Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Windows Server® 2012 R2 Inside Out: Configuration, Storage, & Essentials
Dedication
Introduction
Who is this book for?
Conventions used in this book
How to reach the author
Errata & book support
We want to hear from you
Stay in touch
1. Introducing Windows Server 2012 R2
Getting to know Windows Server 2012 R2
Windows 8.1 and Windows Server 2012 R2
Planning for Windows Server 2012 R2
Your plan: The big picture
Identifying your organizational teams
Assessing project goals
The business perspective
Identifying IT goals
Examining the interaction between IT and business units
Predicting network change
Analyzing the existing network
Evaluating the network infrastructure
Assessing systems
Identify network services and applications
Identifying security infrastructure
Reviewing network administration
Defining objectives and scope
Specifying organizational objectives
Setting the schedule
Shaping the budget
Allowing for contingencies
Finalizing project scope
Defining the new network environment
Impact on network operations
Identify security requirements
Changing the administrative approach
Select and implement standards
Change management
Final considerations for planning and deployment
Thinking about server roles and Active Directory
Planning for server usage
Designing the Active Directory namespace
Managing domain trusts
Identifying the domain and forest functional level
Defining Active Directory server roles
Planning for availability, scalability, and manageability
Planning for software needs
Planning for hardware needs
Planning for support structures and facilities
Planning for day-to-day operations
Planning for deploying highly available servers
2. Deploying Windows Server 2012 R2
Getting a quick start
Product licensing
Preparing for a Windows Server 2012 R2 installation
Understanding installation options
Determining which installation type to use
Using Windows Update
Preinstallation tasks
Installing Windows Server 2012 R2
Installation on BIOS-based systems
Installation on EFI-based systems
Planning partitions
Naming computers
Network and domain membership options
Protocols
Domain membership
Networking components
Performing a clean installation
Performing an upgrade installation
Activation sequence
Activate Windows over the Internet
Activate Windows by telephone
Using Managed Activation
Performing additional administration tasks during installations
Accessing a command prompt during installation
Forcing disk-partition removal during installation
Loading mass storage drivers during installation
Creating, deleting, and extending disk partitions during installation
Troubleshooting installation
Start with the potential points of failure
Setup refuses to install or start
Setup reports a media or DVD-ROM error
Setup reports insufficient system resources
Continue past lockups and freezes
Postinstallation tasks
3. Boot configuration
Boot from hardware and firmware
Hardware and firmware power states
Diagnosing hardware and firmware startup problems
Resolving hardware and firmware startup problems
Boot environment essentials
Managing startup and boot configuration
Managing startup and recovery options
Managing System Boot Configuration
Working with BCD Editor
Managing the boot configuration data store and its entries
Viewing BCD entries
Creating and identifying the BCD store
Importing and exporting the BCD store
Creating, copying, and deleting BCD entries
Setting BCD entry values
Changing Data Execution Prevention and physical address extension options
Changing the operating system display order
Changing the default operating system entry
Changing the default timeout
Changing the boot sequence temporarily
4. Managing Windows Server 2012 R2
Working with the administration tools
Using Control Panel utilities
Using graphical administrative tools
Using command-line utilities
Utilities to know
Using Net tools
Using Windows PowerShell
Working with Server Manager
Getting to know Server Manager
Adding servers for management
Creating server groups
Enabling remote management
Working with Computer Management
Computer Management system tools
Computer Management storage tools
Computer Management Services And Applications tools
5. Windows Server 2012 R2 MMC administration
Using the MMC
MMC snap-ins
MMC modes
MMC window and startup
MMC tool availability
MMC and remote computers
Building custom MMCs
Step 1: Creating the console
Step 2: Adding snap-ins to the console
Step 3: Saving the finished console
Setting the initial console view before saving
Setting the console mode before saving
Setting the console icon before saving
Saving the console tool
Designing custom taskpads for the MMC
Getting started with taskpads
Understanding taskpad view styles
Creating and managing taskpads
Creating and managing tasks
Creating menu command tasks
Creating shell command tasks
Creating navigation tasks
Arranging, editing, and removing tasks
Publishing and distributing your custom tools
6. Configuring roles, role services, and features
Using roles, role services, and features
Making supplemental components available
Installing components with Server Manager
Viewing configured roles and role services
Managing server roles and features
Adding server roles and features
Removing server roles and features
Managing server binaries
Installing components at the prompt
Going to the prompt for Server Management
Understanding component names
Tracking installed roles, role services, and features
Installing components at the prompt
Removing components at the prompt
7. Managing and troubleshooting hardware
Understanding hardware installation changes
Choosing internal devices
Choosing external devices
Installing devices
Understanding device installation
Installing new devices
Viewing device and driver details
Working with device drivers
Device driver essentials
Understanding and troubleshooting driver signing
Viewing driver information
Viewing Advanced, Resources, and other settings
Installing and updating device drivers
Restricting device installation by using Group Policy
Rolling back drivers
Removing device drivers for removed devices
Uninstalling, reinstalling, and disabling device drivers
Managing hardware
Adding non–Plug and Play, older hardware
Enabling and disabling hardware
Troubleshooting hardware
Resolving resource conflicts
8. Managing the registry
Introducing the registry
Understanding the registry structure
Registry root keys
HKEY_LOCAL_MACHINE
HKLM\BCD00000000
HKLM\HARDWARE
HKLM\SAM
HKLM\SECURITY
HKLM\SOFTWARE
HKLM\SYSTEM
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Registry data: How it is stored and used
Where registry data comes from
Types of registry data available
Registry administration
Searching the registry
Modifying the registry
Modifying values
Adding keys and values
Removing keys and values
Modifying the registry of a remote machine
Importing and exporting registry data
Loading and unloading hive files
Working with the registry from the command line
Backing up and restoring the registry
Maintaining the registry
Using the Microsoft Fix It Utility
Removing registry settings for active installations that have failed
Removing partial or damaged settings for individual applications
Securing the registry
Preventing access to the registry utilities
Applying permissions to registry keys
Controlling remote registry access
Auditing registry access
9. Software and User Account Control administration
Software installation essentials
Mastering User Account Control
Elevation, prompts, and the secure desktop
Configuring UAC and Admin Approval Mode
Maintaining application integrity
Application access tokens
Application run levels
Configuring run levels
Controlling application installation and run behavior
10. Performance monitoring and tuning
Tuning performance, memory usage, and data throughput
Tuning Windows operating system performance
Tuning processor scheduling
Tuning virtual memory
Other important tuning, memory, and data considerations
Tracking a system’s general health
Monitoring essentials
Getting processor and memory usage for troubleshooting
Getting information on running applications
Monitoring and troubleshooting processes
Monitoring and troubleshooting services
Getting network usage information
Getting information on user and remote user sessions
Tracking events and troubleshooting by using Event Viewer
Understanding the event logs
Accessing the event logs and viewing events
Viewing event logs on remote systems
Sorting, finding, and filtering events
Sorting the event logs
Searching the event logs
Filtering the event logs
Archiving event logs
Tracking events using Windows PowerShell
Using subscriptions and forwarded events
11. Comprehensive performance analysis and logging
Establishing performance baselines
Tracking per-process resource usage
Getting an overview of resource utilization
Tracking per-process CPU utilization
Tracking per-process memory utilization
Tracking per-process disk utilization
Tracking per-process network utilization
Tracking the overall reliability of the server
Comprehensive performance monitoring
Using Performance Monitor
Selecting performance objects and counters to monitor
Choosing views and controlling the display
Monitoring performance remotely
Resolving performance bottlenecks
Resolving memory bottlenecks
Resolving processor bottlenecks
Resolving disk I/O bottlenecks
Resolving network bottlenecks
Performance logging
Creating and managing data collector sets
Using data collector templates
Collecting performance counter data
Collecting performance trace data
Collecting configuration data
Viewing data collector reports
Configuring performance counter alerts
Monitoring performance from the command line
Analyzing trace logs at the command line
12. Storage management essentials
Essential storage technologies
Using internal and external storage devices
Storage-management features and tools
Storage-management role services
Booting from SANs and using SANs with clusters
Working with SMB 3.0
Installing and configuring file services
Configuring the File And Storage Services role
Configuring multipath I/O
Adding and removing multipath hardware devices
Managing and maintaining MPIO
Meeting performance, capacity, and availability requirements
Configuring Hyper-V
Understanding Hyper-V
Installing Hyper-V
Creating virtual machines
13. Configuring disks and storage
Configuring storage
Using the Disk Management tools
Adding new disks
Using the MBR and GPT partition styles
Working with MBR disks
Working with GPT disks
Understanding legacy and protective MBRs
Using and converting MBR and GPT disks
Using the disk storage types
Working with basic and dynamic disks
Using and converting basic and dynamic disks
Creating and managing virtual hard disks for Hyper-V
Converting FAT or FAT32 to NTFS
Working with removable disks
Managing MBR disk partitions on basic disks
Creating partitions and simple volumes
Formatting a partition, logical drive, or volume
Configuring drive letters
Configuring mount points
Extending partitions
Shrinking partitions
Deleting a partition, logical drive, or volume
Managing GPT disk partitions on basic disks
ESP
MSR partitions
Primary partitions
LDM Metadata and LDM Data partitions
OEM or unknown partitions
Managing volumes on dynamic disks
Creating a simple or spanned volume
Configuring RAID 0: Striping
Recovering a failed simple, spanned, or striped disk
Moving dynamic disks
Configuring RAID 1: Disk mirroring
Creating a mirrored set by using two new disks
Adding a mirror to an existing volume
Mirroring boot and system volumes
Mirroring boot and system volumes on MBR disks
Mirroring boot and system volumes on GPT disks
Configuring RAID 5: Disk striping with parity
Breaking or removing a mirrored set
Resolving problems with mirrored sets
Repairing a mirrored system volume
Rebuilding mirrored system volumes on MBR disks
Rebuilding mirrored system volumes on GPT disks
Resolving problems with RAID-5 sets
14. TPM and BitLocker Drive Encryption
Working with trusted platforms
Managing TPM
Understanding TPM states and tools
Managing TPM owner authorization information
Preparing and initializing a TPM for first use
Turning an initialized TPM on or off
Clearing the TPM
Changing the TPM owner password
Introducing BitLocker Drive Encryption
BitLocker essentials
BitLocker modes
BitLocker changes
Using hardware encryption, secure boot, and Network Unlock
Hardware-encrypted drives
Optimizing encryption
Setting permitted encryption types
Preparing BitLocker for startup authentication and secure boot
Using Network Unlock
Provisioning BitLocker prior to deployment
Deploying BitLocker Drive Encryption
Setting up and managing BitLocker Drive Encryption
Configuring and enabling BitLocker Drive Encryption
Determining whether a computer has BitLocker-encrypted volumes
Enabling BitLocker on fixed data drives
Enabling BitLocker on removable data drives
Enabling BitLocker on operating-system volumes
Managing and troubleshooting BitLocker
Recovering data protected by BitLocker Drive Encryption
Disabling or turning off BitLocker Drive Encryption
15. File system essentials
Understanding the disk and file-system structure
Using FAT
File allocation table structure
FAT features
Using NTFS
NTFS structure
NTFS features
Analyzing the NTFS structure
Advanced NTFS features
Hard links
Data streams
Change journals
Object identifiers
Reparse points
Sparse files
Transactional NTFS
Using ReFS
ReFS features
ReFS structures
ReFS advantages
ReFS integrity streams, data scrubbing, and salvage
Using file-based compression
NTFS compression
Compressed (zipped) folders
16. Maintaining and optimizing storage
Managing NTFS disk quotas
How quota management works
Configuring disk quotas
Customizing quota entries for individual users
Managing disk quotas after configuration
Exporting and importing quota entries
Automated disk maintenance
Preventing disk-integrity problems
Running Check Disk interactively
Analyzing FAT volumes by using ChkDsk
Analyzing NTFS volumes by using ChkDsk
Repairing volumes and marking bad sectors by using ChkDsk
Automated optimization of disks
Preventing fragmentation of disks
Fixing fragmentation by using Optimize Drives
Understanding the fragmentation analysis
17. Managing storage spaces
Understanding storage spaces
Using and configuring offloaded transfers
Understanding how offloaded transfers work
Verifying support for offloaded transfers
Working with available storage
Storage Management Essentials
Creating storage pools and allocating space
Creating storage spaces
Creating a virtual disk in a storage space
Creating a standard volume
Diagnosing and resolving problems with storage spaces
Configuring data deduplication
Understanding data deduplication
Selecting data for deduplication
Interoperability with data deduplication
Deduplicating volumes
Monitoring deduplication
18. Managing file sharing
File-sharing essentials
Understanding file-sharing models
Enabling file sharing
Using and finding shares
Navigating SMB versions
Hiding and controlling share access
Special and administrative shares
C$, D$, E$, and other drive shares
ADMIN$
FAX$
IPC$
NETLOGON
PRINT$
SYSVOL
Accessing shares for administration
Creating and publishing shared folders
Creating shares by using File Explorer
Creating shares by using Computer Management
Creating shared folders in Server Manager
Changing shared folder settings
Publishing shares in Active Directory
Managing share permissions
Understanding share permissions
Configuring share permissions
Configuring synced sharing
Understanding Work Folders and sync shares
Deploying sync shares through Group Policy
Creating sync shares and enabling SMB access
Accessing Work Folders on clients
19. File security, access controls, and auditing
Managing access permissions
File and folder ownership
Permission inheritance for files and folders
Changing shaded permissions and stopping inheritance
Resetting and replacing permissions
Configuring access permissions
Basic permissions
Special permissions
Troubleshooting permissions
Managing file shares after configuration
Managing claims-based access controls
Understanding central access policies
Enabling dynamic controls and claims-based policy
Defining central access policies
Auditing file and folder access
Enabling basic auditing for files and folders
Enabling advanced auditing
Specifying files and folders to audit
Extending access policies to auditing
Monitoring the security logs
20. Managing file screening and storage reporting
Understanding file screening and storage reporting
Managing file screening and storage reporting
Managing global file-resource settings
Configuring email notifications
Configuring notification limits
Reviewing reports and configuring storage-report parameters
Configuring report locations
Configuring file-screen auditing
Configuring classification
Enabling access-denied assistance
Managing the file groups to which screens are applied
Managing file-screen templates
Creating file screens
Defining file-screening exceptions
Scheduling and generating storage reports
A. About the author
Index
About the Author
Copyright
← Prev
Back
Next →
← Prev
Back
Next →