| Preface |
|
vii | |
|
1 Windows Server 2012: Overview |
|
|
1 | (10) |
|
Introducing Windows Server 2012 |
|
|
1 | (1) |
|
New Capabilities and Updated Features |
|
|
2 | (1) |
|
Installation and Interface |
|
|
2 | (1) |
|
|
|
3 | (1) |
|
|
|
4 | (1) |
|
|
|
5 | (1) |
|
|
|
5 | (1) |
|
|
|
5 | (1) |
|
|
|
6 | (2) |
|
|
|
8 | (1) |
|
|
|
9 | (1) |
|
|
|
9 | (1) |
|
|
|
10 | (1) |
|
|
|
10 | (1) |
|
2 Windows Server 2012 Requirements and Installation |
|
|
11 | (28) |
|
|
|
11 | (1) |
|
|
|
12 | (1) |
|
|
|
12 | (1) |
|
|
|
13 | (1) |
|
|
|
13 | (1) |
|
|
|
13 | (1) |
|
|
|
14 | (1) |
|
|
|
14 | (2) |
|
|
|
16 | (9) |
|
Server with a GUI Install |
|
|
25 | (3) |
|
Switching Between Install Modes |
|
|
28 | (1) |
|
Converting Server Core to Server with a GUI |
|
|
29 | (4) |
|
Converting Server with a GUI to Server Core |
|
|
33 | (1) |
|
Deploying Minimal Server Interface |
|
|
34 | (1) |
|
Customizing the Interface with Features on Demand |
|
|
35 | (2) |
|
|
|
37 | (2) |
|
|
|
39 | (28) |
|
|
|
40 | (2) |
|
Navigating the Tiled Interface |
|
|
42 | (3) |
|
Accessing and Running Management Tools |
|
|
45 | (1) |
|
Customizing the Interface |
|
|
46 | (4) |
|
Logging Off, Restarting, and Shutting Down |
|
|
50 | (1) |
|
|
|
51 | (1) |
|
|
|
52 | (1) |
|
Launching and Working with Server Manager |
|
|
52 | (9) |
|
Managing Server 2012 Remotely |
|
|
61 | (1) |
|
|
|
62 | (3) |
|
|
|
65 | (2) |
|
|
|
67 | (26) |
|
Deploying Active Directory Domain Services |
|
|
68 | (1) |
|
Installing Active Directory |
|
|
68 | (6) |
|
Adding Machines to a Server 2012 Domain |
|
|
74 | (1) |
|
Joining Windows 7 to a Server 2012-Level Domain |
|
|
74 | (3) |
|
Joining Windows 8 to a Server 2012-Level Domain |
|
|
77 | (2) |
|
Joining Server 2012 to a Server 2008 R2-Level Domain |
|
|
79 | (1) |
|
Managing Active Directory |
|
|
79 | (1) |
|
|
|
80 | (4) |
|
|
|
84 | (2) |
|
Performing Searches in ADAC |
|
|
86 | (2) |
|
Windows PowerShell History |
|
|
88 | (1) |
|
Using PowerShell to Deploy Active Directory |
|
|
89 | (2) |
|
|
|
91 | (2) |
|
5 Managing Users and Data with Dynamic Access Control |
|
|
93 | (20) |
|
The Building Blocks of DAC |
|
|
94 | (1) |
|
Requirements and Predeployment Pointers |
|
|
95 | (1) |
|
|
|
96 | (1) |
|
|
|
96 | (1) |
|
Configuring Resource Property for Files |
|
|
97 | (2) |
|
Adding a Resource Property to the Global Resource Property List |
|
|
99 | (1) |
|
Creating a New Central Access Rule |
|
|
99 | (2) |
|
Creating a Central Access Policy |
|
|
101 | (1) |
|
Publishing a Central Access Policy |
|
|
101 | (1) |
|
Configuring the File Server |
|
|
102 | (1) |
|
Adding the Central Access Policy to the Folder |
|
|
102 | (1) |
|
Validating the Configuration |
|
|
102 | (3) |
|
Access Denied Remediation |
|
|
105 | (1) |
|
Deploying Access Denied Remediation |
|
|
106 | (1) |
|
|
|
107 | (2) |
|
Automatic File Classification |
|
|
109 | (2) |
|
Encrypting Classified Data |
|
|
111 | (1) |
|
|
|
111 | (2) |
|
6 Storage Management and Clustering |
|
|
113 | (18) |
|
|
|
114 | (1) |
|
|
|
115 | (2) |
|
|
|
117 | (2) |
|
Installing Failover Clustering |
|
|
119 | (1) |
|
|
|
119 | (7) |
|
|
|
126 | (2) |
|
|
|
128 | (3) |
|
|
|
131 | (24) |
|
|
|
133 | (1) |
|
Installing the Hyper-V Role |
|
|
134 | (3) |
|
Creating and Configuring Virtual Machines |
|
|
137 | (1) |
|
Configuring Virtual Disks |
|
|
137 | (2) |
|
Creating Virtual Machines |
|
|
139 | (2) |
|
Managing Virtual Machines and Virtual Disks |
|
|
141 | (1) |
|
Live-Migrating Virtual Machines |
|
|
141 | (3) |
|
|
|
144 | (2) |
|
Cloning Virtual Domain Controllers |
|
|
146 | (3) |
|
|
|
149 | (1) |
|
Performance and Virtual Network Management |
|
|
150 | (1) |
|
|
|
150 | (3) |
|
|
|
153 | (2) |
|
|
|
155 | (30) |
|
|
|
157 | (1) |
|
|
|
157 | (1) |
|
|
|
158 | (5) |
|
|
|
163 | (12) |
|
|
|
175 | (3) |
|
|
|
178 | (2) |
|
|
|
180 | (1) |
|
Hyper-V Extensible Network Switch |
|
|
180 | (1) |
|
Configuring Private VLANs |
|
|
180 | (3) |
|
|
|
183 | (2) |
|
|
|
185 | (32) |
|
|
|
185 | (2) |
|
|
|
187 | (1) |
|
|
|
187 | (1) |
|
|
|
188 | (1) |
|
|
|
189 | (6) |
|
|
|
195 | (1) |
|
|
|
196 | (1) |
|
|
|
196 | (3) |
|
Configuring the Windows Firewall |
|
|
199 | (1) |
|
Deploying the BranchCache Role via Server Manager |
|
|
200 | (1) |
|
Deploying the BranchCache Role with PowerShell |
|
|
200 | (2) |
|
Prepping and Testing Client Connectivity |
|
|
202 | (1) |
|
Virtual Desktop Infrastructure |
|
|
202 | (3) |
|
Remote Desktop Services (RDS) |
|
|
205 | (1) |
|
Remote Desktop Services Install |
|
|
205 | (5) |
|
Remote Desktop Services Management |
|
|
210 | (2) |
|
Associating Apps to a Collection and Publishing Remote Apps |
|
|
212 | (1) |
|
Adding Published Apps to the RD Web Folder |
|
|
213 | (1) |
|
Connecting Clients to Remote Apps |
|
|
214 | (2) |
|
|
|
216 | (1) |
|
|
|
216 | (1) |
|
10 Troubleshooting, Securing, and Monitoring |
|
|
217 | (16) |
|
|
|
218 | (1) |
|
|
|
218 | (2) |
|
|
|
220 | (2) |
|
|
|
222 | (1) |
|
|
|
223 | (1) |
|
|
|
224 | (5) |
|
|
|
229 | (1) |
|
|
|
229 | (2) |
|
Other Security Enhancements |
|
|
231 | (1) |
|
|
|
232 | (1) |
| Index |
|
233 | |