| Introduction |
|
xxv | |
|
PART I WINDOWS SERVER 2012 ADMINISTRATION FUNDAMENTALS |
|
|
|
Chapter 1 Windows Server 2012 Administration Overview |
|
|
3 | (28) |
|
Windows Server 2012 and Windows 8 |
|
|
4 | (2) |
|
Getting to Know Windows Server 2012 |
|
|
6 | (2) |
|
|
|
8 | (3) |
|
Networking Tools and Protocols |
|
|
11 | (1) |
|
Understanding Networking Options |
|
|
11 | (1) |
|
Working with Networking Protocols |
|
|
12 | (2) |
|
Domain Controllers, Member Servers, and Domain Services |
|
|
14 | (1) |
|
Working with Active Directory |
|
|
14 | (2) |
|
Using Read-Only Domain Controllers |
|
|
16 | (1) |
|
Using Restartable Active Directory Domain Services |
|
|
16 | (1) |
|
|
|
17 | (1) |
|
|
|
18 | (2) |
|
Using Windows Internet Name Service |
|
|
20 | (2) |
|
Using Link-Local Multicast Name Resolution |
|
|
22 | (1) |
|
|
|
23 | (1) |
|
|
|
24 | (1) |
|
Windows Remote Management |
|
|
25 | (6) |
|
Chapter 2 Managing Servers Running Windows Server 2012 |
|
|
31 | (56) |
|
Server Roles, Role Services, and Features for Windows Server 2012 |
|
|
32 | (8) |
|
Full-Server, Minimal-lnterface, and Server Core Installations |
|
|
40 | (1) |
|
|
|
40 | (3) |
|
Installing Windows Server 2012 |
|
|
43 | (1) |
|
Performing a Clean Installation |
|
|
44 | (3) |
|
Performing an Upgrade Installation |
|
|
47 | (1) |
|
Performing Additional Administration Tasks During Installation |
|
|
48 | (7) |
|
Changing the Installation Type |
|
|
55 | (2) |
|
Managing Roles, Role Services, and Features |
|
|
57 | (1) |
|
Performing Initial Configuration Tasks |
|
|
58 | (4) |
|
Server Manager Essentials and Binaries |
|
|
62 | (3) |
|
Managing Your Servers Remotely |
|
|
65 | (2) |
|
Connecting to and Working with Remote Servers |
|
|
67 | (3) |
|
Adding and Removing Roles, Role Services, and Features |
|
|
70 | (3) |
|
Managing System Properties |
|
|
73 | (2) |
|
|
|
75 | (1) |
|
|
|
75 | (1) |
|
|
|
76 | (9) |
|
|
|
85 | (2) |
|
Chapter 3 Monitoring Processes, Services, and Events |
|
|
87 | (48) |
|
Managing Applications, Processes, and Performance |
|
|
87 | (1) |
|
|
|
88 | (1) |
|
Viewing and Working with Processes |
|
|
88 | (3) |
|
|
|
91 | (3) |
|
|
|
94 | (1) |
|
Viewing and Managing System Performance |
|
|
95 | (4) |
|
Viewing and Managing Remote User Sessions |
|
|
99 | (1) |
|
|
|
100 | (1) |
|
Navigating Services in Server Manager |
|
|
100 | (2) |
|
Navigating Services in Computer Management |
|
|
102 | (1) |
|
Starting, Stopping, and Pausing Services |
|
|
103 | (1) |
|
Configuring Service Startup |
|
|
103 | (1) |
|
Configuring Service Logon |
|
|
104 | (2) |
|
Configuring Service Recovery |
|
|
106 | (1) |
|
Disabling Unnecessary Services |
|
|
107 | (1) |
|
Event Logging and Viewing |
|
|
108 | (1) |
|
Accessing Events in Server Manager |
|
|
109 | (1) |
|
Accessing Events in Event Viewer |
|
|
110 | (2) |
|
|
|
112 | (3) |
|
Setting Event Log Options |
|
|
115 | (1) |
|
|
|
116 | (1) |
|
|
|
116 | (2) |
|
Monitoring Server Performance and Activity |
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
119 | (1) |
|
Using the Monitoring Consoles |
|
|
119 | (3) |
|
Choosing Counters to Monitor |
|
|
122 | (2) |
|
|
|
124 | (4) |
|
Viewing Data Collector Reports |
|
|
128 | (1) |
|
Configuring Performance Counter Alerts |
|
|
129 | (1) |
|
Tuning System Performance |
|
|
130 | (1) |
|
Monitoring and Tuning Memory Usage |
|
|
130 | (2) |
|
Monitoring and Tuning Processor Usage |
|
|
132 | (1) |
|
Monitoring and Tuning Disk I/O |
|
|
133 | (1) |
|
Monitoring and Tuning Network Bandwidthand Connectivity |
|
|
134 | (1) |
|
Chapter 4 Automating Administrative Tasks, Policies, and Procedures |
|
|
135 | (56) |
|
Understanding Group Policies |
|
|
138 | (1) |
|
|
|
138 | (1) |
|
In What Order Are Multiple Policies Applied? |
|
|
139 | (1) |
|
When Are Group Policies Applied? |
|
|
139 | (1) |
|
Group Policy Requirements and Version Compatibility |
|
|
140 | (1) |
|
Navigating Group Policy Changes |
|
|
141 | (2) |
|
Managing Local Group Policies |
|
|
143 | (1) |
|
Local Group Policy Objects |
|
|
143 | (1) |
|
Accessing the Top-Level Local Policy Settings |
|
|
144 | (1) |
|
Local Group Policy Object Settings |
|
|
145 | (1) |
|
Accessing Administrator, Non-Administrator, and User-Specific Local Group Policy |
|
|
146 | (1) |
|
Managing Site, Domain, and Organizational Unit Policies |
|
|
147 | (1) |
|
Understanding Domain and Default Policies |
|
|
147 | (1) |
|
Using the Group Policy Management Console |
|
|
148 | (1) |
|
Getting to Know the Policy Editor |
|
|
149 | (2) |
|
Using Administrative Templates to Set Policies |
|
|
151 | (1) |
|
Creating and Linking GPOs |
|
|
152 | (1) |
|
Creating and Using Starter GPOs |
|
|
153 | (1) |
|
Delegating Privileges for Group Policy Management |
|
|
154 | (1) |
|
Blocking, Overriding, and Disabling Policies |
|
|
155 | (3) |
|
Maintaining and Troubleshooting Group Policy |
|
|
158 | (1) |
|
|
|
158 | (1) |
|
Configuring the Refresh Interval |
|
|
159 | (2) |
|
Modeling Group Policy for Planning Purposes |
|
|
161 | (3) |
|
Copying, Pasting, and Importing Policy Objects |
|
|
164 | (1) |
|
Backing Up and Restoring Policy Objects |
|
|
165 | (1) |
|
Determining Current Group Policy Settings and Refresh Status |
|
|
166 | (1) |
|
Disabling an Unused Part of Group Policy |
|
|
166 | (1) |
|
Changing Policy Processing Preferences |
|
|
167 | (1) |
|
Configuring Slow-Link Detection |
|
|
167 | (3) |
|
Removing Links and Deleting GPOs |
|
|
170 | (1) |
|
Troubleshooting Group Policy |
|
|
171 | (1) |
|
Fixing Default Group Policy Objects |
|
|
172 | (1) |
|
Managing Users and Computers with Group Policy |
|
|
173 | (1) |
|
Centrally Managing Special Folders |
|
|
173 | (5) |
|
User and Computer Script Management |
|
|
178 | (3) |
|
Deploying Software Through Group Policy |
|
|
181 | (5) |
|
Automatically Enrolling Computer and User Certificates |
|
|
186 | (1) |
|
Managing Automatic Updates in Group Policy |
|
|
187 | (4) |
|
Chapter 5 Enhancing Computer Security |
|
|
191 | (26) |
|
|
|
191 | (2) |
|
Using the Security Templates and Security Configuration And Analysis Snap-ins |
|
|
193 | (1) |
|
Reviewing and Changing Template Settings |
|
|
193 | (8) |
|
Analyzing, Reviewing, and Applying Security Templates |
|
|
201 | (3) |
|
Deploying Security Templates to Multiple Computers |
|
|
204 | (2) |
|
Using the Security Configuration Wizard |
|
|
206 | (1) |
|
Creating Security Policies |
|
|
206 | (5) |
|
Editing Security Policies |
|
|
211 | (1) |
|
Applying Security Policies |
|
|
211 | (1) |
|
Rolling Back the Last-Applied Security Policy |
|
|
211 | (1) |
|
Deploying a Security Policy to Multiple Computers |
|
|
212 | (5) |
|
PART II WINDOWS SERVER 2012 DIRECTORY SERVICES ADMINISTRATION |
|
|
|
Chapter 6 Using Active Directory |
|
|
217 | (32) |
|
Introducing Active Directory |
|
|
217 | (1) |
|
|
|
217 | (2) |
|
Read-Only Domain Controller Deployment |
|
|
219 | (1) |
|
Active Directory Features for Windows Server 2008 R2 |
|
|
220 | (1) |
|
Active Directory Features for Windows Server 2012 |
|
|
221 | (2) |
|
Working with Domain Structures |
|
|
223 | (1) |
|
|
|
224 | (1) |
|
Understanding Domain Forests and Domain Trees |
|
|
225 | (2) |
|
Understanding Organizational Units |
|
|
227 | (2) |
|
Understanding Sites and Subnets |
|
|
229 | (1) |
|
Working with Active Directory Domains |
|
|
230 | (1) |
|
Using Computers with Active Directory |
|
|
230 | (1) |
|
Working with Domain Functional Levels |
|
|
231 | (4) |
|
Raising or Lowering Domain and Forest Functionality |
|
|
235 | (2) |
|
Understanding the Directory Structure |
|
|
237 | (1) |
|
|
|
238 | (1) |
|
Exploring Global Catalogs |
|
|
239 | (1) |
|
Universal Group Membership Caching |
|
|
240 | (1) |
|
Replication and Active Directory |
|
|
241 | (1) |
|
Active Directory and LDAP |
|
|
242 | (1) |
|
Understanding Operations Master Roles |
|
|
242 | (2) |
|
Using the Active Directory Recycle Bin |
|
|
244 | (1) |
|
Preparing Schema for the Recycle Bin |
|
|
244 | (1) |
|
Recovering Deleted Objects |
|
|
245 | (4) |
|
Chapter 7 Core Active Directory Administration |
|
|
249 | (46) |
|
Tools for Managing Active Directory |
|
|
249 | (1) |
|
Active Directory Administration Tools |
|
|
249 | (1) |
|
Active Directory Command-Line Tools |
|
|
250 | (1) |
|
Active Directory Support Tools |
|
|
251 | (1) |
|
Using Active Directory Users And Computers |
|
|
252 | (4) |
|
Active Directory Administrative Center and Windows PowerShell |
|
|
256 | (3) |
|
Managing Computer Accounts |
|
|
259 | (1) |
|
Creating Computer Accounts on a Workstation or Server |
|
|
259 | (1) |
|
Creating Computer Accounts in Active Directory Administrative Center |
|
|
260 | (1) |
|
Creating Computer Accounts in Active Directory Users And Computers |
|
|
261 | (2) |
|
Viewing and Editing Computer Account Properties |
|
|
263 | (1) |
|
Deleting, Disabling, and Enabling Computer Accounts |
|
|
264 | (1) |
|
Resetting Locked Computer Accounts |
|
|
264 | (2) |
|
|
|
266 | (1) |
|
|
|
267 | (1) |
|
Joining a Computer to a Domain or Workgroup |
|
|
267 | (1) |
|
Using Offline Domain Join |
|
|
268 | (2) |
|
Managing Domain Controllers, Roles, and Catalogs |
|
|
270 | (1) |
|
Installing and Demoting Domain Controllers |
|
|
270 | (3) |
|
Viewing and Transferring Domainwide Roles |
|
|
273 | (2) |
|
Viewing and Transferring the Domain Naming Master Role |
|
|
275 | (1) |
|
Viewing and Transferring Schema Master Roles |
|
|
275 | (1) |
|
Transferring Roles Using the Command Line |
|
|
276 | (1) |
|
Seizing Roles Using the Command Line |
|
|
276 | (4) |
|
Configuring Global Catalogs |
|
|
280 | (1) |
|
Configuring Universal Group Membership Caching |
|
|
281 | (1) |
|
Managing Organizational Units |
|
|
281 | (1) |
|
Creating Organizational Units |
|
|
281 | (1) |
|
Viewing and Editing Organizational Unit Properties |
|
|
282 | (1) |
|
Renaming and Deleting Organizational Units |
|
|
282 | (1) |
|
Moving Organizational Units |
|
|
282 | (1) |
|
|
|
282 | (1) |
|
|
|
283 | (1) |
|
|
|
284 | (1) |
|
Associating Domain Controllers with Sites |
|
|
285 | (1) |
|
|
|
285 | (3) |
|
Configuring Site Link Bridges |
|
|
288 | (1) |
|
Maintaining Active Directory |
|
|
289 | (1) |
|
|
|
289 | (2) |
|
Examining Intersite Topology |
|
|
291 | (1) |
|
Troubleshooting Active Directory |
|
|
292 | (3) |
|
Chapter 8 Creating User and Group Accounts |
|
|
295 | (52) |
|
The Windows Server Security Model |
|
|
296 | (1) |
|
|
|
296 | (1) |
|
|
|
297 | (1) |
|
Claims-Based Access Controls |
|
|
297 | (2) |
|
|
|
299 | (1) |
|
Differences Between User and Group Accounts |
|
|
300 | (1) |
|
|
|
301 | (1) |
|
|
|
302 | (4) |
|
Default User Accounts and Groups |
|
|
306 | (1) |
|
|
|
307 | (1) |
|
|
|
307 | (1) |
|
Built-in and Predefined Groups |
|
|
308 | (1) |
|
Implicit Groups and Special Identities |
|
|
309 | (1) |
|
|
|
309 | (1) |
|
|
|
310 | (2) |
|
|
|
312 | (1) |
|
Built-in Capabilities for Groups in Active Directory |
|
|
313 | (2) |
|
Using Default Group Accounts |
|
|
315 | (1) |
|
Groups Used by Administrators |
|
|
316 | (1) |
|
Implicit Groups and Identities |
|
|
317 | (1) |
|
User Account Setup and Organization |
|
|
318 | (1) |
|
|
|
319 | (1) |
|
Password and Account Policies |
|
|
320 | (2) |
|
Configuring Account Policies |
|
|
322 | (1) |
|
Configuring Password Policies |
|
|
323 | (2) |
|
Configuring Account Lockout Policies |
|
|
325 | (1) |
|
Configuring Kerberos Policies |
|
|
326 | (1) |
|
Configuring User Rights Policies |
|
|
327 | (1) |
|
Configuring Global User Rights |
|
|
328 | (2) |
|
Configuring Local User Rights |
|
|
330 | (1) |
|
|
|
330 | (1) |
|
Creating Domain User Accounts |
|
|
330 | (4) |
|
Creating Local User Accounts |
|
|
334 | (1) |
|
|
|
335 | (1) |
|
|
|
336 | (1) |
|
Creating a Local Group and Assigning Members |
|
|
337 | (1) |
|
Handling Global Group Membership |
|
|
338 | (1) |
|
Managing Individual Membership |
|
|
339 | (1) |
|
Managing Multiple Memberships in a Group |
|
|
340 | (1) |
|
Setting the Primary Group for Users and Computers |
|
|
340 | (1) |
|
Implementing Managed Accounts |
|
|
341 | (1) |
|
Creating and Using Managed Service Accounts |
|
|
342 | (2) |
|
Configuring Services to Use Managed Service Accounts |
|
|
344 | (1) |
|
Removing Managed Service Accounts |
|
|
344 | (1) |
|
Moving Managed Service Accounts |
|
|
345 | (1) |
|
|
|
346 | (1) |
|
Chapter 9 Managing User and Group Accounts |
|
|
347 | (38) |
|
Managing User Contact Information |
|
|
347 | (1) |
|
Setting Contact Information |
|
|
347 | (3) |
|
Searching for Users and Groups in Active Directory |
|
|
350 | (1) |
|
Configuring the User's Environment Settings |
|
|
351 | (1) |
|
System Environment Variables |
|
|
352 | (1) |
|
|
|
353 | (1) |
|
Assigning Home Directories |
|
|
354 | (1) |
|
Setting Account Options and Restrictions |
|
|
355 | (1) |
|
|
|
355 | (2) |
|
Setting Permitted Logon Workstations |
|
|
357 | (1) |
|
Setting Dial-in and VPN Privileges |
|
|
358 | (2) |
|
Setting Account Security Options |
|
|
360 | (1) |
|
|
|
361 | (1) |
|
Local, Roaming, and Mandatory Profiles |
|
|
362 | (3) |
|
Using the System Utility to Manage Local Profiles |
|
|
365 | (3) |
|
Updating User and Group Accounts |
|
|
368 | (1) |
|
Renaming User and Group Accounts |
|
|
369 | (2) |
|
Copying Domain User Accounts |
|
|
371 | (1) |
|
Importing and Exporting Accounts |
|
|
372 | (1) |
|
Deleting User and Group Accounts |
|
|
373 | (1) |
|
Changing and Resetting Passwords |
|
|
373 | (1) |
|
|
|
374 | (1) |
|
Managing Multiple User Accounts |
|
|
375 | (1) |
|
Setting Profiles for Multiple Accounts |
|
|
376 | (1) |
|
Setting Logon Hours for Multiple Accounts |
|
|
377 | (1) |
|
Setting Permitted Logon Workstations for Multiple Accounts |
|
|
378 | (1) |
|
Setting Logon, Password, and Expiration Properties for Multiple Accounts |
|
|
378 | (1) |
|
Troubleshooting Logon Problems |
|
|
378 | (2) |
|
Viewing and Setting Active Directory Permissions |
|
|
380 | (5) |
|
PART III WINDOWS SERVER 2012 DATA ADMINISTRATION |
|
|
|
Chapter 10 Managing File Systems and Drives |
|
|
385 | (34) |
|
Managing the File Services Role |
|
|
385 | (4) |
|
|
|
389 | (1) |
|
|
|
389 | (3) |
|
Preparing a Physical Drive for Use |
|
|
392 | (2) |
|
|
|
394 | (2) |
|
Removable Storage Devices |
|
|
396 | (2) |
|
Installing and Checking for a New Drive |
|
|
398 | (1) |
|
Understanding Drive Status |
|
|
399 | (2) |
|
Working with Basic, Dynamic, and Virtual Disks |
|
|
401 | (1) |
|
Using Basic and Dynamic Disks |
|
|
401 | (1) |
|
Special Considerations for Basic and Dynamic Disks |
|
|
402 | (1) |
|
|
|
402 | (2) |
|
Reactivating Dynamic Disks |
|
|
404 | (1) |
|
|
|
404 | (1) |
|
Moving a Dynamic Disk to a New System |
|
|
404 | (1) |
|
Managing Virtual Hard Disks |
|
|
405 | (1) |
|
Using Basic Disks and Partitions |
|
|
406 | (1) |
|
|
|
406 | (1) |
|
Creating Partitions and Simple Volumes |
|
|
407 | (3) |
|
|
|
410 | (1) |
|
Compressing Drives and Data |
|
|
411 | (1) |
|
|
|
412 | (1) |
|
Compressing Directories and Files |
|
|
412 | (1) |
|
Expanding Compressed Drives |
|
|
412 | (1) |
|
Expanding Compressed Directories and Files |
|
|
413 | (1) |
|
Encrypting Drives and Data |
|
|
413 | (1) |
|
Understanding Encryption and the Encrypting File System |
|
|
414 | (1) |
|
Encrypting Directories and Files |
|
|
415 | (1) |
|
Working with Encrypted Files and Folders |
|
|
416 | (1) |
|
Configuring Recovery Policy |
|
|
417 | (1) |
|
Decrypting Files and Directories |
|
|
418 | (1) |
|
Chapter 11 Configuring Volumes and RAID Arrays |
|
|
419 | (38) |
|
Using Volumes and Volume Sets |
|
|
420 | (1) |
|
Understanding Volume Basics |
|
|
420 | (2) |
|
Understanding Volume Sets |
|
|
422 | (2) |
|
Creating Volumes and Volume Sets |
|
|
424 | (2) |
|
Deleting Volumes and Volume Sets |
|
|
426 | (1) |
|
|
|
426 | (1) |
|
Improving Performance and Fault Tolerance with RAID |
|
|
426 | (1) |
|
Implementing RAID on Windows Server 2012 |
|
|
427 | (1) |
|
Implementing RAID-0: Disk Striping |
|
|
427 | (1) |
|
Implementing RAID-1: Disk Mirroring |
|
|
428 | (3) |
|
Implementing RAID-5: Disk Striping with Parity |
|
|
431 | (1) |
|
Managing RAID and Recovering from Failures |
|
|
432 | (1) |
|
|
|
432 | (1) |
|
Resynchronizing and Repairing a Mirrored Set |
|
|
432 | (1) |
|
Repairing a Mirrored System Volume to Enable Boot |
|
|
433 | (1) |
|
|
|
434 | (1) |
|
Repairing a Striped Set Without Parity |
|
|
434 | (1) |
|
Regenerating a Striped Set with Parity |
|
|
434 | (1) |
|
Standards-Based Storage Management |
|
|
435 | (1) |
|
Getting Started with Standards-Based Storage |
|
|
435 | (1) |
|
Working with Standards-Based Storage |
|
|
436 | (2) |
|
Creating Storage Pools and Allocating Space |
|
|
438 | (1) |
|
|
|
439 | (1) |
|
Creating a Virtual Disk in a Storage Space |
|
|
440 | (1) |
|
Creating a Standard Volume |
|
|
441 | (2) |
|
Managing Existing Partitions and Drives |
|
|
443 | (1) |
|
Assigning Drive Letters and Paths |
|
|
443 | (1) |
|
Changing or Deleting the Volume Label |
|
|
444 | (1) |
|
Deleting Partitions and Drives |
|
|
445 | (1) |
|
Converting a Volume to NTFS |
|
|
445 | (2) |
|
Resizing Partitions and Volumes |
|
|
447 | (2) |
|
Repairing Disk Errors and Inconsistencies Automatically |
|
|
449 | (4) |
|
Analyzing and Optimizing Disks |
|
|
453 | (4) |
|
Chapter 12 Data Sharing, Security, and Auditing |
|
|
457 | (62) |
|
Using and Enabling File Sharing |
|
|
458 | (3) |
|
Configuring Standard File Sharing |
|
|
461 | (1) |
|
|
|
461 | (2) |
|
Creating Shared Folders in Computer Management |
|
|
463 | (3) |
|
Creating Shared Folders in Server Manager |
|
|
466 | (2) |
|
Changing Shared Folder Settings |
|
|
468 | (1) |
|
Managing Share Permissions |
|
|
469 | (1) |
|
Various Share Permissions |
|
|
469 | (1) |
|
Viewing and Configuring Share Permissions |
|
|
470 | (4) |
|
|
|
474 | (1) |
|
Understanding Special Shares |
|
|
474 | (1) |
|
Connecting to Special Shares |
|
|
475 | (1) |
|
Viewing User and Computer Sessions |
|
|
476 | (2) |
|
Stopping File and Folder Sharing |
|
|
478 | (1) |
|
|
|
479 | (2) |
|
|
|
481 | (1) |
|
Understanding Shadow Copies |
|
|
481 | (1) |
|
|
|
482 | (1) |
|
|
|
482 | (1) |
|
Reverting an Entire Volume to a Previous Shadow Copy |
|
|
483 | (1) |
|
|
|
483 | (1) |
|
|
|
483 | (1) |
|
Connecting to Network Drives |
|
|
484 | (1) |
|
|
|
484 | (1) |
|
Disconnecting a Network Drive |
|
|
485 | (1) |
|
Object Management, Ownership, and Inheritance |
|
|
485 | (1) |
|
Objects and Object Managers |
|
|
485 | (1) |
|
Object Ownership and Transfer |
|
|
486 | (1) |
|
|
|
487 | (1) |
|
File and Folder Permissions |
|
|
488 | (1) |
|
Understanding File and Folder Permissions |
|
|
489 | (2) |
|
Setting Basic File and Folder Permissions |
|
|
491 | (2) |
|
Setting Special Permissions on Files and Folders |
|
|
493 | (3) |
|
Setting Claims-Based Permissions |
|
|
496 | (2) |
|
Auditing System Resources |
|
|
498 | (1) |
|
Setting Auditing Policies |
|
|
498 | (2) |
|
Auditing Files and Folders |
|
|
500 | (2) |
|
|
|
502 | (1) |
|
Auditing Active Directory Objects |
|
|
502 | (1) |
|
Using, Configuring, and Managing NTFS Disk Quotas |
|
|
503 | (1) |
|
Understanding NTFS Disk Quotas and How NTFS Quotas Are Used |
|
|
504 | (2) |
|
Setting NTFS Disk Quota Policies |
|
|
506 | (2) |
|
Enabling NTFS Disk Quotas on NTFS Volumes |
|
|
508 | (2) |
|
Viewing Disk Quota Entries |
|
|
510 | (1) |
|
Creating Disk Quota Entries |
|
|
510 | (2) |
|
Deleting Disk Quota Entries |
|
|
512 | (1) |
|
Exporting and Importing NTFS Disk Quota Settings |
|
|
512 | (1) |
|
Disabling NTFS Disk Quotas |
|
|
513 | (1) |
|
Using, Configuring, and Managing Resource Manager Disk Quotas |
|
|
513 | (1) |
|
Understanding Resource Manager Disk Quotas |
|
|
514 | (1) |
|
Managing Disk Quota Templates |
|
|
515 | (3) |
|
Creating Resource Manager Disk Quotas |
|
|
518 | (1) |
|
Chapter 13 Data Backup and Recovery |
|
|
519 | (40) |
|
Creating a Backup and Recovery Plan |
|
|
519 | (1) |
|
Figuring Out a Backup Plan |
|
|
519 | (2) |
|
The Basic Types of Backup |
|
|
521 | (1) |
|
Differential and Incremental Backups |
|
|
522 | (1) |
|
Selecting Backup Devices and Media |
|
|
522 | (1) |
|
|
|
523 | (1) |
|
Buying and Using Backup Media |
|
|
524 | (1) |
|
Selecting a Backup Utility |
|
|
525 | (1) |
|
Backing Up Your Data: The Essentials |
|
|
526 | (1) |
|
Installing the Windows Backup and Recovery Utilities |
|
|
526 | (1) |
|
Getting Started with Windows Server Backup |
|
|
527 | (2) |
|
Getting Started with the Backup Command-Line Utility |
|
|
529 | (2) |
|
Working with Wbadmin Commands |
|
|
531 | (1) |
|
Using General-Purpose Commands |
|
|
531 | (1) |
|
Using Backup Management Commands |
|
|
532 | (1) |
|
Using Recovery Management Commands |
|
|
533 | (1) |
|
Performing Server Backups |
|
|
534 | (1) |
|
Configuring Scheduled Backups |
|
|
535 | (3) |
|
Modifying or Stopping Scheduled Backups |
|
|
538 | (1) |
|
Creating and Scheduling Backups with Wbadmin |
|
|
538 | (2) |
|
|
|
540 | (1) |
|
Recovering Your Server from Hardware or Startup Failure |
|
|
541 | (3) |
|
Recovering from a Failed Start |
|
|
544 | (1) |
|
Starting a Server in Safe Mode |
|
|
544 | (2) |
|
Backing Up and Restoring the System State |
|
|
546 | (1) |
|
Restoring Active Directory |
|
|
547 | (1) |
|
Restoring the Operating System and the Full System |
|
|
547 | (3) |
|
Restoring Applications, Nonsystem Volumes, and Files and Folders |
|
|
550 | (1) |
|
Managing Encryption Recovery Policy |
|
|
551 | (1) |
|
Understanding Encryption Certificates and Recovery Policy |
|
|
551 | (2) |
|
Configuring the EFS Recovery Policy |
|
|
553 | (1) |
|
Backing Up and Restoring Encrypted Data and Certificates |
|
|
554 | (1) |
|
Backing Up Encryption Certificates |
|
|
554 | (1) |
|
Restoring Encryption Certificates |
|
|
555 | (4) |
|
PART IV WINDOWS SERVER 2012 NETWORK ADMINISTRATION |
|
|
|
Chapter 14 Managing TCP/IP Networking |
|
|
559 | (14) |
|
Navigating Networking in Windows Server 2012 |
|
|
559 | (3) |
|
Managing Networking in Windows 8 and Windows Server 2012 |
|
|
562 | (3) |
|
Installing TCP/IP Networking |
|
|
565 | (1) |
|
Configuring TCP/IP Networking |
|
|
566 | (1) |
|
Configuring Static IP Addresses |
|
|
566 | (2) |
|
Configuring Dynamic IP Addresses and Alternate IP Addressing |
|
|
568 | (1) |
|
Configuring Multiple Gateways |
|
|
569 | (1) |
|
Configuring Networking for Hyper-V |
|
|
570 | (1) |
|
Managing Network Connections |
|
|
571 | (1) |
|
Checking the Status, Speed, and Activity for Network Connections |
|
|
571 | (1) |
|
Enabling and Disabling Network Connections |
|
|
572 | (1) |
|
Renaming Network Connections |
|
|
572 | (1) |
|
Chapter 15 Running DHCP Clients and Servers |
|
|
573 | (42) |
|
|
|
573 | (1) |
|
Using Dynamic IPv4 Addressing and Configuration |
|
|
573 | (2) |
|
Using Dynamic IPv6 Addressing and Configuration |
|
|
575 | (3) |
|
Checking IP Address Assignment |
|
|
578 | (1) |
|
|
|
578 | (1) |
|
|
|
579 | (1) |
|
Installing DHCP Components |
|
|
579 | (2) |
|
Starting and Using the DHCP Console |
|
|
581 | (1) |
|
Connecting to Remote DHCP Servers |
|
|
582 | (1) |
|
Starting and Stopping a DHCP Server |
|
|
583 | (1) |
|
Authorizing a DHCP Server in Active Directory |
|
|
583 | (1) |
|
|
|
584 | (1) |
|
Configuring Server Bindings |
|
|
584 | (1) |
|
|
|
584 | (1) |
|
DHCP Auditing and Troubleshooting |
|
|
585 | (1) |
|
|
|
586 | (2) |
|
|
|
588 | (3) |
|
Avoiding IP Address Conflicts |
|
|
591 | (1) |
|
Saving and Restoring the DHCP Configuration |
|
|
591 | (1) |
|
|
|
592 | (1) |
|
Creating and Managing Superscopes |
|
|
592 | (1) |
|
Creating and Managing Scopes |
|
|
593 | (9) |
|
Creating and Managing Failover Scopes |
|
|
602 | (3) |
|
Managing the Address Pool, Leases, and Reservations |
|
|
605 | (1) |
|
|
|
605 | (1) |
|
Enabling and Configuring MAC Address Filtering |
|
|
606 | (1) |
|
Setting a New Exclusion Range |
|
|
607 | (1) |
|
|
|
608 | (1) |
|
Modifying Reservation Properties |
|
|
609 | (1) |
|
Deleting Leases and Reservations |
|
|
610 | (1) |
|
Backing Up and Restoring the DHCP Database |
|
|
610 | (1) |
|
Backing Up the DHCP Database |
|
|
610 | (1) |
|
Restoring the DHCP Database from Backup |
|
|
611 | (1) |
|
Using Backup and Restore to Move the DHCP Database to a New Server |
|
|
611 | (1) |
|
Forcing the DHCP Server Service to Regenerate the DHCP Database |
|
|
612 | (1) |
|
Reconciling Leases and Reservations |
|
|
612 | (3) |
|
Chapter 16 Optimizing DNS |
|
|
615 | (36) |
|
|
|
615 | (1) |
|
Integrating Active Directory and DNS |
|
|
616 | (1) |
|
Enabling DNS on the Network |
|
|
617 | (3) |
|
Configuring Name Resolution on DNS Clients |
|
|
620 | (1) |
|
|
|
621 | (1) |
|
Installing and Configuring the DNS Server Service |
|
|
622 | (2) |
|
Configuring a Primary DNS Server |
|
|
624 | (3) |
|
Configuring a Secondary DNS Server |
|
|
627 | (1) |
|
Configuring Reverse Lookups |
|
|
628 | (1) |
|
|
|
629 | (2) |
|
|
|
631 | (1) |
|
Adding and Removing Servers to Manage |
|
|
631 | (1) |
|
Starting and Stopping a DNS Server |
|
|
632 | (1) |
|
Using DNSSEC and Signing Zones |
|
|
632 | (2) |
|
Creating Child Domains Within Zones |
|
|
634 | (1) |
|
Creating Child Domains in Separate Zones |
|
|
635 | (1) |
|
Deleting a Domain or Subnet |
|
|
636 | (1) |
|
|
|
636 | (1) |
|
Adding Address and Pointer Records |
|
|
637 | (1) |
|
Adding DNS Aliases with CNAME |
|
|
638 | (1) |
|
Adding Mail Exchange Servers |
|
|
638 | (1) |
|
|
|
639 | (1) |
|
Viewing and Updating DNS Records |
|
|
640 | (1) |
|
Updating Zone Properties and the SOA Record |
|
|
641 | (1) |
|
|
|
641 | (2) |
|
Allowing and Restricting Zone Transfers |
|
|
643 | (1) |
|
Notifying Secondaries of Changes |
|
|
644 | (1) |
|
|
|
645 | (1) |
|
Enabling and Disabling Dynamic Updates |
|
|
645 | (1) |
|
Managing DNS Server Configuration and Security |
|
|
645 | |
|
Enabling and Disabling IP Addresses for a DNS Server |
|
|
546 | (100) |
|
Controlling Access to DNS Servers Outside the Organization |
|
|
646 | (2) |
|
Enabling and Disabling Event Logging |
|
|
648 | (1) |
|
Using Debug Logging to Track DNS Activity |
|
|
648 | (1) |
|
|
|
649 | (2) |
| Index |
|
651 | |