Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Windows Server 2008: The Definitive Guide
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Preface
Audience
Organization and Structure
Conventions Used in This Book
Using Code Examples
We'd Like to Hear from You
Safari® Books Online
Acknowledgments
1. Introducing Windows Server 2008
The Biggest Changes
Server Core
IIS Improvements
Networking Improvements
TCP/IP Stack Enhancements
Changes to Terminal Services
Active Directory: Read-Only Domain Controllers
Security Improvements
Operating System File Protection
BitLocker
Device Installation Control
Windows Firewall with Advanced Security
Network Access Protection
Manageability Improvements
Server Manager
Windows Deployment Services
Performance and Reliability Upgrades
Windows Server 2008 Editions
Hardware Requirements
The Last Word
2. Installation and Deployment
Installing Windows Server 2008
Initial Configuration Tasks
Understanding Product Activation
Deployment
Windows Imaging Format
Windows PE
Windows Deployment Services
Installing and Configuring Windows Deployment Services
The Boot Menu
Creating and Modifying Images
Creating and modifying boot images
Creating install images
Sysprep: the system preparation tool
Configuring and Performing Unattended Installations with Scripts
The Last Word
3. File Services
File and Print Server Features
Setting Up File Sharing Services
Creating a Share Manually
Default Shares
Publishing Shares to Active Directory
NTFS File and Folder Permissions
Standard and Special Permissions
Setting Permissions
Inheritance and Ownership
Determining Effective Permissions
Access-Based Enumeration
Auditing
The File Server Resource Manager
Configuring the FSRM
Configuring Quotas with the FSRM
Screening for File Types
Defining a file group
Creating a file screen
Creating an exception to a screen
Generating Storage Reports
Disk-Based Quotas
Setting Default Disk Quotas
Configuring Individual Quota Entries
Using Offline Files and Folders
Enabling Offline Files
Points to Remember
Using Previous Versions
Enabling Previous Versions
Altering the Previous Versions Schedule
The Distributed File System
Creating a namespace
Adding and managing folders and folder targets in a namespace
Creating a replication group for a folder
Command-Line Utilities
Using Shares
FSUTIL
Managing Offline Folders
VSSADMIN
The Last Word
4. Domain Name System
Nuts and Bolts
Zones Versus Domains
Zone Files
Forward and Reverse Lookup Zones
Resource Records
Host (A) Records
Canonical Name (CNAME) Records
Mail Exchanger (MX) Records
Nameserver (NS) Records
Start of Authority (SOA) Records
Pointer (PTR) Records
Service (SRV) Records
Using Primary and Secondary Nameservers
Full and Incremental Zone Transfers
Building a Nameserver
Enabling Incremental Transfers
Creating a Forward Lookup Zone
Entering A Records into a Zone
Controlling Round-Robin Balancing
Entering and Editing SOA Records
Creating and Editing NS Records
Creating and Editing CNAME Records
Creating and Editing MX Records
Generating a Reverse Lookup Zone
Creating and Editing PTR Records
Configuring a Secondary Nameserver
Upgrading a Secondary Nameserver to Primary
Manually Editing Zone Files
Controlling the Zone Transfer Process
Subdomains and Delegation
Delegating a Domain
Creating the Subdomain
Dynamic DNS
Scavenging
Preventing Dynamic DNS Registration
Active Directory-Integrated Zones
Replication Among Domain Controllers
Forwarding
Slaving
Conditional Forwarding
The Split DNS Architecture
Stub Zones
Security Considerations
Backup and Recovery
Command-Line Utilities
DNSCmd
DNSLint
The Last Word
5. Active Directory
Active Directory Domain Services Objects and Concepts
Domains
Organizational Units
Sites
Groups
Nesting
Trees
Forests
Transitive forest root trusts
The dedicated forest root model
Shared Folders and Printers
Contacts
Global Catalog
Building an AD DS Structure
The First Domain
Using AD DS Tools
Adding Another Domain Controller to a Domain
Adding Another Domain
Managing Users and Groups
Creating users and groups
Performing common administrative tasks
Using LDAP to create users
Delegation
Understanding Operations Master Roles
Schema Master
Domain Naming Master
RID Master
PDC Emulator
Infrastructure Master
Transferring and Seizing Roles Manually
Understanding Directory Replication
Within a Site: Loops and Meshes
Time Synchronization
Replication Topologies
Handling Update Conflicts
Update Sequence Numbers
Breaking the loop: originating USNs and UTD vectors
Managing Replication Using REPADMIN
Running the KCC
Viewing up-to-date vectors
Viewing replication partners
Viewing highest USNs
Pressing the "Big Red Button"
Among Sites: Spanning Trees and Site Links
Site links
Read-Only Domain Controllers
DNS considerations for read-only domain controllers
Active Directory Troubleshooting and Maintenance
Auditing Activities in Active Directory Domain Services
Restarting AD Domain Services
Troubleshooting AD with DNSLint
Offline Defragmenting of NTDS Database
Cleaning Directory Metadata
The Last Word
6. Group Policy and IntelliMirror
An Introduction to Group Policy
Group Policy Implementation
Introducing the Group Policy Management Console
Creating and editing Group Policy Objects
Group Policy Preferences
Starter Group Policy Objects
Filtering and commenting
Disabling portions of policies
Refreshing computer policies
Policy enforcement over slow network connections
The Scope of Group Policy Objects
Enforcement and Inheritance
WMI Filters
Resultant Set of Policy
Planning mode
Logging mode
Using RSoP without the GUI
Other Administrative Tasks
Searching for GPOs
Backing up, copying, importing, and exporting GPOs
Managing GP across multiple forests
Delegating administration of GPs
Local Group Policy
Security Templates
Creating a Custom Security Template
Compiling the Security Database
Domain Group Policy
Security Settings
Restricted groups
Filesystem and Registry policy
IntelliMirror: Software Installation
Packaging software
An example deployment
Deployment properties
Redeploying and removing software
Deploying service packs using GP
IntelliMirror: Folder Redirection
Redirecting folders based on group membership
Removing a redirection policy
Software Restriction Policies
Scripts
Deployment Considerations
Troubleshooting Group Policy
Resolving DNS Problems
Analyzing Inheritance
GPO Distribution and Synchronization
Getting More Detailed Logs
Identifying Client Side Extension GUIDs
Locating GPT Files on Domain Controllers
Other Group Policy Management Tools
Command-Line Utilities
GPUpdate
GPResult
The Last Word
7. Windows Security and Patch Management
Understanding Security Considerations
Principles of Server Security
Locking Down Windows
Password Policies
Granular password policies
Account Lockout Policies
Local Options
Anonymous access
Shutdown without logon
Automatic logoff
Digitally signing communication
Requiring the three-keystroke salute at logon
Last username display
Password expiration prompt
Network Options Via Group Policy
Viewing the default domain policy
Viewing the default domain controller security policies
Viewing a domain controller's effective security policy
Final words: organizing policy layout
Using Auditing and the Event Log
Recommended Items to Audit
Event Logs
The Event Viewer
The Last Word
8. Internet Information Services 7
Major Improvements
The New Architecture
New: The Windows Process Activation Service
Roles
Managing IIS Graphically
Creating a Site
Adjusting Site Properties
Virtual Directories
Application Pools
Enabling Centralized Configuration
Using the Web Management Service
Managing IIS from the Command Line
AppCmd.exe: One-Stop Configuration
XML Configuration
The Last Word
9. Windows Server 2008 Server Core
The Lack of a Shell
Realistic Deployment Scenarios
No Managed Code
Few Third-Party Software Applications
Installation
Initial Configuration
Setting an Administrator Password
Configuring Date, Time, and Location Options
Installing and Applying Hardware Drivers
Setting Up Network Connections
Naming the Server and Joining a Domain
Enabling Automatic Updates
Activating the Server
Enabling Remote Desktop Services
Administering Windows Server 2008 Server Core Machines
Installing Active Directory Domain Services on Server Core
Windows Remote Shell
Controlling Server Core Via Group Policy
The Last Word
10. Terminal Services
The Remote Desktop Protocol
Adding the Terminal Server Role
Enabling Remote Desktop
On the User's Side
Using the RDP Client
Configuring a User's Environment
Alternative RDP Clients
Terminal Services Administration
Terminal Services Manager
Connecting to a session
Disconnecting a session
Logging off a session
Resetting a session
Viewing session information
Sending a message to a user
Taking control of a session
Terminal Services Configuration
Creating a new connection listener
Restricting Terminal Services connections
Encryption levels
Remote control permissions
Terminal Services RemoteApp
Terminal Services Web Access
Terminal Services Gateway
Command-Line Utilities
The Last Word
11. DHCP and Network Access Protection
Dynamic Host Configuration Protocol
How It Works
Installing a DHCP Server
Creating a New DHCP Scope
Authorizing a DHCP Server
Reservations
Understanding Classes
Superscopes
Conflict Detection
DHCP Implications for DNS
Network Access Protection
How It Works
Enforcement Mechanisms
Implementing NAP in Phases
Configuring Network Access Protection
Benefits and Drawbacks
The Last Word
12. An Introduction to Clustering Technologies
Network Load-Balancing Clusters
NLB Terminology
NLB Operation Styles and Modes
Single card in each server in unicast mode
Multiple cards in each server in unicast mode
Single card in each server in multicast mode
Multiple cards in each server in multicast mode
Port Rules
Creating an NLB Cluster
Adding Other Nodes to the Cluster
Removing Nodes from the Cluster
Performance Optimization
Server Clustering
Cluster Terminology
Types of Services and Applications
Planning a Cluster Setup
Creating a True Server Cluster
Using the High Availability Wizard
Command-Line Utilities
Managing Individual Nodes
Managing the Cluster Service Itself
The Last Word
13. PowerShell
Why PowerShell?
Installing PowerShell
PowerShell and Security
Starting Up PowerShell
Cmdlets: The Heart of PowerShell
Getting Help with PowerShell
Using Data Stores and PowerShell Providers
The Pipeline
Formatting Basics
Variables
Writing Scripts
Objects: .NET, WMI, and COM
Advanced PowerShell
Learning More About PowerShell
The Last Word
14. Hyper-V
How It Works
High Availability
Getting Started with Hyper-V
Installing the Hyper-V
Getting Acquainted with Hyper-V Management Tools
Removing Hyper-V
Virtualization Strategy
The Last Word
About the Author
Colophon
SPECIAL OFFER: Upgrade this ebook with O’Reilly
← Prev
Back
Next →
← Prev
Back
Next →