rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781928994541

Configuring Windows 2000 Without Active Directory

by
  • ISBN13:

    9781928994541

  • ISBN10:

    1928994547

  • Format: Paperback
  • Copyright: 2001-10-04
  • Publisher: Syngress Media Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.95 Save up to $0.05
  • Buy New
    $54.90
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Summary

Eliminate the hassles of Active Directory - install Windows 2000 without it! Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising its impressive abilities to coordinate Internet, intranet, extranets, and management applications creating a complete technical infrastructure. However, there has been a noticeable amount of organizations that are avoiding one of the most talked about features of Windows 2000 - Active Directory. The industry buzz is that Active Directory (although a great product) is a burden to implement and install and is not compatible with non Windows products like Solaris, NetWare and Linux. Configuring Windows 2000 WITHOUT Active Directory is a complete guide to installation and configuration of Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the new features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. The book does not cover the Active Directory function of Windows 2000. There is nothing like this book available, yet every Windows 2000 mail list, magazine and online forum shouts for his sort of coverage!

Table of Contents

Forewordp. xxv
Why Not Active Directory?p. 1
Introductionp. 2
Why Use Windows 2000 without Active Directory?p. 2
Why Use Windows 2000?p. 2
Why Not Use Active Directory?p. 6
The Purpose of This Bookp. 9
Who Should Read This Bookp. 11
What This Book Will Coverp. 13
What This Book Won't Coverp. 21
Active Directory Integrationp. 43
Migrating Networksp. 45
Fractional Networksp. 46
External Networksp. 47
Walkthrough: Managing User Accounts and Securing the Local Administrator Accountp. 49
Summaryp. 56
Solutions Fast Trackp. 57
Frequently Asked Questionsp. 59
Workstationsp. 65
Introductionp. 66
Using Local Group Policyp. 67
Group Policy Objectsp. 69
Locating Local Group Policyp. 70
Configuring Local Group Policyp. 73
Useful Group Policy Objectsp. 75
Deploying Local Group Policy Objectsp. 84
Security Configuration Using Templatesp. 84
Security Templatesp. 85
Viewing and Modifying Templatesp. 88
Security Configuration and Analysisp. 92
Deploying Security Templates Automatically with Seceditp. 95
Improvements in System Reliabilityp. 96
Device Driver Signingp. 97
Windows File Protection and System File Checkerp. 99
Service Pack Applicationp. 105
Improvements in Usabilityp. 107
Desktop Changesp. 108
Hardware Supportp. 113
Wizards and Helpp. 114
Walkthrough: Configuring Local Group Policyp. 119
Summaryp. 122
Solutions Fast Trackp. 123
Frequently Asked Questionsp. 125
Laptopsp. 129
Introductionp. 130
Integrating Mobile Computing with the Corporate Networkp. 131
Switching between Working Environmentsp. 133
Securing Data Outside the Company Environmentp. 153
Encrypting Folders and Filesp. 155
Remote Access Securityp. 158
Mobile Maintenance and Troubleshootingp. 158
Safe Mode and the Recovery Consolep. 159
Task Schedulerp. 165
Task Managerp. 168
Walkthrough: Using Offline Filesp. 172
Summaryp. 176
Solutions Fast Trackp. 178
Frequently Asked Questionsp. 180
File and Print Servicesp. 185
Introductionp. 186
Sharing Data: Storing and Retrievingp. 187
Distributed File System (DFS)p. 191
Volume Mount Pointsp. 197
Indexing Servicep. 200
Sharing Printers: Installing and Managingp. 207
Standard TCP/IP Port Monitorp. 210
IP Printingp. 210
Better Monitoringp. 214
User Optionsp. 216
Managing Serversp. 216
Disk Managementp. 217
Data Managementp. 222
Monitoringp. 229
Walkthrough: Setting an Audit Policyp. 244
Summaryp. 252
Solutions Fast Trackp. 253
Frequently Asked Questionsp. 256
Terminal Servicesp. 261
Introductionp. 262
Why Use Windows 2000 Terminal Services?p. 263
Fast Connections Over Low Bandwidthsp. 264
Remote Administrationp. 265
Tighter Securityp. 270
Shadowing Usersp. 276
Seamless Integration Between PC and Serverp. 278
Preinstallation Considerationsp. 283
Licensingp. 284
Upgrading from TSEp. 293
Unattended Installationsp. 295
Application Suitabilityp. 295
Capacity and Scalingp. 298
Limitationsp. 301
Configuring and Managing Windows 2000 Terminal Servicesp. 302
Configuring Clients to Use Terminal Servicesp. 308
Terminal Services Clientp. 308
Terminal Services Advanced Clientp. 314
Walkthrough: Remotely Administering a Windows 2000 Server With Terminal Servicesp. 321
Summaryp. 327
Solutions Fast Trackp. 329
Frequently Asked Questionsp. 332
Networking Servicesp. 337
Introductionp. 338
Name Resolution with DNSp. 340
Do You Need to Run DNS?p. 340
Advantages of Microsoft's Windows 2000 DNSp. 344
Integrating Microsoft DNS and UNIX DNSp. 357
DHCP for Central Configuration and Control of Addressesp. 363
TCP/IP Configuration Optionsp. 366
Superscopesp. 371
Name Resolution with WINSp. 375
Improved WINS Managerp. 380
Data Integrityp. 381
High Performancep. 386
High Availability with Network Load Balancing (NLB)p. 388
Network Load Balancing Componentsp. 392
Addresses and Prioritiesp. 393
Configuring Network Load Balancingp. 399
Monitoring and Administering Network Load Balancingp. 405
Walkthrough: Configuring DNS Primary and Secondary Zonesp. 407
Summaryp. 413
Solutions Fast Trackp. 414
Frequently Asked Questionsp. 418
Internet Servicesp. 423
Introductionp. 424
Installing IIS5p. 425
Improvements in Reliabilityp. 427
Application Protectionp. 427
IISresetp. 429
Backup/Restore Configurationp. 431
FTP Restartp. 433
Improvements in Administration and Managementp. 434
Wizards and Toolsp. 435
Improved Logging for Process Accountingp. 440
Improved Remote Administrationp. 441
Improvements in Securityp. 444
Windows Integratedp. 446
Digestp. 446
Fortezzap. 447
Improvements in Performancep. 447
HTTP Compressionp. 448
ASP Improvementsp. 451
Bandwidth Throttlingp. 452
Process Throttlingp. 453
Socket Poolingp. 454
Document Collaboration with WebDAVp. 455
Using WebDAVp. 456
Certificate Servicesp. 458
Certificate Authorities and Rolesp. 459
Installing and Configuring a Standalone CAp. 461
Server Certificatesp. 462
How Users Request and Manage Certificatesp. 465
Using Secure Communication (SSL) on the Web Serverp. 468
Walkthrough: Configuring Multiple Web Sites on a Single Web Serverp. 474
Summaryp. 483
Solutions Fast Trackp. 484
Frequently Asked Questionsp. 488
Secure Communicationp. 491
Introductionp. 492
IPSec Planning--Working Out what You Want to Secure and Howp. 493
Password Basedp. 496
Certificate Basedp. 497
IP Security Utilities--For Configuring and Monitoring Secure Communicationp. 498
Using IP Security Policies on Local Machinesp. 499
Using IP Security Monitorp. 500
Using the IPSec Policy Agent Servicep. 502
Using TCP/IP Advanced Optionsp. 503
Using Certificates Snap-Inp. 504
Using the Security Logp. 505
Using the NetDiag Support Toolp. 507
IPSec Built-in Policies--For Minimal Administrator Configurationp. 508
Client (Respond Only)p. 509
Server (Request Security)p. 510
Secure Server (Require Security)p. 510
IPSec Policy Componentsp. 511
IP Filter Rules and Listsp. 511
IP Filter Actionsp. 514
Other IP Rule Components--Authentication, Tunnel Setting, and Connection Typep. 517
IP Security Protocols and Algorithmsp. 523
Data Authentication Algorithmsp. 525
Data Encryption Algorithmsp. 525
Key Exchange and Managementp. 526
Security Associationsp. 531
Setting and Testing Custom IPSec Policiesp. 534
Using IPSec to Protect a Web Serverp. 542
Summaryp. 550
Solutions Fast Trackp. 551
Frequently Asked Questionsp. 554
Remote Accessp. 559
Introductionp. 560
Using and Configuring Remote Access Policiesp. 561
Remote Access Administration Modelsp. 562
Remote Access Policy Componentsp. 567
Configuring Windows 2000 Routing and Remote Accessp. 568
Configuring General Server Propertiesp. 570
Configuring Security Server Propertiesp. 570
Configuring IP Server Propertiesp. 572
Configuring IPX Server Propertiesp. 577
Configuring NetBEUI Server Propertiesp. 577
Configuring Dialup and VPN Connectionsp. 579
Configuring L2TP VPN Connectionsp. 582
Using and Configuring Internet Authentication Service (IAS)p. 590
Configuring RRAS and IASp. 592
Configuring Remote Clients with the Connection Manager Administration Kitp. 598
Manually Defining Connectionsp. 600
Using the Connection Manager Administration Kitp. 601
How Users Install and Use Connection Managerp. 611
Walkthrough: Configuring Remote Access Policiesp. 614
Summaryp. 617
Solutions Fast Trackp. 617
Frequently Asked Questionsp. 620
Internet Connectivityp. 625
Introductionp. 626
Using and Configuring Internet Connection Sharing (ICS)p. 628
ICS Settingsp. 630
Using and Configuring RRAS Network Address Translation (NAT)p. 632
Installing NATp. 633
Configuring NATp. 637
Monitoring NATp. 642
Controlling Connectionsp. 645
Using and Configuring Internet Security and Acceleration (ISA) Serverp. 649
Security Featuresp. 653
Caching Featuresp. 658
Additional Featuresp. 660
ISA Clientsp. 664
Upgrading Issuesp. 667
Walkthrough: Configuring NAT to Publish a Web Serverp. 670
Summaryp. 674
Solutions Fast Trackp. 676
Frequently Asked Questionsp. 679
The Windows 2000 Microsoft Management Consolep. 683
Introductionp. 684
MMC Basicsp. 684
Saving Configuration Changesp. 687
Exporting Information from MMC Snap-Insp. 687
Adding Serversp. 688
Remote Administrationp. 690
Command Linep. 690
Configuring and Creating Your Own MMCsp. 693
Using Favorites in MMCsp. 696
Saving Custom MMCsp. 699
Changing the Custom MMC Viewp. 702
Advanced MMC Configuration: Using Taskpadsp. 703
The New Taskpad View Wizardp. 704
Adding Taskpad Views and Non-Snap-In Commandsp. 710
Further Customization and Development with MMCsp. 711
Distributing MMCsp. 713
Summaryp. 714
Indexp. 715
Table of Contents provided by Syndetics. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program