Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $49.99
Standard view
Full view
of .
Look up keyword or section
Like this
63Activity

Table Of Contents

Member servers
Role servers
Windows Server 2008 as a domain controller
Windows Server 2008 as a Communications Server and Microsoft Exchange
Internet Information Services integration
Active Directory integration
Distributed services
Security
Single-seat and policy-based administration
SMTP message routing
Internet mail content
System Monitoring Using Windows Management Instrumentation
Windows Server 2008 for Database Services with SQL Server
Windows Server 2008 for IIS and ASP.NET
Windows Server 2008 for Application Services
Windows Server 2008 for Resolutions Services
WINS
Summary
Using the Microsoft Management Console (MMC)
Using the Microsoft Management Console
Understanding the function of the MMC
Opening the MMC
Using snap-ins
Getting to know taskpads
Other add-in tools
Customizing MMC to suit your needs
Control Panel versus MMC
Windows Firewall Changes for MMC Tools
Getting to Know the MMC Tools
Certification Authority
Failover Cluster Management
Component Services
Computer Management
Event Viewer
Reliability and Performance
Shared Folders
Using Event Viewer
Server extensions
Using the Security Configuration Wizard
Working with Data Sources (ODBC)
Defining DSNs
Viewing driver information
Tracing
Connection Pooling
Understanding Control Panel Applets
Ease of Access applet
Add Hardware applet
Default Programs applet
Administrative Tools applet
Windows Update
Date and Time applet
Display object . . . Personalization
Folder Options applet
Internet Options applet
Network and Sharing Center applet
Power Options applet
Printers Control Panel applet
System applet
Windows PowerShell
TCP/IP on Windows Server 2008
TCP/IP Basics (IPv4)
IP addressing
Subnetting
Classless Interdomain Routing notation
Classless Interdomain Routing Notation
Obtaining IP addresses
Gateways and routing
Dynamic Host Configuration Protocol (DHCP)
Domains and name resolution
Preparing for installation
Setting Up TCP/IP
Configuring TCP/IP
Understanding and Using IPv6
IPv6 terms and concepts
Using IPv6 in Windows Server 2008
Troubleshooting TCP/IP
Common troubleshooting concepts
ping
ipconfig
netstat
hostname
tracert
route
nbtstat
Legacy protocols
NetBEUI
IPX/SPX
SNMP
Understanding how SNMP works
Installing and configuring SNMP
Windows Firewall Configuration and Management
Overview of Windows Firewall changes
Configuring Windows Firewall
Managing Windows Firewall with Group Policy
Managing Windows Firewall from a console
Windows Firewall with Advanced Security
Windows Firewall with Advanced Security console
Overview of DHCP
The Windows Server DHCP Service
Support for dynamic DNS
Vendor and user classes
Multicast address allocation
Unauthorized DHCP server detection
Automatic client configuration
Monitoringand reporting
Installing and Configuring the DHCP Server
InstallingDHCP
Usingthe DHCP console
Creating scopes
Setting general scope options
Configuringglobal DHCP options
Creating reservations
Setting global scope properties
Activating and deactivating a scope
Authorizingthe server
Defining and Implementing User and Vendor Classes
Vendor classes
User classes
Configuringa client to use class IDs
Creating and Using Superscopes
Creating a superscope
Activatingand deactivating a superscope
Removingscopes from a superscope
Deletingsuperscopes
Creating Multicast Scopes
Configuring Global DHCP Server Properties
Managing the DHCP Database
Backingup and restoring the DHCP database
Movingthe DHCP database to another server
Configuring Windows DHCP Clients
ConfiguringDNS options for DHCP
Network Access Protection
Overview of the Domain Name Service
Understanding domain names
Today’s DNS system
Resolvers, name servers, and forward lookup
Domain records and zone files
Configuring logging
Monitoring and testing
Applying security
Managing the server and cache
Configuring Subdomains and Delegation
Setting up subdomains
Delegating a subdomain
DNS and Active Directory
Dynamic DNS
Configuring DDNS
Configuring scavenging
Windows Internet Name Service (WINS)
How WINS Works
WINS registration
Mapping renewal
WINS Forever
Persistent connections
Manual tombstoning
WINS Installation and Configuration
Installing WINS
Configuring WINS
Configuring Windows Clients for DNS and WINS
Using Hosts and LMHOSTS Files for Name Resolution
Using a Hosts file for name resolution
Using the LMHOSTS file for name resolution
Windows Server 2008 RAS and Telephony Services
Overview of Windows Server 2008 RRAS
New features of Windows Server 2008 RRAS
The Routing and Remote Access management console
RAS Connection Types and Protocols
Point-to-Point Protocol
Point-to-Point Multilink Protocol and BAP
Point-to-Point Tunneling Protocol
Layer Two Tunneling Protocol
Transport protocols
Enabling and Configuring RRAS
IP Routing
IP routing overview
Routing with RRAS
Configuring a basic router
Dynamic routing
Adding and configuring RIP
DHCP relay agent
IGMP – multicast forwarding
Network address translation
Configuring NAT
Configuring Services and Ports
Configuring RAS for Inbound Connections
Enabling RRAS
Configuring modems and ports
Configuring protocols
Configuring authentication
Disabling routing (Remote Access Server only)
RRAS logging and accounting
Configuring a VPN Server
Configuring VPN ports
Enabling L2TP for VPN
Using Multilink and BAP
Policy Server
Creating a new policy
Prioritizing policies
Using RADIUS
Configuring RADIUS
Configuring accounting
Configuring Outgoing Dial-Up Networking Connections
Creating a connection
Configuring connection properties
Configuring dial-up networking to connect to the Internet
Why Back Up Data?
What to Back Up
Understanding Backup
Understanding archive bits
What is a backup?
What is a restore?
Understanding how a backup works
Removable Storage and Media Pools
The Removable Storage Service
The Removable Storage database
Physical locations
Media pools
Work Queue and Operator Requests
Practicing scratch and save
Establishing Quality of Support Baselines for Data Backup/Restore
Establishing Quality of Capture
Best backup time of the day
Length of backup
Backup of servers and workstations
The open files dilemma
Backup Procedure
Performing a Backup
Creating a media pool
Understanding rights and permissions
Understanding source and destination
Setting up schedules
Rotation Schemes
Restoring Data
Tape Location
Backup Bandwidth
Working with Shadow Copies
Disaster Recovery Planning
Policy and protocol
Documentation
Disaster recovery training and action planning
Identifying Resources
Developing Response Plans
Testing Response Plans
Mock Disaster Programs
Understanding fault tolerance
Identifying the Weak Links
Recovery from Backup
Recovery of base operating systems
Recovery of configuration
Mirrored Services, Data, and Hardware
Recovery of Key Services
Active Directory
Registry
Crash Analysis
The purpose of the registry
The Purpose of the Registry
The Registry Structure
Registry hive files
Keys and values
The Registry Editor
Regedit.exe
Modifying the registry
Importing and exporting keys
Editing a remote registry
Loading and unloading hives
Securing the Registry
Preventing access to the registry
Applying permissions to registry keys
Auditing registry access
Securing remote registry access
Auditing Overview
Configuring Auditing
Enabling audit policies
Auditing object access
Examining the Audit Reports
Using the Event Viewer
Using other tools
Strategies for Auditing
Leaving auditing off
Turning all auditing on
Auditing problem users
Auditing administrators
Auditing critical files and folders
Introduction to the .NET Framework
64-bit platform support
Access control list
ADO .NET and LINQ
Asynchronous processing
Understanding the .NET Initiative
The Common Language Runtime
Common Type System
.NET security
Application domains
Garbage collection
.NET vs. the JVM
Configuring the Global Assembly Cache
Understanding Windows Server Printer Services
Printer services: the logical environment
Printer services: the physical environment
Print Services Strategy
Printer taxonomy
Creating print groups
Creating a print network
Keeping drivers current
Installing and Setting Up Printers
Installing the local printer
Publishing Printers
Locating printers
Hiding printers
Printer pools
Loading printer ports
Printer Administration
Printer management
Job management
Advanced spool options
Access control
Troubleshooting
Server-side print problems
Client-side print problems
Enabling bi-directional printing
Auditing Printer Usage and Management
Overview of Storage
Performance and capacity
High availability
Recoverability
Issues with legacy systems
Disk Management
Partition Styles
MBR disks
GPT disks
Removable Storage
Remote Storage and HSM
The Disk Management Snap-in
Basic Storage
Primary partitions
Extended partitions
Basic volumes
Dynamic Volumes and Fault Tolerance
Dynamic disks
RAID-1: Disk mirroring
RAID-5: Fault-tolerant striping with parity
Hardware RAID
Dynamic Storage Management
Converting basic disks to dynamic
Creating simple volumes
Extending simple volumes and spanned volumes
Creating and managing RAID-0 volumes (striping)
Creating and managing RAID-1 volumes
Creating and managing RAID-5 volumes
Importing disks
Managing Storage with Disk Quotas
Why you need disk quotas
Setting disk quotas
Common-sense disk quota management
Disk and volume states
Fixing RAID redundancy failures
Storage Explorer
An Overview of disk structure
An Overview of Disk Structure
FAT16 and FAT32
NTFS
NTFS structure
Disk quotas
Reparse points
Encrypting File System
Hierarchical Storage Management
Directory junctions
Mounted volumes
Transactional NTFS
Choosing a File System
Optimizing Storage Capacity
Optimizing cluster size
Defragmenting volumes
Using disk compression in NTFS
Managing the Distributed File System
DFS structure and terminology
Domain-based DFS namespace vs. standalone DFS namespaces
Client support
Replication with DFS
Replication with DFS-R
Client-side caching
Working with the DFS Management console
Working with Mounted Volumes
Mounting a volume
Unmounting a volume
Services for Network File System
NFS overview
Sharing and Securing Your Data
Ownership
Configuring the File Server Role
File Server Resource Management console
The File Server Resource Management console
Publishing Shares in Active Directory
Creating a Share
Sharing a local folder
Establishing shares by using the Share and Storage Management console
Share Attributes
Deny
Accumulation of share permissions
Moving or copying folders
Intradomain shares
Who can share folders
Hidden shares
Connecting to shares
Connecting users to published shares
Mapping out the DFS namespace for users
Administrative Shares
Commonsense Strategies for Sharing Folders
Restricting shares
Setting up application sharepoints
Setting up data sharepoints
Offline Access (Caching)
Offline attributes
Synchronizing cached resources
Securing Files and Folders by Using Permissions
Permission Types
Permissions Attributes
Inheritance
Taking Ownership
Copying and Moving
Strategies for Managing Permissions
Securing Files by Using the Encrypting File System
How EFS works
Configuring and using a recovery policy
An Overview of Windows Server 2008 Security
The need for security
Data input
Data transport
Why the threat exists
Rising to the Security Challenge
Security Enhancements in Server Roles
Active Directory Domain Controller role service
The DHCP Server Role
The DNS Server Role
Understanding Encryption Basics
Getting to Know Cryptography
Cryptography Next Generation
Keys
Private keys
Public keys
Session keys
Key certificates
Digital signatures
Understanding Kerberos
Kerberos and the Single Sign-On initiative
Psst . . . this is how Kerberos works
Time authentication
Key distribution
Session tickets
Kerberos and trusts
Locating KDCs
Getting to Know IPSec
SSL/TLS
Understanding Active Directory Certificate Services
Public Key Infrastructure
Digital certificates
Creating the PKI with active directory certificate services
Support for Legacy NTLM
Smart Cards
Domains
Logon and Authentication
Windows Server 2008 logon
Bi-factorial and mono-factorial authentication
Trusts
Access Control
Auditing
Security Planning
Firewalls
Active Directory Security Policy
Secure Sockets
Firewalls, Proxies, and Bastions
Introduction to the Public Key Infrastructure
Setting up and Configuring Active Directory Certificate Services
Setting Up and Configuring a Certificate Authority
Deploying a PKI
Trust model
The Omniscient Active Directory
Why do we need directories?
What Is Active Directory?
The grandfather of the modern directory: The X.500 specification
The father of the modern directory: LDAP
After X.500
The open Active Directory
How the registry fits in
The Elements of Active Directory
Namespaces and naming schemes
Active Directory and the Internet
Active Directory everywhere
Inside Active Directory
If it walks like a duck . .
The Active Directory database structure
Active Directory objects
Active Directory schema
Object attributes
Walking the Active Directory
Naming conventions
Domain objects
Organizational units
Trees
Forests
The global catalog
My active directory
Bridging the Divide: Legacy Windows and Windows Server 2008
Single point of access and administration
Domains and more domains
Intra-domain trust relationships
Access control lists and access tokens
Active Directory Overview
Basic Design Principles
Active Directory Structure
A domain plan
Site topology
A forest plan
A trust plan
An organizational unit plan
Planning for theActive Directory Enterprise
Naming strategy plan
Domain and organizational units plan
Branch office plan
Administration Planning
Delegating administration
Delegating forests, trees, and organizational units
Implementing object security
Administrative roles
Migration Planning
Upgrade plan
Restructuring plan
Migration tools
Test-lab plan
Backup and recovery plan
Deploying the Plan
Keepers of the New Order
Active Directory Infrastructure Planning
Planning for the Logical Domain Structure
Preparing yourself mentally
Assembling the team
The domain planning committee
Domain management
Change control management
Domain security
Intradomain communication
Education and information
Surveying the enterprise
Enterprise analysis
Enterprise environments
Working with organizational charts
Identifying the Key Management Entities
Strategic drivers
Identifying the logical units
Identifying the physical units
Administrative modeling
Logical Domain Structure: The Blueprint
The top-level domain
DNS naming practices
Second-level domains
Partitioning the Domain
Working with groups
Securing the partitions
Site links
Site link bridges
Connection objects between sites
Active Directory Replication
How replication works
Directory Synchronization
Active Directory Site Design and Configuration
Topology
Creating DC sites
Deploying domain controllers
Securing domain controllers
Deploying GC servers
Deploying DNS servers
A DDNS architecture
Hub sites
hub site
Deploying WINS servers
Deploying DHCP servers
A Site Architecture
Architecture
Site link cost
Time
Time service architecture
Getting Ready to Deploy
Millennium City Active Directory Deployment Plan
A. Executive Summary
Executive Summary
MCITY network
The GENESIS domain
The CITYHALL domain
The DITT domain
The MCPD domain
Installing and Testing the Active Directory Domain Controllers
Installing the DC machine
Promoting to domain controller
Establishing in DNS/WINS
Creating sites
Creating organizational units (OUs)
Delegating OU administration
Securing the DC and following disaster recovery protocol
Implementation
Install
IP address reservations
Installation of the root domain, MCITY.US
Quality assurance
Installing New Directory Services into an Existing Infrastructure
Replication Management
Installing New Domain Controllers
Installing New Catalog Servers
Protecting Active Directory from Corruption
Online and offline database defragmentation
Ensuring database integrity
Moving Active Directory
Integrating Active Directory with Other Services
Active Directory and SQL Server
Active Directory and Microsoft Exchange
Logon without the Global Catalog
Active Directory and DNS
Active Directory Administration Architecture
Windows Server 2008 group membership
Network services administration
Administration of Enterprise Service Servers
Remote workstation administration architecture
Terminal Services policy
Secure administration
The Windows Server 2008 Account: A User’s Resource
What is a user?
What are contacts?
Local users and ‘‘local users’’
What is a group?
Exploring the Users and Computers management tools
Windows Server 2008 user accounts
Account policy
Security principals and the logon authentication process
Security identifiers
SAM and LSA authentication
User Accounts in Action
Getting familiar with RunAs
Naming user accounts
Passwords
Understanding logon
Granting remote access
Creating a user account
Renaming user accounts
Deleting and disabling user accounts
Copying accounts
Computer Accounts
Group Accounts
The scope of groups
The elements of groups
Installing predefined groups
Groups on member servers
Nesting groups
Group creation
Managing groups
Rights and permissions
Mixed mode versus native mode
The Zen of Managing Users and Groups
Delegating responsibility
User and Group Management Strategies
Keep your eye on TCO
Determine the access and privileges needed
Determine the security level
Protect resources and lessen the load by using Local groups
Delegate with care
Keep changes to a minimum
What Is Change Control?
Understanding Change Management
The user
The computer
Taking Control
Applications
Operating-system environment
Workstation lockdown
Getting ready for change-control policy
Understanding Group Policy
Types of Group Policy
The elements of Group Policy
Where GPOs live
How Group Policy Works
Local or nonlocal Group Policy Objects
Group Policy application
Filtering policy
Delegating control of GP
Security at the local Group Policy Objects
How Group Policy is processed
Putting Group Policy to Work
The software policies
Security policies
Group Policy and Change Management: Putting It All Together
Don’t accept the default policy
Establishing a GP attack plan
Dealing with computer accounts
Getting Started
Customizing logon/logoff
Locking down the desktop
Controlling the Start menu
Folder redirection
Older versions of Windows
Change Control Management for Group Policy
From development to production with Group Policy
Change control for Group Policy
Planning and troubleshooting GP by using the Group Policy Results Wizard
Architecting Group Policy
Password policy
Account lockout policy
Audit policy
Event log
Locking down Domain Admins
Understanding Service Level
Service level: example 1
Service level: example 2
The service level agreement
Service Level Management
Problem detection
Performance management
Availability
SLM by design
SLM and Windows Server 2008
Windows Server 2008 System Monitoring Architecture
Understanding rate and throughput
Understanding queues
Understanding response time
How performance objects work
System monitoring tools
Task Manager
Reliability and Performance Console
Performance Monitor
Performance Logs and Alerts
Creating Data Collector Sets
Getting to Know Your Servers
Monitoring for bottlenecks
Understanding server workload
Performance Monitoring Overhead
Service Level with Microsoft Systems Center Operations Manager
P. 1
Windows Server 2008 Bible

Windows Server 2008 Bible

Ratings: (0)|Views: 3,413|Likes:
Published by Wiley
This version of the Server Bible will be the largest yet, cateringto what is certainly the most advanced operating system introducedby Microsoft. The book will cater to the needs of the serveradministration community and will be designed to be a criticalreference. The book will extensively cover the most notable newfeature of Windows Server known as the "Server Core." Server Coreis a significantly scaled-back installation where no graphicalshell (explorer.exe) is installed, and all configuration andmaintenance is done entirely through the command-line windows, orby connecting to the machine remotely using Microsoft ManagementConsole. Server Core will also not include the .NET Framework,Internet Explorer or many other features not related to core serverfeatures. A Server Core machine can be configured for four basicroles: Domain controller, DNS Server, DHCP Server, and file server.Chapters on setup and installation will also cover the newcomponentized operating system Image-based setup and deploymenttools, using WIM.

In addition to the already extensive Active Directory supportthis book will now fully cover the "Read-Only Domain Controller"operation mode in Active Directory, intended for use in branchoffice scenarios where a domain controller may reside in a lowphysical security environment, was introduced in Windows Server2003 R2 and will be extended in the 2008 version. Chapters coveringpolicy-based networking, branch management and enhanced end usercollaboration will be extended. Windows Server 2008 will also shipInternet Information Services 7 and the current chapters on IISwill thus be extended. Coverage of Windows SharePoint Services 3.0will also be introduced into this part of the book. We will alsoinclude coverage of the improved hot patching technology, which isa feature that allows non-kernel patches to occur without the needfor a reboot.

A significantly upgraded Terminal Services component, supportingRDP 6.0. will be covered in the chapter on terminal services. Themost notable improvement is the ability to share a singleapplication over a Remote Desktop connection, instead of the entiredesktop. This will be added to an already extended chapter on thisremote access technology. In addition to these new features thebook will also carry over existing features brought over from(SP1/R2) of Server 2003. These include covering of new securityfeatures of the operating system, Group Policy management, changecontrol and service level, and administration practices.

This version of the Server Bible will be the largest yet, cateringto what is certainly the most advanced operating system introducedby Microsoft. The book will cater to the needs of the serveradministration community and will be designed to be a criticalreference. The book will extensively cover the most notable newfeature of Windows Server known as the "Server Core." Server Coreis a significantly scaled-back installation where no graphicalshell (explorer.exe) is installed, and all configuration andmaintenance is done entirely through the command-line windows, orby connecting to the machine remotely using Microsoft ManagementConsole. Server Core will also not include the .NET Framework,Internet Explorer or many other features not related to core serverfeatures. A Server Core machine can be configured for four basicroles: Domain controller, DNS Server, DHCP Server, and file server.Chapters on setup and installation will also cover the newcomponentized operating system Image-based setup and deploymenttools, using WIM.

In addition to the already extensive Active Directory supportthis book will now fully cover the "Read-Only Domain Controller"operation mode in Active Directory, intended for use in branchoffice scenarios where a domain controller may reside in a lowphysical security environment, was introduced in Windows Server2003 R2 and will be extended in the 2008 version. Chapters coveringpolicy-based networking, branch management and enhanced end usercollaboration will be extended. Windows Server 2008 will also shipInternet Information Services 7 and the current chapters on IISwill thus be extended. Coverage of Windows SharePoint Services 3.0will also be introduced into this part of the book. We will alsoinclude coverage of the improved hot patching technology, which isa feature that allows non-kernel patches to occur without the needfor a reboot.

A significantly upgraded Terminal Services component, supportingRDP 6.0. will be covered in the chapter on terminal services. Themost notable improvement is the ability to share a singleapplication over a Remote Desktop connection, instead of the entiredesktop. This will be added to an already extended chapter on thisremote access technology. In addition to these new features thebook will also carry over existing features brought over from(SP1/R2) of Server 2003. These include covering of new securityfeatures of the operating system, Group Policy management, changecontrol and service level, and administration practices.

More info:

Publish date: Oct 20, 2008
Added to Scribd: Jan 27, 2010
Copyright:Traditional Copyright: All rights reservedISBN:9780470399699
List Price: $49.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
See more
See less

02/17/2015

1010

9780470399699

$49.99

USD

You're Reading a Free Preview
Pages 21 to 38 are not shown in this preview.
You're Reading a Free Preview
Pages 59 to 222 are not shown in this preview.
You're Reading a Free Preview
Pages 243 to 568 are not shown in this preview.
You're Reading a Free Preview
Pages 589 to 732 are not shown in this preview.
You're Reading a Free Preview
Pages 753 to 1010 are not shown in this preview.

Activity (63)

You've already reviewed this. Edit your review.
rgil252 liked this
1 thousand reads
1 hundred reads
sasagondrong liked this
Liviu liked this
wadoud651 liked this
cristi289 liked this
aquey liked this

You're Reading a Free Preview

Download
scribd