did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735620476

Microsoft Windows Server 2003 Administrator's Companion

by ;
  • ISBN13:

    9780735620476

  • ISBN10:

    0735620474

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2006-02-22
  • Publisher: Microsoft Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $69.99 Save up to $17.50
  • Buy Used
    $52.49
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

Now updated for Windows Server 2003 with Service Pack 1 and R2, this Administrator's Companion comes packed with practical information to help you plan, implement, and support the Windows Server 2003 operating system.

Author Biography

Jason Gerend has co-authored numerous books, including The Effective Executive's Guide To Outlook 2002, The New Webmaster's Guide to Dreamweaver 4, and the New Webmaster's Guide to FrontPage 2002. He also helped Sharon and Charlie write the first edition of the Microsoft Windows 2000 Server Administrator's Companion, and Windows 2000 Pro: The Missing Manual. A Microsoft Certified Systems Engineer (MCSE), Jason enjoys hiking and installing operating systems for fun. He's been fooling around with computers since the days of MS-DOS 2, was a big fan of OS/2 2.1, and has been a freelance Webmaster and computer consultant since 1995.

Table of Contents

Acknowledgments xliii
Introduction xlv
System Requirements li
Part I Preparation
Overview of Windows Server 2003
3(14)
Versions of Windows Server 2003
4(1)
Deploying Windows Server 2003 and Windows Clients
5(1)
Network Management
6(3)
Printer Management
7(1)
Group Policy
7(1)
IntelliMirror
8(1)
Terminal Services
8(1)
Interoperability
9(1)
System and Network Security
9(2)
Availability and Reliability
11(1)
Active Directory
11(2)
Storage and File System Support
13(1)
Communications
13(1)
Internet Services and .NET Application Services
14(1)
Scalability
14(1)
The Need for Planning
15(1)
Summary
16(1)
Introducing Directory Services
17(12)
Understanding Directory Services
17(2)
Active Directory in Microsoft Windows Server 2003
19(4)
Terminology and Concepts in Active Directory
20(3)
The Active Directory Architecture
23(4)
The Directory System Agent
23(1)
Naming Formats
24(1)
The Data Model
24(1)
Schema Implementation
25(1)
The Security Model
25(1)
Delegation and Inheritance
26(1)
Naming Contexts and Partitions
26(1)
The Global Catalog
26(1)
Summary
27(2)
Planning Namespace and Domains
29(14)
Analyzing Naming Convention Needs
29(7)
Trees and Forests
29(2)
Defining a Naming Convention
31(3)
Determining Name Resolution
34(2)
Planning a Domain Structure
36(4)
Domains vs. Organizational Units
36(2)
Designing a Domain Structure
38(1)
Domain Security Guidelines
39(1)
Creating Organizational Units
40(1)
Planning Multiple Domains
40(2)
Planning a Contiguous Namespace
41(1)
Determining the Need for a Multi-Tree Forest
41(1)
Creating the Forest
41(1)
Summary
42(1)
Planning Deployment
43(12)
How Information Technology Functions
44(1)
Identifying Business Needs
45(1)
Getting Specific
45(1)
Seeing into the Future
46(1)
Assessing Current Systems
46(3)
Documenting the Network
46(3)
Making a Roadmap
49(3)
Defining Goals
50(1)
Assessing Risk
50(2)
Summary
52(3)
Part II Installation and Configuration
Getting Started
55(50)
Designing a Deployment Environment
55(17)
Choosing an Installation Method
57(4)
Choosing a Preinstallation Environment
61(1)
Choosing a Software Update Solution
61(1)
Choosing an Application Deployment Solution
62(1)
Understanding Licensing and Product Activation
63(2)
Designing a Test Lab
65(1)
Planning Server Configurations
66(5)
Creating Your Deployment Plan
71(1)
Creating Your Deployment Environment
72(19)
Using Setup Manager
72(6)
Using Unattended Setup with Windows Server 2003 R2
78(2)
Creating and Modifying a Distribution Share
80(9)
Using Sysprep with Disk Imaging
89(2)
Installing Windows
91(7)
Preparing the System
91(1)
Performing a Manual Installation of Windows
91(3)
Initiating Windows Setup Using an Answer File
94(1)
Initiating Setup Using Command-Line Parameters
95(3)
Troubleshooting Installations
98(5)
Setup Freezes or Locks Up
99(1)
Setup Stops During File Copying
100(1)
Previous Operating System Will Not Boot
101(2)
Summary
103(2)
Upgrading to Windows Server 2003
105(54)
Architectural Changes Since Windows NT 4.0
106(8)
Domain Controllers and Server Roles
106(1)
Active Directory
107(5)
Hardware Support
112(1)
Software Support
113(1)
Planning a Windows NT Domain Upgrade
114(23)
Choosing Whether to Upgrade or Migrate
114(2)
Documenting the Existing Network
116(5)
Planning the Active Directory Forest
121(10)
Making a Recovery Plan
131(2)
Developing an Upgrade Strategy
133(4)
Preparing Domains and Computers
137(3)
Reviewing Server Upgrade Requirements
137(1)
Preparing Windows NT Domains
138(1)
Preparing the Computers
138(2)
Updating the Active Directory Schema
140(7)
Testing Active Directory Functionality in Active Directory Domains
140(1)
Updating the Active Directory Forest Schema
141(2)
Verifying the Forest Schema Update
143(2)
Updating the Active Directory Domain Schema
145(2)
Upgrading Clients to Windows XP
147(2)
Upgrading Servers to the Windows Server 2003 Family
149(2)
Installing Windows Server 2003 R2
149(1)
Upgrading a Server to Windows Server 2003
150(1)
Switching Forest and Domain Functional Levels
151(7)
Choosing a Forest Functional Level
151(3)
Choosing a Domain Functional Level
154(3)
Switching Functional Levels
157(1)
Summary
158(1)
Configuring a New Installation
159(28)
Installing Updates
159(3)
Enabling Remote Administration
162(2)
Checking for Setup Problems
164(1)
Configuring Devices
164(5)
Using Device Manager
165(3)
Configuring Storage
168(1)
Configuring Networking Settings
169(9)
Changing Your Network Identity
169(1)
Configuring Network Components
170(1)
Configuring TCP/IP
171(7)
Setting Up Server Roles
178(6)
Securing Windows
184(1)
Summary
185(2)
Installing and Managing Printers
187(40)
Planning Printer Deployment
187(8)
Establishing Printer Naming Conventions
188(1)
Creating Location-Naming Conventions
188(3)
Enabling Printer Location Tracking
191(1)
Choosing Whether to Upgrade or Migrate Print Servers
192(3)
Installing Printers
195(4)
Managing Printers and Print Servers
199(9)
Using the Print Management Console
199(5)
Managing Print Jobs from Windows
204(2)
Managing Printers from a Web Browser
206(1)
Managing Printers from a Command Line
207(1)
Changing Printer Options
208(6)
Setting Security Options
208(1)
Changing Printer Availability and Group Priorities
209(1)
Specifying a Separator Page
210(2)
Changing Spool Settings
212(2)
Managing Printer Drivers
214(3)
Managing Printer Drivers
215(1)
Creating Printer Pools and Changing Port Settings
216(1)
Printer Maintenance and Troubleshooting
217(9)
Optimizing Print Server Performance
218(1)
Preparing for Print Server Failure
218(1)
Printing from the Client Machine Experiencing the Problem
219(5)
Checking the Print Server Status
224(1)
Checking the Printer
224(1)
Deleting Stuck Documents
225(1)
Troubleshooting Printer Location Tracking
225(1)
Summary
226(1)
Managing Users and Groups
227(40)
Understanding Groups
227(3)
Assigning Group Scopes
228(2)
Planning Organizational Units
230(2)
Creating Organizational Units
231(1)
Moving Organizational Units
232(1)
Deleting Organizational Units
232(1)
Planning a Group Strategy
232(2)
Determining Group Names
233(1)
Using Global and Domain Local Groups
233(1)
Using Universal Groups
233(1)
Implementing the Group Strategy
234(3)
Creating Groups
234(1)
Deleting Groups
235(1)
Adding Users to a Group
235(2)
Managing Built-In Groups and User Rights
237(10)
Built-In Local Groups
237(2)
Built-In Domain Local Groups
239(2)
Built-In Global Groups
241(1)
Defining User Rights
242(5)
Creating User Accounts
247(6)
Naming User Accounts
247(1)
Account Options
248(1)
Passwords
249(1)
Creating a Domain User Account
250(1)
Creating a Local User Account
251(1)
Setting User Account Properties
251(1)
Testing User Accounts
252(1)
Managing User Accounts
253(4)
Finding a User Account
253(1)
Disabling and Enabling a User Account
254(1)
Deleting a User Account
255(1)
Moving a User Account
255(1)
Renaming a User Account
256(1)
Resetting a User's Password
256(1)
Unlocking a User Account
257(1)
Using Home Folders
257(2)
Creating Home Folders on a Server
257(1)
Providing Home Folders to Users
258(1)
Maintaining User Profiles
259(6)
Local Profiles
261(1)
Roaming Profiles
261(3)
Assigning a Logon Script to a User Profile
264(1)
Summary
265(2)
Managing File Resources
267(28)
Sharing File Resources
267(1)
Shared Folders
268(1)
NFS Shared Folders
268(1)
Active Directory Shared Folders
268(1)
DFS Folders
268(1)
Share Permissions vs. File Permissions
268(2)
Share Permissions
269(1)
File Permissions
269(1)
NTFS Permissions
270(9)
What Permissions Mean
270(1)
How Permissions Work
271(1)
Considering Inheritance
272(1)
Configuring Folder Permissions
273(1)
Assigning Permissions to Files
274(1)
Configuring Special Permissions
274(2)
Ownership and How It Works
276(3)
Shared Folders
279(9)
Using the File Server Management Snap-In
279(2)
Creating a Shared Folder
281(3)
Removing a Folder Share
284(1)
Disconnecting Users
284(1)
Limiting Simultaneous Connections
284(1)
Special Shares
285(2)
The Command Line---Net Share
287(1)
NFS Shared Folders
288(4)
Initial Configuration
288(2)
Creating an NFS Share
290(2)
Deleting or Modifying an NFS Share
292(1)
Publishing Shares in Active Directory
292(1)
Summary
293(2)
Administering Group Policy
295(28)
Components of Group Policy
296(2)
Group Policy Objects
296(2)
Default Group Policies
298(1)
Managing Group Policies
298(5)
Order of Implementation
301(1)
Order of Inheritance
301(1)
Overriding Inheritance
302(1)
Creating a Group Policy Object
303(2)
Creating a GPO in GPMC
304(1)
Creating a GPO on a Computer Without GPMC
304(1)
Inside the Group Policy Object Editor
304(1)
Managing Group Policy Links
305(1)
Linking a GPO Using GPMC
306(1)
Linking a GPO Without GPMC
306(1)
Setting the Scope of Group Policy Objects
306(2)
Using GPMC to Set the Scope for a GPO
307(1)
Setting the GPO Scope Without GPMC
308(1)
Delegating Permissions on GPOs
308(3)
Delegating Group Policy Using GPMC
309(1)
Delegating Group Policy Without GPMC
310(1)
Disabling a Branch of a GPO
311(1)
Refreshing Group Policy
311(1)
Backing Up a Group Policy Object
312(1)
Restoring a Group Policy Object
313(1)
Using Group Policy for Folder Redirection
313(4)
Using Resultant Set of Policy (RSoP)
317(3)
Running an RSoP Query
317(1)
A Planning RSoP
318(1)
A Logging RSoP
319(1)
Summary
320(3)
Part III Network Administration
Managing Daily Operations
323(28)
Using the Microsoft Management Console
323(8)
Convenience Consoles
324(1)
Creating an MMC-Based Console with Snap-Ins
324(7)
Using the Secondary Logon
331(3)
Opening Programs Using Run As
332(1)
Making Shortcuts to Run As
333(1)
Using Runas for Printers or Control Panel
333(1)
Administrative Tools
334(1)
Installing Administrative Tools Locally
334(1)
Making Administrative Tools Available Remotely
335(1)
Support Tools
335(1)
Automating Chores with Scripts
335(1)
Auditing Events
336(7)
Audit Settings for Objects
338(1)
Viewing Event Logs
339(1)
Searching Event Logs
340(1)
Filtering Event Logs
341(1)
Setting the Size of Event Logs
341(1)
Archiving Event Logs
342(1)
Delegating Control
343(1)
Using Task Scheduler
344(3)
Changing a Schedule
345(1)
Tracking Task Scheduler
346(1)
Viewing Tasks on a Remote Computer
347(1)
Using the AT Command
347(1)
Using cron
348(1)
Summary
349(2)
Using Scripts for Consistent Administration
351(26)
Scripting on Windows Server 2003
352(5)
Windows Server 2003 Scripting Infrastructure
352(2)
Extending the Infrastructure
354(1)
What's New in Windows Server 2003 Scripting
355(2)
Scripting Practices
357(16)
Think from the Command Prompt
357(1)
Write WSH Scripts as Console Tools
357(5)
Credentials and Scripting
362(1)
Path Management Practices
363(3)
Input and Output Handling
366(1)
Use Good Error Management
367(3)
WMI Scripting Issues
370(1)
Translating Script Languages
371(2)
Noninteractive Scripts: Remote and Scheduled Use
373(1)
The Future of Windows Scripting
373(3)
Summary
376(1)
Installing and Configuring Active Directory
377(56)
Using the Active Directory Installation Wizard
378(17)
Preparing for Installation
379(2)
Promoting Your First Server to a Domain Controller
381(5)
Choosing Installation Options
386(5)
Upgrading Windows NT 4 Domain Controllers
391(1)
Demoting a Domain Controller
392(2)
Changing a Domain Controller Identification
394(1)
Setting a Global Catalog Server
394(1)
Using Active Directory Domains and Trusts
395(8)
Launching Active Directory Domains and Trusts
395(1)
Domain and Forest Functionality
396(4)
Managing Domain Trust Relationships
400(2)
Specifying the Domain Manager
402(1)
Configuring User Principal Name Suffixes for a Forest
402(1)
Managing Domains
403(1)
Using Active Directory Users and Computers
403(25)
Launching Active Directory Users and Computers
403(1)
Viewing Active Directory Objects
404(7)
Creating an Organizational Unit
411(1)
Configuring OU Objects
412(2)
Delegating Object Control
414(3)
Creating a User Object
417(1)
Configuring User Objects
418(5)
Creating a Group
423(2)
Configuring Group Objects
425(1)
Creating a Computer Object
425(1)
Configuring Computer Objects
426(1)
Using Remote Computer Management
426(1)
Publishing a Shared Folder
427(1)
Publishing a Printer
427(1)
Moving, Renaming, and Deleting Objects
428(1)
Renaming a Domain Controller or a Whole Domain
428(2)
Renaming a Domain Controller
429(1)
Renaming Domains
429(1)
Using Active Directory Federation Services
430(1)
Summary
431(2)
Managing Active Directory
433(36)
Using Active Directory Sites and Services
433(12)
Defining Site Objects
434(2)
Understanding Domain Replication
436(2)
Launching Sites and Services
438(7)
Using Active Directory Schema
445(22)
Examining Schema Security
445(1)
Launching Active Directory Schema
446(2)
Modifying the Schema
448(6)
Modifying Display Specifiers
454(3)
Performing Batch Importing and Exporting
457(1)
Using the Ldifde.exe Utility
457(3)
Understanding Operations Master Roles
460(7)
Summary
467(2)
Understanding TCP/IP
469(26)
The TCP/IP Protocol Suite
469(5)
Internet Protocol
470(1)
Transmission Control Protocol
470(1)
User Datagram Protocol
471(1)
Windows Sockets
471(1)
NetBIOS
472(1)
Requests for Comments
472(2)
IP Addresses and What They Mean
474(3)
Class A Networks
474(1)
Class B Networks
475(1)
Class C Networks
475(1)
Class D and Class E Addresses
476(1)
Routers and Subnets
477(4)
What Is a Subnet?
477(2)
Gateways and Routers
479(1)
Address Resolution and Routing Protocols
480(1)
Name Resolution
481(11)
The Domain Name System
481(6)
Dynamic Host Configuration Protocol
487(2)
Windows Internet Name Service
489(3)
IP Version 6
492(2)
Summary
494(1)
Administering TCP/IP
495(44)
Using DHCP
496(19)
Designing DHCP Networks
496(2)
Installing the DHCP Service
498(1)
Creating a New Scope
499(4)
Authorizing the DHCP Server and Activating Scopes
503(1)
Adding Address Reservations
504(1)
Enabling Dynamic Updates to a DNS Server for Earlier Clients
505(2)
Using Multiple DHCP Servers for Redundancy
507(3)
Other DHCP Functions
510(1)
Setting Up a DHCP Relay Agent
511(2)
Backing Up and Restoring the DHCP Database
513(1)
Using Ipconfig to Release, Renew, or Verify a Lease
514(1)
DHCP Command-Line Administration
514(1)
Using DNS Server
515(17)
Installing DNS
515(1)
Using the Configure A DNS Server Wizard
516(5)
Creating Zones
521(1)
Creating Subdomains and Delegating Authority
522(2)
Adding Resource Records
524(3)
Configuring Zone Transfers
527(1)
Interoperating with Other DNS Servers
528(1)
Enabling WINS Resolution
529(1)
Setting Up a Forwarder
529(2)
Updating Root Hints
531(1)
Setting Up a Caching-Only DNS Server
531(1)
Setting Up a WINS Server
532(5)
Determining Whether You Need WINS
532(1)
Configuring the Server to Prepare for WINS
533(1)
Installing WINS
533(1)
Adding Replication Partners
534(2)
Miscellaneous WINS Functions
536(1)
Compacting the WINS Database
537(1)
Summary
537(2)
Implementing Disk Management
539(36)
Understanding Disk Terminology
539(3)
Overview of Disk Management
542(4)
Disk Administration Enhancements
543(2)
Remote Management
545(1)
Dynamic Disks
545(1)
Command Line
545(1)
Disk Management Tasks
546(25)
Adding a Partition or Volume
546(12)
Converting a Disk to a Dynamic Disk
558(1)
Extending a Volume
559(2)
Adding a Mirror
561(5)
Converting a Volume or Partition from FAT to NTFS
566(1)
Formatting a Partition or Volume
566(3)
Changing a Drive Letter
569(1)
Mounting a Volume
570(1)
NTFS
571(3)
Encrypting on the File System Level
571(3)
Disk Quotas, File Screening, and Shadow Copies
574(1)
Summary
574(1)
Using Clusters
575(38)
What Is a Cluster?
575(2)
Network Load Balancing Clusters
576(1)
Server Clusters
576(1)
Cluster Scenarios
577(2)
Intranet or Internet Functionality
577(1)
Terminal Services
578(1)
Mission-Critical Availability
578(1)
Requirements and Planning
579(1)
Identifying and Addressing Goals
579(1)
Identifying a Solution
579(1)
Identifying and Addressing Risks
580(1)
Making Checklists
580(1)
Network Load Balancing Clusters
580(10)
NLB Concepts
581(1)
Choosing an NLB Cluster Model
582(1)
Creating an NLB Cluster
583(5)
Planning the Capacity of an NLB Cluster
588(1)
Providing Fault Tolerance
589(1)
Optimizing an NLB Cluster
589(1)
Server Clusters
590(21)
Server Cluster Concepts
590(2)
Types of Resources
592(3)
Defining Failover and Failback
595(1)
Configuring a Server Cluster
595(2)
Planning the Capacity of a Server Cluster
597(1)
Creating a Server Cluster
598(13)
Compute Clusters
611(1)
Summary
612(1)
Managing Storage
613(90)
Using File Server Resource Manager
614(16)
Setting Global Options
614(1)
Scheduling Storage Reports
615(3)
Using Quota Management
618(6)
Screening Files
624(6)
Using Disk Quotas
630(4)
Enabling Disk Quotas
631(1)
Setting Quota Entries for Users
632(1)
Exporting and Importing Disk Quotas
633(1)
Creating Quota Reports
634(1)
Distributed File System
634(29)
What's New in DFS for Windows Server 2003 R2
636(1)
Concepts and Terminology
637(4)
Requirements
641(3)
Installing DFS Management and DFS Replication
644(1)
DFS Namespaces
644(8)
DFS Replication
652(11)
Overview of Storage Manager For SANs
663(13)
Concepts and Terminology
665(3)
Installing Storage Manager For SANs
668(1)
Using the Storage Manager For SANs Console
669(1)
Managing Server Connections
670(2)
Managing iSCSI Targets
672(1)
Managing iSCSI Security
673(1)
Logging On to iSCSI Targets
674(1)
Creating and Deploying Logical Units (LUNs)
675(1)
Extending a LUN
676(1)
Removable Storage
676(10)
Concepts and Terminology
677(3)
Use and Management
680(6)
Remote Storage
686(13)
Concepts and System Requirements
687(3)
Setup and Configuration
690(5)
Data Recovery and Protection
695(4)
Summary
699(4)
Part IV Security
Planning for Security
703(30)
Security Basics
704(6)
Authentication
704(3)
Data Protection
707(2)
Access Control
709(1)
Auditing
710(1)
Nonrepudiation
710(1)
Smart Cards
710(1)
Public-Key Infrastructures
711(10)
Public-Key Encryption vs. Symmetric-Key Encryption
713(1)
Public-Key Certificates and Private Keys
714(1)
Certificate Authorities
715(1)
Root and Subordinate Certificate Authorities
715(2)
Certificate Registration
717(1)
Certificate Directories
718(1)
Certificate Templates
719(1)
Certificate Revocation
719(1)
Certificate Renewal
720(1)
Full CRLs and Delta CRLs
721(1)
Security-Enabled Protocols
721(6)
Secure Multipurpose Internet Mail Extensions
721(1)
Kerberos Version 5
722(2)
Windows NT LAN Manager
724(1)
Secure Sockets Layer
724(1)
Internet Protocol Security
725(2)
Virtual Private Networks
727(2)
Remote Access VPNs
728(1)
Router-to-Router VPNs
729(1)
Windows Rights Management Services
729(1)
Security Modules
730(1)
Cryptographic Application Programming Interface
730(1)
Cryptographic Service Providers
730(1)
CAPICOM
731(1)
Data Protection API
731(1)
Summary
731(2)
Implementing Security
733(50)
The Security Configuration Wizard
734(5)
Installing the Wizard
734(1)
Using the Wizard
735(4)
Deploying the Policy
739(1)
Using Templates to Implement Security Policies
739(7)
Examining Template Policies
741(1)
Using Predefined Templates
741(3)
Defining New Templates
744(1)
Applying Templates
745(1)
Using Security Configuration and Analysis
746(4)
Opening a Security Database
746(1)
Importing and Exporting Templates
747(1)
Analyzing Security and Viewing the Results
747(2)
Configuring Security
749(1)
Using Windows Firewall
750(1)
Enabling Authentication
751(6)
Obtaining Smart Cards and Certificates
752(1)
Logging On with Smart Cards
753(1)
Enabling Remote Certificate or Smart Card Authentication
754(3)
Configuring Authentication for a Remote Access Server
757(1)
Implementing Access Control
757(3)
Establishing Ownership
758(1)
Assigning Permissions
759(1)
Managing Certificates
760(4)
Exporting Certificates and Private Keys
761(1)
Importing Certificates
762(1)
Requesting Certificates
762(1)
Enabling Certificates for Specific Purposes
763(1)
Using Internet Protocol Security Policies
764(9)
Defining IPSec Policies
764(1)
Using Predefined IPSec Policies
765(2)
Creating an IPSec Policy
767(1)
Editing an IPSec Policy
768(4)
Assigning IPSec Policies
772(1)
Securing Local Data
773(5)
Creating a Recovery Policy
773(2)
Encrypting Files and Folders
775(1)
Decrypting Files and Folders
775(1)
Sharing Encrypted Files and Folders
776(1)
Recovering Files
776(2)
Auditing
778(3)
Establishing an Audit Policy
778(1)
Auditing Access to Objects
779(1)
Viewing the Security Log
780(1)
Using Microsoft Baseline Security Analyzer
781(1)
What to Do When Hacked
782(1)
Summary
782(1)
Patch Management
783(14)
Why It's Important
784(1)
The Patching Cycle
785(4)
Assess
785(1)
Identify
786(2)
Evaluate and Plan
788(1)
Deploy
788(1)
Repeat
789(1)
Deployment Testing
789(2)
Test Network Deployment
789(2)
Beta User Deployment
791(1)
Full Deployment
791(1)
Obtaining Updates
791(4)
Automatic Updates
791(1)
Windows Server Update Services
792(3)
Systems Management Server 2003
795(1)
Third-Party Products
795(1)
Summary
796(1)
Using Microsoft Certificate Services
797(32)
More Vocabulary
798(5)
Policy Modules
798(1)
Exit Modules
798(1)
Certificate Publishers
798(1)
Certificate Templates
799(2)
Certificate Authority Types
801(2)
Preinstallation
803(2)
Understanding Certificate Authority Roles
803(1)
Preparing for Installation
804(1)
Installation and Configuration
805(4)
The Certification Authority Snap-In
809(13)
Managing the Certification Authority Service
810(2)
Configuring the CA's Properties
812(3)
Working with Certificate Templates
815(2)
Managing Revocation and Trust
817(5)
Managing Standalone CAs
822(1)
The Certificates Snap-In
822(1)
CAs Linked into a Hierarchy
823(2)
Requesting a Certificate if Your Root CA Is Online
824(1)
Requesting a Certificate if Your Root CA Is Offline
824(1)
Command-Line Utilities
825(2)
The Certsrv Tool
825(1)
The Certreq Tool
825(2)
The Certutil Tool
827(1)
Summary
827(2)
Connection Services
829(36)
How Dial-Up Remote Access Works
830(1)
Understanding Virtual Private Networks
831(2)
How VPNs Work
831(2)
Components of a VPN
833(1)
Common Configurations for Remote Access Servers
833(1)
Configuring a Server for Dial-Up Clients
834(1)
Configuring a NAT Server
835(1)
Setting Remote Access Policies
836(1)
Understanding the Default Policy
837(1)
Choosing an Administrative Model for Remote Access Policies
838(10)
Administering Access by User
838(2)
Granting Access by User
840(1)
Administering Access by Policy for a Mixed-Mode Domain
840(1)
Granting or Denying Access by Group Membership for a Mixed Domain
841(2)
Administering Access by Policy for a Native Domain
843(2)
Granting or Denying Access by Group Membership for a Native Domain
845(3)
Configuring a Remote Access Policy
848(4)
Specifying Conditions of Remote Access Policies
848(2)
Configuring Profiles in Remote Access Policies
850(2)
Configuring a Remote Access Server
852(1)
Configuring a Virtual Private Network
853(5)
Configuring the Internet Connection
853(1)
Configuring the Remote Access Server as a Router
854(1)
Configuring PPTP Ports
854(1)
Configuring PPTP Filters
855(1)
Elements of a Router-to-Router VPN Connection
855(2)
Adding a Demand-Dial Interface
857(1)
Setting Up Static Routes and Routing Protocols
858(1)
Using the Internet Authentication Service
858(1)
Installing and Configuring IAS
859(2)
Installing IAS
859(1)
Configuring IAS
859(1)
Configuring Clients for IAS
860(1)
Using Radius for Multiple Remote Access Servers
861(2)
Configuring a Remote Server for Radius Authentication
862(1)
Configuring the Remote Server for RADIUS Accounting
862(1)
Configuring the IAS Server for RADIUS
863(1)
Using the RADIUS Proxy
863(1)
Summary
864(1)
Implementing Wireless Security
865(14)
Understanding 802.11 Protocols
867(1)
802.11
867(1)
802.11a
867(1)
802.11b
867(1)
802.11g
867(1)
802.11h
868(1)
802.11i
868(1)
802.11e
868(1)
802.11n
868(1)
Encryption and Authentication
868(4)
WPA and WPA2
869(1)
WPA2
870(2)
Deployment Scenarios
872(3)
Enterprise Deployment with 802.1X
872(2)
Small and Medium Business Deployment with WPA
874(1)
Summary
875(4)
Part V Support Services and Features
Interoperability
879(22)
Unix Interoperability
879(20)
Permissions and Security Concepts
880(1)
A Unix File Listing
880(2)
Symbolic Links
882(1)
Privilege Levels
882(1)
Basic Connectivity
883(2)
File Systems
885(1)
Printing
886(1)
Microsoft Services for NFS
887(10)
Unix Identity Management Services
897(1)
Windows Subsystem for Unix-Based Applications
897(2)
Macintosh Interoperability
899(1)
Novell Netware Interoperability
899(1)
Summary
900(1)
Managing Software
901(54)
Using the Group Policy Software Installation Extension
901(2)
Finding the Right Mix of Services
903(5)
Natively Authored Windows Installer Packages
904(1)
Zap Files
904(1)
Repackaged Applications
905(3)
Setting Up the Group Policy Software Installation Extension
908(7)
Creating a Software Distribution Point
908(1)
Creating a GPO for Application Deployment
909(2)
Configuring the Group Policy Software Installation Extension
911(4)
Working with Packages
915(8)
Adding a Package to a Group Policy
915(2)
Changing Application Properties
917(2)
Applying Package Upgrades
919(1)
Applying Package Modifications
920(2)
Removing and Redeploying Packages
922(1)
Using Software Restriction Policies
923(3)
How Software Restriction Policies Work
923(1)
Creating Software Restriction Policies
924(2)
Remote Installation Services
926(27)
How RIS Works
927(2)
RIS Requirements and System Recommendations
929(1)
Installing RIS
930(2)
Administering RIS
932(16)
Performing User Installations
948(5)
Summary
953(2)
Application Compatibility and Virtual Server
955(26)
Virtual Server Overview
955(1)
Installing Virtual Server
956(5)
Installing Internet Information Services for Virtual Server
956(2)
Performing the Installation
958(3)
Configuring Virtual Server
961(6)
Configuring Virtual Networks
962(3)
Configuring Server Properties
965(2)
Creating Virtual Machines
967(11)
Initial Configuration of a Virtual Machine
968(6)
Using Virtual Machine Remote Control
974(1)
Configuring Virtual Machines
975(2)
Installing Virtual Machine Additions
977(1)
Administering Virtual Server
978(1)
Alternatives to Virtual Server
979(1)
Virtual PC
979(1)
VMWare
979(1)
Summary
980(1)
Deploying Terminal Services
981(28)
Concepts
981(2)
Remote Access
982(1)
Central Management
982(1)
Requirements
983(2)
RAM
983(1)
CPU
983(1)
Network Utilization
984(1)
Capacity Planning
984(1)
Installation
985(7)
Enabling Remote Desktop for Administration Mode
988(1)
Installing Programs
988(4)
Administration
992(16)
Terminal Services Manager
992(8)
Terminal Services Configuration
1000(4)
Terminal Services Licensing
1004(1)
Installing Terminal Server Licensing
1005(2)
Remote Desktop Client
1007(1)
Summary
1008(1)
Using the Indexing Service
1009(28)
Understanding the Indexing Service
1009(3)
Defining Terms
1010(1)
How Indexing Works
1011(1)
Planning Your Indexing Service
1012(3)
Merging Indexes
1013(1)
Setting Up an Indexing Console
1014(1)
Creating and Configuring Catalogs
1015(6)
Creating a Catalog
1015(1)
Configuring a Catalog
1016(1)
Including or Excluding a Directory
1017(2)
Configuring the Property Cache
1019(1)
Adding a Property
1019(1)
Running a Scan of the Index
1020(1)
Registry Entries for the Indexing Service
1021(2)
Querying the Index
1023(5)
Creating Query Forms
1025(2)
Indexing a New Site
1027(1)
Examining Performance
1028(2)
Modifying the Indexing Service's Performance
1028(1)
Using Performance Monitor
1029(1)
Troubleshooting the Indexing Service
1030(3)
No Documents Matched the Query
1030(2)
PDF Files Aren't Indexed
1032(1)
Query Produces Inconsistent Results
1032(1)
Catalog Is Reportedly Corrupted
1032(1)
Indexing Is Slow and Some Documents Aren't Indexed
1033(1)
Summary
1033(4)
Part VI Internet Servers and Services
Basics of Internet Information Services
1037(32)
Protocols Supported
1037(7)
HTTP
1038(2)
FTP
1040(1)
SMTP
1041(2)
NNTP
1043(1)
Other Protocols
1043(1)
Administration Tools
1044(3)
Adding the Application Server Role
1044(1)
Internet Information Services
1045(1)
Remote Administration
1046(1)
Administration Scripts
1047(1)
The WWW Publishing Service
1047(11)
The Default Web Site
1047(1)
Connecting to a Web Site
1048(1)
Other Web Sites
1049(4)
Virtual Directories
1053(5)
The FTP Publishing Service
1058(4)
The Default FTP Site
1058(1)
Other FTP Sites
1058(2)
Virtual Directories
1060(2)
Basic Administrative Tasks
1062(6)
Configuring Permissions
1062(3)
Stopping, Starting, and Pausing IIS Services
1065(2)
Using FrontPage Server Extensions
1067(1)
Summary
1068(1)
Advanced Internet Information Services
1069(54)
Server-Level Administration
1071(4)
Connecting to an IIS Server
1071(1)
Creating Configuration Backups
1072(1)
Configuring Server Properties
1073(2)
Site-Level Administration
1075(1)
Directory-Level Administration
1076(1)
File-Level Administration
1077(1)
Managing WWW Sites
1078(17)
Web Site Tab
1078(4)
Performance Tab
1082(1)
ISAPI Filters Tab
1082(1)
Home Directory Tab
1083(2)
Documents Tab
1085(1)
Directory Security Tab
1086(7)
HTTP Headers Tab
1093(1)
Custom Errors Tab
1094(1)
Managing FTP Sites
1095(7)
Server-Wide FTP Properties
1096(1)
Configuring Individual FTP Site Properties
1096(5)
Configuring FTP Directory Properties
1101(1)
Managing NNTP Virtual Servers
1102(8)
What NNTP Service Does
1102(1)
NNTP Service Wizards
1103(2)
Configuring the Default NNTP Virtual Server
1105(4)
Connecting to the Default NNTP Virtual Server
1109(1)
Displaying NNTP Sessions
1110(1)
Rebuilding an NNTP Virtual Server
1110(1)
Managing SMTP Virtual Servers
1110(7)
What SMTP Service Does
1110(1)
SMTP Directories
1111(1)
Configuring the Default SMTP Virtual Server
1112(4)
SMTP Domains
1116(1)
The New Domain Wizard
1117(1)
Web Service Extensions
1117(2)
Remote Administration
1119(2)
Administration Web Site
1119(1)
Enabling Remote Administration
1119(1)
Testing Remote Administration
1120(1)
Summary
1121(2)
Internet Security and Acceleration Server 2004
1123(34)
Concepts
1123(4)
Network Address Translation
1124(1)
Packet Filtering and Application Layer Filtering
1125(1)
Caching
1126(1)
Client Types
1126(1)
Installation and Configuration
1127(14)
System Requirements
1127(1)
Installation
1128(3)
Securing Your ISA 2004 Server
1131(1)
Initial Configuration of ISA Server 2004
1131(10)
Additional Configuration Tasks
1141(9)
Define VPN Access
1141(3)
Setup Monitoring
1144(1)
Publishing Servers (Reverse Proxy)
1144(2)
Additional Configuration
1146(4)
ISA Firewall Client
1150(1)
Import, Export, Backup, and Restore
1151(2)
Summary
1153(4)
Part VII Tuning, Maintenance, and Repair
Performance Monitoring and Tuning
1157(46)
Documenting the Network, Policies, and Procedures
1158(2)
Documenting the Network
1158(1)
Evaluating Policies and Procedures
1159(1)
Selecting a Monitoring Method
1160(6)
Determining How Often to Monitor
1161(1)
Monitoring Memory Usage
1162(1)
Monitoring Processor Activity
1163(1)
Monitoring Disk Activity
1164(1)
Monitoring Network Activity
1165(1)
Using Event Viewer
1166(5)
Event Log Files
1167(1)
Components of an Event
1167(2)
Viewing an Event Log on Another Computer
1169(1)
Changing Event Log Settings
1170(1)
Archiving an Event Log
1170(1)
Using the Microsoft Windows Server 2003 Performance Advisor
1171(4)
Overview
1171(2)
Recording and Viewing Data
1173(1)
Monitoring Multiple Servers
1173(2)
Using System Monitor
1175(5)
Adding Counters
1177(1)
Matching Counters to Graph Lines
1178(1)
Modifying the Display
1178(2)
Performance Logs and Alerts
1180(6)
Creating Counter and Trace Logs
1181(3)
Saving Log and Alert File Settings
1184(1)
Using Alerts
1184(2)
Using Network Monitor
1186(13)
Capturing Frames
1187(1)
Viewing the Capture Window
1188(1)
Viewing the Frame Viewer Window
1189(1)
Configuring and Customizing Network Monitor
1190(2)
Designing a Capture Filter
1192(4)
Designing a Display Filter
1196(2)
Setting a Capture Trigger
1198(1)
Memory and Network Tuning
1199(3)
Changing File System Cache Settings
1199(2)
Optimizing the Page File
1201(1)
Tuning Network Performance
1202(1)
Summary
1202(1)
Disaster Planning
1203(18)
Planning for Disaster
1203(8)
Identifying the Risks
1204(1)
Identifying the Resources
1205(1)
Developing the Responses
1206(3)
Testing the Responses
1209(1)
Iterating
1210(1)
Preparing for a Disaster
1211(9)
Setting Up a Fault-Tolerant System
1211(1)
Backing Up the System
1212(1)
Creating Automated System Recovery Disks
1212(4)
Creating a Boot Disk
1216(2)
Installing the Recovery Console
1218(1)
Specifying Recovery Options
1219(1)
Creating and Using a Recovery Drive
1220(1)
Summary
1220(1)
Using Backup
1221(28)
Selecting a Backup Medium
1221(3)
Using Removable Storage
1222(1)
Backing Up to Files
1223(1)
Using CD-ROMs
1223(1)
Developing a Backup Strategy
1224(3)
The Backup Window
1224(1)
Backup Types
1225(2)
Media Rotation
1227(1)
Backing Up Data
1227(12)
Using Windows Server 2003 Backup
1228(9)
Using the Windows Server 2003 Backup Wizard
1237(1)
Executing Jobs from the Command Line
1237(2)
Restoring Data
1239(3)
Selecting Files to Be Restored
1239(1)
Selecting Destinations for Restored Files
1240(1)
Setting Restore Options
1241(1)
Planning for Failure
1242(1)
Backing Up the System State
1242(1)
Handling Backup and Restore Problems
1243(3)
Backing Up Exchange Servers
1243(1)
Backing Up Encrypted Files
1243(1)
Restoring the System State
1244(2)
Preserving NTFS Permissions
1246(1)
Third-Party Backup Utilities
1246(2)
Summary
1248(1)
Planning Fault Tolerance and Avoidance
1249(16)
Mean Time to Failure and Mean Time to Recover
1250(1)
Protecting the Power Supply
1251(5)
Local Power Supply Failure
1251(1)
Voltage Variations
1252(3)
Short-Term Power Outages
1255(1)
Long-Term Power Outages
1255(1)
Disk Arrays
1256(6)
Hardware vs. Software
1256(1)
RAID Levels for Fault Tolerance
1257(5)
Hot-Swap and Hot-Spare Disk Systems
1262(1)
Distributed File System
1262(1)
Clustering
1263(1)
Network Load Balancing
1263(1)
Server Clusters
1263(1)
Summary
1264(1)
Using the Registry
1265(28)
Introducing the Registry
1265(1)
The Origins of the Registry
1265(2)
What Registry Data Is Used For
1267(1)
Understanding the Registry's Structure
1268(11)
The Root Keys
1271(2)
Major Subkeys
1273(4)
How Data Is Stored
1277(2)
Using the Registry Editors
1279(11)
A Whirlwind Tour of the Registry Editor
1280(8)
A Whirlwind Tour of Reg
1288(2)
Backing Up and Restoring the Registry
1290(2)
Choosing a Backup Method
1290(1)
Backing Up the Registry
1291(1)
Summary
1292(1)
Troubleshooting and Recovery
1293(59)
Triaging the Situation
1293(2)
Performing a System Recovery
1295(7)
Identifying Possible Causes
1295(1)
Using the Last Known Good Configuration
1296(1)
Using Safe Mode
1297(1)
Using a Boot Disk to Recover the System
1298(1)
Booting from Mirrored Boot Partitions
1299(1)
Performing an In-Place Upgrade
1300(1)
Using the Automated System Recovery Process
1301(1)
Fixing the Underlying Problem
1302(10)
Rolling Back Recently Installed Drivers
1303(1)
Using Help And Support to Gather Basic Information
1304(2)
Using System Information to Gather Advanced Information
1306(1)
Checking Services
1307(2)
Using the System Configuration Utility
1309(2)
Using the System File Checker
1311(1)
Restoring from a Backup
1311(1)
Reinstalling Windows
1312(1)
Emergency Management Services and Headless Servers
1312(11)
EMS Overview
1312(2)
Hardware and Software Requirements
1314(1)
Setting Up EMS
1315(6)
Using EMS for Out-of-Band Administration
1321(2)
Miscellaneous Challenges
1323(4)
Using the Shutdown Event Tracker
1323(1)
Adding a Processor to the System
1324(1)
Troubleshooting Shutdown Problems
1325(1)
Uninstalling Windows
1326(1)
Summary
1327(4)
Part VIII Appendixes
Interface Changes from Windows 2000 Server
1331(6)
Interface Changes from Windows NT 4
1337(8)
Clipboard Viewer
1338(1)
Compression Agent
1338(1)
Computers Near Me
1339(1)
Devices
1339(1)
Dial-Up Networking
1339(1)
Disk Administrator
1340(1)
Find
1340(1)
MS-DOS Prompt
1340(1)
My Briefcase
1340(1)
My Documents
1340(1)
Network Neighborhood
1341(1)
Personalized Menus
1341(1)
Start Menu
1341(1)
System Information
1341(1)
TCP/IP
1342(1)
User Manager
1342(1)
User Manager for Domains
1342(1)
View Options
1342(1)
Windows NT Explorer
1343(2)
Optional Components
1345(7)
Accessories and Utilities
1346(1)
Accessibility Wizard
1346(1)
Accessories
1346(1)
Communications
1347(1)
Active Directory Services
1347(1)
Application Server
1347(1)
Certificate Services
1348(1)
Distributed File System (DFS)
1348(1)
E-mail Services
1348(1)
Fax Services
1348(1)
Indexing Service
1348(1)
Internet Explorer Enhanced Security Configuration
1349(1)
Management and Monitoring Tools
1349(1)
Microsoft .NET Framework 2.0
1349(1)
Networking Services
1350(1)
Other Network File and Print Services
1350(1)
Remote Installation Services
1351(1)
Remote Storage
1351(1)
Security Configuration Wizard
1351(1)
Subsystem for Unix-Based Applications
1351(1)
Terminal Server
1351(1)
Terminal Server Licensing
1351(1)
UDDI Services
1351(1)
Update Root Certificates
1352(1)
Windows Media Services
1352(1)
Windows SharePoint Services
1352

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program