Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Contents at a Glance
Table of Contents
Foreword
About the Authors
Dedication
Acknowledgments
We Want to Hear from You!
Reader Services
Introduction
How This Book Is Organized
Part I: Windows Server 2016 Overview
Chapter 1. Windows Server 2016 Technology Primer
Windows Server 2016 Defined
Windows Server 2016 Under the Hood
Visual Changes in Windows Server 2016
Windows Server 2016 as an Application Server
Windows Server 2016 Active Directory
When Is the Right Time to Migrate?
Adding a Windows Server 2016 System to a Windows Server 2008 or Later Environment
Migrating from Windows Server 2008 and Windows Server 2012/R2 Active Directory to Windows Server 2016 Active Directory
Versions of Windows Server 2016
Windows Server 2016 Standard Edition
Windows Server 2016 Datacenter Edition
Windows Server 2016 Server Core
Nano Server
Improvements for Continuous Availability
No Single Point of Failure in Clustering
Stretched Clusters
64-Node Clusters
Hyper-V Replication
Cluster-Aware Updating
DHCP Failover
Improved Support for SANs
Enhancements for Flexible Identity and Security
Increased Support for Standards
Enhancing the Windows Server 2016 Security Subsystem
Server Core and Minimized User Interface
Dynamic Access Control
DNSSEC—Zone Signing
Transport Security Using IPSec and Certificate Services
Security Policies, Policy Management, and Policy Enforcement Tools
BitLocker for Server Security
Windows Rights Management Services
Active Directory Unification for Various Directory Services
Enabling Users to Work Anywhere
Windows Server 2016 DirectAccess
RODCs for the Branch Office
BranchCache File Access
Improvements for Thin-Client Remote Desktop Services
Improvements in Remote Desktop Client
RDS Web Access
RDS Gateway
RDS RemoteApps
Remote Desktop Virtualization Host for VDI
Windows to Go
Simplifying the Datacenter
Server Manager Tool
Improvements in Distributed Administration
PowerShell for Administrative Tasks
Active Directory Administrative Center
Storage Spaces
Improvements in Group Policy Management
IP Address Management
Managing Windows 2016 with Performance and Reliability Monitoring Tools
Leveraging the Best Practice Analyzer
Windows Deployment Services Integration
Distributed File System
Addition of Migration Tools
Operating System Migration Tools
Server Role Migrations
Identifying Which Windows Server 2016 Service to Install or Migrate to First
Windows Server 2016 Core to an Active Directory Environment
Windows Server 2016 Running Built-In Application Server Functions
Utilizing Windows Server 2016 to Run Business Critical Server Applications
Summary
Best Practices
Chapter 2. Planning, Prototyping, Migrating, and Deploying Windows Server 2016
Determining the Scope of Your Project
Identifying the Business Goals and Objectives to Implement Windows Server
High-Level Business Goals
Business Unit or Departmental Goals
Identifying the Technical Goals and Objectives to Implement Windows Server
Defining the Scope of the Work
Determining the Time Frame for Implementation or Migration
Defining the Participants of the Design and Deployment Teams
The Discovery Phase: Understanding the Existing Environment
Understanding the Geographical Depth and Breadth
Managing Information Overload
The Design Phase: Documenting the Vision and the Plan
Collaboration Sessions: Making the Design Decisions
Organizing Information for a Structured Design Document
Windows Server 2016 Design Decisions
Agreeing On the Design
The Migration Planning Phase: Documenting the Process for Migration
Time for the Project Plan
Speed Versus Risk
Creating the Migration Document
The Prototype Phase: Creating and Testing the Plan
How Do You Build the Lab?
Results of the Lab Testing Environment
The Pilot Phase: Validating the Plan to a Limited Number of Users
The First Server in the Pilot
Rolling Out the Pilot Phase
Fixing Problems in the Pilot Phase
Documenting the Results of the Pilot
The Migration/Implementation Phase: Conducting the Migration or Installation
Verifying End-User Satisfaction
Supporting the New Windows Server 2016 Environment
Summary
Best Practices
The Discovery Phase
The Design Phase
The Migration Planning Phase
The Prototype Phase
The Pilot Phase
The Migration/Implementation Phase
Chapter 3. Installing Windows Server 2016 and Server Core
Planning for a Server Installation
Minimum Hardware Requirements
Choosing the Appropriate Windows Edition
Choosing a New Installation or an Upgrade
Determining the Type of Server to Install
Preparing Configuration Information
Backing Up Files
Installing a Clean Version of Windows Server 2016 Operating System
Customizing the Language, Time, Currency, and Keyboard Preferences
The Install Now Page
Selecting the Type of Operating System to Install
Accepting the Terms of the Windows Server 2016 License
Selecting the Type of Windows Server 2016 Installation
Selecting the Location for the Installation
Finalizing the Installation and Customizing the Configuration
Upgrading to Windows Server 2016
Backing Up the Server
Verifying System Compatibility
Ensuring the Drivers Are Digitally Signed
Performing Additional Tasks
Performing the Upgrade
Understanding Server Core Installation
Installing Server Core
Managing and Configuring a Server Core Installation
Launching the Command Prompt in a Server Core Installation
Changing the Server Core Administrator’s Password
Changing the Server Core Machine Name
Assigning a Static IPV4 IP Address and DNS Settings
Adding the Server Core System to a Domain
Activating the Server Core System
Using SCONFIG to Configure a Server Core Installation
Server Core Roles and Feature Installations
Installing the Active Directory Domain Services Role
Performing an Unattended Windows Server 2016 Installation
Nano Server
What Is Nano Server?
Deploying a Nano Server
Configuring Nano Server After Deployment
Connect to Nano Server Using PowerShell Direct
Summary
Best Practices
Part II: Windows Server 2016 Active Directory
Chapter 4. Active Directory Domain Services Primer
The Evolution of Directory Services
Reviewing the Original Microsoft Directory Systems
Outlining the Key Features of Active Directory Domain Services
Understanding the Development of AD DS
Detailing Microsoft’s Adoption of Internet Standards
AD DS Structure
Understanding the AD DS Domain
Describing AD DS Domain Trees
Describing Forests in AD DS
Understanding the AD DS Authentication Modes
Outlining Functional Levels in Windows Server 2016 AD DS
Outlining AD DS Components
Understanding AD DS X.500 Roots
Conceptualizing the AD DS Schema
Defining the Lightweight Directory Access Protocol
Detailing Multimaster Replication with AD DS Domain Controllers
Global Catalog and Global Catalog Servers
Defining the Operations Master Roles
Understanding Domain Trusts
Conceptualizing Transitive Trusts
Explicit Trusts
Defining Organizational Units
Determining Domain Usage Versus OU Usage
Outlining the Role of Groups in an AD DS Environment
Choosing Between OUs and Groups
Understanding AD DS Replication
Sites, Site Links, and Site Link Bridgeheads
Understanding Originating Writes
Using PowerShell Replication Commandlets in Windows Server 2016
Outlining the Role of DNS in AD DS
Examining DNS Namespace Concepts
Dynamic DNS
Comparing Standard DNS Zones and AD-Integrated DNS Zones
How AD DS DNS Works with Foreign DNS
Outlining AD DS Security
Understanding Kerberos Authentication
Taking Additional Security Precautions
Getting Familiar with AD DS Features in Windows Server 2016
Restoring Deleted AD DS Objects Using the Active Directory Recycle Bin
Restarting AD DS on a Domain Controller
Implementing Multiple Password Policies per Domain
Auditing Changes Made to AD Objects
Reviewing Additional Active Directory Services
Examining Additional Windows Server 2016 AD DS Features
Reviewing Legacy Windows Server Active Directory Improvements
Summary
Best Practices
Chapter 5. Designing a Windows Server 2016 Active Directory
Understanding AD DS Domain Design
Examining Domain Trusts
Choosing a Domain Namespace
Choosing an External (Published) Namespace
Choosing an Internal Namespace
Examining Domain Design Features
Choosing a Domain Structure
Understanding the Single-Domain Model
Choosing the Single-Domain Model
Exploring a Single-Domain Real-World Design Example
Understanding the Multiple-Domain Model
Deciding When to Add Additional Domains
Exploring a Multiple-Domain Real-World Design Example
Understanding the Multiple Trees in a Single-Forest Model
Deploying a Multiple-Tree Domain Model
Exploring a Multiple-Tree Domain Real-World Design Example
Reviewing the Federated-Forests Model
Choosing Federated Forests
Federated-Forests Real-World Design Example
Understanding the Empty-Root Domain Model
Determining When to Choose the Empty-Root Model
Exploring a Real-World Empty-Root Domain Design Example
Understanding the Placeholder Domain Model
Exploring a Placeholder Domain Real-World Design Example
Understanding the Special-Purpose Domain Model
Exploring a Special-Purpose Domain Real-World Design Example
Renaming an AD DS Domain
Domain Rename Limitations
Outlining Domain Rename Prerequisites
Renaming a Domain
Summary
Best Practices
Chapter 6. Designing Organizational Unit and Group Structure
Defining Organizational Units in AD DS
Defining AD Groups
Outlining Group Types: Security or Distribution
Understanding Group Scope
OU and Group Design
Starting an OU Design
Overuse of OUs in Domain Design
OU Flexibility
Using OUs to Delegate Administration
Group Policies and OU Design
Understanding Group Design
Detailing Best Practice for Groups
Establishing Group Naming Standards
Group Nesting
Designing Distribution Groups
Exploring Sample Design Models
A Business Function-Based Design
Understanding Geographically Based Design
Summary
Best Practices
Chapter 7. Active Directory Infrastructure
Understanding AD DS Replication in Depth
The Role of Replication in AD DS
Outlining Multimaster Topology Concepts
Explaining Update Sequence Numbers
Resolving Replication Collisions
Applying Property Version Numbers
Establishing Connection Objects
Understanding Replication Latency
Understanding Active Directory Sites
Windows Server 2016 Site Functionality
Associating Subnets with Sites
Creating Site Links
Turning Off Site Link Bridging
Understanding the Knowledge Consistency Checker and the Intersite Topology Generator
Determining Site Cost
Utilizing Preferred Site Link Bridgeheads
Deploying AD DS DCs on Server Core
Planning Replication Topology
Mapping Site Design into Network Design
Establishing Sites
Choosing Between One Site or Many Sites
Optimizing Subnet Site Associations
Determining Site Links and Site Link Costs
Choosing Replication Scheduling
Choosing SMTP or IP Replication
Windows Server 2016 Replication
DC Promotion from Media
Identifying Linked-Value Replication/Universal Group Membership Caching
Removing Lingering Objects
Disabling Replication Compression
Understanding How AD Avoids Full Synchronization of Global Catalog with Schema Changes
The Intersite Topology Generator Algorithm
Windows Server 2016 IPv6 Support
Defining the Structure of IPv6
Understanding IPv6 Addressing
Migrating to IPv6
Making the Leap to IPv6
Detailing Real-World Replication Designs
Viewing a Hub-and-Spoke Replication Design
Decentralized Replication Design
Deploying Read-Only Domain Controllers
Understanding the Need for RODCs
Features of RODCs
Deploying an RODC
Deploying a Clone Virtualized DC
Prerequisites for Virtualized DC Cloning
Adding the Source Virtual DC to the Cloneable DC Group
Running the Excluded App List and New Clone Config File Commandlet
Exporting and Importing the Source DC Virtual Machine
Restarting the Source DC and Bringing the Clone DC Online
Summary
Best Practices
Chapter 8. Creating Federated Forests and Lightweight Directories
Keeping a Distributed Environment in Sync
Active Directory Lightweight Directory Services
Understanding the Need for AD LDS
Features of AD LDS
Installing AD LDS
Active Directory Federation Services
Understanding the Key Components of AD FS
Installing AD FS with Windows Server 2016
Working with AD FS
Synchronizing Directory Information with Microsoft Identity Manager
Understanding MIM
Understanding MIM Concepts
Exploring MIM Account Provisioning
Understanding the Role of Management Agents in MIM
Managing Groups with MIM
Harnessing the Power and Potential of MIM
Managing Identities with MIM
Provisioning and Deprovisioning Accounts with MIM
Summary
Best Practices
Part III: Networking Services
Chapter 9. Domain Name System, WINS, and DNSSEC
The Need for DNS
History of DNS
Establishing a Framework for DNS
Explaining the DNS Hierarchy
The DNS Namespace
Getting Started with DNS on Windows Server 2016
Installing DNS Using the Add Roles Wizard
Resource Records
Start of Authority (SOA) Records
Host (A) Records
Name Server (NS) Records
Service (SRV) Records
Mail Exchanger (MX) Records
Pointer (PTR) Records
Canonical Name (CNAME) Records
Other DNS Record Types
Understanding DNS Zones
Forward Lookup Zones
Reverse Lookup Zones
Primary Zones
Secondary Zones
Stub Zones
Performing Zone Transfers
Performing Full Zone Transfers
Initiating Incremental Zone Transfers
Understanding DNS Queries
Performing Recursive Queries
Performing Iterative Queries
Other DNS Components
Dynamic DNS
The Time-to-Live Value
Performing Secure Updates
Exploring Aging and Scavenging for DNS
Examining Root Hints
Understanding the Role of Forwarders
Using WINS for Lookups
Understanding the Evolution of Microsoft DNS
Active Directory-Integrated Zones
Dynamic Updates
Unicode Character Support
DNS in Windows Server 2016
Application Partition
Automatic Creation of DNS Zones
Fix to the “Island” Problem
Forest Root Zone for _msdcs
DNS in an Active Directory Domain Services Environment
The Impact of DNS on AD DS
AD DS in Non-Microsoft DNS Implementations
Using Secondary Zones in an AD DS Environment
SRV Records and Site Resolution
GlobalNames Zone
Troubleshooting DNS
Using the DNS Event Viewer to Diagnose Problems
Using Performance Monitor to Monitor DNS
Client-Side Cache and HOST Resolution Problems
Using the Nslookup Command-Line Utility
Using the Ipconfig Command-Line Utility
Using the Tracert Command-Line Utility
Using the DNSCmd Command-Line Utility
Managing DNS with PowerShell
Secure DNS with DNSSEC
DNSSEC Components
Important Performance Considerations for DNSSEC
Configuring a DNSSEC Zone
Reviewing the Windows Internet Naming Service
Understanding the Need for Legacy Microsoft NetBIOS Resolution
Installing and Configuring WINS
Installing WINS
Configuring Push/Pull Partners
Examining WINS Replication
Understanding NetBIOS Client Resolution and the LMHOSTS File
Planning, Migrating, and Maintaining WINS
Upgrading a WINS Environment
Exploring WINS and DNS Integration
Summary
Best Practices
Chapter 10. DHCP, IPv6, IPAM
Understanding the Components of an Enterprise Network
The Importance of Network Addressing
Name Resolution
Name Resolution and Directory Integration
DHCP Failover
Windows Server 2016 IPAM Overview
Exploring DHCP
The Need for DHCP
Outlining DHCP Predecessors: RARP and BOOTP
Exploring the DHCP Server Service
Examining the DHCP Client Service
Automatic Private IP Addressing
DHCP Relay Agents
DHCP and Dynamic DNS Integration
Installing DHCP Server and Server Tools
Creating IPv4 DHCP Scopes
Exploring DHCP Changes in Windows Server 2016
Migrating DHCP Servers Using Windows Server Migration Tools
Migrating DHCP Services from 2012 R2 to Windows Server 2016
Understanding DHCP Client Alternate Network Capability
Enhancing DHCP Reliability
Link-Layer Filtering
DHCP Reservations
DHCP Name Protection
DHCP and Dynamic DNS Configuration
Access DHCP Activity and Event Logs
Implementing Redundant DHCP Services
Windows Server 2016 DHCP Failover
Exploring Advanced DHCP Concepts
Understanding DHCP Superscopes
Examining DHCP Multicast Scopes
Delegating Administration of DHCP
DHCP Netsh and PowerShell Administration
Securing DHCP
IPv6 Introduction
IPv6 Addressing
Comprehending IPv6 Addressing
IPv6 Transition Technologies
Configuring IPv6 on Windows Server 2016
Creating an IPv6 Subnet in Active Directory
Manually Setting the IPv6 Address on Windows Server 2016
Creating IPv6 DNS Records and Zones
Setting Up Windows Server 2016 DHCP IPv6 Scopes
IP Address Management
IP Address Tracking Today
Installing the IPAM Server and Client Features
Connecting to the IPAM Server
Configuring IPAM Server Provisioning
Configuring Servers for IPAM Management
Configuring Server Discovery
Defining Discovered Servers as IPAM Managed
Defining IP Address Blocks
Collecting Server Data
Exploring the IPAM Console
Overview Node
Server Inventory Node
IP Address Space Node
IP Address Block Node
IP Address Inventory Node
IP Address Ranges Node
Monitor and Manage Node
DNS and DHCP Servers
DHCP Scopes Node
DNS Zone Monitoring Node
Event Catalog Node
Summary
Best Practices
Chapter 11. Internet Information Services
Understanding Internet Information Services 10
IIS 10 Advanced Functionality
Understanding the IIS Manager Tools
Exploring the IIS Manager Administration Panes
IIS Manager Administration Nodes in the Connections Pane
Planning and Designing IIS 10
Determining Server Requirements
Determining Fault-Tolerance Requirements
Installing and Upgrading IIS 10
Understanding the Modular Approach to Installing IIS 10
Installing the Web Server (IIS) Role
Upgrading from Other Versions of IIS
Installing and Configuring Websites
Creating a Website with IIS 10
Creating a Virtual Directory
Configuring IIS 8 Website Properties
Installing and Configuring FTP Services
IIS 10 FTP Server Service Features
Installing the FTP Server
Creating a Secure FTP 10 Site Using SSL
Configuring FTP 10 Features and Properties
Securing IIS 10
Windows Server 2016 Security
IIS Authentication
Auditing Web Services
Using SSL Certificates
Administering IIS 10 Administrator and User Security
Creating an IIS 10 User Account
Assigning Permissions to an IIS 10 User Account
Configuring Feature Delegation
Using IIS Logging
Summary
Best Practices
Part IV: Security
Chapter 12. Server-Level Security
Defining Windows Server 2016 Security
Common Language Runtime
Understanding the Layered Approach to Server Security
Deploying Physical Security
Restricting Physical Access
Restricting Logon Access
Using Smart Cards for Logon Access
Securing Wireless Networks
Firewall Security
Using the Integrated Windows Firewall with Advanced Security
Understanding Windows Firewall Integration with Server Manager
Creating Inbound and Outbound Rules on the Windows Firewall
Hardening Servers
Defining Server Roles
Securing a Server Using Server Manager
Reducing Attack Surface
AppLocker
Using Administration-Only Accounts with Run As
Examining File-Level Security
Understanding File System Security
Dynamic Access Control
Examining Share-Level Security
Auditing File Access
Encrypting Files with the Encrypting File System
BitLocker for Servers
Malware and Backup Protection
Antivirus Precautions
Trusted Boot Architecture with Secure Boot, AM Preloading, and Measured Boot
Deploying Backup Security
Windows Server Update
Understanding the Background of WSUS: Windows Update
Understanding the Automatic Updates Client
Understanding the Development of Windows Server Update Services
Examining WSUS Prerequisites
Installing WSUS on a Windows Server 2016 Server
Automatically Configuring Clients via Group Policy
Deploying Security Patches with WSUS
Summary
Best Practices
Chapter 13. Securing Data in Transit
Introduction to Securing Data in Transit in Windows Server 2016
The Need for Another Layer of Security
Deploying Security Through Multiple Layers of Defense
Understanding Encryption Basics
Deploying a Public Key Infrastructure with Windows Server 2016
Defining Private Key Versus Public Key Encryption
Exploring Digital Certificates
Understanding Active Directory Certificate Services in Windows Server 2016
Reviewing the CA Roles in AD CS
Detailing the Role Services in AD CS
Installing AD CS
Configuring Auto-Enrollment
Using Smart Cards in a Public Key Infrastructure
Using the Encrypting File System
Integrating PKI with Non-Microsoft Kerberos Realms
Active Directory Rights Management Services
Understanding the Need for AD RMS
Understanding AD RMS Prerequisites
Installing AD RMS
Using IPsec Encryption with Windows Server 2016
Understanding the IPsec Principle
Detailing Key IPsec Functionality
Exploring IPsec NAT Traversal
Summary
Best Practices
Chapter 14. Network Policy and Access Services, Routing and Remote Access and DirectAccess
Installing a Network Policy Server
Understanding RADIUS Support on a Network Policy Server
Deploying a Virtual Private Network Using RRAS
Exploring VPN Tunnels
Tunneling Protocols
PPTP and L2TP Protocols
L2TP/IPSec Secure Protocol
Enabling VPN Functionality on a Remote-Access Server
Modifying the Remote Access Network Policy
Configuring DirectAccess
Summary
Best Practices
Part V: Migrating to Windows Server 2016
Chapter 15. Migrating to Active Directory 2016
Beginning the Migration Process
Identifying Migration Objectives
Establishing Migration Project Phases
Comparing the In-Place Upgrade Versus New Hardware Migration Methods
Identifying Migration Strategies: “Big Bang” Versus Phased Coexistence
Exploring Migration Options
Big Bang Migration
Verifying Hardware Compatibility
Verifying Application Readiness
Backing Up and Creating a Recovery Process
Virtual DC Rollback Option
Performing an Upgrade on a Single DC Server
Phased Migration
Migrating DCs
Preparing the Forest and Domains Using Adprep
Upgrading Existing Domain Controllers
Replacing Existing Domain Controllers
Moving Operation Master Roles
Retiring Existing Windows Server DCs
Retiring “Phantom” DCs
Upgrading Domain and Forest Functional Levels
Moving AD-Integrated DNS Zones to Application Partitions
Multiple Domain Consolidation Migration
Understanding ADMT Functionality
Using ADMT in a Lab Environment
ADMT v3.2 Installation Procedure
ADMT Domain Migration Prerequisites
Exporting Password Key Information
Installing PES on the Source Domain
Setting Proper Registry Permissions
Configuring Domains for SID Migration
Migrating Groups
Migrating User Accounts
Migrating Computer Accounts
Migrating Other Domain Functionality
Summary
Best Practices
Chapter 16. Compatibility Testing
The Importance of Compatibility Testing
Preparing for Compatibility Testing
Determining the Scope for Application Testing
Defining the Goals for Compatibility Testing
Documenting the Compatibility Testing Plan
Researching Products and Applications
Taking Inventory of Network Systems
Taking Inventory of Applications on Existing Servers
Understanding the Differences Between Applications and Windows Services
Completing an Inventory Sheet per Application
Prioritizing the Applications on the List
Verifying Compatibility with Vendors
Tracking Sheets for Application Compatibility Research
Six States of Compatibility
Creating an Upgrade Decision Matrix
Assessing the Effects of the Compatibility Results on the Compatibility Testing Plan
Microsoft Assessment and Planning Toolkit
Lab-Testing Existing Applications
Allocating and Configuring Hardware
Allocating and Configuring Windows Server 2016
Loading the Remaining Applications
Certified for Windows Server 2016
Testing the Migration and Upgrade Process
Documenting the Results of the Compatibility Testing
Determining Whether a Prototype Phase Is Required
Summary
Best Practices
Part VI: Windows Server 2016 Administration and Management
Chapter 17. Windows Server 2016 Administration
Defining the Administrative Model
The Centralized Administration Model
The Distributed Administration Model
The Mixed Administration Model
Examining Active Directory Site Administration
Sites
Subnets
Site Links
Site Group Policies
Configuring Sites
Creating a Site
Establishing Site Links
Delegating Control at the Site Level
Windows Server 2016 Active Directory Groups
Group Types
Group Scopes in Active Directory
Creating Groups
User Administration in a Single Domain
User Administration in a Multidomain Forest
Domain Functional Level and Groups
Creating AD Groups
Populating Groups
Group Management
Managing Users with Local Security and Group Policies
Viewing Policies with the Group Policy Management Console
Creating New Group Policies
Configuring and Optimizing Group Policy
Troubleshooting Group Policy Applications
Managing Printers with the Print Management Console
Installing the Print Management Console
Configuring the Print Management Console
Adding New Printers as Network Shared Resources
Adding Print Servers to the Print Management Console
Using the Print Management Console
Summary
Best Practices
Chapter 18. Windows Server 2016 Group Policies and Policy Management
Group Policy Overview
Group Policy Processing: How Does It Work?
Computer GPO Processing
User GPO Processing
Network Location Awareness
Group Policy Client-Side Extensions
Tuning Group Policy Processing with GPO Settings
Local Group Policies
Local Computer Policy
Local User Policies for Nonadministrators and Administrators
Domain-Based Group Policies
Security Templates
Understanding Group Policy
Group Policy Objects
GPO Storage and Replication
The Group Policy Central Store
Starter GPOs
Policy Settings
Preference Settings
GPO Links
Group Policy Link Enforcement
Group Policy Inheritance
Group Policy Block Inheritance
Group Policy Order of Processing
GPO Filtering
Group Policy Loopback Processing
Group Policy Slow-Link Detection and Network-Location Awareness
Group Policy Policies Node
Group Policy Administrative Templates
Group Policy Preferences Node
Policy Management Tools
Group Policy Management Console
Group Policy Object Editor
Group Policy Management Editor
Group Policy Starter GPO Editor
Print Management Console
Gpupdate.exe
Group Policy Update from GPMC
Group Policy Infrastructure Status
PowerShell Management of Group Policies
Event Viewer
DFS Management
Designing a Group Policy Infrastructure
Active Directory Design and Group Policy
Separation of GPO Functions
Separation of GPO by Targeting Operating System
GPO Administrative Tasks
Installing the Group Policy Management Tools
Creating a GPO Central Store
Creating and Using Starter GPOs
Creating New Domain Group Policies
Creating and Configuring GPO Links
Managing GPO Status
Managing GPO Security Filtering
Creating and Linking WMI Filters to GPOs
Managing GPO Link Order of Processing
Viewing GPO Settings and Creating Reports
Backing Up and Restoring Domain GPOs
Group Policy Modeling Operations
Troubleshooting Group Policies
GPO Administrative Delegation
Summary
Best Practices
Chapter 19. Windows Server 2016 Management and Maintenance Practices
Going Green with Windows Server 2016
Server Manager Dashboard
Managing Windows Server 2016 Roles and Features
Roles in Windows Server 2016
Features in Windows Server 2016
Creating a Server Group
Viewing Events
Server Manager Performance Monitor
Device Manager
Task Scheduler
Services and Applications
WMI Control
Windows Firewall with Advanced Security
Server Manager Storage Page
Windows Server Backup
Disk Management
Auditing the Environment
Audit Policies
Audit Policy Subcategories
Auditing Resource Access
Managing Windows Server 2016 Remotely
Server Manager Remote Management
Remote Server Administration Tools
Windows Remote Management
PowerShell
Print Management Console
Common Practices for Securing and Managing Windows Server 2016
Identifying Security Risks
Using System Center Operations Manager 2012 R2 to Simplify Management
Leveraging Windows Server 2016 Maintenance Practices
Keeping Up with Service Packs and Updates
Manual Update or DVD Update
Automatic Updates
Windows Server Update Services
Maintaining Windows Server 2016
Daily Maintenance
Weekly Maintenance
Monthly Maintenance
Quarterly Maintenance
Summary
Best Practices
Chapter 20. Automating Tasks Using PowerShell Scripting
Understanding Shells
A Short History of Shells
Introduction to PowerShell
PowerShell Uses
PowerShell Features
PowerShell Features
Understanding PowerShell Fundamentals
Accessing PowerShell
Command-Line Interface
Navigating the CLI
Command Types
.NET Framework Integration
The Pipeline
Modules and Snap-Ins
Remoting
PowerShell ISE
Variables
Aliases
Scopes
Providers and Drives
Security
Using Windows PowerShell
Exploring PowerShell
Managing Services
Gathering Event Log Information
Managing the Files and Directories
Managing the Registry
Managing Processes
Using WMI and CIM
Using Snap-Ins
Using Modules
Using Remoting
Using the New-Object Commandlet
Summary
Best Practices
Chapter 21. Documenting a Windows Server 2016 Environment
Benefits of Documentation
Organizational Benefits
Financial Benefits
Types of Documents
Planning to Document the Windows Server 2016 Environment
Knowledge Sharing and Knowledge Management
Windows Server 2016 Project Documents
Project Plan
Design and Planning Document
Communication Plan
Migration Plan
Checklists
Training Plan
Test Plan
Pilot Test Plan
Support and Project Completion Document
Administration and Maintenance Documents
Step-by-Step Procedure Documents
Policies
Documented Checklists
Active Directory Infrastructure
Server Build Procedures
Configuration (As-Built) Documentation
Topology Diagrams
Administration Manual
Using Documentation for Troubleshooting Purposes
Procedural Documents
Network Infrastructure
Documenting the WAN Infrastructure
Network Device Documentation
Disaster Recovery Documentation
Disaster Recovery Planning
Backup and Recovery Development
Monitoring and Performance Documentation
Windows System Failover Documentation
Change Management Procedures
Performance Documentation
Baselining Records for Documentation Comparisons
Routine Reporting
Management-Level Reporting
Technical Reporting
Security Documentation
Change Control
Reviewing Reports
Management-Level Reporting for Security Assessments
Summary
Best Practices
Part VII: Remote and Mobile Technologies
Chapter 22. Server-to-Client Remote and Mobile Access
Remote Access in Windows Server 2016
VPN in Windows Server 2016
Components Needed to Create a Traditional VPN Connection
The VPN Client
The RAS Server
The NPS System
Certificate Server
Active Directory
RAS System Authentication Options
Authentication Protocols for PPTP Connections
EAP and PEAP Authentication Protocols
Authentication Protocols for L2TP/IPsec Connections
Choosing the Best Authentication Protocol
VPN Protocols
Tunneling Within a Windows Server 2016 Networking Environment
Point-to-Point Tunneling Protocol
Layer 2 Tunneling Protocol
IP Security
Secure Sockets Tunneling Protocol
DirectAccess in Windows Server 2016
DirectAccess and IPv6
A Tale of Two Tunnels
End-to-Edge DirectAccess Model
End-to-End DirectAccess Model
Managed-Out Support Model
Internet Versus Intranet Traffic with DirectAccess
DirectAccess Components
Network Location Service
DirectAccess Connection Process
Choosing Between Traditional VPN Technologies and DirectAccess
Advantages of L2TP/IPsec
Advantages of PPTP
Advantages of SSTP
Advantages of DirectAccess
Ports Affecting the VPN Connectivity
Setting Up the Unified Remote Access Role
DirectAccess Scenario
Configuring the Infrastructure
Configuring the DirectAccess Feature
Testing DirectAccess
VPN Scenario
Certificate Auto-Enrollment
Configuring the Network Policy Server
Setting Up the RAS Server
Setting Up the VPN Client
Testing the VPN Connection
Monitoring the Remote Access Server
Dashboard
Operations Status
Remote Client Status
Reporting
Summary
Best Practices
Chapter 23. Remote Desktop Services
Why Implement Remote Desktop Services?
Remote Desktop for Administration
Remote Desktop for Users
Remote Desktop for Remote User Support
Remote Desktop for Cloud Service Providers
How Remote Desktop Works
Modes of Operation
Client-Side RDS
Understanding the Name Change
RDS Roles
RD Session Host
RD Virtualization Host
RD Gateway
RD Web Access
RD Connection Broker
RD Licensing
RemoteApp and Desktop Connection
Configuration Options and Fine-Tuning Terminology
Granular Session Configuration Control
Session 0 Isolation
Local Resource Redirection
Single Sign-On
Remote Desktop Connection Display
Planning for RDS
Planning for Remote Desktop for Administration
Planning for RD Session Host Requirements
Planning for RD Session Host Sizing and Optimization
Planning for RD Session Host Upgrades
Planning the Physical Placement of RDS
Planning for Networking Requirements
Planning for RD Session Host Tolerance
Deploying RDS
Enabling Remote Desktop for Administration
Deploying the Remote Desktop Service Role Service
Making Applications Available for User Access
Additional RD Session Host Server Configuration Tasks
Deploying Virtual Desktops
Installing the RD Virtualization Host Role Service and Configuration Settings
Creating a Virtual Desktop Template
Creating a Virtual Desktop Collection
Accessing the VDI Guest Sessions
Enabling RemoteFX
Integrating and Supporting RemoteFX for VDI Guests
Integrating and Supporting RemoteFX for RD Session Host Guests
Securing and Supporting RDS
Securely Building Remote Session Services
Segmenting Resources
Securing RDS with GPOs
Network Level Authentication
Changing the RDP Port
Remotely Managing a Remote Desktop Session
Managing RDS with PowerShell
Group Policy for RD Session Host Servers
Applying Service Packs and Updates
Performing Disaster Recovery
Summary
Best Practices
Part VIII: Desktop Administration
Chapter 24. Windows Server 2016 Administration Tools for Desktops
Managing Desktops and Servers
Operating System Deployment to Bare-Metal Systems
Managing Windows and Security Updates
Supporting End Users and Remote Administration
Operating System Deployment Options
Manual Installation Using Installation Media
Unattended Installation
Manufacturer-Assisted Installation
Cloning or Imaging Systems
Windows Server 2016 Windows Deployment Services
WDS Image Types
Boot Images
Installation Images
Discover Images
Capture Images
Installing Windows Deployment Services
Configuring the WDS Server
DHCP Configuration
Adding a Boot Image to the WDS Server
Adding Install Images to the WDS Server
Deploying the First Install Image
Creating Multicast Images
Customizing Boot Images
Adding Drivers to Boot and Discover Images
WDS Boot and Install Image Troubleshooting
Creating Discover Images
Pre-Creating Active Directory Computer Accounts for WDS (Prestaged Systems)
Creating Custom Installations Using Capture Images
Automating Image Deployment Using Unattend Files
General Desktop Administration Tasks
Summary
Best Practices
Chapter 25. Group Policy Management for Network Clients
The Need for Group Policies
Windows Group Policies
Local Computer Policy
Local Security Policy
Local Administrators and Non-Administrators User Policies
Domain Group Policies
Security Configuration Wizard
Policy Processing Overview
Group Policy Feature Set
Computer Configuration Policy Node
User Configuration Policy Node
Planning Workgroup and Standalone Local Group Policy Configuration
Creating Local Administrators and Non-Administrators Policies
Planning Domain Group Policy Objects
Policies and Preferences
Domain GPOs
Domain Controller GPOs
Active Directory Site GPOs
Small Business
Delegated Administration
Managing Computers with Domain Policies
Creating a New Domain Group Policy Object
Creating and Configuring GPO Links
Managing User Account Control Settings
Creating Application Control Policies (AppLocker)
Configuring Preference Item-Level Targeting
Configuring Remote Desktop and Remote Administration Support
Configuring Basic Firewall Settings with Group Policy
Configuring Windows Update Settings
Configuring Power Options Using Domain Policies
Managing Scheduled Tasks and Immediate Tasks with Domain Policies
Managing Users with Policies
Configuring Folder Redirection
Removable Storage Access
Managing Microsoft Management Console Access
Managing Active Directory with Policies
Fine-Grained Password Policies
Configuring Restricted Groups to manage Computer Local Groups
Synchronous Foreground Refresh
GPO Modeling and GPO Results in the GPMC
Managing Group Policy from Administrative or Remote Workstations
Summary
Best Practices
Chapter 26. Storage
Storage Spaces and Storage Pools
Storage Spaces Direct
Storage Replicas
Storage Quality of Service (QoS)
Windows Disk Properties
Virtual Hard Disks
Managing Windows Server 2016 Disks
The Disk Management MMC Snap-In
Diskpart.exe Command-Line Utility
PowerShell Disk Management Cmdlets
Server Manager File and Storage Services
Adding New Disks and Volumes to Windows
Working with Virtual Hard Disk Files
Configuring Storage Spaces Direct
Creating Virtual Disks
Summary
Best Practices
Part IX: Fault-Tolerance Technologies
Chapter 27. File System Management
File System Access Services and Technologies
Windows Folder Sharing
DFS Namespaces and Replication
WWW Directory Publishing
File Transfer Protocol Service
Server and Client for NFS
Volume Shadow Copy Service
BranchCache for Network Files
Data Deduplication Service
Continuously Available File Shares
Distributed File System
Distributed File System Replication
iSCSI Target Server Service
Adding the File and Storage Services Role
Managing Data Access Using Windows Server 2016 Shares
Share Permissions
Access-Based Enumeration
Share Caching and Offline Files
BranchCache
File Server Resource Manager
Uses of File Server Resource Manager
Leveraging the FSRM Features
The Distributed File System
DFS Namespaces
DFS Replication
DFS Terminology
DFS Replication Terminology
Planning a DFS Deployment
Choosing a DFS Namespace Type
Planning for DFS Replication
Determining the Replication Topology
Installing and Configuring DFS
Creating the DFS Namespace and Root
Adding an Additional Namespace Server to a Domain-Based Namespace
Creating a DFS Folder and Replication Group
Enabling Access-Based Enumeration on a Domain-Based Namespace in Windows Server 2008 Mode
Disabling Replication for Extended Downtime
Using the Volume Shadow Copy Service
Using VSS and Windows Server Backup
Configuring Shadow Copies
Recovering Data Using Shadow Copies
Configuring Data Deduplication
Dynamic Access Control
Creating DAC Claim Types
Configuring DAC Resource Properties
Adding Configured Resource Properties to a Resource Property List
Creating a Central Access Rule
Creating a Central Access Policy
Creating and Assigning a Central Access Policy GPO to File Servers
Enabling Kerberos Armoring for Domain Controllers
Creating and Updating a File Share to Leverage Dynamic Access Control
Configuring User Accounts and Testing Data Access
Summary
Best Practices
Chapter 28. Operational Fault Tolerance (Clustering / Network Load Balancing)
Building Fault-Tolerant Windows Server 2016 Systems
Powering the Computer and Network Infrastructure
Designing Fault-Tolerant IP Networks
Designing Fault-Tolerant Server Disks
Increasing Windows Server 2016 Role Availability
Windows Server 2016 Clustering Technologies
Windows Server 2016 Cluster Terminology
Determining the Correct Clustering Technology
Failover Clusters
Network Load Balancing
Network Teaming
Overview of Failover Clusters
Failover Cluster Quorum Models
Choosing Applications for Failover Clusters
Shared Storage for Failover Clusters
Failover Cluster Node Operating System Selection
Deploying Failover Clusters
Installing the Failover Clustering Feature and Tools
Configuring Disks for Cluster Usage
Running the Validate a Configuration Wizard
Creating a Failover Cluster
Configuring Cluster Networks
Adding Nodes to the Cluster
Adding Storage to the Cluster
Cluster Quorum Configuration
Enabling Cluster Shared Volumes
Deploying Roles on Failover Clusters
Configuring Failover and Failback
Testing Failover Clusters
Failover Cluster Maintenance
Cluster-Aware Updating
Removing Nodes from a Failover Cluster
Cluster Migration and Upgrades
Backing Up and Restoring Failover Clusters
Failover Cluster Node: Backup Best Practices
Restoring an Entire Cluster to a Previous State
Deploying Network Load-Balancing Clusters
NLB Applications and Services
Installing the Network Load-Balancing Feature
Creating Port Rules
Port Rules Filtering Mode and Affinity
Using Cluster Operation Mode
Configuring Network Cards for NLB
Creating an NLB Cluster
Adding Additional Nodes to an Existing NLB Cluster
Managing NLB Clusters
Backing Up and Restoring NLB Nodes
Performing Maintenance on an NLB Cluster Node
Network Teaming
Summary
Best Practices
Chapter 29. Backing Up the Windows Server 2016 Environment
Understanding Your Backup and Recovery Needs and Options
Identifying the Different Services and Technologies
Identifying Single Points of Failure
Evaluating Different Disaster Scenarios
Prioritizing the Recovery
Identifying Bare Minimum Services
Creating the Disaster Recovery Solution
Disaster Recovery Solution Overview Document
Getting Disaster Recovery Solutions Approved
Documenting the Enterprise
Developing a Backup Strategy
Assigning Tasks and Designating Team Members
Creating Regular Backup Procedures
Windows Server Backup Overview
Backup Storage Support and Media Management
Backup Media Files
Backup Options
Windows Server Backup Console
Windows Backup Command-Line Utility
Windows Server Backup PowerShell Cmdlets
Using Windows Server Backup
Installing Windows Server Backup
Scheduling a Backup Using Windows Server Backup and Allocating Disks
Running a Backup to a Shared Network Folder
Storing a Backup on DVD
Managing Backups Using the Command-Line Utility Wbadmin.exe and Windows PowerShell Cmdlets
Viewing Backup History
Running a Manual System-State Backup to Remote Storage Using Wbadmin.exe and PowerShell
Backing Up the System State Using the GUI
Backing Up Active Directory
Exporting Active Directory Object Data Using PowerShell
Accidental-Deletion Protection
Using the Directory Services Restore Mode Password
Active Directory Recycle Bin
Backing Up Windows Server 2016 Roles
Distributed File System Backup
Internet Information Services
Volume Shadow Copy Service
Enabling Shadow Copies for Shared Volumes
Extending Server Backup to the Enterprise with Data Protection Manager 2016
Summary
Best Practices
Chapter 30. Recovering from a Disaster
Ongoing Backup and Recovery Preparedness
Project Management Office
Change Control
Disaster Recovery Delegation of Responsibilities
When Disasters Strike
Qualifying the Disaster or Failure
Validating Priorities
Synchronizing with Business Owners
Communicating with Vendors and Staff
Assigning Tasks and Scheduling Resources
Recovering the Infrastructure
Postmortem Meeting
Disaster Scenario Troubleshooting
Network Outage
Physical Site Failure
Server or System Failure
Recovering from a Server or System Failure
Access Issues
Data Corruption and File and Folder Recovery
Managing and Accessing Windows Server Backup Media
Windows Server Backup Dedicated Disks
Network Shared Folders
Windows Server Backup Volume Recovery
Windows Server 2016 Data Volume Recovery
Windows Server 2016 System Volume Recovery
Windows System Image Recovery
Recovering Role Services and Features
Windows Server 2016 System-State Recovery
Active Directory Recycle Bin Recovery
System-State Recovery for Domain Controllers
Summary
Best Practices
Part X: Optimizing, Tuning, Debugging, and Problem Solving
Chapter 31. Optimizing Windows Server 2016 for Branch Office Communications
Key Branch Office Features in Windows Server 2016
Understanding Read-Only Domain Controllers
Branch Office Concerns and Dilemmas
Understanding When to Leverage RODCs
Installing a Read-Only Domain Controller
Using BitLocker with Windows Server 2016
Understanding BitLocker Drive Encryption in Windows Server 2016
Comprehending BitLocker’s Drive Encryption Hardware Requirements
Understanding BitLocker Deployment Scenarios
Configuring BitLocker Drive Encryption on a Windows Server 2016 Branch Office Domain Controller
Installing the BitLocker Drive Encryption Feature
Configuring the System Partitions for BitLocker
Enabling BitLocker Drive Encryption
Utilizing the BitLocker Recovery Password
Removing BitLocker Drive Encryption
BranchCache in Windows Server 2016
Features in Windows Server 2016 BranchCache
Planning and Deploying BranchCache
Printing with Branch Office Direct Printing
Configuring Windows Server 2016 for Branch Office Direct Printing
Summary
Best Practices
Chapter 32. Logging and Debugging
Using the Task Manager for Logging and Debugging
Monitoring Processes
Monitoring Performance
Monitoring User Activity
Monitoring Details
Monitoring Services
Related PowerShell Functionality
Examples
Using Event Viewer for Logging and Debugging
Examining the Event Viewer User Interface
Conducting Additional Event Viewer Management Tasks
Related PowerShell Functionality
Performance Monitoring
Performance Monitor Overview
Performance Monitor
Data Collector Sets
Reports
Resource Monitor
Related PowerShell Functionality
Server Manager
Setting Baseline Values
Reducing Performance Monitoring Overhead
Important Objects to Monitor
Using the Debugging Tools Available in Windows Server 2016
Best Practices Analyzer Tools
TCP/IP Tools
Other Useful Troubleshooting Command-Line Tools
System Startup and Recovery
Windows Memory Diagnostics Tool
Task Scheduler
Understanding Task Scheduler
Understanding Trigger Options and Settings
Understanding the Advanced Settings Associated with Triggers
Actions Associated with a Task
Understanding Conditions Associated with a Task
Understanding Task Settings
Viewing Task History
Summary
Best Practices
Chapter 33. Capacity Analysis and Performance Optimization
Defining Capacity Analysis
The Benefits of Capacity Analysis and Performance Optimization
Establishing Policy and Metric Baselines
Benchmark Baselines
Using Capacity-Analysis Tools
Task Manager
Network Monitor
Windows Performance Monitor
Other Microsoft Assessment and Planning Tools
Third-Party Toolset
Monitoring System Performance
Key Elements to Monitor for Bottlenecks
Monitoring System Memory and Pagefile Usage
Analyzing Processor Usage
Evaluating the Disk Subsystem
Monitoring the Network Subsystem
Optimizing Performance by Server Roles
Domain Controllers
Remote Desktop Services Server
Hyper-V Servers
Summary
Best Practices
Part XI: Integrated Windows Application Services
Chapter 34. SharePoint 2016 Products
History of SharePoint Technologies
Understanding the Need for SharePoint 2016 Products
Identifying the Need for SharePoint 2016 Products
Customizing SharePoint 2016 Products to Organizational Needs
New Features and Services in SharePoint 2016
Choosing Your SharePoint 2016 Service
Designing a SharePoint 2016 Farm
Outlining SharePoint 2016 Requirements
Exploring a Basic SharePoint 2016 Site
Lists and Libraries in SharePoint 2016
Libraries in SharePoint 2016
SharePoint 2016 Lists Demystified
Managing the Site Collection
Using the Site Settings Pages to Manage Sites and Subsites
Reviewing Central Administration Tools
Summary
Best Practices
Chapter 35. Windows Server Virtualization
Understanding Microsoft’s Virtualization Strategy
History of Windows Virtualization
Integration of Hypervisor Technology in Windows Server
Windows Server Hyper-V
Microsoft Hyper-V Server as a Role in Windows Server 2016
New and Improved Windows Server 2016 Hyper-V
Production checkpoints
Host Resource Protection
Hot add and remove for network adapters and memory
Discrete device assignment protection
Nested virtualization
Windows PowerShell Direct
Linux Secure Boot
Shared virtual hard disks
Hyper-V Manager Improvements
New Storage Quality of Service (QoS)
Integration services delivered through Windows Update
Windows Containers and Hyper-V Containers in Windows Server 2016
Planning Your Implementation of Hyper-V
Sizing Your Windows Server 2016 Server to Support Virtualization
Running Other Services on the Hyper-V System
Planning for the Use of Snapshots on the Hyper-V System
Installing the Microsoft Hyper-V Role
Installing Windows Server 2016 as the Host Operating System
Running Server Manager to Add the Hyper-V Role
Installing the Hyper-V Role Using PowerShell
Becoming Familiar with the Hyper-V Administrative Console
Launching the Hyper-V Administrative Console
Navigating and Configuring Host Server Settings
Installing a Guest Operating System Session
Gathering the Components Needed for a Guest Session
Beginning the Installation of the Guest Session
Completing the Installation of the Guest Session
Modifying Guest Session Configuration Settings
Adding or Limiting the RAM of the Guest Session
Changing Network Settings for the Guest Session
Mounting a Physical CD/DVD Image or Mounting a CD/DVD Image File
Other Settings to Modify for a Guest Session Configuration
Launching a Hyper-V Guest Session
Automatically Launching a Guest Session
Manually Launching a Guest Session
Save State of a Guest Session
Using Snapshots of Guest Operating System Sessions
Snapshots for Image Rollback
Snapshots for Guest Session Server Fault Tolerance
Creating a Snapshot of a Guest Image
Rolling Back a Guest Image to a Previous Snapshot Image
Reverting a Snapshot Session
Quick Migration and Live Migration
Quick Migration
Live Migration
Configuring the Cluster Quorum Witness Disk
Installing the Failover Clustering Feature
Running the Validate a Configuration Wizard
Creating a Node and Disk Majority Cluster
Adding Additional Shared Storage
Configuring Hyper-V over SMB
Deploying New Virtual Machines on a Hyper-V Failover Cluster
Deploying Existing Virtual Machines on Failover Clusters
Performing a Live Migration
Performing a Quick Migration
Utilizing Hyper-V Replica for Site-to-Site Redundancy
Initial Hyper-V Replica Configuration
Initiating a Guest Session to Replicate to Another Host Server
Checking Hyper-V Replication Health
Planned Failover from Source to Destination Hyper-V Replica
Unplanned Failover to Destination Hyper-V Replica
Options in Hyper-V Replication Failover
Hyper-V Containers in Windows Server 2016
Windows Docker Containers
Build and run your first Windows Docker
Summary
Best Practices
Chapter 36. Integrating System Center Operations Manager 2016 with Windows Server 2016
Windows Server 2016 Monitoring
Understanding How OpsMgr Works
Processing Operational Data
Generating Alerts and Responses
Reporting from OpsMgr
OpsMgr Architecture Components
The Agent Component
The Management Server Component
The OperationsManager Database Component
The Reporting Data Warehouse Component
The Reporting Server Component
The Operations Console Component
The Web Console Component
The Command Shell Component
The Gateway Component
Securing OpsMgr
Role-Based Security Model
Securing OpsMgr Agents
Understanding Firewall Requirements
Action and RunAs Account Security
Securing DMZ Servers with Certificates
Fault Tolerance and Disaster Recovery
Management Group Redundancy
Resource Pools
Clustering and Operations Manager
Disaster Recovery
Understanding OpsMgr Components
Exploring Hardware Requirements
Determining Software Requirements
Network Bandwidth Requirements
Sizing the OpsMgr Databases
Monitoring Non-Domain Member Considerations
Putting it All Together in a Design
Small Enterprise Design
Medium Enterprise Design
Large Enterprise Design
Summary
Best Practices
Index
← Prev
Back
Next →
← Prev
Back
Next →