Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by William R. Stanek
Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials
Windows ServerĀ® 2012 R2 Inside Out: Configuration, Storage, & Essentials
Dedication
Introduction
Who is this book for?
Conventions used in this book
How to reach the author
Errata & book support
We want to hear from you
Stay in touch
1. Introducing Windows Server 2012 R2
Getting to know Windows Server 2012 R2
Windows 8.1 and Windows Server 2012 R2
Planning for Windows Server 2012 R2
Your plan: The big picture
Identifying your organizational teams
Assessing project goals
The business perspective
Identifying IT goals
Examining the interaction between IT and business units
Predicting network change
Analyzing the existing network
Evaluating the network infrastructure
Assessing systems
Identify network services and applications
Identifying security infrastructure
Reviewing network administration
Defining objectives and scope
Specifying organizational objectives
Setting the schedule
Shaping the budget
Allowing for contingencies
Finalizing project scope
Defining the new network environment
Impact on network operations
Identify security requirements
Changing the administrative approach
Select and implement standards
Change management
Final considerations for planning and deployment
Thinking about server roles and Active Directory
Planning for server usage
Designing the Active Directory namespace
Managing domain trusts
Identifying the domain and forest functional level
Defining Active Directory server roles
Planning for availability, scalability, and manageability
Planning for software needs
Planning for hardware needs
Planning for support structures and facilities
Planning for day-to-day operations
Planning for deploying highly available servers
2. Deploying Windows Server 2012 R2
Getting a quick start
Product licensing
Preparing for a Windows Server 2012 R2 installation
Understanding installation options
Determining which installation type to use
Using Windows Update
Preinstallation tasks
Installing Windows Server 2012 R2
Installation on BIOS-based systems
Installation on EFI-based systems
Planning partitions
Naming computers
Network and domain membership options
Protocols
Domain membership
Networking components
Performing a clean installation
Performing an upgrade installation
Activation sequence
Activate Windows over the Internet
Activate Windows by telephone
Using Managed Activation
Performing additional administration tasks during installations
Accessing a command prompt during installation
Forcing disk-partition removal during installation
Loading mass storage drivers during installation
Creating, deleting, and extending disk partitions during installation
Troubleshooting installation
Start with the potential points of failure
Setup refuses to install or start
Setup reports a media or DVD-ROM error
Setup reports insufficient system resources
Continue past lockups and freezes
Postinstallation tasks
3. Boot configuration
Boot from hardware and firmware
Hardware and firmware power states
Diagnosing hardware and firmware startup problems
Resolving hardware and firmware startup problems
Boot environment essentials
Managing startup and boot configuration
Managing startup and recovery options
Managing System Boot Configuration
Working with BCD Editor
Managing the boot configuration data store and its entries
Viewing BCD entries
Creating and identifying the BCD store
Importing and exporting the BCD store
Creating, copying, and deleting BCD entries
Setting BCD entry values
Changing Data Execution Prevention and physical address extension options
Changing the operating system display order
Changing the default operating system entry
Changing the default timeout
Changing the boot sequence temporarily
4. Managing Windows Server 2012 R2
Working with the administration tools
Using Control Panel utilities
Using graphical administrative tools
Using command-line utilities
Utilities to know
Using Net tools
Using Windows PowerShell
Working with Server Manager
Getting to know Server Manager
Adding servers for management
Creating server groups
Enabling remote management
Working with Computer Management
Computer Management system tools
Computer Management storage tools
Computer Management Services And Applications tools
5. Windows Server 2012 R2 MMC administration
Using the MMC
MMC snap-ins
MMC modes
MMC window and startup
MMC tool availability
MMC and remote computers
Building custom MMCs
Step 1: Creating the console
Step 2: Adding snap-ins to the console
Step 3: Saving the finished console
Setting the initial console view before saving
Setting the console mode before saving
Setting the console icon before saving
Saving the console tool
Designing custom taskpads for the MMC
Getting started with taskpads
Understanding taskpad view styles
Creating and managing taskpads
Creating and managing tasks
Creating menu command tasks
Creating shell command tasks
Creating navigation tasks
Arranging, editing, and removing tasks
Publishing and distributing your custom tools
6. Configuring roles, role services, and features
Using roles, role services, and features
Making supplemental components available
Installing components with Server Manager
Viewing configured roles and role services
Managing server roles and features
Adding server roles and features
Removing server roles and features
Managing server binaries
Installing components at the prompt
Going to the prompt for Server Management
Understanding component names
Tracking installed roles, role services, and features
Installing components at the prompt
Removing components at the prompt
7. Managing and troubleshooting hardware
Understanding hardware installation changes
Choosing internal devices
Choosing external devices
Installing devices
Understanding device installation
Installing new devices
Viewing device and driver details
Working with device drivers
Device driver essentials
Understanding and troubleshooting driver signing
Viewing driver information
Viewing Advanced, Resources, and other settings
Installing and updating device drivers
Restricting device installation by using Group Policy
Rolling back drivers
Removing device drivers for removed devices
Uninstalling, reinstalling, and disabling device drivers
Managing hardware
Adding nonāPlug and Play, older hardware
Enabling and disabling hardware
Troubleshooting hardware
Resolving resource conflicts
8. Managing the registry
Introducing the registry
Understanding the registry structure
Registry root keys
HKEY_LOCAL_MACHINE
HKLMBCD00000000
HKLMHARDWARE
HKLMSAM
HKLMSECURITY
HKLMSOFTWARE
HKLMSYSTEM
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Registry data: How it is stored and used
Where registry data comes from
Types of registry data available
Registry administration
Searching the registry
Modifying the registry
Modifying values
Adding keys and values
Removing keys and values
Modifying the registry of a remote machine
Importing and exporting registry data
Loading and unloading hive files
Working with the registry from the command line
Backing up and restoring the registry
Maintaining the registry
Using the Microsoft Fix It Utility
Removing registry settings for active installations that have failed
Removing partial or damaged settings for individual applications
Securing the registry
Preventing access to the registry utilities
Applying permissions to registry keys
Controlling remote registry access
Auditing registry access
9. Software and User Account Control administration
Software installation essentials
Mastering User Account Control
Elevation, prompts, and the secure desktop
Configuring UAC and Admin Approval Mode
Maintaining application integrity
Application access tokens
Application run levels
Configuring run levels
Controlling application installation and run behavior
10. Performance monitoring and tuning
Tuning performance, memory usage, and data throughput
Tuning Windows operating system performance
Tuning processor scheduling
Tuning virtual memory
Other important tuning, memory, and data considerations
Tracking a systemās general health
Monitoring essentials
Getting processor and memory usage for troubleshooting
Getting information on running applications
Monitoring and troubleshooting processes
Monitoring and troubleshooting services
Getting network usage information
Getting information on user and remote user sessions
Tracking events and troubleshooting by using Event Viewer
Understanding the event logs
Accessing the event logs and viewing events
Viewing event logs on remote systems
Sorting, finding, and filtering events
Sorting the event logs
Searching the event logs
Filtering the event logs
Archiving event logs
Tracking events using Windows PowerShell
Using subscriptions and forwarded events
11. Comprehensive performance analysis and logging
Establishing performance baselines
Tracking per-process resource usage
Getting an overview of resource utilization
Tracking per-process CPU utilization
Tracking per-process memory utilization
Tracking per-process disk utilization
Tracking per-process network utilization
Tracking the overall reliability of the server
Comprehensive performance monitoring
Using Performance Monitor
Selecting performance objects and counters to monitor
Choosing views and controlling the display
Monitoring performance remotely
Resolving performance bottlenecks
Resolving memory bottlenecks
Resolving processor bottlenecks
Resolving disk I/O bottlenecks
Resolving network bottlenecks
Performance logging
Creating and managing data collector sets
Using data collector templates
Collecting performance counter data
Collecting performance trace data
Collecting configuration data
Viewing data collector reports
Configuring performance counter alerts
Monitoring performance from the command line
Analyzing trace logs at the command line
12. Storage management essentials
Essential storage technologies
Using internal and external storage devices
Storage-management features and tools
Storage-management role services
Booting from SANs and using SANs with clusters
Working with SMB 3.0
Installing and configuring file services
Configuring the File And Storage Services role
Configuring multipath I/O
Adding and removing multipath hardware devices
Managing and maintaining MPIO
Meeting performance, capacity, and availability requirements
Configuring Hyper-V
Understanding Hyper-V
Installing Hyper-V
Creating virtual machines
13. Configuring disks and storage
Configuring storage
Using the Disk Management tools
Adding new disks
Using the MBR and GPT partition styles
Working with MBR disks
Working with GPT disks
Understanding legacy and protective MBRs
Using and converting MBR and GPT disks
Using the disk storage types
Working with basic and dynamic disks
Using and converting basic and dynamic disks
Creating and managing virtual hard disks for Hyper-V
Converting FAT or FAT32 to NTFS
Working with removable disks
Managing MBR disk partitions on basic disks
Creating partitions and simple volumes
Formatting a partition, logical drive, or volume
Configuring drive letters
Configuring mount points
Extending partitions
Shrinking partitions
Deleting a partition, logical drive, or volume
Managing GPT disk partitions on basic disks
ESP
MSR partitions
Primary partitions
LDM Metadata and LDM Data partitions
OEM or unknown partitions
Managing volumes on dynamic disks
Creating a simple or spanned volume
Configuring RAID 0: Striping
Recovering a failed simple, spanned, or striped disk
Moving dynamic disks
Configuring RAID 1: Disk mirroring
Creating a mirrored set by using two new disks
Adding a mirror to an existing volume
Mirroring boot and system volumes
Mirroring boot and system volumes on MBR disks
Mirroring boot and system volumes on GPT disks
Configuring RAID 5: Disk striping with parity
Breaking or removing a mirrored set
Resolving problems with mirrored sets
Repairing a mirrored system volume
Rebuilding mirrored system volumes on MBR disks
Rebuilding mirrored system volumes on GPT disks
Resolving problems with RAID-5 sets
14. TPM and BitLocker Drive Encryption
Working with trusted platforms
Managing TPM
Understanding TPM states and tools
Managing TPM owner authorization information
Preparing and initializing a TPM for first use
Turning an initialized TPM on or off
Clearing the TPM
Changing the TPM owner password
Introducing BitLocker Drive Encryption
BitLocker essentials
BitLocker modes
BitLocker changes
Using hardware encryption, secure boot, and Network Unlock
Hardware-encrypted drives
Optimizing encryption
Setting permitted encryption types
Preparing BitLocker for startup authentication and secure boot
Using Network Unlock
Provisioning BitLocker prior to deployment
Deploying BitLocker Drive Encryption
Setting up and managing BitLocker Drive Encryption
Configuring and enabling BitLocker Drive Encryption
Determining whether a computer has BitLocker-encrypted volumes
Enabling BitLocker on fixed data drives
Enabling BitLocker on removable data drives
Enabling BitLocker on operating-system volumes
Managing and troubleshooting BitLocker
Recovering data protected by BitLocker Drive Encryption
Disabling or turning off BitLocker Drive Encryption
15. File system essentials
Understanding the disk and file-system structure
Using FAT
File allocation table structure
FAT features
Using NTFS
NTFS structure
NTFS features
Analyzing the NTFS structure
Advanced NTFS features
Hard links
Data streams
Change journals
Object identifiers
Reparse points
Sparse files
Transactional NTFS
Using ReFS
ReFS features
ReFS structures
ReFS advantages
ReFS integrity streams, data scrubbing, and salvage
Using file-based compression
NTFS compression
Compressed (zipped) folders
16. Maintaining and optimizing storage
Managing NTFS disk quotas
How quota management works
Configuring disk quotas
Customizing quota entries for individual users
Managing disk quotas after configuration
Exporting and importing quota entries
Automated disk maintenance
Preventing disk-integrity problems
Running Check Disk interactively
Analyzing FAT volumes by using ChkDsk
Analyzing NTFS volumes by using ChkDsk
Repairing volumes and marking bad sectors by using ChkDsk
Automated optimization of disks
Preventing fragmentation of disks
Fixing fragmentation by using Optimize Drives
Understanding the fragmentation analysis
17. Managing storage spaces
Understanding storage spaces
Using and configuring offloaded transfers
Understanding how offloaded transfers work
Verifying support for offloaded transfers
Working with available storage
Storage Management Essentials
Creating storage pools and allocating space
Creating storage spaces
Creating a virtual disk in a storage space
Creating a standard volume
Diagnosing and resolving problems with storage spaces
Configuring data deduplication
Understanding data deduplication
Selecting data for deduplication
Interoperability with data deduplication
Deduplicating volumes
Monitoring deduplication
18. Managing file sharing
File-sharing essentials
Understanding file-sharing models
Enabling file sharing
Using and finding shares
Navigating SMB versions
Hiding and controlling share access
Special and administrative shares
C$, D$, E$, and other drive shares
ADMIN$
FAX$
IPC$
NETLOGON
PRINT$
SYSVOL
Accessing shares for administration
Creating and publishing shared folders
Creating shares by using File Explorer
Creating shares by using Computer Management
Creating shared folders in Server Manager
Changing shared folder settings
Publishing shares in Active Directory
Managing share permissions
Understanding share permissions
Configuring share permissions
Configuring synced sharing
Understanding Work Folders and sync shares
Deploying sync shares through Group Policy
Creating sync shares and enabling SMB access
Accessing Work Folders on clients
19. File security, access controls, and auditing
Managing access permissions
File and folder ownership
Permission inheritance for files and folders
Changing shaded permissions and stopping inheritance
Resetting and replacing permissions
Configuring access permissions
Basic permissions
Special permissions
Troubleshooting permissions
Managing file shares after configuration
Managing claims-based access controls
Understanding central access policies
Enabling dynamic controls and claims-based policy
Defining central access policies
Auditing file and folder access
Enabling basic auditing for files and folders
Enabling advanced auditing
Specifying files and folders to audit
Extending access policies to auditing
Monitoring the security logs
20. Managing file screening and storage reporting
Understanding file screening and storage reporting
Managing file screening and storage reporting
Managing global file-resource settings
Configuring email notifications
Configuring notification limits
Reviewing reports and configuring storage-report parameters
Configuring report locations
Configuring file-screen auditing
Configuring classification
Enabling access-denied assistance
Managing the file groups to which screens are applied
Managing file-screen templates
Creating file screens
Defining file-screening exceptions
Scheduling and generating storage reports
A. About the author
Index
About the Author
Copyright
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Index
G
garbage collection,
Monitoring deduplication
Get- cmdlets,
Using Windows PowerShell
Get-Command cmdlet,
Storage-management features and tools
,
Configuring the File And Storage Services role
Get-Counter cmdlet,
Monitoring performance from the command line
Get-Credential cmdlet,
Installing components at the prompt
Get-DedupMetadata cmdlet,
Monitoring deduplication
Get-DedupSchedule cmdlet,
Understanding data deduplication
,
Monitoring deduplication
Get-DedupStatus cmdlet,
Monitoring deduplication
Get-DedupVolume cmdlet,
Monitoring deduplication
Get-Disk cmdlet,
Adding new disks
Get-Eventlog cmdlet,
Tracking events using Windows PowerShell
,
Tracking events using Windows PowerShell
,
Tracking events using Windows PowerShell
,
Tracking events using Windows PowerShell
,
Tracking events using Windows PowerShell
,
Tracking events using Windows PowerShell
,
Tracking events using Windows PowerShell
described,
Tracking events using Windows PowerShell
EntryType property,
Tracking events using Windows PowerShell
EventID property,
Tracking events using Windows PowerShell
Index property,
Tracking events using Windows PowerShell
InstanceID property,
Tracking events using Windows PowerShell
Source property,
Tracking events using Windows PowerShell
TimeGenerated property,
Tracking events using Windows PowerShell
Get-Help cmdlet,
Storage-management features and tools
Get-Itemproperty cmdlet,
Understanding how offloaded transfers work
Get-MPIOSetting cmdlet,
Configuring multipath I/O
Get-MSDSMGlobalDefaultLoadBalancePolicy cmdlet,
Configuring multipath I/O
Get-MSDSMSupportedHw cmdlet,
Adding and removing multipath hardware devices
Get-Process cmdlet,
Monitoring essentials
,
Monitoring essentials
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
BasePriority property,
Monitoring and troubleshooting processes
CPU property,
Monitoring and troubleshooting processes
Description property,
Monitoring and troubleshooting processes
FileVersion property,
Monitoring and troubleshooting processes
HandleCount property,
Monitoring and troubleshooting processes
Id property,
Monitoring and troubleshooting processes
Memory property,
Monitoring and troubleshooting processes
MinWorkingSet property,
Monitoring and troubleshooting processes
Modules property,
Monitoring and troubleshooting processes
NonpagedSystemMemorySize property,
Monitoring and troubleshooting processes
PagedSystemMemorySize property,
Monitoring and troubleshooting processes
PageFaults property,
Monitoring and troubleshooting processes
Path property,
Monitoring and troubleshooting processes
PeakVirtualMemorySize property,
Monitoring and troubleshooting processes
PeakWorkingSet property,
Monitoring and troubleshooting processes
PFDelta property,
Monitoring and troubleshooting processes
PriorityBoostEnabled property,
Monitoring and troubleshooting processes
PriorityClass property,
Monitoring and troubleshooting processes
PrivilegedProcessorTime property,
Monitoring and troubleshooting processes
ProcessName property,
Monitoring and troubleshooting processes
ProcessorAffinity property,
Monitoring and troubleshooting processes
reducing resource usage,
Monitoring essentials
Responding property,
Monitoring and troubleshooting processes
running,
Monitoring essentials
SessionId property,
Monitoring and troubleshooting processes
StartTime property,
Monitoring and troubleshooting processes
Threads property,
Monitoring and troubleshooting processes
TotalProcessorTime property,
Monitoring and troubleshooting processes
UserProcessorTime property,
Monitoring and troubleshooting processes
viewing information about processes,
Monitoring and troubleshooting processes
VirtualMemorySize property,
Monitoring and troubleshooting processes
WorkingSet property,
Monitoring and troubleshooting processes
Get-Service cmdlet,
Monitoring essentials
,
Monitoring and troubleshooting services
,
Monitoring and troubleshooting services
,
Monitoring and troubleshooting services
,
Monitoring and troubleshooting services
,
Monitoring and troubleshooting services
CanPauseAndContinue property,
Monitoring and troubleshooting services
CanStop property,
Monitoring and troubleshooting services
DependentServices property,
Monitoring and troubleshooting services
described,
Monitoring essentials
,
Monitoring and troubleshooting services
ServicesDependedOn property,
Monitoring and troubleshooting services
Get-SmbConnection cmdlet,
Navigating SMB versions
Get-SmbSession cmdlet,
Working with SMB 3.0
Get-Smbshare cmdlet,
Using and finding shares
,
Managing file shares after configuration
Get-WindowsFeature cmdlet,
Managing server binaries
,
Going to the prompt for Server Management
,
Understanding component names
,
Installing components at the prompt
,
Installing components at the prompt
described,
Going to the prompt for Server Management
determining installed components,
Understanding component names
returning component names,
Installing components at the prompt
returning component state,
Managing server binaries
testing command,
Installing components at the prompt
Get-WindowsOptionalFeatures cmdlet,
Provisioning BitLocker prior to deployment
global catalog servers,
Defining Active Directory server roles
global object access policy,
Specifying files and folders to audit
global properties,
Configuring file-screen auditing
globally unique identifier (GUID),
Viewing BCD entries
,
HKLMBCD00000000
Goto command,
Accessing a command prompt during installation
GPOs (Group Policy Objects),
Using graphical administrative tools
,
Understanding device installation
,
Modifying the registry of a remote machine
,
Controlling remote registry access
,
Software installation essentials
,
Configuring UAC and Admin Approval Mode
,
Storage-management role services
,
Understanding TPM states and tools
,
Deploying sync shares through Group Policy
,
Understanding central access policies
,
Defining central access policies
,
Auditing file and folder access
administration tools for,
Using graphical administrative tools
applying auditing policies,
Auditing file and folder access
auditing registry access,
Controlling remote registry access
central access policies,
Defining central access policies
claims-based policy,
Understanding central access policies
configuring UAC,
Software installation essentials
,
Configuring UAC and Admin Approval Mode
device installation and,
Understanding device installation
logging Work Folders,
Deploying sync shares through Group Policy
managing registry,
Modifying the registry of a remote machine
organizational units and,
Storage-management role services
Trusted Platform Module Management,
Understanding TPM states and tools
GPT (GUID partition table),
Installing Windows Server 2012 R2
,
Resolving hardware and firmware startup problems
,
Using the Disk Management tools
,
Adding new disks
,
Using the MBR and GPT partition styles
,
Working with GPT disks
,
Understanding legacy and protective MBRs
,
Working with basic and dynamic disks
,
Working with removable disks
,
Managing GPT disk partitions on basic disks
,
Mirroring boot and system volumes on GPT disks
,
Creating storage pools and allocating space
adding new disks,
Adding new disks
converting disks,
Understanding legacy and protective MBRs
,
Working with basic and dynamic disks
Disk List view,
Using the Disk Management tools
drive letter assignment,
Working with removable disks
EFI-based systems,
Installing Windows Server 2012 R2
,
Resolving hardware and firmware startup problems
error checking,
Working with GPT disks
managing partitions on basic disks,
Managing GPT disk partitions on basic disks
mirroring boot and system volumes,
Mirroring boot and system volumes on GPT disks
organizing partitions,
Using the MBR and GPT partition styles
storage pools and,
Creating storage pools and allocating space
Gpupdate command,
Defining central access policies
Graftabl command,
Accessing a command prompt during installation
graph summary view (Task Manager Performance tab),
Getting processor and memory usage for troubleshooting
graphical administration tools,
Working with the administration tools
,
Working with the administration tools
,
Using the Disk Management tools
,
Creating and managing virtual hard disks for Hyper-V
Graphical Management Tools and Infrastructure feature,
Determining which installation type to use
,
Postinstallation tasks
Graphical View (Disk Management),
Using the Disk Management tools
,
Creating and managing virtual hard disks for Hyper-V
Group Policy,
MMC modes
,
Managing server binaries
,
Managing server binaries
,
Understanding device installation
,
Installing new devices
,
Installing and updating device drivers
,
Installing and updating device drivers
,
HKLMSYSTEM
,
Modifying the registry of a remote machine
,
Importing and exporting registry data
,
Elevation, prompts, and the secure desktop
,
Understanding the event logs
,
Understanding TPM states and tools
,
BitLocker modes
,
BitLocker modes
,
Optimizing encryption
,
Using Network Unlock
,
Deploying BitLocker Drive Encryption
,
Deploying BitLocker Drive Encryption
,
Deploying BitLocker Drive Encryption
,
Deploying BitLocker Drive Encryption
,
Configuring and enabling BitLocker Drive Encryption
,
Enabling BitLocker on fixed data drives
,
Enabling BitLocker on fixed data drives
,
Configuring share permissions
,
Deploying sync shares through Group Policy
,
Deploying sync shares through Group Policy
,
Understanding central access policies
,
Understanding central access policies
,
Defining central access policies
,
Auditing file and folder access
,
Specifying files and folders to audit
,
Configuring classification
access-denied assistance,
Configuring classification
auditing policies,
Auditing file and folder access
BitLocker Drive Encryption and,
BitLocker modes
,
Deploying BitLocker Drive Encryption
blocking Windows Update,
Understanding device installation
,
Installing and updating device drivers
central access policies,
Understanding central access policies
,
Defining central access policies
claims-based policy,
Understanding central access policies
component installation and repair,
Managing server binaries
configuring UAC,
Elevation, prompts, and the secure desktop
configuring Work Folders,
Deploying sync shares through Group Policy
device installation timeout,
Installing new devices
digital signatures,
Deploying BitLocker Drive Encryption
distributing registry changes,
Importing and exporting registry data
encryption,
Optimizing encryption
,
Deploying BitLocker Drive Encryption
fixed data drives,
Enabling BitLocker on fixed data drives
global object access policy,
Specifying files and folders to audit
hashing,
Deploying BitLocker Drive Encryption
log configuration,
Understanding the event logs
managing registry with preferences,
Modifying the registry of a remote machine
MMC author mode,
MMC modes
Network Unlock,
Using Network Unlock
removable data drives,
Enabling BitLocker on fixed data drives
restoring payloads,
Managing server binaries
restricting device installation,
Installing and updating device drivers
sync shares,
Configuring share permissions
,
Deploying sync shares through Group Policy
TPM,
Understanding TPM states and tools
,
Configuring and enabling BitLocker Drive Encryption
unlock password,
BitLocker modes
user profiles and,
HKLMSYSTEM
Group Policy Management Editor,
Configuring UAC and Admin Approval Mode
,
Configuring and enabling BitLocker Drive Encryption
,
Defining central access policies
,
Enabling basic auditing for files and folders
Group Policy Objects (GPOs),
Using graphical administrative tools
,
Understanding device installation
,
Modifying the registry of a remote machine
,
Controlling remote registry access
,
Storage-management role services
,
Understanding TPM states and tools
,
Understanding central access policies
,
Defining central access policies
,
Auditing file and folder access
administration tools for,
Using graphical administrative tools
applying auditing policies,
Auditing file and folder access
auditing registry access,
Controlling remote registry access
central access policies,
Defining central access policies
claims-based policy,
Understanding central access policies
device installation and,
Understanding device installation
managing registry,
Modifying the registry of a remote machine
organizational units and,
Storage-management role services
Trusted Platform Module Management,
Understanding TPM states and tools
GUID (globally unique identifier),
Viewing BCD entries
,
HKLMBCD00000000
GUID partition table (GPT),
Installing Windows Server 2012 R2
,
Resolving hardware and firmware startup problems
,
Using the Disk Management tools
,
Adding new disks
,
Working with GPT disks
,
Understanding legacy and protective MBRs
,
Working with basic and dynamic disks
,
Working with removable disks
,
Managing GPT disk partitions on basic disks
,
Mirroring boot and system volumes on GPT disks
,
Creating storage pools and allocating space
adding new disks,
Adding new disks
converting disks,
Understanding legacy and protective MBRs
,
Working with basic and dynamic disks
Disk List view,
Using the Disk Management tools
drive letter assignment,
Working with removable disks
EFI-based systems,
Installing Windows Server 2012 R2
,
Resolving hardware and firmware startup problems
error checking,
Working with GPT disks
managing partitions on basic disks,
Managing GPT disk partitions on basic disks
mirroring boot and system volumes,
Mirroring boot and system volumes on GPT disks
storage pools and,
Creating storage pools and allocating space
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset