Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by William R. Stanek
Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials
Windows ServerĀ® 2012 R2 Inside Out: Configuration, Storage, & Essentials
Dedication
Introduction
Who is this book for?
Conventions used in this book
How to reach the author
Errata & book support
We want to hear from you
Stay in touch
1. Introducing Windows Server 2012 R2
Getting to know Windows Server 2012 R2
Windows 8.1 and Windows Server 2012 R2
Planning for Windows Server 2012 R2
Your plan: The big picture
Identifying your organizational teams
Assessing project goals
The business perspective
Identifying IT goals
Examining the interaction between IT and business units
Predicting network change
Analyzing the existing network
Evaluating the network infrastructure
Assessing systems
Identify network services and applications
Identifying security infrastructure
Reviewing network administration
Defining objectives and scope
Specifying organizational objectives
Setting the schedule
Shaping the budget
Allowing for contingencies
Finalizing project scope
Defining the new network environment
Impact on network operations
Identify security requirements
Changing the administrative approach
Select and implement standards
Change management
Final considerations for planning and deployment
Thinking about server roles and Active Directory
Planning for server usage
Designing the Active Directory namespace
Managing domain trusts
Identifying the domain and forest functional level
Defining Active Directory server roles
Planning for availability, scalability, and manageability
Planning for software needs
Planning for hardware needs
Planning for support structures and facilities
Planning for day-to-day operations
Planning for deploying highly available servers
2. Deploying Windows Server 2012 R2
Getting a quick start
Product licensing
Preparing for a Windows Server 2012 R2 installation
Understanding installation options
Determining which installation type to use
Using Windows Update
Preinstallation tasks
Installing Windows Server 2012 R2
Installation on BIOS-based systems
Installation on EFI-based systems
Planning partitions
Naming computers
Network and domain membership options
Protocols
Domain membership
Networking components
Performing a clean installation
Performing an upgrade installation
Activation sequence
Activate Windows over the Internet
Activate Windows by telephone
Using Managed Activation
Performing additional administration tasks during installations
Accessing a command prompt during installation
Forcing disk-partition removal during installation
Loading mass storage drivers during installation
Creating, deleting, and extending disk partitions during installation
Troubleshooting installation
Start with the potential points of failure
Setup refuses to install or start
Setup reports a media or DVD-ROM error
Setup reports insufficient system resources
Continue past lockups and freezes
Postinstallation tasks
3. Boot configuration
Boot from hardware and firmware
Hardware and firmware power states
Diagnosing hardware and firmware startup problems
Resolving hardware and firmware startup problems
Boot environment essentials
Managing startup and boot configuration
Managing startup and recovery options
Managing System Boot Configuration
Working with BCD Editor
Managing the boot configuration data store and its entries
Viewing BCD entries
Creating and identifying the BCD store
Importing and exporting the BCD store
Creating, copying, and deleting BCD entries
Setting BCD entry values
Changing Data Execution Prevention and physical address extension options
Changing the operating system display order
Changing the default operating system entry
Changing the default timeout
Changing the boot sequence temporarily
4. Managing Windows Server 2012 R2
Working with the administration tools
Using Control Panel utilities
Using graphical administrative tools
Using command-line utilities
Utilities to know
Using Net tools
Using Windows PowerShell
Working with Server Manager
Getting to know Server Manager
Adding servers for management
Creating server groups
Enabling remote management
Working with Computer Management
Computer Management system tools
Computer Management storage tools
Computer Management Services And Applications tools
5. Windows Server 2012 R2 MMC administration
Using the MMC
MMC snap-ins
MMC modes
MMC window and startup
MMC tool availability
MMC and remote computers
Building custom MMCs
Step 1: Creating the console
Step 2: Adding snap-ins to the console
Step 3: Saving the finished console
Setting the initial console view before saving
Setting the console mode before saving
Setting the console icon before saving
Saving the console tool
Designing custom taskpads for the MMC
Getting started with taskpads
Understanding taskpad view styles
Creating and managing taskpads
Creating and managing tasks
Creating menu command tasks
Creating shell command tasks
Creating navigation tasks
Arranging, editing, and removing tasks
Publishing and distributing your custom tools
6. Configuring roles, role services, and features
Using roles, role services, and features
Making supplemental components available
Installing components with Server Manager
Viewing configured roles and role services
Managing server roles and features
Adding server roles and features
Removing server roles and features
Managing server binaries
Installing components at the prompt
Going to the prompt for Server Management
Understanding component names
Tracking installed roles, role services, and features
Installing components at the prompt
Removing components at the prompt
7. Managing and troubleshooting hardware
Understanding hardware installation changes
Choosing internal devices
Choosing external devices
Installing devices
Understanding device installation
Installing new devices
Viewing device and driver details
Working with device drivers
Device driver essentials
Understanding and troubleshooting driver signing
Viewing driver information
Viewing Advanced, Resources, and other settings
Installing and updating device drivers
Restricting device installation by using Group Policy
Rolling back drivers
Removing device drivers for removed devices
Uninstalling, reinstalling, and disabling device drivers
Managing hardware
Adding nonāPlug and Play, older hardware
Enabling and disabling hardware
Troubleshooting hardware
Resolving resource conflicts
8. Managing the registry
Introducing the registry
Understanding the registry structure
Registry root keys
HKEY_LOCAL_MACHINE
HKLMBCD00000000
HKLMHARDWARE
HKLMSAM
HKLMSECURITY
HKLMSOFTWARE
HKLMSYSTEM
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Registry data: How it is stored and used
Where registry data comes from
Types of registry data available
Registry administration
Searching the registry
Modifying the registry
Modifying values
Adding keys and values
Removing keys and values
Modifying the registry of a remote machine
Importing and exporting registry data
Loading and unloading hive files
Working with the registry from the command line
Backing up and restoring the registry
Maintaining the registry
Using the Microsoft Fix It Utility
Removing registry settings for active installations that have failed
Removing partial or damaged settings for individual applications
Securing the registry
Preventing access to the registry utilities
Applying permissions to registry keys
Controlling remote registry access
Auditing registry access
9. Software and User Account Control administration
Software installation essentials
Mastering User Account Control
Elevation, prompts, and the secure desktop
Configuring UAC and Admin Approval Mode
Maintaining application integrity
Application access tokens
Application run levels
Configuring run levels
Controlling application installation and run behavior
10. Performance monitoring and tuning
Tuning performance, memory usage, and data throughput
Tuning Windows operating system performance
Tuning processor scheduling
Tuning virtual memory
Other important tuning, memory, and data considerations
Tracking a systemās general health
Monitoring essentials
Getting processor and memory usage for troubleshooting
Getting information on running applications
Monitoring and troubleshooting processes
Monitoring and troubleshooting services
Getting network usage information
Getting information on user and remote user sessions
Tracking events and troubleshooting by using Event Viewer
Understanding the event logs
Accessing the event logs and viewing events
Viewing event logs on remote systems
Sorting, finding, and filtering events
Sorting the event logs
Searching the event logs
Filtering the event logs
Archiving event logs
Tracking events using Windows PowerShell
Using subscriptions and forwarded events
11. Comprehensive performance analysis and logging
Establishing performance baselines
Tracking per-process resource usage
Getting an overview of resource utilization
Tracking per-process CPU utilization
Tracking per-process memory utilization
Tracking per-process disk utilization
Tracking per-process network utilization
Tracking the overall reliability of the server
Comprehensive performance monitoring
Using Performance Monitor
Selecting performance objects and counters to monitor
Choosing views and controlling the display
Monitoring performance remotely
Resolving performance bottlenecks
Resolving memory bottlenecks
Resolving processor bottlenecks
Resolving disk I/O bottlenecks
Resolving network bottlenecks
Performance logging
Creating and managing data collector sets
Using data collector templates
Collecting performance counter data
Collecting performance trace data
Collecting configuration data
Viewing data collector reports
Configuring performance counter alerts
Monitoring performance from the command line
Analyzing trace logs at the command line
12. Storage management essentials
Essential storage technologies
Using internal and external storage devices
Storage-management features and tools
Storage-management role services
Booting from SANs and using SANs with clusters
Working with SMB 3.0
Installing and configuring file services
Configuring the File And Storage Services role
Configuring multipath I/O
Adding and removing multipath hardware devices
Managing and maintaining MPIO
Meeting performance, capacity, and availability requirements
Configuring Hyper-V
Understanding Hyper-V
Installing Hyper-V
Creating virtual machines
13. Configuring disks and storage
Configuring storage
Using the Disk Management tools
Adding new disks
Using the MBR and GPT partition styles
Working with MBR disks
Working with GPT disks
Understanding legacy and protective MBRs
Using and converting MBR and GPT disks
Using the disk storage types
Working with basic and dynamic disks
Using and converting basic and dynamic disks
Creating and managing virtual hard disks for Hyper-V
Converting FAT or FAT32 to NTFS
Working with removable disks
Managing MBR disk partitions on basic disks
Creating partitions and simple volumes
Formatting a partition, logical drive, or volume
Configuring drive letters
Configuring mount points
Extending partitions
Shrinking partitions
Deleting a partition, logical drive, or volume
Managing GPT disk partitions on basic disks
ESP
MSR partitions
Primary partitions
LDM Metadata and LDM Data partitions
OEM or unknown partitions
Managing volumes on dynamic disks
Creating a simple or spanned volume
Configuring RAID 0: Striping
Recovering a failed simple, spanned, or striped disk
Moving dynamic disks
Configuring RAID 1: Disk mirroring
Creating a mirrored set by using two new disks
Adding a mirror to an existing volume
Mirroring boot and system volumes
Mirroring boot and system volumes on MBR disks
Mirroring boot and system volumes on GPT disks
Configuring RAID 5: Disk striping with parity
Breaking or removing a mirrored set
Resolving problems with mirrored sets
Repairing a mirrored system volume
Rebuilding mirrored system volumes on MBR disks
Rebuilding mirrored system volumes on GPT disks
Resolving problems with RAID-5 sets
14. TPM and BitLocker Drive Encryption
Working with trusted platforms
Managing TPM
Understanding TPM states and tools
Managing TPM owner authorization information
Preparing and initializing a TPM for first use
Turning an initialized TPM on or off
Clearing the TPM
Changing the TPM owner password
Introducing BitLocker Drive Encryption
BitLocker essentials
BitLocker modes
BitLocker changes
Using hardware encryption, secure boot, and Network Unlock
Hardware-encrypted drives
Optimizing encryption
Setting permitted encryption types
Preparing BitLocker for startup authentication and secure boot
Using Network Unlock
Provisioning BitLocker prior to deployment
Deploying BitLocker Drive Encryption
Setting up and managing BitLocker Drive Encryption
Configuring and enabling BitLocker Drive Encryption
Determining whether a computer has BitLocker-encrypted volumes
Enabling BitLocker on fixed data drives
Enabling BitLocker on removable data drives
Enabling BitLocker on operating-system volumes
Managing and troubleshooting BitLocker
Recovering data protected by BitLocker Drive Encryption
Disabling or turning off BitLocker Drive Encryption
15. File system essentials
Understanding the disk and file-system structure
Using FAT
File allocation table structure
FAT features
Using NTFS
NTFS structure
NTFS features
Analyzing the NTFS structure
Advanced NTFS features
Hard links
Data streams
Change journals
Object identifiers
Reparse points
Sparse files
Transactional NTFS
Using ReFS
ReFS features
ReFS structures
ReFS advantages
ReFS integrity streams, data scrubbing, and salvage
Using file-based compression
NTFS compression
Compressed (zipped) folders
16. Maintaining and optimizing storage
Managing NTFS disk quotas
How quota management works
Configuring disk quotas
Customizing quota entries for individual users
Managing disk quotas after configuration
Exporting and importing quota entries
Automated disk maintenance
Preventing disk-integrity problems
Running Check Disk interactively
Analyzing FAT volumes by using ChkDsk
Analyzing NTFS volumes by using ChkDsk
Repairing volumes and marking bad sectors by using ChkDsk
Automated optimization of disks
Preventing fragmentation of disks
Fixing fragmentation by using Optimize Drives
Understanding the fragmentation analysis
17. Managing storage spaces
Understanding storage spaces
Using and configuring offloaded transfers
Understanding how offloaded transfers work
Verifying support for offloaded transfers
Working with available storage
Storage Management Essentials
Creating storage pools and allocating space
Creating storage spaces
Creating a virtual disk in a storage space
Creating a standard volume
Diagnosing and resolving problems with storage spaces
Configuring data deduplication
Understanding data deduplication
Selecting data for deduplication
Interoperability with data deduplication
Deduplicating volumes
Monitoring deduplication
18. Managing file sharing
File-sharing essentials
Understanding file-sharing models
Enabling file sharing
Using and finding shares
Navigating SMB versions
Hiding and controlling share access
Special and administrative shares
C$, D$, E$, and other drive shares
ADMIN$
FAX$
IPC$
NETLOGON
PRINT$
SYSVOL
Accessing shares for administration
Creating and publishing shared folders
Creating shares by using File Explorer
Creating shares by using Computer Management
Creating shared folders in Server Manager
Changing shared folder settings
Publishing shares in Active Directory
Managing share permissions
Understanding share permissions
Configuring share permissions
Configuring synced sharing
Understanding Work Folders and sync shares
Deploying sync shares through Group Policy
Creating sync shares and enabling SMB access
Accessing Work Folders on clients
19. File security, access controls, and auditing
Managing access permissions
File and folder ownership
Permission inheritance for files and folders
Changing shaded permissions and stopping inheritance
Resetting and replacing permissions
Configuring access permissions
Basic permissions
Special permissions
Troubleshooting permissions
Managing file shares after configuration
Managing claims-based access controls
Understanding central access policies
Enabling dynamic controls and claims-based policy
Defining central access policies
Auditing file and folder access
Enabling basic auditing for files and folders
Enabling advanced auditing
Specifying files and folders to audit
Extending access policies to auditing
Monitoring the security logs
20. Managing file screening and storage reporting
Understanding file screening and storage reporting
Managing file screening and storage reporting
Managing global file-resource settings
Configuring email notifications
Configuring notification limits
Reviewing reports and configuring storage-report parameters
Configuring report locations
Configuring file-screen auditing
Configuring classification
Enabling access-denied assistance
Managing the file groups to which screens are applied
Managing file-screen templates
Creating file screens
Defining file-screening exceptions
Scheduling and generating storage reports
A. About the author
Index
About the Author
Copyright
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Index
F
Failover Cluster Manager,
Using graphical administrative tools
,
MMC tool availability
Failover Clustering feature,
Using roles, role services, and features
failover clusters,
Storage Management Essentials
,
Interoperability with data deduplication
FAT file system,
Performing a clean installation
,
Understanding legacy and protective MBRs
,
Converting FAT or FAT32 to NTFS
,
Converting FAT or FAT32 to NTFS
,
Creating partitions and simple volumes
,
Creating partitions and simple volumes
,
Extending partitions
,
Managing GPT disk partitions on basic disks
,
BitLocker modes
,
Enabling BitLocker on fixed data drives
,
Enabling BitLocker on fixed data drives
,
Understanding the disk and file-system structure
,
Understanding the disk and file-system structure
,
Using FAT
,
File allocation table structure
,
FAT features
,
Data streams
,
ReFS integrity streams, data scrubbing, and salvage
,
Preventing disk-integrity problems
,
Running Check Disk interactively
,
Analyzing FAT volumes by using ChkDsk
,
Preventing fragmentation of disks
,
Preventing fragmentation of disks
,
File-sharing essentials
,
File security, access controls, and auditing
BitLocker Driver Encryption and,
BitLocker modes
boot partitions,
Creating partitions and simple volumes
Check Disk tool,
Preventing disk-integrity problems
,
Running Check Disk interactively
Chkdsk command,
Analyzing FAT volumes by using ChkDsk
compression and,
ReFS integrity streams, data scrubbing, and salvage
converting to NTFS,
Performing a clean installation
,
Converting FAT or FAT32 to NTFS
,
Creating partitions and simple volumes
data streams and,
Data streams
default cluster sizes,
Understanding the disk and file-system structure
enabling BitLocker,
Enabling BitLocker on fixed data drives
,
Enabling BitLocker on fixed data drives
ESP partitions,
Managing GPT disk partitions on basic disks
extending volumes,
Extending partitions
features,
File allocation table structure
fixed sector size,
Understanding the disk and file-system structure
formatting MBR and GPT partitions,
Understanding legacy and protective MBRs
formatting removable disks,
Converting FAT or FAT32 to NTFS
Optimize Drives utility,
Preventing fragmentation of disks
,
Preventing fragmentation of disks
share permissions,
File security, access controls, and auditing
standard file sharing,
File-sharing essentials
structural overview,
Using FAT
volume size and,
FAT features
FAT12 file system,
Understanding the disk and file-system structure
,
FAT features
FAT16 file system.,
File security, access controls, and auditing
(see FAT file system)
FAT32 file system,
Performing a clean installation
,
Understanding legacy and protective MBRs
,
Converting FAT or FAT32 to NTFS
,
Converting FAT or FAT32 to NTFS
,
Creating partitions and simple volumes
,
Creating partitions and simple volumes
,
Extending partitions
,
Enabling BitLocker on fixed data drives
,
Enabling BitLocker on fixed data drives
,
Understanding the disk and file-system structure
,
FAT features
,
FAT features
,
ReFS integrity streams, data scrubbing, and salvage
,
Preventing disk-integrity problems
,
Running Check Disk interactively
,
Preventing fragmentation of disks
,
Preventing fragmentation of disks
,
File-sharing essentials
boot partitions,
Creating partitions and simple volumes
Check Disk tool,
Preventing disk-integrity problems
,
Running Check Disk interactively
compression and,
ReFS integrity streams, data scrubbing, and salvage
converting to NTFS,
Performing a clean installation
,
Converting FAT or FAT32 to NTFS
,
Creating partitions and simple volumes
default cluster sizes,
Understanding the disk and file-system structure
described,
FAT features
enabling BitLocker,
Enabling BitLocker on fixed data drives
,
Enabling BitLocker on fixed data drives
extending volumes,
Extending partitions
feature comparisons,
FAT features
formatting MBR and GPT partitions,
Understanding legacy and protective MBRs
formatting removable disks,
Converting FAT or FAT32 to NTFS
Optimize Drives utility,
Preventing fragmentation of disks
,
Preventing fragmentation of disks
standard file sharing,
File-sharing essentials
FAT64 file system.,
Converting FAT or FAT32 to NTFS
(see exFAT file system)
fault tolerance,
Planning for hardware needs
,
Configuring multipath I/O
,
Managing and maintaining MPIO
,
Configuring RAID 5: Disk striping with parity
Fax Server role,
Using roles, role services, and features
Fax Service Manager,
Using graphical administrative tools
,
MMC tool availability
FAX$ share,
ADMIN$
FC command,
Accessing a command prompt during installation
FC-AL (Fibre Channel Arbitrated Loop),
Using internal and external storage devices
,
Booting from SANs and using SANs with clusters
FC-PTP (Fibre Channel Point-To-Point),
Using internal and external storage devices
FC-SW (Fibre Channel Switched Fabric),
Using internal and external storage devices
FCIP (Fibre Channel over IP),
Using internal and external storage devices
FCoE (Fibre Channel over Ethernet),
Using internal and external storage devices
,
Storage-management features and tools
,
Understanding storage spaces
FCP (Fibre Channel Protocol),
Using internal and external storage devices
,
Understanding storage spaces
,
Storage Management Essentials
features.,
Using graphical administrative tools
,
Configuring roles, role services, and features
,
Using roles, role services, and features
,
Managing server roles and features
,
Adding server roles and features
,
Going to the prompt for Server Management
,
Understanding component names
,
Understanding component names
,
Tracking installed roles, role services, and features
,
Installing components at the prompt
,
Essential storage technologies
,
Using internal and external storage devices
,
Configuring the File And Storage Services role
,
FAT features
,
NTFS structure
(see also specific features)
adding,
Managing server roles and features
adding to file servers,
Configuring the File And Storage Services role
checking for volumes,
FAT features
deprecated,
Essential storage technologies
described,
Configuring roles, role services, and features
installing,
Tracking installed roles, role services, and features
list of component names,
Understanding component names
list of primary,
Using roles, role services, and features
managing,
Going to the prompt for Server Management
removing,
Adding server roles and features
removing binary source files,
Using graphical administrative tools
storage management,
Using internal and external storage devices
tracking installed,
Understanding component names
uninstalling,
Installing components at the prompt
Federal Information Processing Standards (FIPS),
Deploying BitLocker Drive Encryption
Fibre Channel Arbitrated Loop (FC-AL),
Using internal and external storage devices
,
Booting from SANs and using SANs with clusters
Fibre Channel over Ethernet (FCoE),
Using internal and external storage devices
,
Storage-management features and tools
,
Understanding storage spaces
Fibre Channel over IP (FCIP),
Using internal and external storage devices
Fibre Channel Point-To-Point (FC-PTP),
Using internal and external storage devices
Fibre Channel Protocol (FCP),
Using internal and external storage devices
,
Storage-management features and tools
,
Understanding storage spaces
,
Storage Management Essentials
Fibre Channel Switched Fabric (FC-SW),
Using internal and external storage devices
file and folder management.,
Assessing systems
,
Assessing systems
,
Computer Management system tools
,
Understanding the registry structure
,
HKEY_CURRENT_USER
,
Modifying the registry of a remote machine
,
Loading and unloading hive files
,
Storage-management role services
,
Storage-management role services
,
Working with SMB 3.0
,
Working with removable disks
,
Working with removable disks
,
Working with removable disks
,
Creating partitions and simple volumes
,
Formatting a partition, logical drive, or volume
,
NTFS structure
,
Advanced NTFS features
,
Hard links
,
Hard links
,
Change journals
,
Object identifiers
,
Sparse files
,
ReFS integrity streams, data scrubbing, and salvage
,
NTFS compression
,
How quota management works
,
How quota management works
,
How quota management works
,
Managing file sharing
,
Hiding and controlling share access
,
Accessing shares for administration
,
Creating and publishing shared folders
,
Creating shared folders in Server Manager
,
Managing share permissions
,
Configuring share permissions
,
Configuring share permissions
,
Deploying sync shares through Group Policy
,
File security, access controls, and auditing
,
Managing access permissions
,
Permission inheritance for files and folders
,
Permission inheritance for files and folders
,
Configuring access permissions
,
Managing file shares after configuration
,
Defining central access policies
,
Specifying files and folders to audit
,
Understanding file screening and storage reporting
,
Configuring file-screen auditing
(see also specific file systems)
access-based enumeration,
Hiding and controlling share access
,
Creating shared folders in Server Manager
auditing access,
Defining central access policies
basic attributes,
File security, access controls, and auditing
classification rules,
Configuring file-screen auditing
compression,
Creating partitions and simple volumes
,
Formatting a partition, logical drive, or volume
,
ReFS integrity streams, data scrubbing, and salvage
,
How quota management works
data streams,
Hard links
defining file-screening policies,
Storage-management role services
file shares,
Assessing systems
,
Storage-management role services
,
Working with removable disks
,
Managing file sharing
,
Configuring share permissions
,
Managing file shares after configuration
hard links,
Advanced NTFS features
hive files,
Understanding the registry structure
,
HKEY_CURRENT_USER
,
Modifying the registry of a remote machine
,
Loading and unloading hive files
identifying file storage,
Assessing systems
installing and configuring file services,
Working with SMB 3.0
master file table,
NTFS structure
object identifiers,
Change journals
ownership considerations,
How quota management works
,
Managing access permissions
permission inheritance,
Permission inheritance for files and folders
Properties dialog box,
Hard links
,
NTFS compression
,
Creating and publishing shared folders
,
Deploying sync shares through Group Policy
,
Permission inheritance for files and folders
,
Configuring access permissions
removable disks,
Working with removable disks
reparse points,
Object identifiers
share permissions,
Managing share permissions
shared folders,
Computer Management system tools
,
Working with removable disks
,
Accessing shares for administration
sparse files,
Sparse files
,
How quota management works
standard storage reports,
Understanding file screening and storage reporting
synced sharing,
Configuring share permissions
File and Printer Sharing for Microsoft Networks,
Protocols
File And Storage Services role,
Planning for server usage
,
Enabling remote management
,
Using roles, role services, and features
,
Storage-management features and tools
,
Booting from SANs and using SANs with clusters
,
Working with SMB 3.0
,
Understanding storage spaces
,
Verifying support for offloaded transfers
,
Storage Management Essentials
,
Understanding central access policies
,
Understanding central access policies
described,
Planning for server usage
,
Using roles, role services, and features
,
Storage-management features and tools
dynamic controls,
Understanding central access policies
enabling dynamic controls,
Understanding central access policies
installing and configuring file services,
Working with SMB 3.0
managing SANs,
Booting from SANs and using SANs with clusters
remote management and,
Enabling remote management
storage pools,
Storage Management Essentials
Storage Services role service,
Understanding storage spaces
working with available storage,
Verifying support for offloaded transfers
File Explorer,
MMC window and startup
,
Software installation essentials
,
NTFS compression
,
Understanding how offloaded transfers work
,
Using and finding shares
,
Accessing shares for administration
,
Managing access permissions
,
Managing access permissions
,
Specifying files and folders to audit
compressing or expanding system files,
NTFS compression
creating shared folders,
Using and finding shares
,
Accessing shares for administration
examining attributes,
Managing access permissions
file and folder ownership,
Managing access permissions
offloaded transfers,
Understanding how offloaded transfers work
software installation,
Software installation essentials
starting console tools,
MMC window and startup
viewing and configuring auditing,
Specifying files and folders to audit
File Replication Service log,
Understanding the event logs
File Screen Auditing report,
Understanding file screening and storage reporting
file screening.,
Storage-management role services
,
Managing file screening and storage reporting
,
Managing file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Managing file screening and storage reporting
,
Configuring report locations
,
Configuring file-screen auditing
,
Configuring classification
,
Managing the file groups to which screens are applied
,
Managing the file groups to which screens are applied
,
Managing the file groups to which screens are applied
,
Managing the file groups to which screens are applied
,
Managing file-screen templates
,
Managing file-screen templates
,
Managing file-screen templates
(see also storage reports)
configuring auditing,
Configuring report locations
configuring classification,
Configuring file-screen auditing
creating file screens,
Managing file-screen templates
defining exceptions,
Managing file-screen templates
defining policies,
Storage-management role services
described,
Managing file screening and storage reporting
enabling access-denied assistance,
Configuring classification
file-screen groups,
Understanding file screening and storage reporting
,
Managing the file groups to which screens are applied
file-screen templates,
Managing file screening and storage reporting
,
Managing the file groups to which screens are applied
file-screen variables,
Managing file-screen templates
managing file groups to which screen are applied,
Managing the file groups to which screens are applied
managing global file-resource settings,
Managing file screening and storage reporting
Properties dialog box,
Managing the file groups to which screens are applied
File Server Resource Manager (FSRM).,
Using graphical administrative tools
,
Using roles, role services, and features
,
Storage-management role services
,
Interoperability with data deduplication
,
Creating shared folders in Server Manager
,
Understanding central access policies
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Configuring classification
(see also file screening; storage reports)
access-denied assistance,
Configuring classification
Classification Management node,
Understanding file screening and storage reporting
described,
Using graphical administrative tools
,
Storage-management role services
disk quotas,
Interoperability with data deduplication
,
Creating shared folders in Server Manager
File and Storage Services,
Using roles, role services, and features
,
Understanding central access policies
File Management Tasks node,
Understanding file screening and storage reporting
File Screening Management node,
Understanding file screening and storage reporting
Quota Management node,
Understanding file screening and storage reporting
Storage Reports Management node,
Understanding file screening and storage reporting
File Server Resource Manager Options dialog box,
Managing file screening and storage reporting
,
Enabling access-denied assistance
File Server role service,
Understanding central access policies
File Server VSS Agent Service,
Storage-management features and tools
,
Storage-management role services
File Sharing dialog box,
Creating shares by using File Explorer
file systems.,
Understanding the registry structure
,
Using the MBR and GPT partition styles
,
Creating partitions and simple volumes
,
Formatting a partition, logical drive, or volume
,
File system essentials
,
Understanding the disk and file-system structure
,
Understanding how offloaded transfers work
,
Specifying files and folders to audit
,
Specifying files and folders to audit
(see also specific file systems)
allocation unit size,
Creating partitions and simple volumes
,
Formatting a partition, logical drive, or volume
boot sector,
Using the MBR and GPT partition styles
filter drivers,
Understanding how offloaded transfers work
formatting disks,
Understanding the disk and file-system structure
Properties dialog box,
Specifying files and folders to audit
registry organization,
Understanding the registry structure
structural overview,
File system essentials
File Transfer Protocol (FTP),
Compressed (zipped) folders
file-mapping views (virtual memory),
Tuning virtual memory
Files By File Group report,
Understanding file screening and storage reporting
Files By Owner report,
Understanding file screening and storage reporting
Files By Property report,
Understanding file screening and storage reporting
FileServerResourceManager module (PowerShell),
Storage-management features and tools
Filter Current Log dialog box,
Filtering the event logs
filtering event logs,
Filtering the event logs
Find command,
Accessing a command prompt during installation
Find dialog box (Event Viewer),
Viewing event logs on remote systems
Find dialog box (registry),
Searching the registry
Find Shared Folders dialog box,
Using and finding shares
Findstr command,
Accessing a command prompt during installation
FIPS (Federal Information Processing Standards),
Deploying BitLocker Drive Encryption
fire-suppression systems,
Planning for support structures and facilities
FireWire standard,
Choosing internal devices
,
Choosing external devices
,
Installing new devices
,
Working with GPT disks
firmware.,
Postinstallation tasks
(see hardware and firmware)
Fix It Portable utility,
Maintaining the registry
fixed-disk provisioning,
Storage-management role services
flash memory,
Understanding the disk and file-system structure
flexible single-master operations (FSMOs) roles,
Adding server roles and features
Fltmc command,
Understanding how offloaded transfers work
Folder Action dialog box,
Using data collector templates
Folder Classifier classification method,
Configuring file-screen auditing
Folders By Property report,
Understanding file screening and storage reporting
For command,
Accessing a command prompt during installation
foreground processes,
Getting processor and memory usage for troubleshooting
forest functional levels,
Identifying the domain and forest functional level
forest root,
Planning for server usage
ForestDnsZones application partition,
Planning for server usage
forests, defined,
Planning for server usage
Format command,
Preinstallation tasks
,
Accessing a command prompt during installation
,
ReFS integrity streams, data scrubbing, and salvage
Format dialog box,
Formatting a partition, logical drive, or volume
forwarded events,
Tracking events using Windows PowerShell
Forwarded Events log,
Understanding the event logs
,
Using subscriptions and forwarded events
FQDN (fully qualified domain name),
Getting to know Server Manager
fragmentation, disk,
Repairing volumes and marking bad sectors by using ChkDsk
FSMOs (flexible single-master operations) roles,
Adding server roles and features
FSRM (File Server Resource Manager).,
Using graphical administrative tools
,
Using roles, role services, and features
,
Storage-management role services
,
Interoperability with data deduplication
,
Creating shared folders in Server Manager
,
Understanding central access policies
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Configuring classification
(see also file screening; storage reports)
access-denied assistance,
Configuring classification
Classification Management node,
Understanding file screening and storage reporting
described,
Using graphical administrative tools
,
Storage-management role services
disk quotas,
Interoperability with data deduplication
,
Creating shared folders in Server Manager
File and Storage Services,
Using roles, role services, and features
,
Understanding central access policies
File Management Tasks node,
Understanding file screening and storage reporting
File Screening Management node,
Understanding file screening and storage reporting
Quota Management node,
Understanding file screening and storage reporting
Storage Reports Management node,
Understanding file screening and storage reporting
Fsutil tool,
Choosing internal devices
,
Storage-management features and tools
,
Adding new disks
,
FAT features
,
NTFS structure
,
NTFS features
,
Hard links
,
Change journals
,
Object identifiers
,
Reparse points
,
Sparse files
,
Transactional NTFS
,
Managing disk quotas after configuration
,
Managing disk quotas after configuration
Behavior command,
NTFS structure
,
Managing disk quotas after configuration
described,
Storage-management features and tools
Fsinfo command,
Choosing internal devices
,
Adding new disks
,
FAT features
,
NTFS features
Hardlink command,
Hard links
ObjectId command,
Object identifiers
Quota command,
Managing disk quotas after configuration
ReparsePoint command,
Reparse points
Sparse command,
Sparse files
Transaction command,
Transactional NTFS
Usn command,
Change journals
FTP (File Transfer Protocol),
Compressed (zipped) folders
Ftp command,
Accessing a command prompt during installation
,
Utilities to know
FTYPE command,
Accessing a command prompt during installation
,
MMC window and startup
Full authorization level,
Understanding TPM states and tools
Full Control permission,
Applying permissions to registry keys
,
Creating shares by using File Explorer
,
Creating shares by using Computer Management
,
Understanding share permissions
,
Configuring share permissions
,
Basic permissions
,
Troubleshooting permissions
described,
Applying permissions to registry keys
,
Understanding share permissions
,
Basic permissions
Read/Write permission level and,
Creating shares by using File Explorer
security considerations,
Creating shares by using Computer Management
,
Configuring share permissions
troubleshooting,
Troubleshooting permissions
Full Server installation (Server With a GUI installation),
Understanding installation options
,
Performing a clean installation
,
Postinstallation tasks
,
Postinstallation tasks
,
Creating server groups
choosing,
Performing a clean installation
converting to Minimal Server installation,
Postinstallation tasks
described,
Understanding installation options
remote management and,
Creating server groups
reverting to,
Postinstallation tasks
fully qualified domain name (FQDN),
Getting to know Server Manager
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset