Introduction |
|
xxxi | |
|
Chapter 1 What's New in Windows Server 2012 R2 |
|
|
1 | (18) |
|
Windows Server 2012 R2 Introduction |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
3 | (5) |
|
Active Directory Domain Services Changes |
|
|
4 | (3) |
|
Active Directory Rights Management Services |
|
|
7 | (1) |
|
Active Directory Certificate Services |
|
|
8 | (1) |
|
|
8 | (3) |
|
|
8 | (2) |
|
Virtual Desktop Infrastructure |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (2) |
|
|
12 | (1) |
|
The Remote Tools: WinRM and WinRS |
|
|
13 | (1) |
|
|
13 | (1) |
|
Group Policy Object Improvements |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
File Server Resource Manager |
|
|
15 | (1) |
|
|
15 | (4) |
|
|
15 | (2) |
|
|
17 | (2) |
|
Chapter 2 Installing and Upgrading to Windows Server 2012 R2 |
|
|
19 | (86) |
|
|
19 | (4) |
|
Installation Requirements |
|
|
20 | (2) |
|
|
22 | (1) |
|
Installing the Operating System |
|
|
23 | (20) |
|
Performing a Clean Installation |
|
|
23 | (8) |
|
Performing an Upgrade Installation |
|
|
31 | (11) |
|
|
42 | (1) |
|
Using Server Manager to Configure Your Servers |
|
|
43 | (33) |
|
Changes to Server Manager |
|
|
45 | (1) |
|
Common Configuration Tasks |
|
|
45 | (11) |
|
Adding and Removing Roles and Features |
|
|
56 | (14) |
|
Troubleshooting Roles and Features |
|
|
70 | (6) |
|
Wrapping Up Server Manager |
|
|
76 | (1) |
|
Upgrading Active Directory |
|
|
76 | (5) |
|
An Overview of Active Directory: New Functionality in Windows Server 2012 R2 |
|
|
76 | (4) |
|
Active Directory Upgrade Strategies |
|
|
80 | (1) |
|
|
81 | (21) |
|
Installing Windows Assessment and Deployment Kit |
|
|
82 | (5) |
|
|
87 | (13) |
|
|
100 | (2) |
|
Installing a Sample Server Network for This Book's Examples |
|
|
102 | (1) |
|
|
103 | (2) |
|
Chapter 3 Introduction to Server Core |
|
|
105 | (42) |
|
What's New in Server Core |
|
|
105 | (1) |
|
|
106 | (3) |
|
Server Core Survival Guide |
|
|
109 | (4) |
|
Switching between Server Core and the GUI and Vice Versa |
|
|
109 | (1) |
|
|
109 | (1) |
|
Closing the Command Prompt |
|
|
110 | (1) |
|
Changing the Administrator's Password |
|
|
110 | (1) |
|
|
111 | (1) |
|
Finding Commands from A to Z |
|
|
112 | (1) |
|
Reading Text Files with Notepad |
|
|
112 | (1) |
|
|
112 | (1) |
|
Rebooting and Shutting Down |
|
|
112 | (1) |
|
Initial Configurations for Server Core |
|
|
113 | (6) |
|
Providing Computer Information |
|
|
113 | (3) |
|
|
116 | (1) |
|
|
117 | (2) |
|
Administering Server Core Remotely |
|
|
119 | (12) |
|
Configuring Roles and Features |
|
|
131 | (14) |
|
Creating a Domain Controller and Managing DNS |
|
|
132 | (1) |
|
Configuring the DHCP Service |
|
|
133 | (2) |
|
|
135 | (5) |
|
Setting Up a Print Server |
|
|
140 | (2) |
|
Managing Licenses with the Key Management Service |
|
|
142 | (2) |
|
Protecting Data with Windows Backup Server |
|
|
144 | (1) |
|
|
145 | (2) |
|
Chapter 4 Windows Server 2012 R2 Networking Enhancements |
|
|
147 | (28) |
|
|
147 | (3) |
|
|
148 | (1) |
|
IPv6 Transition Technologies |
|
|
148 | (2) |
|
Better Networking Manageability with PowerShell |
|
|
150 | (2) |
|
Networking Cmdlets and Modules |
|
|
150 | (2) |
|
|
152 | (3) |
|
Understanding the Benefits of a Windows Server 2012 R2 NIC Team |
|
|
152 | (1) |
|
|
152 | (3) |
|
|
155 | (5) |
|
|
160 | (5) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
164 | (1) |
|
802.1X Authenticated Access |
|
|
165 | (1) |
|
|
165 | (2) |
|
Managing Network Performance |
|
|
167 | (8) |
|
Performance Analysis and Tools |
|
|
168 | (1) |
|
Server Performance Advisor Tool |
|
|
169 | (3) |
|
|
172 | (3) |
|
Chapter 5 IP Address Management and DHCP Failover |
|
|
175 | (36) |
|
|
175 | (5) |
|
|
177 | (1) |
|
|
178 | (1) |
|
Topology Deployment Options |
|
|
179 | (1) |
|
|
180 | (10) |
|
Installing the IPAM Server Feature |
|
|
180 | (2) |
|
Installing the IPAM Client Feature |
|
|
182 | (1) |
|
Configure IPAM Provisioning |
|
|
182 | (2) |
|
Configure Server Discovery |
|
|
184 | (1) |
|
|
185 | (1) |
|
Choosing Servers for Management |
|
|
185 | (4) |
|
|
189 | (1) |
|
|
190 | (9) |
|
Overview and Server Inventory |
|
|
190 | (1) |
|
|
191 | (2) |
|
Virtualized IP Address Space |
|
|
193 | (3) |
|
|
196 | (2) |
|
|
198 | (1) |
|
|
199 | (4) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (2) |
|
Clustering vs. Split-scope |
|
|
205 | (1) |
|
|
205 | (1) |
|
DHCP Failover Requirements |
|
|
205 | (1) |
|
|
206 | (3) |
|
|
209 | (2) |
|
Chapter 6 DNS and Name Resolution in Windows Server 2012 R2 |
|
|
211 | (46) |
|
Understanding the DNS Server Role |
|
|
211 | (3) |
|
|
214 | (25) |
|
Configuring a Stand-Alone DNS Server |
|
|
214 | (3) |
|
Integrating with Other DNS Servers |
|
|
217 | (4) |
|
Implementing Zones to Manage Namespaces |
|
|
221 | (7) |
|
Understanding Record Types |
|
|
228 | (4) |
|
Managing DNS Clients and Name Resolution |
|
|
232 | (7) |
|
Understanding Active Directory's DNS |
|
|
239 | (6) |
|
Configuring DNS Automatically |
|
|
239 | (2) |
|
Understanding SRV Records and Clients |
|
|
241 | (1) |
|
Windows Server 2012 R2 Additional Features |
|
|
242 | (3) |
|
Supporting Internet-based DNS Resolution |
|
|
245 | (3) |
|
Supporting External DNS Domains |
|
|
245 | (1) |
|
Resolving External Namespaces |
|
|
246 | (2) |
|
Administration and Troubleshooting with DNS Tools |
|
|
248 | (7) |
|
Administering the DNS Server with the DNS Management Console and PowerShell |
|
|
248 | (2) |
|
Leveraging NsLookup and DcDiag |
|
|
250 | (4) |
|
Helpful DNS Troubleshooting Links |
|
|
254 | (1) |
|
|
255 | (2) |
|
Chapter 7 Active Directory in Windows Server 2012 |
|
|
257 | (120) |
|
An Introduction and Active Directory Basics |
|
|
258 | (52) |
|
Creating a Single-domain Forest |
|
|
260 | (1) |
|
Benefits of a Single domain |
|
|
261 | (1) |
|
Creating a Single-domain Forest |
|
|
262 | (17) |
|
|
279 | (6) |
|
Creating Organizational Units, Accounts, and Groups |
|
|
285 | (12) |
|
Delegating Control Using Organizational Units |
|
|
297 | (1) |
|
|
297 | (13) |
|
Fine-grained Password Policies |
|
|
310 | (3) |
|
Creating the Password Settings Object |
|
|
310 | (2) |
|
Password Settings Object Precedence |
|
|
312 | (1) |
|
|
313 | (18) |
|
The Old: File Replication Service |
|
|
313 | (4) |
|
The New: Distributed File System Replication |
|
|
317 | (14) |
|
Upgrading Your Active Directory |
|
|
331 | (16) |
|
Upgrade the Schema to Windows Server 2012 |
|
|
331 | (3) |
|
Upgrade the Domain to 2012 |
|
|
334 | (5) |
|
Migrating with a Swing Migration |
|
|
339 | (4) |
|
Migrating with a Clean and Pristine Migration |
|
|
343 | (4) |
|
Using Microsoft's Free Migration Tool: ADMT |
|
|
347 | (21) |
|
An Example Migration Setup |
|
|
348 | (2) |
|
|
350 | (1) |
|
Getting Both Sides ADMT-friendly |
|
|
351 | (3) |
|
Starting Up ADMT and Migrating |
|
|
354 | (9) |
|
Testing the Migrated Group's Access to Resources |
|
|
363 | (1) |
|
Translating Local Profiles |
|
|
364 | (2) |
|
Migrating Computer Accounts |
|
|
366 | (1) |
|
|
367 | (1) |
|
The Path to the 2012 Forest Functional Level |
|
|
367 | (1) |
|
An Introduction to Windows Azure Active Directory |
|
|
368 | (6) |
|
Getting Started with Windows Azure Active Directory |
|
|
368 | (2) |
|
How to Interact with Windows Azure Active Directory |
|
|
370 | (1) |
|
Synchronizing Windows Azure Active Directory |
|
|
371 | (1) |
|
Active Directory Logon Flavors |
|
|
372 | (2) |
|
Overview of Workplace Join |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (2) |
|
Chapter 8 Creating and Managing User Accounts |
|
|
377 | (90) |
|
Creating and Managing User Accounts |
|
|
378 | (34) |
|
Creating Local User Accounts |
|
|
378 | (4) |
|
Creating Domain User Accounts |
|
|
382 | (6) |
|
Setting Local User Account Properties |
|
|
388 | (8) |
|
Setting Domain-Based User Account Properties |
|
|
396 | (16) |
|
|
412 | (21) |
|
|
413 | (11) |
|
|
424 | (9) |
|
Monday Morning Admin Tasks |
|
|
433 | (4) |
|
|
434 | (1) |
|
|
435 | (2) |
|
Using the New Features for User and Group Management |
|
|
437 | (14) |
|
Active Directory Administrative Center |
|
|
437 | (1) |
|
|
437 | (3) |
|
|
440 | (8) |
|
EowerShell History Viewer |
|
|
448 | (3) |
|
Active Directory Module for Windows PowerShell |
|
|
451 | (13) |
|
|
452 | (1) |
|
|
453 | (2) |
|
Creating Many Users at Once |
|
|
455 | (2) |
|
|
457 | (2) |
|
|
459 | (1) |
|
|
459 | (5) |
|
|
464 | (1) |
|
|
464 | (3) |
|
Chapter 9 Group Policy: AD's Gauntlet and Active Directory Delegation |
|
|
467 | (66) |
|
|
467 | (2) |
|
Policies Are "All or Nothing" |
|
|
468 | (1) |
|
Policies Are Inherited and Cumulative |
|
|
469 | (1) |
|
Group Policy Power! Refresh Intervals |
|
|
469 | (1) |
|
|
469 | (1) |
|
Replication of Group Policy Is Built In |
|
|
470 | (1) |
|
GPOs Undo Themselves When Removed |
|
|
470 | (1) |
|
You Needn't Log On to Apply GPO Settings |
|
|
470 | (1) |
|
Local Policies and Group Policy Objects |
|
|
470 | (4) |
|
Administrators or Non-Administrators LGPO |
|
|
471 | (2) |
|
|
473 | (1) |
|
|
474 | (5) |
|
Modifying Group Policy Default Behavior |
|
|
479 | (2) |
|
|
480 | (1) |
|
|
481 | (5) |
|
How Group Policy Is Applied |
|
|
481 | (1) |
|
Filtering Group Policy with Access Control Lists |
|
|
482 | (4) |
|
Enforcing and Blocking Inheritance |
|
|
486 | (1) |
|
Group Policy Setting Possibilities |
|
|
486 | (23) |
|
Decrypting User and Computer Configuration Settings |
|
|
487 | (15) |
|
Using Group Policy to Set Password and Account Lockout Policy |
|
|
502 | (2) |
|
|
504 | (5) |
|
The New and Improved GPMC |
|
|
509 | (4) |
|
|
510 | (1) |
|
Backing Up and Restoring GPOs |
|
|
511 | (2) |
|
Troubleshooting Group Policies |
|
|
513 | (5) |
|
The Resultant Set of Policy Tool |
|
|
513 | (1) |
|
Group Policy Results Using the GPMC |
|
|
514 | (2) |
|
Group Policy Modeling Using the GPMC |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
517 | (1) |
|
Troubleshooting 101: Keep It Simple |
|
|
517 | (1) |
|
Active Directory Delegation |
|
|
518 | (3) |
|
Delegating Group Policy Administration |
|
|
518 | (3) |
|
Delegating Control Using Organizational Units |
|
|
521 | (4) |
|
Creating a New Organizational Unit |
|
|
522 | (1) |
|
Moving User Accounts into an OU |
|
|
522 | (1) |
|
Creating a MktPswAdm Group |
|
|
522 | (1) |
|
Delegating the Marketing OU's Password Reset Control to MktPswAdm |
|
|
523 | (2) |
|
Advanced Delegation: Manually Setting Permissions |
|
|
525 | (5) |
|
Finding Out Which Delegations Have Been Set, or Undelegating |
|
|
530 | (1) |
|
|
531 | (2) |
|
Chapter 10 Active Directory Federation Services |
|
|
533 | (28) |
|
Understanding AD FS Key Components and Terminology |
|
|
534 | (3) |
|
AD FS Commonly Used Terms and Components |
|
|
534 | (2) |
|
Understanding AD FS Certificates |
|
|
536 | (1) |
|
Planning, Installing, and Configuring an AD FS Infrastructure |
|
|
537 | (23) |
|
Planning for AD FS Deployment |
|
|
537 | (2) |
|
Installing the AD FS Roles and Features Using Server Manager |
|
|
539 | (4) |
|
Creating a Trusted SSL Certificate Using IIS |
|
|
543 | (1) |
|
Using the AD FS Server Configuration Wizard |
|
|
544 | (3) |
|
Using Windows PowerShell with AD FS |
|
|
547 | (2) |
|
Adding a Trusted Relying Party |
|
|
549 | (2) |
|
Additional Configuration Options for AD FS |
|
|
551 | (8) |
|
Automating Client Configurations Using Group Policy |
|
|
559 | (1) |
|
|
560 | (1) |
|
Chapter 11 Shared Storage and clustering Introduction |
|
|
561 | (28) |
|
|
561 | (5) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
Windows Server 2012 R2 File and Storage Services |
|
|
564 | (2) |
|
|
566 | (3) |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
568 | (1) |
|
Clusters and Virtualization |
|
|
569 | (4) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
571 | (2) |
|
Clustering inside Virtual Machines |
|
|
573 | (1) |
|
|
573 | (15) |
|
|
574 | (1) |
|
|
575 | (1) |
|
Adding the First Node in Your Cluster |
|
|
575 | (10) |
|
Adding a Second Node to the Cluster |
|
|
585 | (2) |
|
Setting Up a Guest-based Cluster |
|
|
587 | (1) |
|
|
588 | (1) |
|
Chapter 12 Windows 2012 R2 Storage: Storage Spaces, SANish Abilities, and Better Tools |
|
|
589 | (60) |
|
What's New in Windows Server 2012 R2 Storage? |
|
|
589 | (5) |
|
|
590 | (1) |
|
|
590 | (1) |
|
|
591 | (1) |
|
Low-level Improvement: Native 4K Sector Support |
|
|
591 | (1) |
|
UEFI BIOS Support Allows GPT Drives |
|
|
592 | (1) |
|
|
592 | (1) |
|
|
592 | (1) |
|
|
592 | (1) |
|
Online Identification and Logging |
|
|
593 | (1) |
|
Precise and Rapid Correction |
|
|
593 | (1) |
|
In-depth Look at Storage Spaces |
|
|
594 | (4) |
|
Reusing Technology from Microsoft's Cloud |
|
|
595 | (1) |
|
Providing SAN-like Capabilities with Microsoft Management Tools |
|
|
595 | (3) |
|
|
598 | (25) |
|
|
599 | (3) |
|
|
602 | (1) |
|
Viewing Drives in Disk Management |
|
|
603 | (1) |
|
|
604 | (2) |
|
Allocating Pool Space to a Virtual Disk |
|
|
606 | (13) |
|
Storage-tiering Demo and Setup Using PowerShell |
|
|
619 | (4) |
|
|
623 | (8) |
|
Adding the iSCSI Target Service |
|
|
623 | (5) |
|
Connecting to an iSCSI Virtual Disk from the Client Side |
|
|
628 | (3) |
|
|
631 | (5) |
|
Where to Use an NFS Share |
|
|
631 | (1) |
|
|
632 | (4) |
|
Connecting to NFS from the Client Side |
|
|
636 | (1) |
|
Deduplication: Disk and Network |
|
|
636 | (11) |
|
Configuring Data Dedup with Server Manager |
|
|
638 | (3) |
|
Configuring Data Dedup with PowerShell |
|
|
641 | (5) |
|
Checking for Corrupt Volumes |
|
|
646 | (1) |
|
|
647 | (2) |
|
Chapter 13 Files, Folders, and Basic Shares |
|
|
649 | (54) |
|
Understanding the File and Storage Services Role |
|
|
650 | (7) |
|
Additional Role Services and Features |
|
|
651 | (2) |
|
How to Add Roles to the File and Storage Services Role |
|
|
653 | (4) |
|
|
657 | (9) |
|
Creating Shares with Server Manager |
|
|
657 | (3) |
|
Creating Shares on Remote Computers Using Server Manager |
|
|
660 | (4) |
|
Publishing Shares in Active Directory |
|
|
664 | (2) |
|
|
666 | (6) |
|
|
666 | (1) |
|
|
667 | (1) |
|
Share and NTFS Permission Similarities |
|
|
667 | (2) |
|
Modifying Share and NTFS Permissions |
|
|
669 | (2) |
|
Combining Share and NTFS Permissions |
|
|
671 | (1) |
|
|
672 | (4) |
|
"A Set of Credentials Conflicts" |
|
|
674 | (1) |
|
|
674 | (1) |
|
|
675 | (1) |
|
File Server Resource Manager |
|
|
676 | (12) |
|
|
676 | (6) |
|
Creating File Screen Policies |
|
|
682 | (2) |
|
|
684 | (3) |
|
File Server Resource Manager Options |
|
|
687 | (1) |
|
|
688 | (4) |
|
Compatibility with SMB 2.0 and 1.0 |
|
|
689 | (2) |
|
|
691 | (1) |
|
|
692 | (5) |
|
|
692 | (1) |
|
|
693 | (2) |
|
|
695 | (2) |
|
Using Offline Files/Client-Side Caching |
|
|
697 | (4) |
|
|
698 | (1) |
|
|
699 | (1) |
|
Enabling Offline Files on the Server |
|
|
699 | (2) |
|
|
701 | (2) |
|
Chapter 14 Creating and Managing Shared Folders |
|
|
703 | (56) |
|
|
703 | (8) |
|
Creating Shares from Explorer |
|
|
705 | (2) |
|
Remotely Creating Shares with the Computer Management Console |
|
|
707 | (4) |
|
|
711 | (21) |
|
Creating Share Permissions |
|
|
711 | (4) |
|
Understanding File and Directory Permissions |
|
|
715 | (17) |
|
Working with Hidden Shares |
|
|
732 | (2) |
|
Exploring the Distributed File System |
|
|
734 | (17) |
|
Understanding DFS Terminology |
|
|
736 | (1) |
|
Choosing Stand-Alone vs. Domain-Based DFS |
|
|
737 | (1) |
|
|
738 | (5) |
|
Adding Links to a DFS Root |
|
|
743 | (2) |
|
Configuring DFS Replications |
|
|
745 | (2) |
|
Understanding DFS Replication |
|
|
747 | (1) |
|
|
747 | (4) |
|
Exploring the Network File System |
|
|
751 | (5) |
|
|
756 | (3) |
|
Chapter 15 Dynamic Access Control: File Shares, Reimagined |
|
|
759 | (68) |
|
A New Way to Secure File Shares |
|
|
760 | (9) |
|
Access Control Using Groups and User AD Attributes |
|
|
765 | (1) |
|
Securing Data by Machine Attributes |
|
|
766 | (1) |
|
Centrally Control Permissions Using Templates |
|
|
767 | (2) |
|
Using Effective Permissions to Troubleshoot Access Control |
|
|
769 | (1) |
|
Automatic File Classification |
|
|
769 | (1) |
|
DAC Players: User, Device, Resources, and Claims |
|
|
769 | (2) |
|
|
769 | (1) |
|
|
770 | (1) |
|
|
770 | (1) |
|
|
770 | (1) |
|
|
771 | (28) |
|
Pieces of an Access Policy |
|
|
774 | (4) |
|
|
778 | (18) |
|
|
796 | (3) |
|
Claims---Using Different Attributes |
|
|
799 | (5) |
|
|
800 | (2) |
|
Step 2 Create the Resource Property |
|
|
802 | (1) |
|
Step 3 Add to the Resource Property List |
|
|
802 | (1) |
|
Step 4 Create Central Access Rules |
|
|
802 | (1) |
|
Step 5 Create a Central Access Policy and Deploy It via Group Policy |
|
|
803 | (1) |
|
Step 6 Apply the Policy to the Engineering Folder |
|
|
803 | (1) |
|
Step 7 Test with Effective Access |
|
|
803 | (1) |
|
|
804 | (20) |
|
|
804 | (2) |
|
Classification Properties |
|
|
806 | (1) |
|
|
807 | (6) |
|
|
813 | (5) |
|
Understanding Regular Expressions |
|
|
818 | (1) |
|
Securing Data Using DAC and File Classification |
|
|
819 | (5) |
|
|
824 | (3) |
|
Chapter 16 Sharing Printers on Windows Server 2012 R2 Networks |
|
|
827 | (56) |
|
|
827 | (5) |
|
|
828 | (1) |
|
|
829 | (3) |
|
Installing the Print and Document Services Role |
|
|
832 | (15) |
|
Adding the Print and Document Services Role |
|
|
832 | (2) |
|
Working in the Print Management Console |
|
|
834 | (11) |
|
Adding the Print Services Role to Server Core |
|
|
845 | (2) |
|
PowerShell Cmdlets Reference |
|
|
847 | (1) |
|
Deploying Printers to the Masses |
|
|
847 | (10) |
|
Adding a Printer to a Client Manually |
|
|
848 | (1) |
|
Adding a Printer Using Active Directory Search |
|
|
849 | (4) |
|
Deploying Printers via GPO |
|
|
853 | (3) |
|
Viewing Deployed Printers |
|
|
856 | (1) |
|
Adjusting Print Server Settings |
|
|
857 | (5) |
|
|
857 | (4) |
|
|
861 | (1) |
|
Managing Printer Properties |
|
|
862 | (14) |
|
Printer Properties Sharing Tab |
|
|
862 | (1) |
|
Printer Properties Ports Tab |
|
|
863 | (1) |
|
Printer Properties Security Tab |
|
|
864 | (6) |
|
Printer Properties Advanced Tab |
|
|
870 | (6) |
|
|
876 | (2) |
|
|
878 | (1) |
|
Troubleshooting Printer Problems |
|
|
879 | (3) |
|
Basic Troubleshooting: Identifying the Situation |
|
|
879 | (2) |
|
Restarting the Spooler Service |
|
|
881 | (1) |
|
Isolating Printer Drivers |
|
|
881 | (1) |
|
|
882 | (1) |
|
Chapter 17 Remote Server Administration |
|
|
883 | (46) |
|
Remote Desktop for Administration |
|
|
883 | (36) |
|
Configuring the Server for Remote Desktop |
|
|
884 | (2) |
|
Using Remote Desktop Connection |
|
|
886 | (20) |
|
|
906 | (11) |
|
Configuring a Server for Remote Assistance |
|
|
917 | (2) |
|
Windows Remote Management Service |
|
|
919 | (3) |
|
|
920 | (1) |
|
|
921 | (1) |
|
Remote Server Administration Tools |
|
|
922 | (4) |
|
RSAT Compatibility Issues |
|
|
923 | (1) |
|
|
923 | (1) |
|
|
924 | (1) |
|
Remote Desktop and PowerShell |
|
|
925 | (1) |
|
|
926 | (3) |
|
Chapter 18 Connecting Windows and Mac Clients |
|
|
929 | (50) |
|
What to Know Before You Begin |
|
|
929 | (3) |
|
Understanding Client-side Software Requirements |
|
|
930 | (1) |
|
Domain Accounts and Local Accounts |
|
|
931 | (1) |
|
Verifying Your Network Configuration |
|
|
932 | (11) |
|
Verifying Local Area Connection Settings |
|
|
933 | (2) |
|
Testing Network Connectivity with the ping Command |
|
|
935 | (1) |
|
Verifying and Setting Local Area Connection Information Using the GUI |
|
|
935 | (7) |
|
|
942 | (1) |
|
Joining a Domain from Windows 8 |
|
|
943 | (8) |
|
Joining a Domain with PowerShell |
|
|
950 | (1) |
|
Changing Domain User Passwords |
|
|
951 | (18) |
|
Changing Domain Passwords from Windows 8 and Windows 7 |
|
|
952 | (3) |
|
Connecting to Network Resources |
|
|
955 | (1) |
|
Publishing Resources with Group Policy Objects |
|
|
956 | (13) |
|
Connecting Mac OS X Clients |
|
|
969 | (8) |
|
Connecting a Mac to the Domain |
|
|
971 | (2) |
|
Connecting to File Shares |
|
|
973 | (1) |
|
|
974 | (1) |
|
Using Remote Desktop from a Mac Client |
|
|
974 | (2) |
|
|
976 | (1) |
|
|
977 | (2) |
|
Chapter 19 Web Server Management with IIS |
|
|
979 | (46) |
|
What's New in IIS 8.0 and 8.5 |
|
|
979 | (2) |
|
|
981 | (10) |
|
Adding the Web Server Role via Service Manager |
|
|
981 | (4) |
|
Installing IIS 8 via PowerShell |
|
|
985 | (1) |
|
Renovating IIS Construction |
|
|
986 | (1) |
|
Adding Role Services to the Web Server Role for Bigfirm |
|
|
986 | (5) |
|
|
991 | (11) |
|
Understanding Global Settings |
|
|
992 | (1) |
|
Planning Bigfirm's Apples and Oranges Websites |
|
|
992 | (2) |
|
Creating a Simple Website |
|
|
994 | (1) |
|
Constructing Bigfirm's Websites |
|
|
995 | (6) |
|
Configuring Site Settings |
|
|
1001 | (1) |
|
Hosting Multiple Websites |
|
|
1002 | (6) |
|
|
1003 | (2) |
|
|
1005 | (1) |
|
Setting Up an Anonymous Account |
|
|
1005 | (1) |
|
Managing Multiple Sites for Bigfirm |
|
|
1006 | (1) |
|
Delegating Administration |
|
|
1007 | (1) |
|
Installing and Configuring SMTP |
|
|
1008 | (5) |
|
|
1008 | (1) |
|
Adding the SMTP Server Feature |
|
|
1009 | (1) |
|
Setting Up an SMTP Server |
|
|
1010 | (2) |
|
Adding the SMTP E-mail Feature to an IIS 8 Website |
|
|
1012 | (1) |
|
Integrating FTP into IIS 8 Web Pages |
|
|
1013 | (3) |
|
The FTP File Transfer Publishing Service |
|
|
1014 | (1) |
|
Adding FTP to an IIS 8 Website |
|
|
1014 | (2) |
|
|
1016 | (8) |
|
Using Web Management Services |
|
|
1017 | (2) |
|
Connecting, Securing, Logging |
|
|
1019 | (4) |
|
Backing Up and Restoring Data |
|
|
1023 | (1) |
|
|
1024 | (1) |
|
Chapter 20 Advanced IP: Routing with Windows |
|
|
1025 | (40) |
|
|
1025 | (9) |
|
First, the Simple Case: No Routing Required |
|
|
1027 | (3) |
|
Now the Hard Case: With Routing |
|
|
1030 | (4) |
|
From Classes to Classless |
|
|
1034 | (8) |
|
In the Beginning Was the Class |
|
|
1034 | (1) |
|
|
1035 | (1) |
|
Broadcast Gets Narrower: The First Unroutable Addresses |
|
|
1035 | (1) |
|
Routing the Unroutable, Part I: Private Addresses |
|
|
1036 | (6) |
|
Sockets, Ports, and Winsock |
|
|
1042 | (15) |
|
Winsock: Why We Can All Use the Internet |
|
|
1045 | (1) |
|
Routing the Unroutable, Part II: NAPT and PAT |
|
|
1045 | (2) |
|
Routing the Unroutable, Part III: Application Layer Gateways |
|
|
1047 | (1) |
|
|
1047 | (10) |
|
Testing and Troubleshooting |
|
|
1057 | (5) |
|
Using the Application Itself |
|
|
1057 | (1) |
|
Pinging a Remote Computer with ping |
|
|
1058 | (1) |
|
Pinging a Remote Computer with traceroute |
|
|
1059 | (1) |
|
Checking Your Configuration with ipconfig |
|
|
1060 | (1) |
|
Showing Routing and Neighbors |
|
|
1060 | (1) |
|
|
1060 | (1) |
|
Which Card Do You Monitor? |
|
|
1061 | (1) |
|
|
1062 | (3) |
|
Chapter 21 Getting from the Office to the Road: VPNs |
|
|
1065 | (58) |
|
|
1065 | (2) |
|
|
1066 | (1) |
|
Understanding the Tunneling Protocols |
|
|
1067 | (1) |
|
Layer 2 Tunneling Protocol |
|
|
1067 | (1) |
|
Secure Socket Tunneling Protocol |
|
|
1067 | (1) |
|
Internet Key Exchange Version 2 |
|
|
1068 | (1) |
|
Using the Network Policy and Access Services Role |
|
|
1068 | (2) |
|
Installing the Network Policy and Access Services Role |
|
|
1069 | (1) |
|
Using the Remote Access Role |
|
|
1070 | (40) |
|
Installing the Remote Access Role |
|
|
1071 | (1) |
|
Configuring Routing and Remote Access |
|
|
1072 | (2) |
|
|
1074 | (23) |
|
Authenticating VPN Clients |
|
|
1097 | (3) |
|
|
1100 | (2) |
|
Exploring Routing and Remote Access |
|
|
1102 | (8) |
|
|
1110 | (2) |
|
|
1110 | (2) |
|
DirectAccess Requirements |
|
|
1112 | (1) |
|
|
1112 | (8) |
|
Configuring a DirectAccess Client |
|
|
1118 | (2) |
|
|
1120 | (1) |
|
|
1121 | (2) |
|
Chapter 22 Adding More Locations: Sites in Active Directory |
|
|
1123 | (30) |
|
|
1123 | (5) |
|
|
1125 | (1) |
|
Understanding Site Terminology |
|
|
1126 | (2) |
|
|
1128 | (13) |
|
|
1128 | (2) |
|
Renaming Default-First-Site-Name |
|
|
1130 | (1) |
|
|
1130 | (1) |
|
Deciding on DCs in Remote Locations |
|
|
1131 | (4) |
|
Defining a Subnet and Placing It in a Site |
|
|
1135 | (2) |
|
Placing a Server in a Site |
|
|
1137 | (1) |
|
|
1137 | (4) |
|
Configuring Intersite Replication |
|
|
1141 | (5) |
|
|
1144 | (1) |
|
|
1145 | (1) |
|
Configuring Clients to Access the Next Closest Site |
|
|
1146 | (4) |
|
Configuring Next Closest Site with Group Policy |
|
|
1147 | (1) |
|
Configuring Next Closest Site through the Registry |
|
|
1148 | (2) |
|
|
1150 | (2) |
|
|
1152 | (1) |
|
Chapter 23 The Third DC: Understanding Read-only Domain Controllers |
|
|
1153 | (32) |
|
|
1153 | (15) |
|
Making Changes on a Read-only Domain Controller |
|
|
1155 | (1) |
|
|
1156 | (5) |
|
|
1161 | (6) |
|
RODC and Server Applications |
|
|
1167 | (1) |
|
|
1168 | (14) |
|
Installing RODC on Server Core |
|
|
1174 | (1) |
|
Viewing the RODC Properties |
|
|
1174 | (2) |
|
Modifying the Allowed List |
|
|
1176 | (1) |
|
|
1177 | (5) |
|
|
1182 | (2) |
|
Active Directory Integrated DNS |
|
|
1183 | (1) |
|
|
1183 | (1) |
|
|
1184 | (1) |
|
Chapter 24 Creating Larger Active Directory Environments: Beyond One Domain |
|
|
1185 | (58) |
|
The Foundations of Multiple-Domain Designs |
|
|
1185 | (6) |
|
|
1186 | (2) |
|
|
1188 | (1) |
|
|
1188 | (2) |
|
You Must Build Trees and Forests Together |
|
|
1190 | (1) |
|
Planning Your Active Directory Environment |
|
|
1191 | (7) |
|
Satisfying Political Needs |
|
|
1192 | (1) |
|
Connectivity and Replication Issues |
|
|
1192 | (1) |
|
Multiple Domains: When They Make Sense |
|
|
1193 | (1) |
|
The Case for an Empty Root |
|
|
1194 | (2) |
|
Active Directory Design Pointers |
|
|
1196 | (2) |
|
Creating Multiple Domains |
|
|
1198 | (7) |
|
Naming Multidomain Structures |
|
|
1198 | (1) |
|
Preparing the DC for the Second Domain |
|
|
1199 | (1) |
|
|
1200 | (5) |
|
|
1205 | (4) |
|
|
1205 | (2) |
|
|
1207 | (2) |
|
|
1209 | (17) |
|
Multimaster vs. Single-Master Replication |
|
|
1209 | (1) |
|
But Not Everything Is Multimaster |
|
|
1209 | (1) |
|
Domain Naming: A FSMO Example |
|
|
1210 | (1) |
|
Why Administrators Must Know about FSMOs |
|
|
1210 | (1) |
|
|
1211 | (2) |
|
|
1213 | (1) |
|
|
1213 | (4) |
|
Domain Naming Master FSMO |
|
|
1217 | (1) |
|
|
1217 | (1) |
|
Infrastructure Operations Master |
|
|
1218 | (1) |
|
|
1219 | (1) |
|
|
1219 | (4) |
|
|
1223 | (3) |
|
|
1226 | (14) |
|
Defining the Domain: "Trust" |
|
|
1226 | (1) |
|
Trust Relationships in More Detail |
|
|
1227 | (1) |
|
|
1227 | (1) |
|
Some Trusts Are Transitive |
|
|
1228 | (1) |
|
Trusts Do Not Remove All Security |
|
|
1228 | (1) |
|
Trusts Involve Administrators from Both Sides |
|
|
1229 | (1) |
|
|
1229 | (1) |
|
Understanding Transitive Forest Trusts |
|
|
1230 | (1) |
|
|
1230 | (10) |
|
|
1240 | (3) |
|
Chapter 25 Migrating, Merging, and Modifying Your Active Directory |
|
|
1243 | (24) |
|
Upgrade and Migration Strategies |
|
|
1243 | (19) |
|
|
1244 | (1) |
|
Migrating with an In-place Upgrade |
|
|
1245 | (10) |
|
Swing Migrations from Windows Server 2003 |
|
|
1255 | (3) |
|
Active Directory Domain Migration |
|
|
1258 | (4) |
|
Using Microsoft's Free Migration Tool: ADMT |
|
|
1262 | (3) |
|
|
1262 | (1) |
|
|
1263 | (1) |
|
Getting Both Sides ADMT-friendly |
|
|
1264 | (1) |
|
|
1265 | (2) |
|
Chapter 26 Advanced User Account Management and User Support |
|
|
1267 | (72) |
|
Experiencing the Flexible Desktop |
|
|
1268 | (1) |
|
Configuring Home Directories |
|
|
1269 | (11) |
|
|
1270 | (1) |
|
Creating the Home Directories |
|
|
1270 | (7) |
|
Creating Home Directories |
|
|
1277 | (3) |
|
Home Directory vs. Local Storage |
|
|
1280 | (1) |
|
Creating Roaming Profiles |
|
|
1280 | (20) |
|
Creating a Roaming Profiles Share: The Easy Way |
|
|
1282 | (8) |
|
Creating a Roaming Profiles Share: The Hard Way |
|
|
1290 | (3) |
|
Configuring Mandatory Profiles |
|
|
1293 | (6) |
|
Configuring Super Mandatory Profiles |
|
|
1299 | (1) |
|
Configuring a Default Network Profile |
|
|
1299 | (1) |
|
Managing Roaming Profiles |
|
|
1300 | (6) |
|
|
1301 | (5) |
|
|
1306 | (1) |
|
|
1306 | (13) |
|
|
1308 | (6) |
|
Advanced Folder Redirection |
|
|
1314 | (2) |
|
Managing Folder Redirection |
|
|
1316 | (3) |
|
|
1319 | (4) |
|
|
1319 | (1) |
|
|
1319 | (3) |
|
|
1322 | (1) |
|
Managing the Desktop Using Group Policy |
|
|
1323 | (5) |
|
Managing Users with Group Policy Preferences and Logon Scripts |
|
|
1328 | (9) |
|
|
1328 | (3) |
|
Executing Commands at Logon |
|
|
1331 | (3) |
|
|
1334 | (1) |
|
Managing Logon Scripts with Group Policy |
|
|
1335 | (1) |
|
Managing Shutdown Tasks with Logoff Scripts |
|
|
1336 | (1) |
|
|
1337 | (2) |
|
Chapter 27 Server Virtualization with Hyper-V |
|
|
1339 | (60) |
|
Understanding Server Virtualization |
|
|
1339 | (6) |
|
What Use Is Server Virtualization? |
|
|
1341 | (2) |
|
Getting Started with Hyper-V |
|
|
1343 | (2) |
|
What's New in Hyper-V 2012 R2? |
|
|
1345 | (7) |
|
Understanding the Hyper-V Architecture |
|
|
1352 | (7) |
|
The Management OS Partition |
|
|
1354 | (3) |
|
Virtual Machine (Guest) Partitions |
|
|
1357 | (2) |
|
Installing and Configuring Hyper-V |
|
|
1359 | (7) |
|
|
1363 | (1) |
|
Exploring the Actions Pane |
|
|
1364 | (2) |
|
Understanding Virtual Disks |
|
|
1366 | (8) |
|
Virtual Disks and Their Controllers |
|
|
1367 | (1) |
|
Creating a New Virtual Disk |
|
|
1368 | (3) |
|
|
1371 | (3) |
|
Understanding Virtual Switches |
|
|
1374 | (3) |
|
Choosing a Virtual Switch |
|
|
1374 | (1) |
|
Creating a Virtual Switch |
|
|
1375 | (2) |
|
Getting Started with Virtual Machines |
|
|
1377 | (19) |
|
Installing a Virtual Machine |
|
|
1388 | (4) |
|
|
1392 | (1) |
|
Time Travel with Checkpoints |
|
|
1393 | (3) |
|
|
1396 | (3) |
|
Chapter 28 Managing Virtual Machines |
|
|
1399 | (36) |
|
Domain Controllers and Hyper-V |
|
|
1399 | (8) |
|
Virtual DCs That Just Work |
|
|
1400 | (2) |
|
Quick Domain Controller Deployment |
|
|
1402 | (5) |
|
Moving VMs: Export and Import |
|
|
1407 | (11) |
|
Quick Migration and Live Migration |
|
|
1411 | (3) |
|
Cluster-free Live Migrations |
|
|
1414 | (4) |
|
|
1418 | (4) |
|
Backing Up and Restoring Virtual Machines |
|
|
1418 | (3) |
|
Malware Protection and Patching |
|
|
1421 | (1) |
|
|
1422 | (9) |
|
Cheap DR with Hyper-V Replica |
|
|
1423 | (8) |
|
Online Resources for Hyper-V |
|
|
1431 | (1) |
|
|
1432 | (3) |
|
Chapter 29 Installing, Using, and Administering Remote Desktop Services |
|
|
1435 | (44) |
|
Who Needs Remote Desktop Services? |
|
|
1435 | (5) |
|
Centralized Deployment of Applications |
|
|
1436 | (1) |
|
|
1436 | (1) |
|
Supporting PC-Unfriendly Environments |
|
|
1436 | (1) |
|
Reducing Hardware Refreshes |
|
|
1437 | (1) |
|
Simplifying the User Interface |
|
|
1438 | (1) |
|
Providing Help-Desk Support |
|
|
1439 | (1) |
|
|
1439 | (1) |
|
Understanding the Remote Desktop Services Processing Model |
|
|
1440 | (4) |
|
|
1440 | (1) |
|
Anatomy of a Thin-Client Session |
|
|
1441 | (3) |
|
Server and Client Requirements |
|
|
1444 | (5) |
|
|
1444 | (3) |
|
|
1447 | (2) |
|
Adding Remote Desktop Services |
|
|
1449 | (15) |
|
|
1450 | (2) |
|
|
1452 | (1) |
|
|
1452 | (1) |
|
Network Level Authentication |
|
|
1453 | (1) |
|
|
1453 | (1) |
|
Remote Desktop Users Group |
|
|
1454 | (1) |
|
Adding the Remote Desktop Services Role |
|
|
1454 | (4) |
|
|
1458 | (1) |
|
Connecting to an RDS Session |
|
|
1459 | (1) |
|
Adding an RDS RemoteApp Application |
|
|
1460 | (4) |
|
Virtual Desktop Infrastructure |
|
|
1464 | (8) |
|
Monitoring Remote Desktop Services |
|
|
1472 | (5) |
|
Common Tasks and How to Do Them |
|
|
1473 | (2) |
|
Remote Desktop Licensing Manager |
|
|
1475 | (2) |
|
|
1477 | (2) |
|
Chapter 30 Monitoring Windows Server 2012 R2 |
|
|
1479 | (52) |
|
Using Server Manager to Monitor Multiple Servers |
|
|
1479 | (4) |
|
|
1480 | (1) |
|
Creating a Server Group for Monitoring |
|
|
1481 | (1) |
|
Monitoring with Server Groups |
|
|
1481 | (2) |
|
Utilizing the Best Practice Analyzers |
|
|
1483 | (2) |
|
Monitoring Your System with Event Viewer |
|
|
1485 | (10) |
|
|
1485 | (1) |
|
Understanding Event Levels |
|
|
1486 | (1) |
|
Creating and Using Custom Views |
|
|
1487 | (5) |
|
Understanding Windows Logs |
|
|
1492 | (1) |
|
Understanding Applications and Services Logs |
|
|
1493 | (1) |
|
Configuring Event Log Properties |
|
|
1493 | (2) |
|
Subscribing to Event Logs |
|
|
1495 | (10) |
|
Understanding Subscription Types |
|
|
1496 | (2) |
|
|
1498 | (1) |
|
|
1499 | (1) |
|
Understanding Event Subscription Protocols |
|
|
1500 | (1) |
|
Configuring Event Subscriptions |
|
|
1501 | (4) |
|
Troubleshooting Event Forwarding |
|
|
1505 | (2) |
|
Checking the Runtime Status |
|
|
1505 | (1) |
|
Using the Windows Event Collector Utility |
|
|
1505 | (2) |
|
|
1507 | (12) |
|
|
1508 | (2) |
|
Using Data Collector Sets |
|
|
1510 | (9) |
|
|
1519 | (4) |
|
|
1519 | (4) |
|
|
1523 | (1) |
|
Advanced Monitoring with System Center 2012 R2 |
|
|
1523 | (5) |
|
Introduction to Operations Manager |
|
|
1524 | (4) |
|
|
1528 | (3) |
|
Chapter 31 Patch Management |
|
|
1531 | (24) |
|
What's New in Windows Server 2012 R2 Windows Server Update Services |
|
|
1531 | (5) |
|
New Features of WSUS v6 in Windows Server 2012 R2 |
|
|
1532 | (1) |
|
Software Requirements for WSUS Servers and Clients |
|
|
1532 | (1) |
|
|
1533 | (2) |
|
Complex Hierarchies with WSUS |
|
|
1535 | (1) |
|
Installation and Configuration of Patch Management |
|
|
1536 | (8) |
|
Installing the WSUS Role on Windows Server 2012 R2 |
|
|
1536 | (4) |
|
Configuring WSUS for Deployments |
|
|
1540 | (4) |
|
Deploying Updates and Migration for Windows Server Update Services |
|
|
1544 | (10) |
|
Configuring Group Policies for Windows Update |
|
|
1544 | (3) |
|
Configuring Clients for Windows Updates |
|
|
1547 | (3) |
|
Migration from WSUS 3.0 to Windows Server 2012 R2 |
|
|
1550 | (1) |
|
Backing Up Your WSUS Database |
|
|
1550 | (1) |
|
Review Additional Considerations |
|
|
1551 | (1) |
|
Operational Management and Tools |
|
|
1551 | (3) |
|
|
1554 | (1) |
|
Chapter 32 Windows Server 2012 R2 and Active Directory Backup and Maintenance |
|
|
1555 | (30) |
|
Introducing Windows Server Backup |
|
|
1555 | (15) |
|
Installing Windows Server Backup |
|
|
1556 | (1) |
|
Backing Up and Restoring a Full Server |
|
|
1557 | (9) |
|
Backing Up and Restoring Files and Folders |
|
|
1566 | (3) |
|
|
1569 | (1) |
|
Stopping and Restarting Active Directory |
|
|
1570 | (3) |
|
Stopping and Starting AD DS |
|
|
1570 | (1) |
|
Defragmenting Active Directory Offline |
|
|
1570 | (1) |
|
Checking the Integrity of an Active Directory Database |
|
|
1571 | (2) |
|
Capturing Active Directory Snapshots |
|
|
1573 | (3) |
|
Creating an Active Directory Snapshot |
|
|
1573 | (1) |
|
Mounting an Active Directory Snapshot |
|
|
1574 | (1) |
|
Working with Mounted Active Directory Snapshots |
|
|
1574 | (2) |
|
Backing Up and Restoring Active Directory |
|
|
1576 | (9) |
|
Introducing the Active Directory Recycle Bin |
|
|
1577 | (2) |
|
Creating an Active Directory Backup |
|
|
1579 | (1) |
|
Restoring an Active Directory Backup |
|
|
1580 | (2) |
|
Performing an Authoritative Restore |
|
|
1582 | (1) |
|
|
1583 | (2) |
|
|
1585 | (46) |
|
Chapter 2 Installing and Upgrading to Windows Server 2012 |
|
|
1585 | (1) |
|
Chapter 3 Introduction to Server Core |
|
|
1586 | (1) |
|
Chapter 4 Windows Server 2012 R2 Networking Enhancements |
|
|
1587 | (2) |
|
Chapter 5 IP Address Management and DHCP Failover |
|
|
1589 | (2) |
|
Chapter 6 DNS and Name Resolution in Windows Server 2012 R2 |
|
|
1591 | (1) |
|
Chapter 7 Active Directory in Windows Server 2012 |
|
|
1592 | (1) |
|
Chapter 8 Creating and Managing User Accounts |
|
|
1593 | (4) |
|
Chapter 9 Group Policy: AD's Gauntlet and Active Directory Delegation |
|
|
1597 | (2) |
|
Chapter 10 Active Directory Federation Services |
|
|
1599 | (1) |
|
Chapter 11 Shared Storage and Clustering Introduction |
|
|
1600 | (1) |
|
Chapter 12 Windows 2012 R2 Storage: Storage Spaces, SA Nish Abilities, and Better Tools |
|
|
1600 | (2) |
|
Chapter 13 Files, Folders, and Basic Shares |
|
|
1602 | (1) |
|
Chapter 14 Creating and Managing Shared Folders |
|
|
1603 | (2) |
|
Chapter 15 Dynamic Access Control: File Shares, Reimagined |
|
|
1605 | (1) |
|
Chapter 16 Sharing Printers on Windows Server 2012 R2 Networks |
|
|
1606 | (1) |
|
Chapter 17 Remote Server Administration |
|
|
1607 | (1) |
|
Chapter 18 Connecting Windows and Mac Clients |
|
|
1608 | (3) |
|
Chapter 19 Web Server Management with IIS |
|
|
1611 | (1) |
|
Chapter 20 Advanced IP: Routing with Windows |
|
|
1612 | (2) |
|
Chapter 21 Getting from the Office to the Road: VPNs |
|
|
1614 | (1) |
|
Chapter 22 Adding More Locations: Sites in Active Directory |
|
|
1614 | (2) |
|
Chapter 23 The Third DC: Understanding Read-Only Domain Controllers |
|
|
1616 | (1) |
|
Chapter 24 Creating Larger Active Directory Environments: Beyond One Domain |
|
|
1617 | (2) |
|
Chapter 25 Migrating, Merging, and Modifying Your Active Directory |
|
|
1619 | (1) |
|
Chapter 26 Advanced User Account Management and User Support |
|
|
1620 | (1) |
|
Chapter 27 Server Virtualization with Hyper-V |
|
|
1621 | (2) |
|
Chapter 28 Managing Virtual Machines |
|
|
1623 | (1) |
|
Chapter 29 Installing, Using, and Administering Remote Desktop Services |
|
|
1624 | (1) |
|
Chapter 30 Monitoring Windows Server 2012 R2 |
|
|
1625 | (2) |
|
Chapter 31 Patch Management |
|
|
1627 | (1) |
|
Chapter 32 Windows Server 2012 R2 and Active Directory Backup and Maintenance |
|
|
1628 | (3) |
Index |
|
1631 | |