Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by William R. Stanek
Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials
Windows Server® 2012 R2 Inside Out: Configuration, Storage, & Essentials
Dedication
Introduction
Who is this book for?
Conventions used in this book
How to reach the author
Errata & book support
We want to hear from you
Stay in touch
1. Introducing Windows Server 2012 R2
Getting to know Windows Server 2012 R2
Windows 8.1 and Windows Server 2012 R2
Planning for Windows Server 2012 R2
Your plan: The big picture
Identifying your organizational teams
Assessing project goals
The business perspective
Identifying IT goals
Examining the interaction between IT and business units
Predicting network change
Analyzing the existing network
Evaluating the network infrastructure
Assessing systems
Identify network services and applications
Identifying security infrastructure
Reviewing network administration
Defining objectives and scope
Specifying organizational objectives
Setting the schedule
Shaping the budget
Allowing for contingencies
Finalizing project scope
Defining the new network environment
Impact on network operations
Identify security requirements
Changing the administrative approach
Select and implement standards
Change management
Final considerations for planning and deployment
Thinking about server roles and Active Directory
Planning for server usage
Designing the Active Directory namespace
Managing domain trusts
Identifying the domain and forest functional level
Defining Active Directory server roles
Planning for availability, scalability, and manageability
Planning for software needs
Planning for hardware needs
Planning for support structures and facilities
Planning for day-to-day operations
Planning for deploying highly available servers
2. Deploying Windows Server 2012 R2
Getting a quick start
Product licensing
Preparing for a Windows Server 2012 R2 installation
Understanding installation options
Determining which installation type to use
Using Windows Update
Preinstallation tasks
Installing Windows Server 2012 R2
Installation on BIOS-based systems
Installation on EFI-based systems
Planning partitions
Naming computers
Network and domain membership options
Protocols
Domain membership
Networking components
Performing a clean installation
Performing an upgrade installation
Activation sequence
Activate Windows over the Internet
Activate Windows by telephone
Using Managed Activation
Performing additional administration tasks during installations
Accessing a command prompt during installation
Forcing disk-partition removal during installation
Loading mass storage drivers during installation
Creating, deleting, and extending disk partitions during installation
Troubleshooting installation
Start with the potential points of failure
Setup refuses to install or start
Setup reports a media or DVD-ROM error
Setup reports insufficient system resources
Continue past lockups and freezes
Postinstallation tasks
3. Boot configuration
Boot from hardware and firmware
Hardware and firmware power states
Diagnosing hardware and firmware startup problems
Resolving hardware and firmware startup problems
Boot environment essentials
Managing startup and boot configuration
Managing startup and recovery options
Managing System Boot Configuration
Working with BCD Editor
Managing the boot configuration data store and its entries
Viewing BCD entries
Creating and identifying the BCD store
Importing and exporting the BCD store
Creating, copying, and deleting BCD entries
Setting BCD entry values
Changing Data Execution Prevention and physical address extension options
Changing the operating system display order
Changing the default operating system entry
Changing the default timeout
Changing the boot sequence temporarily
4. Managing Windows Server 2012 R2
Working with the administration tools
Using Control Panel utilities
Using graphical administrative tools
Using command-line utilities
Utilities to know
Using Net tools
Using Windows PowerShell
Working with Server Manager
Getting to know Server Manager
Adding servers for management
Creating server groups
Enabling remote management
Working with Computer Management
Computer Management system tools
Computer Management storage tools
Computer Management Services And Applications tools
5. Windows Server 2012 R2 MMC administration
Using the MMC
MMC snap-ins
MMC modes
MMC window and startup
MMC tool availability
MMC and remote computers
Building custom MMCs
Step 1: Creating the console
Step 2: Adding snap-ins to the console
Step 3: Saving the finished console
Setting the initial console view before saving
Setting the console mode before saving
Setting the console icon before saving
Saving the console tool
Designing custom taskpads for the MMC
Getting started with taskpads
Understanding taskpad view styles
Creating and managing taskpads
Creating and managing tasks
Creating menu command tasks
Creating shell command tasks
Creating navigation tasks
Arranging, editing, and removing tasks
Publishing and distributing your custom tools
6. Configuring roles, role services, and features
Using roles, role services, and features
Making supplemental components available
Installing components with Server Manager
Viewing configured roles and role services
Managing server roles and features
Adding server roles and features
Removing server roles and features
Managing server binaries
Installing components at the prompt
Going to the prompt for Server Management
Understanding component names
Tracking installed roles, role services, and features
Installing components at the prompt
Removing components at the prompt
7. Managing and troubleshooting hardware
Understanding hardware installation changes
Choosing internal devices
Choosing external devices
Installing devices
Understanding device installation
Installing new devices
Viewing device and driver details
Working with device drivers
Device driver essentials
Understanding and troubleshooting driver signing
Viewing driver information
Viewing Advanced, Resources, and other settings
Installing and updating device drivers
Restricting device installation by using Group Policy
Rolling back drivers
Removing device drivers for removed devices
Uninstalling, reinstalling, and disabling device drivers
Managing hardware
Adding non–Plug and Play, older hardware
Enabling and disabling hardware
Troubleshooting hardware
Resolving resource conflicts
8. Managing the registry
Introducing the registry
Understanding the registry structure
Registry root keys
HKEY_LOCAL_MACHINE
HKLMBCD00000000
HKLMHARDWARE
HKLMSAM
HKLMSECURITY
HKLMSOFTWARE
HKLMSYSTEM
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Registry data: How it is stored and used
Where registry data comes from
Types of registry data available
Registry administration
Searching the registry
Modifying the registry
Modifying values
Adding keys and values
Removing keys and values
Modifying the registry of a remote machine
Importing and exporting registry data
Loading and unloading hive files
Working with the registry from the command line
Backing up and restoring the registry
Maintaining the registry
Using the Microsoft Fix It Utility
Removing registry settings for active installations that have failed
Removing partial or damaged settings for individual applications
Securing the registry
Preventing access to the registry utilities
Applying permissions to registry keys
Controlling remote registry access
Auditing registry access
9. Software and User Account Control administration
Software installation essentials
Mastering User Account Control
Elevation, prompts, and the secure desktop
Configuring UAC and Admin Approval Mode
Maintaining application integrity
Application access tokens
Application run levels
Configuring run levels
Controlling application installation and run behavior
10. Performance monitoring and tuning
Tuning performance, memory usage, and data throughput
Tuning Windows operating system performance
Tuning processor scheduling
Tuning virtual memory
Other important tuning, memory, and data considerations
Tracking a system’s general health
Monitoring essentials
Getting processor and memory usage for troubleshooting
Getting information on running applications
Monitoring and troubleshooting processes
Monitoring and troubleshooting services
Getting network usage information
Getting information on user and remote user sessions
Tracking events and troubleshooting by using Event Viewer
Understanding the event logs
Accessing the event logs and viewing events
Viewing event logs on remote systems
Sorting, finding, and filtering events
Sorting the event logs
Searching the event logs
Filtering the event logs
Archiving event logs
Tracking events using Windows PowerShell
Using subscriptions and forwarded events
11. Comprehensive performance analysis and logging
Establishing performance baselines
Tracking per-process resource usage
Getting an overview of resource utilization
Tracking per-process CPU utilization
Tracking per-process memory utilization
Tracking per-process disk utilization
Tracking per-process network utilization
Tracking the overall reliability of the server
Comprehensive performance monitoring
Using Performance Monitor
Selecting performance objects and counters to monitor
Choosing views and controlling the display
Monitoring performance remotely
Resolving performance bottlenecks
Resolving memory bottlenecks
Resolving processor bottlenecks
Resolving disk I/O bottlenecks
Resolving network bottlenecks
Performance logging
Creating and managing data collector sets
Using data collector templates
Collecting performance counter data
Collecting performance trace data
Collecting configuration data
Viewing data collector reports
Configuring performance counter alerts
Monitoring performance from the command line
Analyzing trace logs at the command line
12. Storage management essentials
Essential storage technologies
Using internal and external storage devices
Storage-management features and tools
Storage-management role services
Booting from SANs and using SANs with clusters
Working with SMB 3.0
Installing and configuring file services
Configuring the File And Storage Services role
Configuring multipath I/O
Adding and removing multipath hardware devices
Managing and maintaining MPIO
Meeting performance, capacity, and availability requirements
Configuring Hyper-V
Understanding Hyper-V
Installing Hyper-V
Creating virtual machines
13. Configuring disks and storage
Configuring storage
Using the Disk Management tools
Adding new disks
Using the MBR and GPT partition styles
Working with MBR disks
Working with GPT disks
Understanding legacy and protective MBRs
Using and converting MBR and GPT disks
Using the disk storage types
Working with basic and dynamic disks
Using and converting basic and dynamic disks
Creating and managing virtual hard disks for Hyper-V
Converting FAT or FAT32 to NTFS
Working with removable disks
Managing MBR disk partitions on basic disks
Creating partitions and simple volumes
Formatting a partition, logical drive, or volume
Configuring drive letters
Configuring mount points
Extending partitions
Shrinking partitions
Deleting a partition, logical drive, or volume
Managing GPT disk partitions on basic disks
ESP
MSR partitions
Primary partitions
LDM Metadata and LDM Data partitions
OEM or unknown partitions
Managing volumes on dynamic disks
Creating a simple or spanned volume
Configuring RAID 0: Striping
Recovering a failed simple, spanned, or striped disk
Moving dynamic disks
Configuring RAID 1: Disk mirroring
Creating a mirrored set by using two new disks
Adding a mirror to an existing volume
Mirroring boot and system volumes
Mirroring boot and system volumes on MBR disks
Mirroring boot and system volumes on GPT disks
Configuring RAID 5: Disk striping with parity
Breaking or removing a mirrored set
Resolving problems with mirrored sets
Repairing a mirrored system volume
Rebuilding mirrored system volumes on MBR disks
Rebuilding mirrored system volumes on GPT disks
Resolving problems with RAID-5 sets
14. TPM and BitLocker Drive Encryption
Working with trusted platforms
Managing TPM
Understanding TPM states and tools
Managing TPM owner authorization information
Preparing and initializing a TPM for first use
Turning an initialized TPM on or off
Clearing the TPM
Changing the TPM owner password
Introducing BitLocker Drive Encryption
BitLocker essentials
BitLocker modes
BitLocker changes
Using hardware encryption, secure boot, and Network Unlock
Hardware-encrypted drives
Optimizing encryption
Setting permitted encryption types
Preparing BitLocker for startup authentication and secure boot
Using Network Unlock
Provisioning BitLocker prior to deployment
Deploying BitLocker Drive Encryption
Setting up and managing BitLocker Drive Encryption
Configuring and enabling BitLocker Drive Encryption
Determining whether a computer has BitLocker-encrypted volumes
Enabling BitLocker on fixed data drives
Enabling BitLocker on removable data drives
Enabling BitLocker on operating-system volumes
Managing and troubleshooting BitLocker
Recovering data protected by BitLocker Drive Encryption
Disabling or turning off BitLocker Drive Encryption
15. File system essentials
Understanding the disk and file-system structure
Using FAT
File allocation table structure
FAT features
Using NTFS
NTFS structure
NTFS features
Analyzing the NTFS structure
Advanced NTFS features
Hard links
Data streams
Change journals
Object identifiers
Reparse points
Sparse files
Transactional NTFS
Using ReFS
ReFS features
ReFS structures
ReFS advantages
ReFS integrity streams, data scrubbing, and salvage
Using file-based compression
NTFS compression
Compressed (zipped) folders
16. Maintaining and optimizing storage
Managing NTFS disk quotas
How quota management works
Configuring disk quotas
Customizing quota entries for individual users
Managing disk quotas after configuration
Exporting and importing quota entries
Automated disk maintenance
Preventing disk-integrity problems
Running Check Disk interactively
Analyzing FAT volumes by using ChkDsk
Analyzing NTFS volumes by using ChkDsk
Repairing volumes and marking bad sectors by using ChkDsk
Automated optimization of disks
Preventing fragmentation of disks
Fixing fragmentation by using Optimize Drives
Understanding the fragmentation analysis
17. Managing storage spaces
Understanding storage spaces
Using and configuring offloaded transfers
Understanding how offloaded transfers work
Verifying support for offloaded transfers
Working with available storage
Storage Management Essentials
Creating storage pools and allocating space
Creating storage spaces
Creating a virtual disk in a storage space
Creating a standard volume
Diagnosing and resolving problems with storage spaces
Configuring data deduplication
Understanding data deduplication
Selecting data for deduplication
Interoperability with data deduplication
Deduplicating volumes
Monitoring deduplication
18. Managing file sharing
File-sharing essentials
Understanding file-sharing models
Enabling file sharing
Using and finding shares
Navigating SMB versions
Hiding and controlling share access
Special and administrative shares
C$, D$, E$, and other drive shares
ADMIN$
FAX$
IPC$
NETLOGON
PRINT$
SYSVOL
Accessing shares for administration
Creating and publishing shared folders
Creating shares by using File Explorer
Creating shares by using Computer Management
Creating shared folders in Server Manager
Changing shared folder settings
Publishing shares in Active Directory
Managing share permissions
Understanding share permissions
Configuring share permissions
Configuring synced sharing
Understanding Work Folders and sync shares
Deploying sync shares through Group Policy
Creating sync shares and enabling SMB access
Accessing Work Folders on clients
19. File security, access controls, and auditing
Managing access permissions
File and folder ownership
Permission inheritance for files and folders
Changing shaded permissions and stopping inheritance
Resetting and replacing permissions
Configuring access permissions
Basic permissions
Special permissions
Troubleshooting permissions
Managing file shares after configuration
Managing claims-based access controls
Understanding central access policies
Enabling dynamic controls and claims-based policy
Defining central access policies
Auditing file and folder access
Enabling basic auditing for files and folders
Enabling advanced auditing
Specifying files and folders to audit
Extending access policies to auditing
Monitoring the security logs
20. Managing file screening and storage reporting
Understanding file screening and storage reporting
Managing file screening and storage reporting
Managing global file-resource settings
Configuring email notifications
Configuring notification limits
Reviewing reports and configuring storage-report parameters
Configuring report locations
Configuring file-screen auditing
Configuring classification
Enabling access-denied assistance
Managing the file groups to which screens are applied
Managing file-screen templates
Creating file screens
Defining file-screening exceptions
Scheduling and generating storage reports
A. About the author
Index
About the Author
Copyright
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Index
P
p-states,
Diagnosing hardware and firmware startup problems
PAE (Physical Address Extension),
Creating, copying, and deleting BCD entries
,
Changing Data Execution Prevention and physical address extension options
page file partition/volume,
Installing Windows Server 2012 R2
page file partitions/volumes,
Installing Windows Server 2012 R2
,
Working with basic and dynamic disks
page file-backed virtual memory,
Tuning virtual memory
paged pool,
Resolving performance bottlenecks
paging file,
Installing Windows Server 2012 R2
,
Understanding the registry structure
,
Tuning virtual memory
,
Tuning virtual memory
,
Tuning virtual memory
,
Other important tuning, memory, and data considerations
,
Other important tuning, memory, and data considerations
,
Other important tuning, memory, and data considerations
,
Using Performance Monitor
,
Resolving memory bottlenecks
address space limits,
Tuning virtual memory
BIOS-based systems and,
Installing Windows Server 2012 R2
managing configuration,
Other important tuning, memory, and data considerations
memory bottlenecks and,
Resolving memory bottlenecks
monitoring performance,
Using Performance Monitor
RAID configuration and,
Tuning virtual memory
registry structure and,
Understanding the registry structure
setting for individual drives,
Other important tuning, memory, and data considerations
troubleshooting,
Other important tuning, memory, and data considerations
tuning virtual memory,
Tuning virtual memory
Paging File performance object,
Using Performance Monitor
Paging File\%Usage counter,
Resolving memory bottlenecks
Paging File\%Usage Peak counter,
Resolving memory bottlenecks
Parallel ATA (PATA),
Choosing internal devices
Parallel SCSI (SPI),
Choosing internal devices
parity volumes,
Creating storage spaces
,
Creating a standard volume
partitions,
Product licensing
,
Preinstallation tasks
,
Preinstallation tasks
,
Installing Windows Server 2012 R2
,
Installing Windows Server 2012 R2
,
Installing Windows Server 2012 R2
,
Installing Windows Server 2012 R2
,
Installing Windows Server 2012 R2
,
Installation on BIOS-based systems
,
Planning partitions
,
Performing a clean installation
,
Accessing a command prompt during installation
,
Creating, deleting, and extending disk partitions during installation
,
Creating, deleting, and extending disk partitions during installation
,
Creating, deleting, and extending disk partitions during installation
,
Postinstallation tasks
,
Resolving hardware and firmware startup problems
,
Resolving hardware and firmware startup problems
,
Configuring disks and storage
,
Using the Disk Management tools
,
Using the MBR and GPT partition styles
,
Using the MBR and GPT partition styles
,
Working with GPT disks
,
Working with GPT disks
,
Understanding legacy and protective MBRs
,
Working with basic and dynamic disks
,
Working with basic and dynamic disks
,
Working with basic and dynamic disks
,
Working with basic and dynamic disks
,
Using and converting basic and dynamic disks
,
Using and converting basic and dynamic disks
,
Working with removable disks
,
Creating partitions and simple volumes
,
Creating partitions and simple volumes
,
Formatting a partition, logical drive, or volume
,
Configuring mount points
,
Configuring mount points
,
Shrinking partitions
,
Deleting a partition, logical drive, or volume
,
ESP
,
MSR partitions
,
LDM Metadata and LDM Data partitions
,
LDM Metadata and LDM Data partitions
,
Mirroring boot and system volumes on GPT disks
,
Deploying BitLocker Drive Encryption
,
Object identifiers
active,
Installing Windows Server 2012 R2
,
Working with basic and dynamic disks
,
Deploying BitLocker Drive Encryption
BIOS-based systems,
Preinstallation tasks
,
Resolving hardware and firmware startup problems
boot.,
Using the MBR and GPT partition styles
(see boot partitions/volumes)
choosing format,
Creating partitions and simple volumes
clean installations,
Performing a clean installation
crash dump,
Installing Windows Server 2012 R2
,
Working with basic and dynamic disks
creating,
Working with removable disks
creating additional,
Planning partitions
creating during installation,
Creating, deleting, and extending disk partitions during installation
defined,
Configuring disks and storage
deleting,
Deleting a partition, logical drive, or volume
deleting during installation,
Creating, deleting, and extending disk partitions during installation
EFI-based systems,
Installing Windows Server 2012 R2
,
Resolving hardware and firmware startup problems
extending,
Creating, deleting, and extending disk partitions during installation
,
Using the MBR and GPT partition styles
,
Working with basic and dynamic disks
,
Configuring mount points
forcing removal during installation,
Accessing a command prompt during installation
formatting,
Understanding legacy and protective MBRs
,
Creating partitions and simple volumes
GPT.,
Working with GPT disks
(see GPT (GUID partition table))
LDM Data,
Using and converting basic and dynamic disks
,
LDM Metadata and LDM Data partitions
LDM Metadata,
Using and converting basic and dynamic disks
,
ESP
,
LDM Metadata and LDM Data partitions
listing,
Using the Disk Management tools
MBR.,
Working with GPT disks
(see MBR (master boot record))
mount points,
Configuring mount points
,
Object identifiers
page file,
Installing Windows Server 2012 R2
,
Working with basic and dynamic disks
planning,
Installation on BIOS-based systems
postinstallation tasks,
Postinstallation tasks
preinstallation tasks,
Product licensing
,
Preinstallation tasks
primary.,
MSR partitions
(see primary partitions)
shrinking,
Shrinking partitions
system.,
Mirroring boot and system volumes on GPT disks
(see system partitions/volumes)
unformatted disk space and,
Formatting a partition, logical drive, or volume
volumes and,
Installing Windows Server 2012 R2
passive cooling mode,
Diagnosing hardware and firmware startup problems
passive screening,
Managing file screening and storage reporting
passwords.,
Performing a clean installation
,
Elevation, prompts, and the secure desktop
,
Elevation, prompts, and the secure desktop
,
Managing TPM owner authorization information
,
Preparing and initializing a TPM for first use
,
Clearing the TPM
,
BitLocker modes
,
Enabling BitLocker on fixed data drives
,
Managing and troubleshooting BitLocker
,
Enabling file sharing
(see also recovery keys or passwords)
Administrator account,
Performing a clean installation
BitLocker,
Enabling BitLocker on fixed data drives
,
Managing and troubleshooting BitLocker
password-protected sharing,
Enabling file sharing
TPM,
Managing TPM owner authorization information
,
Preparing and initializing a TPM for first use
,
Clearing the TPM
UAC,
Elevation, prompts, and the secure desktop
unlock,
BitLocker modes
PATA (Parallel ATA),
Choosing internal devices
Path command,
Accessing a command prompt during installation
Pathping command,
Accessing a command prompt during installation
,
Utilities to know
Pause command,
Accessing a command prompt during installation
payloads,
Removing server roles and features
PCI (Peripheral Component Interconnect),
Diagnosing hardware and firmware startup problems
,
Troubleshooting hardware
PCIe devices,
Installing new devices
PCRs (Platform Configuration Registers),
Preparing BitLocker for startup authentication and secure boot
PE (Preinstallation Environment),
Getting a quick start
,
Accessing a command prompt during installation
,
Provisioning BitLocker prior to deployment
Peer Name Resolution Protocol (PNRP),
Using roles, role services, and features
performance analysis and logging,
Comprehensive performance analysis and logging
,
Comprehensive performance analysis and logging
,
Tracking the overall reliability of the server
,
Resolving performance bottlenecks
,
Resolving network bottlenecks
comprehensive performance monitoring,
Tracking the overall reliability of the server
establishing performance baselines,
Comprehensive performance analysis and logging
performance logging,
Resolving network bottlenecks
resolving performance bottlenecks,
Resolving performance bottlenecks
tools and features,
Comprehensive performance analysis and logging
performance baselines,
Establishing performance baselines
,
Tracking per-process resource usage
,
Tracking per-process network utilization
tracking per-process resource usage,
Tracking per-process resource usage
tracking server reliability,
Tracking per-process network utilization
types of,
Establishing performance baselines
performance bottlenecks,
Resolving performance bottlenecks
,
Resolving performance bottlenecks
,
Resolving memory bottlenecks
,
Resolving processor bottlenecks
,
Resolving disk I/O bottlenecks
described,
Resolving performance bottlenecks
resolving disk I/O bottlenecks,
Resolving processor bottlenecks
resolving memory bottlenecks,
Resolving performance bottlenecks
resolving network bottlenecks,
Resolving disk I/O bottlenecks
resolving processor bottlenecks,
Resolving memory bottlenecks
Performance Counter data collector set type,
Creating and managing data collector sets
,
Using data collector templates
performance counters,
Comprehensive performance analysis and logging
,
Tracking per-process network utilization
,
Using Performance Monitor
,
Using Performance Monitor
,
Selecting performance objects and counters to monitor
,
Choosing views and controlling the display
,
Using data collector templates
,
Configuring performance counter alerts
collecting data,
Using data collector templates
configuring alerts,
Comprehensive performance analysis and logging
,
Configuring performance counter alerts
deleting,
Selecting performance objects and counters to monitor
described,
Tracking per-process network utilization
,
Using Performance Monitor
selecting to monitor,
Using Performance Monitor
tracking on additional computers,
Choosing views and controlling the display
Performance Log Users group,
Monitoring performance remotely
Performance Monitor,
MMC tool availability
,
Comprehensive performance analysis and logging
,
Tracking per-process network utilization
,
Tracking the overall reliability of the server
,
Using Performance Monitor
,
Using Performance Monitor
,
Using Performance Monitor
,
Selecting performance objects and counters to monitor
,
Choosing views and controlling the display
,
Choosing views and controlling the display
,
Resolving network bottlenecks
,
Viewing data collector reports
,
Configuring performance counter alerts
choosing views,
Using Performance Monitor
controlling display,
Using Performance Monitor
data collector sets and reports,
Resolving network bottlenecks
described,
MMC tool availability
,
Comprehensive performance analysis and logging
,
Tracking the overall reliability of the server
Histogram Bar view,
Choosing views and controlling the display
monitoring performance from command line,
Configuring performance counter alerts
Properties dialog box,
Selecting performance objects and counters to monitor
,
Viewing data collector reports
Report view,
Choosing views and controlling the display
selecting objects and counters to monitor,
Using Performance Monitor
tracking server reliability,
Tracking per-process network utilization
performance monitoring and tuning,
Planning for support structures and facilities
,
Getting to know Server Manager
,
MMC tool availability
,
Performance monitoring and tuning
,
Tuning processor scheduling
,
Tuning processor scheduling
,
Other important tuning, memory, and data considerations
,
Other important tuning, memory, and data considerations
,
Getting information on user and remote user sessions
,
Tracking the overall reliability of the server
,
Monitoring performance remotely
,
Configuring performance counter alerts
command-line,
Configuring performance counter alerts
comprehensive performance monitoring,
Tracking the overall reliability of the server
importance of,
Planning for support structures and facilities
MMC and,
MMC tool availability
monitoring remotely,
Monitoring performance remotely
other considerations,
Other important tuning, memory, and data considerations
processor scheduling,
Tuning processor scheduling
Server Manager and,
Getting to know Server Manager
tracking system health,
Other important tuning, memory, and data considerations
tracking using Event Manager,
Getting information on user and remote user sessions
virtual memory,
Tuning processor scheduling
Windows operating system,
Performance monitoring and tuning
performance objects,
Tracking the overall reliability of the server
,
Using Performance Monitor
,
Monitoring performance remotely
described,
Tracking the overall reliability of the server
monitoring remotely,
Monitoring performance remotely
selecting to monitor,
Using Performance Monitor
Performance Options dialog box,
Changing Data Execution Prevention and physical address extension options
,
Performance monitoring and tuning
,
Other important tuning, memory, and data considerations
Performance tool,
Computer Management system tools
Peripheral Component Interconnect (PCI),
Diagnosing hardware and firmware startup problems
,
Troubleshooting hardware
Permission Entry dialog box,
Configuring share permissions
,
Basic permissions
,
Special permissions
permissions and privileges.,
Working with the administration tools
,
Managing server binaries
,
Introducing the registry
,
Introducing the registry
,
Modifying values
,
Applying permissions to registry keys
,
Software and User Account Control administration
,
Software and User Account Control administration
,
Software and User Account Control administration
,
Elevation, prompts, and the secure desktop
,
Elevation, prompts, and the secure desktop
,
Elevation, prompts, and the secure desktop
,
Application access tokens
,
Application access tokens
,
Application access tokens
,
Accessing the event logs and viewing events
,
Turning an initialized TPM on or off
,
Clearing the TPM
,
Hiding and controlling share access
,
Configuring share permissions
,
Configuring share permissions
,
Creating sync shares and enabling SMB access
,
Creating sync shares and enabling SMB access
,
File security, access controls, and auditing
,
Permission inheritance for files and folders
,
Permission inheritance for files and folders
,
Resetting and replacing permissions
,
Configuring access permissions
,
Basic permissions
,
Troubleshooting permissions
(see also share permissions)
access,
Hiding and controlling share access
,
File security, access controls, and auditing
administrator,
Software and User Account Control administration
,
Elevation, prompts, and the secure desktop
,
Application access tokens
applying to registry keys,
Applying permissions to registry keys
audit failures,
Accessing the event logs and viewing events
basic permissions,
Configuring access permissions
clearing TPM,
Clearing the TPM
cumulative,
Troubleshooting permissions
elevated,
Managing server binaries
,
Introducing the registry
,
Software and User Account Control administration
,
Elevation, prompts, and the secure desktop
,
Application access tokens
inherited,
Configuring share permissions
,
Creating sync shares and enabling SMB access
,
Permission inheritance for files and folders
managing TPM states,
Turning an initialized TPM on or off
modifying registry values,
Modifying values
resetting and replacing,
Resetting and replacing permissions
security tokens and,
Introducing the registry
Server Manager,
Working with the administration tools
shaded,
Permission inheritance for files and folders
software installation and,
Software and User Account Control administration
,
Elevation, prompts, and the secure desktop
,
Application access tokens
special permissions,
Basic permissions
sync shares and,
Creating sync shares and enabling SMB access
Permissions For dialog box,
Applying permissions to registry keys
Permissions For SAM dialog box,
Auditing registry access
personal identification number (PIN),
BitLocker modes
,
Deploying BitLocker Drive Encryption
,
Configuring and enabling BitLocker Drive Encryption
Physical Address Extension (PAE),
Creating, copying, and deleting BCD entries
,
Changing Data Execution Prevention and physical address extension options
PhysicalDisk performance object,
Using Performance Monitor
PhysicalDisk!Avg. Disk Sec/Transfer counter,
Resolving memory bottlenecks
PhysicalDisk\%Disk Time counter,
Resolving memory bottlenecks
,
Resolving disk I/O bottlenecks
,
Resolving network bottlenecks
PhysicalDiskAvg. Disk Queue Length counter,
Resolving memory bottlenecks
PhysicalDiskAvg. Disk Read Queue Length counter,
Resolving disk I/O bottlenecks
PhysicalDiskAvg. Disk Write Queue Length counter,
Resolving disk I/O bottlenecks
PhysicalDiskCurrent Disk Queue Length counter,
Resolving disk I/O bottlenecks
PhysicalDiskDisk Reads/Sec counter,
Resolving disk I/O bottlenecks
PhysicalDiskDisk Writes/Sec counter,
Resolving disk I/O bottlenecks
PID (process ID),
Monitoring and troubleshooting processes
PIN (personal identification number),
BitLocker modes
,
Deploying BitLocker Drive Encryption
,
Configuring and enabling BitLocker Drive Encryption
Ping command,
Accessing a command prompt during installation
,
Utilities to know
planning process,
Windows 8.1 and Windows Server 2012 R2
,
Windows 8.1 and Windows Server 2012 R2
,
Your plan: The big picture
,
Your plan: The big picture
,
Your plan: The big picture
,
Your plan: The big picture
,
Your plan: The big picture
,
Your plan: The big picture
,
Identifying your organizational teams
,
Assessing project goals
,
Predicting network change
,
Reviewing network administration
,
Reviewing network administration
,
Defining objectives and scope
,
Defining the new network environment
,
Final considerations for planning and deployment
,
Final considerations for planning and deployment
,
Defining Active Directory server roles
,
Planning for availability, scalability, and manageability
,
Planning for software needs
analyzing existing networks,
Your plan: The big picture
,
Predicting network change
assessing project goals,
Your plan: The big picture
,
Identifying your organizational teams
big picture plan,
Windows 8.1 and Windows Server 2012 R2
compatibility issues,
Reviewing network administration
creating documentation,
Assessing project goals
defining new network environment,
Your plan: The big picture
,
Defining the new network environment
defining objectives and scope,
Your plan: The big picture
,
Reviewing network administration
final considerations,
Your plan: The big picture
,
Final considerations for planning and deployment
for availability, scalability, and manageability,
Defining Active Directory server roles
for hardware needs,
Planning for software needs
for software needs,
Planning for availability, scalability, and manageability
identifying organizational teams,
Windows 8.1 and Windows Server 2012 R2
,
Your plan: The big picture
scope creep and,
Defining objectives and scope
server roles and Active Directory,
Final considerations for planning and deployment
Platform Configuration Registers (PCRs),
Preparing BitLocker for startup authentication and secure boot
platters (hard disk drives),
File system essentials
Plug and Play technology,
Setup refuses to install or start
,
Installing new devices
,
Working with device drivers
,
Rolling back drivers
,
Adding new disks
described,
Installing new devices
,
Working with device drivers
,
Adding new disks
removing drivers,
Rolling back drivers
troubleshooting installation,
Setup refuses to install or start
PNRP (Peer Name Resolution Protocol),
Using roles, role services, and features
Popd command,
Accessing a command prompt during installation
postinstallation baselines,
Establishing performance baselines
postinstallation tasks,
Continue past lockups and freezes
power-state management,
Hardware and firmware power states
,
Diagnosing hardware and firmware startup problems
,
Diagnosing hardware and firmware startup problems
described,
Hardware and firmware power states
diagnosing startup problems,
Diagnosing hardware and firmware startup problems
resolving startup problems,
Diagnosing hardware and firmware startup problems
PowerShell (Windows),
Postinstallation tasks
,
Working with the administration tools
,
Utilities to know
,
Creating server groups
,
MMC window and startup
,
Using roles, role services, and features
,
Removing server roles and features
,
Removing server roles and features
,
Installing components at the prompt
,
Installing components at the prompt
,
Installing components at the prompt
,
Working with the registry from the command line
,
Monitoring essentials
,
Tracking events using Windows PowerShell
,
Monitoring performance from the command line
,
Storage-management features and tools
accessing registry,
Working with the registry from the command line
described,
Working with the administration tools
,
Utilities to know
,
Using roles, role services, and features
installing components,
Installing components at the prompt
managing server binaries,
Removing server roles and features
performance monitoring with,
Monitoring performance from the command line
postinstallation tasks,
Postinstallation tasks
remote management and,
Creating server groups
removing components,
Installing components at the prompt
Server Manager and,
Removing server roles and features
starting console tools,
MMC window and startup
storage management,
Storage-management features and tools
stored credentials,
Installing components at the prompt
Task Manager and,
Monitoring essentials
tracking events with,
Tracking events using Windows PowerShell
Preinstallation Environment (PE),
Getting a quick start
,
Accessing a command prompt during installation
,
Provisioning BitLocker prior to deployment
preinstallation tasks,
Using Windows Update
primary partitions,
Using the MBR and GPT partition styles
,
Working with GPT disks
,
Working with basic and dynamic disks
,
Formatting a partition, logical drive, or volume
,
MSR partitions
,
Deploying BitLocker Drive Encryption
basic disks and,
Working with basic and dynamic disks
BitLocker requirements,
Deploying BitLocker Drive Encryption
creating,
MSR partitions
described,
Using the MBR and GPT partition styles
formatting,
Formatting a partition, logical drive, or volume
redundant tables,
Working with GPT disks
primordial pools,
Creating storage spaces
Print And Document Services role,
Planning for server usage
,
Using roles, role services, and features
Print command,
Accessing a command prompt during installation
Print Management,
Using graphical administrative tools
,
MMC tool availability
Print Queue performance object,
Using Performance Monitor
print services,
Assessing systems
PRINT$ share,
ADMIN$
private virtual memory,
Tuning virtual memory
privileges.,
Configuring share permissions
(see permissions and privileges)
Problem Reporting balloon,
Adding non–Plug and Play, older hardware
problem-escalation procedures,
Planning for day-to-day operations
process ID (PID),
Monitoring and troubleshooting processes
Process performance object,
Using Performance Monitor
processes,
Getting processor and memory usage for troubleshooting
,
Getting processor and memory usage for troubleshooting
,
Getting processor and memory usage for troubleshooting
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Tracking per-process resource usage
,
Using Performance Monitor
,
Working with trusted platforms
,
Working with trusted platforms
,
Working with trusted platforms
background,
Getting processor and memory usage for troubleshooting
binding,
Working with trusted platforms
foreground,
Getting processor and memory usage for troubleshooting
isolating,
Monitoring and troubleshooting processes
monitoring and troubleshooting,
Monitoring and troubleshooting processes
monitoring performance,
Using Performance Monitor
sealing,
Working with trusted platforms
tracking resource usage,
Tracking per-process resource usage
Windows,
Getting processor and memory usage for troubleshooting
wrapping,
Working with trusted platforms
processor affinity,
Resolving memory bottlenecks
Processor object,
Resolving processor bottlenecks
,
Monitoring performance from the command line
Processor performance object,
Using Performance Monitor
processor throttling,
Diagnosing hardware and firmware startup problems
processors,
Setup reports insufficient system resources
,
Diagnosing hardware and firmware startup problems
,
Setting BCD entry values
,
Tuning processor scheduling
,
Monitoring essentials
,
Getting an overview of resource utilization
,
Tracking per-process CPU utilization
,
Using Performance Monitor
,
Resolving memory bottlenecks
DEP requirement,
Setting BCD entry values
getting usage for troubleshooting,
Monitoring essentials
monitoring performance,
Using Performance Monitor
power states,
Diagnosing hardware and firmware startup problems
resolving bottlenecks,
Resolving memory bottlenecks
tracking resource usage,
Getting an overview of resource utilization
troubleshooting installation problems,
Setup reports insufficient system resources
troubleshooting performance,
Tracking per-process CPU utilization
tuning scheduling,
Tuning processor scheduling
Processor\%Privileged Time counter,
Resolving processor bottlenecks
Processor\%Processor Time counter,
Resolving processor bottlenecks
,
Resolving network bottlenecks
Processor\%User Time counter,
Resolving processor bottlenecks
ProcessorInterrupts/Sec counter,
Resolving processor bottlenecks
product activation,
Product licensing
,
Performing a clean installation
,
Performing an upgrade installation
,
Activation sequence
,
Activate Windows by telephone
,
Activate Windows by telephone
activating by phone,
Activate Windows by telephone
activating over Internet,
Activation sequence
activation sequence,
Performing an upgrade installation
clean installations,
Performing a clean installation
described,
Product licensing
managed activation,
Activate Windows by telephone
product ID,
Product licensing
,
Getting to know Server Manager
,
Adding and removing multipath hardware devices
product keys,
Product licensing
,
Performing a clean installation
product licensing,
Assessing systems
,
Product licensing
,
Performing a clean installation
,
Performing an upgrade installation
,
Activation sequence
cleaning installations,
Performing a clean installation
converting evaluation license to retail license,
Activation sequence
described,
Product licensing
elapsed evaluation period,
Performing an upgrade installation
evaluating,
Assessing systems
product management teams,
Identifying your organizational teams
Program Compatibility Assistant,
Software installation essentials
Program Install And Uninstall Troubleshooter,
Using the Microsoft Fix It Utility
project goals, assessing,
Your plan: The big picture
,
Identifying your organizational teams
project management teams,
Your plan: The big picture
project worksheets,
Predicting network change
Prompt command,
Accessing a command prompt during installation
prompts, UAC,
Elevation, prompts, and the secure desktop
Properties dialog box,
Working with the administration tools
,
Working with Server Manager
,
Creating navigation tasks
,
Understanding and troubleshooting driver signing
,
Restricting device installation by using Group Policy
,
Troubleshooting hardware
,
Securing the registry
,
Configuring run levels
,
Accessing the event logs and viewing events
,
Filtering the event logs
,
Tracking events using Windows PowerShell
,
Using subscriptions and forwarded events
,
Tracking the overall reliability of the server
,
Selecting performance objects and counters to monitor
,
Viewing data collector reports
,
Configuring the File And Storage Services role
,
Adding and removing multipath hardware devices
,
Moving dynamic disks
,
Hard links
,
NTFS compression
,
NTFS compression
,
NTFS compression
,
Configuring disk quotas
,
Managing disk quotas after configuration
,
Managing disk quotas after configuration
,
Preventing disk-integrity problems
,
Storage Management Essentials
,
Storage Management Essentials
,
Diagnosing and resolving problems with storage spaces
,
Diagnosing and resolving problems with storage spaces
,
Creating and publishing shared folders
,
Creating shared folders in Server Manager
,
Configuring share permissions
,
Configuring share permissions
,
Deploying sync shares through Group Policy
,
Managing access permissions
,
Permission inheritance for files and folders
,
Permission inheritance for files and folders
,
Permission inheritance for files and folders
,
Configuring access permissions
,
Configuring access permissions
,
Enabling advanced auditing
,
Specifying files and folders to audit
,
Managing the file groups to which screens are applied
auditing policies,
Enabling advanced auditing
devices and device drivers,
Understanding and troubleshooting driver signing
,
Restricting device installation by using Group Policy
,
Troubleshooting hardware
disks,
NTFS compression
event logs,
Filtering the event logs
events,
Accessing the event logs and viewing events
,
Tracking events using Windows PowerShell
file groups,
Managing the file groups to which screens are applied
file systems,
Specifying files and folders to audit
files,
Hard links
,
NTFS compression
,
Permission inheritance for files and folders
,
Configuring access permissions
folders,
NTFS compression
,
Creating and publishing shared folders
,
Deploying sync shares through Group Policy
,
Permission inheritance for files and folders
,
Configuring access permissions
Internet,
Working with the administration tools
MPIO,
Configuring the File And Storage Services role
,
Adding and removing multipath hardware devices
Performance Monitor,
Selecting performance objects and counters to monitor
,
Viewing data collector reports
RacTask task,
Tracking the overall reliability of the server
Registry Editor,
Securing the registry
Server Manager,
Working with Server Manager
shares,
Creating shared folders in Server Manager
,
Configuring share permissions
,
Configuring share permissions
,
Managing access permissions
,
Permission inheritance for files and folders
software applications,
Configuring run levels
storage pools,
Storage Management Essentials
,
Diagnosing and resolving problems with storage spaces
subscriptions,
Using subscriptions and forwarded events
taskpads,
Creating navigation tasks
virtual disks,
Storage Management Essentials
,
Diagnosing and resolving problems with storage spaces
volumes,
Moving dynamic disks
,
Configuring disk quotas
,
Managing disk quotas after configuration
,
Managing disk quotas after configuration
,
Preventing disk-integrity problems
protocols, networking,
Naming computers
public folder sharing,
File-sharing essentials
publishing,
Publishing and distributing your custom tools
,
Using and finding shares
,
Publishing shares in Active Directory
custom tools,
Publishing and distributing your custom tools
shared folders,
Using and finding shares
,
Publishing shares in Active Directory
Pushd command,
Accessing a command prompt during installation
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset