Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by William R. Stanek
Microsoft® Windows Server™ 2003 Inside Out
Microsoft® Windows Server™ 2003 Inside Out
SPECIAL OFFER: Upgrade this ebook with O’Reilly
A Note Regarding Supplemental Files
Acknowledgments
We'd Like to Hear from You!
About the CD
What's on the CD
Using the CD
Support Information
Conventions and Features Used in this Book
Text Conventions
Design Conventions
About the Author
1. Windows Server 2003 Overview and Planning
1. Introducing Windows Server 2003
What's New in Windows Server 2003
Windows Server 2003, Standard Edition
Windows Server 2003, Enterprise Edition
Windows Server 2003, Datacenter Edition
Windows Server 2003, Web Edition
64-Bit Computing
.NET Technologies
.NET Framework Technologies
.NET Framework Layers
Windows XP and Windows Server 2003
Windows XP Editions
Windows XP and Active Directory
Installing Windows Server 2003 Administration Tools on Windows XP
Increased Support for Standards
IPv6 Support
IETF Security Standards Support
XML Web Services Support
Interface and Tool Improvements
Simple and Classic Start Menus
Improvements for Active Directory Tools
Other Tool Improvements
Active Directory Improvements
Domains Can Be Renamed
Active Directory Can Replicate Selectively
Active Directory–Integrated DNS Zones Can Forward Conditionally
Active Directory Schema Objects Can Be Deleted
Active Directory and Global Catalog Are Optimized
Active Directory Can Compress and Route Selectively
Forest-to-Forest Trusts
Active Directory Migration Made Easier
Group Policy Improvements
Group Policy Management Console
Software Restriction Policies in Group Policy
Policy Changes for User Profiles
Management and Administration Extras
Remote Administration Gets a Face-Lift
Enhanced File Management by Using DFS
Improved Storage and File System Options
Changes for Terminal Services
Printer Queue Redundancy
Remote Installation Services
Headless Servers and Out-of-Band Management
Security Advances
Windows Server 2003 Feature Lock Down
IPSec and Wireless Security
Microsoft .NET Passport Support
Reliability and Maintenance Enhancements
Automatic System Recovery
Automatic Updates
Improved Verification and System Protection
2. Planning for Windows Server 2003
Overview of Planning
The Microsoft Solutions Framework Process Model
Your Plan: The Big Picture
Identifying Your Organizational Teams
Microsoft Solutions Framework Team Model
Your Project Team
Assessing Project Goals
The Business Perspective
Identifying IT Goals
Examining IT–Business Interaction
Predicting Network Change
Analyzing the Existing Network
Evaluating the Network Infrastructure
Assessing Systems
Identify Network Services and Applications
Identifying Security Infrastructure
Reviewing Network Administration
Network Administrative Model
Disaster Recovery
Network Management Tools
Defining Objectives and Scope
Specifying Organizational Objectives
Setting the Schedule
Shaping the Budget
Allowing for Contingencies
Finalizing Project Scope
Defining the New Network Environment
Defining Domain and Security Architecture
Assess Domain Architecture and Changes
Impact on Network
Identify Security Requirements
Changing the Administrative Approach
Management Tools
Select and Implement Standards
Change Management
Thinking about Active Directory
Designing the Active Directory Namespace
Managing Domain Trusts
Identifying Domain and Forest Functional Level
Defining Active Directory Server Roles
Planning for Server Usage
Server Roles
Determining Which Windows Edition to Use
Using Windows Server 2003, Standard Edition
Using Windows Server 2003, Enterprise Edition
Using Windows Server 2003, Datacenter Edition
Using Windows Server 2003, Web Edition
Selecting a Software Licensing Program
Retail Product Licenses
Volume-Licensing Programs
Open License Program
Select License
Enterprise Agreement License
Software Assurance
Final Considerations for Planning and Deployment
2. Windows Server 2003 Installation
3. Preparing for the Installation and Getting Started
Getting a Quick Start
New Features and Enhancements
Setup Methods
Setup Programs
Controlling Setup from the Command Line
Winnt Command-Line Parameters
Winnt32 Command-Line Parameters
Tools for Automating Setup
Product Licensing
Preparing for Windows Server 2003 Installation
System Hardware Requirements
How a Clean Installation and an Upgrade Differ
Supported Upgrade Paths
Using Dynamic Update
Creating a Local Dynamic Update Share
Controlling the Use of Dynamic Update during Setup
Selecting a Distribution Method
Getting Ready for Automated Installations
Creating Distribution Folders
Using Answer Files in Automated Installations
Preinstallation Tasks
4. Managing Interactive Installations
Windows Installation Considerations
Installation on x86-Based Systems
Installation on 64-Bit Systems
Checking System Compatibility
Planning Partitions
Naming Computers
Network and Domain Membership Options
Protocols
Domain Membership
Networking Components
Performing an Interactive Installation
Installation Sequence
Activation Sequence
Activate Windows over the Internet
Activate Windows by Telephone
Troubleshooting Installation
Start with the Potential Points of Failure
Setup Refuses to Install or Start
Setup Reports a Media or CD-ROM Error
Setup Reports Insufficient System Resources
Setup Cannot Connect to a Domain Controller
Continue Past Lockups and Freezes
Configuring Server Roles
Installing Additional Components Manually
Postinstallation
5. Managing Unattended Installations
Automating Setup
Determining the Method of Automation
Establishing the Distribution Folders
Types of Answer Files
Using Setup Manager for Answer Files
Creating the Answer File
Examining Answer Files
Managing Unattended Installations
Customizing the Distribution Folder
Preinstalling Service Packs
Preinstalling Hot Fixes and Security Updates
Including Updated Drivers
Performing Other Preinstallation Tasks
Renaming Files and Folders When Using Winnt
Using Dynamic Update in Unattended Installations
Distribution Folder on CD
Using CD Media for Automated Installations
Answer File Settings Used in Product CD–Based Unattended Installations
Using an Answer File
Starting the Unattended Installation
Extending the Unattend.txt File
6. Using Remote Installation Services
Introduction to RIS
Services and Protocols Used by RIS
Limitations of RIS
Operating Systems Installable by Using RIS
Designing the RIS Environment
Building a RIS Server: What's Involved
Installing RIS
RIS Server Requirements
Performing the Install
Preparing and Installing RIS
Configuring the RIS Server
Initial RIS Configuration
Customizing RIS
Controlling Access to RIS Servers
Applying Security Permissions to RIS
Authorizing Users to Create New Computer Accounts
Creating a RIS Installers Group
Adding Members to the RISInstallers Group
Configuring RIS Clients
Customizing Installation Options
Configuring RIS Settings in Group Policy
Creating a RIBF Disk
Prestaging Clients in Active Directory
Preparing RIS-Based Installations
Using RIS Images
Restricting Access to RIS Images
OS Images Created by Using RISetup
Configuring a RISetup OS Image
Installed (File-System-Based) Image by RIPrep
System Settings Stored in RIPrep Images
Requirements for Creating a RIPrep Image
HAL Compatibility and RIPrep Images
Creating the Master Installation
Using RIPrep to Create an OS Image
Adding "Flat" or "CD-ROM" Images to RIS
RIS Answer Files
The Ristndrd.sif File
The RIPrep.sif file
The Remboot.sif File
Associating an Answer File with a RIS Image
Configuring the CIW
Using RIS for Automated Installations
Installing Windows Using RIS
More RIS Customization Tips
Using $OEM$ for Hot Fixes, Security Updates, Drivers, and More
Customizing the Client Installation Pages
Using Unsigned NIC Drivers
Working with Sysprep
Understanding Sysprep
Using Sysprep to Clone a Computer
Copying the Administrator Profile
Running Sysprep
3. Windows Server 2003 Upgrades and Migrations
7. Preparing for Upgrades and Migration
Deciding Between Upgrading and Migrating
Verifying Hardware and Software Compatibility
Additional Research
Preparing for an Upgrade from Windows 2000 to Windows Server 2003
Upgrading Windows 2000 Forests and Domains
Upgrading Domain Controllers
Applications on Upgraded Servers
Selecting Upgrade or Migration Path
Upgrading vs. Migrating
Review System Requirements and Compatibility
Check Drive Partitioning
Choosing Domain and Forest Functional Levels
Identify DNS Namespace and Storage
Identify Server Roles
Preparing for an Upgrade from Windows NT 4 to Windows Server 2003
Namespace in Windows NT vs. Active Directory
Moving from Windows NT Domains to Active Directory
Restructuring Domains
Upgrading Windows NT 4 Servers
8. Upgrading to Windows Server 2003
General Considerations for Upgrades
Upgrade Issues
Verify an Upgrade Recovery Plan
Upgrading from Windows 2000
General Upgrade Preparation Tools
Active Directory Preparation Tool
Updating the Active Directory Forest and Domains
Preparing the Forest
Preparing the Domain(s)
Upgrading the Windows 2000 Domain Controllers
Upgrading Windows 2000 Domains
Selecting Active Directory Functional Levels
Changing Operations Masters
Upgrading Windows 2000 Users and Groups
Windows 2000 Member Server Upgrades
Upgrading DNS Services
Upgrading from Windows NT 4
Determine Server Hardware Compatibility
Upgrading Different Versions of Windows NT 4
Managing Disk Partitions
Upgrading Domain Controllers
Establishing Operations Masters
Converting Windows NT 4 Groups to Windows Server 2003 Groups
Performing the Upgrade from Windows NT 4
Upgrade the PDC
Post-PDC Upgrade
9. Migrating to Windows Server 2003
Selecting the Migration Tools
ADMT
Other Microsoft Migration Tools
USMT
File and Settings Transfer Wizard
Migration Scripts
The Movetree Utility
Third-Party Migration Tools
General Considerations for Migrations
Determining the Approach to Migration
Preparing for Migration
Migrating Security Principals
Performing the Migration: An Overview
Migrating Group Accounts
Migrating Local Groups
Migrating Global Groups
Using the Group Account Migration Wizard
Migrating User Accounts
Running the User Account Migration Wizard
Migrating Passwords
Migrating the Computers
Running the Computer Migration Wizard
Merging Groups during Migration
Migrating Domain Trusts
Migrating a Trust
Migrating Service Accounts
Security Translation
Generating Migration Reports
4. Managing Windows Server 2003 Systems
10. Configuring Windows Server 2003
Optimizing the Menu System
Modifying the Start Menu Content
Adding, Copying, and Moving Menu Items
Highlighting and Hiding Menu Items
Controlling the Frequently Used Programs List
Sorting and Renaming Menu Items
Removing Items from the Start Menu
Customizing the Desktop and the Taskbar
Configuring Desktop Items
Configuring the Taskbar
Changing the Taskbar Size and Position
Using Auto Hide and Locking
Grouping Similar Taskbar Items
Controlling Programs in the Notification Area
Optimizing Toolbars
Customizing the Quick Launch Toolbar
Displaying Other Custom Toolbars
Creating Personal Toolbars
11. Windows Server 2003 MMC Administration
Introducing the MMC
Using the MMC
MMC Snap-Ins
MMC Modes
MMC Windows and Startup
MMC Tool Availability
MMC and Remote Computers
Building Custom MMCs
Step 1: Creating the Console
Step 2: Adding Snap-Ins to the Console
Step 3: Saving the Finished Console
Setting the Initial Console View Before Saving
Setting the Console Mode Before Saving
Setting the Console Icon Before Saving
Saving the Console Tool to the Desktop, the Start Menu, or a Folder
Designing Custom Taskpads for the MMC
Getting Started with Taskpads
Understanding Taskpad View Styles
Creating and Managing Taskpads
Creating and Managing Tasks
Creating Menu Command Tasks
Creating Shell Command Tasks
Creating Navigation Tasks
Arranging, Editing, and Removing Tasks
Publishing and Distributing Your Custom Tools
12. Managing Windows Server 2003
Using the Administration Tools
Understanding the Administration Tools
Using Configure Your Server
Using Manage Your Server
Using Computer Management
Computer Management System Tools
Computer Management Storage Tools
Computer Management Services And Applications Tools
Computer Management Essentials
Using the Control Panel Utilities
Using the Add Hardware Utility
Using the Add or Remove Programs Utility
Using the Date and Time Utility
Using the Display Utility
Using the Folder Options Utility
Using the Licensing Utility
Using the Network Connections Utility
Using the Regional and Language Options Utility
Using the Scheduled Tasks Utility
Task-Scheduling Essentials
Creating Scheduled Tasks
Using the System Utility
Using Support Tools
Using Resource Kit Tools
Using the Secondary Logon
Running Programs Using the Secondary Logon
Using the Secondary Logon at the Command Prompt
Running a Temporary Administrator's Desktop
Creating Run As Shortcuts for Secondary Logons
Creating Run As Shortcuts on the Desktop
Creating Run As Menu Options
13. Managing and Troubleshooting Hardware
Working with Device Drivers
Using Windows Device Drivers
Using Signed Device Drivers
Understanding and Changing Driver Installation Settings
Setting Up New Hardware Devices
Managing Plug and Play Detection and Installation
Installing the Software Automatically
Installing a Downloaded Driver
Choosing a Specific Driver or Bypassing the Default Driver
Installing Non–Plug and Play Devices
Obtaining Hardware Device Information
Viewing Device and Driver Details
Viewing Advanced, Resources, and Other Settings
Managing Installed Drivers
Updating a Device Driver
Rolling Back a Driver
Uninstalling and Reinstalling a Device Driver
Managing Devices through Hardware Profiles
Troubleshooting Hardware Devices and Drivers
Resolving Common Device Errors
Resolving Resource Conflicts
14. Managing the Registry
Introducing the Registry
Understanding the Registry Structure
Registry Root Keys
HKEY_LOCAL_MACHINE
HKLMHARDWARE
HKLMSAM
HKLMSECURITY
HKLMSOFTWARE
HKLMSYSTEM
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Registry Data: How It Is Stored and Used
Where Registry Data Comes From
Types of Registry Data Available
Managing the Registry
Searching the Registry
Modifying the Registry
Modifying Values
Adding Keys and Values
Removing Keys and Values
Modifying the Registry of a Remote Machine
Importing and Exporting Registry Data
Loading and Unloading Hive Files
Working with the Registry from the Command Line
Backing Up and Restoring the Registry
Choosing a Backup Method for the Registry
Creating Registry Backups
Recovering a System Using the ASR Backup
Maintaining the Registry
Using the Windows Installer CleanUp Utility
Using the Windows Installer Zapper
Removing Registry Settings for Active Installations That Have Failed
Removing Partial or Damaged Settings for Individual Applications
Securing the Registry
Preventing Access to the Registry Utilities
Applying Permissions to Registry Keys
Controlling Remote Registry Access
Auditing Registry Access
15. Performance Monitoring and Tuning
Tuning Performance, Memory Usage, and Data Throughput
Tuning Windows Operating System Performance
Tuning Processor Scheduling and Memory Usage
Tuning Data Throughput
Tuning Virtual Memory
Tracking a System's General Health
Task Manager and Process Resource Monitor Essentials
Getting Processor and Memory Usage for Troubleshooting
Getting Information on Running Applications
Monitoring and Troubleshooting Processes
Getting Network Usage Information
Getting Information on User and Remote User Sessions
Tracking Events and Troubleshooting by Using Event Viewer
Understanding the Event Logs
Accessing the Event Logs and Viewing Events
Viewing Event Logs on Remote Systems
Sorting, Finding, and Filtering Events
Sorting the Event Logs
Searching the Event Logs
Filtering the Event Logs
Archiving Event Logs
Tracking Events on Multiple Computers
Quick Look: Using Eventquery
Quick Look: Using EventComb
16. Comprehensive Performance Analysis and Logging
Establishing Performance Baselines
Comprehensive System Monitoring
Using System Monitor
Selecting Performance Objects and Counters to Monitor
Choosing Views and Controlling the Display
Monitoring Performance Remotely
Resolving Performance Bottlenecks
Resolving Memory Bottlenecks
Resolving Processor Bottlenecks
Resolving Disk I/O Bottlenecks
Resolving Network Bottlenecks
Performance Logging
Creating Performance Logs
Using Counter Logs
Monitoring Performance from the Command Line
Using Trace Logs
Analyzing Performance Logs
Analyzing Counter Logs
Analyzing Trace Logs
Creating Performance Alerts
5. Managing Windows Server 2003 Storage and File Systems
17. Planning for High Availability
Planning for Software Needs
Planning for Hardware Needs
Planning for Support Structures and Facilities
Planning for Day-to-Day Operations
Planning for Deploying Highly Available Servers
18. Preparing and Deploying Server Clusters
Introducing Server Clustering
Benefits and Limitations of Clustering
Cluster Organization
Cluster Operating Modes
Multisite Options for Clusters
Using Network Load Balancing
Using Network Load Balancing Clusters
Network Load Balancing Configuration
Network Load Balancing Client Affinity and Port Configurations
Planning Network Load Balancing Clusters
Managing Network Load Balancing Clusters
Creating a New Network Load Balancing Cluster
Adding Nodes to a Network Load Balancing Cluster
Removing Nodes from a Network Load Balancing Cluster
Configuring Event Logging for Network Load Balancing Clusters
Controlling Cluster and Host Traffic
Component Load Balancing Architecture
Using Component Load Balancing Clusters
Understanding Application Center
Planning Component Load Balancing Clusters
Using Server Cluster
Server Cluster Configurations
Server Cluster Resource Groups
Optimizing Hardware for Server Clusters
Optimizing Networking for Server Clusters
Running Server Clusters
The Cluster Service and Cluster Objects
The Cluster Heartbeat
The Cluster Database
The Cluster Quorum Resource
The Cluster Interface and Network States
Creating Server Clusters
Creating a Server Cluster
Add a Node to a Cluster
Managing Server Clusters and Their Resources
Creating Clustered Resources
Cluster Resource Types
Planning Resource Groups
Controlling the Cluster Service
Controlling Failover and Failback
Creating and Managing Resource Groups
Creating and Managing Resources
Scenario: Creating a Clustered Print Service
Scenario: Creating a Clustered File Share
19. Storage Management
Essential Storage Technologies
Using Internal and External Storage Devices
Improving Storage Management
Booting from SANs and Using SANs with Clusters
Meeting Performance, Capacity, and Availability Requirements
Configuring Storage
Using the Disk Management Tools
Adding New Disks
Using the MBR and GPT Partition Styles
Working with MBR Disks
Working with GPT Disks on 64-Bit Windows Editions
Using and Converting MBR and GPT Disks
Using the Basic and Dynamic Storage Types
Working with Basic and Dynamic Disks
Using and Converting Basic and Dynamic Disks
Converting FAT or FAT32 to NTFS
Managing MBR Disk Partitions on Basic Disks
Creating a Primary or Extended Partition
Creating a Logical Drive in an Extended Partition
Formatting a Partition, Logical Drive, or Volume
Configuring Drive Letters
Configuring Mount Points
Extending Partitions on Basic Disks
Deleting a Partition, Logical Drive, or Volume
Managing GPT Disk Partitions on Basic Disks
ESP
MSR Partitions
Primary Partitions
LDM Metadata and LDM Data Partitions
OEM or Unknown Partitions
Managing Volumes on Dynamic Disks
Creating a Simple or Spanned Volume
Extending a Simple or Spanned Volume
Recovering a Failed Simple or Spanned Disk
Moving Dynamic Disks
Configuring RAID 1: Disk Mirroring
Creating a Mirrored Set Using Two New Disks
Adding a Mirror to an Existing Volume
Mirroring Boot and System Volumes
Mirroring Boot and System Volumes on MBR Disks
Mirroring Boot and System Volumes on GPT Disks
Configuring RAID 5: Disk Striping with Parity
Breaking or Removing a Mirrored Set
Resolving Problems with Mirrored Sets
Repairing a Mirrored System Volume to Enable Boot
Rebuilding Mirrored System Volumes on MBR Disks
Rebuilding Mirrored System Volumes on GPT Disks
Resolving Problems with RAID-5 Sets
20. Managing Windows Server 2003 File Systems
Understanding Disk and File System Structure
Using FAT
File Allocation Table Structure
Feature FAT16 FAT32
Using NTFS
NTFS Structures
NTFS Features
Analyzing NTFS Structure
Advanced NTFS Features
Hard Links
Data Streams
Change Journals
Object Identifiers
Reparse Points
Remote Storage
Sparse Files
Using File-Based Compression
NTFS Compression
Compressed (Zipped) Folders
Managing Disk Quotas
How Quota Management Works
Configuring Disk Quotas
Customizing Quota Entries for Individual Users
Managing Disk Quotas After Configuration
Exporting and Importing Quota Entries
Maintaining File System Integrity
How File System Errors Occur
Fixing File System Errors by Using Check Disk
Analyzing FAT Volumes by Using ChkDsk
Analyzing NTFS Volumes by Using ChkDsk
Repairing Volumes and Marking Bad Sectors by Using ChkDsk
Defragmenting Disks
Fixing Fragmentation by Using Disk Defragmenter
Understanding the Fragmentation Analysis
21. File Sharing and Security
File Sharing Essentials
Using and Finding Shares
Hiding and Controlling Share Access
Special and Administrative Shares
C$, D$, E$, and Other Drive Shares
ADMIN$
FAXCLIENT and FXSSRVCP$
IPC$
NETLOGON
Microsoft UAM Volume
PRINT$
SYSVOL
Accessing Shares for Administration
Creating and Publishing Shared Folders
Creating Shares by Using Windows Explorer
Creating Shares by Using Computer Management
Publishing Shares in Active Directory
Managing Share Permissions
Understanding Share Permissions
Configuring Share Permissions
Managing File and Folder Permissions
File and Folder Ownership
Taking Ownership of a File or Folder
Transferring Ownership
Permission Inheritance for Files and Folders
Changing Shaded Permissions and Stopping Inheritance
Resetting and Replacing Permissions
Configuring File and Folder Permissions
Basic Permissions
Special Permissions
Determining Effective Permissions
Managing File Shares After Configuration
Tracking and Logging File Share Permissions by Using SrvCheck
Copying File Share Permissions
Sharing Files on the Web
Auditing File and Folder Access
Enabling Auditing for Files and Folders
Specifying Files and Folders to Audit
Monitoring the Security Logs
22. Using Volume Shadow Copy
Shadow Copy Essentials
Using Shadow Copies of Shared Folders
How Shadow Copies Works
Implementing Shadow Copies for Shared Folders
Managing Shadow Copies in Computer Management
Configuring Shadow Copies in Computer Management
Maintaining Shadow Copies After Configuration
Configuring Shadow Copies at the Command Line
Enabling Shadow Copying from the Command Line
Create Manual Snapshots from the Command Line
Viewing Shadow Copy Information
Deleting Snapshot Images from the Command Line
Disabling Shadow Copies from the Command Line
Using Shadow Copies on Clients
Obtaining and Installing the Client
Installing the Previous Versions Client
Installing the Shadow Copy Client
Accessing Shadow Copies on Clients
Restoring Shadow Copies from the Command Line
Searching for a File and Listing Available Versions
Locating and Restoring Previous Versions from the Command Line
23. Using Removable Media
Introducing Removable Media
Understanding Media Libraries
Understanding Media Pools
Working with the Removable Storage Snap-In
Understanding Media State and Identification
Understanding Access Permissions for Removable Storage
Managing Media Libraries and Media
Inserting Media into a Library
Ejecting Media from a Library
Mounting and Dismounting Media in Libraries
Enabling and Disabling Media
Enabling and Disabling Drives
Cleaning Drives
Working with Library Doors and Ports
Configuring Library Inventory
Starting Library Inventory
Changing Library Media Types
Enabling and Disabling Libraries
Managing Media Pools
Preparing Media for Use in the Free Media Pool
Moving Media to a Different Media Pool
Creating Application Media Pools
Changing the Media Type in a Media Pool
Setting Allocation and Deallocation Policies
Deleting Application Media Pools
Managing Work Queues, Requests, and Security
Using the Work Queue
Troubleshooting Waiting Operations
Changing Mount Operations
Controlling When Operations Are Deleted
Using the Operator Requests Queue
Notifying Operators of Requests
Completing or Refusing Requests
Controlling When Requests Are Deleted
Setting Access Permissions for Removable Storage
6. Managing Windows Server 2003 Networking and Print Services
24. Managing TCP/IP Networking
Understanding IP Addressing
Unicast IP Addresses
Class A Networks
Class B Networks
Class C Networks
Loopback, Public, and Private Addresses
Multicast IP Addresses
Broadcast IP Addresses
Special IP Addressing Rules
Using Subnets and Subnet Masks
Subnet Masks
Network Prefix Notation
Subnetting
Subnetting Class A Networks
Subnetting Class B Networks
Subnetting Class C Networks
Getting and Using IP Addresses
Understanding Name Resolution
Domain Name System
Host Names
Domain Names
Fully Qualified Domain Name (FQDN)
Name Resolution
Windows Internet Naming Service (WINS)
Configuring TCP/IP Networking
Preparing for Installation of TCP/IP Networking
Installing TCP/IP Networking
Configuring Static IP Addressing
Configuring Dynamic IP Addressing
Configuring Automatic Private IP Addressing
Configuring Advanced TCP/IP Settings
Configuring Advanced IP Settings
Configuring Advanced DNS Settings
Configuring Advanced WINS Settings
Configuring Advanced TCP/IP Options
25. Managing DHCP
DHCP Essentials
DHCP Security Considerations
Planning DHCP Implementations
DHCP Messages and Relay Agents
DHCP Availability and Fault Tolerance
50/50 Failover
80/20 Failover
100/100 Failover
Setting Up DHCP Servers
Installing the DHCP Server Service
Authorizing DHCP Servers in Active Directory
Creating and Configuring Scopes
Creating Normal Scopes Using the DHCP Console
Creating Normal Scopes Using Netsh
Using Exclusions
Using Reservations
Activating Scopes
Configuring TCP/IP Options
Levels of Options and Their Uses
Options Used by Windows Clients
Using Userand Vendor-Specific TCP/IP Options
Settings Options for All Clients
Settings Options for Routing and Remote Access Clients Only
Setting Add-On Options for Directly Connected Clients
Defining Classes to Get Different Option Sets
Creating the Class
Configuring Clients to Use the Class
Advanced DHCP Configuration and Maintenance
Configuring DHCP Audit Logging
Binding the DHCP Server Service to a Network Interface
Integrating DHCP and DNS
Enabling Conflict Detection on DHCP Servers
Saving and Restoring the DHCP Configuration
Managing and Maintaining the DHCP Database
Setting DHCP Database Properties
Backing Up and Restoring the Database
Repairing the DHCP Database
Setting Up DHCP Relay Agents
Configuring and Enabling Routing and Remote Access
Adding and Configuring the DHCP Relay Agent
26. Architecting DNS Infrastructure
DNS Essentials
Planning DNS Implementations
Public and Private Namespaces
Name Resolution Using DNS
DNS Resource Records
DNS Zones and Zone Transfers
Zones That Aren't Integrated with Active Directory
Zones That Are Integrated with Active Directory
Secondary Zones, Stub Zones, and Conditional Forwarding
Security Considerations
DNS Queries and Security
DNS Dynamic Updates and Security
External DNS Name Resolution and Security
Architecting a DNS Design
Split-Brain Design: Same Internal and External Names
Separate-Name Design: Different Internal and External Names
27. Implementing and Managing DNS
Installing the DNS Server Service
Using DNS with Active Directory
Using DNS Without Active Directory
DNS Setup
Configuring DNS Using the Wizard
Configuring a Small Network Using the Configure A DNS Server Wizard
Configuring a Large Network Using the Configure A DNS Server Wizard
Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers
Creating Forward Lookup Zones
Creating Reverse Lookup Zones
Configuring Forwarders and Conditional Forwarding
Configuring Subdomains and Delegating Authority
Configuring Zone Transfers
Configuring Secondary Notification
Adding Resource Records
Host Address (A) and Pointer (PTR) Records
Canonical Name (CNAME) Records
Mail Exchanger (MX) Records
Name Server (NS) Records
Start Of Authority (SOA) Records
Service Location (SRV) Records
Maintaining and Monitoring DNS
Configuring Default Application Directory Partitions and Replication Scope
Setting Aging and Scavenging
Configuring Logging and Checking DNS Server Logs
Troubleshooting DNS Client Service
Try Reregistering the Client
Check the Client's TCP/IP Configuration
Check the Client's Resolver Cache
Perform Lookups for Troubleshooting
Troubleshooting DNS Server Service
Check the Server's TCP/IP Configuration
Check the Server's Cache
Check Replication to Other Name Servers
Examine the Configuration of the DNS Server
Examine Zones and Zone Records
28. Implementing and Maintaining WINS
WINS Essentials
NetBIOS Namespace and Scope
NetBIOS Node Types
WINS Name Registration and Cache
WINS Implementation Details and New Features
Setting Up WINS Servers
Installing WINS
WINS Postinstallation Tasks
Configuring Replication Partners
Replication Essentials
Configuring Automatic Replication Partners
Using Designated Replication Partners
Configuring and Maintaining WINS
Configuring Burst Handling
Checking Server Status and Configuration
Checking Active Registrations and Scavenging Records
Maintaining the WINS Database
Verifying the WINS Database Consistency
Compacting the WINS Database
Backing Up the WINS Database
Restoring the WINS Database
Enabling WINS Lookups Through DNS
29. Installing and Maintaining Print Services
Understanding Windows Server 2003 Print Services
Print Services Changes for Windows Server 2003
Upgrading Windows NT 4 Print Servers to Windows Server 2003
Migrating Print Servers from One System to Another
Manually Migrating Print Servers
Automating Print Server Migration
Planning for Printer Deployments and Consolidation
Sizing Print Server Hardware and Optimizing Configuration
Sizing Printer Hardware and Optimizing Configuration
Setting Up Printers
Adding Local Printers
Adding Network-Attached Printers
Adding Standard TCP/IP Printers
Adding LPR Printers for UNIX and LPD
Adding AppleTalk Printers
Changing Standard TCP/IP Port Monitor Settings
Connecting Users to Shared Printers
Accessing Shared Printers on Windows 95, Windows 98, or Windows NT 4
Accessing Shared Printers on Windows 2000 or Later
Connecting to Shared Printers Using the Command Line and Scripts
Managing Printer Permissions
Understanding Printer Permissions
Configuring Printer Permissions
Assigning Printer Ownership
Auditing Printer Access
Managing Print Server Properties
Viewing and Creating Printer Forms
Viewing and Configuring Printer Ports
Viewing and Configuring Print Drivers
Configuring Print Spool, Logging, and Notification Settings
Managing Printer Properties
Setting General Properties, Printing Preferences, and Document Defaults
Setting Overlays and Watermarks for Documents
Installing and Updating Print Drivers on Clients
Configuring Printer Sharing and Publishing
Optimizing Printing Through Queues and Pooling
Configuring Queue Priority and Scheduling
Configuring Printer Pooling
Configuring Print Spooling
Viewing the Print Processor and Default Data Type
Configuring Separator Pages
Using Separator Pages
Setting a Separator Page
Customizing Separator Pages
Configuring Color Profiles
Managing Print Jobs
Pausing, Starting, and Canceling All Printing
Viewing Print Jobs
Managing Print Jobs
Printer Maintenance and Troubleshooting
Monitoring Print Server Performance
Preparing for Print Server Failure
Solving Printing Problems
Printer Troubleshooting Essentials
Comprehensive Printer Troubleshooting
Resolving Garbled or Incorrect Printing
30. Using Remote Desktop for Administration
Remote Desktop for Administration Essentials
Configuring Remote Desktop for Administration
Enabling Remote Desktop for Administration on Servers
Permitting and Restricting Remote Logon
Configuring Remote Desktop for Administration Through Group Policy
Supporting Remote Desktop Connection Clients
New Features for the Remote Desktop Connection Client
Installing Remote Desktop Connection Clients
Running the Remote Desktop Connection Client
Running Remote Desktops
Tracking Who's Logged On
31. Deploying Terminal Services
Using Terminal Services
Terminal Services Clients
Terminal Services Servers
Terminal Services Licensing
Designing the Terminal Services Infrastructure
Capacity Planning for Terminal Services
Planning Organizational Structure for Terminal Services
Deploying Single-Server Environments
Deploying Multi-Server Environments
Setting Up Terminal Services
Installing Terminal Services
Installing Applications for Clients to Use
Choosing Applications for Terminal Services Users
Application Licensing for Terminal Services Users
Installing Applications for Terminal Services Users
Using Application Compatibility Scripts
Modifying Applications After Installation
Enabling and Joining the Session Directory Service
Enable and Start the Terminal Services Session Directory Service
Authorize Terminal Servers to Use the Terminal Services Session Directory Service
Configure Each Server to Join the Session Directory
Setting Up a Terminal Services License Server
Considerations for Installing a Terminal Services License Server
Installing a Terminal Services License Server
Activating the License Server and Configuring Licenses for Use
Using the Terminal Services Configuration Tool
Configuring Global Connection Settings
Configuring Server Settings
Configuring Terminal Services Security
Auditing Terminal Services Access
Using the Terminal Services Manager
Connecting to Terminal Servers
Getting Terminal Services Information
Managing User Sessions in Terminal Services Manager
Managing Terminal Services from the Command Line
Gathering Terminal Services Information
Managing User Sessions from the Command Line
Other Useful Terminal Services Commands
Configuring Terminal Services Per-User Settings
Getting Remote Control of a User's Session
Setting Up the Terminal Services Profile for Users
7. Managing Active Directory and Security
32. Active Directory Architecture
Active Directory Physical Architecture
Active Directory Physical Architecture: A Top-Level View
Active Directory Within the Local Security Authority
Directory Service Architecture
Protocols and Client Interfaces
Directory System Agent and Database Layer
Extensible Storage Engine
Data Store Architecture
Active Directory Logical Architecture
Active Directory Objects
Active Directory Domains, Trees, and Forests
Active Directory Trusts
Active Directory Namespaces and Partitions
Active Directory Data Distribution
33. Designing and Managing the Domain Environment
Design Considerations for Active Directory Replication
Design Considerations for Active Directory Search and Global Catalogs
Searching the Tree
Accessing the Global Catalog
Designating Global Catalog Servers
Designating Replication Attributes
Design Considerations for Compatibility
Understanding Domain Functional Level
Understanding Forest Functional Level
Raising the Domain or Forest Functional Level
Design Considerations for Active Directory Authentication and Trusts
Universal Groups and Authentication
Understanding Security Tokens and Universal Group Membership Caching
Enabling Universal Group Membership Caching
NTLM and Kerberos Authentication
Establishing the Initial Authentication
Accessing Resources After Authentication
Authentication and Trusts Across Domain Boundaries
Two-Way Transitive Trusts
Shortcut Trusts
Authentication and Trusts Across Forest Boundaries
Examining Domain and Forest Trusts
Establishing External, Shortcut, Realm, and Cross-Forest Trusts
Verifying and Troubleshooting Trusts
Delegating Authentication
Delegated Authentication Essentials
Configuring Delegated Authentication
Configuring the Delegated User Account
Configuring the Delegated Service or Computer Account
Design Considerations for Active Directory Operations Masters
Operations Master Roles
Using, Locating, and Transferring the Schema Master Role
Using, Locating, and Transferring the Domain Naming Master Role
Using, Locating, and Transferring the Relative ID Master Role
Using, Locating, and Transferring the PDC Emulator Role
Using, Locating, and Transferring the Infrastructure Master Role
34. Organizing Active Directory
Creating an Active Directory Implementation or Update Plan
Developing a Forest Plan
Forest Namespace
Single vs. Multiple Forests
Forest Administration
Developing a Domain Plan
Domain Design Considerations
Single vs. Multiple Domains
Forest Root Domain Design Configurations
Changing Domain Design
Developing an Organizational Unit Plan
Using Organizational Units (OUs)
Using OUs for Delegation
Using OUs for Group Policy
Creating an OU Design
OU Design: Division or Business Unit Model
OU Design: Geographic Model
OU Design: The Cost Center Model
OU Design: The Administration Model
35. Configuring Active Directory Sites and Replication
Working with Active Directory Sites
Single Site vs. Multiple Sites
Replication Within and Between Sites
Determining Site Boundaries
Understanding Active Directory Replication
Replication Enhancements for Windows Server 2003
Replication Architecture: An Overview
Intrasite Replication Essentials
Intersite Replication Essentials
Replication Rings and Directory Partitions
Developing or Revising a Site Design
Mapping Network Infrastructure
Creating a Site Design
Mapping the Network Structure to Site Structure
Designing Each Individual Site
Designing the Intersite Replication Topology
Considering the Impact of Site Link Bridging
Planning the Placement of Servers in Sites
36. Implementing Active Directory
Preinstallation Considerations for Active Directory
Hardware and Configuration Considerations for Domain Controllers
Configuring Active Directory for Fast Recovery with Storage Area Networks
Connecting Clients to Active Directory
Installing Active Directory
Active Directory Installation Options and Issues
Using the Configure Your Server Wizard
Using the Active Directory Installation Wizard
Creating Additional Domain Controllers for an Existing Domain
Creating Domain Controllers in a New Domain
Using the Active Directory Installation Wizard with Backup Media
Uninstalling Active Directory
Creating and Managing Organizational Units (OUs)
Creating an OU
Setting OU Properties
Creating or Moving Accounts and Resources for Use with an OU
Delegating Administration of Domains and OUs
Understanding Delegation of Administration
Delegating Administration
37. Managing Users, Groups, and Computers
Managing Domain User Accounts
Types of Users
Configuring User Account Policies
Enforcing Password Policy
Configuring Account Lockout Policy
Setting Kerberos Policy
Understanding User Account Capabilities, Privileges, and Rights
Assigning User Rights
Assigning User Rights for a Domain or OU
Assigning User Rights on a Specific Computer
Creating and Configuring Domain User Accounts
Viewing and Setting User Account Properties
Obtaining Effective Permissions
Configuring Account Options
Configuring Profile Options
Managing User Profiles
Profile Essentials
Profile Changes and New Features
Group Policy Changes for User Profiles
Implementing and Creating Preconfigured Profiles
Configuring Local User Profiles
Configuring Roaming User Profiles
Implementing Mandatory User Profiles
Switching Between a Local and a Roaming User Profile
Managing User Data
Using Folder Redirection
Using Offline Files
Configuring Offline Files on File Servers
Configuring Offline Files on Clients
Configuring Offline Files in Group Policy
Managing File Synchronization
Maintaining User Accounts
Deleting User Accounts
Disabling and Enabling User Accounts
Moving User Accounts
Renaming User Accounts
Resetting a User's Domain Password
Unlocking User Accounts
Creating a Local User Account Password Backup
Managing Groups
Understanding Groups
Types of Groups
Understanding the Scopes of Groups
Creating a Group
Adding Members to Groups
Deleting a Group
Modifying Groups
Find a Group
Managing the Properties of Groups
Modifying Other Group Settings
Managing Computer Accounts
Creating a Computer Account in Active Directory
Joining Computers to a Domain
Moving a Computer Account
Disabling a Computer Account
Deleting a Computer Account
Managing a Computer Account
Resetting a Computer Account
Configuring Properties of Computer Accounts
38. Managing Group Policy
Understanding Group Policy
Local and Active Directory Group Policy
Group Policy Settings
Group Policy Architecture
Sysvol Replication Using the File Replication Service
Implementing Group Policy
Working with Local Group Policy
Working with the Group Policy Object Editor
Creating and Linking a New GPO Using the Group Policy Object Editor
Editing an Existing GPO Using the Group Policy Object Editor
Linking to an Existing GPO Using the Group Policy Object Editor
Deleting an Existing GPO by Using the Group Policy Object Editor
Working with the Group Policy Management Console
Installing and Running the Group Policy Management Console
Using the Group Policy Management Console
Accessing Forests, Domains, and Sites in Group Policy Management Console
Creating and Linking a New GPO in Group Policy Management Console
Editing an Existing GPO in the Group Policy Management Console
Linking to an Existing GPO in the Group Policy Management Console
Deleting an Existing GPO in the Group Policy Management Console
Managing Group Policy Inheritance and Processing
Group Policy Inheritance
Modifying Inheritance
Filtering Group Policy Application
Group Policy Processing
Modifying Group Policy Processing
Modifying User Policy Preference Using Loopback Processing
Using Scripts in Group Policy
Configuring Computer Startup and Shutdown Scripts
Configuring User Logon and Logoff Scripts
Applying Group Policy Through Security Templates
Working with Security Templates
Applying Security Templates
Maintaining and Troubleshooting Group Policy
Group Policy Refresh
Modifying Group Policy Refresh
Viewing Applicable GPOs and Last Refresh
Modeling GPOs for Planning
Refreshing Group Policy Manually
Backing Up GPOs
Restoring GPOs
Fixing Default Group Policy
39. Active Directory Site Administration
Managing Sites and Subnets
Creating an Active Directory Site
Creating a Subnet and Associating It with a Site
Associating Domain Controllers with a Site
Managing Site Links and Intersite Replication
Understanding IP and SMTP Replication Transports
Creating a Site Link
Configuring Site Link Bridges
Determining the ISTG
Configuring Site Bridgehead Servers
Configuring Site Link Replication Options
Monitoring and Troubleshooting Replication
Using the Replication Administrator
Using the Replication Monitor
8. Windows Server 2003 Disaster Planning and Recovery
40. Disaster Planning
Preparing for a Disaster
Developing Contingency Procedures
Implementing Problem Escalation and Response Procedures
Creating a Problem Resolution Policy Document
Predisaster Preparation Procedures
Performing Backups
Creating and Using ASR Disks
Creating and Using Boot Disks
Setting Startup and Recovery Options
Installing and Using the Recovery Console
41. Backup and Recovery
Developing Backup Strategies
Creating Your Backup Strategy
Backup Strategy Considerations
Selecting the Optimal Backup Techniques
Understanding Backup Types
Using Media Rotation and Maintaining Additional Media Sets
Backing Up and Recovering Your Data
Using the Backup Utility
Setting Default Options for Backup
General Backup and Restore Options
Setting Restore, Backup Type, and Backup Log Options
Excluding Files from Backup
Backing Up Your Data
Recovering Your Data
Recovering Configuration Data
Backing Up and Restoring Active Directory
Backup and Recovery Strategies for Active Directory
Performing a Nonauthoritative Restore of Active Directory
Performing an Authoritative Restore of Active Directory
Performing a Primary Restore of Sysvol Data
Restoring a Failed Domain Controller by Installing a New Domain Controller
Troubleshooting Startup and Shutdown
Resolving Startup Issues
Repairing Missing or Corrupted System Files
Resolving Restart or Shutdown Issues
Index to Troubleshooting Topics
Index
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Index
A
A (Host Address) records,
Name Resolution Using DNS
,
Secondary Zones, Stub Zones, and Conditional Forwarding
,
Configuring Secondary Notification
,
Configuring Secondary Notification
,
Host Address (A) and Pointer (PTR) Records
creating,
Host Address (A) and Pointer (PTR) Records
defined,
Name Resolution Using DNS
dynamic updates,
Configuring Secondary Notification
forward lookup zones,
Configuring Secondary Notification
stub zones,
Secondary Zones, Stub Zones, and Conditional Forwarding
AAAA (IPv6 host address) record,
Name Resolution Using DNS
Ac.exe,
Using Component Load Balancing Clusters
access control lists (ACLs),
Creating the Master Installation
,
Active Directory Physical Architecture: A Top-Level View
access control.,
Controlling Access to RIS Servers
,
Restricting Access to RIS Images
,
Running the User Account Migration Wizard
,
MMC Modes
,
Removing Partial or Damaged Settings for Individual Applications
,
Controlling Remote Registry Access
,
Using and Finding Shares
,
Sharing Files on the Web
,
Sharing Files on the Web
,
Understanding Media State and Identification
,
Completing or Refusing Requests
,
Configuring Terminal Services Security
,
Active Directory Physical Architecture: A Top-Level View
,
Active Directory Within the Local Security Authority
,
Profile Changes and New Features
(see also )
Active Directory within LSA,
Active Directory Within the Local Security Authority
file and folders,
Sharing Files on the Web
hidden shares and,
Using and Finding Shares
MMC modes,
MMC Modes
Registry,
Removing Partial or Damaged Settings for Individual Applications
,
Controlling Remote Registry Access
removable media,
Understanding Media State and Identification
,
Completing or Refusing Requests
RIS images,
Restricting Access to RIS Images
RIS servers,
Controlling Access to RIS Servers
roaming user profiles,
Profile Changes and New Features
sharing files on Web,
Sharing Files on the Web
Terminal Services,
Configuring Terminal Services Security
user account migration and,
Running the User Account Migration Wizard
Account Lockout Policy,
Enforcing Password Policy
accounts,
Authorizing Users to Create New Computer Accounts
,
Creating a RIBF Disk
,
Performing the Migration: An Overview
,
Using the Group Account Migration Wizard
,
Migrating Service Accounts
,
Delegated Authentication Essentials
,
Setting OU Properties
,
Obtaining Effective Permissions
authorizing for RIS,
Authorizing Users to Create New Computer Accounts
configuring options,
Obtaining Effective Permissions
creating for use with OUs,
Setting OU Properties
delegation,
Delegated Authentication Essentials
migrating group,
Performing the Migration: An Overview
migrating service,
Migrating Service Accounts
migrating user,
Using the Group Account Migration Wizard
prestaging RIS clients in Active Directory,
Creating a RIBF Disk
ACLs (access control lists),
Creating the Master Installation
,
Active Directory Physical Architecture: A Top-Level View
ACPI (Advanced Configuration and Power Interface),
Continue Past Lockups and Freezes
,
HAL Compatibility and RIPrep Images
activation, after installation,
Activate Windows over the Internet
Active Directory,
Windows Server 2003, Datacenter Edition
,
.NET Framework Layers
,
Improvements for Active Directory Tools
,
Improvements for Active Directory Tools
,
Domains Can Be Renamed
,
Active Directory Schema Objects Can Be Deleted
,
Active Directory Schema Objects Can Be Deleted
,
Active Directory and Global Catalog Are Optimized
,
Active Directory and Global Catalog Are Optimized
,
Forest-to-Forest Trusts
,
Select and Implement Standards
,
Services and Protocols Used by RIS
,
Operating Systems Installable by Using RIS
,
Authorizing Users to Create New Computer Accounts
,
Creating a RIBF Disk
,
Preparing for an Upgrade from Windows NT 4 to Windows Server 2003
,
Upgrade Issues
,
Upgrading from Windows 2000
,
Using and Finding Shares
,
Publishing Shares in Active Directory
,
DHCP Security Considerations
,
Setting Up DHCP Servers
,
DNS Zones and Zone Transfers
,
Implementing and Managing DNS
,
Using DNS with Active Directory
,
Organizing Active Directory
,
Organizing Active Directory
,
Organizing Active Directory
,
Creating an Active Directory Implementation or Update Plan
,
Forest Administration
,
Changing Domain Design
,
Implementing Active Directory
,
Hardware and Configuration Considerations for Domain Controllers
,
Connecting Clients to Active Directory
,
Connecting Clients to Active Directory
,
Using the Configure Your Server Wizard
,
Using the Configure Your Server Wizard
,
Creating Domain Controllers in a New Domain
,
Uninstalling Active Directory
,
Uninstalling Active Directory
,
Creating or Moving Accounts and Resources for Use with an OU
,
Modifying Other Group Settings
,
Recovering Configuration Data
,
Restoring a Failed Domain Controller by Installing a New Domain Controller
Active Directory Installation Wizard,
Using the Configure Your Server Wizard
backup,
Recovering Configuration Data
(see )
building blocks,
Organizing Active Directory
client connection,
Connecting Clients to Active Directory
compression,
Active Directory and Global Catalog Are Optimized
computer accounts,
Modifying Other Group Settings
Configure Your Wizard, installing with,
Using the Configure Your Server Wizard
delegating administration of OUs and domains,
Creating or Moving Accounts and Resources for Use with an OU
DHCP security,
DHCP Security Considerations
DHCP servers,
Setting Up DHCP Servers
DNS with,
Implementing and Managing DNS
DNS without,
Using DNS with Active Directory
DNS zone integration,
DNS Zones and Zone Transfers
domain controller, restoring failed,
Restoring a Failed Domain Controller by Installing a New Domain Controller
domain plan,
Forest Administration
fast recovery with SANs,
Hardware and Configuration Considerations for Domain Controllers
forest plan,
Creating an Active Directory Implementation or Update Plan
global catalog optimization,
Active Directory Schema Objects Can Be Deleted
hardware considerations,
Implementing Active Directory
implementation/update plan,
Organizing Active Directory
installation options,
Connecting Clients to Active Directory
installing from backup media,
Creating Domain Controllers in a New Domain
migration,
Forest-to-Forest Trusts
OU creation and management,
Uninstalling Active Directory
OU plan,
Changing Domain Design
overview of,
Improvements for Active Directory Tools
planning phase,
Select and Implement Standards
RIS clients,
Creating a RIBF Disk
RIS servers,
Services and Protocols Used by RIS
,
Operating Systems Installable by Using RIS
routing,
Active Directory and Global Catalog Are Optimized
schema objects, deleting,
Active Directory Schema Objects Can Be Deleted
selective replication,
Domains Can Be Renamed
shares, finding,
Using and Finding Shares
shares, publishing,
Publishing Shares in Active Directory
uninstalling,
Uninstalling Active Directory
upgrade preparation tool,
Upgrading from Windows 2000
upgrade recovery plan,
Upgrade Issues
user accounts for RIS,
Authorizing Users to Create New Computer Accounts
Web Edition omits,
Windows Server 2003, Datacenter Edition
Windows NT 4 upgrade and,
Preparing for an Upgrade from Windows NT 4 to Windows Server 2003
Windows XP and,
.NET Framework Layers
Active Directory domains,
Domains Can Be Renamed
,
Active Directory Can Compress and Route Selectively
,
Finalizing Project Scope
,
Designing and Managing the Domain Environment
,
Designing and Managing the Domain Environment
,
Designing and Managing the Domain Environment
,
Design Considerations for Active Directory Search and Global Catalogs
,
Accessing the Global Catalog
,
Accessing the Global Catalog
,
Designating Replication Attributes
,
Designating Replication Attributes
,
Design Considerations for Active Directory Authentication and Trusts
,
NTLM and Kerberos Authentication
,
Accessing Resources After Authentication
,
Shortcut Trusts
,
Authentication and Trusts Across Forest Boundaries
,
Examining Domain and Forest Trusts
,
Verifying and Troubleshooting Trusts
,
Verifying and Troubleshooting Trusts
,
Configuring the Delegated Service or Computer Account
,
Forest Administration
(see also )
architecture,
Finalizing Project Scope
authentication,
Verifying and Troubleshooting Trusts
authentication and trust across domain boundaries,
Accessing Resources After Authentication
authentication and trust across forest boundaries,
Shortcut Trusts
compatibility,
Designating Replication Attributes
domain and forest trusts,
Authentication and Trusts Across Forest Boundaries
forest-to-forest trusts,
Active Directory Can Compress and Route Selectively
global catalog access,
Accessing the Global Catalog
global catalog servers,
Accessing the Global Catalog
NTLM and Kerberos authentication,
NTLM and Kerberos Authentication
operations masters,
Configuring the Delegated Service or Computer Account
overview of,
Designing and Managing the Domain Environment
planning,
Forest Administration
renaming,
Domains Can Be Renamed
replication,
Designing and Managing the Domain Environment
replication attributes,
Designating Replication Attributes
searches,
Design Considerations for Active Directory Search and Global Catalogs
trust establishment,
Examining Domain and Forest Trusts
trust verification and troubleshooting,
Verifying and Troubleshooting Trusts
universal group authentication,
Design Considerations for Active Directory Authentication and Trusts
Active Directory group policy.,
Managing Group Policy
,
Understanding Group Policy
,
Implementing Group Policy
,
Working with Local Group Policy
(see also )
Group Policy Object Editor,
Working with Local Group Policy
overview of,
Understanding Group Policy
tools for,
Implementing Group Policy
Active Directory Installation Wizard,
Using DNS with Active Directory
,
Hardware and Configuration Considerations for Domain Controllers
,
Connecting Clients to Active Directory
,
Using the Configure Your Server Wizard
,
Creating Domain Controllers in a New Domain
,
Uninstalling Active Directory
installing Active Directory,
Using the Configure Your Server Wizard
installing Active Directory from backup media,
Creating Domain Controllers in a New Domain
overview of,
Using DNS with Active Directory
,
Connecting Clients to Active Directory
testing DNS,
Hardware and Configuration Considerations for Domain Controllers
uninstalling Active Directory,
Uninstalling Active Directory
Active Directory Migration Tool (ADMT),
Preparing for Upgrades and Migration
,
Migrating to Windows Server 2003
,
Running the User Account Migration Wizard
defined,
Preparing for Upgrades and Migration
migrating passwords,
Running the User Account Migration Wizard
overview of,
Migrating to Windows Server 2003
Active Directory Preparation tool (Adprep.exe),
General Upgrade Preparation Tools
Active Directory Schema snap-in,
Designating Replication Attributes
Active Directory sites,
.NET Framework Layers
,
Configuring Active Directory Sites and Replication
,
Single Site vs. Multiple Sites
,
Single Site vs. Multiple Sites
,
Determining Site Boundaries
,
Determining Site Boundaries
,
Replication Enhancements for Windows Server 2003
,
Replication Architecture: An Overview
,
Intrasite Replication Essentials
,
Intersite Replication Essentials
,
Replication Rings and Directory Partitions
,
Mapping Network Infrastructure
,
Working with the Group Policy Object Editor
,
Accessing Forests, Domains, and Sites in Group Policy Management Console
,
Active Directory Site Administration
,
Creating an Active Directory Site
,
Creating an Active Directory Site
,
Creating a Subnet and Associating It with a Site
,
Associating Domain Controllers with a Site
,
Associating Domain Controllers with a Site
,
Understanding IP and SMTP Replication Transports
,
Understanding IP and SMTP Replication Transports
,
Creating a Site Link
,
Creating a Site Link
,
Configuring Site Link Bridges
,
Configuring Site Bridgehead Servers
,
Configuring Site Link Replication Options
,
Monitoring and Troubleshooting Replication
accessing in GPMC,
Accessing Forests, Domains, and Sites in Group Policy Management Console
boundaries,
Determining Site Boundaries
bridgehead server replication,
Configuring Site Bridgehead Servers
creating additional,
Creating an Active Directory Site
designing,
Mapping Network Infrastructure
domain controllers,
Creating a Subnet and Associating It with a Site
Group Policy Object Editor and,
Working with the Group Policy Object Editor
intersite replication,
Intrasite Replication Essentials
intrasite replication,
Replication Architecture: An Overview
IP transport replication,
Understanding IP and SMTP Replication Transports
mapping network infrastructure,
Replication Rings and Directory Partitions
overview of,
.NET Framework Layers
replication,
Associating Domain Controllers with a Site
,
Configuring Site Link Bridges
replication architecture,
Replication Enhancements for Windows Server 2003
replication enhancements,
Determining Site Boundaries
replication monitoring and troubleshooting,
Monitoring and Troubleshooting Replication
replication within and between,
Single Site vs. Multiple Sites
rings and directory partition replication,
Intersite Replication Essentials
single vs. multiple,
Single Site vs. Multiple Sites
site link bridges,
Creating a Site Link
site link replication,
Configuring Site Link Replication Options
site links,
Associating Domain Controllers with a Site
,
Creating a Site Link
SMTP transport replication,
Understanding IP and SMTP Replication Transports
subnets,
Creating an Active Directory Site
working with,
Configuring Active Directory Sites and Replication
Active Directory Users and Computers,
Group Policy Inheritance
,
Filtering Group Policy Application
blocking inheritance,
Group Policy Inheritance
filtering Group Policy,
Filtering Group Policy Application
Active Directory, logical architecture,
Data Store Architecture
,
Data Store Architecture
,
Active Directory Objects
,
Active Directory Objects
,
Active Directory Objects
,
Active Directory Objects
,
Active Directory Domains, Trees, and Forests
,
Active Directory Trusts
,
Active Directory Trusts
,
Active Directory Namespaces and Partitions
data distribution,
Active Directory Namespaces and Partitions
domains,
Active Directory Objects
forests,
Active Directory Objects
namespaces,
Active Directory Trusts
objects,
Active Directory Objects
overview of,
Data Store Architecture
partitions,
Active Directory Trusts
trees,
Active Directory Objects
trusts,
Active Directory Domains, Trees, and Forests
Active Directory, physical architecture,
Active Directory Architecture
,
Active Directory Architecture
,
Active Directory Physical Architecture: A Top-Level View
,
Active Directory Physical Architecture: A Top-Level View
,
Directory Service Architecture
,
Protocols and Client Interfaces
,
Protocols and Client Interfaces
,
Directory System Agent and Database Layer
,
Extensible Storage Engine
client interfaces,
Directory Service Architecture
data store,
Extensible Storage Engine
Database Layer,
Protocols and Client Interfaces
directory service,
Active Directory Physical Architecture: A Top-Level View
Directory System Agent,
Protocols and Client Interfaces
Extensible Storage Engine,
Directory System Agent and Database Layer
Local Security Authority and,
Active Directory Physical Architecture: A Top-Level View
top-level view,
Active Directory Architecture
Active Directory–integrated zones.,
Architecting DNS Infrastructure
,
Zones That Aren't Integrated with Active Directory
,
External DNS Name Resolution and Security
,
Configuring a Large Network Using the Configure A DNS Server Wizard
,
Creating Forward Lookup Zones
,
Configuring Subdomains and Delegating Authority
,
Configuring Secondary Notification
,
Configuring Default Application Directory Partitions and Replication Scope
(see also )
forward lookup zones,
Creating Forward Lookup Zones
network configuration and,
Configuring a Large Network Using the Configure A DNS Server Wizard
overview of,
Zones That Aren't Integrated with Active Directory
replication scope,
Configuring Default Application Directory Partitions and Replication Scope
resource records,
Configuring Secondary Notification
root hints file and,
External DNS Name Resolution and Security
zone transfers,
Configuring Subdomains and Delegating Authority
active volume,
Working with Basic and Dynamic Disks
Add Hardware Wizard,
Using the Control Panel Utilities
,
Installing a Downloaded Driver
Add or Remove Programs,
Using the Add or Remove Programs Utility
,
Installing the DHCP Server Service
,
Using DNS Without Active Directory
,
WINS Implementation Details and New Features
DHCP Servers,
Installing the DHCP Server Service
DNS Servers,
Using DNS Without Active Directory
WINS Severs,
WINS Implementation Details and New Features
working with,
Using the Add or Remove Programs Utility
Add Printer Wizard,
Adding Local Printers
,
Adding Network-Attached Printers
,
Adding Standard TCP/IP Printers
,
Adding AppleTalk Printers
AppleTalk printers,
Adding AppleTalk Printers
LPR printers,
Adding Standard TCP/IP Printers
print device installation,
Adding Local Printers
TCP/IP printers,
Adding Network-Attached Printers
ADD SHADOWSTORAGE command,
Maintaining Shadow Copies After Configuration
add-on TCP/IP options, vendor classes,
Using Userand Vendor-Specific TCP/IP Options
,
Settings Options for Routing and Remote Access Clients Only
Address Resolution Protocol (ARP),
Network Load Balancing Configuration
address toolbar,
Customizing the Quick Launch Toolbar
Address Windows Extensions (AWE),
Using Windows Server 2003, Enterprise Edition
addressing,
Analyzing the Existing Network
,
Loopback, Public, and Private Addresses
,
Using Exclusions
evaluating network,
Analyzing the Existing Network
IP addresses,
Loopback, Public, and Private Addresses
(see )
Media Access Control (MAC) addresses,
Using Exclusions
AddWindowsPrinterConnection method,
Connecting to Shared Printers Using the Command Line and Scripts
ADMIN$ share,
C$, D$, E$, and Other Drive Shares
administration,
Software Restriction Policies in Group Policy
,
Identifying Security Infrastructure
,
Identify Security Requirements
,
Installation Sequence
,
Using Sysprep to Clone a Computer
,
Using the Secondary Logon at the Command Prompt
,
Setting Up New Hardware Devices
,
Getting Information on User and Remote User Sessions
,
Monitoring Performance Remotely
,
How Quota Management Works
,
C$, D$, E$, and Other Drive Shares
,
Creating Shares by Using Computer Management
,
Forest Administration
,
Creating or Moving Accounts and Resources for Use with an OU
device drivers,
Setting Up New Hardware Devices
disk quotas,
How Quota Management Works
enhancements,
Software Restriction Policies in Group Policy
forest,
Forest Administration
network,
Identifying Security Infrastructure
OU delegation,
Creating or Moving Accounts and Resources for Use with an OU
passwords,
Installation Sequence
(see )
performance monitoring remotely,
Monitoring Performance Remotely
planning phase,
Identify Security Requirements
profiles, copying,
Using Sysprep to Clone a Computer
Security logs,
Getting Information on User and Remote User Sessions
shares,
C$, D$, E$, and Other Drive Shares
,
Creating Shares by Using Computer Management
temporary administrator's desktop,
Using the Secondary Logon at the Command Prompt
administration model, OUs,
OU Design: The Cost Center Model
administration tools,
Managing Windows Server 2003
,
Using the Secondary Logon
Administrative Templates,
Local and Active Directory Group Policy
Administrator account,
Types of Users
,
Profile Changes and New Features
administrators,
Active Directory Domains, Trees, and Forests
,
Connecting Clients to Active Directory
ADMT (Active Directory Migration Tool),
Preparing for Upgrades and Migration
,
Migrating to Windows Server 2003
,
Running the User Account Migration Wizard
Adprep.exe (Active Directory Preparation tool),
General Upgrade Preparation Tools
ADPREP/FORESTPREP command,
Upgrade Issues
,
Updating the Active Directory Forest and Domains
,
Preparing the Forest
ADSI Edit snap-in,
Configuring Site Link Replication Options
Adsiedit.msc tool,
General Upgrade Preparation Tools
,
Preparing the Forest
Advanced Configuration and Power Interface (ACPI),
Continue Past Lockups and Freezes
,
HAL Compatibility and RIPrep Images
advanced settings, TCP/IP,
Configuring Automatic Private IP Addressing
Advanced tab, System utility,
Using the System Utility
aging rules, DNS records,
Configuring Default Application Directory Partitions and Replication Scope
alerts,
Assess Domain Architecture and Changes
,
Analyzing Trace Logs
performance,
Analyzing Trace Logs
security,
Assess Domain Architecture and Changes
aliases, sharing files on Web,
Sharing Files on the Web
All Programs button,
Modifying the Start Menu Content
all-subnets-directed broadcast,
Broadcast IP Addresses
allocation policies,
Changing the Media Type in a Media Pool
allocation unit size,
Creating a Primary or Extended Partition
alternate address,
Configuring Dynamic IP Addressing
American Standard Code for Information Interchange (ASCII),
Examining Answer Files
Analysis Report, fragmentation,
Fixing Fragmentation by Using Disk Defragmenter
answer files,
Winnt32 Command-Line Parameters
,
Using Answer Files in Automated Installations
,
Managing Unattended Installations
,
Types of Answer Files
,
Types of Answer Files
,
Using Setup Manager for Answer Files
,
Creating the Answer File
,
Creating the Answer File
,
Using CD Media for Automated Installations
,
Using CD Media for Automated Installations
,
RIS Answer Files
configuring manually,
Creating the Answer File
creating,
Using Setup Manager for Answer Files
defined,
Winnt32 Command-Line Parameters
examining,
Creating the Answer File
level of user interaction with,
Managing Unattended Installations
overview of,
Using Answer Files in Automated Installations
RIS,
RIS Answer Files
Setup Manager for,
Types of Answer Files
types of,
Types of Answer Files
unattended installations and,
Using CD Media for Automated Installations
working with,
Using CD Media for Automated Installations
antivirus software,
Assess Domain Architecture and Changes
APIPA (Automatic Private IP Addressing),
Broadcast IP Addresses
,
Windows Internet Naming Service (WINS)
,
Configuring Dynamic IP Addressing
,
Configuring Automatic Private IP Addressing
configuring,
Configuring Dynamic IP Addressing
defined,
Windows Internet Naming Service (WINS)
disabling,
Configuring Automatic Private IP Addressing
IP addresses reserved for,
Broadcast IP Addresses
Appcenter.exe (Application Center),
Using Component Load Balancing Clusters
Appearance, Display utility,
Using the Date and Time Utility
Append Date permission,
Special Permissions
AppleTalk,
Naming Computers
,
Adding AppleTalk Printers
installing,
Naming Computers
printers,
Adding AppleTalk Printers
Application Center (Appcenter.exe),
Using Component Load Balancing Clusters
Application Compatibility Toolkit,
Applications on Upgraded Servers
,
Upgrade the PDC
Application logs,
Getting Information on User and Remote User Sessions
application media pools,
Understanding Media Pools
,
Moving Media to a Different Media Pool
,
Changing the Media Type in a Media Pool
,
Deleting Application Media Pools
allocation and reallocation policies,
Changing the Media Type in a Media Pool
creating,
Moving Media to a Different Media Pool
defined,
Understanding Media Pools
deleting,
Deleting Application Media Pools
application partitions,
Domains Can Be Renamed
,
Server Roles
,
Active Directory Namespaces and Partitions
defining,
Server Roles
overview of,
Active Directory Namespaces and Partitions
selective replication with,
Domains Can Be Renamed
application server,
Server Roles
,
Understanding Application Center
(see also )
Application Verifier,
Automatic Updates
applications,
Identify Network Services and Applications
,
Using Windows Server 2003, Enterprise Edition
,
Applications on Upgraded Servers
,
Upgrading Windows NT 4 Servers
,
Upgrade the PDC
,
Computer Management System Tools
,
Using the Windows Installer Zapper
,
Getting Processor and Memory Usage for Troubleshooting
,
Planning for High Availability
,
Understanding Application Center
,
Installing Terminal Services
Application Center architecture,
Understanding Application Center
cleaning up Registry settings for failed or damaged,
Using the Windows Installer Zapper
Computer Management tools,
Computer Management System Tools
Enterprise Edition,
Using Windows Server 2003, Enterprise Edition
for Terminal Services users,
Installing Terminal Services
high availability,
Planning for High Availability
identifying network,
Identify Network Services and Applications
information on running,
Getting Processor and Memory Usage for Troubleshooting
on upgraded servers,
Applications on Upgraded Servers
upgrading Windows NT,
Upgrading Windows NT 4 Servers
,
Upgrade the PDC
Apply Onto options, special permission,
Special Permissions
architecture,
What's New in Windows Server 2003
,
Windows Server 2003, Web Edition
,
64-Bit Computing
,
Finalizing Project Scope
,
Cluster Organization
,
Multisite Options for Clusters
,
Understanding Application Center
,
Active Directory Architecture
,
Directory Service Architecture
,
Data Store Architecture
,
Replication Enhancements for Windows Server 2003
,
Group Policy Architecture
32-bit systems,
What's New in Windows Server 2003
,
64-Bit Computing
64-bit systems,
Windows Server 2003, Web Edition
Active Directory, logical,
Data Store Architecture
(see )
Active Directory, physical,
Active Directory Architecture
(see )
commercial Web site,
Multisite Options for Clusters
Component Load Balancing clusters,
Understanding Application Center
directory service,
Directory Service Architecture
domain and security,
Finalizing Project Scope
Group Policy,
Group Policy Architecture
replication,
Replication Enhancements for Windows Server 2003
server cluster,
Cluster Organization
archive attribute of backup programs,
Selecting the Optimal Backup Techniques
archives,
Filtering the Event Logs
,
Backing Up Your Data
event logs,
Filtering the Event Logs
Removable Storage and Remote Storage data,
Backing Up Your Data
ARP (Address Resolution Protocol),
Network Load Balancing Configuration
ASCII (American Standard Code for Information Interchange),
Examining Answer Files
ASP.NET,
.NET Framework Layers
ASR (Automatic System Recovery),
Microsoft .NET Passport Support
,
Networking Components
,
Configuring Server Roles
,
Working with the Registry from the Command Line
,
Creating Registry Backups
,
Performing Backups
,
Resolving Startup Issues
creating and using ASR disks,
Performing Backups
enhancements,
Microsoft .NET Passport Support
installation running,
Networking Components
Registry backups,
Working with the Registry from the Command Line
repairing missing or corrupted system files,
Resolving Startup Issues
server recovery,
Configuring Server Roles
system recovery,
Creating Registry Backups
asterisk (*),
Monitoring Performance from the Command Line
,
Using and Finding Shares
,
Searching for a File and Listing Available Versions
atomic permissions.,
Basic Permissions
(see )
attributes,
Configuring Share Permissions
,
Basic Permissions
,
Designating Replication Attributes
file and folder,
Configuring Share Permissions
replication,
Designating Replication Attributes
special permissions,
Basic Permissions
auditing,
Determining the Approach to Migration
,
Auditing Registry Access
,
Accessing the Event Logs and Viewing Events
,
Planning for Day-to-Day Operations
,
Sharing Files on the Web
,
Assigning Printer Ownership
,
Configuring Terminal Services Security
event types for,
Accessing the Event Logs and Viewing Events
file and folder access,
Sharing Files on the Web
migration,
Determining the Approach to Migration
policies for,
Planning for Day-to-Day Operations
printer access,
Assigning Printer Ownership
Registry access,
Auditing Registry Access
Terminal Services access,
Configuring Terminal Services Security
authentication,
Active Directory Within the Local Security Authority
,
Design Considerations for Active Directory Authentication and Trusts
,
NTLM and Kerberos Authentication
,
NTLM and Kerberos Authentication
,
Accessing Resources After Authentication
,
Shortcut Trusts
,
Verifying and Troubleshooting Trusts
,
Configuring Account Options
across domain boundaries,
Accessing Resources After Authentication
across forest boundaries,
Shortcut Trusts
delegating,
Verifying and Troubleshooting Trusts
Kerberos,
NTLM and Kerberos Authentication
,
Configuring Account Options
NTLM,
NTLM and Kerberos Authentication
universal groups and,
Design Considerations for Active Directory Authentication and Trusts
within LSA,
Active Directory Within the Local Security Authority
author mode, MMC,
MMC Snap-Ins
,
Understanding Taskpad View Styles
authoritative restore,
Recovering Configuration Data
,
Performing a Nonauthoritative Restore of Active Directory
authorization,
Installing the DHCP Server Service
,
Authorize Terminal Servers to Use the Terminal Services Session Directory Service
DHCP servers,
Installing the DHCP Server Service
Session Directory service,
Authorize Terminal Servers to Use the Terminal Services Session Directory Service
Auto Hide feature, taskbar,
Using Auto Hide and Locking
automated installations,
Setup Methods
,
Winnt32 Command-Line Parameters
,
Selecting a Distribution Method
,
Using Answer Files in Automated Installations
,
Managing Unattended Installations
,
Managing Unattended Installations
,
Managing Unattended Installations
,
Establishing the Distribution Folders
,
Types of Answer Files
,
Using Setup Manager for Answer Files
,
Creating the Answer File
,
Examining Answer Files
,
Using CD Media for Automated Installations
,
Using an Answer File
answer file creation,
Using Answer Files in Automated Installations
,
Using Setup Manager for Answer Files
answer file examination,
Creating the Answer File
answer file types,
Types of Answer Files
distribution folders,
Selecting a Distribution Method
distribution folders, custom,
Examining Answer Files
distribution folders, establishing,
Establishing the Distribution Folders
methods for,
Managing Unattended Installations
overview of,
Managing Unattended Installations
starting,
Using an Answer File
tools,
Winnt32 Command-Line Parameters
types of,
Setup Methods
with CD media,
Using CD Media for Automated Installations
automated migration,
Determining the Approach to Migration
automatic partner configuration, WINS server,
Server Roles
Automatic Private IP Addressing.,
Broadcast IP Addresses
(see )
Automatic System Recovery.,
Performing Backups
(see )
Automatic Updates,
Microsoft .NET Passport Support
,
Using the System Utility
AutoRetry interval,
Enabling Shadow Copying from the Command Line
availability,
Planning for High Availability
,
Meeting Performance, Capacity, and Availability Requirements
,
DHCP Availability and Fault Tolerance
DHCP servers,
DHCP Availability and Fault Tolerance
high,
Planning for High Availability
(see )
storage,
Meeting Performance, Capacity, and Availability Requirements
AWE (Address Windows Extensions),
Using Windows Server 2003, Enterprise Edition
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset