rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781572319134

ALS Microsoft Windows NT Network Administration

  • ISBN13:

    9781572319134

  • ISBN10:

    1572319135

  • Format: Hardcover
  • Copyright: 1998-05-01
  • Publisher: Microsoft Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $55.00

Table of Contents

About This Book xv
Intended Audience xvi
Finding the Best Starting Point for You xvi
Conventions Used in This Book xviii
Features of This Book xviii
Notational Conventions xviii
Keyboard Conventions xix
Icons xx
Notes xx
Chapter and Appendix Overview xxi
Getting Started xxiii
Cross-References to Windows NT Documentation xxiv
Setup Procedures xxv
Cleanup Procedures xxxiv
Removing User and Group Accounts xxxiv
Removing Self-Paced Training Files xxxv
The Microsoft Certified Professional Program xxxvi
MCSE Track xxxvii
Introduction to Administering Windows NT
1(34)
About This Chapter
1(1)
Before You Begin
2(1)
Introduction to Windows NT
3(7)
What Is Windows NT Workstation?
3(2)
What Is Windows NT Server?
5(2)
Administrative Differences
7(3)
Overview of Windows NT Directory Services
10(3)
Logging On to Windows NT
13(6)
Logging On
15(4)
Windows NT Administrative Tasks and Tools
19(5)
Windows NT Administrative Tasks
19(1)
Windows NT Administrative Tools
20(4)
The Windows NT Security Dialog Box
24(11)
Best Practices
30(1)
Review
31(1)
Answer Key
32(1)
Procedure Answers
32(1)
Review Answers
32(3)
Setting Up User Accounts
35(44)
About This Chapter
35(1)
Before You Begin
35(1)
Introduction to User Accounts
36(4)
Types of User Accounts
36(1)
Where Accounts Are Created
37(3)
Planning New User Accounts
40(8)
Elements to Consider in Planning New User Accounts
40(1)
Naming Convention
41(1)
Password Requirements
41(1)
Logon Hours
42(1)
Workstation Restrictions
42(1)
Home Folder Location
42(6)
Creating User Accounts
48(17)
User Manager vs. User Manager for Domains
48(2)
Setting Password Options
50(1)
Creating a Home Folder
51(4)
Setting Logon Hours
55(2)
Setting Workstation Restrictions
57(1)
Setting Account Options
58(1)
Granting Dial-in Permission
59(2)
Deleting and Renaming User Accounts
61(4)
Creating User Profiles
65(14)
User Profiles
65(2)
Roaming User Profiles
67(1)
Creating Roaming User Profiles
68(1)
Copying the Profile to a Network Server
69(2)
Specifying the Path to the Roaming Profile
71(3)
Best Practices
74(1)
Review
75(1)
Answer Key
76(1)
Procedure Answers
76(1)
Review Answers
77(2)
Setting Up Group Accounts
79(50)
About This Chapter
79(1)
Before You Begin
80(1)
Introduction to Groups
81(9)
Permission and User Rights
81(1)
Local and Global Groups
82(2)
Where Local Groups Are Created
84(1)
Where Global Groups Are Created
85(1)
Video: Local and Global Groups
85(2)
Example: Using Groups in a Single-Domain Network
87(1)
Example: Using Groups in a Multiple-Domain Network
88(2)
Planning a Group Strategy
90(6)
Creating Local and Global Groups
96(10)
Rules for Creating Groups
97(1)
Creating Global Groups
97(3)
Creating Local Groups
100(3)
Deleting Groups
103(3)
Implementing Built-in Groups
106(23)
Determining the Rights of Built-in Groups
107(2)
Built-in Groups on All Windows NT Computers
109(1)
Built-in Groups on Domain Controllers Only
110(3)
Built-in System Groups
113(2)
Implementing Built-in Groups for Local Administration
115(1)
Implementing Built-in Groups for Centralized Administration
116(3)
Best Practices
119(1)
Review
120(2)
Answer Key
122(1)
Procedure Answers
122(4)
Review Answers
126(3)
Administering User and Group Accounts
129(44)
About This Chapter
129(1)
Before You Begin
130(1)
Introduction to Administering Accounts
131(8)
Administrative Tasks
131(1)
Distributing Administrative Tasks
132(1)
Using Templates
133(3)
Using Templates to Create User Accounts
136(3)
Implementing an Account Policy
139(11)
Setting an Account Policy
139(1)
Planning an Account Policy
140(1)
Setting Password Options
141(1)
Setting Account Lockout Options
142(5)
Unlocking User Accounts
147(1)
Resetting User Account Passwords
148(2)
Modifying Multiple User Accounts
150(3)
Maintaining Domain Controllers
153(11)
Server Manager
154(1)
When the PDC Needs to Be Taken Offline
155(1)
When a PDC Goes Offline Unexpectedly
156(2)
Restoring the Original Domain Controller Roles
158(2)
Synchronizing Domain Controllers
160(4)
Troubleshooting Logon Problems
164(9)
Troubleshooting User Logon Problems
165(3)
Review
168(1)
Answer Key
169(1)
Procedure Answers
169(2)
Review Answers
171(2)
Securing Network Resources with Share Permissions
173(36)
About This Chapter
173(1)
Before You Begin
173(1)
Introduction to Shared Folders
174(7)
What Are Shared Folders?
174(1)
Share Permissions
175(2)
How Share Permissions Are Applied
177(1)
Example of Applied Permissions
178(3)
Guidelines for Planning Shared Folders
181(11)
Examples of Shared Folders
182(1)
Guidelines for Assigning Permissions
183(4)
Guidelines for Sharing Home Folders
187(5)
Sharing Folders
192(8)
Requirements for Sharing a Folder
192(1)
Administrative Shares
192(1)
Sharing a Folder
193(2)
Assigning Share Permissions
195(3)
Modifying Shared Folders
198(2)
Connecting to Shared Folders
200(9)
Best Practices
205(1)
Review
206(1)
Answer Key
207(1)
Procedure Answers
207(1)
Review Answers
208(1)
Securing Network Resources with NTFS Permissions
209(60)
About This Chapter
209(1)
Before You Begin
210(1)
Introduction to NTFS Permissions
211(6)
What Are NTFS Permissions?
211(1)
Why Use NTFS Permissions?
212(2)
How NTFS Permissions Are Applied
214(3)
Combining Share Permissions and NTFS Permissions
217(6)
Video: Permissions
218(5)
Guidelines for Assigning NTFS Permissions
223(7)
Guidelines for Planning Program Folders
223(1)
Guidelines for Planning Data Folders
223(1)
Guidelines for Planning Home Folders
224(1)
Creating Home Folders on an NTFS Volume
224(6)
Assigning NTFS Permissions
230(10)
Requirements for Assigning NTFS Permissions
230(1)
Default NTFS Permissions
230(1)
Assigning NTFS Folder and File Permissions
230(6)
Assigning Special Access Permissions
236(4)
Taking Ownership of Folders and Files
240(5)
How to Take Ownership
241(1)
Giving Users the Ability to Take Ownership
241(4)
Copying or Moving Folders and Files
245(6)
Copying a Folder or File
245(1)
Moving a Folder or File
246(1)
Permission Requirements
246(1)
Example of Copying and Moving Folders and Files
247(4)
Troubleshooting Permission Problems
251(18)
Deleting a File That Has the No Access Permission
253(5)
Best Practices
258(1)
Review
259(2)
Answer Key
261(1)
Procedure Answers
261(6)
Review Answers
267(2)
Setting Up a Network Print Server
269(36)
About This Chapter
269(1)
Before You Begin
269(1)
Introduction to Windows NT Printing
270(4)
Windows NT Printing Terms
270(2)
Requirements
272(2)
Setting Up a Network Print Server and Client
274(16)
Adding and Sharing a New Printer
275(4)
Sharing an Existing Printer
279(1)
Setting Up a Network Client
280(1)
Accessing a Network Printer
281(3)
Assigning Printer Permissions
284(6)
Configuring a Printer
290(15)
Creating a Printing Pool
290(2)
Setting Priorities Between Printers
292(1)
Scheduling Printers
293(3)
Assigning Forms to Paper Trays
296(1)
Setting a Separator Page
297(3)
Best Practices
300(1)
Review
301(1)
Answer Key
302(1)
Procedure Answers
302(1)
Review Answers
303(2)
Administering a Network Print Server
305(24)
About This Chapter
305(1)
Before You Begin
306(1)
Introduction to Administering Print Servers
307(3)
Print Server Administration Requirements
308(2)
Managing Documents
310(5)
Setting a Notification, Priority, and Printing Time
310(3)
Deleting a Document from a Printer
313(2)
Managing Printers
315(7)
Pausing, Resuming, and Purging a Printer
315(2)
Redirecting Documents
317(2)
Taking Ownership of a Printer
319(3)
Identifying Printing Problems
322(7)
How Documents Are Printed
322(1)
Identifying and Troubleshooting Printing Problems
323(3)
Review
326(2)
Answer Key
328(1)
Procedure Answers
328(1)
Review Answers
328(1)
Auditing Resources and Events
329(34)
About This Chapter
329(1)
Before You Begin
330(1)
Introduction to Auditing
331(3)
Planning and Implementing the Audit Policy
334(12)
Planning the Audit Policy
334(1)
Implementing the Audit Policy
335(1)
Defining the Domain Audit Policy
336(4)
Auditing Folders and Files
340(3)
Auditing a Printer
343(3)
Using Event Viewer to View the Security Log
346(17)
Administrative Requirements for Viewing the Security Log
347(1)
Viewing the Security Log
347(3)
Filtering Events
350(2)
Locating Events
352(1)
Archiving the Security Log
353(4)
Best Practices
357(1)
Review
358(2)
Answer Key
360(1)
Procedure Answers
360(1)
Review Answers
361(2)
Monitoring Resources
363(30)
About This Chapter
363(1)
Before You Begin
364(1)
Introduction to Monitoring Resources
365(4)
Server Manager
365(1)
Windows NT Diagnostics
365(1)
Requirements
366(3)
Viewing Computer Properties
369(10)
Viewing User Sessions
371(2)
Monitoring Shared Resources
373(2)
Monitoring Resources in Use
375(4)
Setting Alerts and Sending Messages
379(4)
Setting Administrative Alerts
379(1)
Sending Messages to Users
380(3)
Using Windows NT Diagnostics
383(10)
Gathering Information
385(1)
Creating and Printing a Report
386(3)
Best Practices
389(1)
Review
390(1)
Answer Key
391(1)
Procedure Answers
391(1)
Review Answers
391(2)
Backing Up and Restoring Files
393(52)
About This Chapter
393(1)
Before You Begin
394(1)
Introduction to the Windows NT Backup Program
395(4)
Requirements
396(1)
Creating a Backup Operator
396(3)
Planning a Backup Strategy
399(11)
Determining Which Files to Back Up
400(1)
Determining the Backup Type to Use
401(1)
Examples of Using Different Backup Types
402(1)
Rotating and Archiving Tapes
403(2)
Backup Sets, Catalogs, and Backup Logs
405(5)
Backing Up Files
410(8)
Preparing to Back Up Files
410(1)
Selecting Drives, Folders, and Files
411(1)
Setting Tape, Backup Set, and Log Options
412(2)
Implementing a Backup
414(4)
Scheduling a Backup Using a Batch File
418(9)
Example of a Scheduled Backup
420(2)
Using the AT Command
422(2)
Using the Command Scheduler
424(3)
Restoring Files
427(18)
Implementing a Restoration Strategy
427(1)
Creating a Restore Operator
428(1)
Examples of Restoration Strategies
429(1)
Preparing to Restore Files
430(1)
Loading the Tape and Backup Set Catalogs
430(2)
Selecting Backup Sets, Files, and Folders
432(1)
Setting Restore and Log Options
433(1)
Implementing the Restoration of Files
434(4)
Best Practices
438(1)
Review
439(2)
Answer Key
441(1)
Procedure Answers
441(1)
Review Answers
442(3)
Appendix A Planning Worksheets 445(6)
User Accounts Planning Worksheet
446(1)
Group Accounts Planning Worksheet
447(1)
Shared Folders Planning Worksheet
448(1)
NTFS Permissions Planning Worksheet
449(1)
Backup Planning Worksheet
450(1)
Glossary 451(34)
Index 485

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program