Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by William R. Stanek
Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials
Windows ServerĀ® 2012 R2 Inside Out: Configuration, Storage, & Essentials
Dedication
Introduction
Who is this book for?
Conventions used in this book
How to reach the author
Errata & book support
We want to hear from you
Stay in touch
1. Introducing Windows Server 2012 R2
Getting to know Windows Server 2012 R2
Windows 8.1 and Windows Server 2012 R2
Planning for Windows Server 2012 R2
Your plan: The big picture
Identifying your organizational teams
Assessing project goals
The business perspective
Identifying IT goals
Examining the interaction between IT and business units
Predicting network change
Analyzing the existing network
Evaluating the network infrastructure
Assessing systems
Identify network services and applications
Identifying security infrastructure
Reviewing network administration
Defining objectives and scope
Specifying organizational objectives
Setting the schedule
Shaping the budget
Allowing for contingencies
Finalizing project scope
Defining the new network environment
Impact on network operations
Identify security requirements
Changing the administrative approach
Select and implement standards
Change management
Final considerations for planning and deployment
Thinking about server roles and Active Directory
Planning for server usage
Designing the Active Directory namespace
Managing domain trusts
Identifying the domain and forest functional level
Defining Active Directory server roles
Planning for availability, scalability, and manageability
Planning for software needs
Planning for hardware needs
Planning for support structures and facilities
Planning for day-to-day operations
Planning for deploying highly available servers
2. Deploying Windows Server 2012 R2
Getting a quick start
Product licensing
Preparing for a Windows Server 2012 R2 installation
Understanding installation options
Determining which installation type to use
Using Windows Update
Preinstallation tasks
Installing Windows Server 2012 R2
Installation on BIOS-based systems
Installation on EFI-based systems
Planning partitions
Naming computers
Network and domain membership options
Protocols
Domain membership
Networking components
Performing a clean installation
Performing an upgrade installation
Activation sequence
Activate Windows over the Internet
Activate Windows by telephone
Using Managed Activation
Performing additional administration tasks during installations
Accessing a command prompt during installation
Forcing disk-partition removal during installation
Loading mass storage drivers during installation
Creating, deleting, and extending disk partitions during installation
Troubleshooting installation
Start with the potential points of failure
Setup refuses to install or start
Setup reports a media or DVD-ROM error
Setup reports insufficient system resources
Continue past lockups and freezes
Postinstallation tasks
3. Boot configuration
Boot from hardware and firmware
Hardware and firmware power states
Diagnosing hardware and firmware startup problems
Resolving hardware and firmware startup problems
Boot environment essentials
Managing startup and boot configuration
Managing startup and recovery options
Managing System Boot Configuration
Working with BCD Editor
Managing the boot configuration data store and its entries
Viewing BCD entries
Creating and identifying the BCD store
Importing and exporting the BCD store
Creating, copying, and deleting BCD entries
Setting BCD entry values
Changing Data Execution Prevention and physical address extension options
Changing the operating system display order
Changing the default operating system entry
Changing the default timeout
Changing the boot sequence temporarily
4. Managing Windows Server 2012 R2
Working with the administration tools
Using Control Panel utilities
Using graphical administrative tools
Using command-line utilities
Utilities to know
Using Net tools
Using Windows PowerShell
Working with Server Manager
Getting to know Server Manager
Adding servers for management
Creating server groups
Enabling remote management
Working with Computer Management
Computer Management system tools
Computer Management storage tools
Computer Management Services And Applications tools
5. Windows Server 2012 R2 MMC administration
Using the MMC
MMC snap-ins
MMC modes
MMC window and startup
MMC tool availability
MMC and remote computers
Building custom MMCs
Step 1: Creating the console
Step 2: Adding snap-ins to the console
Step 3: Saving the finished console
Setting the initial console view before saving
Setting the console mode before saving
Setting the console icon before saving
Saving the console tool
Designing custom taskpads for the MMC
Getting started with taskpads
Understanding taskpad view styles
Creating and managing taskpads
Creating and managing tasks
Creating menu command tasks
Creating shell command tasks
Creating navigation tasks
Arranging, editing, and removing tasks
Publishing and distributing your custom tools
6. Configuring roles, role services, and features
Using roles, role services, and features
Making supplemental components available
Installing components with Server Manager
Viewing configured roles and role services
Managing server roles and features
Adding server roles and features
Removing server roles and features
Managing server binaries
Installing components at the prompt
Going to the prompt for Server Management
Understanding component names
Tracking installed roles, role services, and features
Installing components at the prompt
Removing components at the prompt
7. Managing and troubleshooting hardware
Understanding hardware installation changes
Choosing internal devices
Choosing external devices
Installing devices
Understanding device installation
Installing new devices
Viewing device and driver details
Working with device drivers
Device driver essentials
Understanding and troubleshooting driver signing
Viewing driver information
Viewing Advanced, Resources, and other settings
Installing and updating device drivers
Restricting device installation by using Group Policy
Rolling back drivers
Removing device drivers for removed devices
Uninstalling, reinstalling, and disabling device drivers
Managing hardware
Adding nonāPlug and Play, older hardware
Enabling and disabling hardware
Troubleshooting hardware
Resolving resource conflicts
8. Managing the registry
Introducing the registry
Understanding the registry structure
Registry root keys
HKEY_LOCAL_MACHINE
HKLMBCD00000000
HKLMHARDWARE
HKLMSAM
HKLMSECURITY
HKLMSOFTWARE
HKLMSYSTEM
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
Registry data: How it is stored and used
Where registry data comes from
Types of registry data available
Registry administration
Searching the registry
Modifying the registry
Modifying values
Adding keys and values
Removing keys and values
Modifying the registry of a remote machine
Importing and exporting registry data
Loading and unloading hive files
Working with the registry from the command line
Backing up and restoring the registry
Maintaining the registry
Using the Microsoft Fix It Utility
Removing registry settings for active installations that have failed
Removing partial or damaged settings for individual applications
Securing the registry
Preventing access to the registry utilities
Applying permissions to registry keys
Controlling remote registry access
Auditing registry access
9. Software and User Account Control administration
Software installation essentials
Mastering User Account Control
Elevation, prompts, and the secure desktop
Configuring UAC and Admin Approval Mode
Maintaining application integrity
Application access tokens
Application run levels
Configuring run levels
Controlling application installation and run behavior
10. Performance monitoring and tuning
Tuning performance, memory usage, and data throughput
Tuning Windows operating system performance
Tuning processor scheduling
Tuning virtual memory
Other important tuning, memory, and data considerations
Tracking a systemās general health
Monitoring essentials
Getting processor and memory usage for troubleshooting
Getting information on running applications
Monitoring and troubleshooting processes
Monitoring and troubleshooting services
Getting network usage information
Getting information on user and remote user sessions
Tracking events and troubleshooting by using Event Viewer
Understanding the event logs
Accessing the event logs and viewing events
Viewing event logs on remote systems
Sorting, finding, and filtering events
Sorting the event logs
Searching the event logs
Filtering the event logs
Archiving event logs
Tracking events using Windows PowerShell
Using subscriptions and forwarded events
11. Comprehensive performance analysis and logging
Establishing performance baselines
Tracking per-process resource usage
Getting an overview of resource utilization
Tracking per-process CPU utilization
Tracking per-process memory utilization
Tracking per-process disk utilization
Tracking per-process network utilization
Tracking the overall reliability of the server
Comprehensive performance monitoring
Using Performance Monitor
Selecting performance objects and counters to monitor
Choosing views and controlling the display
Monitoring performance remotely
Resolving performance bottlenecks
Resolving memory bottlenecks
Resolving processor bottlenecks
Resolving disk I/O bottlenecks
Resolving network bottlenecks
Performance logging
Creating and managing data collector sets
Using data collector templates
Collecting performance counter data
Collecting performance trace data
Collecting configuration data
Viewing data collector reports
Configuring performance counter alerts
Monitoring performance from the command line
Analyzing trace logs at the command line
12. Storage management essentials
Essential storage technologies
Using internal and external storage devices
Storage-management features and tools
Storage-management role services
Booting from SANs and using SANs with clusters
Working with SMB 3.0
Installing and configuring file services
Configuring the File And Storage Services role
Configuring multipath I/O
Adding and removing multipath hardware devices
Managing and maintaining MPIO
Meeting performance, capacity, and availability requirements
Configuring Hyper-V
Understanding Hyper-V
Installing Hyper-V
Creating virtual machines
13. Configuring disks and storage
Configuring storage
Using the Disk Management tools
Adding new disks
Using the MBR and GPT partition styles
Working with MBR disks
Working with GPT disks
Understanding legacy and protective MBRs
Using and converting MBR and GPT disks
Using the disk storage types
Working with basic and dynamic disks
Using and converting basic and dynamic disks
Creating and managing virtual hard disks for Hyper-V
Converting FAT or FAT32 to NTFS
Working with removable disks
Managing MBR disk partitions on basic disks
Creating partitions and simple volumes
Formatting a partition, logical drive, or volume
Configuring drive letters
Configuring mount points
Extending partitions
Shrinking partitions
Deleting a partition, logical drive, or volume
Managing GPT disk partitions on basic disks
ESP
MSR partitions
Primary partitions
LDM Metadata and LDM Data partitions
OEM or unknown partitions
Managing volumes on dynamic disks
Creating a simple or spanned volume
Configuring RAID 0: Striping
Recovering a failed simple, spanned, or striped disk
Moving dynamic disks
Configuring RAID 1: Disk mirroring
Creating a mirrored set by using two new disks
Adding a mirror to an existing volume
Mirroring boot and system volumes
Mirroring boot and system volumes on MBR disks
Mirroring boot and system volumes on GPT disks
Configuring RAID 5: Disk striping with parity
Breaking or removing a mirrored set
Resolving problems with mirrored sets
Repairing a mirrored system volume
Rebuilding mirrored system volumes on MBR disks
Rebuilding mirrored system volumes on GPT disks
Resolving problems with RAID-5 sets
14. TPM and BitLocker Drive Encryption
Working with trusted platforms
Managing TPM
Understanding TPM states and tools
Managing TPM owner authorization information
Preparing and initializing a TPM for first use
Turning an initialized TPM on or off
Clearing the TPM
Changing the TPM owner password
Introducing BitLocker Drive Encryption
BitLocker essentials
BitLocker modes
BitLocker changes
Using hardware encryption, secure boot, and Network Unlock
Hardware-encrypted drives
Optimizing encryption
Setting permitted encryption types
Preparing BitLocker for startup authentication and secure boot
Using Network Unlock
Provisioning BitLocker prior to deployment
Deploying BitLocker Drive Encryption
Setting up and managing BitLocker Drive Encryption
Configuring and enabling BitLocker Drive Encryption
Determining whether a computer has BitLocker-encrypted volumes
Enabling BitLocker on fixed data drives
Enabling BitLocker on removable data drives
Enabling BitLocker on operating-system volumes
Managing and troubleshooting BitLocker
Recovering data protected by BitLocker Drive Encryption
Disabling or turning off BitLocker Drive Encryption
15. File system essentials
Understanding the disk and file-system structure
Using FAT
File allocation table structure
FAT features
Using NTFS
NTFS structure
NTFS features
Analyzing the NTFS structure
Advanced NTFS features
Hard links
Data streams
Change journals
Object identifiers
Reparse points
Sparse files
Transactional NTFS
Using ReFS
ReFS features
ReFS structures
ReFS advantages
ReFS integrity streams, data scrubbing, and salvage
Using file-based compression
NTFS compression
Compressed (zipped) folders
16. Maintaining and optimizing storage
Managing NTFS disk quotas
How quota management works
Configuring disk quotas
Customizing quota entries for individual users
Managing disk quotas after configuration
Exporting and importing quota entries
Automated disk maintenance
Preventing disk-integrity problems
Running Check Disk interactively
Analyzing FAT volumes by using ChkDsk
Analyzing NTFS volumes by using ChkDsk
Repairing volumes and marking bad sectors by using ChkDsk
Automated optimization of disks
Preventing fragmentation of disks
Fixing fragmentation by using Optimize Drives
Understanding the fragmentation analysis
17. Managing storage spaces
Understanding storage spaces
Using and configuring offloaded transfers
Understanding how offloaded transfers work
Verifying support for offloaded transfers
Working with available storage
Storage Management Essentials
Creating storage pools and allocating space
Creating storage spaces
Creating a virtual disk in a storage space
Creating a standard volume
Diagnosing and resolving problems with storage spaces
Configuring data deduplication
Understanding data deduplication
Selecting data for deduplication
Interoperability with data deduplication
Deduplicating volumes
Monitoring deduplication
18. Managing file sharing
File-sharing essentials
Understanding file-sharing models
Enabling file sharing
Using and finding shares
Navigating SMB versions
Hiding and controlling share access
Special and administrative shares
C$, D$, E$, and other drive shares
ADMIN$
FAX$
IPC$
NETLOGON
PRINT$
SYSVOL
Accessing shares for administration
Creating and publishing shared folders
Creating shares by using File Explorer
Creating shares by using Computer Management
Creating shared folders in Server Manager
Changing shared folder settings
Publishing shares in Active Directory
Managing share permissions
Understanding share permissions
Configuring share permissions
Configuring synced sharing
Understanding Work Folders and sync shares
Deploying sync shares through Group Policy
Creating sync shares and enabling SMB access
Accessing Work Folders on clients
19. File security, access controls, and auditing
Managing access permissions
File and folder ownership
Permission inheritance for files and folders
Changing shaded permissions and stopping inheritance
Resetting and replacing permissions
Configuring access permissions
Basic permissions
Special permissions
Troubleshooting permissions
Managing file shares after configuration
Managing claims-based access controls
Understanding central access policies
Enabling dynamic controls and claims-based policy
Defining central access policies
Auditing file and folder access
Enabling basic auditing for files and folders
Enabling advanced auditing
Specifying files and folders to audit
Extending access policies to auditing
Monitoring the security logs
20. Managing file screening and storage reporting
Understanding file screening and storage reporting
Managing file screening and storage reporting
Managing global file-resource settings
Configuring email notifications
Configuring notification limits
Reviewing reports and configuring storage-report parameters
Configuring report locations
Configuring file-screen auditing
Configuring classification
Enabling access-denied assistance
Managing the file groups to which screens are applied
Managing file-screen templates
Creating file screens
Defining file-screening exceptions
Scheduling and generating storage reports
A. About the author
Index
About the Author
Copyright
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Index
S
S4 nonvolatile sleep state,
Diagnosing hardware and firmware startup problems
SACLs (system access control lists),
Enabling advanced auditing
safe modes,
Understanding and troubleshooting driver signing
salvage operation,
ReFS integrity streams, data scrubbing, and salvage
SAM (Security Accounts Manager) database,
HKLMHARDWARE
SAM hive file,
HKEY_CURRENT_USER
SAN (storage-area network),
Essential storage technologies
,
Using internal and external storage devices
,
Storage-management role services
,
Storage-management role services
,
Booting from SANs and using SANs with clusters
,
Configuring the File And Storage Services role
booting from,
Storage-management role services
Device Specific Module,
Configuring the File And Storage Services role
features and tools,
Using internal and external storage devices
internal and external storage devices,
Essential storage technologies
troubleshooting,
Booting from SANs and using SANs with clusters
with clusters,
Storage-management role services
SAN (Subject Alternative Name),
Deploying sync shares through Group Policy
SAS (Serial Attached SCSI),
Choosing internal devices
,
Storage-management features and tools
,
Managing and maintaining MPIO
,
Understanding storage spaces
,
Understanding storage spaces
,
Storage Management Essentials
described,
Choosing internal devices
MPIO support,
Storage-management features and tools
,
Managing and maintaining MPIO
storage arrays and,
Understanding storage spaces
storage management and,
Understanding storage spaces
,
Storage Management Essentials
SATA (Serial ATA),
Choosing internal devices
,
Understanding storage spaces
,
Storage Management Essentials
Save BitLocker Recovery Key As dialog box,
Enabling BitLocker on operating-system volumes
Save Filter To Custom View dialog box,
Filtering the event logs
Scan File System For Errors dialog box,
Preventing disk-integrity problems
SCCM (System Center Configuration Manager),
Assessing systems
,
Managing and troubleshooting BitLocker
scheduled reports,
Understanding file screening and storage reporting
,
Defining file-screening exceptions
schedules,
Specifying organizational objectives
,
Allowing for contingencies
,
Tuning processor scheduling
,
Tracking the overall reliability of the server
,
Using data collector templates
,
Configuring classification
automatic classification,
Configuring classification
logging for data collector sets,
Using data collector templates
padding in project estimates,
Allowing for contingencies
RacTask task,
Tracking the overall reliability of the server
setting,
Specifying organizational objectives
tuning for processors,
Tuning processor scheduling
Schtasks command,
Utilities to know
scope.,
Your plan: The big picture
(see objectives and scope)
SCSI (Small Computer System Interface),
Choosing internal devices
,
Using internal and external storage devices
,
Using the Disk Management tools
sealing process,
Working with trusted platforms
Search charm,
Working with the administration tools
searching,
Types of registry data available
,
Viewing event logs on remote systems
,
Using and finding shares
event logs,
Viewing event logs on remote systems
keywords in,
Using and finding shares
registry,
Types of registry data available
second-level address translation (SLAT),
Understanding Hyper-V
sectors (tracks),
Choosing internal devices
,
Adding new disks
,
Using the MBR and GPT partition styles
,
Understanding the disk and file-system structure
,
FAT features
,
NTFS structure
,
NTFS features
,
Repairing volumes and marking bad sectors by using ChkDsk
boot,
Using the MBR and GPT partition styles
,
NTFS structure
described,
Understanding the disk and file-system structure
determining bytes per,
Choosing internal devices
,
Adding new disks
marking bad,
Repairing volumes and marking bad sectors by using ChkDsk
setting number per cluster,
FAT features
,
NTFS features
Secure Boot feature,
Hardware-encrypted drives
,
Setting permitted encryption types
secure desktop,
Elevation, prompts, and the secure desktop
Secure Socket Layer (SSL),
Deploying sync shares through Group Policy
Security Accounts Manager (SAM) database,
HKLMHARDWARE
security alerts,
Identify security requirements
Security Configuration Wizard,
Using graphical administrative tools
SECURITY hive file,
HKEY_CURRENT_USER
security identifiers (SIDs),
Defining Active Directory server roles
,
HKLMSYSTEM
Security log,
Understanding the event logs
,
Understanding the event logs
,
Accessing the event logs and viewing events
,
Monitoring the security logs
security templates,
Applying permissions to registry keys
security tokens,
Introducing the registry
security.,
Windows 8.1 and Windows Server 2012 R2
,
Identify network services and applications
,
Defining the new network environment
,
Select and implement standards
,
Planning for day-to-day operations
,
Planning for day-to-day operations
,
Performing an upgrade installation
,
Using graphical administrative tools
,
HKLMHARDWARE
,
Securing the registry
,
Software installation essentials
,
Working with SMB 3.0
,
Configuring mount points
,
BitLocker changes
,
Enabling BitLocker on operating-system volumes
,
Understanding share permissions
(see also BitLocker Drive Encryption; permissions and privileges)
binary source files,
Using graphical administrative tools
drive letters and,
Configuring mount points
elapsed evaluation period,
Performing an upgrade installation
encrypted hard drives,
BitLocker changes
identifying infrastructure,
Identify network services and applications
identifying new requirements,
Defining the new network environment
logs and,
Planning for day-to-day operations
,
Planning for day-to-day operations
product enhancements,
Windows 8.1 and Windows Server 2012 R2
protecting personal information,
Select and implement standards
registry considerations,
HKLMHARDWARE
,
Securing the registry
share permissions and,
Understanding share permissions
SMB,
Working with SMB 3.0
UAC,
Software installation essentials
Select Computer dialog box,
Using graphical administrative tools
,
Using graphical administrative tools
,
Adding keys and values
,
Accessing the event logs and viewing events
,
Viewing event logs on remote systems
,
Using subscriptions and forwarded events
,
Using the Disk Management tools
,
Accessing shares for administration
,
Creating shares by using File Explorer
,
Configuring share permissions
accessing,
Using graphical administrative tools
configuring disk management,
Using the Disk Management tools
described,
Using graphical administrative tools
,
Configuring share permissions
forwarded events,
Using subscriptions and forwarded events
modifying registry of remote machine,
Adding keys and values
setting remote computer as focus,
Viewing event logs on remote systems
,
Accessing shares for administration
,
Creating shares by using File Explorer
viewing event logs on remote systems,
Accessing the event logs and viewing events
select disk command,
Using the Disk Management tools
,
Extending partitions
,
Shrinking partitions
Select Folder dialog box,
Creating shared folders in Server Manager
,
Creating sync shares and enabling SMB access
Select Log File dialog box,
Viewing data collector reports
select partition command,
Using the Disk Management tools
,
Extending partitions
,
Shrinking partitions
Select User Or Group dialog box,
Auditing registry access
,
Creating sync shares and enabling SMB access
Select User, Computer, Service Account, Or Group dialog box,
Managing access permissions
,
Basic permissions
,
Special permissions
Select Users dialog box,
Customizing quota entries for individual users
Select Users Or Groups dialog box,
Creating shares by using File Explorer
Select Users, Computers, Service Accounts, Or Groups dialog box,
Basic permissions
,
Specifying files and folders to audit
Self-Healing NTFS,
Sparse files
Self-Service Portal,
Managing and troubleshooting BitLocker
Serial ATA (SATA),
Choosing internal devices
,
Understanding storage spaces
,
Storage Management Essentials
Serial Attached SCSI (SAS),
Choosing internal devices
,
Storage-management features and tools
,
Managing and maintaining MPIO
,
Understanding storage spaces
,
Understanding storage spaces
,
Storage Management Essentials
described,
Choosing internal devices
MPIO support,
Storage-management features and tools
,
Managing and maintaining MPIO
storage arrays and,
Understanding storage spaces
storage management and,
Understanding storage spaces
,
Storage Management Essentials
SERIAL debugging,
Setting BCD entry values
Server Configuration utility,
Enabling remote management
Server Core installation,
Understanding installation options
,
Performing a clean installation
,
Creating server groups
,
Elevation, prompts, and the secure desktop
Server For NFS service,
Storage-management role services
Server Graphical Shell feature,
Determining which installation type to use
server licenses,
Product licensing
Server Manager,
Continue past lockups and freezes
,
Managing Windows Server 2012 R2
,
Working with the administration tools
,
Using graphical administrative tools
,
Using Windows PowerShell
,
Working with Server Manager
,
Working with Server Manager
,
Getting to know Server Manager
,
Adding servers for management
,
Creating server groups
,
MMC window and startup
,
MMC window and startup
,
Saving the console tool
,
Using roles, role services, and features
,
Installing components with Server Manager
,
Removing server roles and features
,
Resolving resource conflicts
,
Understanding the registry structure
,
Getting network usage information
,
Accessing the event logs and viewing events
,
Storage-management features and tools
,
Booting from SANs and using SANs with clusters
,
Using the Disk Management tools
,
Preventing disk-integrity problems
,
Understanding storage spaces
,
Verifying support for offloaded transfers
,
Storage Management Essentials
,
Creating and publishing shared folders
,
Creating shared folders in Server Manager
,
Managing access permissions
,
Specifying files and folders to audit
adding servers for management,
Getting to know Server Manager
creating alias for,
Using Windows PowerShell
creating server groups,
Adding servers for management
creating shared folders,
Creating and publishing shared folders
,
Creating shared folders in Server Manager
described,
Managing Windows Server 2012 R2
,
Working with Server Manager
displaying at logon,
Understanding the registry structure
file and folder ownership,
Managing access permissions
getting information on user and remote user sessions,
Getting network usage information
installing components,
Installing components with Server Manager
installing tools,
Using graphical administrative tools
,
MMC window and startup
managing extensible components,
Using roles, role services, and features
permissions,
Working with the administration tools
postinstallation tasks,
Continue past lockups and freezes
PowerShell and,
Removing server roles and features
Properties dialog box,
Working with Server Manager
remote management,
Creating server groups
,
Using the Disk Management tools
resolving resource conflicts,
Resolving resource conflicts
reviewing tracked events,
Accessing the event logs and viewing events
running Check Disk interactively,
Preventing disk-integrity problems
saving console tools to,
Saving the console tool
starting console tools,
MMC window and startup
storage management,
Storage-management features and tools
,
Booting from SANs and using SANs with clusters
,
Understanding storage spaces
,
Storage Management Essentials
viewing and configuring auditing,
Specifying files and folders to audit
working with available storage,
Verifying support for offloaded transfers
Server Message Block (SMB),
Assessing systems
,
Essential storage technologies
,
Storage-management role services
,
Storage-management role services
,
Booting from SANs and using SANs with clusters
,
Working with SMB 3.0
,
Working with SMB 3.0
,
Using and finding shares
,
Using and finding shares
,
Navigating SMB versions
,
Creating shared folders in Server Manager
,
Creating shared folders in Server Manager
,
Understanding Work Folders and sync shares
,
Creating sync shares and enabling SMB access
branch caching and,
Storage-management role services
checking for,
Working with SMB 3.0
current versions,
Navigating SMB versions
described,
Booting from SANs and using SANs with clusters
,
Using and finding shares
disabling,
Working with SMB 3.0
file sharing and,
Assessing systems
,
Storage-management role services
folder shares,
Using and finding shares
,
Creating shared folders in Server Manager
,
Creating shared folders in Server Manager
NAS and,
Essential storage technologies
sync shares,
Understanding Work Folders and sync shares
,
Creating sync shares and enabling SMB access
Server Operators group,
Hiding and controlling share access
Server performance object,
Using Performance Monitor
server roles,
Final considerations for planning and deployment
,
Planning for server usage
,
Designing the Active Directory namespace
,
Designing the Active Directory namespace
,
Identifying the domain and forest functional level
,
Understanding installation options
,
Using graphical administrative tools
,
Configuring roles, role services, and features
,
Using roles, role services, and features
,
Using roles, role services, and features
,
Installing components with Server Manager
,
Managing server roles and features
,
Adding server roles and features
,
Installing components at the prompt
,
Going to the prompt for Server Management
,
Going to the prompt for Server Management
,
Understanding component names
,
Installing components at the prompt
,
Understanding the event logs
adding,
Managing server roles and features
defining for Active Directory,
Identifying the domain and forest functional level
described,
Configuring roles, role services, and features
designing Active Directory namespaces,
Planning for server usage
identifying domain and forest functional levels,
Designing the Active Directory namespace
installing,
Installing components at the prompt
list of component names,
Going to the prompt for Server Management
list of primary,
Using roles, role services, and features
making supplemental components available,
Using roles, role services, and features
managing,
Going to the prompt for Server Management
managing domain trusts,
Designing the Active Directory namespace
planning for server usage,
Final considerations for planning and deployment
removing,
Adding server roles and features
removing binary source files,
Using graphical administrative tools
tracking installed,
Understanding component names
troubleshooting installation,
Understanding installation options
uninstalling,
Installing components at the prompt
viewing configured roles and role services,
Installing components with Server Manager
viewing events related to,
Understanding the event logs
Server With A GUI installation (Full Server installation),
Understanding installation options
,
Performing a clean installation
,
Postinstallation tasks
,
Postinstallation tasks
,
Creating server groups
choosing,
Performing a clean installation
converting to Minimal Server installation,
Postinstallation tasks
described,
Understanding installation options
remote management and,
Creating server groups
reverting to,
Postinstallation tasks
Server Work Queues performance object,
Using Performance Monitor
Server-GUI-Mgmt-Infra feature,
Postinstallation tasks
Server-GUI-Shell feature,
Postinstallation tasks
servers and server groups.,
Planning for deploying highly available servers
,
Getting to know Server Manager
,
Adding servers for management
,
Adding servers for management
,
Adding servers for management
,
Creating server groups
,
Installing components with Server Manager
,
Removing server roles and features
,
Understanding the event logs
,
Tracking per-process network utilization
,
Using Performance Monitor
,
Working with SMB 3.0
(see also specific types of servers)
adding servers for management,
Getting to know Server Manager
creating server groups,
Adding servers for management
,
Installing components with Server Manager
deploying highly available servers,
Planning for deploying highly available servers
enabling remote management,
Creating server groups
importing list of servers,
Adding servers for management
installing and configuring file services,
Working with SMB 3.0
managing server binaries,
Removing server roles and features
monitoring performance,
Using Performance Monitor
tracking overall reliability,
Tracking per-process network utilization
viewing events related to,
Understanding the event logs
Services administration tool,
Using graphical administrative tools
,
MMC tool availability
Services dialog box,
Step 2: Adding snap-ins to the console
Services for Network File System,
Using graphical administrative tools
,
MMC tool availability
,
Using roles, role services, and features
services.,
Assessing systems
,
Assessing systems
,
Planning for server usage
,
Planning for server usage
,
Tuning processor scheduling
,
Monitoring and troubleshooting processes
,
Monitoring and troubleshooting processes
,
Understanding the event logs
,
Storage-management features and tools
(see also role services)
background,
Tuning processor scheduling
event logs,
Understanding the event logs
identifying,
Assessing systems
location,
Planning for server usage
monitoring,
Monitoring and troubleshooting processes
name resolution,
Planning for server usage
print,
Assessing systems
troubleshooting,
Monitoring and troubleshooting processes
Set command,
Accessing a command prompt during installation
Set Value permission,
Applying permissions to registry keys
Set- cmdlets,
Using Windows PowerShell
Set-Itemproperty cmdlet,
Verifying support for offloaded transfers
Set-Location cmdlet,
Working with the registry from the command line
Set-MPIOSetting cmdlet,
Configuring multipath I/O
Set-SmbServerConfiguration cmdlet,
Working with SMB 3.0
Set-SmbShare cmdlet,
Working with SMB 3.0
Set-SyncServerSetting cmdlet,
Understanding Work Folders and sync shares
Set-VmNetworkAdapter cmdlet,
Resolving network bottlenecks
Setlocal command,
Accessing a command prompt during installation
Settings charm,
Hardware and firmware power states
,
Working with the administration tools
,
Tracking per-process resource usage
Setup Information file,
Working with device drivers
Setup log,
Understanding the event logs
Setup.exe program,
Getting a quick start
,
Networking components
,
Performing a clean installation
,
Creating, deleting, and extending disk partitions during installation
,
Setup refuses to install or start
,
Setup reports insufficient system resources
,
Introducing the registry
,
Software installation essentials
debug mode,
Creating, deleting, and extending disk partitions during installation
described,
Getting a quick start
for clean installations,
Networking components
for upgrade installations,
Performing a clean installation
insufficient system resources,
Setup reports insufficient system resources
media errors,
Setup refuses to install or start
registry settings,
Introducing the registry
software installation,
Software installation essentials
Sfc command,
Accessing a command prompt during installation
shaded permissions,
Permission inheritance for files and folders
shadow copies,
Using internal and external storage devices
Shadow Copy Client,
Storage-management features and tools
Shadow Copy feature,
NTFS structure
Share And Storage Management,
Using graphical administrative tools
share permissions,
File-sharing essentials
,
Creating shares by using File Explorer
,
Creating shares by using Computer Management
,
Creating shared folders in Server Manager
,
Creating shared folders in Server Manager
,
Managing share permissions
,
Understanding share permissions
,
Understanding share permissions
,
Configuring share permissions
,
Configuring share permissions
,
Configuring share permissions
,
File security, access controls, and auditing
configuring,
Creating shares by using File Explorer
,
Creating shared folders in Server Manager
,
Configuring share permissions
customizing,
Creating shares by using Computer Management
default access,
Creating shared folders in Server Manager
denying,
Understanding share permissions
described,
File-sharing essentials
,
Managing share permissions
FAT file system,
File security, access controls, and auditing
granting,
Configuring share permissions
overriding inherited,
Configuring share permissions
security considerations,
Understanding share permissions
Shared Folders tool,
Computer Management system tools
shared keys (WOW64),
Registry root keys
shell commands,
Getting started with taskpads
,
Creating menu command tasks
Shift command,
Accessing a command prompt during installation
Show Contents dialog box,
Restricting device installation by using Group Policy
Shrink dialog box,
Shrinking partitions
shrinking partitions,
Shrinking partitions
SIDs (security identifiers),
Defining Active Directory server roles
,
HKLMSYSTEM
SIM (System Image Manager),
Getting a quick start
Simple Mail Transfer Protocol (SMTP) Server,
Using roles, role services, and features
,
Understanding Work Folders and sync shares
,
Managing file screening and storage reporting
Simple Network Management Protocol (SNMP) Services,
Using roles, role services, and features
Simple TCP/IP Services,
Using roles, role services, and features
simple volumes,
LDM Metadata and LDM Data partitions
,
Recovering a failed simple, spanned, or striped disk
,
Creating storage spaces
Single Instance Storage (SIS),
Interoperability with data deduplication
single-level cells (SLCs),
Choosing internal devices
,
Tuning virtual memory
,
Understanding the disk and file-system structure
SIS (Single Instance Storage),
Interoperability with data deduplication
SISAdmin.exe tool,
Interoperability with data deduplication
sites (network),
Evaluating the network infrastructure
,
Defining Active Directory server roles
SkyDrive (Windows Live),
Setting up and managing BitLocker Drive Encryption
SLAT (second-level address translation),
Understanding Hyper-V
SLCs (single-level cells),
Choosing internal devices
,
Tuning virtual memory
,
Understanding the disk and file-system structure
Sleep mode,
Hardware and firmware power states
,
Diagnosing hardware and firmware startup problems
sleep power transition,
Diagnosing hardware and firmware startup problems
sleep state,
Diagnosing hardware and firmware startup problems
sleeping state,
Diagnosing hardware and firmware startup problems
Small Computer System Interface (SCSI),
Choosing internal devices
,
Using internal and external storage devices
,
Using the Disk Management tools
Smart Card Certificate Only mode,
BitLocker modes
smart cards,
BitLocker modes
,
BitLocker modes
,
Provisioning BitLocker prior to deployment
,
Deploying BitLocker Drive Encryption
,
Deploying BitLocker Drive Encryption
,
Enabling BitLocker on fixed data drives
,
Enabling BitLocker on removable data drives
,
Enabling BitLocker on operating-system volumes
,
Enabling BitLocker on operating-system volumes
,
Managing and troubleshooting BitLocker
,
Managing and troubleshooting BitLocker
,
Managing and troubleshooting BitLocker
adding,
Managing and troubleshooting BitLocker
BitLocker modes,
BitLocker modes
,
BitLocker modes
changing,
Managing and troubleshooting BitLocker
Group Policy,
Deploying BitLocker Drive Encryption
removing,
Managing and troubleshooting BitLocker
setting up,
Enabling BitLocker on fixed data drives
,
Enabling BitLocker on removable data drives
,
Enabling BitLocker on operating-system volumes
using,
Provisioning BitLocker prior to deployment
,
Deploying BitLocker Drive Encryption
,
Enabling BitLocker on operating-system volumes
SMB (Server Message Block),
Assessing systems
,
Essential storage technologies
,
Storage-management role services
,
Storage-management role services
,
Booting from SANs and using SANs with clusters
,
Working with SMB 3.0
,
Working with SMB 3.0
,
Using and finding shares
,
Using and finding shares
,
Navigating SMB versions
,
Creating shared folders in Server Manager
,
Creating shared folders in Server Manager
,
Deploying sync shares through Group Policy
,
Creating sync shares and enabling SMB access
branch caching and,
Storage-management role services
checking for,
Working with SMB 3.0
current versions,
Navigating SMB versions
described,
Booting from SANs and using SANs with clusters
,
Using and finding shares
disabling,
Working with SMB 3.0
file sharing and,
Assessing systems
,
Storage-management role services
folder shares,
Using and finding shares
,
Creating shared folders in Server Manager
,
Creating shared folders in Server Manager
NAS and,
Essential storage technologies
sync shares,
Deploying sync shares through Group Policy
,
Creating sync shares and enabling SMB access
SMB 1.0/CIFS File Sharing Support,
Using roles, role services, and features
SMB Bandwidth Limit,
Using roles, role services, and features
SMB Direct feature,
Booting from SANs and using SANs with clusters
,
Working with SMB 3.0
SMB encryption feature,
Booting from SANs and using SANs with clusters
SMB Multichannel feature,
Working with SMB 3.0
SMB scale-out feature,
Working with SMB 3.0
SMB signing feature,
Working with SMB 3.0
SMB Transport Failover feature,
Working with SMB 3.0
SmbShare module (PowerShell),
Storage-management features and tools
SMI-S (Storage Management Initiative) standard,
Storage-management features and tools
,
Understanding storage spaces
SMP (Storage Management Provider),
Understanding storage spaces
SMP (symmetric multiprocessing),
Tuning virtual memory
SMTP (Simple Mail Transfer Protocol) Server,
Using roles, role services, and features
,
Understanding Work Folders and sync shares
,
Managing file screening and storage reporting
snap-ins (MMC).,
Windows Server 2012 R2 MMC administration
,
MMC modes
,
MMC window and startup
,
MMC and remote computers
,
Step 1: Creating the console
,
Step 1: Creating the console
(see also specific snap-ins)
adding to consoles,
Step 1: Creating the console
described,
Windows Server 2012 R2 MMC administration
MMC window,
MMC window and startup
prohibiting,
MMC modes
remote computers,
MMC and remote computers
snapshots,
Using internal and external storage devices
,
Adding and removing multipath hardware devices
SNMP (Simple Network Management Protocol) Services,
Using roles, role services, and features
soft off state,
Diagnosing hardware and firmware startup problems
soft page faults,
Resolving memory bottlenecks
software applications,
Assessing systems
,
Identify security requirements
,
Planning for availability, scalability, and manageability
,
Planning for software needs
,
Planning for software needs
,
Introducing the registry
,
HKLMHARDWARE
,
Using the Microsoft Fix It Utility
,
Using the Microsoft Fix It Utility
,
Software and User Account Control administration
,
Software installation essentials
,
Software installation essentials
,
Configuring UAC and Admin Approval Mode
,
Configuring UAC and Admin Approval Mode
,
Application access tokens
,
Application access tokens
,
Configuring run levels
,
Tuning processor scheduling
,
Getting processor and memory usage for troubleshooting
,
Understanding the event logs
,
Automated disk maintenance
applying updates regularly,
Identify security requirements
,
Software installation essentials
,
Automated disk maintenance
assessing software licenses,
Assessing systems
cluster aware,
Planning for software needs
event logs,
Understanding the event logs
getting information on running applications,
Getting processor and memory usage for troubleshooting
installing,
Software and User Account Control administration
maintaining integrity,
Configuring UAC and Admin Approval Mode
noncompliant applications,
Software installation essentials
,
Configuring UAC and Admin Approval Mode
,
Application access tokens
planning for needs,
Planning for availability, scalability, and manageability
process scheduling,
Tuning processor scheduling
Properties dialog box,
Configuring run levels
registry settings,
Introducing the registry
,
HKLMHARDWARE
removing damaged or partial settings for,
Using the Microsoft Fix It Utility
removing registry settings for failed installations,
Using the Microsoft Fix It Utility
standardizing components supported,
Planning for software needs
virtualization and,
Application access tokens
software-based RAID,
Planning partitions
solid-state drives (SSDs),
Choosing internal devices
,
Tuning virtual memory
,
Understanding the disk and file-system structure
,
Storage Management Essentials
spanned volumes,
Working with basic and dynamic disks
,
Extending partitions
,
LDM Metadata and LDM Data partitions
,
Recovering a failed simple, spanned, or striped disk
sparse files,
Sparse files
,
How quota management works
SPC-3 standard,
Configuring the File And Storage Services role
,
Adding and removing multipath hardware devices
special identities,
Accessing the event logs and viewing events
special permissions,
Basic permissions
special shares,
Hiding and controlling share access
Specify Work Folders Settings dialog box,
Deploying sync shares through Group Policy
SPI (Parallel SCSI),
Choosing internal devices
spindles,
Meeting performance, capacity, and availability requirements
Spooler service,
Controlling remote registry access
SQL file extension,
Monitoring performance from the command line
SQL Server,
Using Windows Update
,
Creating shared folders in Server Manager
SRK (Storage Root Key),
Working with trusted platforms
SSDs (solid-state drives),
Choosing internal devices
,
Tuning virtual memory
,
Understanding the disk and file-system structure
,
Storage Management Essentials
SSL (Secure Socket Layer),
Deploying sync shares through Group Policy
standard file sharing,
File-sharing essentials
standard format hard drives,
Choosing internal devices
,
Adding new disks
standard user tokens,
Introducing the registry
standard volumes,
Creating a virtual disk in a storage space
standardizing,
Changing the administrative approach
,
Planning for software needs
,
Planning for software needs
hardware platforms,
Planning for software needs
network environment,
Changing the administrative approach
software applications,
Planning for software needs
Standards-Based Storage Management feature,
Storage-management features and tools
standby adapters,
Resolving network bottlenecks
standby state,
Hardware and firmware power states
Start command,
Accessing a command prompt during installation
Start-Service cmdlet,
Monitoring and troubleshooting services
Start-Transaction cmdlet,
Introducing the registry
startup,
Diagnosing hardware and firmware startup problems
,
Diagnosing hardware and firmware startup problems
,
Managing startup and boot configuration
,
MMC window and startup
,
Deploying BitLocker Drive Encryption
diagnosing problems,
Diagnosing hardware and firmware startup problems
managing,
Managing startup and boot configuration
MMC,
MMC window and startup
resolving problems,
Diagnosing hardware and firmware startup problems
unlocking computers with TPM,
Deploying BitLocker Drive Encryption
Startup And Recovery dialog box,
Managing startup and boot configuration
startup data collectors,
Creating and managing data collector sets
startup event traces,
Creating and managing data collector sets
Startup Key Only mode,
BitLocker modes
startup keys,
BitLocker modes
,
BitLocker modes
,
Preparing BitLocker for startup authentication and secure boot
,
Deploying BitLocker Drive Encryption
,
Configuring and enabling BitLocker Drive Encryption
,
Enabling BitLocker on operating-system volumes
BitLocker modes and,
BitLocker modes
,
BitLocker modes
described,
Enabling BitLocker on operating-system volumes
FIPS compliance and,
Deploying BitLocker Drive Encryption
Network Unlock feature,
Preparing BitLocker for startup authentication and secure boot
recovery passwords and,
Configuring and enabling BitLocker Drive Encryption
startup modes,
Managing startup and boot configuration
static IP addressing,
Naming computers
stop errors,
Setup reports insufficient system resources
Stop-Process cmdlet,
Monitoring and troubleshooting processes
Stop-Service cmdlet,
Monitoring and troubleshooting services
Stop-Transaction cmdlet,
Introducing the registry
Storage Management APIs,
Utilities to know
,
Storage-management features and tools
,
Booting from SANs and using SANs with clusters
,
Understanding storage spaces
Storage Management Initiative (SMI-S) standard,
Storage-management features and tools
,
Understanding storage spaces
Storage Management Provider (SMP),
Understanding storage spaces
storage management.,
Planning partitions
,
Forcing disk-partition removal during installation
,
Essential storage technologies
,
Essential storage technologies
,
Using internal and external storage devices
,
Storage-management features and tools
,
Storage-management role services
,
Storage-management role services
,
Storage-management role services
,
Booting from SANs and using SANs with clusters
,
Configuring the File And Storage Services role
,
Configuring disks and storage
,
Using the Disk Management tools
,
Understanding legacy and protective MBRs
,
Maintaining and optimizing storage
,
Automated disk maintenance
,
Repairing volumes and marking bad sectors by using ChkDsk
,
Configuring data deduplication
(see also Storage Spaces)
automated disk maintenance,
Automated disk maintenance
automated disk optimization,
Repairing volumes and marking bad sectors by using ChkDsk
booting from SANs,
Storage-management role services
configuring disk storage,
Configuring disks and storage
data deduplication,
Storage-management role services
,
Configuring data deduplication
features and tools,
Using internal and external storage devices
installing and configuring file services,
Configuring the File And Storage Services role
internal and external storage devices,
Essential storage technologies
loading mass storage drivers during installation,
Forcing disk-partition removal during installation
NTFS disk quotas,
Maintaining and optimizing storage
physical disks,
Understanding legacy and protective MBRs
RAID options,
Planning partitions
role services,
Storage-management features and tools
SANs with clusters,
Storage-management role services
SMB 3.0,
Booting from SANs and using SANs with clusters
transitional technologies,
Essential storage technologies
Storage module (PowerShell),
Storage-management features and tools
storage pools,
Managing storage spaces
,
Storage Management Essentials
,
Storage Management Essentials
,
Storage Management Essentials
,
Creating storage pools and allocating space
,
Creating storage pools and allocating space
,
Creating storage spaces
,
Diagnosing and resolving problems with storage spaces
creating,
Creating storage pools and allocating space
creating virtual disks in,
Creating storage spaces
described,
Managing storage spaces
Properties dialog box,
Storage Management Essentials
,
Diagnosing and resolving problems with storage spaces
rebuilding storage spaces from,
Storage Management Essentials
viewing,
Storage Management Essentials
,
Creating storage pools and allocating space
storage providers,
Storage-management features and tools
Storage Reports Task Properties dialog box,
Defining file-screening exceptions
storage reports.,
Managing file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Understanding file screening and storage reporting
,
Configuring notification limits
,
Configuring notification limits
,
Configuring notification limits
,
Configuring report locations
,
Defining file-screening exceptions
,
Scheduling and generating storage reports
(see also file screening)
configuring locations,
Configuring notification limits
configuring parameters,
Configuring notification limits
described,
Managing file screening and storage reporting
generating,
Scheduling and generating storage reports
managing,
Understanding file screening and storage reporting
reviewing,
Configuring notification limits
scheduling,
Defining file-screening exceptions
standard reports,
Understanding file screening and storage reporting
troubleshooting report generation,
Configuring report locations
Storage Root Key (SRK),
Working with trusted platforms
Storage Services role service,
Understanding storage spaces
,
Understanding central access policies
Storage Spaces,
Planning partitions
,
Utilities to know
,
Computer Management system tools
,
Using roles, role services, and features
,
Meeting performance, capacity, and availability requirements
,
Using the Disk Management tools
,
ReFS features
,
ReFS advantages
,
Managing storage spaces
,
Managing storage spaces
,
Understanding storage spaces
,
Verifying support for offloaded transfers
,
Creating storage pools and allocating space
,
Creating storage spaces
,
Creating a standard volume
,
Configuring data deduplication
available storage,
Verifying support for offloaded transfers
command-line utilities and,
Utilities to know
creating storage spaces,
Creating storage pools and allocating space
creating virtual disks in,
Creating storage spaces
data deduplication,
Configuring data deduplication
defined,
Managing storage spaces
described,
Planning partitions
,
Using roles, role services, and features
,
Managing storage spaces
Disk Management snap-in and,
Using the Disk Management tools
offloaded transfers,
Understanding storage spaces
RAID and,
Computer Management system tools
,
Meeting performance, capacity, and availability requirements
ReFS and,
ReFS features
,
ReFS advantages
troubleshooting problems,
Creating a standard volume
storage-area network (SAN),
Essential storage technologies
,
Using internal and external storage devices
,
Storage-management role services
,
Storage-management role services
,
Booting from SANs and using SANs with clusters
,
Configuring the File And Storage Services role
booting from,
Storage-management role services
Device Specific Module,
Configuring the File And Storage Services role
features and tools,
Using internal and external storage devices
internal and external storage devices,
Essential storage technologies
troubleshooting,
Booting from SANs and using SANs with clusters
with clusters,
Storage-management role services
stored credentials,
Installing components at the prompt
striped volumes,
Working with basic and dynamic disks
,
LDM Metadata and LDM Data partitions
,
Configuring RAID 0: Striping
Subject Alternative Name (SAN),
Deploying sync shares through Group Policy
subkeys (registry),
Understanding the registry structure
,
HKLMBCD00000000
,
Modifying values
,
Controlling remote registry access
subscriptions collecting forwarded events,
Using subscriptions and forwarded events
Subst command,
Accessing a command prompt during installation
subtrees (registry),
Understanding the registry structure
,
HKEY_USERS
,
Where registry data comes from
summary graph (Task Manager Performance tab),
Getting processor and memory usage for troubleshooting
summary statistics (Task Manager Performance tab),
Getting processor and memory usage for troubleshooting
summary view (Task Manager Performance tab),
Getting processor and memory usage for troubleshooting
suspend mode,
Diagnosing hardware and firmware startup problems
Suspend-Service cmdlet,
Monitoring and troubleshooting services
symmetric multiprocessing (SMP),
Tuning virtual memory
sync shares,
Configuring share permissions
,
Deploying sync shares through Group Policy
,
Creating sync shares and enabling SMB access
creating,
Creating sync shares and enabling SMB access
deploying through Group Policy,
Deploying sync shares through Group Policy
described,
Configuring share permissions
synchronization, time,
Windows 8.1 and Windows Server 2012 R2
system access control lists (SACLs),
Enabling advanced auditing
System Center Configuration Manager (SCCM),
Assessing systems
,
Managing and troubleshooting BitLocker
System Center Operations Manager,
Auditing file and folder access
,
Extending access policies to auditing
System Configuration utility (Msconfig.exe),
Managing startup and recovery options
,
Managing System Boot Configuration
,
Managing System Boot Configuration
,
Managing System Boot Configuration
,
Managing System Boot Configuration
,
Managing System Boot Configuration
,
Using graphical administrative tools
Boot tab,
Managing System Boot Configuration
described,
Managing startup and recovery options
,
Using graphical administrative tools
General tab,
Managing System Boot Configuration
Services tab,
Managing System Boot Configuration
Startup tab,
Managing System Boot Configuration
troubleshooting,
Managing System Boot Configuration
System Diagnostics template (Performance Monitor),
Creating and managing data collector sets
System Image Manager (SIM),
Getting a quick start
System Information tool,
Using graphical administrative tools
,
Resolving resource conflicts
System log,
Understanding the event logs
,
Booting from SANs and using SANs with clusters
system partitions/volumes,
Installing Windows Server 2012 R2
,
Planning partitions
,
Working with basic and dynamic disks
,
Converting FAT or FAT32 to NTFS
,
Formatting a partition, logical drive, or volume
,
Adding a mirror to an existing volume
,
Deploying BitLocker Drive Encryption
,
Enabling BitLocker on removable data drives
,
NTFS compression
,
Preventing fragmentation of disks
changing drive letter of,
Formatting a partition, logical drive, or volume
compressing,
NTFS compression
Convert command and,
Converting FAT or FAT32 to NTFS
defragmenting,
Preventing fragmentation of disks
described,
Installing Windows Server 2012 R2
,
Working with basic and dynamic disks
enabling BitLocker on,
Deploying BitLocker Drive Encryption
,
Enabling BitLocker on removable data drives
mirroring,
Adding a mirror to an existing volume
RAID technology and,
Planning partitions
System performance object,
Using Performance Monitor
System Performance template (Performance Monitor),
Creating and managing data collector sets
system processor cache,
Continue past lockups and freezes
System Properties dialog box,
Windows 8.1 and Windows Server 2012 R2
,
Managing startup and boot configuration
,
Changing Data Execution Prevention and physical address extension options
,
Getting to know Server Manager
,
Getting to know Server Manager
,
Understanding device installation
,
Performance monitoring and tuning
,
Tuning processor scheduling
,
Other important tuning, memory, and data considerations
,
Getting information on user and remote user sessions
Advanced tab,
Managing startup and boot configuration
,
Changing Data Execution Prevention and physical address extension options
,
Tuning processor scheduling
,
Other important tuning, memory, and data considerations
Computer Name tab,
Getting to know Server Manager
Hardware tab,
Understanding device installation
Remote tab,
Windows 8.1 and Windows Server 2012 R2
,
Getting to know Server Manager
,
Getting information on user and remote user sessions
Visual Effects tab,
Performance monitoring and tuning
System Resource Manager,
Diagnosing hardware and firmware startup problems
,
Using graphical administrative tools
System special identity,
Accessing the event logs and viewing events
system state backups,
Backing up and restoring the registry
SystemDrive environment variable,
Types of registry data available
SystemProcessor Queue Length counter,
Resolving memory bottlenecks
SYSVOL directory,
Storage-management role services
SYSVOL share,
ADMIN$
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset