Introduction |
|
xxiii | |
Assessment Test |
|
xxxv | |
Chapter 1 Install Windows Server 2012 R2 |
|
1 | (54) |
|
Features and Advantages of Windows Server 2012 and Server 2012 R2 |
|
|
2 | (3) |
|
Planning the Windows Server 2012 R2 Installation |
|
|
5 | (23) |
|
Server Roles in Windows Server 2012 R2 |
|
|
5 | (3) |
|
Migrating Roles and Features to Windows Server 2012 R2 |
|
|
8 | (2) |
|
Roles and Features That Have Been Reduced in Windows Server 2012 R2 |
|
|
10 | (4) |
|
Deciding Which Windows Server 2012 R2 Versions to Use |
|
|
14 | (1) |
|
Deciding on the Type of Installation |
|
|
15 | (4) |
|
|
19 | (1) |
|
Installing Windows Server 2012 R2 |
|
|
20 | (4) |
|
Using Windows Deployment Services |
|
|
24 | (4) |
|
Understanding Features On Demand |
|
|
28 | (1) |
|
Storage in Windows Server 2012 R2 |
|
|
29 | (21) |
|
|
29 | (1) |
|
Configuring Basic and Dynamic Disks |
|
|
30 | (2) |
|
|
32 | (1) |
|
Storage Spaces in Windows Server 2012 R2 |
|
|
33 | (1) |
|
Redundant Array of Independent Disks |
|
|
34 | (4) |
|
|
38 | (1) |
|
|
39 | (2) |
|
|
41 | (3) |
|
Internet Storage Name Service |
|
|
44 | (3) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (2) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (3) |
Chapter 2 Configure Network Services |
|
55 | (108) |
|
|
56 | (13) |
|
The Form of an IP Address |
|
|
57 | (5) |
|
Understanding Servers, Clients, and Resolvers |
|
|
62 | (1) |
|
Understanding the DNS Process |
|
|
63 | (6) |
|
Introducing DNS Database Zones |
|
|
69 | (9) |
|
Understanding Primary Zones |
|
|
70 | (1) |
|
Understanding Secondary Zones |
|
|
71 | (1) |
|
Understanding Active Directory Integrated DNS |
|
|
72 | (1) |
|
|
73 | (2) |
|
|
75 | (1) |
|
Zone Transfers and Replication |
|
|
75 | (3) |
|
Advantages of DNS in Windows Server 2012 R2 |
|
|
78 | (6) |
|
|
79 | (1) |
|
Support for IPv6 Addresses |
|
|
79 | (1) |
|
Support for Read-Only Domain Controllers |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Windows PowerShell Support |
|
|
83 | (1) |
|
Introducing DNS Record Types |
|
|
84 | (5) |
|
Start of Authority Records |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (13) |
|
|
89 | (3) |
|
Load Balancing with Round Robin |
|
|
92 | (1) |
|
Configuring a Caching-Only Server |
|
|
92 | (1) |
|
|
93 | (3) |
|
Configuring Zones for Dynamic Updates |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
99 | (1) |
|
Manually Creating DNS Records |
|
|
100 | (1) |
|
|
101 | (1) |
|
Monitoring and Troubleshooting DNS |
|
|
102 | (12) |
|
Monitoring DNS with the DNS Snap-In |
|
|
103 | (2) |
|
|
105 | (9) |
|
|
114 | (6) |
|
Introducing the DORA Process |
|
|
114 | (2) |
|
Advantages and Disadvantages of DHCP |
|
|
116 | (1) |
|
|
117 | (1) |
|
Understanding Scope Details |
|
|
118 | (2) |
|
Installing and Authorizing DHCP |
|
|
120 | (6) |
|
|
120 | (3) |
|
Introducing the DHCP Snap-In |
|
|
123 | (1) |
|
Authorizing DHCP for Active Directory |
|
|
124 | (2) |
|
Creating and Managing DHCP Scopes |
|
|
126 | (30) |
|
Creating a New Scope in IPv4 |
|
|
127 | (7) |
|
Creating a New Scope in IPv6 |
|
|
134 | (2) |
|
Changing Scope Properties (IPv4 and IPv6) |
|
|
136 | (2) |
|
Changing Server Properties |
|
|
138 | (3) |
|
Managing Reservations and Exclusions |
|
|
141 | (3) |
|
Setting Scope Options for IPv4 |
|
|
144 | (3) |
|
Activating and Deactivating Scopes |
|
|
147 | (1) |
|
Creating a Superscope for IPv4 |
|
|
147 | (2) |
|
Creating IPv4 Multicast Scopes |
|
|
149 | (2) |
|
Integrating Dynamic DNS and IPv4 DHCP |
|
|
151 | (2) |
|
Using Multiple DHCP Servers |
|
|
153 | (1) |
|
Working with the DHCP Database Files |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (2) |
|
|
159 | (4) |
Chapter 3 Plan and Install Active Directory |
|
163 | (42) |
|
Verifying the File system |
|
|
164 | (5) |
|
Resilient File System (ReFS) |
|
|
165 | (1) |
|
|
166 | (3) |
|
Verifying Network Connectivity |
|
|
169 | (3) |
|
|
169 | (1) |
|
Tools and Techniques for Testing Network Configuration |
|
|
170 | (2) |
|
Understanding Domain and Forest Functionality |
|
|
172 | (4) |
|
About the Domain Functional Level |
|
|
172 | (2) |
|
About Forest Functionality |
|
|
174 | (2) |
|
Planning the Domain Structure |
|
|
176 | (1) |
|
Installing Active Directory |
|
|
177 | (11) |
|
|
177 | (1) |
|
Active Directory Prerequisites |
|
|
177 | (1) |
|
|
178 | (9) |
|
Deploying Active Directory IaaS in Windows Azure |
|
|
187 | (1) |
|
Verifying Active Directory Installation |
|
|
188 | (5) |
|
|
188 | (2) |
|
Using Active Directory Administrative Tools |
|
|
190 | (1) |
|
|
191 | (2) |
|
Creating and Configuring Application Data Partitions |
|
|
193 | (6) |
|
Creating Application Data Partitions |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
196 | (1) |
|
Using ntdsutil to Manage Application Data Partitions |
|
|
196 | (3) |
|
Configuring DNS Integration with Active Directory |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (3) |
Chapter 4 Configure Windows Server 2012 R2 |
|
205 | (40) |
|
Understanding File Servers |
|
|
206 | (1) |
|
|
207 | (15) |
|
|
207 | (1) |
|
Making Active Directory Objects Available to Users |
|
|
208 | (2) |
|
|
210 | (1) |
|
Configuring Offline Files |
|
|
210 | (3) |
|
Volume Shadow Copy Services |
|
|
213 | (3) |
|
|
216 | (6) |
|
|
222 | (2) |
|
Configuring Print Services |
|
|
224 | (7) |
|
Creating and Publishing Printers |
|
|
224 | (2) |
|
|
226 | (4) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
Configuring Remote Management |
|
|
231 | (8) |
|
Windows Remote Management |
|
|
232 | (1) |
|
|
233 | (3) |
|
Configuring Down-Level Servers |
|
|
236 | (1) |
|
|
237 | (2) |
|
|
239 | (1) |
|
|
240 | (2) |
|
|
242 | (3) |
Chapter 5 Administer Active Directory |
|
245 | (50) |
|
|
246 | (2) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Planning the OU Structure |
|
|
248 | (5) |
|
Logical Grouping of Resources |
|
|
248 | (2) |
|
Understanding OU Inheritance |
|
|
250 | (1) |
|
Delegating Administrative Control |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
253 | (4) |
|
|
257 | (8) |
|
Moving, Deleting, and Renaming OUs |
|
|
258 | (1) |
|
Administering Properties of OUs |
|
|
259 | (2) |
|
Delegating Control of OUs |
|
|
261 | (4) |
|
|
265 | (1) |
|
Creating and Managing Active Directory Objects |
|
|
266 | (16) |
|
Overview of Active Directory Objects |
|
|
266 | (7) |
|
Managing Object Properties |
|
|
273 | (4) |
|
|
277 | (1) |
|
Filtering and Advanced Active Directory Features |
|
|
278 | (2) |
|
Moving, Renaming, and Deleting Active Directory Objects |
|
|
280 | (1) |
|
Resetting an Existing Computer Account |
|
|
281 | (1) |
|
Publishing Active Directory Objects |
|
|
282 | (6) |
|
Making Active Directory Objects Available to Users |
|
|
282 | (1) |
|
|
282 | (2) |
|
Publishing Shared Folders |
|
|
284 | (1) |
|
Querying Active Directory |
|
|
285 | (2) |
|
Using the Active Directory Administrative Center |
|
|
287 | (1) |
|
Using the Command Prompt for Active Directory Configuration |
|
|
288 | (2) |
|
|
290 | (1) |
|
|
290 | (2) |
|
|
292 | (3) |
Chapter 6 Manage GPOs |
|
295 | (60) |
|
|
296 | (6) |
|
Understanding Group Policy Settings |
|
|
297 | (2) |
|
The Security Settings Section of the GPO |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
Planning a Group Policy Strategy |
|
|
302 | (1) |
|
Implementing Group Policy |
|
|
303 | (4) |
|
|
303 | (4) |
|
Linking Existing GPOs to Active Directory |
|
|
307 | (1) |
|
|
307 | (15) |
|
|
308 | (1) |
|
Security Filtering of a Group Policy |
|
|
309 | (2) |
|
Delegating Administrative Control of GPOs |
|
|
311 | (2) |
|
Controlling Inheritance and Filtering Group Policy |
|
|
313 | (1) |
|
Assigning Script Policies |
|
|
314 | (2) |
|
Understanding the Loopback Policy |
|
|
316 | (1) |
|
Managing Network Configuration |
|
|
316 | (1) |
|
Automatically Enrolling User and Computer Certificates in Group Policy |
|
|
317 | (3) |
|
|
320 | (2) |
|
Managing GPOs with Windows PowerShell Group Policy Cmdlets |
|
|
322 | (1) |
|
Deploying Software Through a GPO |
|
|
322 | (7) |
|
The Software Management Life Cycle |
|
|
323 | (1) |
|
|
324 | (4) |
|
|
328 | (1) |
|
Implementing Software Deployment |
|
|
329 | (7) |
|
Preparing for Software Deployment |
|
|
330 | (1) |
|
Software Restriction Policies |
|
|
331 | (1) |
|
|
331 | (1) |
|
Group Policy Slow Link Detection |
|
|
331 | (1) |
|
Publishing and Assigning Applications |
|
|
332 | (1) |
|
Applying Software Updates |
|
|
333 | (1) |
|
Verifying Software Installation |
|
|
334 | (1) |
|
Configuring Automatic Updates in Group Policy |
|
|
335 | (1) |
|
Configuring Software Deployment Settings |
|
|
336 | (6) |
|
The Software Installation Properties Dialog Box |
|
|
336 | (3) |
|
|
339 | (1) |
|
Microsoft Windows Installer Settings |
|
|
340 | (2) |
|
Troubleshooting Group Policies |
|
|
342 | (6) |
|
|
343 | (2) |
|
|
345 | (2) |
|
Using the gpresuit. exe Command |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (2) |
|
|
351 | (4) |
Chapter 7 Manage Security |
|
355 | (32) |
|
|
356 | (15) |
|
Understanding Security Principals |
|
|
356 | (9) |
|
Managing Security and Permissions |
|
|
365 | (2) |
|
|
367 | (1) |
|
Configuring User Account Control |
|
|
368 | (1) |
|
Delegating Control of Users and Groups |
|
|
368 | (1) |
|
Understanding Dynamic Access Control |
|
|
369 | (1) |
|
Using Group Policy for Security |
|
|
370 | (1) |
|
Implementing an Audit Policy |
|
|
371 | (4) |
|
|
372 | (1) |
|
|
372 | (2) |
|
Using the Audi tool. exe Command |
|
|
374 | (1) |
|
Features of Windows Server 2012 R2 Auditing |
|
|
374 | (1) |
|
Configuring Windows Firewall Options |
|
|
375 | (8) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (3) |
Chapter 8 Configure TCP/IP |
|
387 | (50) |
|
|
388 | (3) |
|
Details of the TCP/IP Model |
|
|
388 | (1) |
|
How TCP/IP Layers Communicate |
|
|
389 | (1) |
|
Understanding Port Numbers |
|
|
389 | (2) |
|
Understanding IP Addressing |
|
|
391 | (5) |
|
The Hierarchical IP Addressing Scheme |
|
|
391 | (2) |
|
Understanding Network Classes |
|
|
393 | (3) |
|
|
396 | (24) |
|
|
398 | (6) |
|
An Easier Way to Apply Subnetting |
|
|
404 | (4) |
|
Applying Subnetting the Traditional Way |
|
|
408 | (8) |
|
Working with Classless Inter-Domain Routing |
|
|
416 | (3) |
|
|
419 | (1) |
|
|
420 | (12) |
|
|
420 | (1) |
|
New and Improved IPv6 Concepts |
|
|
421 | (2) |
|
|
423 | (5) |
|
IPv6 Integration/Migration |
|
|
428 | (4) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
434 | (3) |
Chapter 9 Use Virtualization in Windows Server 2012 |
|
437 | (34) |
|
|
438 | (7) |
|
|
438 | (1) |
|
|
439 | (4) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Hyper-V Installation and Configuration |
|
|
445 | (14) |
|
|
445 | (3) |
|
Hyper-V in Server Manager |
|
|
448 | (1) |
|
|
448 | (1) |
|
Configure Hyper-V Settings |
|
|
449 | (2) |
|
|
451 | (3) |
|
Managing Virtual Hard Disks |
|
|
454 | (5) |
|
Configuring Virtual Machines |
|
|
459 | (8) |
|
Creating and Managing Virtual Machines |
|
|
459 | (8) |
|
|
467 | (1) |
|
|
467 | (2) |
|
|
469 | (2) |
Appendix A Answers to Review Questions |
|
471 | (12) |
|
Chapter 1: Install Windows Server 2012 R2 |
|
|
472 | (1) |
|
Chapter 2: Configure Network Services |
|
|
473 | (1) |
|
Chapter 3: Plan and Install Active Directory |
|
|
474 | (1) |
|
Chapter 4: Configure Windows Server 2012 R2 |
|
|
475 | (1) |
|
Chapter 5: Administer Active Directory |
|
|
476 | (1) |
|
|
477 | (1) |
|
Chapter 7: Manage Security |
|
|
478 | (1) |
|
Chapter 8: Configure TCP/IP |
|
|
478 | (2) |
|
Chapter 9: Use Virtualization in Windows Server 2012 |
|
|
480 | (3) |
Appendix B About the Additional Study Tools |
|
483 | |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
485 | |
|
|
486 | |