migrating VM between hosts, 309
- migrating VM storage, 307
- viewing configuration details, 307–308
- viewing HVDirect VM, 305
- viewing VMs on HV2, 308
- VM replication
- checking VM status after failover, 303–304
- completing failover of HVDirect, 303
- configuring HV1 and HV2 for delegation, 293–294
- enabling replication from the source VM, 294–295
- examining initial replication state, 296–297
- getting VM details from HV1, 298–299
- getting VM details from HV2, 299–300
- initiating replication, 296
- rebooting HV1 and HV2, 294
- setting failover IP address for VM failover, 301–302
- setting
VMReplication
, 294
- starting failover from HV1 to HV2, 302
- starting failover VM, 303
- stopping HVDirect on HV1, 302
- stopping of failover test, 300
- testing failover VM networking, 304
- testing replica failover, 297
- use of, 291–305
- viewing replication, 297
- viewing VM replication status, 295
- viewing VM status, 296, 301
- viewing VM status on HV2 after failover, 298
- VM resource usage
- creating credentials for HVDirect, 313
- enabling VM resource monitoring, 312
- getting initial resource measurements, 313
- getting VM details, 312
- measurement of, 311–314
- measurement of again, 314
- performing compute work, 313–314
- starting HVDirect VM, 312
- VMs (virtual machines). See Hyper‐V; VM checkpoints; VM internet access; VM movement; VM replication; VM resource usage
- Volume Shadow Copy Service, 282, 286
- volumes
- creating an F: volume in disk 1, 150
- creating content on F:, 165
- creating G: volume, 151
- creation of on FS1, 216–217
- examining of on the target, 172–173
- examining SRV2 volumes, 174
- formatting G: and H:, 152–153
- getting of on SRV1, 154
- management of, 147–154
- viewing of on SRV1, 151–152
- VS Code (Virtual Studio Code)
- creating shortcut to, 19
- downloading VS Code installation script, 15
- installing and configuring of, 14–21
- installing VS Code and extensions, 16–17
- as recommended alternative to ISE, 14
- updating VS Code user settings, 18–19
- use of, 1
- W
- Web‐Based Enterprise Management (WBEM), 315
-
wevtutil
, 388
-
Where‐Object
, 246
-
WIN32_Printer
class, 245
-
Win32_Process
class, 339, 340
-
Win32_Share
class, 318, 319, 328, 329, 330, 331, 334, 335, 336, 337, 338
- Windows Management Instrumentation (WMI)
- as based on COM, 316
- counting namespaces/classes on DC2, 327–328
- counting namespaces/classes on SRV2, 326–327
- counting WMI classes, 324–325
- discovering all namespaces in, 323
- enumerating classes in
root\
CIMV2, 321–322
- exploring WMI classes, 328–330
- exploring WMI namespaces, 320–328
- getting local and remote objects, 330–334
- implementing permanent WMI event handling, 347–355
- invoking WMI methods, 334–339
- managing WMI events, 339–346
- obtaining WMI data, 318–319
- printing test page with, 245–247
- reviewing WMI architecture in Windows, 317–318
- use of with CIM cmdlets, 315–355
- viewing classes in root namespace, 320–321
- viewing namespaces below
root
, 321
- viewing namespaces on remote server, 325–326
- viewing some WMI namespaces, 324
- WMI class, 318
- WMI namespace, 318
- Windows PowerShell Integrated Scripting Environment (ISE), 1
- Windows Remote Management (WinRM), 81, 315, 320
- Windows Server 2019
- configuration of to support Hyper‐V, 255
- creating file server using, 194
-
DC1
as host of, 25, 31, 396
- installation of, 261–262
- iSCSI initiator service as installed in, 213
- Print Services feature, 231
- SMB1 as disabled on, 196
- as supporting Storage Replica (SR), 163
- WMI performance classes in, 374
- Windows Server 2019 Enterprise edition, 292
- Windows Workflow Framework, 52
-
WinPSCompatSession
, 48
- WMI (Windows Management Instrumentation). See Windows Management Instrumentation (WMI)
- WMI class
- defined, 318
- exploration of, 328–330
- getting of, 341
- viewing class details in specified namespace, 330
- viewing class methods, 329–330
- viewing class properties, 329
-
Win32_Share
class, 319, 328
- WMI event handling
- binding event filter and event consumer, 352–353
- creating event consumer, 351–352
- creating event filter, 350–351
- creating event query, 350
- creating script for event handler to run:
Monitor.ps1
, 351
- defining helper functions, 349–350
- displaying event filter details, 353
- event consumer, 348
- event filer, 348
- implementing permanent WMI event handling, 347–355
- removing event filter details from WMI, 354–355
- specifying valid users, 349
- testing event filtering, 353
- viewing results, 354
- WMI events
- adding to Enterprise Admins group, 345–346
- creating extrinsic event registration, 342–343
- creating temporary WMI event subscription, 345
- defined, 319
- defining WQL event query, 344
- displaying event details, 341
- examining result details, 344
- management of, 339–346
- modifying registry, 343
- registering for, 340
- removing WMI event subscription, 346
- running Windows process, 340
- unregistering for, 341–342
- unregistering registry event, 344
- unregistering WMI event, 346
- viewing of, 346
- WMI filter, use of, 332–333
- WMI methods
- creating new share, 336–337
- invoking of, 334–339
- removing SMB share, 338–339
- reviewing properties of class, 335–336
- reviewing static methods of a class, 335
- viewing SMB share using
Get‐CimInstance
, 338
- viewing SMB share using
Get‐SMBShare
, 337
- WMI namespace
- described, 318
- exploration of, 320–328
- WMI query, 333–334
- WMI Query Language (WQL), 333
-
WmiMgmt.msc
management console, 321
- WQL query, defining WQL event query, 344
-
Write‐Host
statements, 339, 343, 353
-
‐WarningAction
, 62, 67, 134, 167
- X
- X.509 digital certificates, 30
- XML files, 9–10, 20
- Z
- ZIP file, 8, 235
- zone data loading, 136