Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by William R. Stanek
Microsoft® Windows Server™ 2003 Inside Out
Microsoft® Windows Server™ 2003 Inside Out
SPECIAL OFFER: Upgrade this ebook with O’Reilly
A Note Regarding Supplemental Files
Acknowledgments
We'd Like to Hear from You!
About the CD
What's on the CD
Using the CD
Support Information
Conventions and Features Used in this Book
Text Conventions
Design Conventions
About the Author
1. Windows Server 2003 Overview and Planning
1. Introducing Windows Server 2003
What's New in Windows Server 2003
Windows Server 2003, Standard Edition
Windows Server 2003, Enterprise Edition
Windows Server 2003, Datacenter Edition
Windows Server 2003, Web Edition
64-Bit Computing
.NET Technologies
.NET Framework Technologies
.NET Framework Layers
Windows XP and Windows Server 2003
Windows XP Editions
Windows XP and Active Directory
Installing Windows Server 2003 Administration Tools on Windows XP
Increased Support for Standards
IPv6 Support
IETF Security Standards Support
XML Web Services Support
Interface and Tool Improvements
Simple and Classic Start Menus
Improvements for Active Directory Tools
Other Tool Improvements
Active Directory Improvements
Domains Can Be Renamed
Active Directory Can Replicate Selectively
Active Directory–Integrated DNS Zones Can Forward Conditionally
Active Directory Schema Objects Can Be Deleted
Active Directory and Global Catalog Are Optimized
Active Directory Can Compress and Route Selectively
Forest-to-Forest Trusts
Active Directory Migration Made Easier
Group Policy Improvements
Group Policy Management Console
Software Restriction Policies in Group Policy
Policy Changes for User Profiles
Management and Administration Extras
Remote Administration Gets a Face-Lift
Enhanced File Management by Using DFS
Improved Storage and File System Options
Changes for Terminal Services
Printer Queue Redundancy
Remote Installation Services
Headless Servers and Out-of-Band Management
Security Advances
Windows Server 2003 Feature Lock Down
IPSec and Wireless Security
Microsoft .NET Passport Support
Reliability and Maintenance Enhancements
Automatic System Recovery
Automatic Updates
Improved Verification and System Protection
2. Planning for Windows Server 2003
Overview of Planning
The Microsoft Solutions Framework Process Model
Your Plan: The Big Picture
Identifying Your Organizational Teams
Microsoft Solutions Framework Team Model
Your Project Team
Assessing Project Goals
The Business Perspective
Identifying IT Goals
Examining IT–Business Interaction
Predicting Network Change
Analyzing the Existing Network
Evaluating the Network Infrastructure
Assessing Systems
Identify Network Services and Applications
Identifying Security Infrastructure
Reviewing Network Administration
Network Administrative Model
Disaster Recovery
Network Management Tools
Defining Objectives and Scope
Specifying Organizational Objectives
Setting the Schedule
Shaping the Budget
Allowing for Contingencies
Finalizing Project Scope
Defining the New Network Environment
Defining Domain and Security Architecture
Assess Domain Architecture and Changes
Impact on Network
Identify Security Requirements
Changing the Administrative Approach
Management Tools
Select and Implement Standards
Change Management
Thinking about Active Directory
Designing the Active Directory Namespace
Managing Domain Trusts
Identifying Domain and Forest Functional Level
Defining Active Directory Server Roles
Planning for Server Usage
Server Roles
Determining Which Windows Edition to Use
Using Windows Server 2003, Standard Edition
Using Windows Server 2003, Enterprise Edition
Using Windows Server 2003, Datacenter Edition
Using Windows Server 2003, Web Edition
Selecting a Software Licensing Program
Retail Product Licenses
Volume-Licensing Programs
Open License Program
Select License
Enterprise Agreement License
Software Assurance
Final Considerations for Planning and Deployment
2. Windows Server 2003 Installation
3. Preparing for the Installation and Getting Started
Getting a Quick Start
New Features and Enhancements
Setup Methods
Setup Programs
Controlling Setup from the Command Line
Winnt Command-Line Parameters
Winnt32 Command-Line Parameters
Tools for Automating Setup
Product Licensing
Preparing for Windows Server 2003 Installation
System Hardware Requirements
How a Clean Installation and an Upgrade Differ
Supported Upgrade Paths
Using Dynamic Update
Creating a Local Dynamic Update Share
Controlling the Use of Dynamic Update during Setup
Selecting a Distribution Method
Getting Ready for Automated Installations
Creating Distribution Folders
Using Answer Files in Automated Installations
Preinstallation Tasks
4. Managing Interactive Installations
Windows Installation Considerations
Installation on x86-Based Systems
Installation on 64-Bit Systems
Checking System Compatibility
Planning Partitions
Naming Computers
Network and Domain Membership Options
Protocols
Domain Membership
Networking Components
Performing an Interactive Installation
Installation Sequence
Activation Sequence
Activate Windows over the Internet
Activate Windows by Telephone
Troubleshooting Installation
Start with the Potential Points of Failure
Setup Refuses to Install or Start
Setup Reports a Media or CD-ROM Error
Setup Reports Insufficient System Resources
Setup Cannot Connect to a Domain Controller
Continue Past Lockups and Freezes
Configuring Server Roles
Installing Additional Components Manually
Postinstallation
5. Managing Unattended Installations
Automating Setup
Determining the Method of Automation
Establishing the Distribution Folders
Types of Answer Files
Using Setup Manager for Answer Files
Creating the Answer File
Examining Answer Files
Managing Unattended Installations
Customizing the Distribution Folder
Preinstalling Service Packs
Preinstalling Hot Fixes and Security Updates
Including Updated Drivers
Performing Other Preinstallation Tasks
Renaming Files and Folders When Using Winnt
Using Dynamic Update in Unattended Installations
Distribution Folder on CD
Using CD Media for Automated Installations
Answer File Settings Used in Product CD–Based Unattended Installations
Using an Answer File
Starting the Unattended Installation
Extending the Unattend.txt File
6. Using Remote Installation Services
Introduction to RIS
Services and Protocols Used by RIS
Limitations of RIS
Operating Systems Installable by Using RIS
Designing the RIS Environment
Building a RIS Server: What's Involved
Installing RIS
RIS Server Requirements
Performing the Install
Preparing and Installing RIS
Configuring the RIS Server
Initial RIS Configuration
Customizing RIS
Controlling Access to RIS Servers
Applying Security Permissions to RIS
Authorizing Users to Create New Computer Accounts
Creating a RIS Installers Group
Adding Members to the RISInstallers Group
Configuring RIS Clients
Customizing Installation Options
Configuring RIS Settings in Group Policy
Creating a RIBF Disk
Prestaging Clients in Active Directory
Preparing RIS-Based Installations
Using RIS Images
Restricting Access to RIS Images
OS Images Created by Using RISetup
Configuring a RISetup OS Image
Installed (File-System-Based) Image by RIPrep
System Settings Stored in RIPrep Images
Requirements for Creating a RIPrep Image
HAL Compatibility and RIPrep Images
Creating the Master Installation
Using RIPrep to Create an OS Image
Adding "Flat" or "CD-ROM" Images to RIS
RIS Answer Files
The Ristndrd.sif File
The RIPrep.sif file
The Remboot.sif File
Associating an Answer File with a RIS Image
Configuring the CIW
Using RIS for Automated Installations
Installing Windows Using RIS
More RIS Customization Tips
Using $OEM$ for Hot Fixes, Security Updates, Drivers, and More
Customizing the Client Installation Pages
Using Unsigned NIC Drivers
Working with Sysprep
Understanding Sysprep
Using Sysprep to Clone a Computer
Copying the Administrator Profile
Running Sysprep
3. Windows Server 2003 Upgrades and Migrations
7. Preparing for Upgrades and Migration
Deciding Between Upgrading and Migrating
Verifying Hardware and Software Compatibility
Additional Research
Preparing for an Upgrade from Windows 2000 to Windows Server 2003
Upgrading Windows 2000 Forests and Domains
Upgrading Domain Controllers
Applications on Upgraded Servers
Selecting Upgrade or Migration Path
Upgrading vs. Migrating
Review System Requirements and Compatibility
Check Drive Partitioning
Choosing Domain and Forest Functional Levels
Identify DNS Namespace and Storage
Identify Server Roles
Preparing for an Upgrade from Windows NT 4 to Windows Server 2003
Namespace in Windows NT vs. Active Directory
Moving from Windows NT Domains to Active Directory
Restructuring Domains
Upgrading Windows NT 4 Servers
8. Upgrading to Windows Server 2003
General Considerations for Upgrades
Upgrade Issues
Verify an Upgrade Recovery Plan
Upgrading from Windows 2000
General Upgrade Preparation Tools
Active Directory Preparation Tool
Updating the Active Directory Forest and Domains
Preparing the Forest
Preparing the Domain(s)
Upgrading the Windows 2000 Domain Controllers
Upgrading Windows 2000 Domains
Selecting Active Directory Functional Levels
Changing Operations Masters
Upgrading Windows 2000 Users and Groups
Windows 2000 Member Server Upgrades
Upgrading DNS Services
Upgrading from Windows NT 4
Determine Server Hardware Compatibility
Upgrading Different Versions of Windows NT 4
Managing Disk Partitions
Upgrading Domain Controllers
Establishing Operations Masters
Converting Windows NT 4 Groups to Windows Server 2003 Groups
Performing the Upgrade from Windows NT 4
Upgrade the PDC
Post-PDC Upgrade
9. Migrating to Windows Server 2003
Selecting the Migration Tools
ADMT
Other Microsoft Migration Tools
USMT
File and Settings Transfer Wizard
Migration Scripts
The Movetree Utility
Third-Party Migration Tools
General Considerations for Migrations
Determining the Approach to Migration
Preparing for Migration
Migrating Security Principals
Performing the Migration: An Overview
Migrating Group Accounts
Migrating Local Groups
Migrating Global Groups
Using the Group Account Migration Wizard
Migrating User Accounts
Running the User Account Migration Wizard
Migrating Passwords
Migrating the Computers
Running the Computer Migration Wizard
Merging Groups during Migration
Migrating Domain Trusts
Migrating a Trust
Migrating Service Accounts
Security Translation
Generating Migration Reports
4. Managing Windows Server 2003 Systems
10. Configuring Windows Server 2003
Optimizing the Menu System
Modifying the Start Menu Content
Adding, Copying, and Moving Menu Items
Highlighting and Hiding Menu Items
Controlling the Frequently Used Programs List
Sorting and Renaming Menu Items
Removing Items from the Start Menu
Customizing the Desktop and the Taskbar
Configuring Desktop Items
Configuring the Taskbar
Changing the Taskbar Size and Position
Using Auto Hide and Locking
Grouping Similar Taskbar Items
Controlling Programs in the Notification Area
Optimizing Toolbars
Customizing the Quick Launch Toolbar
Displaying Other Custom Toolbars
Creating Personal Toolbars
11. Windows Server 2003 MMC Administration
Introducing the MMC
Using the MMC
MMC Snap-Ins
MMC Modes
MMC Windows and Startup
MMC Tool Availability
MMC and Remote Computers
Building Custom MMCs
Step 1: Creating the Console
Step 2: Adding Snap-Ins to the Console
Step 3: Saving the Finished Console
Setting the Initial Console View Before Saving
Setting the Console Mode Before Saving
Setting the Console Icon Before Saving
Saving the Console Tool to the Desktop, the Start Menu, or a Folder
Designing Custom Taskpads for the MMC
Getting Started with Taskpads
Understanding Taskpad View Styles
Creating and Managing Taskpads
Creating and Managing Tasks
Creating Menu Command Tasks
Creating Shell Command Tasks
Creating Navigation Tasks
Arranging, Editing, and Removing Tasks
Publishing and Distributing Your Custom Tools
12. Managing Windows Server 2003
Using the Administration Tools
Understanding the Administration Tools
Using Configure Your Server
Using Manage Your Server
Using Computer Management
Computer Management System Tools
Computer Management Storage Tools
Computer Management Services And Applications Tools
Computer Management Essentials
Using the Control Panel Utilities
Using the Add Hardware Utility
Using the Add or Remove Programs Utility
Using the Date and Time Utility
Using the Display Utility
Using the Folder Options Utility
Using the Licensing Utility
Using the Network Connections Utility
Using the Regional and Language Options Utility
Using the Scheduled Tasks Utility
Task-Scheduling Essentials
Creating Scheduled Tasks
Using the System Utility
Using Support Tools
Using Resource Kit Tools
Using the Secondary Logon
Running Programs Using the Secondary Logon
Using the Secondary Logon at the Command Prompt
Running a Temporary Administrator's Desktop
Creating Run As Shortcuts for Secondary Logons
Creating Run As Shortcuts on the Desktop
Creating Run As Menu Options
13. Managing and Troubleshooting Hardware
Working with Device Drivers
Using Windows Device Drivers
Using Signed Device Drivers
Understanding and Changing Driver Installation Settings
Setting Up New Hardware Devices
Managing Plug and Play Detection and Installation
Installing the Software Automatically
Installing a Downloaded Driver
Choosing a Specific Driver or Bypassing the Default Driver
Installing Non–Plug and Play Devices
Obtaining Hardware Device Information
Viewing Device and Driver Details
Viewing Advanced, Resources, and Other Settings
Managing Installed Drivers
Updating a Device Driver
Rolling Back a Driver
Uninstalling and Reinstalling a Device Driver
Managing Devices through Hardware Profiles
Troubleshooting Hardware Devices and Drivers
Resolving Common Device Errors
Resolving Resource Conflicts
14. Managing the Registry
Introducing the Registry
Understanding the Registry Structure
Registry Root Keys
HKEY_LOCAL_MACHINE
HKLMHARDWARE
HKLMSAM
HKLMSECURITY
HKLMSOFTWARE
HKLMSYSTEM
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Registry Data: How It Is Stored and Used
Where Registry Data Comes From
Types of Registry Data Available
Managing the Registry
Searching the Registry
Modifying the Registry
Modifying Values
Adding Keys and Values
Removing Keys and Values
Modifying the Registry of a Remote Machine
Importing and Exporting Registry Data
Loading and Unloading Hive Files
Working with the Registry from the Command Line
Backing Up and Restoring the Registry
Choosing a Backup Method for the Registry
Creating Registry Backups
Recovering a System Using the ASR Backup
Maintaining the Registry
Using the Windows Installer CleanUp Utility
Using the Windows Installer Zapper
Removing Registry Settings for Active Installations That Have Failed
Removing Partial or Damaged Settings for Individual Applications
Securing the Registry
Preventing Access to the Registry Utilities
Applying Permissions to Registry Keys
Controlling Remote Registry Access
Auditing Registry Access
15. Performance Monitoring and Tuning
Tuning Performance, Memory Usage, and Data Throughput
Tuning Windows Operating System Performance
Tuning Processor Scheduling and Memory Usage
Tuning Data Throughput
Tuning Virtual Memory
Tracking a System's General Health
Task Manager and Process Resource Monitor Essentials
Getting Processor and Memory Usage for Troubleshooting
Getting Information on Running Applications
Monitoring and Troubleshooting Processes
Getting Network Usage Information
Getting Information on User and Remote User Sessions
Tracking Events and Troubleshooting by Using Event Viewer
Understanding the Event Logs
Accessing the Event Logs and Viewing Events
Viewing Event Logs on Remote Systems
Sorting, Finding, and Filtering Events
Sorting the Event Logs
Searching the Event Logs
Filtering the Event Logs
Archiving Event Logs
Tracking Events on Multiple Computers
Quick Look: Using Eventquery
Quick Look: Using EventComb
16. Comprehensive Performance Analysis and Logging
Establishing Performance Baselines
Comprehensive System Monitoring
Using System Monitor
Selecting Performance Objects and Counters to Monitor
Choosing Views and Controlling the Display
Monitoring Performance Remotely
Resolving Performance Bottlenecks
Resolving Memory Bottlenecks
Resolving Processor Bottlenecks
Resolving Disk I/O Bottlenecks
Resolving Network Bottlenecks
Performance Logging
Creating Performance Logs
Using Counter Logs
Monitoring Performance from the Command Line
Using Trace Logs
Analyzing Performance Logs
Analyzing Counter Logs
Analyzing Trace Logs
Creating Performance Alerts
5. Managing Windows Server 2003 Storage and File Systems
17. Planning for High Availability
Planning for Software Needs
Planning for Hardware Needs
Planning for Support Structures and Facilities
Planning for Day-to-Day Operations
Planning for Deploying Highly Available Servers
18. Preparing and Deploying Server Clusters
Introducing Server Clustering
Benefits and Limitations of Clustering
Cluster Organization
Cluster Operating Modes
Multisite Options for Clusters
Using Network Load Balancing
Using Network Load Balancing Clusters
Network Load Balancing Configuration
Network Load Balancing Client Affinity and Port Configurations
Planning Network Load Balancing Clusters
Managing Network Load Balancing Clusters
Creating a New Network Load Balancing Cluster
Adding Nodes to a Network Load Balancing Cluster
Removing Nodes from a Network Load Balancing Cluster
Configuring Event Logging for Network Load Balancing Clusters
Controlling Cluster and Host Traffic
Component Load Balancing Architecture
Using Component Load Balancing Clusters
Understanding Application Center
Planning Component Load Balancing Clusters
Using Server Cluster
Server Cluster Configurations
Server Cluster Resource Groups
Optimizing Hardware for Server Clusters
Optimizing Networking for Server Clusters
Running Server Clusters
The Cluster Service and Cluster Objects
The Cluster Heartbeat
The Cluster Database
The Cluster Quorum Resource
The Cluster Interface and Network States
Creating Server Clusters
Creating a Server Cluster
Add a Node to a Cluster
Managing Server Clusters and Their Resources
Creating Clustered Resources
Cluster Resource Types
Planning Resource Groups
Controlling the Cluster Service
Controlling Failover and Failback
Creating and Managing Resource Groups
Creating and Managing Resources
Scenario: Creating a Clustered Print Service
Scenario: Creating a Clustered File Share
19. Storage Management
Essential Storage Technologies
Using Internal and External Storage Devices
Improving Storage Management
Booting from SANs and Using SANs with Clusters
Meeting Performance, Capacity, and Availability Requirements
Configuring Storage
Using the Disk Management Tools
Adding New Disks
Using the MBR and GPT Partition Styles
Working with MBR Disks
Working with GPT Disks on 64-Bit Windows Editions
Using and Converting MBR and GPT Disks
Using the Basic and Dynamic Storage Types
Working with Basic and Dynamic Disks
Using and Converting Basic and Dynamic Disks
Converting FAT or FAT32 to NTFS
Managing MBR Disk Partitions on Basic Disks
Creating a Primary or Extended Partition
Creating a Logical Drive in an Extended Partition
Formatting a Partition, Logical Drive, or Volume
Configuring Drive Letters
Configuring Mount Points
Extending Partitions on Basic Disks
Deleting a Partition, Logical Drive, or Volume
Managing GPT Disk Partitions on Basic Disks
ESP
MSR Partitions
Primary Partitions
LDM Metadata and LDM Data Partitions
OEM or Unknown Partitions
Managing Volumes on Dynamic Disks
Creating a Simple or Spanned Volume
Extending a Simple or Spanned Volume
Recovering a Failed Simple or Spanned Disk
Moving Dynamic Disks
Configuring RAID 1: Disk Mirroring
Creating a Mirrored Set Using Two New Disks
Adding a Mirror to an Existing Volume
Mirroring Boot and System Volumes
Mirroring Boot and System Volumes on MBR Disks
Mirroring Boot and System Volumes on GPT Disks
Configuring RAID 5: Disk Striping with Parity
Breaking or Removing a Mirrored Set
Resolving Problems with Mirrored Sets
Repairing a Mirrored System Volume to Enable Boot
Rebuilding Mirrored System Volumes on MBR Disks
Rebuilding Mirrored System Volumes on GPT Disks
Resolving Problems with RAID-5 Sets
20. Managing Windows Server 2003 File Systems
Understanding Disk and File System Structure
Using FAT
File Allocation Table Structure
Feature FAT16 FAT32
Using NTFS
NTFS Structures
NTFS Features
Analyzing NTFS Structure
Advanced NTFS Features
Hard Links
Data Streams
Change Journals
Object Identifiers
Reparse Points
Remote Storage
Sparse Files
Using File-Based Compression
NTFS Compression
Compressed (Zipped) Folders
Managing Disk Quotas
How Quota Management Works
Configuring Disk Quotas
Customizing Quota Entries for Individual Users
Managing Disk Quotas After Configuration
Exporting and Importing Quota Entries
Maintaining File System Integrity
How File System Errors Occur
Fixing File System Errors by Using Check Disk
Analyzing FAT Volumes by Using ChkDsk
Analyzing NTFS Volumes by Using ChkDsk
Repairing Volumes and Marking Bad Sectors by Using ChkDsk
Defragmenting Disks
Fixing Fragmentation by Using Disk Defragmenter
Understanding the Fragmentation Analysis
21. File Sharing and Security
File Sharing Essentials
Using and Finding Shares
Hiding and Controlling Share Access
Special and Administrative Shares
C$, D$, E$, and Other Drive Shares
ADMIN$
FAXCLIENT and FXSSRVCP$
IPC$
NETLOGON
Microsoft UAM Volume
PRINT$
SYSVOL
Accessing Shares for Administration
Creating and Publishing Shared Folders
Creating Shares by Using Windows Explorer
Creating Shares by Using Computer Management
Publishing Shares in Active Directory
Managing Share Permissions
Understanding Share Permissions
Configuring Share Permissions
Managing File and Folder Permissions
File and Folder Ownership
Taking Ownership of a File or Folder
Transferring Ownership
Permission Inheritance for Files and Folders
Changing Shaded Permissions and Stopping Inheritance
Resetting and Replacing Permissions
Configuring File and Folder Permissions
Basic Permissions
Special Permissions
Determining Effective Permissions
Managing File Shares After Configuration
Tracking and Logging File Share Permissions by Using SrvCheck
Copying File Share Permissions
Sharing Files on the Web
Auditing File and Folder Access
Enabling Auditing for Files and Folders
Specifying Files and Folders to Audit
Monitoring the Security Logs
22. Using Volume Shadow Copy
Shadow Copy Essentials
Using Shadow Copies of Shared Folders
How Shadow Copies Works
Implementing Shadow Copies for Shared Folders
Managing Shadow Copies in Computer Management
Configuring Shadow Copies in Computer Management
Maintaining Shadow Copies After Configuration
Configuring Shadow Copies at the Command Line
Enabling Shadow Copying from the Command Line
Create Manual Snapshots from the Command Line
Viewing Shadow Copy Information
Deleting Snapshot Images from the Command Line
Disabling Shadow Copies from the Command Line
Using Shadow Copies on Clients
Obtaining and Installing the Client
Installing the Previous Versions Client
Installing the Shadow Copy Client
Accessing Shadow Copies on Clients
Restoring Shadow Copies from the Command Line
Searching for a File and Listing Available Versions
Locating and Restoring Previous Versions from the Command Line
23. Using Removable Media
Introducing Removable Media
Understanding Media Libraries
Understanding Media Pools
Working with the Removable Storage Snap-In
Understanding Media State and Identification
Understanding Access Permissions for Removable Storage
Managing Media Libraries and Media
Inserting Media into a Library
Ejecting Media from a Library
Mounting and Dismounting Media in Libraries
Enabling and Disabling Media
Enabling and Disabling Drives
Cleaning Drives
Working with Library Doors and Ports
Configuring Library Inventory
Starting Library Inventory
Changing Library Media Types
Enabling and Disabling Libraries
Managing Media Pools
Preparing Media for Use in the Free Media Pool
Moving Media to a Different Media Pool
Creating Application Media Pools
Changing the Media Type in a Media Pool
Setting Allocation and Deallocation Policies
Deleting Application Media Pools
Managing Work Queues, Requests, and Security
Using the Work Queue
Troubleshooting Waiting Operations
Changing Mount Operations
Controlling When Operations Are Deleted
Using the Operator Requests Queue
Notifying Operators of Requests
Completing or Refusing Requests
Controlling When Requests Are Deleted
Setting Access Permissions for Removable Storage
6. Managing Windows Server 2003 Networking and Print Services
24. Managing TCP/IP Networking
Understanding IP Addressing
Unicast IP Addresses
Class A Networks
Class B Networks
Class C Networks
Loopback, Public, and Private Addresses
Multicast IP Addresses
Broadcast IP Addresses
Special IP Addressing Rules
Using Subnets and Subnet Masks
Subnet Masks
Network Prefix Notation
Subnetting
Subnetting Class A Networks
Subnetting Class B Networks
Subnetting Class C Networks
Getting and Using IP Addresses
Understanding Name Resolution
Domain Name System
Host Names
Domain Names
Fully Qualified Domain Name (FQDN)
Name Resolution
Windows Internet Naming Service (WINS)
Configuring TCP/IP Networking
Preparing for Installation of TCP/IP Networking
Installing TCP/IP Networking
Configuring Static IP Addressing
Configuring Dynamic IP Addressing
Configuring Automatic Private IP Addressing
Configuring Advanced TCP/IP Settings
Configuring Advanced IP Settings
Configuring Advanced DNS Settings
Configuring Advanced WINS Settings
Configuring Advanced TCP/IP Options
25. Managing DHCP
DHCP Essentials
DHCP Security Considerations
Planning DHCP Implementations
DHCP Messages and Relay Agents
DHCP Availability and Fault Tolerance
50/50 Failover
80/20 Failover
100/100 Failover
Setting Up DHCP Servers
Installing the DHCP Server Service
Authorizing DHCP Servers in Active Directory
Creating and Configuring Scopes
Creating Normal Scopes Using the DHCP Console
Creating Normal Scopes Using Netsh
Using Exclusions
Using Reservations
Activating Scopes
Configuring TCP/IP Options
Levels of Options and Their Uses
Options Used by Windows Clients
Using Userand Vendor-Specific TCP/IP Options
Settings Options for All Clients
Settings Options for Routing and Remote Access Clients Only
Setting Add-On Options for Directly Connected Clients
Defining Classes to Get Different Option Sets
Creating the Class
Configuring Clients to Use the Class
Advanced DHCP Configuration and Maintenance
Configuring DHCP Audit Logging
Binding the DHCP Server Service to a Network Interface
Integrating DHCP and DNS
Enabling Conflict Detection on DHCP Servers
Saving and Restoring the DHCP Configuration
Managing and Maintaining the DHCP Database
Setting DHCP Database Properties
Backing Up and Restoring the Database
Repairing the DHCP Database
Setting Up DHCP Relay Agents
Configuring and Enabling Routing and Remote Access
Adding and Configuring the DHCP Relay Agent
26. Architecting DNS Infrastructure
DNS Essentials
Planning DNS Implementations
Public and Private Namespaces
Name Resolution Using DNS
DNS Resource Records
DNS Zones and Zone Transfers
Zones That Aren't Integrated with Active Directory
Zones That Are Integrated with Active Directory
Secondary Zones, Stub Zones, and Conditional Forwarding
Security Considerations
DNS Queries and Security
DNS Dynamic Updates and Security
External DNS Name Resolution and Security
Architecting a DNS Design
Split-Brain Design: Same Internal and External Names
Separate-Name Design: Different Internal and External Names
27. Implementing and Managing DNS
Installing the DNS Server Service
Using DNS with Active Directory
Using DNS Without Active Directory
DNS Setup
Configuring DNS Using the Wizard
Configuring a Small Network Using the Configure A DNS Server Wizard
Configuring a Large Network Using the Configure A DNS Server Wizard
Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers
Creating Forward Lookup Zones
Creating Reverse Lookup Zones
Configuring Forwarders and Conditional Forwarding
Configuring Subdomains and Delegating Authority
Configuring Zone Transfers
Configuring Secondary Notification
Adding Resource Records
Host Address (A) and Pointer (PTR) Records
Canonical Name (CNAME) Records
Mail Exchanger (MX) Records
Name Server (NS) Records
Start Of Authority (SOA) Records
Service Location (SRV) Records
Maintaining and Monitoring DNS
Configuring Default Application Directory Partitions and Replication Scope
Setting Aging and Scavenging
Configuring Logging and Checking DNS Server Logs
Troubleshooting DNS Client Service
Try Reregistering the Client
Check the Client's TCP/IP Configuration
Check the Client's Resolver Cache
Perform Lookups for Troubleshooting
Troubleshooting DNS Server Service
Check the Server's TCP/IP Configuration
Check the Server's Cache
Check Replication to Other Name Servers
Examine the Configuration of the DNS Server
Examine Zones and Zone Records
28. Implementing and Maintaining WINS
WINS Essentials
NetBIOS Namespace and Scope
NetBIOS Node Types
WINS Name Registration and Cache
WINS Implementation Details and New Features
Setting Up WINS Servers
Installing WINS
WINS Postinstallation Tasks
Configuring Replication Partners
Replication Essentials
Configuring Automatic Replication Partners
Using Designated Replication Partners
Configuring and Maintaining WINS
Configuring Burst Handling
Checking Server Status and Configuration
Checking Active Registrations and Scavenging Records
Maintaining the WINS Database
Verifying the WINS Database Consistency
Compacting the WINS Database
Backing Up the WINS Database
Restoring the WINS Database
Enabling WINS Lookups Through DNS
29. Installing and Maintaining Print Services
Understanding Windows Server 2003 Print Services
Print Services Changes for Windows Server 2003
Upgrading Windows NT 4 Print Servers to Windows Server 2003
Migrating Print Servers from One System to Another
Manually Migrating Print Servers
Automating Print Server Migration
Planning for Printer Deployments and Consolidation
Sizing Print Server Hardware and Optimizing Configuration
Sizing Printer Hardware and Optimizing Configuration
Setting Up Printers
Adding Local Printers
Adding Network-Attached Printers
Adding Standard TCP/IP Printers
Adding LPR Printers for UNIX and LPD
Adding AppleTalk Printers
Changing Standard TCP/IP Port Monitor Settings
Connecting Users to Shared Printers
Accessing Shared Printers on Windows 95, Windows 98, or Windows NT 4
Accessing Shared Printers on Windows 2000 or Later
Connecting to Shared Printers Using the Command Line and Scripts
Managing Printer Permissions
Understanding Printer Permissions
Configuring Printer Permissions
Assigning Printer Ownership
Auditing Printer Access
Managing Print Server Properties
Viewing and Creating Printer Forms
Viewing and Configuring Printer Ports
Viewing and Configuring Print Drivers
Configuring Print Spool, Logging, and Notification Settings
Managing Printer Properties
Setting General Properties, Printing Preferences, and Document Defaults
Setting Overlays and Watermarks for Documents
Installing and Updating Print Drivers on Clients
Configuring Printer Sharing and Publishing
Optimizing Printing Through Queues and Pooling
Configuring Queue Priority and Scheduling
Configuring Printer Pooling
Configuring Print Spooling
Viewing the Print Processor and Default Data Type
Configuring Separator Pages
Using Separator Pages
Setting a Separator Page
Customizing Separator Pages
Configuring Color Profiles
Managing Print Jobs
Pausing, Starting, and Canceling All Printing
Viewing Print Jobs
Managing Print Jobs
Printer Maintenance and Troubleshooting
Monitoring Print Server Performance
Preparing for Print Server Failure
Solving Printing Problems
Printer Troubleshooting Essentials
Comprehensive Printer Troubleshooting
Resolving Garbled or Incorrect Printing
30. Using Remote Desktop for Administration
Remote Desktop for Administration Essentials
Configuring Remote Desktop for Administration
Enabling Remote Desktop for Administration on Servers
Permitting and Restricting Remote Logon
Configuring Remote Desktop for Administration Through Group Policy
Supporting Remote Desktop Connection Clients
New Features for the Remote Desktop Connection Client
Installing Remote Desktop Connection Clients
Running the Remote Desktop Connection Client
Running Remote Desktops
Tracking Who's Logged On
31. Deploying Terminal Services
Using Terminal Services
Terminal Services Clients
Terminal Services Servers
Terminal Services Licensing
Designing the Terminal Services Infrastructure
Capacity Planning for Terminal Services
Planning Organizational Structure for Terminal Services
Deploying Single-Server Environments
Deploying Multi-Server Environments
Setting Up Terminal Services
Installing Terminal Services
Installing Applications for Clients to Use
Choosing Applications for Terminal Services Users
Application Licensing for Terminal Services Users
Installing Applications for Terminal Services Users
Using Application Compatibility Scripts
Modifying Applications After Installation
Enabling and Joining the Session Directory Service
Enable and Start the Terminal Services Session Directory Service
Authorize Terminal Servers to Use the Terminal Services Session Directory Service
Configure Each Server to Join the Session Directory
Setting Up a Terminal Services License Server
Considerations for Installing a Terminal Services License Server
Installing a Terminal Services License Server
Activating the License Server and Configuring Licenses for Use
Using the Terminal Services Configuration Tool
Configuring Global Connection Settings
Configuring Server Settings
Configuring Terminal Services Security
Auditing Terminal Services Access
Using the Terminal Services Manager
Connecting to Terminal Servers
Getting Terminal Services Information
Managing User Sessions in Terminal Services Manager
Managing Terminal Services from the Command Line
Gathering Terminal Services Information
Managing User Sessions from the Command Line
Other Useful Terminal Services Commands
Configuring Terminal Services Per-User Settings
Getting Remote Control of a User's Session
Setting Up the Terminal Services Profile for Users
7. Managing Active Directory and Security
32. Active Directory Architecture
Active Directory Physical Architecture
Active Directory Physical Architecture: A Top-Level View
Active Directory Within the Local Security Authority
Directory Service Architecture
Protocols and Client Interfaces
Directory System Agent and Database Layer
Extensible Storage Engine
Data Store Architecture
Active Directory Logical Architecture
Active Directory Objects
Active Directory Domains, Trees, and Forests
Active Directory Trusts
Active Directory Namespaces and Partitions
Active Directory Data Distribution
33. Designing and Managing the Domain Environment
Design Considerations for Active Directory Replication
Design Considerations for Active Directory Search and Global Catalogs
Searching the Tree
Accessing the Global Catalog
Designating Global Catalog Servers
Designating Replication Attributes
Design Considerations for Compatibility
Understanding Domain Functional Level
Understanding Forest Functional Level
Raising the Domain or Forest Functional Level
Design Considerations for Active Directory Authentication and Trusts
Universal Groups and Authentication
Understanding Security Tokens and Universal Group Membership Caching
Enabling Universal Group Membership Caching
NTLM and Kerberos Authentication
Establishing the Initial Authentication
Accessing Resources After Authentication
Authentication and Trusts Across Domain Boundaries
Two-Way Transitive Trusts
Shortcut Trusts
Authentication and Trusts Across Forest Boundaries
Examining Domain and Forest Trusts
Establishing External, Shortcut, Realm, and Cross-Forest Trusts
Verifying and Troubleshooting Trusts
Delegating Authentication
Delegated Authentication Essentials
Configuring Delegated Authentication
Configuring the Delegated User Account
Configuring the Delegated Service or Computer Account
Design Considerations for Active Directory Operations Masters
Operations Master Roles
Using, Locating, and Transferring the Schema Master Role
Using, Locating, and Transferring the Domain Naming Master Role
Using, Locating, and Transferring the Relative ID Master Role
Using, Locating, and Transferring the PDC Emulator Role
Using, Locating, and Transferring the Infrastructure Master Role
34. Organizing Active Directory
Creating an Active Directory Implementation or Update Plan
Developing a Forest Plan
Forest Namespace
Single vs. Multiple Forests
Forest Administration
Developing a Domain Plan
Domain Design Considerations
Single vs. Multiple Domains
Forest Root Domain Design Configurations
Changing Domain Design
Developing an Organizational Unit Plan
Using Organizational Units (OUs)
Using OUs for Delegation
Using OUs for Group Policy
Creating an OU Design
OU Design: Division or Business Unit Model
OU Design: Geographic Model
OU Design: The Cost Center Model
OU Design: The Administration Model
35. Configuring Active Directory Sites and Replication
Working with Active Directory Sites
Single Site vs. Multiple Sites
Replication Within and Between Sites
Determining Site Boundaries
Understanding Active Directory Replication
Replication Enhancements for Windows Server 2003
Replication Architecture: An Overview
Intrasite Replication Essentials
Intersite Replication Essentials
Replication Rings and Directory Partitions
Developing or Revising a Site Design
Mapping Network Infrastructure
Creating a Site Design
Mapping the Network Structure to Site Structure
Designing Each Individual Site
Designing the Intersite Replication Topology
Considering the Impact of Site Link Bridging
Planning the Placement of Servers in Sites
36. Implementing Active Directory
Preinstallation Considerations for Active Directory
Hardware and Configuration Considerations for Domain Controllers
Configuring Active Directory for Fast Recovery with Storage Area Networks
Connecting Clients to Active Directory
Installing Active Directory
Active Directory Installation Options and Issues
Using the Configure Your Server Wizard
Using the Active Directory Installation Wizard
Creating Additional Domain Controllers for an Existing Domain
Creating Domain Controllers in a New Domain
Using the Active Directory Installation Wizard with Backup Media
Uninstalling Active Directory
Creating and Managing Organizational Units (OUs)
Creating an OU
Setting OU Properties
Creating or Moving Accounts and Resources for Use with an OU
Delegating Administration of Domains and OUs
Understanding Delegation of Administration
Delegating Administration
37. Managing Users, Groups, and Computers
Managing Domain User Accounts
Types of Users
Configuring User Account Policies
Enforcing Password Policy
Configuring Account Lockout Policy
Setting Kerberos Policy
Understanding User Account Capabilities, Privileges, and Rights
Assigning User Rights
Assigning User Rights for a Domain or OU
Assigning User Rights on a Specific Computer
Creating and Configuring Domain User Accounts
Viewing and Setting User Account Properties
Obtaining Effective Permissions
Configuring Account Options
Configuring Profile Options
Managing User Profiles
Profile Essentials
Profile Changes and New Features
Group Policy Changes for User Profiles
Implementing and Creating Preconfigured Profiles
Configuring Local User Profiles
Configuring Roaming User Profiles
Implementing Mandatory User Profiles
Switching Between a Local and a Roaming User Profile
Managing User Data
Using Folder Redirection
Using Offline Files
Configuring Offline Files on File Servers
Configuring Offline Files on Clients
Configuring Offline Files in Group Policy
Managing File Synchronization
Maintaining User Accounts
Deleting User Accounts
Disabling and Enabling User Accounts
Moving User Accounts
Renaming User Accounts
Resetting a User's Domain Password
Unlocking User Accounts
Creating a Local User Account Password Backup
Managing Groups
Understanding Groups
Types of Groups
Understanding the Scopes of Groups
Creating a Group
Adding Members to Groups
Deleting a Group
Modifying Groups
Find a Group
Managing the Properties of Groups
Modifying Other Group Settings
Managing Computer Accounts
Creating a Computer Account in Active Directory
Joining Computers to a Domain
Moving a Computer Account
Disabling a Computer Account
Deleting a Computer Account
Managing a Computer Account
Resetting a Computer Account
Configuring Properties of Computer Accounts
38. Managing Group Policy
Understanding Group Policy
Local and Active Directory Group Policy
Group Policy Settings
Group Policy Architecture
Sysvol Replication Using the File Replication Service
Implementing Group Policy
Working with Local Group Policy
Working with the Group Policy Object Editor
Creating and Linking a New GPO Using the Group Policy Object Editor
Editing an Existing GPO Using the Group Policy Object Editor
Linking to an Existing GPO Using the Group Policy Object Editor
Deleting an Existing GPO by Using the Group Policy Object Editor
Working with the Group Policy Management Console
Installing and Running the Group Policy Management Console
Using the Group Policy Management Console
Accessing Forests, Domains, and Sites in Group Policy Management Console
Creating and Linking a New GPO in Group Policy Management Console
Editing an Existing GPO in the Group Policy Management Console
Linking to an Existing GPO in the Group Policy Management Console
Deleting an Existing GPO in the Group Policy Management Console
Managing Group Policy Inheritance and Processing
Group Policy Inheritance
Modifying Inheritance
Filtering Group Policy Application
Group Policy Processing
Modifying Group Policy Processing
Modifying User Policy Preference Using Loopback Processing
Using Scripts in Group Policy
Configuring Computer Startup and Shutdown Scripts
Configuring User Logon and Logoff Scripts
Applying Group Policy Through Security Templates
Working with Security Templates
Applying Security Templates
Maintaining and Troubleshooting Group Policy
Group Policy Refresh
Modifying Group Policy Refresh
Viewing Applicable GPOs and Last Refresh
Modeling GPOs for Planning
Refreshing Group Policy Manually
Backing Up GPOs
Restoring GPOs
Fixing Default Group Policy
39. Active Directory Site Administration
Managing Sites and Subnets
Creating an Active Directory Site
Creating a Subnet and Associating It with a Site
Associating Domain Controllers with a Site
Managing Site Links and Intersite Replication
Understanding IP and SMTP Replication Transports
Creating a Site Link
Configuring Site Link Bridges
Determining the ISTG
Configuring Site Bridgehead Servers
Configuring Site Link Replication Options
Monitoring and Troubleshooting Replication
Using the Replication Administrator
Using the Replication Monitor
8. Windows Server 2003 Disaster Planning and Recovery
40. Disaster Planning
Preparing for a Disaster
Developing Contingency Procedures
Implementing Problem Escalation and Response Procedures
Creating a Problem Resolution Policy Document
Predisaster Preparation Procedures
Performing Backups
Creating and Using ASR Disks
Creating and Using Boot Disks
Setting Startup and Recovery Options
Installing and Using the Recovery Console
41. Backup and Recovery
Developing Backup Strategies
Creating Your Backup Strategy
Backup Strategy Considerations
Selecting the Optimal Backup Techniques
Understanding Backup Types
Using Media Rotation and Maintaining Additional Media Sets
Backing Up and Recovering Your Data
Using the Backup Utility
Setting Default Options for Backup
General Backup and Restore Options
Setting Restore, Backup Type, and Backup Log Options
Excluding Files from Backup
Backing Up Your Data
Recovering Your Data
Recovering Configuration Data
Backing Up and Restoring Active Directory
Backup and Recovery Strategies for Active Directory
Performing a Nonauthoritative Restore of Active Directory
Performing an Authoritative Restore of Active Directory
Performing a Primary Restore of Sysvol Data
Restoring a Failed Domain Controller by Installing a New Domain Controller
Troubleshooting Startup and Shutdown
Resolving Startup Issues
Repairing Missing or Corrupted System Files
Resolving Restart or Shutdown Issues
Index to Troubleshooting Topics
Index
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Index
D
D$ shares,
Using and Finding Shares
daily backups,
Understanding Backup Types
DAS (direct-attached storage),
Using Internal and External Storage Devices
data,
HKEY_CURRENT_USER
,
Modifying the Registry of a Remote Machine
,
Working with the Registry from the Command Line
,
Active Directory Namespaces and Partitions
,
Hardware and Configuration Considerations for Domain Controllers
,
Creating Your Backup Strategy
backing up,
Working with the Registry from the Command Line
,
Creating Your Backup Strategy
distributing in Active Directory,
Active Directory Namespaces and Partitions
importing and exporting Registry,
Modifying the Registry of a Remote Machine
protection in Active Directory,
Hardware and Configuration Considerations for Domain Controllers
storing and using Registry,
HKEY_CURRENT_USER
Data Encryption Standard (DES),
Configuring Account Options
data entry workers,
Designing the Terminal Services Infrastructure
Data Section, RIS file,
Examining Answer Files
Data section, Unattend.txt answer file,
Examining Answer Files
data store, Active Directory,
Extensible Storage Engine
,
Design Considerations for Active Directory Replication
data streams,
Hard Links
data table, Active Directory,
Data Store Architecture
data throughput options,
Tuning Processor Scheduling and Memory Usage
data types,
Where Registry Data Comes From
,
Configuring Print Spooling
database,
Introducing the Registry
,
Enabling Conflict Detection on DHCP Servers
,
Checking Active Registrations and Scavenging Records
DHCP,
Enabling Conflict Detection on DHCP Servers
Registry as,
Introducing the Registry
WINS,
Checking Active Registrations and Scavenging Records
Database Layer,
Protocols and Client Interfaces
Date and Time,
Installation Sequence
,
Using the Add or Remove Programs Utility
Dcdiag utility,
Upgrading from Windows 2000
,
Hardware and Configuration Considerations for Domain Controllers
Dcgpofix utility,
Restoring GPOs
DCPROMO command,
Active Directory Schema Objects Can Be Deleted
,
Using the Configure Your Server Wizard
decentralized network administration,
Network Administrative Model
dedicated root domains,
Forest Root Domain Design Configurations
default BOOTP class,
Using Userand Vendor-Specific TCP/IP Options
Default Domain Controller Policy GPO,
Restoring GPOs
Default Domain Policy,
Using OUs for Group Policy
,
Types of Users
,
Configuring User Account Policies
,
Configuring User Account Policies
defined,
Using OUs for Group Policy
password options,
Configuring User Account Policies
security options,
Types of Users
Default Domain Policy GPO,
Restoring GPOs
default Routing and Remote Access class,
Using Userand Vendor-Specific TCP/IP Options
default user accounts,
Types of Users
default user class,
Using Userand Vendor-Specific TCP/IP Options
default vendor classes,
Using Userand Vendor-Specific TCP/IP Options
,
Settings Options for Routing and Remote Access Clients Only
defragmenting disks,
Analyzing NTFS Volumes by Using ChkDsk
,
Implementing Shadow Copies for Shared Folders
delegation,
Authorizing Users to Create New Computer Accounts
,
Configuring Forwarders and Conditional Forwarding
,
Verifying and Troubleshooting Trusts
,
Using Organizational Units (OUs)
,
Creating or Moving Accounts and Resources for Use with an OU
,
Configuring Account Options
of authentication,
Verifying and Troubleshooting Trusts
of authority,
Configuring Forwarders and Conditional Forwarding
of domain and OU administration,
Creating or Moving Accounts and Resources for Use with an OU
OUs for,
Using Organizational Units (OUs)
user account options,
Authorizing Users to Create New Computer Accounts
,
Configuring Account Options
Delegation of Control Wizard,
Understanding Delegation of Administration
Delete permission,
Special Permissions
DELETE SHADOWS command,
Viewing Shadow Copy Information
DELETE SHADOWSTORAGE command,
Deleting Snapshot Images from the Command Line
Delete Subfolders And Files permission,
Special Permissions
deleting,
Extending Partitions on Basic Disks
,
Extending Partitions on Basic Disks
,
Extending Partitions on Basic Disks
,
Troubleshooting Waiting Operations
,
Completing or Refusing Requests
,
Maintaining User Accounts
,
Adding Members to Groups
,
Disabling a Computer Account
,
Linking to an Existing GPO Using the Group Policy Object Editor
,
Linking to an Existing GPO in the Group Policy Management Console
computer accounts,
Disabling a Computer Account
existing GPOs,
Linking to an Existing GPO Using the Group Policy Object Editor
,
Linking to an Existing GPO in the Group Policy Management Console
groups,
Adding Members to Groups
logical drives,
Extending Partitions on Basic Disks
partitions,
Extending Partitions on Basic Disks
requests,
Completing or Refusing Requests
user accounts,
Maintaining User Accounts
volumes,
Extending Partitions on Basic Disks
Work Queue operations,
Troubleshooting Waiting Operations
denial of service (DoS) attack,
DHCP Security Considerations
deployment, highly available servers,
Planning for Day-to-Day Operations
DES (Data Encryption Standard),
Configuring Account Options
desktop,
Customizing the Desktop and the Taskbar
,
Customizing the Desktop and the Taskbar
,
Setting the Console Icon Before Saving
,
Using the Date and Time Utility
,
Using the Secondary Logon at the Command Prompt
,
Running a Temporary Administrator's Desktop
configuration,
Customizing the Desktop and the Taskbar
console tools saved on,
Setting the Console Icon Before Saving
customizing,
Customizing the Desktop and the Taskbar
Display utility,
Using the Date and Time Utility
Run As shortcuts on,
Running a Temporary Administrator's Desktop
running temporary administrator's,
Using the Secondary Logon at the Command Prompt
desktop toolbar,
Customizing the Quick Launch Toolbar
details pane, MMC windows,
MMC Modes
device drivers,
Using Dynamic Update
,
Preinstalling Hot Fixes and Security Updates
,
Customizing the Client Installation Pages
,
Managing and Troubleshooting Hardware
,
Managing and Troubleshooting Hardware
,
Using Windows Device Drivers
,
Using Windows Device Drivers
,
Using Signed Device Drivers
,
Using Signed Device Drivers
,
Installing the Software Automatically
,
Installing Non–Plug and Play Devices
,
Viewing Advanced, Resources, and Other Settings
,
Managing Installed Drivers
automated installations,
Preinstalling Hot Fixes and Security Updates
defining,
Managing and Troubleshooting Hardware
Dynamic Update,
Using Dynamic Update
hardware device information and,
Installing Non–Plug and Play Devices
installation settings,
Using Signed Device Drivers
managing,
Viewing Advanced, Resources, and Other Settings
new,
Using Windows Device Drivers
Plug and Play,
Installing the Software Automatically
signed,
Using Signed Device Drivers
unsigned,
Customizing the Client Installation Pages
updating,
Managing Installed Drivers
Windows,
Using Windows Device Drivers
working with,
Managing and Troubleshooting Hardware
device drivers, printers,
Understanding Windows Server 2003 Print Services
,
Understanding Windows Server 2003 Print Services
,
Understanding Windows Server 2003 Print Services
,
Viewing and Configuring Print Drivers
,
Installing and Updating Print Drivers on Clients
,
Comprehensive Printer Troubleshooting
installing/updating,
Installing and Updating Print Drivers on Clients
overview of,
Understanding Windows Server 2003 Print Services
printing process and,
Understanding Windows Server 2003 Print Services
troubleshooting,
Comprehensive Printer Troubleshooting
viewing and configuring,
Viewing and Configuring Print Drivers
Windows,
Understanding Windows Server 2003 Print Services
Device Manager,
Computer Management System Tools
,
Installing Non–Plug and Play Devices
,
Viewing Device and Driver Details
Computer Management System tool,
Computer Management System Tools
device and driver details,
Installing Non–Plug and Play Devices
settings,
Viewing Device and Driver Details
devices,
Installing Non–Plug and Play Devices
,
Installing Non–Plug and Play Devices
,
Viewing Device and Driver Details
,
Resolving Common Device Errors
,
Resolving Common Device Errors
common errors,
Resolving Common Device Errors
device and driver details,
Installing Non–Plug and Play Devices
resource conflicts,
Resolving Common Device Errors
settings,
Viewing Device and Driver Details
troubleshooting installation,
Installing Non–Plug and Play Devices
DFS (Distributed File System),
Remote Administration Gets a Face-Lift
,
Improving Storage Management
,
Single Site vs. Multiple Sites
file management,
Remote Administration Gets a Face-Lift
overview of,
Improving Storage Management
site design,
Single Site vs. Multiple Sites
Dfsutil,
Improving Storage Management
DHCP (Dynamic Host Configuration Protocol),
How Shadow Copies Works
,
Broadcast IP Addresses
,
Configuring Static IP Addressing
,
Managing DHCP
,
DHCP Security Considerations
,
Planning DHCP Implementations
,
Configuring TCP/IP Options
,
Configuring Clients to Use the Class
,
Backup Strategy Considerations
backup and recovery techniques,
Backup Strategy Considerations
dynamic IP addressing,
Configuring Static IP Addressing
limited broadcasts and,
Broadcast IP Addresses
logging,
Configuring Clients to Use the Class
overview of,
Managing DHCP
planning implementations,
Planning DHCP Implementations
security,
DHCP Security Considerations
shadow copy service writer,
How Shadow Copies Works
TCP/IP options,
Configuring TCP/IP Options
DHCP Acknowledgment message,
Planning DHCP Implementations
DHCP Client service,
Managing DHCP
,
Planning DHCP Implementations
,
Levels of Options and Their Uses
,
Using Userand Vendor-Specific TCP/IP Options
,
Settings Options for All Clients
,
Settings Options for Routing and Remote Access Clients Only
,
Settings Options for Routing and Remote Access Clients Only
,
Defining Classes to Get Different Option Sets
classes for different option sets,
Defining Classes to Get Different Option Sets
client add-on options,
Settings Options for Routing and Remote Access Clients Only
client TCP/IP options,
Settings Options for All Clients
messages and relay agents,
Planning DHCP Implementations
overview of,
Managing DHCP
RRAS client TCP/IP options,
Settings Options for Routing and Remote Access Clients Only
standard TCP/IP options,
Levels of Options and Their Uses
user and vendor-specific TCP/IP options,
Using Userand Vendor-Specific TCP/IP Options
DHCP console,
Installing the DHCP Server Service
,
Authorizing DHCP Servers in Active Directory
,
Using Exclusions
,
Using Reservations
,
Using Reservations
creating normal scopes,
Authorizing DHCP Servers in Active Directory
defining exclusion ranges,
Using Exclusions
overview of,
Installing the DHCP Server Service
reserving DHCP addresses,
Using Reservations
scope activation,
Using Reservations
DHCP Discover message,
Planning DHCP Implementations
DHCP Offer message,
Planning DHCP Implementations
DHCP Request message,
Planning DHCP Implementations
DHCP resource type, server clusters,
Add a Node to a Cluster
DHCP Server service,
Managing DHCP
,
DHCP Availability and Fault Tolerance
,
100/100 Failover
,
Installing the DHCP Server Service
,
Authorizing DHCP Servers in Active Directory
,
Configuring Clients to Use the Class
,
Configuring DHCP Audit Logging
availability and fault tolerance,
DHCP Availability and Fault Tolerance
binding to network interface,
Configuring DHCP Audit Logging
configuring DHCP audit logs,
Configuring Clients to Use the Class
DHCP server setup,
100/100 Failover
installing,
Installing the DHCP Server Service
overview of,
Managing DHCP
scopes,
Authorizing DHCP Servers in Active Directory
DHCP servers,
Server Roles
,
Services and Protocols Used by RIS
,
Designing the RIS Environment
,
DHCP Security Considerations
,
DHCP Availability and Fault Tolerance
,
100/100 Failover
,
100/100 Failover
,
Setting Up DHCP Servers
,
Installing the DHCP Server Service
,
Installing the DHCP Server Service
,
Authorizing DHCP Servers in Active Directory
,
Using Exclusions
,
Using Exclusions
,
Using Reservations
,
Configuring Clients to Use the Class
,
Configuring DHCP Audit Logging
,
Configuring DHCP Audit Logging
,
Enabling Conflict Detection on DHCP Servers
,
Enabling Conflict Detection on DHCP Servers
,
Enabling Conflict Detection on DHCP Servers
,
Repairing the DHCP Database
,
Single Site vs. Multiple Sites
Active Directory authorization,
Installing the DHCP Server Service
audit logging,
Configuring Clients to Use the Class
availability and fault tolerance,
DHCP Availability and Fault Tolerance
binding to network interface,
Configuring DHCP Audit Logging
configuration,
Enabling Conflict Detection on DHCP Servers
conflict detection,
Enabling Conflict Detection on DHCP Servers
database maintenance,
Enabling Conflict Detection on DHCP Servers
DNS integration with,
Configuring DHCP Audit Logging
exclusions,
Using Exclusions
installing DHCP Server service,
Installing the DHCP Server Service
relay agents,
Repairing the DHCP Database
reservations,
Using Exclusions
RIS server and,
Services and Protocols Used by RIS
,
Designing the RIS Environment
rogue,
DHCP Security Considerations
role,
Server Roles
scopes,
Authorizing DHCP Servers in Active Directory
,
Using Reservations
setting up,
100/100 Failover
site design,
Single Site vs. Multiple Sites
standby,
Setting Up DHCP Servers
differential backups,
Understanding Backup Types
direct-attached printers,
Sizing Printer Hardware and Optimizing Configuration
direct-attached storage (DAS),
Using Internal and External Storage Devices
directories, ESP,
Deleting a Partition, Logical Drive, or Volume
directory partitions,
Intersite Replication Essentials
Directory Replicator service,
Controlling Remote Registry Access
directory service architecture,
Directory Service Architecture
,
Directory Service Architecture
,
Protocols and Client Interfaces
,
Protocols and Client Interfaces
,
Directory System Agent and Database Layer
client interfaces,
Directory Service Architecture
Database Layer,
Protocols and Client Interfaces
Directory System Agent,
Protocols and Client Interfaces
Extensible Storage Engine,
Directory System Agent and Database Layer
protocols,
Directory Service Architecture
Directory System Agent (DSA),
Protocols and Client Interfaces
directory trees,
Active Directory Objects
,
Active Directory Namespaces and Partitions
disabling,
Maintaining User Accounts
,
Disabling a Computer Account
,
Group Policy Processing
computer account,
Disabling a Computer Account
Group Policy,
Group Policy Processing
user accounts,
Maintaining User Accounts
disaster planning,
Network Administrative Model
,
Monitoring Print Server Performance
,
Disaster Planning
,
Disaster Planning
,
Disaster Planning
,
Developing Contingency Procedures
,
Creating a Problem Resolution Policy Document
,
Performing Backups
,
Performing Backups
,
Creating and Using ASR Disks
,
Setting Startup and Recovery Options
,
Setting Startup and Recovery Options
ASR disks,
Performing Backups
backups,
Performing Backups
boot disks,
Creating and Using ASR Disks
contingency procedures,
Disaster Planning
defining disaster,
Disaster Planning
escalation and response procedures,
Developing Contingency Procedures
print servers,
Monitoring Print Server Performance
problem resolution policy documentation,
Creating a Problem Resolution Policy Document
Recovery Console,
Setting Startup and Recovery Options
reviewing,
Network Administrative Model
startup and recovery options,
Setting Startup and Recovery Options
Disk Defragmenter,
Computer Management System Tools
,
Fixing Fragmentation by Using Disk Defragmenter
disk I/O,
Resolving Processor Bottlenecks
,
Monitoring Performance from the Command Line
recording with trace logs,
Monitoring Performance from the Command Line
resolving performance bottlenecks,
Resolving Processor Bottlenecks
Disk Management,
Computer Management System Tools
,
Configuring Storage
,
Using the Disk Management Tools
,
Adding New Disks
,
Working with GPT Disks on 64-Bit Windows Editions
,
Using and Converting Basic and Dynamic Disks
,
Using and Converting Basic and Dynamic Disks
,
Converting FAT or FAT32 to NTFS
,
Converting FAT or FAT32 to NTFS
,
Creating a Primary or Extended Partition
,
Creating a Logical Drive in an Extended Partition
,
MSR Partitions
,
Moving Dynamic Disks
,
Mirroring Boot and System Volumes on GPT Disks
,
Configuring Disk Quotas
,
Customizing Quota Entries for Individual Users
basic disk conversion,
Using and Converting Basic and Dynamic Disks
Computer Management Storage tool,
Computer Management System Tools
disks, adding,
Adding New Disks
dynamic disk conversion,
Using and Converting Basic and Dynamic Disks
extended partitions,
Converting FAT or FAT32 to NTFS
formatting,
Creating a Logical Drive in an Extended Partition
GPT disks,
Working with GPT Disks on 64-Bit Windows Editions
logical drives,
Creating a Primary or Extended Partition
overview of,
Configuring Storage
primary partitions,
Converting FAT or FAT32 to NTFS
,
MSR Partitions
quota entries,
Configuring Disk Quotas
quota violations,
Customizing Quota Entries for Individual Users
RAID 1 configuration,
Moving Dynamic Disks
RAID 5 configuration,
Mirroring Boot and System Volumes on GPT Disks
views,
Using the Disk Management Tools
disk mirroring.,
Moving Dynamic Disks
(see )
disk quotas,
Compressed (Zipped) Folders
,
Compressed (Zipped) Folders
,
How Quota Management Works
,
Customizing Quota Entries for Individual Users
,
Customizing Quota Entries for Individual Users
,
Managing Disk Quotas After Configuration
configuring,
How Quota Management Works
exporting/importing quota entries,
Managing Disk Quotas After Configuration
overview of,
Compressed (Zipped) Folders
user entries,
Customizing Quota Entries for Individual Users
violations,
Customizing Quota Entries for Individual Users
disk space,
How Shadow Copies Works
,
Configuring Shadow Copies in Computer Management
configuring shadow copies,
Configuring Shadow Copies in Computer Management
planning shadow copies,
How Shadow Copies Works
disk striping (RAID 0),
Meeting Performance, Capacity, and Availability Requirements
,
LDM Metadata and LDM Data Partitions
disk striping with parity.,
Mirroring Boot and System Volumes on GPT Disks
(see )
disk write caching,
Adding New Disks
DiskPart,
Tools for Automating Setup
,
Improving Storage Management
,
Using the Disk Management Tools
,
Adding New Disks
,
Working with GPT Disks on 64-Bit Windows Editions
,
Using and Converting Basic and Dynamic Disks
,
Configuring Mount Points
,
ESP
,
MSR Partitions
converting basic and dynamic disks,
Using and Converting Basic and Dynamic Disks
creating ESP partition,
ESP
creating MSR partition,
MSR Partitions
defined,
Tools for Automating Setup
,
Improving Storage Management
example,
Adding New Disks
extending partitions on basic disks,
Configuring Mount Points
making changes to GPT disks with,
Working with GPT Disks on 64-Bit Windows Editions
working with,
Using the Disk Management Tools
DiskRaid utility,
Hardware and Configuration Considerations for Domain Controllers
disks,
Resolving Processor Bottlenecks
,
Adding New Disks
,
Managing Windows Server 2003 File Systems
,
Analyzing NTFS Volumes by Using ChkDsk
,
Capacity Planning for Terminal Services
,
Hardware and Configuration Considerations for Domain Controllers
Active Directory installation requirements,
Hardware and Configuration Considerations for Domain Controllers
adding new,
Adding New Disks
defragmenting,
Analyzing NTFS Volumes by Using ChkDsk
file system structure,
Managing Windows Server 2003 File Systems
(see )
I/O bottlenecks,
Resolving Processor Bottlenecks
Terminal Services capacity planning,
Capacity Planning for Terminal Services
display,
Using the Date and Time Utility
,
Selecting Performance Objects and Counters to Monitor
distinguished name.,
Protocols and Client Interfaces
(see )
Distributed File System (DFS),
Remote Administration Gets a Face-Lift
,
Improving Storage Management
,
Single Site vs. Multiple Sites
file management,
Remote Administration Gets a Face-Lift
overview of,
Improving Storage Management
site design,
Single Site vs. Multiple Sites
distribution folders,
Controlling the Use of Dynamic Update during Setup
,
Selecting a Distribution Method
,
Establishing the Distribution Folders
,
Creating the Answer File
,
Examining Answer Files
,
Using Dynamic Update in Unattended Installations
,
Using RIPrep to Create an OS Image
answer files,
Creating the Answer File
automated setup with,
Selecting a Distribution Method
customizing,
Examining Answer Files
establishing,
Establishing the Distribution Folders
on CD,
Using Dynamic Update in Unattended Installations
RIPrep images and,
Using RIPrep to Create an OS Image
selecting,
Controlling the Use of Dynamic Update during Setup
distribution groups,
Understanding Groups
division model, OUs,
Using OUs for Group Policy
DLLs (dynamic-link libraries),
64-Bit Computing
,
Group Policy Architecture
DN (distinguished name),
Protocols and Client Interfaces
,
Active Directory Trusts
,
Design Considerations for Active Directory Search and Global Catalogs
defined,
Protocols and Client Interfaces
directory searches for,
Design Considerations for Active Directory Search and Global Catalogs
overview of,
Active Directory Trusts
DNS (Domain Name System),
Active Directory Can Replicate Selectively
,
Assessing Systems
,
Check Drive Partitioning
,
Upgrading from Windows 2000
,
Changing Operations Masters
,
Upgrading Domain Controllers
,
Getting and Using IP Addresses
,
Domain Names
,
Domain Names
,
Name Resolution
,
Preparing for Installation of TCP/IP Networking
,
Configuring Advanced DNS Settings
,
DHCP Security Considerations
,
Configuring DHCP Audit Logging
,
Architecting DNS Infrastructure
,
Architecting DNS Infrastructure
,
DNS Essentials
,
Public and Private Namespaces
,
Name Resolution Using DNS
,
DNS Zones and Zone Transfers
,
Secondary Zones, Stub Zones, and Conditional Forwarding
,
Architecting a DNS Design
,
Implementing and Managing DNS
,
DNS Setup
,
Configuring a Large Network Using the Configure A DNS Server Wizard
,
Creating Forward Lookup Zones
,
Configuring Forwarders and Conditional Forwarding
,
Configuring Forwarders and Conditional Forwarding
,
Configuring Forwarders and Conditional Forwarding
,
Configuring Forwarders and Conditional Forwarding
,
Configuring Subdomains and Delegating Authority
,
Configuring Zone Transfers
,
Configuring Secondary Notification
,
Service Location (SRV) Records
,
Setting Aging and Scavenging
,
Perform Lookups for Troubleshooting
,
Restoring the WINS Database
,
Hardware and Configuration Considerations for Domain Controllers
,
Creating Additional Domain Controllers for an Existing Domain
,
Creating Additional Domain Controllers for an Existing Domain
,
Selecting the Optimal Backup Techniques
,
Restoring a Failed Domain Controller by Installing a New Domain Controller
Active Directory installation requirements and,
Hardware and Configuration Considerations for Domain Controllers
advanced settings,
Configuring Advanced DNS Settings
backup and recovery,
Selecting the Optimal Backup Techniques
conditional forwarding,
Active Directory Can Replicate Selectively
,
Configuring Forwarders and Conditional Forwarding
configuring with Configure A DNS Server Wizard,
DNS Setup
delegating authority,
Configuring Forwarders and Conditional Forwarding
design for,
Architecting a DNS Design
DHCP integration with,
Configuring DHCP Audit Logging
DHCP security and,
DHCP Security Considerations
domain controller restoration,
Restoring a Failed Domain Controller by Installing a New Domain Controller
domain names,
Domain Names
forward lookup zones,
Configuring a Large Network Using the Configure A DNS Server Wizard
forwarders,
Configuring Forwarders and Conditional Forwarding
fully qualified domain names,
Domain Names
host names,
Getting and Using IP Addresses
installing,
Creating Additional Domain Controllers for an Existing Domain
,
Creating Additional Domain Controllers for an Existing Domain
installing DNS Server service,
Implementing and Managing DNS
maintenance and monitoring,
Service Location (SRV) Records
name resolution,
Name Resolution
,
Public and Private Namespaces
namespaces,
DNS Essentials
overview of,
Architecting DNS Infrastructure
resource records,
Name Resolution Using DNS
,
Configuring Secondary Notification
reverse lookup zones,
Creating Forward Lookup Zones
secondary notification,
Configuring Zone Transfers
security,
Secondary Zones, Stub Zones, and Conditional Forwarding
services, identifying,
Assessing Systems
subdomains,
Configuring Forwarders and Conditional Forwarding
TCP/IP preinstallation and,
Preparing for Installation of TCP/IP Networking
troubleshooting DNS Client service,
Setting Aging and Scavenging
troubleshooting DNS Server service,
Perform Lookups for Troubleshooting
upgrade preparation,
Check Drive Partitioning
,
Upgrading from Windows 2000
Windows Server 2003 requirements,
Upgrading Domain Controllers
Windows Server 2003 upgrades,
Changing Operations Masters
WINS lookups,
Restoring the WINS Database
zones/zone transfers,
DNS Zones and Zone Transfers
,
Configuring Subdomains and Delegating Authority
DNS clients,
Setting Aging and Scavenging
DNS console,
DNS Setup
DNS servers,
Server Roles
,
Setup Reports Insufficient System Resources
,
Services and Protocols Used by RIS
,
DNS Zones and Zone Transfers
,
Zones That Aren't Integrated with Active Directory
,
Implementing and Managing DNS
,
Setting Aging and Scavenging
,
Setting Aging and Scavenging
,
Perform Lookups for Troubleshooting
,
Check Replication to Other Name Servers
aging/scavenging options,
Setting Aging and Scavenging
configuration parameters of,
Check Replication to Other Name Servers
installing DNS Server service,
Implementing and Managing DNS
logs,
Setting Aging and Scavenging
primary,
DNS Zones and Zone Transfers
RIS requirement,
Services and Protocols Used by RIS
role,
Server Roles
secondary,
Zones That Aren't Integrated with Active Directory
troubleshooting DNS Server service,
Perform Lookups for Troubleshooting
troubleshooting installation,
Setup Reports Insufficient System Resources
DNS zones.,
DNS Zones and Zone Transfers
(see )
DNSCMD command,
DNS Setup
,
Examine the Configuration of the DNS Server
DNSSEC (DNS Security) protocol,
Secondary Zones, Stub Zones, and Conditional Forwarding
domain administrators,
Active Directory Domains, Trees, and Forests
Domain Controller Diagnostic Utility,
Hardware and Configuration Considerations for Domain Controllers
domain controllers.,
Server Roles
,
Setup Reports Insufficient System Resources
,
Upgrading Windows 2000 Forests and Domains
,
Upgrading from Windows 2000
,
Preparing the Domain(s)
,
Preparing the Domain(s)
,
Managing Disk Partitions
,
Creating Registry Backups
,
Understanding the Event Logs
,
DHCP Security Considerations
,
DNS Zones and Zone Transfers
,
Using DNS with Active Directory
,
Directory Service Architecture
,
Single Site vs. Multiple Sites
,
Determining Site Boundaries
,
Considering the Impact of Site Link Bridging
,
Connecting Clients to Active Directory
,
Creating Additional Domain Controllers for an Existing Domain
,
Creating Domain Controllers in a New Domain
,
Creating Domain Controllers in a New Domain
,
Creating a Subnet and Associating It with a Site
,
Configuring Site Bridgehead Servers
,
Recovering Configuration Data
,
Performing a Primary Restore of Sysvol Data
(see also )
Active Directory backup and restore,
Recovering Configuration Data
Active Directory sites and,
Creating a Subnet and Associating It with a Site
Active Directory–integrated zones on,
DNS Zones and Zone Transfers
backup and recovery of,
Creating Registry Backups
configuring Active Directory sites,
Considering the Impact of Site Link Bridging
configuring as preferred bridgehead server,
Configuring Site Bridgehead Servers
creating for existing domains,
Creating Additional Domain Controllers for an Existing Domain
creating in new domain,
Creating Domain Controllers in a New Domain
DHCP security and,
DHCP Security Considerations
event logs,
Understanding the Event Logs
installing Active Directory and,
Connecting Clients to Active Directory
installing DNS Server service and,
Using DNS with Active Directory
legacy clients and,
Preparing the Domain(s)
overview of,
Directory Service Architecture
replication within and between sites,
Single Site vs. Multiple Sites
restoring failed,
Creating Domain Controllers in a New Domain
,
Performing a Primary Restore of Sysvol Data
role,
Server Roles
Setup unable to connect to,
Setup Reports Insufficient System Resources
upgrade preparation tools,
Upgrading from Windows 2000
upgrading Windows 2000,
Upgrading Windows 2000 Forests and Domains
,
Preparing the Domain(s)
upgrading Windows NT 4,
Managing Disk Partitions
domain functional levels,
Design Considerations for Compatibility
domain local groups,
Understanding the Scopes of Groups
,
Understanding the Scopes of Groups
,
Modifying Other Group Settings
overview of,
Understanding the Scopes of Groups
scope,
Modifying Other Group Settings
working with,
Understanding the Scopes of Groups
Domain Name System.,
Architecting DNS Infrastructure
(see )
domain names,
Domain Names
,
Windows Internet Naming Service (WINS)
,
DNS Essentials
,
Public and Private Namespaces
overview of,
Domain Names
private namespaces,
Public and Private Namespaces
TCP/IP preinstallation,
Windows Internet Naming Service (WINS)
top-level,
DNS Essentials
domain naming master role,
Configuring the Delegated Service or Computer Account
Domain Rename utility,
Forest Root Domain Design Configurations
domain trees,
Organizing Active Directory
,
Creating Domain Controllers in a New Domain
domain trusts,
Designing the Active Directory Namespace
,
Merging Groups during Migration
,
Accessing Resources After Authentication
,
Authentication and Trusts Across Forest Boundaries
,
Examining Domain and Forest Trusts
establishing,
Examining Domain and Forest Trusts
examining existing,
Authentication and Trusts Across Forest Boundaries
managing,
Designing the Active Directory Namespace
migrating,
Merging Groups during Migration
overview of,
Accessing Resources After Authentication
domain user accounts.,
Managing Users, Groups, and Computers
(see )
DomainID (domain identifier),
Object Identifiers
domains,
Domains Can Be Renamed
,
Evaluating the Network Infrastructure
,
Finalizing Project Scope
,
Identifying Domain and Forest Functional Level
,
Defining Active Directory Server Roles
,
Protocols
,
Installation Sequence
,
Creating the Answer File
,
Additional Research
,
Check Drive Partitioning
,
Preparing for an Upgrade from Windows NT 4 to Windows Server 2003
,
Verify an Upgrade Recovery Plan
,
General Upgrade Preparation Tools
,
General Upgrade Preparation Tools
,
Upgrading the Windows 2000 Domain Controllers
,
Configuring Forwarders and Conditional Forwarding
,
Configuring Default Application Directory Partitions and Replication Scope
,
Active Directory Objects
,
Active Directory Domains, Trees, and Forests
,
Accessing Resources After Authentication
,
Shortcut Trusts
,
Organizing Active Directory
,
Creating Additional Domain Controllers for an Existing Domain
,
Creating Domain Controllers in a New Domain
,
Creating or Moving Accounts and Resources for Use with an OU
,
Assigning User Rights
,
Creating a Computer Account in Active Directory
,
Understanding Group Policy
,
Working with Local Group Policy
,
Accessing Forests, Domains, and Sites in Group Policy Management Console
,
Managing Group Policy Inheritance and Processing
accessing in GPMC,
Accessing Forests, Domains, and Sites in Group Policy Management Console
Active Directory,
Active Directory Objects
architecture,
Finalizing Project Scope
authentication and trust across domain boundaries,
Accessing Resources After Authentication
authentication and trust across forest boundaries,
Shortcut Trusts
automated installation options,
Creating the Answer File
defined,
Active Directory Domains, Trees, and Forests
,
Organizing Active Directory
delegating administration of,
Creating or Moving Accounts and Resources for Use with an OU
domain controllers for existing,
Creating Additional Domain Controllers for an Existing Domain
domain controllers in new,
Creating Domain Controllers in a New Domain
functional levels,
Identifying Domain and Forest Functional Level
group policy inheritance,
Managing Group Policy Inheritance and Processing
Group Policy Object Editor and,
Working with Local Group Policy
installation options,
Protocols
joining,
Installation Sequence
,
Creating a Computer Account in Active Directory
network,
Evaluating the Network Infrastructure
operations masters,
Defining Active Directory Server Roles
partitions,
Configuring Default Application Directory Partitions and Replication Scope
policies,
Understanding Group Policy
renaming,
Domains Can Be Renamed
subdomains,
Configuring Forwarders and Conditional Forwarding
upgrade preparation tools,
General Upgrade Preparation Tools
upgrading,
Check Drive Partitioning
,
General Upgrade Preparation Tools
user rights for,
Assigning User Rights
Windows 2000 upgrade,
Additional Research
,
Verify an Upgrade Recovery Plan
,
Upgrading the Windows 2000 Domain Controllers
Windows NT 4 upgrade,
Preparing for an Upgrade from Windows NT 4 to Windows Server 2003
doors, media library,
Enabling and Disabling Media
DoS (denial of service) attack,
DHCP Security Considerations
drag and drop,
Simple and Classic Start Menus
,
Adding, Copying, and Moving Menu Items
,
Customizing the Desktop and the Taskbar
desktop items,
Customizing the Desktop and the Taskbar
improvements to,
Simple and Classic Start Menus
Start menu supporting,
Adding, Copying, and Moving Menu Items
drive letter assignment,
Converting FAT or FAT32 to NTFS
,
Creating a Primary or Extended Partition
,
Configuring Drive Letters
,
Creating a Simple or Spanned Volume
,
Moving Dynamic Disks
,
Modifying Applications After Installation
applications and,
Modifying Applications After Installation
configuring,
Configuring Drive Letters
disk partitioning and,
Converting FAT or FAT32 to NTFS
,
Creating a Primary or Extended Partition
dynamic disks and,
Moving Dynamic Disks
volumes and,
Creating a Simple or Spanned Volume
Driver Rollback,
Automatic Updates
Driver Verifier,
Automatic Updates
Driver.cab file,
Using Windows Device Drivers
DRIVERQUERY command,
Managing Installed Drivers
drivers.,
Preinstalling Hot Fixes and Security Updates
(see )
drives,
Continue Past Lockups and Freezes
,
Enabling and Disabling Media
DSA (Directory System Agent),
Protocols and Client Interfaces
duplexers,
Sizing Printer Hardware and Optimizing Configuration
dynamic disks,
Using and Converting MBR and GPT Disks
,
Working with Basic and Dynamic Disks
,
Using and Converting Basic and Dynamic Disks
,
LDM Metadata and LDM Data Partitions
troubleshooting,
Working with Basic and Dynamic Disks
using and converting,
Using and Converting Basic and Dynamic Disks
volumes (,
LDM Metadata and LDM Data Partitions
(see )
working with,
Using and Converting MBR and GPT Disks
dynamic IP addressing,
Windows Internet Naming Service (WINS)
,
Configuring Static IP Addressing
Dynamic Update,
Preparing for the Installation and Getting Started
,
Winnt32 Command-Line Parameters
,
Using Dynamic Update
,
Using Dynamic Update
,
Creating a Local Dynamic Update Share
,
Preinstallation Tasks
,
Using Dynamic Update in Unattended Installations
during setup,
Creating a Local Dynamic Update Share
installing latest files with,
Preparing for the Installation and Getting Started
local share,
Using Dynamic Update
planning for,
Preinstallation Tasks
unattended installations and,
Using Dynamic Update in Unattended Installations
Winnt32 parameters for,
Winnt32 Command-Line Parameters
working with,
Using Dynamic Update
dynamic updates, DNS,
DNS Queries and Security
,
Configuring a Small Network Using the Configure A DNS Server Wizard
,
Configuring a Large Network Using the Configure A DNS Server Wizard
,
Creating Forward Lookup Zones
,
Configuring Secondary Notification
configuring large network,
Configuring a Large Network Using the Configure A DNS Server Wizard
configuring small network,
Configuring a Small Network Using the Configure A DNS Server Wizard
forward lookup zones,
Creating Forward Lookup Zones
resource records,
Configuring Secondary Notification
security and,
DNS Queries and Security
dynamic-link libraries (DLLs),
64-Bit Computing
,
Group Policy Architecture
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset