Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Chapter 1: Physical and Logical Devices
Getting Ready Questions
Getting Ready Answers
1.1 Manage basic disks and dynamic disks
1.2 Monitor server hardware
1.2.2 Device Manager
1.2.3 The Hardware Troubleshooting Wizard
1.3 Optimize server disk performance
1.2.1 Implement a RAID solution
1.2.2 Defragment of volumes and partitions
1.4 Troubleshoot server hardware devices
1.4 1 Diagnose and resolve issues related to hardware settings
1.4 2 Diagnose and resolve issues related to server hardware
1.4 3 Diagnose and resolve issues related to hardware driver upgrades
1.5 Install & configure server hardware devices
1.5.1 Configure driver signing options
1.5.2 Configure resource settings for a device
1.5.3 Configure device properties and settings
Chapter 1: Review Questions
Chapter 1: Review Answers
Chapter 2: Users, Computers, and Groups
2.1 Manage user profiles
2.1.1 Local user profiles
2.1.2 Roaming user profiles
Creating a Roaming user profile
2.1.3 Mandatory user profiles
Temporary user profiles
Troubleshooting Damaged Profiles
Deleting and Recreating a User Profile that has been damaged
Creating a Custom Default User Profile
2.2 Create/Manage Computer Accounts in Active Directory Environments
2.3 Create and manage groups
2.3.1 Identify and modify the scope of a group
2.3.2 Find domain groups in which a user is a member
2.3.3 Manage group membership
2.3.5 Create and modify groups by using automation
Containers and Children
Getting and Setting Attributes
Creating a Local Group
Creating a Global Group
Listing Group Members
Enumerating Groups and their Membership
Moving a Group within a Domain
2.4 Create and manage user accounts
Manage User Accounts
2.4.2 Create and modify user accounts by using automation
2.4.3 Import user accounts
2.5.2 Reset computer accounts
2.6 Troubleshoot user accounts
2.6.1 Diagnose and resolve account lockouts
Creating a Password Policy for a Domain
2.6.2 Diagnose and resolve issues related to user account properties
Chapter 2: Review Questions
Chapter 2: Review Answers
Chapter 3: Access to Resources
User Right Administration
3.1 Configure access to shared folders
Sharing Folders using Windows Explorer
Sharing Folders using Shared Folder Console
Sharing Folders using the Command Line
Security Settings on Files and Folders
Shared Folders
Auditing Folders and Files
Implementing an Audit Policy
Security Auditing
Security Configuration and Analysis
Editing the Security Settings on Group Policy Objects
3.2 Troubleshoot Terminal Services
3.2.1 Diagnose/Resolve issues on Terminal Services Security
3.2.2 Diagnose/Resolve issues on Terminal Services Client Access
3.3.1 Verify effective permissions when granting permissions
3.3.2 Change ownership of files and folders
3.4 Troubleshoot access to files and shared folders
Chapter 3: Review Questions
Chapter 3: Review Answers
4.7.2 Event Viewer
Chapter 4: The Server Environment
4.1 Monitor and analyze events
4.1.1 Tools might include: Event Viewer System Monitor Task Manager
4.2 Manage software update infrastructure
4.2.1 Components
4.3 Manage software site licensing
4.3.1 Administering Enterprise Licensing
4.3.2 License Replication Configuring Replication Locally Configuring Replication for Remote Servers
4.4 Manage servers remotely
4.4.1 Manage a server by using Remote Assistance
Offer Remote Assistance
4.4.2 Using Terminal Services Remote Administration Mode
4.4.3 Manage a server by using available support tools
4.5 Troubleshoot print queues
4.5.1 Connect to a local print device
4.5.2 Manage printers and print jobs
4.5.3 Control access with permissions
4.6 Monitor system performance
4.6.1 TCP Parameters
4.7 Monitor file and print servers
4.8 Monitor & optimize a server environment for application performance
Memory Performance
Processor Performance
Network Performance
Application Performance
4.9 Manage a Web server
4.9.1 Manage Internet Information Services (IIS)
About Web Site Administration
Getting Started
Home Directories
Virtual Directories
Reroute Requests with Redirects
4.9.2 Manage security for IIS
IIS Installed Locked Down
Access Control
Server-Gated Cryptography
Chapter 4: Review Questions
Chapter 4: Review Answers
Chapter 5: Disaster Recovery
5.1 Perform system recovery for a server
5.1.1Implement Automated System Recovery (ASR)
5.1.2Restore data from shadow copy volumes
5.1.3Back up files and System State data to media
5.1.4Configure security for backup operations
5.2 Manage backup procedures
5.2.1 Verify the successful completion of backup jobs
5.2.2 Manage backup storage media
5.3 Recover from server hardware failure
5.4 Restore backup data
5.5 Schedule backup jobs
Chapter 5: Review Questions
Chapter 5: Review Answers
Appendix A: List of Tables and Figures
I Listing of all Tables
II Listing of all Figures
Appendix B: Glossary
0 of .
Results for:
No results containing your search query
P. 1


|Views: 218|Likes:
Published by alksdhjfakshf

More info:

Published by: alksdhjfakshf on Jan 30, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 11 to 58 are not shown in this preview.
You're Reading a Free Preview
Pages 69 to 186 are not shown in this preview.
You're Reading a Free Preview
Pages 197 to 278 are not shown in this preview.
You're Reading a Free Preview
Pages 289 to 319 are not shown in this preview.
You're Reading a Free Preview
Pages 330 to 528 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->