Muutke küpsiste eelistusi

Windows Server 2012 Pocket Consultant [Pehme köide]

  • Formaat: Paperback / softback, 720 pages, kõrgus x laius x paksus: 216x158x39 mm, kaal: 808 g
  • Ilmumisaeg: 15-Sep-2012
  • Kirjastus: Microsoft Press,U.S.
  • ISBN-10: 0735666334
  • ISBN-13: 9780735666337
Teised raamatud teemal:
  • Pehme köide
  • Hind: 45,09 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 720 pages, kõrgus x laius x paksus: 216x158x39 mm, kaal: 808 g
  • Ilmumisaeg: 15-Sep-2012
  • Kirjastus: Microsoft Press,U.S.
  • ISBN-10: 0735666334
  • ISBN-13: 9780735666337
Teised raamatud teemal:
Provides information on the administration of Windows Server 2012, covering configuration, customization, and maintenance tasks.

Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of Windows Server 2012. Zero in on core operations and daily tasks using quick-reference tables, instructions, and lists. You’ll get the focused information to solve problems and get the job done—whether at your desk or in the field.

Get fast facts on these essential topics:

  • Managing servers running Windows Server 2012
  • Creating user and group accounts
  • Monitoring services, processes, and events
  • Administering Active Directory
  • Managing files, folders, drives
  • Automating administrative tasks and policies
  • Administering data sharing, security, and auditing
  • Managing TCP/IP networking
  • Implementing data backup and recovery
  • Administering network printers and print services
Introduction xxv
PART I WINDOWS SERVER 2012 ADMINISTRATION FUNDAMENTALS
Chapter 1 Windows Server 2012 Administration Overview
3(28)
Windows Server 2012 and Windows 8
4(2)
Getting to Know Windows Server 2012
6(2)
Power Management Options
8(3)
Networking Tools and Protocols
11(1)
Understanding Networking Options
11(1)
Working with Networking Protocols
12(2)
Domain Controllers, Member Servers, and Domain Services
14(1)
Working with Active Directory
14(2)
Using Read-Only Domain Controllers
16(1)
Using Restartable Active Directory Domain Services
16(1)
Name-Resolution Services
17(1)
Using Domain Name System
18(2)
Using Windows Internet Name Service
20(2)
Using Link-Local Multicast Name Resolution
22(1)
Frequently Used Tools
23(1)
Windows PowerShell 3.0
24(1)
Windows Remote Management
25(6)
Chapter 2 Managing Servers Running Windows Server 2012
31(56)
Server Roles, Role Services, and Features for Windows Server 2012
32(8)
Full-Server, Minimal-lnterface, and Server Core Installations
40(1)
Navigating Server Core
40(3)
Installing Windows Server 2012
43(1)
Performing a Clean Installation
44(3)
Performing an Upgrade Installation
47(1)
Performing Additional Administration Tasks During Installation
48(7)
Changing the Installation Type
55(2)
Managing Roles, Role Services, and Features
57(1)
Performing Initial Configuration Tasks
58(4)
Server Manager Essentials and Binaries
62(3)
Managing Your Servers Remotely
65(2)
Connecting to and Working with Remote Servers
67(3)
Adding and Removing Roles, Role Services, and Features
70(3)
Managing System Properties
73(2)
The Computer Name Tab
75(1)
The Hardware Tab
75(1)
The Advanced Tab
76(9)
The Remote Tab
85(2)
Chapter 3 Monitoring Processes, Services, and Events
87(48)
Managing Applications, Processes, and Performance
87(1)
Task Manager
88(1)
Viewing and Working with Processes
88(3)
Administering Processes
91(3)
Viewing System Services
94(1)
Viewing and Managing System Performance
95(4)
Viewing and Managing Remote User Sessions
99(1)
Managing System Services
100(1)
Navigating Services in Server Manager
100(2)
Navigating Services in Computer Management
102(1)
Starting, Stopping, and Pausing Services
103(1)
Configuring Service Startup
103(1)
Configuring Service Logon
104(2)
Configuring Service Recovery
106(1)
Disabling Unnecessary Services
107(1)
Event Logging and Viewing
108(1)
Accessing Events in Server Manager
109(1)
Accessing Events in Event Viewer
110(2)
Filtering Event Logs
112(3)
Setting Event Log Options
115(1)
Clearing Event Logs
116(1)
Archiving Event Logs
116(2)
Monitoring Server Performance and Activity
118(1)
Why Monitor Your Server?
118(1)
Getting Ready to Monitor
119(1)
Using the Monitoring Consoles
119(3)
Choosing Counters to Monitor
122(2)
Performance Logging
124(4)
Viewing Data Collector Reports
128(1)
Configuring Performance Counter Alerts
129(1)
Tuning System Performance
130(1)
Monitoring and Tuning Memory Usage
130(2)
Monitoring and Tuning Processor Usage
132(1)
Monitoring and Tuning Disk I/O
133(1)
Monitoring and Tuning Network Bandwidthand Connectivity
134(1)
Chapter 4 Automating Administrative Tasks, Policies, and Procedures
135(56)
Understanding Group Policies
138(1)
Group Policy Essentials
138(1)
In What Order Are Multiple Policies Applied?
139(1)
When Are Group Policies Applied?
139(1)
Group Policy Requirements and Version Compatibility
140(1)
Navigating Group Policy Changes
141(2)
Managing Local Group Policies
143(1)
Local Group Policy Objects
143(1)
Accessing the Top-Level Local Policy Settings
144(1)
Local Group Policy Object Settings
145(1)
Accessing Administrator, Non-Administrator, and User-Specific Local Group Policy
146(1)
Managing Site, Domain, and Organizational Unit Policies
147(1)
Understanding Domain and Default Policies
147(1)
Using the Group Policy Management Console
148(1)
Getting to Know the Policy Editor
149(2)
Using Administrative Templates to Set Policies
151(1)
Creating and Linking GPOs
152(1)
Creating and Using Starter GPOs
153(1)
Delegating Privileges for Group Policy Management
154(1)
Blocking, Overriding, and Disabling Policies
155(3)
Maintaining and Troubleshooting Group Policy
158(1)
Refreshing Group Policy
158(1)
Configuring the Refresh Interval
159(2)
Modeling Group Policy for Planning Purposes
161(3)
Copying, Pasting, and Importing Policy Objects
164(1)
Backing Up and Restoring Policy Objects
165(1)
Determining Current Group Policy Settings and Refresh Status
166(1)
Disabling an Unused Part of Group Policy
166(1)
Changing Policy Processing Preferences
167(1)
Configuring Slow-Link Detection
167(3)
Removing Links and Deleting GPOs
170(1)
Troubleshooting Group Policy
171(1)
Fixing Default Group Policy Objects
172(1)
Managing Users and Computers with Group Policy
173(1)
Centrally Managing Special Folders
173(5)
User and Computer Script Management
178(3)
Deploying Software Through Group Policy
181(5)
Automatically Enrolling Computer and User Certificates
186(1)
Managing Automatic Updates in Group Policy
187(4)
Chapter 5 Enhancing Computer Security
191(26)
Using Security Templates
191(2)
Using the Security Templates and Security Configuration And Analysis Snap-ins
193(1)
Reviewing and Changing Template Settings
193(8)
Analyzing, Reviewing, and Applying Security Templates
201(3)
Deploying Security Templates to Multiple Computers
204(2)
Using the Security Configuration Wizard
206(1)
Creating Security Policies
206(5)
Editing Security Policies
211(1)
Applying Security Policies
211(1)
Rolling Back the Last-Applied Security Policy
211(1)
Deploying a Security Policy to Multiple Computers
212(5)
PART II WINDOWS SERVER 2012 DIRECTORY SERVICES ADMINISTRATION
Chapter 6 Using Active Directory
217(32)
Introducing Active Directory
217(1)
Active Directory and DNS
217(2)
Read-Only Domain Controller Deployment
219(1)
Active Directory Features for Windows Server 2008 R2
220(1)
Active Directory Features for Windows Server 2012
221(2)
Working with Domain Structures
223(1)
Understanding Domains
224(1)
Understanding Domain Forests and Domain Trees
225(2)
Understanding Organizational Units
227(2)
Understanding Sites and Subnets
229(1)
Working with Active Directory Domains
230(1)
Using Computers with Active Directory
230(1)
Working with Domain Functional Levels
231(4)
Raising or Lowering Domain and Forest Functionality
235(2)
Understanding the Directory Structure
237(1)
Exploring the Data Store
238(1)
Exploring Global Catalogs
239(1)
Universal Group Membership Caching
240(1)
Replication and Active Directory
241(1)
Active Directory and LDAP
242(1)
Understanding Operations Master Roles
242(2)
Using the Active Directory Recycle Bin
244(1)
Preparing Schema for the Recycle Bin
244(1)
Recovering Deleted Objects
245(4)
Chapter 7 Core Active Directory Administration
249(46)
Tools for Managing Active Directory
249(1)
Active Directory Administration Tools
249(1)
Active Directory Command-Line Tools
250(1)
Active Directory Support Tools
251(1)
Using Active Directory Users And Computers
252(4)
Active Directory Administrative Center and Windows PowerShell
256(3)
Managing Computer Accounts
259(1)
Creating Computer Accounts on a Workstation or Server
259(1)
Creating Computer Accounts in Active Directory Administrative Center
260(1)
Creating Computer Accounts in Active Directory Users And Computers
261(2)
Viewing and Editing Computer Account Properties
263(1)
Deleting, Disabling, and Enabling Computer Accounts
264(1)
Resetting Locked Computer Accounts
264(2)
Moving Computer Accounts
266(1)
Managing Computers
267(1)
Joining a Computer to a Domain or Workgroup
267(1)
Using Offline Domain Join
268(2)
Managing Domain Controllers, Roles, and Catalogs
270(1)
Installing and Demoting Domain Controllers
270(3)
Viewing and Transferring Domainwide Roles
273(2)
Viewing and Transferring the Domain Naming Master Role
275(1)
Viewing and Transferring Schema Master Roles
275(1)
Transferring Roles Using the Command Line
276(1)
Seizing Roles Using the Command Line
276(4)
Configuring Global Catalogs
280(1)
Configuring Universal Group Membership Caching
281(1)
Managing Organizational Units
281(1)
Creating Organizational Units
281(1)
Viewing and Editing Organizational Unit Properties
282(1)
Renaming and Deleting Organizational Units
282(1)
Moving Organizational Units
282(1)
Managing Sites
282(1)
Creating Sites
283(1)
Creating Subnets
284(1)
Associating Domain Controllers with Sites
285(1)
Configuring Site Links
285(3)
Configuring Site Link Bridges
288(1)
Maintaining Active Directory
289(1)
Using ADSI Edit
289(2)
Examining Intersite Topology
291(1)
Troubleshooting Active Directory
292(3)
Chapter 8 Creating User and Group Accounts
295(52)
The Windows Server Security Model
296(1)
Authentication Protocols
296(1)
Access Controls
297(1)
Claims-Based Access Controls
297(2)
Central Access Policies
299(1)
Differences Between User and Group Accounts
300(1)
User Accounts
301(1)
Group Accounts
302(4)
Default User Accounts and Groups
306(1)
Built-in User Accounts
307(1)
Predefined User Accounts
307(1)
Built-in and Predefined Groups
308(1)
Implicit Groups and Special Identities
309(1)
Account Capabilities
309(1)
Privileges
310(2)
Logon Rights
312(1)
Built-in Capabilities for Groups in Active Directory
313(2)
Using Default Group Accounts
315(1)
Groups Used by Administrators
316(1)
Implicit Groups and Identities
317(1)
User Account Setup and Organization
318(1)
Account Naming Policies
319(1)
Password and Account Policies
320(2)
Configuring Account Policies
322(1)
Configuring Password Policies
323(2)
Configuring Account Lockout Policies
325(1)
Configuring Kerberos Policies
326(1)
Configuring User Rights Policies
327(1)
Configuring Global User Rights
328(2)
Configuring Local User Rights
330(1)
Adding a User Account
330(1)
Creating Domain User Accounts
330(4)
Creating Local User Accounts
334(1)
Adding a Group Account
335(1)
Creating a Global Group
336(1)
Creating a Local Group and Assigning Members
337(1)
Handling Global Group Membership
338(1)
Managing Individual Membership
339(1)
Managing Multiple Memberships in a Group
340(1)
Setting the Primary Group for Users and Computers
340(1)
Implementing Managed Accounts
341(1)
Creating and Using Managed Service Accounts
342(2)
Configuring Services to Use Managed Service Accounts
344(1)
Removing Managed Service Accounts
344(1)
Moving Managed Service Accounts
345(1)
Using Virtual Accounts
346(1)
Chapter 9 Managing User and Group Accounts
347(38)
Managing User Contact Information
347(1)
Setting Contact Information
347(3)
Searching for Users and Groups in Active Directory
350(1)
Configuring the User's Environment Settings
351(1)
System Environment Variables
352(1)
Logon Scripts
353(1)
Assigning Home Directories
354(1)
Setting Account Options and Restrictions
355(1)
Managing Logon Hours
355(2)
Setting Permitted Logon Workstations
357(1)
Setting Dial-in and VPN Privileges
358(2)
Setting Account Security Options
360(1)
Managing User Profiles
361(1)
Local, Roaming, and Mandatory Profiles
362(3)
Using the System Utility to Manage Local Profiles
365(3)
Updating User and Group Accounts
368(1)
Renaming User and Group Accounts
369(2)
Copying Domain User Accounts
371(1)
Importing and Exporting Accounts
372(1)
Deleting User and Group Accounts
373(1)
Changing and Resetting Passwords
373(1)
Enabling User Accounts
374(1)
Managing Multiple User Accounts
375(1)
Setting Profiles for Multiple Accounts
376(1)
Setting Logon Hours for Multiple Accounts
377(1)
Setting Permitted Logon Workstations for Multiple Accounts
378(1)
Setting Logon, Password, and Expiration Properties for Multiple Accounts
378(1)
Troubleshooting Logon Problems
378(2)
Viewing and Setting Active Directory Permissions
380(5)
PART III WINDOWS SERVER 2012 DATA ADMINISTRATION
Chapter 10 Managing File Systems and Drives
385(34)
Managing the File Services Role
385(4)
Adding Hard Disk Drives
389(1)
Physical Drives
389(3)
Preparing a Physical Drive for Use
392(2)
Using Disk Management
394(2)
Removable Storage Devices
396(2)
Installing and Checking for a New Drive
398(1)
Understanding Drive Status
399(2)
Working with Basic, Dynamic, and Virtual Disks
401(1)
Using Basic and Dynamic Disks
401(1)
Special Considerations for Basic and Dynamic Disks
402(1)
Changing Drive Types
402(2)
Reactivating Dynamic Disks
404(1)
Rescanning Disks
404(1)
Moving a Dynamic Disk to a New System
404(1)
Managing Virtual Hard Disks
405(1)
Using Basic Disks and Partitions
406(1)
Partitioning Basics
406(1)
Creating Partitions and Simple Volumes
407(3)
Formatting Partitions
410(1)
Compressing Drives and Data
411(1)
Compressing Drives
412(1)
Compressing Directories and Files
412(1)
Expanding Compressed Drives
412(1)
Expanding Compressed Directories and Files
413(1)
Encrypting Drives and Data
413(1)
Understanding Encryption and the Encrypting File System
414(1)
Encrypting Directories and Files
415(1)
Working with Encrypted Files and Folders
416(1)
Configuring Recovery Policy
417(1)
Decrypting Files and Directories
418(1)
Chapter 11 Configuring Volumes and RAID Arrays
419(38)
Using Volumes and Volume Sets
420(1)
Understanding Volume Basics
420(2)
Understanding Volume Sets
422(2)
Creating Volumes and Volume Sets
424(2)
Deleting Volumes and Volume Sets
426(1)
Managing Volumes
426(1)
Improving Performance and Fault Tolerance with RAID
426(1)
Implementing RAID on Windows Server 2012
427(1)
Implementing RAID-0: Disk Striping
427(1)
Implementing RAID-1: Disk Mirroring
428(3)
Implementing RAID-5: Disk Striping with Parity
431(1)
Managing RAID and Recovering from Failures
432(1)
Breaking a Mirrored Set
432(1)
Resynchronizing and Repairing a Mirrored Set
432(1)
Repairing a Mirrored System Volume to Enable Boot
433(1)
Removing a Mirrored Set
434(1)
Repairing a Striped Set Without Parity
434(1)
Regenerating a Striped Set with Parity
434(1)
Standards-Based Storage Management
435(1)
Getting Started with Standards-Based Storage
435(1)
Working with Standards-Based Storage
436(2)
Creating Storage Pools and Allocating Space
438(1)
Creating a Storage Space
439(1)
Creating a Virtual Disk in a Storage Space
440(1)
Creating a Standard Volume
441(2)
Managing Existing Partitions and Drives
443(1)
Assigning Drive Letters and Paths
443(1)
Changing or Deleting the Volume Label
444(1)
Deleting Partitions and Drives
445(1)
Converting a Volume to NTFS
445(2)
Resizing Partitions and Volumes
447(2)
Repairing Disk Errors and Inconsistencies Automatically
449(4)
Analyzing and Optimizing Disks
453(4)
Chapter 12 Data Sharing, Security, and Auditing
457(62)
Using and Enabling File Sharing
458(3)
Configuring Standard File Sharing
461(1)
Viewing Existing Shares
461(2)
Creating Shared Folders in Computer Management
463(3)
Creating Shared Folders in Server Manager
466(2)
Changing Shared Folder Settings
468(1)
Managing Share Permissions
469(1)
Various Share Permissions
469(1)
Viewing and Configuring Share Permissions
470(4)
Managing Existing Shares
474(1)
Understanding Special Shares
474(1)
Connecting to Special Shares
475(1)
Viewing User and Computer Sessions
476(2)
Stopping File and Folder Sharing
478(1)
Configuring NFS Sharing
479(2)
Using Shadow Copies
481(1)
Understanding Shadow Copies
481(1)
Creating Shadow Copies
482(1)
Restoring a Shadow Copy
482(1)
Reverting an Entire Volume to a Previous Shadow Copy
483(1)
Deleting Shadow Copies
483(1)
Disabling Shadow Copies
483(1)
Connecting to Network Drives
484(1)
Mapping a Network Drive
484(1)
Disconnecting a Network Drive
485(1)
Object Management, Ownership, and Inheritance
485(1)
Objects and Object Managers
485(1)
Object Ownership and Transfer
486(1)
Object Inheritance
487(1)
File and Folder Permissions
488(1)
Understanding File and Folder Permissions
489(2)
Setting Basic File and Folder Permissions
491(2)
Setting Special Permissions on Files and Folders
493(3)
Setting Claims-Based Permissions
496(2)
Auditing System Resources
498(1)
Setting Auditing Policies
498(2)
Auditing Files and Folders
500(2)
Auditing the Registry
502(1)
Auditing Active Directory Objects
502(1)
Using, Configuring, and Managing NTFS Disk Quotas
503(1)
Understanding NTFS Disk Quotas and How NTFS Quotas Are Used
504(2)
Setting NTFS Disk Quota Policies
506(2)
Enabling NTFS Disk Quotas on NTFS Volumes
508(2)
Viewing Disk Quota Entries
510(1)
Creating Disk Quota Entries
510(2)
Deleting Disk Quota Entries
512(1)
Exporting and Importing NTFS Disk Quota Settings
512(1)
Disabling NTFS Disk Quotas
513(1)
Using, Configuring, and Managing Resource Manager Disk Quotas
513(1)
Understanding Resource Manager Disk Quotas
514(1)
Managing Disk Quota Templates
515(3)
Creating Resource Manager Disk Quotas
518(1)
Chapter 13 Data Backup and Recovery
519(40)
Creating a Backup and Recovery Plan
519(1)
Figuring Out a Backup Plan
519(2)
The Basic Types of Backup
521(1)
Differential and Incremental Backups
522(1)
Selecting Backup Devices and Media
522(1)
Common Backup Solutions
523(1)
Buying and Using Backup Media
524(1)
Selecting a Backup Utility
525(1)
Backing Up Your Data: The Essentials
526(1)
Installing the Windows Backup and Recovery Utilities
526(1)
Getting Started with Windows Server Backup
527(2)
Getting Started with the Backup Command-Line Utility
529(2)
Working with Wbadmin Commands
531(1)
Using General-Purpose Commands
531(1)
Using Backup Management Commands
532(1)
Using Recovery Management Commands
533(1)
Performing Server Backups
534(1)
Configuring Scheduled Backups
535(3)
Modifying or Stopping Scheduled Backups
538(1)
Creating and Scheduling Backups with Wbadmin
538(2)
Running Manual Backups
540(1)
Recovering Your Server from Hardware or Startup Failure
541(3)
Recovering from a Failed Start
544(1)
Starting a Server in Safe Mode
544(2)
Backing Up and Restoring the System State
546(1)
Restoring Active Directory
547(1)
Restoring the Operating System and the Full System
547(3)
Restoring Applications, Nonsystem Volumes, and Files and Folders
550(1)
Managing Encryption Recovery Policy
551(1)
Understanding Encryption Certificates and Recovery Policy
551(2)
Configuring the EFS Recovery Policy
553(1)
Backing Up and Restoring Encrypted Data and Certificates
554(1)
Backing Up Encryption Certificates
554(1)
Restoring Encryption Certificates
555(4)
PART IV WINDOWS SERVER 2012 NETWORK ADMINISTRATION
Chapter 14 Managing TCP/IP Networking
559(14)
Navigating Networking in Windows Server 2012
559(3)
Managing Networking in Windows 8 and Windows Server 2012
562(3)
Installing TCP/IP Networking
565(1)
Configuring TCP/IP Networking
566(1)
Configuring Static IP Addresses
566(2)
Configuring Dynamic IP Addresses and Alternate IP Addressing
568(1)
Configuring Multiple Gateways
569(1)
Configuring Networking for Hyper-V
570(1)
Managing Network Connections
571(1)
Checking the Status, Speed, and Activity for Network Connections
571(1)
Enabling and Disabling Network Connections
572(1)
Renaming Network Connections
572(1)
Chapter 15 Running DHCP Clients and Servers
573(42)
Understanding DHCP
573(1)
Using Dynamic IPv4 Addressing and Configuration
573(2)
Using Dynamic IPv6 Addressing and Configuration
575(3)
Checking IP Address Assignment
578(1)
Understanding Scopes
578(1)
Installing a DHCP Server
579(1)
Installing DHCP Components
579(2)
Starting and Using the DHCP Console
581(1)
Connecting to Remote DHCP Servers
582(1)
Starting and Stopping a DHCP Server
583(1)
Authorizing a DHCP Server in Active Directory
583(1)
Configuring DHCP Servers
584(1)
Configuring Server Bindings
584(1)
Updating DHCP Statistics
584(1)
DHCP Auditing and Troubleshooting
585(1)
Integrating DHCP and DNS
586(2)
Integrating DHCP and NAP
588(3)
Avoiding IP Address Conflicts
591(1)
Saving and Restoring the DHCP Configuration
591(1)
Managing DHCP Scopes
592(1)
Creating and Managing Superscopes
592(1)
Creating and Managing Scopes
593(9)
Creating and Managing Failover Scopes
602(3)
Managing the Address Pool, Leases, and Reservations
605(1)
Viewing Scope Statistics
605(1)
Enabling and Configuring MAC Address Filtering
606(1)
Setting a New Exclusion Range
607(1)
Reserving DHCP Addresses
608(1)
Modifying Reservation Properties
609(1)
Deleting Leases and Reservations
610(1)
Backing Up and Restoring the DHCP Database
610(1)
Backing Up the DHCP Database
610(1)
Restoring the DHCP Database from Backup
611(1)
Using Backup and Restore to Move the DHCP Database to a New Server
611(1)
Forcing the DHCP Server Service to Regenerate the DHCP Database
612(1)
Reconciling Leases and Reservations
612(3)
Chapter 16 Optimizing DNS
615(36)
Understanding DNS
615(1)
Integrating Active Directory and DNS
616(1)
Enabling DNS on the Network
617(3)
Configuring Name Resolution on DNS Clients
620(1)
Installing DNS Servers
621(1)
Installing and Configuring the DNS Server Service
622(2)
Configuring a Primary DNS Server
624(3)
Configuring a Secondary DNS Server
627(1)
Configuring Reverse Lookups
628(1)
Configuring Global Names
629(2)
Managing DNS Servers
631(1)
Adding and Removing Servers to Manage
631(1)
Starting and Stopping a DNS Server
632(1)
Using DNSSEC and Signing Zones
632(2)
Creating Child Domains Within Zones
634(1)
Creating Child Domains in Separate Zones
635(1)
Deleting a Domain or Subnet
636(1)
Managing DNS Records
636(1)
Adding Address and Pointer Records
637(1)
Adding DNS Aliases with CNAME
638(1)
Adding Mail Exchange Servers
638(1)
Adding Name Servers
639(1)
Viewing and Updating DNS Records
640(1)
Updating Zone Properties and the SOA Record
641(1)
Modifying the SOA Record
641(2)
Allowing and Restricting Zone Transfers
643(1)
Notifying Secondaries of Changes
644(1)
Setting the Zone Type
645(1)
Enabling and Disabling Dynamic Updates
645(1)
Managing DNS Server Configuration and Security
645
Enabling and Disabling IP Addresses for a DNS Server
546(100)
Controlling Access to DNS Servers Outside the Organization
646(2)
Enabling and Disabling Event Logging
648(1)
Using Debug Logging to Track DNS Activity
648(1)
Monitoring a DNS Server
649(2)
Index 651
William R. Stanek is a Microsoft MVP with 20+ years of experience in systems management and advanced programming. He is an award-winning author whos written more than 100 books, including Windows Server 2012 Pocket Consultant and Microsoft SQL Server 2012 Pocket Consultant.