Muutke küpsiste eelistusi

Mastering Windows Server 2012 R2 [Pehme köide]

  • Formaat: Paperback / softback, 1712 pages, kõrgus x laius x paksus: 239x185x61 mm, kaal: 2495 g
  • Ilmumisaeg: 17-Jan-2014
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1118289420
  • ISBN-13: 9781118289426
Teised raamatud teemal:
  • Pehme köide
  • Hind: 74,12 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 1712 pages, kõrgus x laius x paksus: 239x185x61 mm, kaal: 2495 g
  • Ilmumisaeg: 17-Jan-2014
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1118289420
  • ISBN-13: 9781118289426
Teised raamatud teemal:

Check out the new Hyper-V, find new and easier ways to remotely connect back into the office, or learn all about Storage Spaces—these are just a few of the features in Windows Server 2012 R2 that are explained in this updated edition from Windows authority Mark Minasi and a team of Windows Server experts led by Kevin Greene. This book gets you up to speed on all of the new features and functions of Windows Server, and includes real-world scenarios to put them in perspective. If you're a system administrator upgrading to, migrating to, or managing Windows Server 2012 R2, find what you need to do the job in this complete resource.

Learn all about:

  • Installing or upgrading to and managing Windows Server 2012 R2
  • Understanding Microsoft NIC teams 2012 and PowerShell
  • Setting up via GUI or updated Server Core 2012
  • Migrating, merging, and modifying your Active Directory
  • Managing address spaces with IPAM
  • Understanding new shared storage, storage spaces, and better tools
  • Controlling access to file shares—a new and improved approach
  • Using and administering Remote Desktop, Virtual Desktop, and Hyper-V®
Introduction xxxi
Chapter 1 What's New in Windows Server 2012 R2
1(18)
Windows Server 2012 R2 Introduction
1(1)
Windows Server Editions
2(1)
Standard Edition
2(1)
Datacenter Edition
2(1)
Foundation Edition
2(1)
Essentials Edition
3(1)
Desktop Changes
3(1)
Active Directory Changes
3(5)
Active Directory Domain Services Changes
4(3)
Active Directory Rights Management Services
7(1)
Active Directory Certificate Services
8(1)
Virtualization
8(3)
Hyper-V
8(2)
Virtual Desktop Infrastructure
10(1)
Networking Changes
11(1)
Eap-Ttls
11(1)
Dns
11(1)
IP Address Management
11(1)
NIC Teaming
11(1)
Management Tools
12(2)
Server Manager
12(1)
The Remote Tools: WinRM and WinRS
13(1)
Remote Desktop Services
13(1)
Group Policy Object Improvements
14(1)
File and Print Sharing
14(1)
BranchCache
14(1)
Smb 3.0
15(1)
File Server Resource Manager
15(1)
Web-based Services
15(4)
Web Server IIS
15(2)
FTP Server
17(2)
Chapter 2 Installing and Upgrading to Windows Server 2012 R2
19(86)
What Has Changed?
19(4)
Installation Requirements
20(2)
64-Bit Support
22(1)
Installing the Operating System
23(20)
Performing a Clean Installation
23(8)
Performing an Upgrade Installation
31(11)
Server Manager Dashboard
42(1)
Using Server Manager to Configure Your Servers
43(33)
Changes to Server Manager
45(1)
Common Configuration Tasks
45(11)
Adding and Removing Roles and Features
56(14)
Troubleshooting Roles and Features
70(6)
Wrapping Up Server Manager
76(1)
Upgrading Active Directory
76(5)
An Overview of Active Directory: New Functionality in Windows Server 2012 R2
76(4)
Active Directory Upgrade Strategies
80(1)
Unattended Installations
81(21)
Installing Windows Assessment and Deployment Kit
82(5)
Creating an Answer File
87(13)
Using an Answer File
100(2)
Installing a Sample Server Network for This Book's Examples
102(1)
The Bottom Line
103(2)
Chapter 3 Introduction to Server Core
105(42)
What's New in Server Core
105(1)
Installing Server Core
106(3)
Server Core Survival Guide
109(4)
Switching between Server Core and the GUI and Vice Versa
109(1)
Accessing Task Manager
109(1)
Closing the Command Prompt
110(1)
Changing the Administrator's Password
110(1)
Accessing File Shares
111(1)
Finding Commands from A to Z
112(1)
Reading Text Files with Notepad
112(1)
Editing the Registry
112(1)
Rebooting and Shutting Down
112(1)
Initial Configurations for Server Core
113(6)
Providing Computer Information
113(3)
Updating the Server
116(1)
Customizing This Server
117(2)
Administering Server Core Remotely
119(12)
Configuring Roles and Features
131(14)
Creating a Domain Controller and Managing DNS
132(1)
Configuring the DHCP Service
133(2)
Setting Up a File Server
135(5)
Setting Up a Print Server
140(2)
Managing Licenses with the Key Management Service
142(2)
Protecting Data with Windows Backup Server
144(1)
The Bottom Line
145(2)
Chapter 4 Windows Server 2012 R2 Networking Enhancements
147(28)
The Journey to IPv6
147(3)
The Benefits of IPv6
148(1)
IPv6 Transition Technologies
148(2)
Better Networking Manageability with PowerShell
150(2)
Networking Cmdlets and Modules
150(2)
Microsoft NIC Teaming
152(3)
Understanding the Benefits of a Windows Server 2012 R2 NIC Team
152(1)
NIC Team Configurations
152(3)
Configuring NIC Teaming
155(5)
Enhanced QoS
160(5)
Minimum Bandwidth
161(1)
Data Center Bridging
161(2)
Hyper-V QoS
163(1)
Policy-Based QoS
164(1)
802.1X Authenticated Access
165(1)
BranchCache Improved
165(2)
Managing Network Performance
167(8)
Performance Analysis and Tools
168(1)
Server Performance Advisor Tool
169(3)
The Bottom Line
172(3)
Chapter 5 IP Address Management and DHCP Failover
175(36)
Ipam
175(5)
Ipam Requirements
177(1)
Ipam Components
178(1)
Topology Deployment Options
179(1)
Ipam Installation
180(10)
Installing the IPAM Server Feature
180(2)
Installing the IPAM Client Feature
182(1)
Configure IPAM Provisioning
182(2)
Configure Server Discovery
184(1)
Run Server Discoveries
185(1)
Choosing Servers for Management
185(4)
Retrieving Data
189(1)
Using IPAM
190(9)
Overview and Server Inventory
190(1)
IP Address Space
191(2)
Virtualized IP Address Space
193(3)
Monitor and Manage
196(2)
Event Catalog
198(1)
Ipam Delegation
199(4)
Ipam Troubleshooting
203(1)
Using the Event Viewer
203(1)
Common Issues
203(1)
Dhcp Failover
204(2)
Clustering vs. Split-scope
205(1)
What Is DHCP Failover?
205(1)
DHCP Failover Requirements
205(1)
Installing DHCP Failover
206(3)
The Bottom Line
209(2)
Chapter 6 DNS and Name Resolution in Windows Server 2012 R2
211(46)
Understanding the DNS Server Role
211(3)
Installing DNS
214(25)
Configuring a Stand-Alone DNS Server
214(3)
Integrating with Other DNS Servers
217(4)
Implementing Zones to Manage Namespaces
221(7)
Understanding Record Types
228(4)
Managing DNS Clients and Name Resolution
232(7)
Understanding Active Directory's DNS
239(6)
Configuring DNS Automatically
239(2)
Understanding SRV Records and Clients
241(1)
Windows Server 2012 R2 Additional Features
242(3)
Supporting Internet-based DNS Resolution
245(3)
Supporting External DNS Domains
245(1)
Resolving External Namespaces
246(2)
Administration and Troubleshooting with DNS Tools
248(7)
Administering the DNS Server with the DNS Management Console and PowerShell
248(2)
Leveraging NsLookup and DcDiag
250(4)
Helpful DNS Troubleshooting Links
254(1)
The Bottom Line
255(2)
Chapter 7 Active Directory in Windows Server 2012
257(120)
An Introduction and Active Directory Basics
258(52)
Creating a Single-domain Forest
260(1)
Benefits of a Single domain
261(1)
Creating a Single-domain Forest
262(17)
Adding a Second DC
279(6)
Creating Organizational Units, Accounts, and Groups
285(12)
Delegating Control Using Organizational Units
297(1)
Domain Maintenance Tasks
297(13)
Fine-grained Password Policies
310(3)
Creating the Password Settings Object
310(2)
Password Settings Object Precedence
312(1)
SYSVOL: Old and NEW
313(18)
The Old: File Replication Service
313(4)
The New: Distributed File System Replication
317(14)
Upgrading Your Active Directory
331(16)
Upgrade the Schema to Windows Server 2012
331(3)
Upgrade the Domain to 2012
334(5)
Migrating with a Swing Migration
339(4)
Migrating with a Clean and Pristine Migration
343(4)
Using Microsoft's Free Migration Tool: ADMT
347(21)
An Example Migration Setup
348(2)
Establishing the Trust
350(1)
Getting Both Sides ADMT-friendly
351(3)
Starting Up ADMT and Migrating
354(9)
Testing the Migrated Group's Access to Resources
363(1)
Translating Local Profiles
364(2)
Migrating Computer Accounts
366(1)
Rollback Considerations
367(1)
The Path to the 2012 Forest Functional Level
367(1)
An Introduction to Windows Azure Active Directory
368(6)
Getting Started with Windows Azure Active Directory
368(2)
How to Interact with Windows Azure Active Directory
370(1)
Synchronizing Windows Azure Active Directory
371(1)
Active Directory Logon Flavors
372(2)
Overview of Workplace Join
374(1)
What Is Workplace Join?
374(1)
The Bottom Line
375(2)
Chapter 8 Creating and Managing User Accounts
377(90)
Creating and Managing User Accounts
378(34)
Creating Local User Accounts
378(4)
Creating Domain User Accounts
382(6)
Setting Local User Account Properties
388(8)
Setting Domain-Based User Account Properties
396(16)
Managing Groups
412(21)
Local Groups
413(11)
Active Directory Groups
424(9)
Monday Morning Admin Tasks
433(4)
Forgotten Passwords
434(1)
Locked-Out Users
435(2)
Using the New Features for User and Group Management
437(14)
Active Directory Administrative Center
437(1)
ADAC Essentials
437(3)
Navigating ADAC
440(8)
EowerShell History Viewer
448(3)
Active Directory Module for Windows PowerShell
451(13)
Creating Users
452(1)
Setting Passwords
453(2)
Creating Many Users at Once
455(2)
Unlocking a User Account
457(2)
Enabling an Account
459(1)
Disabling an Account
459(5)
Removing a Group
464(1)
The Bottom Line
464(3)
Chapter 9 Group Policy: AD's Gauntlet and Active Directory Delegation
467(66)
Group Policy Concepts
467(2)
Policies Are "All or Nothing"
468(1)
Policies Are Inherited and Cumulative
469(1)
Group Policy Power! Refresh Intervals
469(1)
Group Policy Basics
469(1)
Replication of Group Policy Is Built In
470(1)
GPOs Undo Themselves When Removed
470(1)
You Needn't Log On to Apply GPO Settings
470(1)
Local Policies and Group Policy Objects
470(4)
Administrators or Non-Administrators LGPO
471(2)
User-specific LGPO
473(1)
Creating GPOs
474(5)
Modifying Group Policy Default Behavior
479(2)
Group Policy Policies
480(1)
Group Policy Application
481(5)
How Group Policy Is Applied
481(1)
Filtering Group Policy with Access Control Lists
482(4)
Enforcing and Blocking Inheritance
486(1)
Group Policy Setting Possibilities
486(23)
Decrypting User and Computer Configuration Settings
487(15)
Using Group Policy to Set Password and Account Lockout Policy
502(2)
Group Policy Preferences
504(5)
The New and Improved GPMC
509(4)
Starter GPOs
510(1)
Backing Up and Restoring GPOs
511(2)
Troubleshooting Group Policies
513(5)
The Resultant Set of Policy Tool
513(1)
Group Policy Results Using the GPMC
514(2)
Group Policy Modeling Using the GPMC
516(1)
gpresult
516(1)
Using Event Viewer
517(1)
Troubleshooting 101: Keep It Simple
517(1)
Active Directory Delegation
518(3)
Delegating Group Policy Administration
518(3)
Delegating Control Using Organizational Units
521(4)
Creating a New Organizational Unit
522(1)
Moving User Accounts into an OU
522(1)
Creating a MktPswAdm Group
522(1)
Delegating the Marketing OU's Password Reset Control to MktPswAdm
523(2)
Advanced Delegation: Manually Setting Permissions
525(5)
Finding Out Which Delegations Have Been Set, or Undelegating
530(1)
The Bottom Line
531(2)
Chapter 10 Active Directory Federation Services
533(28)
Understanding AD FS Key Components and Terminology
534(3)
AD FS Commonly Used Terms and Components
534(2)
Understanding AD FS Certificates
536(1)
Planning, Installing, and Configuring an AD FS Infrastructure
537(23)
Planning for AD FS Deployment
537(2)
Installing the AD FS Roles and Features Using Server Manager
539(4)
Creating a Trusted SSL Certificate Using IIS
543(1)
Using the AD FS Server Configuration Wizard
544(3)
Using Windows PowerShell with AD FS
547(2)
Adding a Trusted Relying Party
549(2)
Additional Configuration Options for AD FS
551(8)
Automating Client Configurations Using Group Policy
559(1)
The Bottom Line
560(1)
Chapter 11 Shared Storage and clustering Introduction
561(28)
Shared Storage Basics
561(5)
Storage Area Network
562(1)
iSCSI
562(1)
Fiber Channel
563(1)
SAS Enclosures
563(1)
RAID
563(1)
SMB 3.0
563(1)
Windows Server 2012 R2 File and Storage Services
564(2)
Clustering
566(3)
Clustering Requirements
566(1)
Clustering Functionality
567(1)
Cluster Shared Volumes
568(1)
Clusters and Virtualization
569(4)
Understanding Quorums
570(1)
Highly Available Storage
571(1)
Storage Spaces
571(2)
Clustering inside Virtual Machines
573(1)
Setting Up a Cluster
573(15)
Cluster Configuration
574(1)
Storage
575(1)
Adding the First Node in Your Cluster
575(10)
Adding a Second Node to the Cluster
585(2)
Setting Up a Guest-based Cluster
587(1)
The Bottom Line
588(1)
Chapter 12 Windows 2012 R2 Storage: Storage Spaces, SANish Abilities, and Better Tools
589(60)
What's New in Windows Server 2012 R2 Storage?
589(5)
Tiered Storage Spaces
590(1)
Write-back Cache
590(1)
Parallelized Repair
591(1)
Low-level Improvement: Native 4K Sector Support
591(1)
UEFI BIOS Support Allows GPT Drives
592(1)
CHKDSK Gets Smarter
592(1)
Online Self-healing
592(1)
Online Verification
592(1)
Online Identification and Logging
593(1)
Precise and Rapid Correction
593(1)
In-depth Look at Storage Spaces
594(4)
Reusing Technology from Microsoft's Cloud
595(1)
Providing SAN-like Capabilities with Microsoft Management Tools
595(3)
Creating a Storage Space
598(25)
Creating a Pool
599(3)
Pool Limitations
602(1)
Viewing Drives in Disk Management
603(1)
Pooling with PowerShell
604(2)
Allocating Pool Space to a Virtual Disk
606(13)
Storage-tiering Demo and Setup Using PowerShell
619(4)
iSCSI on Storage Spaces
623(8)
Adding the iSCSI Target Service
623(5)
Connecting to an iSCSI Virtual Disk from the Client Side
628(3)
NFS Shares
631(5)
Where to Use an NFS Share
631(1)
Quick NFS Share Setup
632(4)
Connecting to NFS from the Client Side
636(1)
Deduplication: Disk and Network
636(11)
Configuring Data Dedup with Server Manager
638(3)
Configuring Data Dedup with PowerShell
641(5)
Checking for Corrupt Volumes
646(1)
The Bottom Line
647(2)
Chapter 13 Files, Folders, and Basic Shares
649(54)
Understanding the File and Storage Services Role
650(7)
Additional Role Services and Features
651(2)
How to Add Roles to the File and Storage Services Role
653(4)
Creating Shares
657(9)
Creating Shares with Server Manager
657(3)
Creating Shares on Remote Computers Using Server Manager
660(4)
Publishing Shares in Active Directory
664(2)
Managing Permissions
666(6)
NTFS Permissions
666(1)
Share Permissions
667(1)
Share and NTFS Permission Similarities
667(2)
Modifying Share and NTFS Permissions
669(2)
Combining Share and NTFS Permissions
671(1)
Connecting to Shares
672(4)
"A Set of Credentials Conflicts"
674(1)
Using net use on a WAN
674(1)
Common Shares
675(1)
File Server Resource Manager
676(12)
Creating Quota Policies
676(6)
Creating File Screen Policies
682(2)
Generating Reports
684(3)
File Server Resource Manager Options
687(1)
Understanding SMB 3.0
688(4)
Compatibility with SMB 2.0 and 1.0
689(2)
SMB Security
691(1)
Implementing BitLocker
692(5)
What's New in BitLocker
692(1)
Hardware Requirements
693(2)
Enabling BitLocker
695(2)
Using Offline Files/Client-Side Caching
697(4)
How Offline Files Works
698(1)
BranchCache
699(1)
Enabling Offline Files on the Server
699(2)
The Bottom Line
701(2)
Chapter 14 Creating and Managing Shared Folders
703(56)
Creating Shared Folders
703(8)
Creating Shares from Explorer
705(2)
Remotely Creating Shares with the Computer Management Console
707(4)
Managing Permissions
711(21)
Creating Share Permissions
711(4)
Understanding File and Directory Permissions
715(17)
Working with Hidden Shares
732(2)
Exploring the Distributed File System
734(17)
Understanding DFS Terminology
736(1)
Choosing Stand-Alone vs. Domain-Based DFS
737(1)
Creating a DFS Root
738(5)
Adding Links to a DFS Root
743(2)
Configuring DFS Replications
745(2)
Understanding DFS Replication
747(1)
Managing DFS Replication
747(4)
Exploring the Network File System
751(5)
The Bottom Line
756(3)
Chapter 15 Dynamic Access Control: File Shares, Reimagined
759(68)
A New Way to Secure File Shares
760(9)
Access Control Using Groups and User AD Attributes
765(1)
Securing Data by Machine Attributes
766(1)
Centrally Control Permissions Using Templates
767(2)
Using Effective Permissions to Troubleshoot Access Control
769(1)
Automatic File Classification
769(1)
DAC Players: User, Device, Resources, and Claims
769(2)
User
769(1)
Device
770(1)
Resources
770(1)
Claims
770(1)
Enabling DAC
771(28)
Pieces of an Access Policy
774(4)
Side Task
778(18)
Access Denied Assistance
796(3)
Claims---Using Different Attributes
799(5)
Step 1 Create the Claim
800(2)
Step 2 Create the Resource Property
802(1)
Step 3 Add to the Resource Property List
802(1)
Step 4 Create Central Access Rules
802(1)
Step 5 Create a Central Access Policy and Deploy It via Group Policy
803(1)
Step 6 Apply the Policy to the Engineering Folder
803(1)
Step 7 Test with Effective Access
803(1)
Classification
804(20)
Classifying a Document
804(2)
Classification Properties
806(1)
Classification Rules
807(6)
Expression Types
813(5)
Understanding Regular Expressions
818(1)
Securing Data Using DAC and File Classification
819(5)
The Bottom Line
824(3)
Chapter 16 Sharing Printers on Windows Server 2012 R2 Networks
827(56)
Print Services Overview
827(5)
The Print Spooler
828(1)
The Printer Driver
829(3)
Installing the Print and Document Services Role
832(15)
Adding the Print and Document Services Role
832(2)
Working in the Print Management Console
834(11)
Adding the Print Services Role to Server Core
845(2)
PowerShell Cmdlets Reference
847(1)
Deploying Printers to the Masses
847(10)
Adding a Printer to a Client Manually
848(1)
Adding a Printer Using Active Directory Search
849(4)
Deploying Printers via GPO
853(3)
Viewing Deployed Printers
856(1)
Adjusting Print Server Settings
857(5)
Server Properties
857(4)
Printer Migration
861(1)
Managing Printer Properties
862(14)
Printer Properties Sharing Tab
862(1)
Printer Properties Ports Tab
863(1)
Printer Properties Security Tab
864(6)
Printer Properties Advanced Tab
870(6)
Managing Print Jobs
876(2)
Using Custom Filters
878(1)
Troubleshooting Printer Problems
879(3)
Basic Troubleshooting: Identifying the Situation
879(2)
Restarting the Spooler Service
881(1)
Isolating Printer Drivers
881(1)
The Bottom Line
882(1)
Chapter 17 Remote Server Administration
883(46)
Remote Desktop for Administration
883(36)
Configuring the Server for Remote Desktop
884(2)
Using Remote Desktop Connection
886(20)
Remote Desktop Gateway
906(11)
Configuring a Server for Remote Assistance
917(2)
Windows Remote Management Service
919(3)
Enabling WinRM
920(1)
Using WinRS
921(1)
Remote Server Administration Tools
922(4)
RSAT Compatibility Issues
923(1)
RSAT Tools
923(1)
Installing RSAT
924(1)
Remote Desktop and PowerShell
925(1)
The Bottom Line
926(3)
Chapter 18 Connecting Windows and Mac Clients
929(50)
What to Know Before You Begin
929(3)
Understanding Client-side Software Requirements
930(1)
Domain Accounts and Local Accounts
931(1)
Verifying Your Network Configuration
932(11)
Verifying Local Area Connection Settings
933(2)
Testing Network Connectivity with the ping Command
935(1)
Verifying and Setting Local Area Connection Information Using the GUI
935(7)
Joining the Domain
942(1)
Joining a Domain from Windows 8
943(8)
Joining a Domain with PowerShell
950(1)
Changing Domain User Passwords
951(18)
Changing Domain Passwords from Windows 8 and Windows 7
952(3)
Connecting to Network Resources
955(1)
Publishing Resources with Group Policy Objects
956(13)
Connecting Mac OS X Clients
969(8)
Connecting a Mac to the Domain
971(2)
Connecting to File Shares
973(1)
Connecting to Printers
974(1)
Using Remote Desktop from a Mac Client
974(2)
Troubleshooting
976(1)
The Bottom Line
977(2)
Chapter 19 Web Server Management with IIS
979(46)
What's New in IIS 8.0 and 8.5
979(2)
Installing IIS 8
981(10)
Adding the Web Server Role via Service Manager
981(4)
Installing IIS 8 via PowerShell
985(1)
Renovating IIS Construction
986(1)
Adding Role Services to the Web Server Role for Bigfirm
986(5)
Website Provisioning
991(11)
Understanding Global Settings
992(1)
Planning Bigfirm's Apples and Oranges Websites
992(2)
Creating a Simple Website
994(1)
Constructing Bigfirm's Websites
995(6)
Configuring Site Settings
1001(1)
Hosting Multiple Websites
1002(6)
Deploying Sites
1003(2)
Site Uniqueness
1005(1)
Setting Up an Anonymous Account
1005(1)
Managing Multiple Sites for Bigfirm
1006(1)
Delegating Administration
1007(1)
Installing and Configuring SMTP
1008(5)
Getting Started
1008(1)
Adding the SMTP Server Feature
1009(1)
Setting Up an SMTP Server
1010(2)
Adding the SMTP E-mail Feature to an IIS 8 Website
1012(1)
Integrating FTP into IIS 8 Web Pages
1013(3)
The FTP File Transfer Publishing Service
1014(1)
Adding FTP to an IIS 8 Website
1014(2)
Advanced Administration
1016(8)
Using Web Management Services
1017(2)
Connecting, Securing, Logging
1019(4)
Backing Up and Restoring Data
1023(1)
The Bottom Line
1024(1)
Chapter 20 Advanced IP: Routing with Windows
1025(40)
The Life of an IP Packet
1025(9)
First, the Simple Case: No Routing Required
1027(3)
Now the Hard Case: With Routing
1030(4)
From Classes to Classless
1034(8)
In the Beginning Was the Class
1034(1)
Unusable Host Addresses
1035(1)
Broadcast Gets Narrower: The First Unroutable Addresses
1035(1)
Routing the Unroutable, Part I: Private Addresses
1036(6)
Sockets, Ports, and Winsock
1042(15)
Winsock: Why We Can All Use the Internet
1045(1)
Routing the Unroutable, Part II: NAPT and PAT
1045(2)
Routing the Unroutable, Part III: Application Layer Gateways
1047(1)
Installing a NAT
1047(10)
Testing and Troubleshooting
1057(5)
Using the Application Itself
1057(1)
Pinging a Remote Computer with ping
1058(1)
Pinging a Remote Computer with traceroute
1059(1)
Checking Your Configuration with ipconfig
1060(1)
Showing Routing and Neighbors
1060(1)
Using Network Monitor
1060(1)
Which Card Do You Monitor?
1061(1)
The Bottom Line
1062(3)
Chapter 21 Getting from the Office to the Road: VPNs
1065(58)
Introducing VPNs
1065(2)
Gateway-to-Gateway VPN
1066(1)
Understanding the Tunneling Protocols
1067(1)
Layer 2 Tunneling Protocol
1067(1)
Secure Socket Tunneling Protocol
1067(1)
Internet Key Exchange Version 2
1068(1)
Using the Network Policy and Access Services Role
1068(2)
Installing the Network Policy and Access Services Role
1069(1)
Using the Remote Access Role
1070(40)
Installing the Remote Access Role
1071(1)
Configuring Routing and Remote Access
1072(2)
Configuring Policies
1074(23)
Authenticating VPN Clients
1097(3)
Configuring Accounting
1100(2)
Exploring Routing and Remote Access
1102(8)
Introducing DirectAccess
1110(2)
How DirectAccess Works
1110(2)
DirectAccess Requirements
1112(1)
Installing DirectAccess
1112(8)
Configuring a DirectAccess Client
1118(2)
Managing DirectAccess
1120(1)
The Bottom Line
1121(2)
Chapter 22 Adding More Locations: Sites in Active Directory
1123(30)
Mastering Site Concepts
1123(5)
Sites and Replication
1125(1)
Understanding Site Terminology
1126(2)
Exploring Sites
1128(13)
How Sites Work
1128(2)
Renaming Default-First-Site-Name
1130(1)
Defining a Site
1130(1)
Deciding on DCs in Remote Locations
1131(4)
Defining a Subnet and Placing It in a Site
1135(2)
Placing a Server in a Site
1137(1)
Adding Site Links
1137(4)
Configuring Intersite Replication
1141(5)
Bridgehead Servers
1144(1)
Forcing Replication
1145(1)
Configuring Clients to Access the Next Closest Site
1146(4)
Configuring Next Closest Site with Group Policy
1147(1)
Configuring Next Closest Site through the Registry
1148(2)
Using PowerShell
1150(2)
The Bottom Line
1152(1)
Chapter 23 The Third DC: Understanding Read-only Domain Controllers
1153(32)
Introducing RODCs
1153(15)
Making Changes on a Read-only Domain Controller
1155(1)
RODC Contents
1156(5)
RODC Requirements
1161(6)
RODC and Server Applications
1167(1)
Installing the RODC
1168(14)
Installing RODC on Server Core
1174(1)
Viewing the RODC Properties
1174(2)
Modifying the Allowed List
1176(1)
Staged Installations
1177(5)
DNS on the RODC
1182(2)
Active Directory Integrated DNS
1183(1)
Read-only DNS
1183(1)
The Bottom Line
1184(1)
Chapter 24 Creating Larger Active Directory Environments: Beyond One Domain
1185(58)
The Foundations of Multiple-Domain Designs
1185(6)
Domains
1186(2)
Forests
1188(1)
Trees
1188(2)
You Must Build Trees and Forests Together
1190(1)
Planning Your Active Directory Environment
1191(7)
Satisfying Political Needs
1192(1)
Connectivity and Replication Issues
1192(1)
Multiple Domains: When They Make Sense
1193(1)
The Case for an Empty Root
1194(2)
Active Directory Design Pointers
1196(2)
Creating Multiple Domains
1198(7)
Naming Multidomain Structures
1198(1)
Preparing the DC for the Second Domain
1199(1)
Creating a Second Domain
1200(5)
Functional Levels
1205(4)
Domain Functional Levels
1205(2)
Forest Functional Levels
1207(2)
FSMOs and GCs
1209(17)
Multimaster vs. Single-Master Replication
1209(1)
But Not Everything Is Multimaster
1209(1)
Domain Naming: A FSMO Example
1210(1)
Why Administrators Must Know about FSMOs
1210(1)
Global Catalogs
1211(2)
FSMO Roles
1213(1)
Schema Master
1213(4)
Domain Naming Master FSMO
1217(1)
RID Pool FSMO
1217(1)
Infrastructure Operations Master
1218(1)
PDC Emulator FSMO
1219(1)
Transferring FSMO Roles
1219(4)
Time Sync
1223(3)
Trusts
1226(14)
Defining the Domain: "Trust"
1226(1)
Trust Relationships in More Detail
1227(1)
Trusts Have Direction
1227(1)
Some Trusts Are Transitive
1228(1)
Trusts Do Not Remove All Security
1228(1)
Trusts Involve Administrators from Both Sides
1229(1)
Four Kinds of Trusts
1229(1)
Understanding Transitive Forest Trusts
1230(1)
Manually Creating Trusts
1230(10)
The Bottom Line
1240(3)
Chapter 25 Migrating, Merging, and Modifying Your Active Directory
1243(24)
Upgrade and Migration Strategies
1243(19)
Upgrade Capabilities
1244(1)
Migrating with an In-place Upgrade
1245(10)
Swing Migrations from Windows Server 2003
1255(3)
Active Directory Domain Migration
1258(4)
Using Microsoft's Free Migration Tool: ADMT
1262(3)
Version Incompatibility
1262(1)
Establishing the Trust
1263(1)
Getting Both Sides ADMT-friendly
1264(1)
The Bottom Line
1265(2)
Chapter 26 Advanced User Account Management and User Support
1267(72)
Experiencing the Flexible Desktop
1268(1)
Configuring Home Directories
1269(11)
Setting Up the Lab
1270(1)
Creating the Home Directories
1270(7)
Creating Home Directories
1277(3)
Home Directory vs. Local Storage
1280(1)
Creating Roaming Profiles
1280(20)
Creating a Roaming Profiles Share: The Easy Way
1282(8)
Creating a Roaming Profiles Share: The Hard Way
1290(3)
Configuring Mandatory Profiles
1293(6)
Configuring Super Mandatory Profiles
1299(1)
Configuring a Default Network Profile
1299(1)
Managing Roaming Profiles
1300(6)
Machine Settings
1301(5)
User Settings
1306(1)
Redirecting Folders
1306(13)
Basic Folder Redirection
1308(6)
Advanced Folder Redirection
1314(2)
Managing Folder Redirection
1316(3)
Work Folders
1319(4)
Installing Work Folders
1319(1)
Sync Share Configuration
1319(3)
Client Configuration
1322(1)
Managing the Desktop Using Group Policy
1323(5)
Managing Users with Group Policy Preferences and Logon Scripts
1328(9)
Managing Drive Mappings
1328(3)
Executing Commands at Logon
1331(3)
Multiple Logon Scripts
1334(1)
Managing Logon Scripts with Group Policy
1335(1)
Managing Shutdown Tasks with Logoff Scripts
1336(1)
The Bottom Line
1337(2)
Chapter 27 Server Virtualization with Hyper-V
1339(60)
Understanding Server Virtualization
1339(6)
What Use Is Server Virtualization?
1341(2)
Getting Started with Hyper-V
1343(2)
What's New in Hyper-V 2012 R2?
1345(7)
Understanding the Hyper-V Architecture
1352(7)
The Management OS Partition
1354(3)
Virtual Machine (Guest) Partitions
1357(2)
Installing and Configuring Hyper-V
1359(7)
Working with the Console
1363(1)
Exploring the Actions Pane
1364(2)
Understanding Virtual Disks
1366(8)
Virtual Disks and Their Controllers
1367(1)
Creating a New Virtual Disk
1368(3)
Disk Maintenance
1371(3)
Understanding Virtual Switches
1374(3)
Choosing a Virtual Switch
1374(1)
Creating a Virtual Switch
1375(2)
Getting Started with Virtual Machines
1377(19)
Installing a Virtual Machine
1388(4)
Working with VLANs
1392(1)
Time Travel with Checkpoints
1393(3)
The Bottom Line
1396(3)
Chapter 28 Managing Virtual Machines
1399(36)
Domain Controllers and Hyper-V
1399(8)
Virtual DCs That Just Work
1400(2)
Quick Domain Controller Deployment
1402(5)
Moving VMs: Export and Import
1407(11)
Quick Migration and Live Migration
1411(3)
Cluster-free Live Migrations
1414(4)
VM Maintenance
1418(4)
Backing Up and Restoring Virtual Machines
1418(3)
Malware Protection and Patching
1421(1)
Disaster Recovery
1422(9)
Cheap DR with Hyper-V Replica
1423(8)
Online Resources for Hyper-V
1431(1)
The Bottom Line
1432(3)
Chapter 29 Installing, Using, and Administering Remote Desktop Services
1435(44)
Who Needs Remote Desktop Services?
1435(5)
Centralized Deployment of Applications
1436(1)
Supporting Remote Users
1436(1)
Supporting PC-Unfriendly Environments
1436(1)
Reducing Hardware Refreshes
1437(1)
Simplifying the User Interface
1438(1)
Providing Help-Desk Support
1439(1)
Deploying RDS RemoteApp
1439(1)
Understanding the Remote Desktop Services Processing Model
1440(4)
Son of Mainframe?
1440(1)
Anatomy of a Thin-Client Session
1441(3)
Server and Client Requirements
1444(5)
Server Hardware
1444(3)
Client Hardware
1447(2)
Adding Remote Desktop Services
1449(15)
Required Role Services
1450(2)
Easy Print
1452(1)
Single Sign-On
1452(1)
Network Level Authentication
1453(1)
Licensing Mode
1453(1)
Remote Desktop Users Group
1454(1)
Adding the Remote Desktop Services Role
1454(4)
Adding Applications
1458(1)
Connecting to an RDS Session
1459(1)
Adding an RDS RemoteApp Application
1460(4)
Virtual Desktop Infrastructure
1464(8)
Monitoring Remote Desktop Services
1472(5)
Common Tasks and How to Do Them
1473(2)
Remote Desktop Licensing Manager
1475(2)
The Bottom Line
1477(2)
Chapter 30 Monitoring Windows Server 2012 R2
1479(52)
Using Server Manager to Monitor Multiple Servers
1479(4)
Adding Servers to Manage
1480(1)
Creating a Server Group for Monitoring
1481(1)
Monitoring with Server Groups
1481(2)
Utilizing the Best Practice Analyzers
1483(2)
Monitoring Your System with Event Viewer
1485(10)
Viewing an Event
1485(1)
Understanding Event Levels
1486(1)
Creating and Using Custom Views
1487(5)
Understanding Windows Logs
1492(1)
Understanding Applications and Services Logs
1493(1)
Configuring Event Log Properties
1493(2)
Subscribing to Event Logs
1495(10)
Understanding Subscription Types
1496(2)
Selecting Events
1498(1)
Setting Advanced Options
1499(1)
Understanding Event Subscription Protocols
1500(1)
Configuring Event Subscriptions
1501(4)
Troubleshooting Event Forwarding
1505(2)
Checking the Runtime Status
1505(1)
Using the Windows Event Collector Utility
1505(2)
Monitoring Performance
1507(12)
Using Monitoring Tools
1508(2)
Using Data Collector Sets
1510(9)
PAL and PerfView
1519(4)
Introducing PAL
1519(4)
PerfView
1523(1)
Advanced Monitoring with System Center 2012 R2
1523(5)
Introduction to Operations Manager
1524(4)
The Bottom Line
1528(3)
Chapter 31 Patch Management
1531(24)
What's New in Windows Server 2012 R2 Windows Server Update Services
1531(5)
New Features of WSUS v6 in Windows Server 2012 R2
1532(1)
Software Requirements for WSUS Servers and Clients
1532(1)
Deployment Scenarios
1533(2)
Complex Hierarchies with WSUS
1535(1)
Installation and Configuration of Patch Management
1536(8)
Installing the WSUS Role on Windows Server 2012 R2
1536(4)
Configuring WSUS for Deployments
1540(4)
Deploying Updates and Migration for Windows Server Update Services
1544(10)
Configuring Group Policies for Windows Update
1544(3)
Configuring Clients for Windows Updates
1547(3)
Migration from WSUS 3.0 to Windows Server 2012 R2
1550(1)
Backing Up Your WSUS Database
1550(1)
Review Additional Considerations
1551(1)
Operational Management and Tools
1551(3)
The Bottom Line
1554(1)
Chapter 32 Windows Server 2012 R2 and Active Directory Backup and Maintenance
1555(30)
Introducing Windows Server Backup
1555(15)
Installing Windows Server Backup
1556(1)
Backing Up and Restoring a Full Server
1557(9)
Backing Up and Restoring Files and Folders
1566(3)
Backing Up to the Cloud
1569(1)
Stopping and Restarting Active Directory
1570(3)
Stopping and Starting AD DS
1570(1)
Defragmenting Active Directory Offline
1570(1)
Checking the Integrity of an Active Directory Database
1571(2)
Capturing Active Directory Snapshots
1573(3)
Creating an Active Directory Snapshot
1573(1)
Mounting an Active Directory Snapshot
1574(1)
Working with Mounted Active Directory Snapshots
1574(2)
Backing Up and Restoring Active Directory
1576(9)
Introducing the Active Directory Recycle Bin
1577(2)
Creating an Active Directory Backup
1579(1)
Restoring an Active Directory Backup
1580(2)
Performing an Authoritative Restore
1582(1)
The Bottom Line
1583(2)
Appendix The Bottom Line
1585(46)
Chapter 2 Installing and Upgrading to Windows Server 2012
1585(1)
Chapter 3 Introduction to Server Core
1586(1)
Chapter 4 Windows Server 2012 R2 Networking Enhancements
1587(2)
Chapter 5 IP Address Management and DHCP Failover
1589(2)
Chapter 6 DNS and Name Resolution in Windows Server 2012 R2
1591(1)
Chapter 7 Active Directory in Windows Server 2012
1592(1)
Chapter 8 Creating and Managing User Accounts
1593(4)
Chapter 9 Group Policy: AD's Gauntlet and Active Directory Delegation
1597(2)
Chapter 10 Active Directory Federation Services
1599(1)
Chapter 11 Shared Storage and Clustering Introduction
1600(1)
Chapter 12 Windows 2012 R2 Storage: Storage Spaces, SA Nish Abilities, and Better Tools
1600(2)
Chapter 13 Files, Folders, and Basic Shares
1602(1)
Chapter 14 Creating and Managing Shared Folders
1603(2)
Chapter 15 Dynamic Access Control: File Shares, Reimagined
1605(1)
Chapter 16 Sharing Printers on Windows Server 2012 R2 Networks
1606(1)
Chapter 17 Remote Server Administration
1607(1)
Chapter 18 Connecting Windows and Mac Clients
1608(3)
Chapter 19 Web Server Management with IIS
1611(1)
Chapter 20 Advanced IP: Routing with Windows
1612(2)
Chapter 21 Getting from the Office to the Road: VPNs
1614(1)
Chapter 22 Adding More Locations: Sites in Active Directory
1614(2)
Chapter 23 The Third DC: Understanding Read-Only Domain Controllers
1616(1)
Chapter 24 Creating Larger Active Directory Environments: Beyond One Domain
1617(2)
Chapter 25 Migrating, Merging, and Modifying Your Active Directory
1619(1)
Chapter 26 Advanced User Account Management and User Support
1620(1)
Chapter 27 Server Virtualization with Hyper-V
1621(2)
Chapter 28 Managing Virtual Machines
1623(1)
Chapter 29 Installing, Using, and Administering Remote Desktop Services
1624(1)
Chapter 30 Monitoring Windows Server 2012 R2
1625(2)
Chapter 31 Patch Management
1627(1)
Chapter 32 Windows Server 2012 R2 and Active Directory Backup and Maintenance
1628(3)
Index 1631
Mark Minasi, MCSE, is one of the world's leading Windows authorities. He teaches classes in 15 countries and is a much sought-after speaker at conferences and industry gathering keynotes. His firm, MR&D, has taught tens of thousands of people to design and run Windows networks. Mark has written or cowritten numerous books, including the popular Mastering Microsoft Windows Server 2008 R2 and The Complete PC Upgrade and Maintenance Guide. Twitter: @mminasi