Foreword | p. xxv |
Why Not Active Directory? | p. 1 |
Introduction | p. 2 |
Why Use Windows 2000 without Active Directory? | p. 2 |
Why Use Windows 2000? | p. 2 |
Why Not Use Active Directory? | p. 6 |
The Purpose of This Book | p. 9 |
Who Should Read This Book | p. 11 |
What This Book Will Cover | p. 13 |
What This Book Won't Cover | p. 21 |
Active Directory Integration | p. 43 |
Migrating Networks | p. 45 |
Fractional Networks | p. 46 |
External Networks | p. 47 |
Walkthrough: Managing User Accounts and Securing the Local Administrator Account | p. 49 |
Summary | p. 56 |
Solutions Fast Track | p. 57 |
Frequently Asked Questions | p. 59 |
Workstations | p. 65 |
Introduction | p. 66 |
Using Local Group Policy | p. 67 |
Group Policy Objects | p. 69 |
Locating Local Group Policy | p. 70 |
Configuring Local Group Policy | p. 73 |
Useful Group Policy Objects | p. 75 |
Deploying Local Group Policy Objects | p. 84 |
Security Configuration Using Templates | p. 84 |
Security Templates | p. 85 |
Viewing and Modifying Templates | p. 88 |
Security Configuration and Analysis | p. 92 |
Deploying Security Templates Automatically with Secedit | p. 95 |
Improvements in System Reliability | p. 96 |
Device Driver Signing | p. 97 |
Windows File Protection and System File Checker | p. 99 |
Service Pack Application | p. 105 |
Improvements in Usability | p. 107 |
Desktop Changes | p. 108 |
Hardware Support | p. 113 |
Wizards and Help | p. 114 |
Walkthrough: Configuring Local Group Policy | p. 119 |
Summary | p. 122 |
Solutions Fast Track | p. 123 |
Frequently Asked Questions | p. 125 |
Laptops | p. 129 |
Introduction | p. 130 |
Integrating Mobile Computing with the Corporate Network | p. 131 |
Switching between Working Environments | p. 133 |
Securing Data Outside the Company Environment | p. 153 |
Encrypting Folders and Files | p. 155 |
Remote Access Security | p. 158 |
Mobile Maintenance and Troubleshooting | p. 158 |
Safe Mode and the Recovery Console | p. 159 |
Task Scheduler | p. 165 |
Task Manager | p. 168 |
Walkthrough: Using Offline Files | p. 172 |
Summary | p. 176 |
Solutions Fast Track | p. 178 |
Frequently Asked Questions | p. 180 |
File and Print Services | p. 185 |
Introduction | p. 186 |
Sharing Data: Storing and Retrieving | p. 187 |
Distributed File System (DFS) | p. 191 |
Volume Mount Points | p. 197 |
Indexing Service | p. 200 |
Sharing Printers: Installing and Managing | p. 207 |
Standard TCP/IP Port Monitor | p. 210 |
IP Printing | p. 210 |
Better Monitoring | p. 214 |
User Options | p. 216 |
Managing Servers | p. 216 |
Disk Management | p. 217 |
Data Management | p. 222 |
Monitoring | p. 229 |
Walkthrough: Setting an Audit Policy | p. 244 |
Summary | p. 252 |
Solutions Fast Track | p. 253 |
Frequently Asked Questions | p. 256 |
Terminal Services | p. 261 |
Introduction | p. 262 |
Why Use Windows 2000 Terminal Services? | p. 263 |
Fast Connections Over Low Bandwidths | p. 264 |
Remote Administration | p. 265 |
Tighter Security | p. 270 |
Shadowing Users | p. 276 |
Seamless Integration Between PC and Server | p. 278 |
Preinstallation Considerations | p. 283 |
Licensing | p. 284 |
Upgrading from TSE | p. 293 |
Unattended Installations | p. 295 |
Application Suitability | p. 295 |
Capacity and Scaling | p. 298 |
Limitations | p. 301 |
Configuring and Managing Windows 2000 Terminal Services | p. 302 |
Configuring Clients to Use Terminal Services | p. 308 |
Terminal Services Client | p. 308 |
Terminal Services Advanced Client | p. 314 |
Walkthrough: Remotely Administering a Windows 2000 Server With Terminal Services | p. 321 |
Summary | p. 327 |
Solutions Fast Track | p. 329 |
Frequently Asked Questions | p. 332 |
Networking Services | p. 337 |
Introduction | p. 338 |
Name Resolution with DNS | p. 340 |
Do You Need to Run DNS? | p. 340 |
Advantages of Microsoft's Windows 2000 DNS | p. 344 |
Integrating Microsoft DNS and UNIX DNS | p. 357 |
DHCP for Central Configuration and Control of Addresses | p. 363 |
TCP/IP Configuration Options | p. 366 |
Superscopes | p. 371 |
Name Resolution with WINS | p. 375 |
Improved WINS Manager | p. 380 |
Data Integrity | p. 381 |
High Performance | p. 386 |
High Availability with Network Load Balancing (NLB) | p. 388 |
Network Load Balancing Components | p. 392 |
Addresses and Priorities | p. 393 |
Configuring Network Load Balancing | p. 399 |
Monitoring and Administering Network Load Balancing | p. 405 |
Walkthrough: Configuring DNS Primary and Secondary Zones | p. 407 |
Summary | p. 413 |
Solutions Fast Track | p. 414 |
Frequently Asked Questions | p. 418 |
Internet Services | p. 423 |
Introduction | p. 424 |
Installing IIS5 | p. 425 |
Improvements in Reliability | p. 427 |
Application Protection | p. 427 |
IISreset | p. 429 |
Backup/Restore Configuration | p. 431 |
FTP Restart | p. 433 |
Improvements in Administration and Management | p. 434 |
Wizards and Tools | p. 435 |
Improved Logging for Process Accounting | p. 440 |
Improved Remote Administration | p. 441 |
Improvements in Security | p. 444 |
Windows Integrated | p. 446 |
Digest | p. 446 |
Fortezza | p. 447 |
Improvements in Performance | p. 447 |
HTTP Compression | p. 448 |
ASP Improvements | p. 451 |
Bandwidth Throttling | p. 452 |
Process Throttling | p. 453 |
Socket Pooling | p. 454 |
Document Collaboration with WebDAV | p. 455 |
Using WebDAV | p. 456 |
Certificate Services | p. 458 |
Certificate Authorities and Roles | p. 459 |
Installing and Configuring a Standalone CA | p. 461 |
Server Certificates | p. 462 |
How Users Request and Manage Certificates | p. 465 |
Using Secure Communication (SSL) on the Web Server | p. 468 |
Walkthrough: Configuring Multiple Web Sites on a Single Web Server | p. 474 |
Summary | p. 483 |
Solutions Fast Track | p. 484 |
Frequently Asked Questions | p. 488 |
Secure Communication | p. 491 |
Introduction | p. 492 |
IPSec Planning--Working Out what You Want to Secure and How | p. 493 |
Password Based | p. 496 |
Certificate Based | p. 497 |
IP Security Utilities--For Configuring and Monitoring Secure Communication | p. 498 |
Using IP Security Policies on Local Machines | p. 499 |
Using IP Security Monitor | p. 500 |
Using the IPSec Policy Agent Service | p. 502 |
Using TCP/IP Advanced Options | p. 503 |
Using Certificates Snap-In | p. 504 |
Using the Security Log | p. 505 |
Using the NetDiag Support Tool | p. 507 |
IPSec Built-in Policies--For Minimal Administrator Configuration | p. 508 |
Client (Respond Only) | p. 509 |
Server (Request Security) | p. 510 |
Secure Server (Require Security) | p. 510 |
IPSec Policy Components | p. 511 |
IP Filter Rules and Lists | p. 511 |
IP Filter Actions | p. 514 |
Other IP Rule Components--Authentication, Tunnel Setting, and Connection Type | p. 517 |
IP Security Protocols and Algorithms | p. 523 |
Data Authentication Algorithms | p. 525 |
Data Encryption Algorithms | p. 525 |
Key Exchange and Management | p. 526 |
Security Associations | p. 531 |
Setting and Testing Custom IPSec Policies | p. 534 |
Using IPSec to Protect a Web Server | p. 542 |
Summary | p. 550 |
Solutions Fast Track | p. 551 |
Frequently Asked Questions | p. 554 |
Remote Access | p. 559 |
Introduction | p. 560 |
Using and Configuring Remote Access Policies | p. 561 |
Remote Access Administration Models | p. 562 |
Remote Access Policy Components | p. 567 |
Configuring Windows 2000 Routing and Remote Access | p. 568 |
Configuring General Server Properties | p. 570 |
Configuring Security Server Properties | p. 570 |
Configuring IP Server Properties | p. 572 |
Configuring IPX Server Properties | p. 577 |
Configuring NetBEUI Server Properties | p. 577 |
Configuring Dialup and VPN Connections | p. 579 |
Configuring L2TP VPN Connections | p. 582 |
Using and Configuring Internet Authentication Service (IAS) | p. 590 |
Configuring RRAS and IAS | p. 592 |
Configuring Remote Clients with the Connection Manager Administration Kit | p. 598 |
Manually Defining Connections | p. 600 |
Using the Connection Manager Administration Kit | p. 601 |
How Users Install and Use Connection Manager | p. 611 |
Walkthrough: Configuring Remote Access Policies | p. 614 |
Summary | p. 617 |
Solutions Fast Track | p. 617 |
Frequently Asked Questions | p. 620 |
Internet Connectivity | p. 625 |
Introduction | p. 626 |
Using and Configuring Internet Connection Sharing (ICS) | p. 628 |
ICS Settings | p. 630 |
Using and Configuring RRAS Network Address Translation (NAT) | p. 632 |
Installing NAT | p. 633 |
Configuring NAT | p. 637 |
Monitoring NAT | p. 642 |
Controlling Connections | p. 645 |
Using and Configuring Internet Security and Acceleration (ISA) Server | p. 649 |
Security Features | p. 653 |
Caching Features | p. 658 |
Additional Features | p. 660 |
ISA Clients | p. 664 |
Upgrading Issues | p. 667 |
Walkthrough: Configuring NAT to Publish a Web Server | p. 670 |
Summary | p. 674 |
Solutions Fast Track | p. 676 |
Frequently Asked Questions | p. 679 |
The Windows 2000 Microsoft Management Console | p. 683 |
Introduction | p. 684 |
MMC Basics | p. 684 |
Saving Configuration Changes | p. 687 |
Exporting Information from MMC Snap-Ins | p. 687 |
Adding Servers | p. 688 |
Remote Administration | p. 690 |
Command Line | p. 690 |
Configuring and Creating Your Own MMCs | p. 693 |
Using Favorites in MMCs | p. 696 |
Saving Custom MMCs | p. 699 |
Changing the Custom MMC View | p. 702 |
Advanced MMC Configuration: Using Taskpads | p. 703 |
The New Taskpad View Wizard | p. 704 |
Adding Taskpad Views and Non-Snap-In Commands | p. 710 |
Further Customization and Development with MMCs | p. 711 |
Distributing MMCs | p. 713 |
Summary | p. 714 |
Index | p. 715 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.