Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Page Copyright Page Contents at a Glance Table of Contents Foreword About the Authors Dedication Acknowledgments We Want to Hear from You! Reader Services Introduction
How This Book Is Organized
Part I: Windows Server 2016 Overview
Chapter 1. Windows Server 2016 Technology Primer
Windows Server 2016 Defined
Windows Server 2016 Under the Hood Visual Changes in Windows Server 2016 Windows Server 2016 as an Application Server Windows Server 2016 Active Directory
When Is the Right Time to Migrate?
Adding a Windows Server 2016 System to a Windows Server 2008 or Later Environment Migrating from Windows Server 2008 and Windows Server 2012/R2 Active Directory to Windows Server 2016 Active Directory
Versions of Windows Server 2016
Windows Server 2016 Standard Edition Windows Server 2016 Datacenter Edition Windows Server 2016 Server Core Nano Server
Improvements for Continuous Availability
No Single Point of Failure in Clustering Stretched Clusters 64-Node Clusters Hyper-V Replication Cluster-Aware Updating DHCP Failover Improved Support for SANs
Enhancements for Flexible Identity and Security
Increased Support for Standards Enhancing the Windows Server 2016 Security Subsystem Server Core and Minimized User Interface Dynamic Access Control DNSSEC—Zone Signing Transport Security Using IPSec and Certificate Services Security Policies, Policy Management, and Policy Enforcement Tools BitLocker for Server Security Windows Rights Management Services Active Directory Unification for Various Directory Services
Enabling Users to Work Anywhere
Windows Server 2016 DirectAccess RODCs for the Branch Office BranchCache File Access Improvements for Thin-Client Remote Desktop Services Improvements in Remote Desktop Client RDS Web Access RDS Gateway RDS RemoteApps Remote Desktop Virtualization Host for VDI Windows to Go
Simplifying the Datacenter
Server Manager Tool Improvements in Distributed Administration PowerShell for Administrative Tasks Active Directory Administrative Center Storage Spaces Improvements in Group Policy Management IP Address Management Managing Windows 2016 with Performance and Reliability Monitoring Tools Leveraging the Best Practice Analyzer Windows Deployment Services Integration Distributed File System
Addition of Migration Tools
Operating System Migration Tools Server Role Migrations
Identifying Which Windows Server 2016 Service to Install or Migrate to First
Windows Server 2016 Core to an Active Directory Environment Windows Server 2016 Running Built-In Application Server Functions Utilizing Windows Server 2016 to Run Business Critical Server Applications
Summary Best Practices
Chapter 2. Planning, Prototyping, Migrating, and Deploying Windows Server 2016
Determining the Scope of Your Project Identifying the Business Goals and Objectives to Implement Windows Server
High-Level Business Goals Business Unit or Departmental Goals
Identifying the Technical Goals and Objectives to Implement Windows Server
Defining the Scope of the Work Determining the Time Frame for Implementation or Migration Defining the Participants of the Design and Deployment Teams
The Discovery Phase: Understanding the Existing Environment
Understanding the Geographical Depth and Breadth Managing Information Overload
The Design Phase: Documenting the Vision and the Plan
Collaboration Sessions: Making the Design Decisions Organizing Information for a Structured Design Document Windows Server 2016 Design Decisions Agreeing On the Design
The Migration Planning Phase: Documenting the Process for Migration
Time for the Project Plan Speed Versus Risk Creating the Migration Document
The Prototype Phase: Creating and Testing the Plan
How Do You Build the Lab? Results of the Lab Testing Environment
The Pilot Phase: Validating the Plan to a Limited Number of Users
The First Server in the Pilot Rolling Out the Pilot Phase Fixing Problems in the Pilot Phase Documenting the Results of the Pilot
The Migration/Implementation Phase: Conducting the Migration or Installation
Verifying End-User Satisfaction Supporting the New Windows Server 2016 Environment
Summary Best Practices
The Discovery Phase The Design Phase The Migration Planning Phase The Prototype Phase The Pilot Phase The Migration/Implementation Phase
Chapter 3. Installing Windows Server 2016 and Server Core
Planning for a Server Installation
Minimum Hardware Requirements Choosing the Appropriate Windows Edition Choosing a New Installation or an Upgrade Determining the Type of Server to Install Preparing Configuration Information Backing Up Files
Installing a Clean Version of Windows Server 2016 Operating System
Customizing the Language, Time, Currency, and Keyboard Preferences The Install Now Page Selecting the Type of Operating System to Install Accepting the Terms of the Windows Server 2016 License Selecting the Type of Windows Server 2016 Installation Selecting the Location for the Installation Finalizing the Installation and Customizing the Configuration
Upgrading to Windows Server 2016
Backing Up the Server Verifying System Compatibility Ensuring the Drivers Are Digitally Signed Performing Additional Tasks Performing the Upgrade
Understanding Server Core Installation
Installing Server Core
Managing and Configuring a Server Core Installation
Launching the Command Prompt in a Server Core Installation Changing the Server Core Administrator’s Password Changing the Server Core Machine Name Assigning a Static IPV4 IP Address and DNS Settings Adding the Server Core System to a Domain Activating the Server Core System Using SCONFIG to Configure a Server Core Installation Server Core Roles and Feature Installations Installing the Active Directory Domain Services Role
Performing an Unattended Windows Server 2016 Installation Nano Server
What Is Nano Server? Deploying a Nano Server Configuring Nano Server After Deployment Connect to Nano Server Using PowerShell Direct
Summary Best Practices
Part II: Windows Server 2016 Active Directory
Chapter 4. Active Directory Domain Services Primer
The Evolution of Directory Services
Reviewing the Original Microsoft Directory Systems Outlining the Key Features of Active Directory Domain Services
Understanding the Development of AD DS
Detailing Microsoft’s Adoption of Internet Standards
AD DS Structure
Understanding the AD DS Domain Describing AD DS Domain Trees Describing Forests in AD DS Understanding the AD DS Authentication Modes Outlining Functional Levels in Windows Server 2016 AD DS
Outlining AD DS Components
Understanding AD DS X.500 Roots Conceptualizing the AD DS Schema Defining the Lightweight Directory Access Protocol Detailing Multimaster Replication with AD DS Domain Controllers Global Catalog and Global Catalog Servers Defining the Operations Master Roles
Understanding Domain Trusts
Conceptualizing Transitive Trusts Explicit Trusts
Defining Organizational Units
Determining Domain Usage Versus OU Usage
Outlining the Role of Groups in an AD DS Environment
Choosing Between OUs and Groups
Understanding AD DS Replication
Sites, Site Links, and Site Link Bridgeheads Understanding Originating Writes Using PowerShell Replication Commandlets in Windows Server 2016
Outlining the Role of DNS in AD DS
Examining DNS Namespace Concepts Dynamic DNS Comparing Standard DNS Zones and AD-Integrated DNS Zones How AD DS DNS Works with Foreign DNS
Outlining AD DS Security
Understanding Kerberos Authentication Taking Additional Security Precautions
Getting Familiar with AD DS Features in Windows Server 2016
Restoring Deleted AD DS Objects Using the Active Directory Recycle Bin Restarting AD DS on a Domain Controller Implementing Multiple Password Policies per Domain Auditing Changes Made to AD Objects Reviewing Additional Active Directory Services Examining Additional Windows Server 2016 AD DS Features Reviewing Legacy Windows Server Active Directory Improvements
Summary Best Practices
Chapter 5. Designing a Windows Server 2016 Active Directory
Understanding AD DS Domain Design
Examining Domain Trusts
Choosing a Domain Namespace
Choosing an External (Published) Namespace Choosing an Internal Namespace
Examining Domain Design Features Choosing a Domain Structure Understanding the Single-Domain Model
Choosing the Single-Domain Model Exploring a Single-Domain Real-World Design Example
Understanding the Multiple-Domain Model
Deciding When to Add Additional Domains Exploring a Multiple-Domain Real-World Design Example
Understanding the Multiple Trees in a Single-Forest Model
Deploying a Multiple-Tree Domain Model Exploring a Multiple-Tree Domain Real-World Design Example
Reviewing the Federated-Forests Model
Choosing Federated Forests Federated-Forests Real-World Design Example
Understanding the Empty-Root Domain Model
Determining When to Choose the Empty-Root Model Exploring a Real-World Empty-Root Domain Design Example
Understanding the Placeholder Domain Model
Exploring a Placeholder Domain Real-World Design Example
Understanding the Special-Purpose Domain Model
Exploring a Special-Purpose Domain Real-World Design Example
Renaming an AD DS Domain
Domain Rename Limitations Outlining Domain Rename Prerequisites Renaming a Domain
Summary Best Practices
Chapter 6. Designing Organizational Unit and Group Structure
Defining Organizational Units in AD DS Defining AD Groups
Outlining Group Types: Security or Distribution Understanding Group Scope
OU and Group Design Starting an OU Design
Overuse of OUs in Domain Design OU Flexibility
Using OUs to Delegate Administration Group Policies and OU Design Understanding Group Design
Detailing Best Practice for Groups Establishing Group Naming Standards Group Nesting Designing Distribution Groups
Exploring Sample Design Models
A Business Function-Based Design Understanding Geographically Based Design
Summary Best Practices
Chapter 7. Active Directory Infrastructure
Understanding AD DS Replication in Depth
The Role of Replication in AD DS Outlining Multimaster Topology Concepts Explaining Update Sequence Numbers Resolving Replication Collisions Applying Property Version Numbers Establishing Connection Objects Understanding Replication Latency
Understanding Active Directory Sites
Windows Server 2016 Site Functionality Associating Subnets with Sites Creating Site Links Turning Off Site Link Bridging Understanding the Knowledge Consistency Checker and the Intersite Topology Generator Determining Site Cost Utilizing Preferred Site Link Bridgeheads Deploying AD DS DCs on Server Core
Planning Replication Topology
Mapping Site Design into Network Design Establishing Sites Choosing Between One Site or Many Sites Optimizing Subnet Site Associations Determining Site Links and Site Link Costs Choosing Replication Scheduling Choosing SMTP or IP Replication Windows Server 2016 Replication DC Promotion from Media Identifying Linked-Value Replication/Universal Group Membership Caching Removing Lingering Objects Disabling Replication Compression Understanding How AD Avoids Full Synchronization of Global Catalog with Schema Changes The Intersite Topology Generator Algorithm
Windows Server 2016 IPv6 Support
Defining the Structure of IPv6 Understanding IPv6 Addressing Migrating to IPv6 Making the Leap to IPv6
Detailing Real-World Replication Designs
Viewing a Hub-and-Spoke Replication Design Decentralized Replication Design
Deploying Read-Only Domain Controllers
Understanding the Need for RODCs Features of RODCs Deploying an RODC
Deploying a Clone Virtualized DC
Prerequisites for Virtualized DC Cloning Adding the Source Virtual DC to the Cloneable DC Group Running the Excluded App List and New Clone Config File Commandlet Exporting and Importing the Source DC Virtual Machine Restarting the Source DC and Bringing the Clone DC Online
Summary Best Practices
Chapter 8. Creating Federated Forests and Lightweight Directories
Keeping a Distributed Environment in Sync
Active Directory Lightweight Directory Services Understanding the Need for AD LDS Features of AD LDS Installing AD LDS
Active Directory Federation Services
Understanding the Key Components of AD FS Installing AD FS with Windows Server 2016 Working with AD FS
Synchronizing Directory Information with Microsoft Identity Manager
Understanding MIM Understanding MIM Concepts Exploring MIM Account Provisioning Understanding the Role of Management Agents in MIM Managing Groups with MIM
Harnessing the Power and Potential of MIM
Managing Identities with MIM Provisioning and Deprovisioning Accounts with MIM
Summary Best Practices
Part III: Networking Services
Chapter 9. Domain Name System, WINS, and DNSSEC
The Need for DNS
History of DNS Establishing a Framework for DNS Explaining the DNS Hierarchy The DNS Namespace
Getting Started with DNS on Windows Server 2016
Installing DNS Using the Add Roles Wizard
Resource Records
Start of Authority (SOA) Records Host (A) Records Name Server (NS) Records Service (SRV) Records Mail Exchanger (MX) Records Pointer (PTR) Records Canonical Name (CNAME) Records Other DNS Record Types
Understanding DNS Zones
Forward Lookup Zones Reverse Lookup Zones Primary Zones Secondary Zones Stub Zones
Performing Zone Transfers
Performing Full Zone Transfers Initiating Incremental Zone Transfers
Understanding DNS Queries
Performing Recursive Queries Performing Iterative Queries
Other DNS Components
Dynamic DNS The Time-to-Live Value Performing Secure Updates Exploring Aging and Scavenging for DNS Examining Root Hints Understanding the Role of Forwarders Using WINS for Lookups
Understanding the Evolution of Microsoft DNS
Active Directory-Integrated Zones Dynamic Updates Unicode Character Support
DNS in Windows Server 2016
Application Partition Automatic Creation of DNS Zones Fix to the “Island” Problem Forest Root Zone for _msdcs
DNS in an Active Directory Domain Services Environment
The Impact of DNS on AD DS AD DS in Non-Microsoft DNS Implementations Using Secondary Zones in an AD DS Environment SRV Records and Site Resolution GlobalNames Zone
Troubleshooting DNS
Using the DNS Event Viewer to Diagnose Problems Using Performance Monitor to Monitor DNS Client-Side Cache and HOST Resolution Problems Using the Nslookup Command-Line Utility Using the Ipconfig Command-Line Utility Using the Tracert Command-Line Utility Using the DNSCmd Command-Line Utility Managing DNS with PowerShell
Secure DNS with DNSSEC
DNSSEC Components Important Performance Considerations for DNSSEC Configuring a DNSSEC Zone
Reviewing the Windows Internet Naming Service
Understanding the Need for Legacy Microsoft NetBIOS Resolution
Installing and Configuring WINS
Installing WINS Configuring Push/Pull Partners Examining WINS Replication Understanding NetBIOS Client Resolution and the LMHOSTS File
Planning, Migrating, and Maintaining WINS
Upgrading a WINS Environment Exploring WINS and DNS Integration
Summary Best Practices
Chapter 10. DHCP, IPv6, IPAM
Understanding the Components of an Enterprise Network
The Importance of Network Addressing Name Resolution Name Resolution and Directory Integration DHCP Failover Windows Server 2016 IPAM Overview
Exploring DHCP
The Need for DHCP Outlining DHCP Predecessors: RARP and BOOTP Exploring the DHCP Server Service Examining the DHCP Client Service Automatic Private IP Addressing DHCP Relay Agents DHCP and Dynamic DNS Integration Installing DHCP Server and Server Tools Creating IPv4 DHCP Scopes
Exploring DHCP Changes in Windows Server 2016
Migrating DHCP Servers Using Windows Server Migration Tools Migrating DHCP Services from 2012 R2 to Windows Server 2016 Understanding DHCP Client Alternate Network Capability
Enhancing DHCP Reliability
Link-Layer Filtering DHCP Reservations DHCP Name Protection DHCP and Dynamic DNS Configuration Access DHCP Activity and Event Logs Implementing Redundant DHCP Services Windows Server 2016 DHCP Failover
Exploring Advanced DHCP Concepts
Understanding DHCP Superscopes Examining DHCP Multicast Scopes Delegating Administration of DHCP DHCP Netsh and PowerShell Administration
Securing DHCP IPv6 Introduction
IPv6 Addressing Comprehending IPv6 Addressing IPv6 Transition Technologies
Configuring IPv6 on Windows Server 2016
Creating an IPv6 Subnet in Active Directory Manually Setting the IPv6 Address on Windows Server 2016 Creating IPv6 DNS Records and Zones Setting Up Windows Server 2016 DHCP IPv6 Scopes
IP Address Management
IP Address Tracking Today
Installing the IPAM Server and Client Features
Connecting to the IPAM Server Configuring IPAM Server Provisioning Configuring Servers for IPAM Management Configuring Server Discovery Defining Discovered Servers as IPAM Managed Defining IP Address Blocks Collecting Server Data
Exploring the IPAM Console
Overview Node Server Inventory Node IP Address Space Node IP Address Block Node IP Address Inventory Node IP Address Ranges Node Monitor and Manage Node DNS and DHCP Servers DHCP Scopes Node DNS Zone Monitoring Node Event Catalog Node
Summary Best Practices
Chapter 11. Internet Information Services
Understanding Internet Information Services 10
IIS 10 Advanced Functionality Understanding the IIS Manager Tools Exploring the IIS Manager Administration Panes IIS Manager Administration Nodes in the Connections Pane
Planning and Designing IIS 10
Determining Server Requirements Determining Fault-Tolerance Requirements
Installing and Upgrading IIS 10
Understanding the Modular Approach to Installing IIS 10 Installing the Web Server (IIS) Role Upgrading from Other Versions of IIS
Installing and Configuring Websites
Creating a Website with IIS 10 Creating a Virtual Directory Configuring IIS 8 Website Properties
Installing and Configuring FTP Services
IIS 10 FTP Server Service Features Installing the FTP Server Creating a Secure FTP 10 Site Using SSL Configuring FTP 10 Features and Properties
Securing IIS 10
Windows Server 2016 Security IIS Authentication Auditing Web Services Using SSL Certificates Administering IIS 10 Administrator and User Security Creating an IIS 10 User Account Assigning Permissions to an IIS 10 User Account Configuring Feature Delegation Using IIS Logging
Summary Best Practices
Part IV: Security
Chapter 12. Server-Level Security
Defining Windows Server 2016 Security
Common Language Runtime Understanding the Layered Approach to Server Security
Deploying Physical Security
Restricting Physical Access Restricting Logon Access Using Smart Cards for Logon Access Securing Wireless Networks Firewall Security
Using the Integrated Windows Firewall with Advanced Security
Understanding Windows Firewall Integration with Server Manager Creating Inbound and Outbound Rules on the Windows Firewall
Hardening Servers
Defining Server Roles Securing a Server Using Server Manager Reducing Attack Surface AppLocker Using Administration-Only Accounts with Run As
Examining File-Level Security
Understanding File System Security Dynamic Access Control Examining Share-Level Security Auditing File Access Encrypting Files with the Encrypting File System BitLocker for Servers
Malware and Backup Protection
Antivirus Precautions Trusted Boot Architecture with Secure Boot, AM Preloading, and Measured Boot Deploying Backup Security
Windows Server Update
Understanding the Background of WSUS: Windows Update Understanding the Automatic Updates Client Understanding the Development of Windows Server Update Services Examining WSUS Prerequisites Installing WSUS on a Windows Server 2016 Server Automatically Configuring Clients via Group Policy Deploying Security Patches with WSUS
Summary Best Practices
Chapter 13. Securing Data in Transit
Introduction to Securing Data in Transit in Windows Server 2016
The Need for Another Layer of Security Deploying Security Through Multiple Layers of Defense Understanding Encryption Basics
Deploying a Public Key Infrastructure with Windows Server 2016
Defining Private Key Versus Public Key Encryption Exploring Digital Certificates
Understanding Active Directory Certificate Services in Windows Server 2016
Reviewing the CA Roles in AD CS Detailing the Role Services in AD CS Installing AD CS Configuring Auto-Enrollment Using Smart Cards in a Public Key Infrastructure Using the Encrypting File System Integrating PKI with Non-Microsoft Kerberos Realms
Active Directory Rights Management Services
Understanding the Need for AD RMS Understanding AD RMS Prerequisites Installing AD RMS
Using IPsec Encryption with Windows Server 2016
Understanding the IPsec Principle Detailing Key IPsec Functionality Exploring IPsec NAT Traversal
Summary Best Practices
Chapter 14. Network Policy and Access Services, Routing and Remote Access and DirectAccess
Installing a Network Policy Server
Understanding RADIUS Support on a Network Policy Server
Deploying a Virtual Private Network Using RRAS
Exploring VPN Tunnels Tunneling Protocols PPTP and L2TP Protocols L2TP/IPSec Secure Protocol Enabling VPN Functionality on a Remote-Access Server Modifying the Remote Access Network Policy
Configuring DirectAccess Summary Best Practices
Part V: Migrating to Windows Server 2016
Chapter 15. Migrating to Active Directory 2016
Beginning the Migration Process
Identifying Migration Objectives Establishing Migration Project Phases Comparing the In-Place Upgrade Versus New Hardware Migration Methods Identifying Migration Strategies: “Big Bang” Versus Phased Coexistence Exploring Migration Options
Big Bang Migration
Verifying Hardware Compatibility Verifying Application Readiness Backing Up and Creating a Recovery Process Virtual DC Rollback Option Performing an Upgrade on a Single DC Server
Phased Migration
Migrating DCs Preparing the Forest and Domains Using Adprep Upgrading Existing Domain Controllers Replacing Existing Domain Controllers Moving Operation Master Roles Retiring Existing Windows Server DCs Retiring “Phantom” DCs Upgrading Domain and Forest Functional Levels Moving AD-Integrated DNS Zones to Application Partitions
Multiple Domain Consolidation Migration
Understanding ADMT Functionality Using ADMT in a Lab Environment ADMT v3.2 Installation Procedure ADMT Domain Migration Prerequisites Exporting Password Key Information Installing PES on the Source Domain Setting Proper Registry Permissions Configuring Domains for SID Migration Migrating Groups Migrating User Accounts Migrating Computer Accounts Migrating Other Domain Functionality
Summary Best Practices
Chapter 16. Compatibility Testing
The Importance of Compatibility Testing Preparing for Compatibility Testing
Determining the Scope for Application Testing Defining the Goals for Compatibility Testing Documenting the Compatibility Testing Plan
Researching Products and Applications
Taking Inventory of Network Systems Taking Inventory of Applications on Existing Servers Understanding the Differences Between Applications and Windows Services Completing an Inventory Sheet per Application Prioritizing the Applications on the List
Verifying Compatibility with Vendors
Tracking Sheets for Application Compatibility Research Six States of Compatibility Creating an Upgrade Decision Matrix Assessing the Effects of the Compatibility Results on the Compatibility Testing Plan
Microsoft Assessment and Planning Toolkit Lab-Testing Existing Applications
Allocating and Configuring Hardware Allocating and Configuring Windows Server 2016 Loading the Remaining Applications Certified for Windows Server 2016 Testing the Migration and Upgrade Process
Documenting the Results of the Compatibility Testing Determining Whether a Prototype Phase Is Required Summary Best Practices
Part VI: Windows Server 2016 Administration and Management
Chapter 17. Windows Server 2016 Administration
Defining the Administrative Model
The Centralized Administration Model The Distributed Administration Model The Mixed Administration Model
Examining Active Directory Site Administration
Sites Subnets Site Links Site Group Policies
Configuring Sites
Creating a Site Establishing Site Links Delegating Control at the Site Level
Windows Server 2016 Active Directory Groups
Group Types Group Scopes in Active Directory
Creating Groups
User Administration in a Single Domain User Administration in a Multidomain Forest Domain Functional Level and Groups Creating AD Groups Populating Groups Group Management
Managing Users with Local Security and Group Policies
Viewing Policies with the Group Policy Management Console Creating New Group Policies Configuring and Optimizing Group Policy Troubleshooting Group Policy Applications
Managing Printers with the Print Management Console
Installing the Print Management Console Configuring the Print Management Console Adding New Printers as Network Shared Resources Adding Print Servers to the Print Management Console Using the Print Management Console
Summary Best Practices
Chapter 18. Windows Server 2016 Group Policies and Policy Management
Group Policy Overview Group Policy Processing: How Does It Work?
Computer GPO Processing User GPO Processing Network Location Awareness Group Policy Client-Side Extensions Tuning Group Policy Processing with GPO Settings
Local Group Policies
Local Computer Policy Local User Policies for Nonadministrators and Administrators
Domain-Based Group Policies Security Templates Understanding Group Policy
Group Policy Objects GPO Storage and Replication The Group Policy Central Store Starter GPOs Policy Settings Preference Settings GPO Links Group Policy Link Enforcement Group Policy Inheritance Group Policy Block Inheritance Group Policy Order of Processing GPO Filtering Group Policy Loopback Processing Group Policy Slow-Link Detection and Network-Location Awareness
Group Policy Policies Node
Group Policy Administrative Templates
Group Policy Preferences Node Policy Management Tools
Group Policy Management Console Group Policy Object Editor Group Policy Management Editor Group Policy Starter GPO Editor Print Management Console Gpupdate.exe Group Policy Update from GPMC Group Policy Infrastructure Status PowerShell Management of Group Policies Event Viewer DFS Management
Designing a Group Policy Infrastructure
Active Directory Design and Group Policy Separation of GPO Functions Separation of GPO by Targeting Operating System
GPO Administrative Tasks
Installing the Group Policy Management Tools Creating a GPO Central Store Creating and Using Starter GPOs Creating New Domain Group Policies Creating and Configuring GPO Links Managing GPO Status Managing GPO Security Filtering Creating and Linking WMI Filters to GPOs Managing GPO Link Order of Processing Viewing GPO Settings and Creating Reports Backing Up and Restoring Domain GPOs Group Policy Modeling Operations Troubleshooting Group Policies GPO Administrative Delegation
Summary Best Practices
Chapter 19. Windows Server 2016 Management and Maintenance Practices
Going Green with Windows Server 2016 Server Manager Dashboard Managing Windows Server 2016 Roles and Features
Roles in Windows Server 2016 Features in Windows Server 2016
Creating a Server Group Viewing Events
Server Manager Performance Monitor Device Manager Task Scheduler Services and Applications WMI Control Windows Firewall with Advanced Security
Server Manager Storage Page
Windows Server Backup Disk Management
Auditing the Environment
Audit Policies Audit Policy Subcategories Auditing Resource Access
Managing Windows Server 2016 Remotely
Server Manager Remote Management Remote Server Administration Tools Windows Remote Management PowerShell Print Management Console
Common Practices for Securing and Managing Windows Server 2016
Identifying Security Risks Using System Center Operations Manager 2012 R2 to Simplify Management Leveraging Windows Server 2016 Maintenance Practices
Keeping Up with Service Packs and Updates
Manual Update or DVD Update Automatic Updates Windows Server Update Services
Maintaining Windows Server 2016
Daily Maintenance Weekly Maintenance Monthly Maintenance Quarterly Maintenance
Summary Best Practices
Chapter 20. Automating Tasks Using PowerShell Scripting
Understanding Shells
A Short History of Shells
Introduction to PowerShell
PowerShell Uses PowerShell Features PowerShell Features
Understanding PowerShell Fundamentals
Accessing PowerShell Command-Line Interface Navigating the CLI Command Types .NET Framework Integration The Pipeline Modules and Snap-Ins Remoting PowerShell ISE Variables Aliases Scopes Providers and Drives Security
Using Windows PowerShell
Exploring PowerShell Managing Services Gathering Event Log Information Managing the Files and Directories Managing the Registry Managing Processes Using WMI and CIM Using Snap-Ins Using Modules Using Remoting Using the New-Object Commandlet
Summary Best Practices
Chapter 21. Documenting a Windows Server 2016 Environment
Benefits of Documentation
Organizational Benefits Financial Benefits
Types of Documents Planning to Document the Windows Server 2016 Environment Knowledge Sharing and Knowledge Management Windows Server 2016 Project Documents
Project Plan Design and Planning Document Communication Plan Migration Plan Checklists Training Plan Test Plan Pilot Test Plan Support and Project Completion Document
Administration and Maintenance Documents
Step-by-Step Procedure Documents Policies Documented Checklists Active Directory Infrastructure Server Build Procedures Configuration (As-Built) Documentation Topology Diagrams Administration Manual Using Documentation for Troubleshooting Purposes Procedural Documents
Network Infrastructure
Documenting the WAN Infrastructure Network Device Documentation
Disaster Recovery Documentation
Disaster Recovery Planning Backup and Recovery Development Monitoring and Performance Documentation Windows System Failover Documentation
Change Management Procedures Performance Documentation Baselining Records for Documentation Comparisons Routine Reporting
Management-Level Reporting Technical Reporting
Security Documentation
Change Control Reviewing Reports Management-Level Reporting for Security Assessments
Summary Best Practices
Part VII: Remote and Mobile Technologies
Chapter 22. Server-to-Client Remote and Mobile Access
Remote Access in Windows Server 2016 VPN in Windows Server 2016
Components Needed to Create a Traditional VPN Connection The VPN Client The RAS Server The NPS System Certificate Server Active Directory
RAS System Authentication Options
Authentication Protocols for PPTP Connections EAP and PEAP Authentication Protocols Authentication Protocols for L2TP/IPsec Connections Choosing the Best Authentication Protocol
VPN Protocols
Tunneling Within a Windows Server 2016 Networking Environment Point-to-Point Tunneling Protocol Layer 2 Tunneling Protocol IP Security Secure Sockets Tunneling Protocol
DirectAccess in Windows Server 2016
DirectAccess and IPv6 A Tale of Two Tunnels End-to-Edge DirectAccess Model End-to-End DirectAccess Model Managed-Out Support Model Internet Versus Intranet Traffic with DirectAccess DirectAccess Components Network Location Service DirectAccess Connection Process
Choosing Between Traditional VPN Technologies and DirectAccess
Advantages of L2TP/IPsec Advantages of PPTP Advantages of SSTP Advantages of DirectAccess Ports Affecting the VPN Connectivity
Setting Up the Unified Remote Access Role DirectAccess Scenario
Configuring the Infrastructure Configuring the DirectAccess Feature Testing DirectAccess
VPN Scenario
Certificate Auto-Enrollment Configuring the Network Policy Server Setting Up the RAS Server Setting Up the VPN Client Testing the VPN Connection
Monitoring the Remote Access Server
Dashboard Operations Status Remote Client Status Reporting
Summary Best Practices
Chapter 23. Remote Desktop Services
Why Implement Remote Desktop Services?
Remote Desktop for Administration Remote Desktop for Users Remote Desktop for Remote User Support Remote Desktop for Cloud Service Providers
How Remote Desktop Works
Modes of Operation Client-Side RDS
Understanding the Name Change RDS Roles
RD Session Host RD Virtualization Host RD Gateway RD Web Access RD Connection Broker RD Licensing RemoteApp and Desktop Connection
Configuration Options and Fine-Tuning Terminology
Granular Session Configuration Control Session 0 Isolation Local Resource Redirection Single Sign-On Remote Desktop Connection Display
Planning for RDS
Planning for Remote Desktop for Administration Planning for RD Session Host Requirements Planning for RD Session Host Sizing and Optimization Planning for RD Session Host Upgrades Planning the Physical Placement of RDS Planning for Networking Requirements Planning for RD Session Host Tolerance
Deploying RDS
Enabling Remote Desktop for Administration Deploying the Remote Desktop Service Role Service Making Applications Available for User Access Additional RD Session Host Server Configuration Tasks
Deploying Virtual Desktops
Installing the RD Virtualization Host Role Service and Configuration Settings Creating a Virtual Desktop Template Creating a Virtual Desktop Collection Accessing the VDI Guest Sessions
Enabling RemoteFX
Integrating and Supporting RemoteFX for VDI Guests Integrating and Supporting RemoteFX for RD Session Host Guests
Securing and Supporting RDS
Securely Building Remote Session Services Segmenting Resources Securing RDS with GPOs Network Level Authentication Changing the RDP Port Remotely Managing a Remote Desktop Session Managing RDS with PowerShell Group Policy for RD Session Host Servers Applying Service Packs and Updates Performing Disaster Recovery
Summary Best Practices
Part VIII: Desktop Administration
Chapter 24. Windows Server 2016 Administration Tools for Desktops
Managing Desktops and Servers
Operating System Deployment to Bare-Metal Systems Managing Windows and Security Updates Supporting End Users and Remote Administration
Operating System Deployment Options
Manual Installation Using Installation Media Unattended Installation Manufacturer-Assisted Installation Cloning or Imaging Systems
Windows Server 2016 Windows Deployment Services
WDS Image Types Boot Images Installation Images Discover Images Capture Images
Installing Windows Deployment Services
Configuring the WDS Server DHCP Configuration Adding a Boot Image to the WDS Server Adding Install Images to the WDS Server Deploying the First Install Image Creating Multicast Images
Customizing Boot Images
Adding Drivers to Boot and Discover Images WDS Boot and Install Image Troubleshooting
Creating Discover Images Pre-Creating Active Directory Computer Accounts for WDS (Prestaged Systems) Creating Custom Installations Using Capture Images Automating Image Deployment Using Unattend Files General Desktop Administration Tasks Summary Best Practices
Chapter 25. Group Policy Management for Network Clients
The Need for Group Policies Windows Group Policies
Local Computer Policy Local Security Policy Local Administrators and Non-Administrators User Policies Domain Group Policies Security Configuration Wizard Policy Processing Overview
Group Policy Feature Set
Computer Configuration Policy Node User Configuration Policy Node
Planning Workgroup and Standalone Local Group Policy Configuration
Creating Local Administrators and Non-Administrators Policies
Planning Domain Group Policy Objects
Policies and Preferences Domain GPOs Domain Controller GPOs Active Directory Site GPOs Small Business Delegated Administration
Managing Computers with Domain Policies
Creating a New Domain Group Policy Object Creating and Configuring GPO Links Managing User Account Control Settings Creating Application Control Policies (AppLocker)
Configuring Preference Item-Level Targeting
Configuring Remote Desktop and Remote Administration Support Configuring Basic Firewall Settings with Group Policy Configuring Windows Update Settings Configuring Power Options Using Domain Policies Managing Scheduled Tasks and Immediate Tasks with Domain Policies
Managing Users with Policies
Configuring Folder Redirection Removable Storage Access Managing Microsoft Management Console Access
Managing Active Directory with Policies
Fine-Grained Password Policies Configuring Restricted Groups to manage Computer Local Groups Synchronous Foreground Refresh GPO Modeling and GPO Results in the GPMC Managing Group Policy from Administrative or Remote Workstations
Summary Best Practices
Chapter 26. Storage
Storage Spaces and Storage Pools
Storage Spaces Direct Storage Replicas Storage Quality of Service (QoS) Windows Disk Properties Virtual Hard Disks
Managing Windows Server 2016 Disks
The Disk Management MMC Snap-In Diskpart.exe Command-Line Utility PowerShell Disk Management Cmdlets Server Manager File and Storage Services Adding New Disks and Volumes to Windows Working with Virtual Hard Disk Files
Configuring Storage Spaces Direct
Creating Virtual Disks
Summary Best Practices
Part IX: Fault-Tolerance Technologies
Chapter 27. File System Management
File System Access Services and Technologies
Windows Folder Sharing DFS Namespaces and Replication WWW Directory Publishing File Transfer Protocol Service Server and Client for NFS Volume Shadow Copy Service BranchCache for Network Files Data Deduplication Service Continuously Available File Shares Distributed File System Distributed File System Replication iSCSI Target Server Service
Adding the File and Storage Services Role Managing Data Access Using Windows Server 2016 Shares
Share Permissions Access-Based Enumeration Share Caching and Offline Files BranchCache
File Server Resource Manager
Uses of File Server Resource Manager Leveraging the FSRM Features
The Distributed File System
DFS Namespaces DFS Replication DFS Terminology DFS Replication Terminology
Planning a DFS Deployment
Choosing a DFS Namespace Type Planning for DFS Replication Determining the Replication Topology
Installing and Configuring DFS
Creating the DFS Namespace and Root Adding an Additional Namespace Server to a Domain-Based Namespace Creating a DFS Folder and Replication Group Enabling Access-Based Enumeration on a Domain-Based Namespace in Windows Server 2008 Mode Disabling Replication for Extended Downtime
Using the Volume Shadow Copy Service
Using VSS and Windows Server Backup Configuring Shadow Copies Recovering Data Using Shadow Copies
Configuring Data Deduplication Dynamic Access Control
Creating DAC Claim Types Configuring DAC Resource Properties Adding Configured Resource Properties to a Resource Property List Creating a Central Access Rule Creating a Central Access Policy Creating and Assigning a Central Access Policy GPO to File Servers Enabling Kerberos Armoring for Domain Controllers Creating and Updating a File Share to Leverage Dynamic Access Control Configuring User Accounts and Testing Data Access
Summary Best Practices
Chapter 28. Operational Fault Tolerance (Clustering / Network Load Balancing)
Building Fault-Tolerant Windows Server 2016 Systems
Powering the Computer and Network Infrastructure Designing Fault-Tolerant IP Networks Designing Fault-Tolerant Server Disks Increasing Windows Server 2016 Role Availability
Windows Server 2016 Clustering Technologies
Windows Server 2016 Cluster Terminology
Determining the Correct Clustering Technology
Failover Clusters Network Load Balancing Network Teaming
Overview of Failover Clusters
Failover Cluster Quorum Models Choosing Applications for Failover Clusters Shared Storage for Failover Clusters Failover Cluster Node Operating System Selection
Deploying Failover Clusters
Installing the Failover Clustering Feature and Tools Configuring Disks for Cluster Usage Running the Validate a Configuration Wizard Creating a Failover Cluster Configuring Cluster Networks Adding Nodes to the Cluster Adding Storage to the Cluster Cluster Quorum Configuration Enabling Cluster Shared Volumes Deploying Roles on Failover Clusters Configuring Failover and Failback Testing Failover Clusters Failover Cluster Maintenance Cluster-Aware Updating Removing Nodes from a Failover Cluster Cluster Migration and Upgrades
Backing Up and Restoring Failover Clusters
Failover Cluster Node: Backup Best Practices Restoring an Entire Cluster to a Previous State
Deploying Network Load-Balancing Clusters
NLB Applications and Services Installing the Network Load-Balancing Feature Creating Port Rules Port Rules Filtering Mode and Affinity Using Cluster Operation Mode Configuring Network Cards for NLB Creating an NLB Cluster Adding Additional Nodes to an Existing NLB Cluster
Managing NLB Clusters
Backing Up and Restoring NLB Nodes Performing Maintenance on an NLB Cluster Node
Network Teaming Summary Best Practices
Chapter 29. Backing Up the Windows Server 2016 Environment
Understanding Your Backup and Recovery Needs and Options
Identifying the Different Services and Technologies Identifying Single Points of Failure Evaluating Different Disaster Scenarios Prioritizing the Recovery Identifying Bare Minimum Services
Creating the Disaster Recovery Solution
Disaster Recovery Solution Overview Document Getting Disaster Recovery Solutions Approved
Documenting the Enterprise Developing a Backup Strategy
Assigning Tasks and Designating Team Members Creating Regular Backup Procedures
Windows Server Backup Overview
Backup Storage Support and Media Management Backup Media Files Backup Options Windows Server Backup Console Windows Backup Command-Line Utility Windows Server Backup PowerShell Cmdlets
Using Windows Server Backup
Installing Windows Server Backup Scheduling a Backup Using Windows Server Backup and Allocating Disks Running a Backup to a Shared Network Folder Storing a Backup on DVD
Managing Backups Using the Command-Line Utility Wbadmin.exe and Windows PowerShell Cmdlets
Viewing Backup History Running a Manual System-State Backup to Remote Storage Using Wbadmin.exe and PowerShell Backing Up the System State Using the GUI
Backing Up Active Directory
Exporting Active Directory Object Data Using PowerShell Accidental-Deletion Protection Using the Directory Services Restore Mode Password Active Directory Recycle Bin
Backing Up Windows Server 2016 Roles
Distributed File System Backup Internet Information Services
Volume Shadow Copy Service
Enabling Shadow Copies for Shared Volumes
Extending Server Backup to the Enterprise with Data Protection Manager 2016 Summary Best Practices
Chapter 30. Recovering from a Disaster
Ongoing Backup and Recovery Preparedness
Project Management Office Change Control Disaster Recovery Delegation of Responsibilities
When Disasters Strike
Qualifying the Disaster or Failure Validating Priorities Synchronizing with Business Owners Communicating with Vendors and Staff Assigning Tasks and Scheduling Resources Recovering the Infrastructure Postmortem Meeting
Disaster Scenario Troubleshooting
Network Outage Physical Site Failure Server or System Failure
Recovering from a Server or System Failure
Access Issues Data Corruption and File and Folder Recovery
Managing and Accessing Windows Server Backup Media
Windows Server Backup Dedicated Disks Network Shared Folders
Windows Server Backup Volume Recovery
Windows Server 2016 Data Volume Recovery Windows Server 2016 System Volume Recovery Windows System Image Recovery
Recovering Role Services and Features
Windows Server 2016 System-State Recovery Active Directory Recycle Bin Recovery System-State Recovery for Domain Controllers
Summary Best Practices
Part X: Optimizing, Tuning, Debugging, and Problem Solving
Chapter 31. Optimizing Windows Server 2016 for Branch Office Communications
Key Branch Office Features in Windows Server 2016 Understanding Read-Only Domain Controllers
Branch Office Concerns and Dilemmas Understanding When to Leverage RODCs Installing a Read-Only Domain Controller
Using BitLocker with Windows Server 2016
Understanding BitLocker Drive Encryption in Windows Server 2016 Comprehending BitLocker’s Drive Encryption Hardware Requirements Understanding BitLocker Deployment Scenarios Configuring BitLocker Drive Encryption on a Windows Server 2016 Branch Office Domain Controller Installing the BitLocker Drive Encryption Feature Configuring the System Partitions for BitLocker Enabling BitLocker Drive Encryption Utilizing the BitLocker Recovery Password Removing BitLocker Drive Encryption
BranchCache in Windows Server 2016
Features in Windows Server 2016 BranchCache Planning and Deploying BranchCache
Printing with Branch Office Direct Printing
Configuring Windows Server 2016 for Branch Office Direct Printing
Summary Best Practices
Chapter 32. Logging and Debugging
Using the Task Manager for Logging and Debugging
Monitoring Processes Monitoring Performance Monitoring User Activity Monitoring Details Monitoring Services Related PowerShell Functionality Examples
Using Event Viewer for Logging and Debugging
Examining the Event Viewer User Interface Conducting Additional Event Viewer Management Tasks Related PowerShell Functionality
Performance Monitoring
Performance Monitor Overview Performance Monitor Data Collector Sets Reports Resource Monitor Related PowerShell Functionality Server Manager
Setting Baseline Values
Reducing Performance Monitoring Overhead Important Objects to Monitor
Using the Debugging Tools Available in Windows Server 2016
Best Practices Analyzer Tools TCP/IP Tools Other Useful Troubleshooting Command-Line Tools System Startup and Recovery Windows Memory Diagnostics Tool
Task Scheduler
Understanding Task Scheduler Understanding Trigger Options and Settings Understanding the Advanced Settings Associated with Triggers Actions Associated with a Task Understanding Conditions Associated with a Task Understanding Task Settings Viewing Task History
Summary Best Practices
Chapter 33. Capacity Analysis and Performance Optimization
Defining Capacity Analysis
The Benefits of Capacity Analysis and Performance Optimization Establishing Policy and Metric Baselines Benchmark Baselines
Using Capacity-Analysis Tools
Task Manager Network Monitor Windows Performance Monitor Other Microsoft Assessment and Planning Tools Third-Party Toolset
Monitoring System Performance
Key Elements to Monitor for Bottlenecks Monitoring System Memory and Pagefile Usage Analyzing Processor Usage Evaluating the Disk Subsystem Monitoring the Network Subsystem
Optimizing Performance by Server Roles
Domain Controllers Remote Desktop Services Server Hyper-V Servers
Summary Best Practices
Part XI: Integrated Windows Application Services
Chapter 34. SharePoint 2016 Products
History of SharePoint Technologies
Understanding the Need for SharePoint 2016 Products
Identifying the Need for SharePoint 2016 Products
Customizing SharePoint 2016 Products to Organizational Needs New Features and Services in SharePoint 2016 Choosing Your SharePoint 2016 Service
Designing a SharePoint 2016 Farm
Outlining SharePoint 2016 Requirements
Exploring a Basic SharePoint 2016 Site Lists and Libraries in SharePoint 2016
Libraries in SharePoint 2016 SharePoint 2016 Lists Demystified
Managing the Site Collection
Using the Site Settings Pages to Manage Sites and Subsites Reviewing Central Administration Tools
Summary Best Practices
Chapter 35. Windows Server Virtualization
Understanding Microsoft’s Virtualization Strategy
History of Windows Virtualization
Integration of Hypervisor Technology in Windows Server
Windows Server Hyper-V Microsoft Hyper-V Server as a Role in Windows Server 2016 New and Improved Windows Server 2016 Hyper-V Production checkpoints Host Resource Protection Hot add and remove for network adapters and memory Discrete device assignment protection Nested virtualization Windows PowerShell Direct Linux Secure Boot Shared virtual hard disks Hyper-V Manager Improvements New Storage Quality of Service (QoS) Integration services delivered through Windows Update
Windows Containers and Hyper-V Containers in Windows Server 2016 Planning Your Implementation of Hyper-V
Sizing Your Windows Server 2016 Server to Support Virtualization Running Other Services on the Hyper-V System Planning for the Use of Snapshots on the Hyper-V System
Installing the Microsoft Hyper-V Role
Installing Windows Server 2016 as the Host Operating System Running Server Manager to Add the Hyper-V Role Installing the Hyper-V Role Using PowerShell
Becoming Familiar with the Hyper-V Administrative Console
Launching the Hyper-V Administrative Console Navigating and Configuring Host Server Settings
Installing a Guest Operating System Session
Gathering the Components Needed for a Guest Session Beginning the Installation of the Guest Session Completing the Installation of the Guest Session
Modifying Guest Session Configuration Settings
Adding or Limiting the RAM of the Guest Session Changing Network Settings for the Guest Session Mounting a Physical CD/DVD Image or Mounting a CD/DVD Image File Other Settings to Modify for a Guest Session Configuration
Launching a Hyper-V Guest Session
Automatically Launching a Guest Session Manually Launching a Guest Session Save State of a Guest Session
Using Snapshots of Guest Operating System Sessions
Snapshots for Image Rollback Snapshots for Guest Session Server Fault Tolerance Creating a Snapshot of a Guest Image Rolling Back a Guest Image to a Previous Snapshot Image Reverting a Snapshot Session
Quick Migration and Live Migration
Quick Migration Live Migration Configuring the Cluster Quorum Witness Disk Installing the Failover Clustering Feature Running the Validate a Configuration Wizard Creating a Node and Disk Majority Cluster Adding Additional Shared Storage Configuring Hyper-V over SMB Deploying New Virtual Machines on a Hyper-V Failover Cluster Deploying Existing Virtual Machines on Failover Clusters Performing a Live Migration Performing a Quick Migration
Utilizing Hyper-V Replica for Site-to-Site Redundancy
Initial Hyper-V Replica Configuration Initiating a Guest Session to Replicate to Another Host Server Checking Hyper-V Replication Health Planned Failover from Source to Destination Hyper-V Replica Unplanned Failover to Destination Hyper-V Replica Options in Hyper-V Replication Failover
Hyper-V Containers in Windows Server 2016 Windows Docker Containers
Build and run your first Windows Docker
Summary Best Practices
Chapter 36. Integrating System Center Operations Manager 2016 with Windows Server 2016
Windows Server 2016 Monitoring Understanding How OpsMgr Works
Processing Operational Data Generating Alerts and Responses Reporting from OpsMgr
OpsMgr Architecture Components
The Agent Component The Management Server Component The OperationsManager Database Component The Reporting Data Warehouse Component The Reporting Server Component The Operations Console Component The Web Console Component The Command Shell Component The Gateway Component
Securing OpsMgr
Role-Based Security Model Securing OpsMgr Agents Understanding Firewall Requirements Action and RunAs Account Security Securing DMZ Servers with Certificates
Fault Tolerance and Disaster Recovery
Management Group Redundancy Resource Pools Clustering and Operations Manager Disaster Recovery
Understanding OpsMgr Components
Exploring Hardware Requirements Determining Software Requirements Network Bandwidth Requirements Sizing the OpsMgr Databases Monitoring Non-Domain Member Considerations
Putting it All Together in a Design
Small Enterprise Design Medium Enterprise Design Large Enterprise Design
Summary Best Practices
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion