| Acknowledgments |
|
xiii | |
| Foreword |
|
xv | |
| Introduction |
|
xvii | |
| What's New in Terminal Services in Windows Server 2008? |
|
xvii | |
| How This Book Is Structured |
|
xix | |
| Document Conventions |
|
xx | |
| Reader Aids |
|
xx | |
| Sidebars |
|
xxi | |
| Command-Line Examples |
|
xxi | |
| Companion Media |
|
xxi | |
| Links |
|
xxii | |
| Add-on Tools |
|
xxii | |
| Management Scripts |
|
xxii | |
| Resource Kit Support Policy |
|
xxii | |
|
Introducing Terminal Services in Windows Server 2008 |
|
|
1 | (40) |
|
Where Did Terminal Server Come From? |
|
|
2 | (2) |
|
What Can You Do with Terminal Services? |
|
|
4 | (4) |
|
Improve Security for Remote Users |
|
|
5 | (1) |
|
|
|
6 | (1) |
|
Bringing Windows to PC-Unfriendly Environments |
|
|
7 | (1) |
|
Supporting Green Computing |
|
|
8 | (1) |
|
Terminal Services for Windows Server 2008: The Big Picture |
|
|
8 | (18) |
|
The Changing Character of Terminal Server Usage |
|
|
8 | (4) |
|
Cool New Stuff for Terminal Services in Windows Server 2008 |
|
|
12 | (6) |
|
Terminal Services Roles in Windows Server 2008 |
|
|
18 | (8) |
|
Understanding the Windows Server 2008 TS Environment |
|
|
26 | (2) |
|
|
|
26 | (1) |
|
Authenticating Servers and Client Machines with Certificates |
|
|
27 | (1) |
|
Displaying RemoteApps for Terminal Services Web Access |
|
|
27 | (1) |
|
Updating User and Computer Settings |
|
|
28 | (1) |
|
New Functionality for Terminal Services Partners |
|
|
28 | (11) |
|
|
|
28 | (3) |
|
Windows Management Instrumentation |
|
|
31 | (8) |
|
|
|
39 | (1) |
|
|
|
40 | (1) |
|
Planning the Terminal Server Ecosystem |
|
|
41 | (46) |
|
Know Your Terminal Server |
|
|
42 | (1) |
|
Understanding Key Terminal Server Internals |
|
|
42 | (19) |
|
How Does the Terminal Server Dole Out Processor Cycles? |
|
|
42 | (2) |
|
How Do Terminal Servers Maximize Memory Efficiency? |
|
|
44 | (9) |
|
How Can I Use More Than 4 GB of RAM? |
|
|
53 | (4) |
|
How Does Disk Performance Affect a Terminal Server? |
|
|
57 | (4) |
|
Determining System Requirements for Terminal Servers |
|
|
61 | (17) |
|
Defining Acceptable Performance |
|
|
63 | (1) |
|
|
|
64 | (1) |
|
|
|
65 | (7) |
|
The Alternative to Full Testing: Extrapolation |
|
|
72 | (4) |
|
|
|
76 | (2) |
|
Supporting Client Use Profiles |
|
|
78 | (6) |
|
|
|
78 | (1) |
|
What's the Best License Model? |
|
|
79 | (1) |
|
What Applications Can I Run on a Terminal Server? |
|
|
80 | (2) |
|
What Version of Remote Desktop Connection Do I Need? |
|
|
82 | (2) |
|
What Server Role Services Do I Need to Support My Business? |
|
|
84 | (1) |
|
|
|
84 | (1) |
|
|
|
85 | (2) |
|
Installing the Core Terminal Server Environment |
|
|
87 | (60) |
|
How Terminal Servers Work |
|
|
87 | (13) |
|
Services Supporting Terminal Services |
|
|
88 | (2) |
|
Creating and Supporting a Terminal Session |
|
|
90 | (10) |
|
Installing a Terminal Server |
|
|
100 | (9) |
|
Essential Terminal Server Configuration |
|
|
109 | (12) |
|
Allocating System Resources with Windows System Resource Manager |
|
|
109 | (4) |
|
Enabling Plug and Play Redirection with the Desktop Experience |
|
|
113 | (1) |
|
Adjusting Server Settings with Terminal Services Configuration |
|
|
113 | (8) |
|
|
|
121 | (24) |
|
How License Servers Assign TS CALs |
|
|
121 | (3) |
|
Setting Up the License Server |
|
|
124 | (14) |
|
Reporting on TS CAL Usage |
|
|
138 | (3) |
|
|
|
141 | (1) |
|
Restricting Access to TS CALs |
|
|
142 | (1) |
|
Using the Licensing Diagnosis Tool |
|
|
143 | (2) |
|
|
|
145 | (1) |
|
|
|
145 | (2) |
|
Creating the User Work Environment |
|
|
147 | (48) |
|
|
|
148 | (6) |
|
User Profile and the Registry |
|
|
148 | (3) |
|
How Profile Changes Are (Not) Merged |
|
|
151 | (1) |
|
Profile Contents External to the Registry |
|
|
152 | (2) |
|
Design Guidelines for User Profiles |
|
|
154 | (7) |
|
Choose Between Roaming and Mandatory Profiles |
|
|
155 | (1) |
|
|
|
156 | (1) |
|
Prevent Users from Losing Files |
|
|
156 | (1) |
|
Speed Up Logons by Reducing the Data to Copy |
|
|
157 | (2) |
|
|
|
159 | (2) |
|
Using Roaming Profiles with Terminal Services |
|
|
161 | (28) |
|
Converting an Existing Local Profile to a Roaming Profile |
|
|
161 | (6) |
|
Using Group Policy to Manage Roaming Profiles |
|
|
167 | (9) |
|
Using Group Policy to Define the Roaming Profile Share |
|
|
176 | (2) |
|
Speeding Up Logons with Small Profiles |
|
|
178 | (6) |
|
Centralizing Personal Folders with Folder Redirection |
|
|
184 | (3) |
|
Sharing Personal Folders Between Local and Remote Environments |
|
|
187 | (1) |
|
Sharing Folders Between Windows Server 2003 and Windows Server 2008 Roaming Profiles |
|
|
188 | (1) |
|
Setting Standards with Mandatory Profiles |
|
|
189 | (3) |
|
Converting Existing Roaming Profiles to Mandatory Profiles |
|
|
190 | (1) |
|
Creating a Single Mandatory Profile |
|
|
191 | (1) |
|
Creating a Safe Read-Only Desktop |
|
|
191 | (1) |
|
Profile and Folder Redirection Troubleshooting Tips |
|
|
192 | (1) |
|
|
|
193 | (1) |
|
|
|
194 | (1) |
|
Fine-Tuning the User Experience |
|
|
195 | (52) |
|
|
|
196 | (11) |
|
Virtual Channels and the Remote Client Experience |
|
|
196 | (2) |
|
The Plug and Play Device Redirection Framework |
|
|
198 | (3) |
|
|
|
201 | (6) |
|
Moving the Client Experience to the Remote Session |
|
|
207 | (15) |
|
Which Client Devices Can You Add to the Remote Session? |
|
|
207 | (2) |
|
Pros and Cons of Redirecting Resources |
|
|
209 | (6) |
|
Printing from Terminal Services |
|
|
215 | (7) |
|
|
|
222 | (1) |
|
Locking Down the Terminal Server |
|
|
222 | (19) |
|
Restricting Device and Resource Redirection |
|
|
223 | (4) |
|
Prevent Users from Reconfiguring the Server |
|
|
227 | (2) |
|
Close Back Doors to Executables |
|
|
229 | (5) |
|
Restrict Access to System Drives |
|
|
234 | (1) |
|
Prevent Users from Running Unwanted Applications |
|
|
235 | (5) |
|
Keeping the Terminal Server Available |
|
|
240 | (1) |
|
Remote Control of User Sessions |
|
|
241 | (3) |
|
|
|
244 | (1) |
|
|
|
245 | (2) |
|
Installing and Publishing Applications |
|
|
247 | (54) |
|
Installing Applications on a Terminal Server |
|
|
247 | (10) |
|
Which Applications Will Work? |
|
|
248 | (3) |
|
Storing Application-Specific Data |
|
|
251 | (2) |
|
Avoiding Overwriting User Profile Data |
|
|
253 | (2) |
|
Populating the Shadow Key |
|
|
255 | (2) |
|
Understanding TS RemoteApps Internals |
|
|
257 | (8) |
|
|
|
259 | (2) |
|
|
|
261 | (1) |
|
TS RemoteApps and Monitor Spanning |
|
|
262 | (3) |
|
Publishing Applications on a Terminal Server |
|
|
265 | (19) |
|
Using TS RemoteApp Manager to Create TS RemoteApps |
|
|
265 | (19) |
|
Terminal Services Web Access |
|
|
284 | (15) |
|
Installing the TS Web Access Role |
|
|
284 | (1) |
|
Associating TS Web Access with a Terminal Server |
|
|
285 | (2) |
|
TS Web Access Web Site Placement and Access Options |
|
|
287 | (2) |
|
|
|
289 | (7) |
|
Customizing TS Web Access |
|
|
296 | (3) |
|
|
|
299 | (1) |
|
|
|
299 | (2) |
|
Multi-Server Deployments and Securing Terminal Server Connections |
|
|
301 | (70) |
|
|
|
301 | (14) |
|
|
|
302 | (11) |
|
Configuring the Security Settings on the Terminal Server |
|
|
313 | (2) |
|
Understanding Session Broker |
|
|
315 | (11) |
|
Distributing Sessions in a Farm |
|
|
316 | (2) |
|
|
|
318 | (1) |
|
How Does Session Broker Work? |
|
|
318 | (4) |
|
Setting Up Session Broker |
|
|
322 | (4) |
|
Enabling Remote Access Using TS Gateway |
|
|
326 | (42) |
|
|
|
327 | (1) |
|
Enabling TS Gateway Authorization Policies |
|
|
328 | (1) |
|
Preparing to Install TS Gateway |
|
|
329 | (4) |
|
Configuring TS Gateway Options |
|
|
333 | (14) |
|
|
|
347 | (3) |
|
Creating a Redundant TS Gateway Configuration |
|
|
350 | (11) |
|
Using Network Access Protection with TS Gateway |
|
|
361 | (6) |
|
Troubleshooting Declined Connections to TS Gateway |
|
|
367 | (1) |
|
|
|
368 | (1) |
|
|
|
369 | (2) |
|
Managing the Terminal Server Runtime Environment |
|
|
371 | (52) |
|
Introducing Terminal Server Management Tools |
|
|
372 | (8) |
|
Terminal Services Manager |
|
|
372 | (4) |
|
|
|
376 | (1) |
|
Connecting Remotely to Servers for Administration Purposes |
|
|
377 | (2) |
|
Managing Terminal Servers from Windows Vista |
|
|
379 | (1) |
|
Organizing Terminal Servers in Terminal Services Manager |
|
|
380 | (2) |
|
Monitoring and Terminating Processes |
|
|
382 | (2) |
|
Monitoring Application Use |
|
|
382 | (1) |
|
|
|
383 | (1) |
|
Monitoring and Ending User Sessions |
|
|
384 | (5) |
|
Switching Between Sessions |
|
|
385 | (2) |
|
Closing Orphaned Sessions |
|
|
387 | (2) |
|
Providing Help with Remote Control |
|
|
389 | (9) |
|
Enabling Remote Control via Group Policy |
|
|
391 | (2) |
|
Enabling Remote Control via Terminal Services Configuration |
|
|
393 | (1) |
|
|
|
394 | (2) |
|
Troubleshooting Session Shadowing |
|
|
396 | (2) |
|
Preparing for Server Maintenance |
|
|
398 | (11) |
|
|
|
398 | (2) |
|
Sending Messages to Session Users |
|
|
400 | (2) |
|
Shutting Down and Restarting Terminal Servers |
|
|
402 | (7) |
|
Applying TS Management Tools |
|
|
409 | (12) |
|
Differentiating RemoteApp Sessions from Full Desktop Sessions |
|
|
409 | (1) |
|
Auditing Application Usage |
|
|
410 | (9) |
|
|
|
419 | (1) |
|
Closing Unresponsive Applications |
|
|
419 | (2) |
|
|
|
421 | (1) |
|
|
|
422 | (1) |
|
Terminal Services Ecosystem Management |
|
|
423 | (56) |
|
The Case for Standardization |
|
|
423 | (2) |
|
Principles of Change Management |
|
|
425 | (22) |
|
Change Management Challenges |
|
|
426 | (1) |
|
Implementing Change Management Best Practices |
|
|
427 | (19) |
|
|
|
446 | (1) |
|
Demonstrating Configuration Compliance |
|
|
446 | (1) |
|
What Server Roles Need to Be Backed Up? |
|
|
447 | (20) |
|
A Quick Overview of Backup Tools in Windows Server 2008 |
|
|
447 | (9) |
|
Backing Up and Restoring TS License Server |
|
|
456 | (11) |
|
|
|
467 | (7) |
|
|
|
467 | (5) |
|
What Roles Can You Virtualize? |
|
|
472 | (2) |
|
|
|
474 | (1) |
|
|
|
475 | (4) |
| Index |
|
479 | |