Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Windows Server 2008: The Definitive Guide
SPECIAL OFFER: Upgrade this ebook with O’Reilly Preface
Audience Organization and Structure Conventions Used in This Book Using Code Examples We'd Like to Hear from You Safari® Books Online Acknowledgments
1. Introducing Windows Server 2008
The Biggest Changes
Server Core IIS Improvements
Networking Improvements
TCP/IP Stack Enhancements Changes to Terminal Services Active Directory: Read-Only Domain Controllers
Security Improvements
Operating System File Protection BitLocker Device Installation Control Windows Firewall with Advanced Security Network Access Protection
Manageability Improvements
Server Manager Windows Deployment Services
Performance and Reliability Upgrades Windows Server 2008 Editions Hardware Requirements The Last Word
2. Installation and Deployment
Installing Windows Server 2008 Initial Configuration Tasks
Understanding Product Activation
Deployment
Windows Imaging Format Windows PE Windows Deployment Services Installing and Configuring Windows Deployment Services The Boot Menu Creating and Modifying Images
Creating and modifying boot images Creating install images Sysprep: the system preparation tool
Configuring and Performing Unattended Installations with Scripts
The Last Word
3. File Services
File and Print Server Features Setting Up File Sharing Services
Creating a Share Manually Default Shares Publishing Shares to Active Directory
NTFS File and Folder Permissions
Standard and Special Permissions Setting Permissions Inheritance and Ownership Determining Effective Permissions Access-Based Enumeration Auditing
The File Server Resource Manager
Configuring the FSRM Configuring Quotas with the FSRM Screening for File Types
Defining a file group Creating a file screen Creating an exception to a screen
Generating Storage Reports
Disk-Based Quotas
Setting Default Disk Quotas Configuring Individual Quota Entries
Using Offline Files and Folders
Enabling Offline Files Points to Remember
Using Previous Versions
Enabling Previous Versions Altering the Previous Versions Schedule
The Distributed File System
Creating a namespace Adding and managing folders and folder targets in a namespace Creating a replication group for a folder
Command-Line Utilities
Using Shares FSUTIL Managing Offline Folders VSSADMIN
The Last Word
4. Domain Name System
Nuts and Bolts Zones Versus Domains
Zone Files Forward and Reverse Lookup Zones
Resource Records
Host (A) Records Canonical Name (CNAME) Records Mail Exchanger (MX) Records Nameserver (NS) Records Start of Authority (SOA) Records Pointer (PTR) Records Service (SRV) Records
Using Primary and Secondary Nameservers
Full and Incremental Zone Transfers
Building a Nameserver
Enabling Incremental Transfers Creating a Forward Lookup Zone Entering A Records into a Zone Controlling Round-Robin Balancing Entering and Editing SOA Records Creating and Editing NS Records Creating and Editing CNAME Records Creating and Editing MX Records Generating a Reverse Lookup Zone Creating and Editing PTR Records Configuring a Secondary Nameserver Upgrading a Secondary Nameserver to Primary Manually Editing Zone Files Controlling the Zone Transfer Process
Subdomains and Delegation
Delegating a Domain Creating the Subdomain
Dynamic DNS
Scavenging Preventing Dynamic DNS Registration
Active Directory-Integrated Zones
Replication Among Domain Controllers
Forwarding
Slaving Conditional Forwarding
The Split DNS Architecture
Stub Zones Security Considerations
Backup and Recovery Command-Line Utilities
DNSCmd DNSLint
The Last Word
5. Active Directory
Active Directory Domain Services Objects and Concepts
Domains Organizational Units Sites Groups
Nesting
Trees Forests
Transitive forest root trusts The dedicated forest root model
Shared Folders and Printers Contacts Global Catalog
Building an AD DS Structure
The First Domain Using AD DS Tools Adding Another Domain Controller to a Domain Adding Another Domain Managing Users and Groups
Creating users and groups Performing common administrative tasks Using LDAP to create users Delegation
Understanding Operations Master Roles
Schema Master Domain Naming Master RID Master PDC Emulator Infrastructure Master Transferring and Seizing Roles Manually
Understanding Directory Replication
Within a Site: Loops and Meshes Time Synchronization Replication Topologies Handling Update Conflicts Update Sequence Numbers
Breaking the loop: originating USNs and UTD vectors
Managing Replication Using REPADMIN
Running the KCC Viewing up-to-date vectors Viewing replication partners Viewing highest USNs Pressing the "Big Red Button"
Among Sites: Spanning Trees and Site Links
Site links
Read-Only Domain Controllers
DNS considerations for read-only domain controllers
Active Directory Troubleshooting and Maintenance
Auditing Activities in Active Directory Domain Services Restarting AD Domain Services Troubleshooting AD with DNSLint Offline Defragmenting of NTDS Database Cleaning Directory Metadata
The Last Word
6. Group Policy and IntelliMirror
An Introduction to Group Policy Group Policy Implementation
Introducing the Group Policy Management Console
Creating and editing Group Policy Objects Group Policy Preferences Starter Group Policy Objects Filtering and commenting Disabling portions of policies Refreshing computer policies Policy enforcement over slow network connections
The Scope of Group Policy Objects Enforcement and Inheritance WMI Filters Resultant Set of Policy
Planning mode Logging mode Using RSoP without the GUI
Other Administrative Tasks
Searching for GPOs Backing up, copying, importing, and exporting GPOs Managing GP across multiple forests Delegating administration of GPs
Local Group Policy
Security Templates Creating a Custom Security Template Compiling the Security Database
Domain Group Policy
Security Settings
Restricted groups Filesystem and Registry policy
IntelliMirror: Software Installation
Packaging software An example deployment Deployment properties Redeploying and removing software Deploying service packs using GP
IntelliMirror: Folder Redirection
Redirecting folders based on group membership Removing a redirection policy
Software Restriction Policies Scripts
Deployment Considerations Troubleshooting Group Policy
Resolving DNS Problems Analyzing Inheritance GPO Distribution and Synchronization Getting More Detailed Logs Identifying Client Side Extension GUIDs Locating GPT Files on Domain Controllers
Other Group Policy Management Tools Command-Line Utilities
GPUpdate GPResult
The Last Word
7. Windows Security and Patch Management
Understanding Security Considerations
Principles of Server Security
Locking Down Windows
Password Policies
Granular password policies
Account Lockout Policies Local Options
Anonymous access Shutdown without logon Automatic logoff Digitally signing communication Requiring the three-keystroke salute at logon Last username display Password expiration prompt
Network Options Via Group Policy
Viewing the default domain policy Viewing the default domain controller security policies Viewing a domain controller's effective security policy Final words: organizing policy layout
Using Auditing and the Event Log
Recommended Items to Audit Event Logs
The Event Viewer
The Last Word
8. Internet Information Services 7
Major Improvements The New Architecture
New: The Windows Process Activation Service
Roles Managing IIS Graphically
Creating a Site Adjusting Site Properties Virtual Directories Application Pools Enabling Centralized Configuration Using the Web Management Service
Managing IIS from the Command Line
AppCmd.exe: One-Stop Configuration XML Configuration
The Last Word
9. Windows Server 2008 Server Core
The Lack of a Shell Realistic Deployment Scenarios No Managed Code Few Third-Party Software Applications Installation Initial Configuration
Setting an Administrator Password Configuring Date, Time, and Location Options Installing and Applying Hardware Drivers Setting Up Network Connections Naming the Server and Joining a Domain Enabling Automatic Updates Activating the Server Enabling Remote Desktop Services
Administering Windows Server 2008 Server Core Machines
Installing Active Directory Domain Services on Server Core Windows Remote Shell Controlling Server Core Via Group Policy
The Last Word
10. Terminal Services
The Remote Desktop Protocol Adding the Terminal Server Role Enabling Remote Desktop On the User's Side
Using the RDP Client Configuring a User's Environment Alternative RDP Clients
Terminal Services Administration
Terminal Services Manager
Connecting to a session Disconnecting a session Logging off a session Resetting a session Viewing session information Sending a message to a user Taking control of a session
Terminal Services Configuration
Creating a new connection listener Restricting Terminal Services connections Encryption levels Remote control permissions
Terminal Services RemoteApp Terminal Services Web Access Terminal Services Gateway Command-Line Utilities The Last Word
11. DHCP and Network Access Protection
Dynamic Host Configuration Protocol
How It Works Installing a DHCP Server Creating a New DHCP Scope Authorizing a DHCP Server Reservations Understanding Classes Superscopes Conflict Detection DHCP Implications for DNS
Network Access Protection
How It Works Enforcement Mechanisms Implementing NAP in Phases Configuring Network Access Protection Benefits and Drawbacks
The Last Word
12. An Introduction to Clustering Technologies
Network Load-Balancing Clusters
NLB Terminology NLB Operation Styles and Modes
Single card in each server in unicast mode Multiple cards in each server in unicast mode Single card in each server in multicast mode Multiple cards in each server in multicast mode
Port Rules Creating an NLB Cluster Adding Other Nodes to the Cluster Removing Nodes from the Cluster Performance Optimization
Server Clustering
Cluster Terminology Types of Services and Applications Planning a Cluster Setup Creating a True Server Cluster Using the High Availability Wizard
Command-Line Utilities
Managing Individual Nodes Managing the Cluster Service Itself
The Last Word
13. PowerShell
Why PowerShell? Installing PowerShell PowerShell and Security Starting Up PowerShell Cmdlets: The Heart of PowerShell Getting Help with PowerShell Using Data Stores and PowerShell Providers The Pipeline Formatting Basics Variables Writing Scripts Objects: .NET, WMI, and COM Advanced PowerShell Learning More About PowerShell The Last Word
14. Hyper-V
How It Works
High Availability
Getting Started with Hyper-V
Installing the Hyper-V Getting Acquainted with Hyper-V Management Tools Removing Hyper-V
Virtualization Strategy The Last Word
About the Author Colophon SPECIAL OFFER: Upgrade this ebook with O’Reilly
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion