did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735609990

McSe Training Kit, Microsoft Windows 2000 Active Directory Services

by
  • ISBN13:

    9780735609990

  • ISBN10:

    0735609993

  • Format: Hardcover
  • Copyright: 2000-02-01
  • Publisher: Microsoft Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99

Summary

This volume is the official Microsoft study guide for MCP Exam 70-217: Implementing and administering a Microsoft Windows 2000 directory services infrastructure. The modular system of lessons and exercises carries readers through all the requirements for planning, configuring, installing, administering, managing, troubleshooting, monitoring, and optimizing.

Table of Contents

About This Book xxi
Intended Audience xxii
Prerequisites xxii
Reference Materials xxii
Features of This Book xxiii
Notes xxiii
Conventions xxiii
Chapter and Appendix Overview xxv
Finding The Best Starting Point for You xxvii
Where to Find Specific Skills in This Book xxvii
Getting Started xxxi
Hardware Requirements xxxi
Software Requirements xxxii
Setup Procedures xxxii
The Online Book xli
The Microsoft Certified Professional Program xli
Microsoft Certification Benefits xlii
Requirements for Becoming a Microsoft Certified Professional xlv
Technical Training for Computer Professionals xlvi
Technical Support xlvii
Introduction to Microsoft Windows 2000
1(34)
About This Chapter
1(1)
Before You Begin
1(1)
Windows 2000 Overview
2(10)
Overview of Windows 2000
2(6)
Windows 2000 Network Environments
8(3)
Lesson Summary
11(1)
Windows 2000 Architecture Overview
12(5)
Windows 2000 Layers, Subsystems, and Managers
12(1)
User Mode
12(1)
Environment Subsystems
13(1)
Kernel Mode
14(2)
Lesson Summary
16(1)
Windows 2000 Directory Services Overview
17(8)
What Is a Directory Service?
17(1)
Why Have a Directory Service?
18(1)
Windows 2000 Directory Services
19(1)
Simplified Administration
19(1)
Scalability
19(1)
Open Standards Support
20(1)
Support for Standard Name Formats
21(1)
Active Directory in the Windows 2000 Architecture
21(1)
Active Directory Architecture
22(2)
Lesson Summary
24(1)
Logging On to Windows 2000
25(4)
Logging On to a Domain
25(1)
Logging On to a Local Computer
26(1)
Windows 2000 Authentication Process
27(1)
Practice: Logging On to a Stand-Alone Server
28(1)
Lesson Summary
28(1)
The Windows Security Dialog Box
29(6)
Using the Windows Security Dialog Box
29(1)
Practice: Using the Windows Security Dialog Box
30(3)
Lesson Summary
33(1)
Review
34(1)
Introduction to Active Directory
35(24)
About This Chapter
35(1)
Before You Begin
35(1)
Active Directory Overview
36(8)
Active Directory Objects
36(1)
Active Directory Components
37(1)
Logical Structures
38(3)
Physical Structure
41(2)
Lesson Summary
43(1)
Understanding Active Directory Concepts
44(15)
Global Catalog
44(1)
Replication
45(3)
Trust Relationships
48(1)
DNS Namespace
49(4)
Name Servers
53(1)
Naming Conventions
54(2)
Lesson Summary
56(1)
Review
57(2)
Active Directory Administration Tasks and Tools
59(28)
About This Chapter
59(1)
Before You Begin
59(1)
Active Directory Administration Tasks
60(2)
Windows 2000 Active Directory Administrations Tasks
60(1)
Lesson Summary
61(1)
Active Directory Administrative Tools
62(11)
Active Directory Administrative Tools
62(1)
Other Active Directory Administrative Tools
63(3)
The Microsoft Management Console (MMC)
66(3)
Console Tree and Details Pane
69(1)
Snap-Ins
69(2)
Console Options
71(1)
Author Mode
71(1)
Lesson Summary
72(1)
Using Microsoft Management Consoles
73(7)
Using Preconfigured MMCs
73(1)
Using Custom MMCs
73(1)
Using MMCs for Remote Administration
74(1)
Practice: Using Microsoft Management Console
74(5)
Lesson Summary
79(1)
Using Task Scheduler
80(7)
Introduction to Task Scheduler
80(1)
Practice: Using Task Scheduler
81(3)
Lesson Summary
84(1)
Review
85(2)
Implementing Active Directory
87(38)
About This Chapter
87(1)
Before You Begin
87(1)
Planning Active Directory Implementation
88(15)
Planning a Domain Structure
88(4)
Planning a Domain Namespace
92(5)
Planning an OU Structure
97(3)
Planning a Site Structure
100(1)
Lesson Summary
101(2)
Installing Active Directory
103(8)
The Active Directory Installation Wizard
103(1)
Configuring DNS for Active Directory
104(1)
The Database and Shared System Volume
104(1)
Domain Modes
105(1)
Removing Active Directory Services from a Domain Controller
106(1)
Practice: Installing Active Directory
107(3)
Lesson Summary
110(1)
Operations Master Roles
111(9)
Operations Master Roles
111(1)
Forest-Wide Operations Master Roles
111(1)
Domain-Wide Operations Master Roles
112(1)
Planning Operations Master Locations
113(2)
Identifying Operations Master Role Assignments
115(1)
Transferring Operations Master Role Assignments
116(2)
Responding to Operations Master Failures
118(1)
Lesson Summary
119(1)
Implementing an Organizational Unit Structure
120(5)
Creating OUs
120(1)
Setting OU Properties
120(2)
Practice: Creating an OU
122(1)
Lesson Summary
123(1)
Review
124(1)
DNS and Active Directory Integration
125(30)
About This Chapter
125(1)
Before You Begin
125(1)
Understanding DNS Name Resolution
126(5)
Name Resolution
126(1)
Forward Lookup Query
127(1)
Name Server Caching
128(1)
Reverse Lookup Query
129(1)
Lesson Summary
130(1)
Understanding and Configuring Zones
131(12)
Zones
131(1)
Zone Planning
131(1)
Forward Lookup Zones
132(2)
Reverse Lookup Zones
134(1)
Resource Records
135(1)
Delegating Zones
136(2)
Configuring Dynamic DNS
138(1)
Practice: Configuring Zones
139(3)
Lesson Summary
142(1)
Zone Replication and Transfer
143(6)
Zone Replication and Zone Transfers
143(3)
DNS Notification
146(1)
The DNS Notify Process
147(1)
Lesson Summary
148(1)
Monitoring and Troubleshooting DNS for Active Directory
149(6)
Monitoring DNS Servers
149(1)
DNS Troubleshooting Scenarios
150(2)
Lesson Summary
152(1)
Review
153(2)
Configuring Sites
155(24)
About This Chapter
155(1)
Before You Begin
155(1)
Configuring Site Settings
156(9)
Configuring Site Settings
156(1)
Sites
156(1)
Subnets
157(2)
Site Links
159(2)
Site Licensing
161(1)
Practice: Configuring a Site
162(2)
Lesson Summary
164(1)
Configuring Inter-Site Replication
165(9)
Configuring Inter-Site Replication
165(1)
Site Link Attributes
165(3)
Site Link Bridges
168(1)
Manually Configuring Connections
169(2)
Designating a Preferred Bridgehead Server
171(1)
Practice: Configuring Inter-Site Replication
172(1)
Lesson Summary
173(1)
Troubleshooting Replication
174(2)
Troubleshooting Replication
174(1)
Checking Replication Topology
175(1)
Lesson Summary
175(1)
Maintaining Server Settings
176(3)
Maintaining Server Settings
176(1)
Creating a Server Object in a Site
176(1)
Moving Server Objects Between Sites
176(1)
Enabling or Disabling a Global Catalog
177(1)
Removing an Inoperative Server Object from a Site
177(1)
Lesson Summary
177(1)
Review
178(1)
User Account Administration
179(41)
About This Chapter
179(1)
Before You Begin
179(1)
Introduction to User Accounts
180(4)
Local User Accounts
180(1)
Domain User Accounts
181(1)
Built-In User Accounts
182(1)
Lesson Summary
183(1)
Planning New User Accounts
184(6)
Naming Conventions
184(1)
Password Requirements
185(1)
Account Options
186(1)
Practice: Planning New User Accounts
186(3)
Lesson Summary
189(1)
Creating User Accounts
190(17)
Creating Local User Accounts
190(1)
Creating Domain User Accounts
191(3)
Practice: Creating Domain User Accounts
194(2)
User Account Properties
196(1)
Setting Personal Properties
197(1)
Setting Account Properties
197(2)
Setting Logon Hours
199(1)
Setting the Computers from Which Users Can Log On
200(1)
Configuring Dial-In Settings
201(1)
Practice: Modifying User Account Properties
202(4)
Lesson Summary
206(1)
Creating User Profiles
207(13)
User Profiles
207(3)
Local User Profiles
210(1)
Roaming User Profiles
210(3)
Mandatory User Profiles
213(1)
Practice: Managing User Profiles
214(5)
Lesson Summary
219(1)
Creating Home Directories
220(9)
Introducing Home Directories
220(1)
Creating Home Directories on a Server
220(1)
Lesson Summary
221(1)
Maintaining User Accounts
222(7)
Disabling, Enabling, Renaming, and Deleting User Accounts
222(1)
Resetting Passwords and Unlocking User Accounts
223(1)
Resetting Passwords
223(1)
Unlocking User Accounts
224(1)
Practice: Administering User Accounts
224(2)
Lesson Summary
226(1)
Review
227(2)
Group Account Administration
229(34)
About This Chapter
229(1)
Before You Begin
229(1)
Introduction to Groups
230(6)
Groups and Permissions
230(1)
Group Types
231(1)
Group Scopes
231(2)
Group Nesting
233(1)
Rules for Group Membership
233(1)
Local Groups
234(1)
Using Local Groups
234(1)
Lesson Summary
234(2)
Planning a Group Strategy
236(5)
Planning Global and Domain Local Groups
236(1)
Using Universal Groups
237(1)
Practice: Planning New Group Accounts
238(2)
Lesson Summary
240(1)
Creating Groups
241(9)
Creating and Deleting Groups
241(1)
Deleting a Group
242(1)
Adding Members to a Group
242(2)
Changing the Group Type
244(1)
Changing the Group Scope to Universal
244(1)
Creating Local Groups
245(2)
Practice: Creating Groups
247(2)
Lesson Summary
249(1)
Understanding Default Groups
250(5)
Predefined Groups
250(1)
Built-In Groups
251(1)
Built-In Local Groups
252(1)
Special Identity Groups
253(1)
Lesson Summary
254(1)
Groups for Administrators
255(8)
Why You Should Not Run Computer as an Administrator
255(1)
Administrators as Members of the Users and Power Users Groups
255(1)
Using Run As to Start a Program
256(1)
RUNAS Command
257(1)
RUNAS Examples
258(1)
Practice: Using Run As to Start a Program as an Administrator
259(1)
Lesson Summary
259(1)
Review
260(3)
Securing Network Resources
263(36)
About This Chapter
263(1)
Before You Begin
263(1)
Understanding NTFS Permissions
264(5)
NTFS Permissions
264(1)
NTFS Folder Permissions
264(1)
NTFS File Permissions
265(1)
Access Control List
265(1)
Multiple NTFS Permissions
266(1)
NTFS Permissions Inheritance
267(1)
Lesson Summary
268(1)
Assigning NTFS Permissions
269(11)
Planning NTFS Permissions
269(1)
Setting NTFS Permissions
270(2)
Practice: Planning and Assigning NTFS Permissions
272(7)
Lesson Summary
279(1)
Assigning Special Permissions
280(9)
Special Permissions
280(4)
Setting Special Permissions
284(2)
Taking Ownership of a File or Folder
286(1)
Practice: Taking Ownership of a File
286(2)
Lesson Summary
288(1)
Copying and Moving Files And Folders
289(4)
Copying Files and Folders
289(1)
Moving Files and Folders
290(1)
Practice: Copying and Moving Folders
291(1)
Lesson Summary
292(1)
Troubleshooting Permissions Problems
293(6)
Troubleshooting Permissions Problems
293(1)
Avoiding Permissions Problems
294(1)
Practice: Deleting a File with All Permissions Denied
295(1)
Lesson Summary
296(1)
Review
297(2)
Administering Shared Folders
299(42)
About This Chapter
299(1)
Before You Begin
300(1)
Understanding Shared Folders
301(5)
Shared Folders
301(1)
Shared Folder Permissions
301(2)
How Shared Folder Permissions Are Applied
303(1)
Guidelines for Shared Folder Permissions
303(1)
Practice: Applied Permissions
304(1)
Lesson Summary
305(1)
Planning Shared Folders
306(4)
Application Folders
306(1)
Data Folders
307(1)
Lesson Summary
308(2)
Sharing Folders
310(7)
Requirements for Sharing Folders
310(1)
Administrative Shared Folders
310(1)
Sharing a Folder
311(1)
Assigning Shared Folder Permissions
312(2)
Modifying Shared Folders
314(1)
Connecting to a Shared Folder
315(1)
Lesson Summary
316(1)
Combining Shared Folder Permissions and NTFS Permissions
317(11)
Strategies for Combining Shared Folder Permissions and NTFS Permissions
371
Practice: Managing Shared Folders
318(9)
Lesson Summary
327(1)
Configuring Dfs to Gain Access to Network Resources
328(13)
Understanding Dfs
328(2)
Reasons for Using Dfs
330(1)
Dfs Topology
330(1)
Creating a Dfs
330(1)
Creating a Dfs Root
330(1)
Creating a Dfs Link
331(1)
Adding a Dfs Shared Folder
332(1)
Setting Replication Policy
333(2)
Practice: Using Dfs
335(4)
Lesson Summary
339(1)
Review
340(1)
Administering Active Directory
341(52)
About This Chapter
341(1)
Before You Begin
342(1)
Locating Active Directory Objects
343(6)
Understanding Common Active Directory Objects
343(1)
Using Find
344(2)
Practice: Searching Active Directory
346(2)
Lesson Summary
348(1)
Controlling Access to Active Directory Objects
349(9)
Understanding Active Directory Permissions
349(1)
Assigning Active Directory Permissions
350(3)
Using Permissions Inheritance
353(1)
Preventing Permissions Inheritance
354(1)
Practice: Controlling Access to Active Directory Objects
354(3)
Lesson Summary
357(1)
Publishing Resources in Active Directory
358(4)
Publishing Resources in Active Directory
358(1)
Publishing Users and Computers
358(1)
Publishing Shared Resources
358(1)
Publishing Network Services
359(2)
Lesson Summary
361(1)
Moving Active Directory Objects
362(9)
Moving Objects
362(1)
Moving Objects Within a Domain
362(1)
Moving Objects Between Domains
363(4)
Moving Workstations or Member Servers Between Domains
367(1)
Moving Domain Controllers Between Sites
368(1)
Practice: Moving Objects Within a Domain
369(1)
Lesson Summary
370(1)
Delegating Administrative Control of Active Directory Objects
371(5)
Guidelines for Delegating Control
371(1)
Delegation Of Control Wizard
372(1)
Guidelines for Administering Active Directory
372(1)
Practice: Delegating Administrative Control in Active Directory
373(2)
Lesson Summary
375(1)
Backing Up Active Directory
376(6)
Performing Preliminary Tasks
376(1)
The Backup Wizard
376(1)
What to Back Up
377(1)
Where to Store the Backup
377(2)
Specifying Advanced Backup Settings
379(1)
Scheduling Active Directory Backup Jobs
380(1)
Lesson Summary
381(1)
Restoring Active Directory
382(7)
Preparing to Restore Active Directory
382(1)
Nonauthoritative Restore
382(1)
Authoritative Restore
382(1)
Performing a Nonauthoritative Restore
383(2)
Specifying Advanced Restore Settings
385(1)
Performing an Authoritative Restore
386(2)
Lesson Summary
388(1)
Troubleshooting Active Directory
389(4)
Troubleshooting Active Directory
389(1)
Lesson Summary
390(1)
Review
391(2)
Administering Group Policy
393(68)
About This Chapter
393(1)
Before You Begin
393(1)
Group Policy Concepts
394(12)
What Is Group Policy?
394(1)
Group Policy Objects
394(1)
Delegating Control of Group Policy
395(1)
The Group Policy Snap-In
395(2)
Group Policy Settings
397(1)
Computer and User Configuration Settings
397(3)
The MMC Snap-In Model
400(1)
Group Policy Snap-In Namespace
401(1)
How Group Policy Affects Startup and Logon
401(1)
How Group Policy Is Processed
402(2)
Group Policy Inheritance
404(1)
Using Security Group to Filter Group Policy
404(1)
Lesson Summary
405(1)
Group Policy Implementation Planning
406(6)
Designing GPOs by Setting Type
406(1)
GPO Implementation Strategies
407(1)
Layered vs. Monolithic GPO Design
407(2)
Functional Roles vs. Team Design
409(1)
OU Delegation with Central or Distributed Control
410(1)
Lesson Summary
411(1)
Implementing Group Policy
412(15)
Implementing Group Policy
412(1)
Creating a GPO
412(1)
Creating a GPO Console
413(1)
Delegating Administrative Control of a GPO
414(1)
Specifying Group Policy Settings
415(1)
Disabling Unused Group Policy Settings
416(1)
Indicating GPO Processing Exceptions
417(2)
Filtering GPO Scope
419(1)
Linking a GPO
420(1)
Modifying Group Policy
420(1)
Removing a GPO Link
421(1)
Deleting a GPO
421(1)
Editing a GPO and GPO Settings
421(1)
Practice: Implementing a Group Policy
422(4)
Lesson Summary
426(1)
Managing Software Using Group Policy
427(19)
Software Management Tools
427(1)
Assigning Applications
428(1)
Publishing Applications
428(1)
How Software Installation Works
428(2)
Implementing Software Installation
430(1)
Planning and Preparing a Software Installation
430(1)
Setting Up an SDP
431(1)
Specifying Software Installation Defaults
432(1)
Deploying Software Applications
433(4)
Setting Automatic Installation Options
437(1)
Setting Up Application Categories
438(1)
Setting Software Application Properties
439(3)
Maintaining Software Applications
442(3)
Lesson Summary
445(1)
Managing Special Folders Using Group Policy
446(8)
Folder Redirection
446(1)
Default Special Folder Locations
447(1)
Setting Up Folder Redirection
447(5)
Policy Removal Considerations
452(1)
Lesson Summary
453(1)
Troubleshooting Group Policy
454(7)
Troubleshooting Group Policy
454(3)
Group Policy Best Practices
457(2)
Lesson Summary
459(1)
Review
460(1)
Administering a Security Configuration
461(58)
About This Chapter
461(1)
Before You Begin
461(1)
Security Configuration Overview
462(4)
Security Configuration Settings
462(3)
Lesson Summary
465(1)
Auditing
466(18)
Understanding Auditing
466(1)
Using an Audit Policy
466(1)
Audit Policy Guidelines
467(1)
Configuring Auditing
468(1)
Setting Up an Audit Policy
469(3)
Auditing Access to Files and Folders
472(3)
Auditing Access to Active Directory Objects
475(2)
Auditing Access to Printers
477(1)
Auditing Practices
478(1)
Practice: Auditing Resources and Events
479(4)
Lesson Summary
483(1)
Using Security Logs
484(9)
Understanding Windows 2000 Logs
484(1)
Viewing Security Logs
485(1)
Locating Events
486(1)
Filtering Events
487(1)
Configuring Security Logs
488(2)
Archiving Security Logs
490(1)
Practice: Using the Security Log
491(1)
Lesson Summary
492(1)
User Rights
493(6)
User Rights
493(1)
Privileges
493(4)
logon Rights
497(1)
Assigning User Rights
497(1)
Lesson Summary
498(1)
Using Security Templates
499(8)
Security Templates Overview
499(1)
Security Template Uses
499(1)
Predefined Security Templates
499(2)
Managing Security Templates
501(4)
Practice: Managing Security Templates
505(1)
Lesson Summary
506(1)
Security Configuration and Analysis
507(9)
How the Security Configuration and Analysis Console Works
507(1)
Security Configuration
507(1)
Security Analysis
507(1)
Using Security Configuration and Analysis
508(5)
Practice: Using Security Configuration and Analysis
513(2)
Lesson Summary
515(1)
Troubleshooting a Security Configuration
516(3)
Troubleshooting a Security Configuration
516(1)
Lesson Summary
517(1)
Review
518(1)
Managing Active Directory Performance
519(34)
About This Chapter
519(1)
Before You Begin
519(1)
Active Directory Performance Monitoring Tools
520(20)
Performance Monitoring Tools
520(1)
The Event Viewer Console
520(2)
The Performance Console
522(1)
System Monitor
522(6)
Performance Logs and Alerts
528(8)
Practice: Using System Monitor
536(2)
Lesson Summary
538(2)
Active Directory Support Tools
540(6)
Active Directory Support Tools
540(1)
LDP.EXE: Active Directory Administration Tool
540(1)
REPLMON.EXE: Active Directory Replication Monitor
541(2)
REPADMIN.EXE Replication Diagnostics Tool
543(1)
DSASTAT.EXE: Active Directory Diagnostic Tool
543(1)
SDCHECK.EXE: Security Descriptor Check Utility
543(1)
NLTEST.EXE
544(1)
ACLDIAG.EXE: ACL Diagnostics
544(1)
DSACLS.EXE
545(1)
Lesson Summary
545(1)
Monitoring Access to Shared Folders
546(7)
Why Monitor Network Resources?
546(1)
Network Resource Monitoring Requirements
547(1)
Monitoring Access to Shared Folders
547(1)
Monitoring Open Files
548(1)
Disconnecting Users from Open Files
549(1)
Sending Console Messages
550(1)
Practice: Managing Shared Folders
550(1)
Lesson Summary
551(1)
Review
552(1)
Deploying Windows 2000 Using RIS
553(40)
About This Chapter
553(1)
Before You Begin
553(1)
RIS Overview
554(8)
Remote OS Installation Overview
554(1)
Remote Install Server Components
555(1)
Remote Install Client Components
555(2)
How the Remote OS Installation Process Works
557(2)
RIS Server and Client Requirements
559(1)
Network Cards Supported by RIS Boot Disk
560(1)
Lesson Summary
561(1)
Implementing RIS
562(16)
Implementing RIS
562(1)
Setting Up RIS
562(2)
Configuring RIS
564(8)
Create an RIPrep Image
572(3)
Creating an RIS Boot Disk
575(1)
Verifying an RIS Configuration
576(1)
Lesson Summary
577(1)
Administering RIS
578(9)
Administering RIS
578(1)
Managing RIS Client Installation Images
578(1)
Managing RIS Client Computers
579(4)
Managing RIS Security
583(3)
Lesson Summary
586(1)
RIS Frequently Asked Questions and Troubleshooting
587(6)
Frequently Asked RIS Questions
587(3)
Troubleshooting RIS
590(1)
Lesson Summary
591(1)
Review
592(1)
Appendix A Questions and Answers 593(44)
Appendix B Installing and Configuring the DHCP Service 637(6)
Glossary 643(32)
Index 675

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program