Index


  • Symbols
    • $ADEvent, 346
    • $Event, 341
    • $ISOPath, 258
    • $NewUserHT, 87
    • $Printer, 247
    • $Profile, 11
    • $PSHome, 9
    • $PSISE, 11
    • $PSVersionTable, 12
    • $RegEvent, 344
    • $SB2, 107
    • $Users, 97, 98
  • A
    • access control entries (ACEs), 154–155, 160, 206
    • access control lists (ACLs), 76, 84–85, 86, 154, 155, 157–158, 162, 198, 199, 206
    • account, global, domain, local permissions (AGDLP) approach, 85
    • Active Directory (AD)
      • adding users to via CSV, 96–100
      • aspects of not covered in this book, 58
      • best practices in, 57–58
      • configuring cross‐forest trust, 75–86
      • configuring Just Enough Administration (JEA), 100–109
      • described, 56–57
      • establishment of forest root domain, 60–66
      • installing child domain, 70–75
      • installing replica DC, 66–70
      • management of, 55–109
      • managing AD users, computers, and OUs, 86–96
      • naming practices in, 57
      • objects likely to use in, 86–96
      • publishing printer in, 238–240
      • using latest version of module for, 54
    • Active Directory Administrative Center (ADAC), 94
    • Active Directory Certificate Services (AD CS), 56
    • Active Directory: Designing, Deploying, and Running Active Directory (Desmond), 58
    • Active Directory Domain Service (AD DS), 56
    • Active Directory Federation Services (AD FS), 56
    • Active Directory Lightweight Directory Services (AD LDS), 56
    • Active Directory Rights Management Services (AD RMS), 56
    • Active Directory Users and Computers MMC console, 94
    • Active Script consumer, as permanent event handler, 347
    • AD (Active Directory). See Active Directory (AD)
    • AD computer object
      • adding computer to AD, 95
      • displaying computers in AD domain, 95–96
      • as one of four sets of AD objects likely to use, 86
    • AD CS (Active Directory Certificate Services), 56
    • AD Domain Service feature, installation of, 61, 76–77
    • AD DS (Active Directory Domain Service), 56
    • AD FS (Active Directory Federation Services), 56
    • AD group object
      • creating and viewing group membership, 93
      • creation of, 92–93
      • displaying group membership, 94
      • make all users in IT members of IT team group, 94
      • make new group to IT team, 93
      • as one of four sets of AD objects likely to use, 86
    • AD LDS (Active Directory Lightweight Directory Services), 56
    • AD organizational unit (OU) object
      • creating user in, 89
      • creation of for IT, 88
      • defined, 88
      • moving users into, 88
      • as one of four sets of AD objects likely to use, 86
    • AD RMS (Active Directory Rights Management Services), 56
    • AD RSAT tools, 155, 160, 255
    • AD user object
      • adding two additional users, 89
      • creating hash table for general user attributes, 87
      • creating OU for IT, 88
      • creating two users, 87–88
      • creating user in OU, 89
      • moving users into OU, 88–89
      • as one of four sets of AD objects likely to use, 86
      • removing user directly, 91
      • removing user with Get | Remove pattern, 90
      • updating and displaying of, 91–92
      • viewing existing users, 90
    • AD WMI provider, 348
    • ADAC (Active Directory Administrative Center), 94
    • Add‐ADGroupMember, 93, 345
    • Add‐ClusterSharedVolume, 226
    • Add‐Computer, 269
    • ADD‐DHCPSecurityGroup, 122
    • Add‐DhcpServerV4Failover, 130, 131
    • Add‐DnsServerPrimaryZone, 139
    • Add‐DnsServerResourceRecord, 142
    • Add‐NTFSAccess, 160, 161
    • AD‐Domain‐Services, 61
    • Add‐Printer, 237
    • ADDSDeployment module, 61–62
    • Add‐VMHardDiskDrive, 261, 276
    • Add‐VMScsiController, 275
    • administrative shares, defined, 197
    • AGDLP (account, global, domain, local permissions) approach, 85
    • Audio and Video Files, 183
    • automatic new version notification, 3
    • automatic private IP addressing (APIPA), 114
  • B
    • Background Intelligent Transfer Service (BITS), 235
    • binary modules, described, 39
  • C
    • CA certificate, 30
    • cache
      • FS‐BranchCache, 192
      • module analysis cache, 47–48
    • Cascadia Code (font)
      • downloading of, 17–18
      • installation of, 18
      • as new Microsoft font, 15
    • cdmlet definition over XML feature, 246
    • certificate authority (CA), 30
    • certificates
      • CA certificate, 30
      • copying of to Trusted Publisher and Trusted Root stores, 33–34
      • creation of self‐signed certificates, 31
      • signing certificate, 30
      • viewing of, 31–32
      • X.509 digital certificates, 30
    • C:\Foo folder, 7, 14, 15, 20
    • Checkpoint1, reverting to, 287–288
    • Checkpoint2, rolling forward to, 289
    • checkpoints
      • Checkpoint1, 287–288
      • Checkpoint2, 289
      • production checkpoint, 282
      • standard checkpoint, 282
      • use of term, 286
      • use of VM checkpoints, 282–291
    • Checkpoint‐VM, 284, 286
    • child domain
      • adding AD DS features to UKDC1, 72–73
      • creation of, 73
      • importing Server Manager module, 71
      • installation of, 70–75
      • verifying that DC1 can be resolved, 71–72
      • viewing of, 74–75
      • viewing updated AD forest, 73–74
    • C:\HW, 26
    • CIM (Common Information Model), 315
    • CIM cmdlets
      • as component of WMI architecture, 317
      • use of, 319–320
    • CIM Database (CIMDB), as component of WMI architecture, 318
    • CIM Object Manager (CIMOM), as component of WMI architecture, 318
    • CimClassMethods, 335
    • ‐CimSession, 326
    • cluster shared volume (CSV), 226. See also CSV files
    • cluster test tool, 222
    • cmdlets
      • CIM cmdlets, 317, 319–320
      • Foreach‐Object cmdlet, 2
      • Get‐AuthenticodeSignature cmdlet, 35
      • Import‐Module cmdlet, 6, 40, 48, 49, 50, 167, 258
      • redevelopment of, 2
      • SMB cmdlets, 319
    • ‐CodeSigningCert parameter, 34
    • code‐signing environment, creation of, 30–35
    • Command Line consumer, as permanent event handler, 347, 348
    • CommandLineEventConsumer, 352
    • commands, as contained within modules, 37
    • Common Information Model (CIM), 315
    • compatibility issue work‐arounds, 54
    • compatibility layer/solution
      • described, 2
      • introduction to, 48–50
    • Complete‐VMFailover, 303
    • Component Object Model (COM), 315
    • _ComputerName property, 334
    • computers, reporting on AD users and computers, 359–365
    • conditional DNS forwarder, 79, 82
    • conditional DNS forwarding, 80–81, 82
    • Connect‐VMNetworkAdapter, 267
    • Constructor qualifier, 335
    • CreateTrustRelationship(), 84–85
    • cross‐forest trust
      • adjusting DNS to resolve Reskit.Org from KAPDC1, 79
      • configuration of, 75–86
      • connecting two independent forests with, 57–58
      • creating credentials to run a command on DC1, 81
      • creating script block to adjust ACL of a file on DC1, 84
      • defined, 76
      • establishment of, 84
      • getting domain detail objects, 82
      • importing AD DS deployment module, 77–78
      • importing Server Manager module, 76
      • installing AD Domain Services feature and management tools, 76–77
      • invoking script block on DC1, 81–82
      • promoting KAPDC1, 78
      • running script block on DC1 to demonstrate, 85–86
      • setting up conditional forwarder on Reskit.Org, 80–81
      • setting WinRM, 81
      • testing conditional DNS forwarding, 80
      • testing network connectivity with DC1, 77
      • viewing Kapoho forest details, 83–84
      • viewing Kapoho.com forest details, 78–79
      • viewing Reskit forest details, 83
    • CSV files. See also cluster shared volume (CSV)
      • adding users to, 98
      • adding users to AD via, 96–100
      • creation of, 97
      • importing and viewing of, 97–98
      • moving iSCSI disk into CSV, 226
      • viewing all users in Reskit.Org, 98–100
    • Current User Current Host profile, 11, 14
  • D
    • data collector
      • creation of, 375
      • starting built‐in data collector, 385–386
      • waiting for data collector to finish, 386
    • data collector set, 374, 376–378
    • DC (Domain Controller)
      • every domain in forest as having at least one, 58
      • installation of replica DC, 66–70
      • reviewing of in Reskit.Org domain, 69–70
      • testing connectivity to, 118
    • DC1.Reskit.Org
      • checking basic connectivity to, 118
      • checking DNS zones on, 140–141
      • configuring quorum share on, 224–225
      • creating credential to run command on, 81
      • creating script block to adjust ACL of a file on, 84
      • as first DHCP server, 130
      • invoking script block on, 81–82
      • registering DNS records for, 140
      • running script block on to demonstrate cross‐forest trust, 85–86
      • as Windows Server 2019 host, 4–5
    • DC2.Reskit.Org
      • counting namespaces/classes on, 327–328
      • installing DHCP server feature on, 128–129
      • installing DNS feature on, 134
      • letting DHCP know it is fully configured on, 129
      • as new DHCP server, 130
      • registering DNS records for, 140
    • DCOM (Distributed COM), 315, 319
    • default shares, disabling of, 197
    • Deployment Image Servicing and Management (DISM) module, importing of, 258
    • Desmond, Brian (author)
      • Active Directory: Designing, Deploying, and Running Active Directory, 58
    • DFS Namespace (DFSN), 192
    • DHCP (Dynamic Host Configuration Protocol). See Dynamic Host Configuration Protocol (DHCP)
    • DHCP failover
      • authorizing second DHCP server in AD, 129
      • configuration of, 128–133
      • configuration of and load balancing, 130–131
      • installing DHCP server feature on DC2, 128–129
      • letting DHCP know it is fully configured on DC2, 129
      • viewing active leases from both DHCP servers, 131–132
      • viewing authorized DHCP servers, 129–130
      • viewing DHCP server statistics, 132
    • DHCP scope
      • configuring scope‐specific options, 126
      • configuring server‐wide options, 126
      • creation of, 125
      • defined, 124
      • getting scopes from DHCP server, 125–126
      • testing DHCP service in operation, 127
    • Directory Server Entry (DSE), viewing of, 63–64
    • Disable‐NTFSAccessInheritance, 161
    • disks
      • adding iSCSI disk to cluster, 225–226
      • adding one to VM, 276
      • creating an F: volume in disk 1, 150
      • creating iSCSI virtual disk, 211–212
      • creating new virtual disk, 275–276
      • creating partition in disk 2, 150–151
      • creating second partition, 151
      • ensuring iSCSI disks are connected, 225
      • examining virtual disk details, 310–311
      • getting information about physical disks on SRV1, 148–149
      • getting partitions on SRV1, 153–154
      • initializing new disks, 149
      • management of, 147–154
      • moving iSCSI disk into CSV, 226
      • setting disk online and making it read/write, 216
      • viewing initialized disks, 149
      • viewing iSCSI virtual disk, 216
      • viewing SalesTarget iSCSI disk, 214
      • viewing SCSI disks inside HVDirect, 277
    • DISM (Deployment Image Servicing and Management) module, importing of, 258
    • Distributed COM (DCOM), 315, 319
    • Distributed Management Task Force (DMTF), 315
    • DLL, 236, 248
    • DNS (Domain Name Service). See Domain Name Service (DNS)
    • DNS conditional forwarder, 79–80
    • DNS forward, creating DNS forward lookup zone, 139
    • DNS forwarder, configuration of, 136
    • DNS Security (DNSSEC), 135
    • DNS settings, viewing of, 65–66
    • domain, described, 57
    • Domain Admins group, 363
    • Domain Controller (DC). See DC (Domain Controller)
    • Domain Local groups, 85
    • Domain Name Service (DNS)
      • adding DNS RR to Cookham.Net Zone, 141–142
      • checking DNS RRs in Cookham.Net zone, 142–143
      • checking DNS zones on DC1, 140–141
      • configuration of, 135–136
      • configuring DNS zones and resource records, 138–144
      • creating DNS forward lookup zone, 139
      • creating reverse lookup zone, 139–140
      • installing DNS feature on DC2, 134
      • overview, 133–135
      • registering DNS records for DC1, DC2, 140
      • restarting DNS service, 142
      • testing DNS server resolution, 143–144
      • viewing key DNS server options, 136–138
    • dot sourcing, 39
    • ds_group WMI class, 344
    • DSC resource, invoking of, 3, 53
    • DSE (Directory Server Entry), viewing of, 63–64
    • Dynamic Host Configuration Protocol (DHCP)
      • authorizing DHCP server in AD, 122
      • authorizing second DHCP server in AD, 129
      • checking DHCP service, 123–124
      • completing DHCP configuration, 123
      • configuring DHCP failover, 128–133
      • configuring DHCP failover and load balancing, 130–131
      • configuring DHCP scopes, 124–127
      • configuring scope‐specific options, 126
      • configuring server‐wide options, 126
      • creating DHCP scope, 125
      • getting scopes from DHCP server, 125–126
      • installation of, 121–122
      • letting DHCP know it is fully configured on DC2, 129
      • restarting DHCP service, 123
      • setting options for, 126
      • testing DHCP service in operation, 127
      • use of, 113
      • viewing active leases from both DHCP servers, 131–132
      • viewing authorized DHCP servers, 129–130
      • viewing DHCP server statistics, 132
    • dynamic method, 319
    • dynamic modules, described, 39
  • E
    • EDNS (Extended DNS), 135
    • Enable‐PSRemoting, 104
    • Enable‐VMMigration, 308
    • Enable‐VMReplication, 294
    • Enable‐VMResourcedMetering, 312
    • Enterprise Admins group, 345–346, 353, 363
    • enterprise resource planning (ERP) tool, 96
    • error messages, 2
    • error views, simplification of, 2–3
    • event consumer, 352
    • event filter, 352, 353–355
    • event logs
      • counting event logs, 397
      • creating logon type summary, 400
      • displaying logon events by logon type, 401
      • examining RDP logons, 401
      • getting all Windows Security log events, 399
      • getting event counts in key logs, 398
      • getting logon events, 399
      • getting total number of event records, 397–398
      • reviewing of, 395–401
    • Exchange Server, 48
    • execution policy
      • enabling of, 6
      • resetting of, 35
      • setting of, 32
      • use of, 30
    • experimental features, 3
    • Extended DNS (EDNS), 135
    • extrinsic events, 339, 342–343
  • F
    • failover clustering, 206, 218, 222, 224, 302
    • failover test, 288, 299, 300, 301
    • FailoverClusters module, 222
    • file groups, 184–185
    • file screening
      • changing notification limits, 189
      • creating new file folder, 186
      • creating new file screen, 186–187
      • examining existing file screen templates, 184–186
      • management of, 183–190
      • setting up active file screen, 187–188
      • testing active file screen, 189
      • testing of, 187
      • viewing active file screen email, 189–190
      • viewing notification limits, 188
    • File Server Resource Manager (FSRM)
      • building FSRM action, 179. See also FSRM action
      • building FSRM quota, 180–181
      • creating FSRM quote template, 178
      • creating FSRM threshold, 180
      • creating new file folder, 186
      • creating new folder, 179
      • creating scheduled FSRM report task, 370–371
      • described, 365
      • examining existing FSRM file groups, 184
      • examining FSRM email, 181
      • installation of, 175–176
      • leveraging of to generate reports on spool folder, 240
      • managing file screening, 183–190
      • report types supported by, 365
      • reporting in, 357
      • sending test email, 176–177
      • setting up SMTP settings for, 176
      • testing 85% quota threshold, 181
      • testing hard quota limit, 181–182
      • using FSRM XML output, 369–370
      • viewing available FSRM quota templates, 178
      • viewing folder contents, 183
      • viewing FSRM report output files, 368
      • viewing FSRM reports, 367–368
    • File System Freeze, 282
    • FileAndStorage‐Services, 191
    • File‐Services feature, 226
    • filestore quotas
      • building FSRM action, 179
      • building FSRM quota, 180–181
      • creating FSRM quote template, 178
      • creating FSRM threshold, 180
      • creating new folder, 179
      • examining FSRM email, 181
      • installing FS Resource Manager feature, 175–176
      • management of, 175–183
      • sending test email, 176–177
      • setting up SMTP settings for FSRM, 176
      • testing 85% quota threshold, 181
      • testing hard quota limit, 181–182
      • viewing available FSRM quota templates, 178
      • viewing folder contents, 183
    • filesystem reporting
      • creating scheduled FSRM report task, 370–371
      • creating scheduled report, 371
      • creating storage report, 366
      • removing reports and scheduled task, 374
      • running report interactively, 372
      • types of reports supported by FSRM, 365
      • using FSRM XML output, 369–370
      • viewing FSRM report output files, 368
      • viewing FSRM reports, 367–368
      • viewing Large Files Report, 368–369
      • viewing report, 372–373
      • viewing report scheduled task, 371–372
    • _FilterToConsumerBinding, 352, 353
    • Flexible Single Master Operation (FSMO), 60, 64, 65, 74
    • folder enumeration mode, 201
    • folders
      • C:\Foo folder, 7, 14, 15, 20
      • creating module working folder, 26
      • installation folder, 9–10
      • repository folder, 25–26
      • role capabilities folder, 101
      • spool folder, 240–245
      • transcript folder, 101, 107–108
    • Foo folder, 7, 14, 15, 20
    • ‐Force parameter, 11
    • Foreach‐Object cmdlet, 2
    • Foreach‐Object‐Parallel, 52, 100
    • forest (in AD), defined, 57
    • forest root domain
      • creating forest root domain controller, 62
      • defined, 57
      • establishment of, 60–66
      • getting details of, 65
      • importing Server Manager module, 60
      • installing AD Domain Services feature, 61
      • loading AD DS Deployment module explicitly, 61–62
      • viewing details of new AD DS forest, 64–65
      • viewing Directory Server Entry (DSE), 63–64
      • viewing DNS settings, 65–66
    • forest root domain controller, 60, 62–63
    • Foxit Reader PDF Printer, 233
    • FS1.Reskit.Org
      • adding clustering features to, 221–222
      • adding file server features to, 194–195
      • creating volume on, 216–217
      • restarting of, 222
      • setting up, 200
      • using iSCSI drive on, 217–218
      • viewing shares from, 228–229
    • FS2.Reskit.Org
      • adding clustering features to, 221
      • adding file server role to, 221
      • configuring iSCSI portal for, 219–220
      • restarting of, 222
      • setting up iSCSI portal for, 219
  • G
    • GC (Global Catalog), 64
    • Get | Remove pattern, 90
    • Get‐ADDomain, 65, 70
    • Get‐ADForest, 64
    • Get‐ADGroupMember, 93, 94
    • Get‐ADRootDSE, 63
    • Get‐ADUser, 90, 91, 92
    • Get‐AuthenticodeSignature cmdlet, 35
    • Get‐ChildItem, 29, 34, 47–48, 217, 284, 288, 289, 291, 389
    • Get‐CimClass, 322, 324, 328, 329, 330, 335
    • Get‐CimInstance, 246, 326, 331, 332, 334, 338, 374
    • Get‐Counter, 374
    • Get‐DHCPServer4Scope, 125
    • Get‐DhcpServerInDC, 129
    • Get‐DhcpServerv4ScopeStatistics, 132
    • Get‐Disk, 148
    • Get‐DNSServer, 136
    • Get‐DNSServerZone, 140
    • Get‐Event, 341
    • Get‐FsrmFileGroup, 184
    • Get‐FsrmFileScreenTemplate, 184
    • Get‐FsrmQuotaTemplate, 178
    • Get‐FsrmSetting, 188
    • Get‐HelloWorld, 40, 41, 42, 45
    • Get‐HelloWorld2, 46
    • Get‐HW, 102, 106, 107, 108
    • Get‐IsciTargetServerSettings, 210
    • Get‐Module, 39
    • Get‐NetIPAddress, 115
    • Get‐NetIPConfiguration, 266, 268
    • Get‐NTFSAccess, 157, 162, 204, 205
    • Get‐Partition, 154
    • Get‐Printer, 240, 246, 249
    • Get‐PrinterUsage, 390
    • Get‐PSRepository command, 28
    • Get‐PSSessionCapability, 104
    • Get‐ReskitUser, 360, 361
    • Get‐ScheduledTask, 371
    • Get‐SmbServerConfiguration, 195
    • Get‐SmbShare, 200
    • Get‐SMBShare, 336
    • Get‐SRPartnership, 171
    • Get‐VM, 296, 301, 303, 305, 307, 308, 310
    • Get‐VMCheckpoint, 286, 290
    • Get‐VMHardDiskDrive, 306, 307
    • Get‐VMNetworkAdapter, 268
    • Get‐VMReplicationServer, 295
    • Get‐VMScsi, 277
    • Get‐VMSnapShot, 286
    • Get‐Volume, 151, 154
    • Get‐WindowsImage, 259
    • Get‐WinEvent, 340, 395, 397
    • Get‐WMINameSpaceEnum, 323
    • Get‐WMIPE, 353
    • GHW alias, 27
    • Global Catalog (GC), 64
    • Grant‐SmbShareAccess, 202
    • Group Policy, as AD feature, 58
    • Group Policy: Fundamentals, Security, and the Managed Desktop (Moskowitz), 58
    • Group Policy objects, 119
    • GUID Partition Table (GPT), 145
  • H
    • Hardware Compatibility List (HCL), 218
    • hash tables, 7, 19, 39, 41, 42, 62–63, 87, 88, 98, 100, 256, 303, 337, 391, 392, 393, 396
    • HelloJEA World, 108
    • help information
      • viewing installation file help information, 8
      • viewing starting PowerShell 7 help information, 12
    • hot standby, 128, 131
    • HV1
      • checking VMs on, 310
      • configuration of for delegation, 293–294
      • creating new VM in, 260
      • getting VM details from, 298–299
      • installation of Hyper‐V feature on, 255
      • rebooting of, 255, 294
      • starting failover from HV1 to HV2, 302
      • stopping HVDirect on, 302
    • HV2
      • checking VMs on, 310
      • configuration of for delegation, 293–294
      • getting VM details from, 299–300
      • rebooting of, 294
      • starting failover from HV1 to HV2, 302
      • viewing VM status on after failover, 298
      • viewing VMs on, 308
    • HVDirect
      • checking Hyper‐V in, 281–282
      • creating another file in, 287
      • creating content in, 285
      • creating credentials for, 313
      • displaying details of HVDirect VM, 263
      • examining C: in HVDirect VM, 283
      • as running on HV1 host, 265
      • stopping of on HV1, 302
      • turning off of, 272
      • viewing checkpoint details for, 286
      • viewing HVDirect VM, 305
      • viewing IP address inside of, 268–269
      • viewing SCSI disks inside of, 277
    • HW.psd1, 28
    • Hyper‐V. See also Hyper‐V Manager MMC; Hyper‐V Replica (HVR); Hyper‐V status report
      • adding disk to VM, 276
      • adding ISO image to VM, 261
      • adding SCSI controller, 275
      • adding VHD to VM, 261
      • building configuration hash table, 256
      • checking of in HVDirect, 281–282
      • configuring VM hardware, 271–277
      • configuring VM networking, 265–271
      • connecting VM to switch, 267
      • creating credential for VM, 266
      • creating folders to hold VM disks and VM details, 255–256
      • creating Hyper‐V VM, 257–262
      • creating new virtual disk, 275–276
      • creating new VM in HV1, 260
      • creating variables, 257–258
      • creating VHDX file for VM, 260
      • creating virtual switch, 267
      • enabling MAC spoofing, 268
      • getting host name of HVDirect VM, 271
      • getting NIC details, 266–267
      • getting virtual NIC details from HVDirect, 265
      • implementing nested virtualization, 277–282
      • installation and configuration of, 254–257
      • installation of in HVDirect VM, 280
      • installation of on HV1, 255
      • installing Windows Server 2019, 261–262
      • joining Reskit domain, 269–270
      • management of, 251–314
      • Microsoft's introduction of and support for, 251
      • mounting ISO image, 259
      • rebooting HV1, 255
      • rebooting VM, 270–271
      • restarting VM, 275
      • reviewing key VM host settings, 256–257
      • setting hardware startup order, 273
      • setting socket count, 273–274
      • setting VM memory, 274
      • starting VM, 261
      • turning off HVDirect VM, 272
      • using PowerShell Direct, 262–264
      • using VM checkpoints, 282–291
      • using VM replication, 291–305
      • verifying that ISO image exists, 258
      • viewing IP address inside HVDirect, 268–269
      • viewing ISO image contents, 259–260
      • viewing results of installing Windows Server 2019, 262
      • viewing SCSI disks inside HVDirect, 277
      • viewing VM network information, 268
      • VM movement, 305–311
      • VM replication, 291–305
      • VM resource usage, 311–314
    • Hyper‐V Manager MMC, 261
    • Hyper‐V Replica (HVR), 291–305
    • Hyper‐V status report
      • adding current CPU usage, 392
      • adding host details to report, 391
      • adding memory assigned to VMs, 393
      • adding PowerShell and OS version, 391–392
      • adding processor count, 392
      • adding report object to the report, 393
      • adding total Hyper‐V host physical memory, 393
      • completing report, 394
      • creating array for VM details, 394
      • creating basic report object hash table, 391
      • creating host report object, 393
      • creating report header, 393
      • creation of, 390–395
      • getting VM details, 394
      • viewing report, 395
  • I
    • ICMP (Internet Control Message Protocol) Echo Reply, 117, 118
    • ICMP (Internet Control Message Protocol) Echo Request, 117, 118, 120
    • Implemented qualifier, 335
    • implicit remoting, 48
    • Import‐Module cmdlet, 6, 40, 48, 49, 50, 167, 258
    • Import‐PSSession, 48
    • Initialize‐Disk, 149
    • Install‐ADDSDomain, 73
    • installation folder, examination of, 9–10
    • installation script, 7–8, 9, 15
    • Install‐Module, 6, 24
    • Install‐PowerShell script, 9
    • Install‐VSCode script, 15
    • Install‐VSCode.ps1 file, 16
    • Install‐WindowsFeature, 68, 121, 134, 167, 234
    • instance method, 334
    • Internet Control Message Protocol (ICMP) Echo Reply, 117, 118
    • Internet Control Message Protocol (ICMP) Echo Request, 117, 118, 120
    • intrinsic events, 339
    • Invoke‐CimMethod, 336, 338
    • Invoke‐Command, 225, 263, 264, 266, 283
    • IP addressing
      • automatic private IP addressing (APIPA), 114
      • checking adapter details, 114–115
      • configuration of, 115
      • overview, 113
      • setting DNS server details, 116
      • validating new IP configuration, 116
      • verifying new IP address, 115
    • iSCSI
      • adding iSCSI disk to cluster, 225–226
      • configuring iSCSI service on SRV2, 213
      • connecting to the target on SRV2, 215
      • creating folder on SRV2, 210–211
      • creating iSCSI disk target mapping on SRV2, 213
      • creating iSCSI target on SRV2, 212–213
      • creating volume on FS1, 216–217
      • creation and use of iSCSI target, 207–218
      • described, 207
      • ensuring iSCSI disks are connected, 225
      • exploring iSCSI target server settings, 210
      • installing iSCSI target feature on SRV2, 209–210
      • setting disk online and making it read/write, 216
      • setting up iSCSI portal, 213–214
      • setting up iSCSI portal for FS2, 219
      • using iSCSI drive on FS1, 217–218
      • viewing iSCSI virtual disk, 216
      • viewing SalesTarget iSCSI disk, 214
    • iSCSI initiator, 207
    • ISE (Windows PowerShell Integrated Scripting Environment), 1
    • ISO image
      • adding of to VM, 261
      • mounting of, 259
      • verifying existence of, 258
      • viewing ISO image contents, 259–260
  • J
    • JerryG, 93, 101, 105
    • JSON file/document, 18, 19
    • Just Enough Administration (JEA)
      • checking what the user can do, 104–105
      • configuration of, 100–109
      • creating credentials for JerryG, 105
      • creating JEA session configuration file, 102–103
      • creating role capabilities file, 101–102
      • creating role capabilities folder, 101
      • creating three script blocks to test, 105–106
      • creating transcript folder, 101
      • enabling remoting and creating JEA session endpoint, 103–104
      • examining JEA transcript, 108–109
      • get DNSServer command available in JEA session, 107
      • how many commands exist in a JEA session? 106–107
      • invoking JEA‐defined function, 107
      • testing session configuration file, 103
      • viewing transcripts folder, 107–108
  • L
    • language operators, three new sets of, 2
    • LanmanServer, 194
    • LastLogonDate, 362
    • Layout.XML file
      • building of, 20
      • importing of, 20–21
    • LDAP ports, checking connectivity to, 119
    • Line Printer Daemon (LPD) service, 231
    • Line Printer Remote (LPR) service, 231
    • load balancing, 130–131
    • Local Machine Trusted Publisher store, 34
    • Local Machine Trusted Root store, 34
    • Log File consumer, as permanent event handler, 347
  • M
    • MAC spoofing, enabling of, 268, 278–279
    • Mail Exchange (MX), 138
    • managed entity, as component of WMI architecture, 318
    • manifest file, 39
    • manifest modules, described, 39
    • Markdown, 14
    • Master Boot Record (MBR), 145
    • Measure‐VM, 313, 314
    • Measure‐VMReplication, 296, 297
    • method
      • defined, 319, 334
      • dynamic method, 319
      • instance method, 334
      • Invoke‐CimMethod, 336, 338
      • static method, 334, 335
      • viewing class methods, 329–330
      • viewing WMI class methods, 329–330
      • WMI methods. See WMI methods
    • Microsoft Evaluation Center, 257
    • Microsoft Hyper‐V Server. See Hyper‐V
    • Microsoft Virtual PC, 251
    • Microsoft Virtual Server, 251
    • module analysis cache, viewing of, 47
    • module autoload, use of, 46–47
    • module load deny list, use of, 50
    • module manifest
      • creation of, 27–28
      • using PowerShell module manifests, 41
    • module versioning, 43
    • modules
      • commands as contained within, 37
      • creating module manifest, 27
      • creating module with multiple versions, 43–44
      • creating module working folder, 26
      • creating simple module, 26
      • creation of, 39–40
      • defined, 38
      • determining which ones support .NET Core, 23
      • discovering PowerShell Gallery modules, 22–23
      • downloading and installing NTFSSecurity module, 155
      • examining PowerShell modules, 38–48
      • FailoverClusters, 222
      • finding commands in NTFSSecurity module, 155
      • finding NTFS modules, 23–24
      • finding of, 30
      • importing AD DS deployment module, 77–78
      • importing DISM module, 258
      • importing PowerShell modules, 40–41
      • importing Server Manager module, 60, 67, 71, 76
      • installing NTFSSecurity module, 24
      • loading AD DS Deployment module explicitly, 61–62
      • loading and testing of, 27
      • naming of, 42–43
      • Print Management module, 236
      • publishing of, 29
      • understanding types of, 39
      • using module load deny list, 50
      • using module versions, 44–46
      • viewing module folder locations, 10–11
      • viewing new locations for module folders, 13
    • Monitor.ps1, 351, 353, 354
    • Moskowitz, Jeremy (author)
      • Group Policy: Fundamentals, Security, and the Managed Desktop, 58
    • Move‐VM, 309
    • Move‐VMStorage, 307
    • MSI file, 8
    • MX (Mail Exchange), 138
    • MyModule 1, 40, 41, 43
    • MyModule 2, 45, 46
  • N
    • _NAMESPACE class, 320, 321, 323
    • _NAMESPACE parameter, 330
    • nested virtualization
      • configuring virtual processor, 278
      • creating credentials, 279
      • defined, 277
      • described, 252
      • enabling MAC address spoofing, 278–279
      • implementation of, 277–282
      • installing Hyper‐V in HVDirect VM, 280
      • restarting VM, 279, 280–281
      • stopping HVDirect VM, 277–282
    • .NET objects, 82–83, 249, 316, 319, 331, 335
    • .NET Core, 23, 37, 48, 52, 53, 241, 382
    • .NET Framework, 9, 34, 37, 52, 155, 199, 240, 316, 317, 382
    • network connectivity
      • checking connectivity to SMB and LDAP ports, 119
      • checking of, 67–68
      • examining path to remote server, 119–121
      • testing connectivity to DC, 118
      • testing of, 117–121
      • testing of with DC1, 77
      • verifying that SRV2 and loopback are working, 117–118
    • Network File System (NFS) protocol, 192
    • Network Interface Card (NIC)
      • configuring VM with two NICs, 4
      • getting NIC details, 266–267
      • updating configuration of, 268
    • networking
      • configuring DHCP failover, 128–133
      • configuring DHCP scopes, 124–127
      • configuring DNS service, 133138
      • configuring DNS zones and resource records, 138–144
      • configuring VM networking, 265–271
      • installing DHCP service, 121–124
      • IP addressing, 113–116
      • management of, 111–144
      • testing of network connectivity, 117–121
    • new version notification, 3
    • New‐ADGroup, 92
    • New‐ADuser, 98
    • New‐CimInstance, 352
    • New‐Cluster, 224
    • New‐FSRMQuota, 180
    • New‐FsrmScheduledTask, 370
    • New‐FSRMStorageReport, 366, 371
    • New‐IscisTargetPortal, 213
    • New‐IscsiServerTarget, 212
    • New‐IscsiVirtualDisk, 211–212
    • New‐Item, 7, 242, 255
    • New‐ModuleManifest, 39
    • New‐NetIPAddress, 116
    • New‐Object, 241, 266, 279, 283, 375
    • New‐Partition, 147, 150, 151, 152
    • NewProcessEvent, 341
    • New‐SelfSignedCertificate, 30–31
    • New‐SMBShare, 26
    • New‐SRPartnership, 170
    • New‐VHD, 260, 275
    • New‐VM, 260
    • New‐VMSwitch, 267
    • New‐Volume, 147, 150, 152
    • NFS (Network File System) protocol, 192
    • NIC (Network Interface Card)
      • configuring VM with two NICs, 4
      • getting NIC details, 266–267
      • updating configuration of, 268
    • Non‐Volatile Memory Express (NVMe), 145
    • notification limits
      • changing of, 189
      • viewing of, 188
    • NT Event Log consumer, as permanent event handler, 347
    • NTFS inheritance, removing of, 205–206
    • NTFS modules, finding, 23–24
    • NTFS permissions
      • adding full control for domain admins, 160
      • adding Sales group access to folder, 161
      • creating new folder and file, 157
      • creating Sales group, 159
      • displaying Sales group, 159–160
      • downloading and installing NTFSSecurity module, 155
      • finding commands in NTFSSecurity module, 156–157
      • management of, 154–163
      • removing default file ACE, 160
      • removing folder's inherited rights, 161
      • reviewing of, 204–205
      • setting NTFS ACL to match share, 205
      • viewing default ACL on file, 158
      • viewing default folder ACL, 157–158
      • viewing permissions on file, 162–163
      • viewing permissions on folder, 162
    • NTFSSecurity module
      • downloading and installation of, 155
      • finding commands in, 156–157
      • installation of, 24
      • use of to manage NTFS file and folder security, 6
      • viewing available commands in, 24
    • NuGet
      • installing latest version of, 6–7
      • requirements of, 27
    • Null coalescing operators, 2
    • NVMe (Non‐Volatile Memory Express), 145
  • P
    • ‐Parallel switch, 2
    • perfmon.exe, 378
    • performance, enhancements in, 2
    • Performance Logs and Alerts (PLA). See PLA (Performance Logs and Alerts)
    • performance monitoring graph
      • adding performance data to chart, 384
      • creating chart object, 383
      • creation of, 382–385
      • defining chart area, 383
      • defining chart dimensions, 383
      • identifying date/time column, 383
      • importing performance data, 382
      • loading forms assembly, 382
      • saving chart image, 384
      • viewing chart image, 384–385
    • permanent event handling, 347, 348
    • permissions
      • AGDLP (account, global, domain, local permissions) approach, 85
      • defining required permissions for printing, 242
      • NTFS permissions. See NTFS permissions
      • setting of, 85
    • Pipeline chain operators, 2
    • PLA (Performance Logs and Alerts)
      • adding performance counters to collector set, 376
      • collecting performance information using, 374–378
      • combining CPU measurements, 381
      • creating and starting data collector set, 376–377
      • creating data collector, 375
      • creating performance monitoring graph, 382–385
      • creating schedule, 376
      • creating second data collector set, 377–378
      • creating Systems Diagnostic Report, 385–387
      • defining counters, 375–376
      • determining 95th percentile, 380–381
      • displaying CPU statistics, 381–382
      • fixing data collection problem, 380
      • importing performance counter data, 379
      • importing performance counters, 379
      • obtaining CPU statistics, 380
      • reporting on PLA performance data, 379–382
      • viewing collector sets, 378–379
    • PowerShell 7
      • compatibility issue work‐arounds, 54
      • compatibility layer/solution of, 37, 48–50
      • compatibility with Windows PowerShell, 37, 48–50
      • console, 6, 9, 12, 14, 17, 19–20
      • creating shortcut for PowerShell 7 console, 19–20
      • downloading PowerShell 7 installation script, 7–8
      • installation folder, 9–10
      • installation of, actual installation, 8–9
      • installation of, preparation for, 5–8
      • modules. See modules
      • as .NET application, 37
      • new features of, 2–3
      • operating systems that support, 5
      • starting, 12
      • things that do not work with, 51–54
    • PowerShell and WMI (Siddaway), 316
    • PowerShell Core, 48
    • PowerShell Direct (PS Direct)
      • creating variables for use with, 262–263
      • displaying details of HVDirect VM, 263
      • invoking command based on VM ID, 264
      • invoking command using WMName, 263–264
      • use of, 262–264
    • PowerShell Gallery
      • described, 1, 21–22
      • discovering PowerShell Gallery modules, 22–23
      • use of, 6, 21–24
    • PowerShell ISE, described, 14
    • PowerShellGet, installing latest version of, 6–7
    • PowerShellGet module, 1, 22
    • PowerShellGet repository, creation of, 24–30
    • print device, use of term, 231
    • Print Management module, 236
    • Print Manager GUI, 236
    • Print Server feature, installation of on PSRV, 234–235
    • Print Services feature, components of, 231
    • print spooler, 231, 240–245
    • printer, use of term, 231
    • printer pool
      • creation of, 248–249
      • defined, 248
    • printer usage
      • creating print output, 389
      • defining Get‐PrinterUsage, 388–389
      • reporting on AD users and computers, 387–390
      • turning on print job logging, 388
      • viewing of, 390
      • viewing PDF output files, 389–390
    • printing
      • adding new printer, 237
      • adding new printer port, 236–237
      • adding printer port, 248
      • changing spool folder, 240–245
      • changing spool folder path, 242
      • checking initial publication status, 239
      • committing change in spool folder path, 243
      • configuring new spool folder, 244
      • creating another spool folder, 244
      • creating folder for print drivers, 235
      • creating new spool folder, 242
      • creating print server objects, 242
      • creating printer pool, 248–249
      • creating printer pool for SalesPrinter1, 248–249
      • defining required permissions, 242
      • displaying initial spool folder, 241
      • displaying number of printers defined, 246
      • displaying printer's details, 247
      • downloading printer drivers, 235
      • expanding ZIP file, 235
      • getting printer object, 239
      • getting printer objects from WMI, 246
      • getting Sales group printer WMI object, 246
      • installing and sharing printers, 233–238
      • installing drivers, 236
      • loading System.Printing namespace, 241
      • management of, 231–249
      • publishing printer in AD, 238–240
      • publishing printer to AD, 239
      • restarting spooler service, 243, 244
      • reviewing printer configuration, 237–238
      • reviewing spooler folder, 243
      • sharing printer, 237
      • stopping spooler service, 244
      • of test page, 245–247
      • viewing printer publication status, 240
      • viewing resulting details, 249
      • viewing results of updated spool directory, 245
    • PrintTestPage, 245, 247
    • printui.dll, 236, 248, 249
    • production checkpoint, defined, 282
    • profile files
      • creating sample personal profile file, 17
      • viewing profile file locations, 11–12
  • Q
    • qualifiers, 335
  • R
    • RAID (Redundant Array of Independent Disks), 206, 207, 208, 212, 228–229
    • Receive‐Job, 339
    • ReFS filesystem, 145–146
    • Register‐CimEvent, 339
    • Register‐CimIndicationEvent, 339, 340, 345
    • Register‐DnsClient, 140
    • Register‐PSRespository command, 28
    • Register‐PSSessionConfiguration, 104
    • remoting
      • enabling of, 103–104
      • implicit remoting, 48
    • Remove‐ADUser, 91
    • Remove‐NTFSAccess, 160
    • Remove‐WMIPE, 354
    • Renouf, Alan, 323
    • replica DC (Domain Controller)
      • adding AD DS features on DC2, 68
      • checking network connectivity, 67–68
      • importing Server Manager module, 67
      • installation of, 66–70
      • promoting DC2, 69
      • rebooting DC2, 69
      • reviewing DCs in Reskit.Org domain, 69–70
      • viewing Reskit.Org domain, 70
    • replica failover, testing of, 297
    • replication. See VM replication
    • reporting
      • on AD users and computers, 359–365
      • adding privileged users to report, 363–364
      • building report header, 361
      • collecting performance information using PLA, 374–378
      • creating performance monitoring graph, 382–385
      • creating Systems Diagnostic Report, 385–387
      • defining a function to retrieve user accounts, 360–361
      • described, 357
      • determining privileged users, 362–363
      • on disabled users, 361
      • displaying report, 364–365
      • getting Reskit users, 361
      • Hyper‐V status report, 390–395
      • on invalid password attempts, 362
      • 365–374
      • on PLA performance data, 379–382
      • on printer usage, 387–390
      • reviewing event logs, 395–397
      • on unused accounts, 362
    • repositories
      • trusting of, 28
      • use of public repositories, 24
      • viewing configured repositories, 28–29
    • repository folder
      • creation of, 25–26
      • sharing of, 26
      • viewing of, 29
    • Reskit.Org, 3, 58–59, 62, 64, 69–70, 83. See also DC1.Reskit.Org; DC2.Reskit.Org; FS1.Reskit.Org; FS2.Reskit.Org; PSRV.Reskit.Org; SRV2.Reskit.Org; UK.Reskit.Org
    • Resolve‐DNSName, 127
    • resource metering, 311
    • resource records (RRs), 65, 138–144
    • Restart‐Service, 243
    • Restart‐VM, 270
    • Restore‐VMCheckpoint, 287, 289
    • Revoke‐SmbShareAccess, 202
    • RKDNSAdmins group, 92, 93, 101, 102, 104, 105
    • RKRepo repository, 29
    • role capabilities file, creation of, 101–102
    • role capabilities folder, creation of, 101
    • Root Directory Services Entry (Root DSE), viewing of, 63–64
    • root\CIMV2 namespace, 322, 324, 329
    • root\directory \LDAP namespace, 324
    • ROOT/root, 320, 321
    • round robin, 135
    • RRs (resource records), 65, 138–144
    • RSAT‐AD tools, 155, 160
    • rundll32.exe, 236, 248–249
  • S
    • Sales group
      • adding Sales group access to folder, 161
      • creation of, 159
      • displaying of, 159–160
      • granting access of share to, 203–204
    • SalesPrinter1, 239, 240, 246, 248–249
    • Samba project, 194
    • SAN (storage area network), 207, 228–229
    • scale‐out file server (SOFS)
      • adding clustering features to FS1/FS2, 221–222
      • adding continuously available share, 227
      • adding file server role to FS2, 221
      • adding iSCSI disk to cluster, 225–226
      • adding SOFS role to cluster, 226
      • configuring iSCSI portal for FS2, 219–220
      • configuring quorum share on DC1, 224–225
      • creating cluster, 224
      • creating folder, 227
      • ensuring iSCSI disks are connected, 225
      • moving iSCSI disk into CSV, 226
      • restarting FS1 and FS2, 222
      • setting cluster witness, 225
      • setting up clustered scale‐out file server, 218–229
      • setting up iSCSI portal for FS2, 219
      • testing cluster nodes, 222
      • viewing cluster validation test results, 222–224
      • viewing shares from FS1, 228
    • Schema Admins group, 363
    • script modules, described, 39
    • script signing, requirements for, 30
    • scripts
      • attempt to run one, 32
      • creating script for event handler to run: Monitor.ps1, 351
      • execution policy for running of, 6
      • installation script, 7–8, 9, 15
      • Install‐PowerShell script, 9
      • Install‐VSCode script, 15
      • running of signed script, 34–35
      • server VM build scripts, 4
      • signing of, 33
      • signing of again, 34
      • testing digital signature of, 35
    • SCSI (Small Computer Systems Interface), 207
    • Secure.Txt, 160
    • Select‐Object, 137, 329
    • self‐signed certificate, creation of, 31
    • Sender Protected Framework (SPF), 138
    • Send‐FsrmTestEmail, 176
    • Server Manager module, importing of, 60, 67, 71, 76
    • Server Message Block (SMB) protocol, 191, 194
    • server VM build scripts, 4
    • session configuration file
      • creation of, 102–103
      • testing of, 103
    • Set‐ACL, 155
    • Set‐ADComputer, 293
    • Set‐ADUser, 91
    • Set‐AuthenticodeSignature, 30, 33
    • Set‐Disk, 216, 220
    • Set‐FSRMSetting, 189
    • Set‐ItemProperty, 244, 343
    • Set‐Location, 3
    • Set‐Printer, 239
    • Set‐SmbShare, 201
    • Set‐VMBios, 273
    • Set‐VMDvdDrive, 261
    • Set‐VMHost, 256, 308
    • Set‐VMMemory, 274
    • Set‐VMNetworkAdapter, 278
    • Set‐VMNetworkadapterFailoverConfiguration, 301
    • Set‐VMPProcessor, 273, 278
    • Set‐VMReplicationServer, 294
    • shared data
      • creating and securing SMB shares, 198–206
      • creating and using iSCSI target, 207–218
      • management of, 191–229
      • setting up and securing SMB file server, 194–198
      • setting up clustered scale‐out file server, 218–229
    • Shell.Application COM object, 18
    • Siddaway, Richard (author)
      • PowerShell and WMI, 316
    • signing certificate, 30
    • Simple Object Access Protocol (SOAP), 53
    • ‐SkipEditionCheck parameter, 50
    • Small Computer Systems Interface (SCSI), 207
    • SMB (Server Message Block) protocol, 191, 194
    • SMB cmdlets, 319
    • SMB file server
      • adding file server features to FS1, 194–195
      • disabling default shares, 197
      • enabling SMB signing and SMB encryption, 197
      • ensuring that SMB1 is disabled, 195–197
      • getting settings for, 195
      • restarting SMB server service, 198
      • reviewing updated SMB server configuration, 198
      • setting up and securing of, 194–198
      • turning off server announcements, 198
    • SMB ports, checking connectivity to, 119
    • SMB shares
      • adding full system access, 203
      • adding Reskit/domain admins to, 202–203
      • creating and securing of, 198–206
      • creation of, 200–201, 336–337
      • discovering existing ones, 200
      • giving the creator/owner full access, 203
      • granting Sales group access, 203–204
      • removing all access to Sales1 share, 202
      • removing NTFS inheritance, 205–206
      • removing of, 338–339
      • requiring encryption for, 201–202
      • reviewing of NTFS permissions, 204–205
      • reviewing share access, 204
      • setting folder enumeration mode, 201
      • setting NTFS ACL to match, 205
      • setting share description, 201
      • setting up FS1, 200
      • use of SMB cmdlets to manage, 319
      • viewing folder ACL, 206
      • viewing of using Get‐CimInstance, 338
      • viewing of using Get‐SMBShare, 337
    • SMTP, setting up SMTP settings for FSRM, 176
    • SMTP Event consumer, as permanent event handler, 347
    • snap‐ins, 52
    • snapshot, use of term, 286
    • SOAP (Simple Object Access Protocol), 53
    • SOFS (scale‐out file server). See scale‐out file server (SOFS)
    • SPF (Sender Protected Framework), 138
    • Spiceworks, 96
    • splatting, 7
    • spool folder, changing of, 240–245
    • SR (Storage Replica). See Storage Replica (SR)
    • SRV1.Reskit.Org
      • getting information about physical disks on, 148–149
      • getting partitions on, 153–154
      • viewing volumes on, 151–152
    • SRV2.Reskit.Org
      • configuring iSCSI service on, 213
      • connecting to the target on, 215
      • counting namespaces/classes on, 326–327
      • creating folder on, 210–211
      • creating iSCSI disk target mapping on, 213
      • creating iSCSI target on, 212–213
      • examining volumes of, 174
      • installing iSCSI target feature on, 209–210
      • testing DHCP service using, 127
      • verifying that it is working, 117–118
    • standard checkpoint, defined, 282
    • Start‐VM, 275, 303, 312
    • Start‐VMFailOver, 297, 302
    • Start‐VMInitialReplication, 296
    • static method, 334, 335
    • Static qualifier, 335
    • Stop‐Service, 244
    • Stop‐VM, 277
    • Stop‐VMFailover, 300
    • storage
      • creating storage report, 366–367
      • disk management, 147–154
      • management of, 145–190
      • managing file screening, 183–190
      • managing filestore quotas, 175–183
      • managing NTFS permissions, 154–163
      • managing storage replica, 163–174
      • migrating VM storage, 307
      • volume management, 147–154
    • storage area network (SAN), 207, 228–229
    • Storage Replica (SR)
      • adding of to source, 166–167
      • adding of to the target, 167
      • checking content on the target, 166
      • creating content on F:, 165
      • creating Storage Replica partnership, 170–171
      • examining SRV2 volumes, 174
      • examining volumes on the target, 172–173
      • management of, 163–174
      • measuring new content, 165–166
      • restarting the source, 167
      • restarting the target, 168
      • reversing the replication, 173
      • testing configuration of, 168
      • viewing partnership, 171–172
      • viewing topology test report, 169–170
      • viewing updated replication group status, 173
    • sysdm.cpl applet, 46
    • System Center Operations Manager, 347
    • System Diagnostics Reports, 357
    • System.DirectoryServices.Active Directory, 83
    • System.Printing namespace, loading of, 241
    • System.Printing.PrintServer, 240, 244
    • Systems Diagnostic Report
      • creation of, 385–387
      • saving report as HTML, 386
      • starting built‐in data collector, 385–386
      • viewing of, 386–387
      • waiting for data collector to finish, 386
  • T
    • taskbar, updating of, 21
    • temporary event handling, 347
    • Ternary language operator, 2
    • Test‐Cluster, 222, 224
    • Test‐Connection, 117, 118
    • Test‐NetConnection, 117, 119, 121
    • Test‐Path, 258
    • Test‐PSSessionConfiguration, 103
    • Test‐SRTopology, 168, 169, 170
    • Tiger, 270, 271, 300, 304
    • Time Sharing System OS (TSS), 251
    • transcript folder
      • creation of, 101
      • viewing of, 107–108
    • tree (in AD), defined, 57
    • Trusted Hosts list, 81
    • Trusted Publisher certificate store, 33
    • Trusted Root certificate store, 33
  • U
    • UK.Reskit.Org, 70–75
    • Unregister‐Event, 342, 344
    • user settings, updating VS Code user settings, 18–19
    • users
      • adding privileged users to report, 363–364
      • defining a function to retrieve user accounts, 360–361
      • determining privileged users, 362–363
      • getting Reskit users, 361
      • reporting on AD users and computers, 359–365
      • reporting on disabled users, 361
  • V
    • Visual Studio Code (VS Code). See VS Code (Virtual Studio Code)
    • VM checkpoints
      • checking VM data files after removing checkpoints, 291
      • creating another file in HVDirect, 287
      • creating content in HVDirect, 285
      • creating credentials, 283
      • creation of, 284
      • examining C: in HVDirect VM, 283
      • examining checkpoint files, 284–285
      • examining files supporting checkpoints, 286–287
      • removing checkpoints, 291
      • reverting to Checkpoint1, 287–288
      • rolling forward to Checkpoint2, 289
      • taking second checkpoint, 286
      • use of, 282–291
      • viewing checkpoint details for HVDirect, 286
      • viewing checkpoints in VM, 290–291
      • viewing VM files, 287–288
      • viewing VM files after rolling forward, 289–290
    • VM internet access, 4
    • VM movement
      • checking VMs on HV1, 310
      • checking VMs on HV2, 310
      • configuring VM migration, 308
      • displaying migration time, 309–310
      • enabling VM migration, 308
      • examining virtual disk details, 310–311
      • getting VM configuration location, 306
      • getting VM hard drive locations, 306–307
      • management of, 305–311
      • migrating VM between hosts, 309
      • migrating VM storage, 307
      • viewing configuration details, 307–308
      • viewing HVDirect VM, 305
      • viewing VMs on HV2, 308
    • VM replication
      • checking VM status after failover, 303–304
      • completing failover of HVDirect, 303
      • configuring HV1 and HV2 for delegation, 293–294
      • enabling replication from the source VM, 294–295
      • examining initial replication state, 296–297
      • getting VM details from HV1, 298–299
      • getting VM details from HV2, 299–300
      • initiating replication, 296
      • rebooting HV1 and HV2, 294
      • setting failover IP address for VM failover, 301–302
      • setting VMReplication, 294
      • starting failover from HV1 to HV2, 302
      • starting failover VM, 303
      • stopping HVDirect on HV1, 302
      • stopping of failover test, 300
      • testing failover VM networking, 304
      • testing replica failover, 297
      • use of, 291–305
      • viewing replication, 297
      • viewing VM replication status, 295
      • viewing VM status, 296, 301
      • viewing VM status on HV2 after failover, 298
    • VM resource usage
      • creating credentials for HVDirect, 313
      • enabling VM resource monitoring, 312
      • getting initial resource measurements, 313
      • getting VM details, 312
      • measurement of, 311–314
      • measurement of again, 314
      • performing compute work, 313–314
      • starting HVDirect VM, 312
    • VS Code (Virtual Studio Code)
      • creating shortcut to, 19
      • downloading VS Code installation script, 15
      • installing and configuring of, 14–21
      • installing VS Code and extensions, 16–17
      • as recommended alternative to ISE, 14
      • updating VS Code user settings, 18–19
      • use of, 1
  • W
    • Web‐Based Enterprise Management (WBEM), 315
    • wevtutil, 388
    • Where‐Object, 246
    • WIN32_Printer class, 245
    • Win32_Process class, 339, 340
    • Win32_Share class, 318, 319, 328, 329, 330, 331, 334, 335, 336, 337, 338
    • Windows Management Instrumentation (WMI)
      • as based on COM, 316
      • counting namespaces/classes on DC2, 327–328
      • counting namespaces/classes on SRV2, 326–327
      • counting WMI classes, 324–325
      • discovering all namespaces in, 323
      • enumerating classes in root\CIMV2, 321–322
      • exploring WMI classes, 328–330
      • exploring WMI namespaces, 320–328
      • getting local and remote objects, 330–334
      • implementing permanent WMI event handling, 347–355
      • invoking WMI methods, 334–339
      • managing WMI events, 339–346
      • obtaining WMI data, 318–319
      • printing test page with, 245–247
      • reviewing WMI architecture in Windows, 317–318
      • use of with CIM cmdlets, 315–355
      • viewing classes in root namespace, 320–321
      • viewing namespaces below root, 321
      • viewing namespaces on remote server, 325–326
      • viewing some WMI namespaces, 324
      • WMI class, 318
      • WMI namespace, 318
    • Windows PowerShell Integrated Scripting Environment (ISE), 1
    • Windows Remote Management (WinRM), 81, 315, 320
    • Windows Server 2019
      • configuration of to support Hyper‐V, 255
      • creating file server using, 194
      • DC1 as host of, 25, 31, 396
      • installation of, 261–262
      • iSCSI initiator service as installed in, 213
      • Print Services feature, 231
      • SMB1 as disabled on, 196
      • as supporting Storage Replica (SR), 163
      • WMI performance classes in, 374
    • Windows Server 2019 Enterprise edition, 292
    • Windows Workflow Framework, 52
    • WinPSCompatSession, 48
    • WMI (Windows Management Instrumentation). See Windows Management Instrumentation (WMI)
    • WMI class
      • defined, 318
      • exploration of, 328–330
      • getting of, 341
      • viewing class details in specified namespace, 330
      • viewing class methods, 329–330
      • viewing class properties, 329
      • Win32_Share class, 319, 328
    • WMI event handling
      • binding event filter and event consumer, 352–353
      • creating event consumer, 351–352
      • creating event filter, 350–351
      • creating event query, 350
      • creating script for event handler to run: Monitor.ps1, 351
      • defining helper functions, 349–350
      • displaying event filter details, 353
      • event consumer, 348
      • event filer, 348
      • implementing permanent WMI event handling, 347–355
      • removing event filter details from WMI, 354–355
      • specifying valid users, 349
      • testing event filtering, 353
      • viewing results, 354
    • WMI events
      • adding to Enterprise Admins group, 345–346
      • creating extrinsic event registration, 342–343
      • creating temporary WMI event subscription, 345
      • defined, 319
      • defining WQL event query, 344
      • displaying event details, 341
      • examining result details, 344
      • management of, 339–346
      • modifying registry, 343
      • registering for, 340
      • removing WMI event subscription, 346
      • running Windows process, 340
      • unregistering for, 341–342
      • unregistering registry event, 344
      • unregistering WMI event, 346
      • viewing of, 346
    • WMI filter, use of, 332–333
    • WMI methods
      • creating new share, 336–337
      • invoking of, 334–339
      • removing SMB share, 338–339
      • reviewing properties of class, 335–336
      • reviewing static methods of a class, 335
      • viewing SMB share using Get‐CimInstance, 338
      • viewing SMB share using Get‐SMBShare, 337
    • WMI namespace
      • described, 318
      • exploration of, 320–328
    • WMI query, 333–334
    • WMI Query Language (WQL), 333
    • WmiMgmt.msc management console, 321
    • WQL query, defining WQL event query, 344
    • Write‐Host statements, 339, 343, 353
    • ‐WarningAction, 62, 67, 134, 167
  • X
    • X.509 digital certificates, 30
    • XML files, 9–10, 20
  • Z
    • ZIP file, 8, 235
    • zone data loading, 136