Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Windows Server® 2012 R2 Inside Out: Configuration, Storage, & Essentials Dedication Introduction
Who is this book for? Conventions used in this book How to reach the author Errata & book support We want to hear from you Stay in touch
1. Introducing Windows Server 2012 R2
Getting to know Windows Server 2012 R2 Windows 8.1 and Windows Server 2012 R2 Planning for Windows Server 2012 R2
Your plan: The big picture Identifying your organizational teams Assessing project goals
The business perspective Identifying IT goals Examining the interaction between IT and business units Predicting network change
Analyzing the existing network
Evaluating the network infrastructure Assessing systems Identify network services and applications Identifying security infrastructure Reviewing network administration
Defining objectives and scope
Specifying organizational objectives Setting the schedule Shaping the budget Allowing for contingencies Finalizing project scope
Defining the new network environment
Impact on network operations Identify security requirements Changing the administrative approach Select and implement standards Change management
Final considerations for planning and deployment
Thinking about server roles and Active Directory
Planning for server usage Designing the Active Directory namespace Managing domain trusts Identifying the domain and forest functional level Defining Active Directory server roles
Planning for availability, scalability, and manageability
Planning for software needs Planning for hardware needs
Planning for support structures and facilities Planning for day-to-day operations Planning for deploying highly available servers
2. Deploying Windows Server 2012 R2
Getting a quick start Product licensing Preparing for a Windows Server 2012 R2 installation
Understanding installation options Determining which installation type to use Using Windows Update Preinstallation tasks
Installing Windows Server 2012 R2
Installation on BIOS-based systems Installation on EFI-based systems Planning partitions Naming computers Network and domain membership options
Protocols Domain membership Networking components
Performing a clean installation Performing an upgrade installation Activation sequence
Activate Windows over the Internet Activate Windows by telephone Using Managed Activation
Performing additional administration tasks during installations
Accessing a command prompt during installation Forcing disk-partition removal during installation Loading mass storage drivers during installation Creating, deleting, and extending disk partitions during installation
Troubleshooting installation
Start with the potential points of failure
Setup refuses to install or start Setup reports a media or DVD-ROM error Setup reports insufficient system resources
Continue past lockups and freezes
Postinstallation tasks
3. Boot configuration
Boot from hardware and firmware
Hardware and firmware power states Diagnosing hardware and firmware startup problems Resolving hardware and firmware startup problems
Boot environment essentials Managing startup and boot configuration
Managing startup and recovery options Managing System Boot Configuration Working with BCD Editor
Managing the boot configuration data store and its entries
Viewing BCD entries Creating and identifying the BCD store Importing and exporting the BCD store Creating, copying, and deleting BCD entries Setting BCD entry values Changing Data Execution Prevention and physical address extension options Changing the operating system display order Changing the default operating system entry Changing the default timeout Changing the boot sequence temporarily
4. Managing Windows Server 2012 R2
Working with the administration tools
Using Control Panel utilities Using graphical administrative tools Using command-line utilities
Utilities to know Using Net tools Using Windows PowerShell
Working with Server Manager
Getting to know Server Manager Adding servers for management Creating server groups Enabling remote management
Working with Computer Management
Computer Management system tools Computer Management storage tools Computer Management Services And Applications tools
5. Windows Server 2012 R2 MMC administration
Using the MMC
MMC snap-ins MMC modes MMC window and startup MMC tool availability MMC and remote computers
Building custom MMCs
Step 1: Creating the console Step 2: Adding snap-ins to the console Step 3: Saving the finished console
Setting the initial console view before saving Setting the console mode before saving Setting the console icon before saving Saving the console tool
Designing custom taskpads for the MMC
Getting started with taskpads Understanding taskpad view styles Creating and managing taskpads Creating and managing tasks
Creating menu command tasks Creating shell command tasks Creating navigation tasks Arranging, editing, and removing tasks
Publishing and distributing your custom tools
6. Configuring roles, role services, and features
Using roles, role services, and features Making supplemental components available Installing components with Server Manager
Viewing configured roles and role services Managing server roles and features
Adding server roles and features Removing server roles and features
Managing server binaries
Installing components at the prompt
Going to the prompt for Server Management Understanding component names
Tracking installed roles, role services, and features
Installing components at the prompt Removing components at the prompt
7. Managing and troubleshooting hardware
Understanding hardware installation changes
Choosing internal devices Choosing external devices
Installing devices
Understanding device installation Installing new devices Viewing device and driver details
Working with device drivers
Device driver essentials Understanding and troubleshooting driver signing Viewing driver information Viewing Advanced, Resources, and other settings Installing and updating device drivers Restricting device installation by using Group Policy Rolling back drivers Removing device drivers for removed devices Uninstalling, reinstalling, and disabling device drivers
Managing hardware
Adding non–Plug and Play, older hardware Enabling and disabling hardware Troubleshooting hardware Resolving resource conflicts
8. Managing the registry
Introducing the registry Understanding the registry structure Registry root keys
HKEY_LOCAL_MACHINE
HKLM\BCD00000000 HKLM\HARDWARE HKLM\SAM HKLM\SECURITY HKLM\SOFTWARE HKLM\SYSTEM
HKEY_USERS HKEY_CLASSES_ROOT HKEY_CURRENT_CONFIG HKEY_CURRENT_USER
Registry data: How it is stored and used
Where registry data comes from Types of registry data available
Registry administration
Searching the registry Modifying the registry
Modifying values Adding keys and values Removing keys and values
Modifying the registry of a remote machine Importing and exporting registry data Loading and unloading hive files Working with the registry from the command line
Backing up and restoring the registry Maintaining the registry
Using the Microsoft Fix It Utility Removing registry settings for active installations that have failed Removing partial or damaged settings for individual applications
Securing the registry
Preventing access to the registry utilities Applying permissions to registry keys Controlling remote registry access Auditing registry access
9. Software and User Account Control administration
Software installation essentials Mastering User Account Control
Elevation, prompts, and the secure desktop Configuring UAC and Admin Approval Mode
Maintaining application integrity
Application access tokens Application run levels Configuring run levels Controlling application installation and run behavior
10. Performance monitoring and tuning
Tuning performance, memory usage, and data throughput
Tuning Windows operating system performance Tuning processor scheduling Tuning virtual memory Other important tuning, memory, and data considerations
Tracking a system’s general health
Monitoring essentials Getting processor and memory usage for troubleshooting Getting information on running applications Monitoring and troubleshooting processes Monitoring and troubleshooting services Getting network usage information Getting information on user and remote user sessions
Tracking events and troubleshooting by using Event Viewer
Understanding the event logs Accessing the event logs and viewing events Viewing event logs on remote systems Sorting, finding, and filtering events
Sorting the event logs Searching the event logs Filtering the event logs
Archiving event logs Tracking events using Windows PowerShell Using subscriptions and forwarded events
11. Comprehensive performance analysis and logging
Establishing performance baselines
Tracking per-process resource usage
Getting an overview of resource utilization Tracking per-process CPU utilization Tracking per-process memory utilization Tracking per-process disk utilization Tracking per-process network utilization
Tracking the overall reliability of the server
Comprehensive performance monitoring
Using Performance Monitor Selecting performance objects and counters to monitor Choosing views and controlling the display Monitoring performance remotely
Resolving performance bottlenecks
Resolving memory bottlenecks Resolving processor bottlenecks Resolving disk I/O bottlenecks Resolving network bottlenecks
Performance logging
Creating and managing data collector sets
Using data collector templates Collecting performance counter data Collecting performance trace data Collecting configuration data
Viewing data collector reports Configuring performance counter alerts Monitoring performance from the command line Analyzing trace logs at the command line
12. Storage management essentials
Essential storage technologies
Using internal and external storage devices Storage-management features and tools Storage-management role services Booting from SANs and using SANs with clusters Working with SMB 3.0
Installing and configuring file services
Configuring the File And Storage Services role Configuring multipath I/O
Adding and removing multipath hardware devices Managing and maintaining MPIO
Meeting performance, capacity, and availability requirements Configuring Hyper-V
Understanding Hyper-V Installing Hyper-V Creating virtual machines
13. Configuring disks and storage
Configuring storage
Using the Disk Management tools Adding new disks Using the MBR and GPT partition styles
Working with MBR disks Working with GPT disks Understanding legacy and protective MBRs Using and converting MBR and GPT disks
Using the disk storage types
Working with basic and dynamic disks Using and converting basic and dynamic disks
Creating and managing virtual hard disks for Hyper-V Converting FAT or FAT32 to NTFS Working with removable disks
Managing MBR disk partitions on basic disks
Creating partitions and simple volumes Formatting a partition, logical drive, or volume Configuring drive letters Configuring mount points Extending partitions Shrinking partitions Deleting a partition, logical drive, or volume
Managing GPT disk partitions on basic disks
ESP MSR partitions Primary partitions LDM Metadata and LDM Data partitions OEM or unknown partitions
Managing volumes on dynamic disks
Creating a simple or spanned volume Configuring RAID 0: Striping Recovering a failed simple, spanned, or striped disk Moving dynamic disks Configuring RAID 1: Disk mirroring
Creating a mirrored set by using two new disks Adding a mirror to an existing volume
Mirroring boot and system volumes
Mirroring boot and system volumes on MBR disks Mirroring boot and system volumes on GPT disks
Configuring RAID 5: Disk striping with parity Breaking or removing a mirrored set Resolving problems with mirrored sets Repairing a mirrored system volume
Rebuilding mirrored system volumes on MBR disks Rebuilding mirrored system volumes on GPT disks
Resolving problems with RAID-5 sets
14. TPM and BitLocker Drive Encryption
Working with trusted platforms Managing TPM
Understanding TPM states and tools Managing TPM owner authorization information Preparing and initializing a TPM for first use Turning an initialized TPM on or off Clearing the TPM Changing the TPM owner password
Introducing BitLocker Drive Encryption
BitLocker essentials BitLocker modes BitLocker changes
Using hardware encryption, secure boot, and Network Unlock
Hardware-encrypted drives Optimizing encryption Setting permitted encryption types Preparing BitLocker for startup authentication and secure boot Using Network Unlock Provisioning BitLocker prior to deployment
Deploying BitLocker Drive Encryption Setting up and managing BitLocker Drive Encryption
Configuring and enabling BitLocker Drive Encryption Determining whether a computer has BitLocker-encrypted volumes Enabling BitLocker on fixed data drives Enabling BitLocker on removable data drives Enabling BitLocker on operating-system volumes Managing and troubleshooting BitLocker
Recovering data protected by BitLocker Drive Encryption Disabling or turning off BitLocker Drive Encryption
15. File system essentials
Understanding the disk and file-system structure Using FAT
File allocation table structure FAT features
Using NTFS
NTFS structure NTFS features Analyzing the NTFS structure
Advanced NTFS features
Hard links Data streams Change journals Object identifiers Reparse points Sparse files Transactional NTFS
Using ReFS
ReFS features ReFS structures ReFS advantages ReFS integrity streams, data scrubbing, and salvage
Using file-based compression
NTFS compression Compressed (zipped) folders
16. Maintaining and optimizing storage
Managing NTFS disk quotas
How quota management works Configuring disk quotas Customizing quota entries for individual users Managing disk quotas after configuration Exporting and importing quota entries
Automated disk maintenance
Preventing disk-integrity problems Running Check Disk interactively Analyzing FAT volumes by using ChkDsk Analyzing NTFS volumes by using ChkDsk Repairing volumes and marking bad sectors by using ChkDsk
Automated optimization of disks
Preventing fragmentation of disks Fixing fragmentation by using Optimize Drives Understanding the fragmentation analysis
17. Managing storage spaces
Understanding storage spaces Using and configuring offloaded transfers
Understanding how offloaded transfers work Verifying support for offloaded transfers
Working with available storage
Storage Management Essentials Creating storage pools and allocating space Creating storage spaces Creating a virtual disk in a storage space Creating a standard volume Diagnosing and resolving problems with storage spaces
Configuring data deduplication
Understanding data deduplication Selecting data for deduplication Interoperability with data deduplication Deduplicating volumes Monitoring deduplication
18. Managing file sharing
File-sharing essentials
Understanding file-sharing models Enabling file sharing Using and finding shares Navigating SMB versions Hiding and controlling share access Special and administrative shares
C$, D$, E$, and other drive shares ADMIN$ FAX$ IPC$ NETLOGON PRINT$ SYSVOL
Accessing shares for administration
Creating and publishing shared folders
Creating shares by using File Explorer Creating shares by using Computer Management Creating shared folders in Server Manager Changing shared folder settings Publishing shares in Active Directory
Managing share permissions
Understanding share permissions Configuring share permissions
Configuring synced sharing
Understanding Work Folders and sync shares Deploying sync shares through Group Policy Creating sync shares and enabling SMB access Accessing Work Folders on clients
19. File security, access controls, and auditing
Managing access permissions
File and folder ownership Permission inheritance for files and folders
Changing shaded permissions and stopping inheritance Resetting and replacing permissions
Configuring access permissions
Basic permissions Special permissions
Troubleshooting permissions
Managing file shares after configuration Managing claims-based access controls
Understanding central access policies Enabling dynamic controls and claims-based policy Defining central access policies
Auditing file and folder access
Enabling basic auditing for files and folders Enabling advanced auditing Specifying files and folders to audit Extending access policies to auditing Monitoring the security logs
20. Managing file screening and storage reporting
Understanding file screening and storage reporting Managing file screening and storage reporting
Managing global file-resource settings
Configuring email notifications Configuring notification limits Reviewing reports and configuring storage-report parameters Configuring report locations Configuring file-screen auditing Configuring classification Enabling access-denied assistance
Managing the file groups to which screens are applied Managing file-screen templates Creating file screens Defining file-screening exceptions Scheduling and generating storage reports
A. About the author Index About the Author Copyright
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion