Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Windows Server 2012 R2 Pocket Consultant: Storage, Security, & Networking Acknowledgments Introduction
Who is this book for? How is this book organized? Conventions used in this book Other resources Errata and book support We want to hear from you Stay in touch
1. Managing file systems and drives
Managing the File And Storage Services role Adding hard drives
Physical drives Preparing a physical drive for use
The MBR and GPT partition styles Legacy and protective MBRs Disk types and file systems
Using Disk Management Using removable storage devices Installing and checking for a new drive Understanding drive status
Working with basic, dynamic, and virtual disks
Using basic and dynamic disks Special considerations for basic and dynamic disks Changing drive types
Converting a basic disk to a dynamic disk Changing a dynamic disk back to a basic disk
Reactivating dynamic disks Rescanning disks Moving a dynamic disk to a new system Managing virtual hard disks
Using basic disks and partitions
Partitioning basics Creating partitions and simple volumes Formatting partitions
Compressing drives and data
Compressing drives Compressing directories and files Expanding compressed drives Expanding compressed directories and files
Encrypting drives and data
Understanding encryption and the encrypting file system Encrypting directories and files Working with encrypted files and folders Configuring recovery policies Decrypting files and directories
2. Configuring storage
Using volumes and volume sets
Understanding volume basics Understanding volume sets Creating volumes and volume sets Deleting volumes and volume sets Managing volumes
Improving performance and fault tolerance with RAID Implementing RAID on Windows Server 2012 R2
Implementing RAID-0: disk striping Implementing RAID-1: disk mirroring
Creating a mirror set in Disk Management Mirroring an existing volume
Implementing RAID-5: disk striping with parity
Creating a striped set with parity in Disk Management
Managing RAID and recovering from failures
Breaking a mirrored set Resynchronizing and repairing a mirrored set Repairing a mirrored system volume to enable boot Removing a mirrored set Repairing a striped set without parity Regenerating a striped set with parity
Standards-based storage management
Getting started with standards-based storage Working with standards-based storage Using storage pools and allocating space Creating a storage pool Creating a virtual disk in a storage space Creating a standard volume Troubleshooting storage spaces
Managing existing partitions and drives
Assigning drive letters and paths Changing or deleting the volume label Deleting partitions and drives Converting a volume to NTFS
Understanding the Convert utility syntax Using the Convert utility
Resizing partitions and volumes Repairing disk errors and inconsistencies automatically
Checking disks manually Running Check Disk interactively
Analyzing and optimizing disks
3. Data sharing and redundancy
Using and enabling file sharing Configuring standard file sharing
Understanding SMB changes Viewing existing shares Creating shared folders in Computer Management Creating shared folders in Server Manager Changing shared folder settings
Managing share permissions
Understanding the various share permissions Viewing and configuring share permissions
Managing existing shares
Understanding special shares Connecting to special shares Viewing user and computer sessions
Managing sessions and shares
Ending Individual Sessions Ending All Sessions
Managing open resources
Closing an Open File Closing All Open Files
Stopping file and folder sharing
Configuring NFS sharing Using shadow copies
Understanding shadow copies Creating shadow copies Restoring a shadow copy Reverting an entire volume to a previous shadow copy Deleting shadow copies Disabling shadow copies
Connecting to network drives
Mapping a network drive Disconnecting a network drive
Configuring synced sharing
Getting started with Work Folders Creating sync shares and enabling SMB access Accessing Work Folders on clients
4. Data security and auditing
Object management, ownership, and inheritance
Objects and object managers Object ownership and transfer Object inheritance
File and folder permissions
Understanding file and folder permissions Setting basic file and folder permissions Setting special permissions on files and folders Setting claims-based permissions
Auditing system resources
Setting auditing policies Auditing files and folders Auditing the registry Auditing Active Directory objects
Using, configuring, and managing NTFS disk quotas
Understanding NTFS disk quotas and how NTFS quotas are used Setting NTFS disk quota policies Enabling NTFS disk quotas on NTFS volumes Viewing disk quota entries Creating disk quota entries Deleting disk quota entries Exporting and importing NTFS disk quota settings Disabling NTFS disk quotas
Using, configuring, and managing Resource Manager disk quotas
Understanding Resource Manager disk quotas Managing disk quota templates Creating Resource Manager disk quotas
5. Enhancing computer security
Using security templates
Using the Security Templates and Security Configuration And Analysis snap-ins Reviewing and changing template settings
Changing settings for account, local, and event log policies Configuring restricted groups Enabling, disabling, and configuring system services Configuring security settings for registry and file system paths
Analyzing, reviewing, and applying security templates Deploying security templates to multiple computers
Using the Security Configuration Wizard
Creating security policies Editing security policies Applying security policies Rolling back the last applied security policy Deploying a security policy to multiple computers
6. Managing users and computers with Group Policy
Centrally managing special folders
Redirecting a special folder to a single location Redirecting a special folder based on group membership Removing redirection
User and computer script management
Assigning computer startup and shutdown scripts Assigning user logon and logoff scripts
Deploying software through Group Policy
Getting to know Software Installation policy Deploying software throughout your organization Configuring software deployment options Updating deployed software Upgrading deployed software
Automatically configuring Work Folders Automatically enrolling computer and user certificates Managing Automatic Updates in Group Policy
Configuring Automatic Updates Optimizing Automatic Updates Using intranet update service locations
7. Managing TCP/IP networking
Navigating networking in Windows Server 2012 R2 Managing networking in Windows 8.1 and Windows Server 2012 R2 Installing TCP/IP networking Configuring TCP/IP networking
Configuring static IP addresses
Using the ping command to check an address Configuring a static IPv4 or IPv6 address
Configuring dynamic IP addresses and alternate IP addressing Configuring multiple gateways Configuring networking for Hyper-V
Managing network connections
Checking the status, speed, and activity for network connections Enabling and disabling network connections Renaming network connections
8. Running DHCP clients and servers
Understanding DHCP
Using dynamic IPv4 addressing and configuration Using dynamic IPv6 addressing and configuration Checking IP address assignment Understanding scopes
Installing a DHCP server
Installing DHCP components Starting and using the DHCP console Connecting to remote DHCP servers Starting and stopping a DHCP server Authorizing a DHCP server in Active Directory
Configuring DHCP servers
Configuring server bindings Updating DHCP statistics Auditing and troubleshooting DHCP Integrating DHCP and DNS Integrating DHCP and NAP Avoiding IP address conflicts Saving and restoring the DHCP configuration
Managing DHCP scopes
Creating and managing superscopes
Creating superscopes Adding scopes to a superscope Removing scopes from a superscope Activating and deactivating a superscope Deleting a superscope
Creating and managing scopes
Creating normal scopes for IPv4 addresses Creating normal scopes for IPv6 addresses Creating multicast scopes Setting scope options
Viewing and Assigning Server Options Viewing and Assigning Scope Options Viewing and Assigning Reservation Options
Modifying scopes Activating and deactivating scopes Enabling the Bootstrap Protocol Removing a scope Configuring multiple scopes on a network
Creating and managing failover scopes
Creating failover scopes Modifying or removing failover scopes
Managing the address pool, leases, and reservations
Viewing scope statistics Enabling and configuring MAC address filtering Setting a new exclusion range Reserving DHCP addresses
Releasing addresses and leases
Modifying reservation properties Deleting leases and reservations
Backing up and restoring the DHCP database
Backing up the DHCP database Restoring the DHCP database from backup Using backup and restore to move the DHCP database to a new server Forcing the DHCP Server service to regenerate the DHCP database Reconciling leases and reservations
9. Optimizing DNS
Understanding DNS
Integrating Active Directory and DNS Enabling DNS on the network
Configuring name resolution on DNS clients Installing DNS servers
Installing and configuring the DNS Server service Configuring a primary DNS server Configuring a secondary DNS server Configuring reverse lookups Configuring global names
Managing DNS servers
Adding and removing servers to manage Starting and stopping a DNS server Using DNSSEC and Signing Zones Creating child domains within zones Creating child domains in separate zones Deleting a domain or subnet
Managing DNS records
Adding address and pointer records
Adding a PTR record later
Adding DNS aliases with CNAME Adding mail exchange servers Adding name servers Viewing and updating DNS records
Updating zone properties and the SOA record
Modifying the SOA record Allowing and restricting zone transfers Notifying secondaries of changes Setting the zone type Enabling and disabling dynamic updates
Managing DNS server configuration and security
Enabling and disabling IP addresses for a DNS server Controlling access to DNS servers outside the organization
Creating nonforwarding and forwarding-only servers Creating forwarding servers Configuring conditional forwarding
Enabling and disabling event logging Using debug logging to track DNS activity Monitoring a DNS server
10. Administering network printers and print services
Managing the Print and Document Services role
Using print devices Printing essentials Configuring print servers Enabling and disabling file and printer sharing
Getting started with Print Management Installing printers
Using the autoinstall feature of Print Management Installing and configuring physically attached print devices Installing network-attached print devices Connecting to printers created on the network Deploying printer connections Configuring point and print restrictions Moving printers to a new print server Monitoring printers and printer queues automatically Solving spooling problems
Configuring printer properties
Adding comments and location information Listing printers in Active Directory Managing printer drivers
Updating a printer driver Configuring drivers for network clients
Setting a separator page and changing print device mode Changing the printer port Scheduling and prioritizing print jobs
Scheduling printer availability Setting printer priority Configuring print spooling
Enabling Spooling Other Spooling Options
Starting and stopping printer sharing Setting printer access permissions Auditing print jobs Setting document defaults
Configuring print server properties
Locating the Spool folder and enabling printing on NTFS Managing high-volume printing Enabling print job error notification
Managing print jobs on local and remote printers
Viewing printer queues and print jobs Pausing the printer and resuming printing Emptying the print queue Pausing, resuming, and restarting individual document printing Removing a document and canceling a print job Checking the properties of documents in the printer Setting the priority of individual documents Scheduling the printing of individual documents
11. Data backup and recovery
Creating a backup and recovery plan
Figuring out a backup plan Basic types of backup Differential and incremental backups Selecting backup devices and media Common backup solutions Buying and using backup media Selecting a backup utility
Backing up your data: the essentials
Installing the Windows backup and recovery utilities Getting started with Windows Server Backup Getting started with the Backup Command-Line utility Working with Wbadmin commands Using general-purpose commands Using backup management commands Using recovery management commands
Performing server backups
Configuring scheduled backups Modifying or stopping scheduled backups Creating and scheduling backups with Wbadmin Running manual backups Recovering your server from hardware or startup failure Recovering from a failed start Starting a server in safe mode Backing up and restoring the system state Restoring Active Directory Restoring the operating system and the full system Restoring applications, nonsystem volumes, and files and folders
Managing encryption recovery policy
Understanding encryption certificates and recovery policy Configuring the EFS recovery policy
Backing up and restoring encrypted data and certificates
Backing up encryption certificates Restoring encryption certificates
A. About the author Index About the Author Copyright
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion