Introduction |
|
1 | (6) |
|
Part I Windows Server 2003 Overview |
|
|
|
Windows Server 2003 Technology Primer |
|
|
7 | (28) |
|
Windows Server 2003 Defined |
|
|
7 | (1) |
|
Windows .NET Framework Versus Windows Server 2003 |
|
|
8 | (2) |
|
The Windows .NET Framework |
|
|
8 | (1) |
|
|
9 | (1) |
|
Choosing to Implement Windows Server 2003 |
|
|
10 | (3) |
|
Windows Server 2003 Core to an Active Directory Environment |
|
|
10 | (1) |
|
Windows Server 2003 Running Built-in Application Server Functions |
|
|
11 | (1) |
|
Windows Server 2003 Running Add-in Applications Server Functions |
|
|
12 | (1) |
|
When Is the Right Time to Migrate? |
|
|
13 | (3) |
|
Adding a Windows Server 2003 to an NT4 or Windows 2000 Environment |
|
|
14 | (1) |
|
Migrating from Windows 2000 to Windows Server 2003 |
|
|
14 | (1) |
|
Migrating Directly from Windows NT4 to Windows Server 2003 |
|
|
15 | (1) |
|
Versions of Windows Server 2003 |
|
|
16 | (2) |
|
Windows Server 2003 Web Edition |
|
|
16 | (1) |
|
Windows Server 2003 Standard Edition |
|
|
16 | (1) |
|
Windows Server 2003 Enterprise Edition |
|
|
17 | (1) |
|
Windows Server 2003 DataCenter Edition |
|
|
17 | (1) |
|
What's New in Windows Server 2003? |
|
|
18 | (5) |
|
Visual Changes in Windows Server 2003 |
|
|
18 | (1) |
|
Changes That Simplify Tasks |
|
|
19 | (1) |
|
|
19 | (1) |
|
Performance and Functionality Improvements |
|
|
20 | (2) |
|
Increased Support for Standards |
|
|
22 | (1) |
|
Ability to Delete Active Directory Schema Objects |
|
|
23 | (1) |
|
Windows Server 2003 Benefits for Administration |
|
|
23 | (2) |
|
|
24 | (1) |
|
Global Catalog Build from Media |
|
|
25 | (1) |
|
|
25 | (1) |
|
Windows Server 2003 for Better User Services |
|
|
25 | (2) |
|
File Management with Distributed File System |
|
|
26 | (1) |
|
Redundancy and Fault Tolerance of Data with DFS |
|
|
26 | (1) |
|
Redundancy with Printer Queues |
|
|
26 | (1) |
|
Windows Server 2003 Benefits for Migration |
|
|
27 | (1) |
|
|
27 | (1) |
|
Active Directory Migration Tool v2.0 |
|
|
27 | (1) |
|
Benefits for Thin Client Terminal Services |
|
|
28 | (2) |
|
Local Drive and Audio Redirection |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Benefits for Improved Management |
|
|
30 | (3) |
|
Automatic Server Recovery |
|
|
30 | (1) |
|
|
31 | (1) |
|
Group Policy Management Console |
|
|
31 | (1) |
|
Remote Installation Service for Servers |
|
|
32 | (1) |
|
|
32 | (1) |
|
Getting Started with Windows Server 2003 |
|
|
33 | (1) |
|
|
33 | (2) |
|
Planning, Prototyping, Migrating, and Deploying Windows Server 2003 Best Practices |
|
|
35 | (34) |
|
Determining the Scope of Your Project |
|
|
36 | (1) |
|
Identifying the Business Goals and Objectives to Implement Windows Server 2003 |
|
|
36 | (3) |
|
High-Level Business Goals |
|
|
37 | (1) |
|
Business Unit or Departmental Goals |
|
|
38 | (1) |
|
Identifying the Technical Goals and Objectives to Implement Windows Server 2003 |
|
|
39 | (7) |
|
Defining the Scope of the Work |
|
|
40 | (3) |
|
Determining the Time Frame for Implementation or Migration |
|
|
43 | (1) |
|
Defining the Participants of the Design and Deployment Teams |
|
|
44 | (2) |
|
The Discovery Phase: Understanding the Existing Environment |
|
|
46 | (3) |
|
Understanding the Geographical Depth and Breadth |
|
|
48 | (1) |
|
Managing Information Overload |
|
|
49 | (1) |
|
The Design Phase: Documenting the Vision and the Plan |
|
|
49 | (5) |
|
Collaboration Sessions: Making the Design Decisions |
|
|
50 | (1) |
|
Organizing Information for a Structured Design Document |
|
|
51 | (2) |
|
Windows Server 2003 Design Decisions |
|
|
53 | (1) |
|
|
53 | (1) |
|
The Migration Planning Phase: Documenting the Process for Migration |
|
|
54 | (5) |
|
Time for the Project Plan |
|
|
54 | (2) |
|
|
56 | (1) |
|
Create the Migration Document |
|
|
57 | (2) |
|
The Prototype Phase: Creating and Testing the Plan |
|
|
59 | (2) |
|
How Do You Build the Lab? |
|
|
59 | (1) |
|
Results of the Lab Testing Environment |
|
|
60 | (1) |
|
The Pilot Phase: Validating the Plan to a Limited Number of Users |
|
|
61 | (3) |
|
The First Server in the Pilot |
|
|
62 | (1) |
|
Rolling Out the Pilot Phase |
|
|
62 | (2) |
|
Fixing Problems in the Pilot Phase |
|
|
64 | (1) |
|
Documenting the Results of the Pilot |
|
|
64 | (1) |
|
The Migration/Implementation Phase: Conducting the Migration or Installation |
|
|
64 | (1) |
|
Verifying End User Satisfaction |
|
|
64 | (1) |
|
Supporting the New Windows Server 2003 Environment |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (3) |
|
|
66 | (1) |
|
|
67 | (1) |
|
The Migration Planning Phase |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
The Migration / Implementation Phase |
|
|
68 | (1) |
|
Installing Windows Server 2003 |
|
|
69 | (26) |
|
Preplanning and Preparing a Server Installation |
|
|
69 | (5) |
|
Verifying Minimum Hardware Requirements |
|
|
69 | (1) |
|
Choosing a New Installation or an Upgrade |
|
|
70 | (1) |
|
Determining the Type of Server to Install |
|
|
71 | (1) |
|
Gathering the Information Necessary to Proceed |
|
|
71 | (2) |
|
|
73 | (1) |
|
Setting Up the Windows Server 2003 Operating System |
|
|
74 | (7) |
|
|
74 | (2) |
|
Customizing Regional and Language Options |
|
|
76 | (1) |
|
Personalizing the Software |
|
|
76 | (1) |
|
|
76 | (1) |
|
Selecting Licensing Modes |
|
|
77 | (1) |
|
Setting Computer Name and Administrator Password |
|
|
77 | (1) |
|
Modifying Date and Time Settings |
|
|
78 | (1) |
|
Modifying Network Settings |
|
|
79 | (1) |
|
Joining a Workgroup or Computer Domain |
|
|
79 | (1) |
|
Completing the Installation |
|
|
79 | (1) |
|
|
80 | (1) |
|
Activating Windows Server 2003 |
|
|
80 | (1) |
|
Upgrading to Windows Server 2003 |
|
|
81 | (2) |
|
|
82 | (1) |
|
Verifying System Compatibility |
|
|
82 | (1) |
|
Performing Additional Tasks |
|
|
82 | (1) |
|
|
82 | (1) |
|
Using Alternative Methods of Installation |
|
|
83 | (1) |
|
Performing an Unattended Windows Server 2003 Installation |
|
|
83 | (6) |
|
Deciding When to Use an Unattended Installation |
|
|
84 | (1) |
|
Using the Improved Setup Manager |
|
|
84 | (1) |
|
Preparing for an Unattended Installation |
|
|
84 | (1) |
|
Creating an Unattended Installation Script |
|
|
85 | (3) |
|
Launching an Unattended Installation Script |
|
|
88 | (1) |
|
Installing Windows Server 2003 from an Image |
|
|
89 | (1) |
|
Using Remote Installation Services |
|
|
89 | (1) |
|
Using the System Preparation Tool |
|
|
90 | (1) |
|
Installing Windows Server 2003 with Group Policy and Systems Management Server |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (4) |
|
Part II Windows Server 2003 Active Directory |
|
|
|
|
95 | (30) |
|
Evolution of Directory Services |
|
|
95 | (2) |
|
Original Microsoft Directory Systems |
|
|
96 | (1) |
|
Key Features of Active Directory |
|
|
96 | (1) |
|
Active Directory Development |
|
|
97 | (2) |
|
Limitations of NT 4.0 Domains |
|
|
98 | (1) |
|
Microsoft Adoption of Internet Standards |
|
|
99 | (1) |
|
Active Directory Structure |
|
|
99 | (4) |
|
The Active Directory Domain |
|
|
99 | (1) |
|
Active Directory Domain Trees |
|
|
100 | (1) |
|
Forests in Active Directory |
|
|
101 | (1) |
|
Active Directory Authentication Modes |
|
|
101 | (1) |
|
Functional Levels in Windows .NET Active Directory |
|
|
101 | (1) |
|
Windows 2000 Mixed Domain Functional Level |
|
|
102 | (1) |
|
Windows 2000 Native Functional Level |
|
|
102 | (1) |
|
Windows .NET Interim Functional Level |
|
|
102 | (1) |
|
Windows .NET Functional Level |
|
|
102 | (1) |
|
Active Directory Components |
|
|
103 | (5) |
|
Active Directory Loosely Based on X.500 |
|
|
103 | (1) |
|
|
104 | (1) |
|
Lightweight Directory Access Protocol |
|
|
105 | (1) |
|
Multi-Master Replication with Domain Controllers |
|
|
106 | (1) |
|
Global Catalog and Global Catalog Servers |
|
|
106 | (1) |
|
|
106 | (2) |
|
|
108 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (2) |
|
|
111 | (1) |
|
Groups in an Active Directory Environment |
|
|
112 | (2) |
|
|
113 | (1) |
|
Active Directory Replication |
|
|
114 | (1) |
|
Sites, Site Links, and Site Link Bridgeheads |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (3) |
|
|
116 | (1) |
|
|
117 | (1) |
|
Standard DNS Zones Versus AD-Integrated DNS Zones |
|
|
117 | (1) |
|
AD DNS in Co-existence with Foreign DNS |
|
|
118 | (1) |
|
Active Directory Security |
|
|
118 | (1) |
|
|
118 | (1) |
|
Internet Information Server v6 Disabled by Default |
|
|
119 | (1) |
|
Additional Security Considerations |
|
|
119 | (1) |
|
Active Directory Changes in Windows Server 2003 |
|
|
119 | (3) |
|
Windows .NET Active Directory Domain Rename Tool |
|
|
119 | (1) |
|
Improvements in the Configure Your Server Wizard |
|
|
120 | (1) |
|
|
120 | (1) |
|
Active Directory Replication Compression Disable Support |
|
|
120 | (1) |
|
Schema Attribute Deactivation |
|
|
120 | (1) |
|
Incremental Universal Group Membership Replication |
|
|
120 | (1) |
|
Active Directory in Application Mode |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (3) |
|
Designing a Windows Server 2003 Active Directory |
|
|
125 | (28) |
|
|
125 | (3) |
|
|
126 | (2) |
|
Choosing Your Domain Namespace |
|
|
128 | (1) |
|
External (Published) Namespace |
|
|
128 | (1) |
|
|
129 | (1) |
|
New Domain Design Features in Windows Server 2003 |
|
|
129 | (1) |
|
Choosing Your Domain Structure |
|
|
130 | (1) |
|
|
131 | (3) |
|
Choosing the Single Domain Model |
|
|
132 | (1) |
|
Real-World Design Example |
|
|
132 | (2) |
|
|
134 | (3) |
|
When to Add Additional Domains |
|
|
135 | (1) |
|
Real-World Design Example |
|
|
136 | (1) |
|
Multiple Trees in a Single Forest Model |
|
|
137 | (2) |
|
When to Choose a Multiple Tree Domain Model |
|
|
137 | (1) |
|
Real-World Design Example |
|
|
138 | (1) |
|
Federated Forests Design Model |
|
|
139 | (2) |
|
When to Choose Federated Forests |
|
|
140 | (1) |
|
Real-World Design Example |
|
|
140 | (1) |
|
|
141 | (3) |
|
When to Choose the Peer-Root Model |
|
|
142 | (1) |
|
Real-World Design Example |
|
|
143 | (1) |
|
|
144 | (2) |
|
Real-World Design Example |
|
|
145 | (1) |
|
|
146 | (1) |
|
Real-World Design Example |
|
|
146 | (1) |
|
Renaming an Active Directory Domain |
|
|
147 | (3) |
|
Domain Rename Limitations |
|
|
147 | (1) |
|
Domain Rename Prerequisites |
|
|
148 | (1) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (2) |
|
Designing Organizational Unit and Group Structure |
|
|
153 | (24) |
|
|
154 | (2) |
|
|
156 | (4) |
|
Group Types: Security or Distribution |
|
|
156 | (2) |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
161 | (2) |
|
Mapping the OU Design to an NT Resource Domain Layout |
|
|
162 | (1) |
|
Overuse of OUs in Domain Design |
|
|
163 | (1) |
|
|
163 | (1) |
|
Using OUs to Delegate Administration |
|
|
163 | (2) |
|
Group Policies and OU Design |
|
|
165 | (2) |
|
|
167 | (2) |
|
|
167 | (1) |
|
Establishing Group Naming Standards |
|
|
168 | (1) |
|
|
168 | (1) |
|
Distribution Group Design |
|
|
168 | (1) |
|
|
169 | (6) |
|
Business Function-Based Design |
|
|
169 | (3) |
|
Geographical-Based Design |
|
|
172 | (3) |
|
|
175 | (1) |
|
|
175 | (2) |
|
Active Directory Infrastructure |
|
|
177 | (44) |
|
Active Directory Replication In Depth |
|
|
177 | (6) |
|
Understanding Replication in Active Directory |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (2) |
|
SMTP Versus IP Replication |
|
|
183 | (1) |
|
|
183 | (8) |
|
Windows Server 2003 Site Improvements |
|
|
183 | (1) |
|
Subnets Associated with Sites |
|
|
184 | (2) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
Preferred Site Link Bridgeheads |
|
|
189 | (2) |
|
Planning Replication Topology |
|
|
191 | (4) |
|
Mapping Site Design into Network Design |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
Associating Subnets with Sites |
|
|
194 | (1) |
|
Determining Site Links and Site Link Costs |
|
|
194 | (1) |
|
Choosing Replication Scheduling |
|
|
194 | (1) |
|
Choosing SMTP or IP Replication |
|
|
195 | (1) |
|
Encrypting SMTP Site Links |
|
|
195 | (1) |
|
Windows Server 2003 Replication Enhancements |
|
|
195 | (4) |
|
Domain Controller Promotion from Media |
|
|
195 | (2) |
|
Linked-Value Replication/Universal Group Membership Caching |
|
|
197 | (1) |
|
Removal of Lingering Objects |
|
|
198 | (1) |
|
Replication Compression Disablement |
|
|
198 | (1) |
|
No Full Synchronization of Global Catalog with Schema Changes |
|
|
198 | (1) |
|
Inter-Site Topology Generator Algorithm Improvements |
|
|
199 | (1) |
|
Real-World Replication Designs |
|
|
199 | (3) |
|
Hub-and-Spoke Replication Design |
|
|
199 | (1) |
|
Decentralized Replication Design |
|
|
200 | (2) |
|
|
202 | (1) |
|
|
202 | (1) |
|
Integrating Active Directory with Novell, Oracle, UNIX, and NT4 Directories |
|
|
|
An Overview of Directory Integration |
|
|
203 | (1) |
|
Services for UNIX Defined |
|
|
204 | (1) |
|
Services for UNIX Components |
|
|
204 | (1) |
|
Prerequisites for Services for UNIX |
|
|
205 | (1) |
|
Interix as a Component of Services for UNIX |
|
|
205 | (1) |
|
|
206 | (1) |
|
Interix Tools and Programming Languages |
|
|
206 | (1) |
|
UNIX NFS and Windows File Sharing |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
User Synchronization in SFU |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Administrative Improvements in Services for UNIX |
|
|
208 | (1) |
|
Remote Administration with Telnet Server and Client |
|
|
208 | (1) |
|
Single Services for UNIX MMC Console |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
Gateway Services for NetWare |
|
|
210 | (1) |
|
|
210 | (3) |
|
File and Print Services for NetWare |
|
|
211 | (1) |
|
Microsoft Directory Synchronization Services |
|
|
211 | (1) |
|
|
212 | (1) |
|
Microsoft Metadirectory Services 3.0 |
|
|
213 | (4) |
|
MMS and Identity Management |
|
|
214 | (1) |
|
MMS and Account Provisioning |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (4) |
|
Part III Networking Services |
|
|
|
|
221 | (36) |
|
Inside the Domain Name System |
|
|
221 | (2) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
Getting Started with DNS on Windows Server 2003 |
|
|
224 | (4) |
|
Installing DNS Using the Configure Your Server Wizard |
|
|
224 | (3) |
|
Configuring DNS to Point to Itself |
|
|
227 | (1) |
|
Understanding Resource Records |
|
|
228 | (4) |
|
Start of Authority Records |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
Mail Exchanger (MX) Records |
|
|
230 | (1) |
|
|
231 | (1) |
|
Canonical Name (CNAME) Records |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (4) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (3) |
|
|
237 | (1) |
|
Incremental Zone Transfer |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (5) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
Evolution of Microsoft DNS |
|
|
245 | (1) |
|
Active Directory--Integrated Zones |
|
|
245 | (1) |
|
|
246 | (1) |
|
Unicode Character Support |
|
|
246 | (1) |
|
DNS Changes in Windows Server 2003 |
|
|
246 | (2) |
|
DNS Stored in Application Partition |
|
|
246 | (1) |
|
Automatic Creation of DNS Zones |
|
|
247 | (1) |
|
|
247 | (1) |
|
Forest Root Zone for _msdcs Moved to Separate Zone |
|
|
247 | (1) |
|
DNS in an Active Directory Environment |
|
|
248 | (3) |
|
Impact of DNS on Active Directory |
|
|
248 | (1) |
|
Active Directory in Non-Microsoft DNS Implementations |
|
|
249 | (1) |
|
Using Secondary Zones in an AD Environment |
|
|
249 | (1) |
|
SRV Records and Site Resolution |
|
|
249 | (2) |
|
|
251 | (4) |
|
Using the DNS Event Viewer to Diagnose Problems |
|
|
251 | (1) |
|
Utilizing Performance Monitor to Monitor DNS |
|
|
252 | (1) |
|
Client-Side Cache and Host Resolution Problems |
|
|
252 | (1) |
|
Using the NSLOOKUP Command-Line Utility |
|
|
252 | (1) |
|
Using the IPCONFIG Command-Line Utility |
|
|
253 | (1) |
|
Using the TRACERT Command-Line Utility |
|
|
254 | (1) |
|
Using the DNSCMD Command-Line Utility |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (2) |
|
DHCP/WINS/Domain Controllers |
|
|
257 | (32) |
|
Overview of the ``Other'' Network Services |
|
|
257 | (1) |
|
Key Components of an Enterprise Network |
|
|
257 | (2) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
Network Services Changes in Windows Server 2003 |
|
|
259 | (1) |
|
Dynamic Host Configuration Protocol Basics |
|
|
259 | (7) |
|
|
259 | (1) |
|
DHCP Predecessors: RARP and BOOTP |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
Automatic Private IP Addressing |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
Installing DHCP and Creating New Scopes |
|
|
263 | (3) |
|
DHCP Changes in Windows Server 2003 |
|
|
266 | (2) |
|
DHCP Database Backup and Restore Automation |
|
|
266 | (1) |
|
DHCP Client Alternate Network Capability |
|
|
267 | (1) |
|
|
268 | (4) |
|
The 50/50 Failover Approach for DHCP Fault Tolerance |
|
|
268 | (1) |
|
The 80/20 Failover Approach to DHCP Fault Tolerance |
|
|
269 | (1) |
|
The 100/100 Failover Approach to DHCP Fault Tolerance |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (3) |
|
|
272 | (1) |
|
|
273 | (1) |
|
DHCP Administrative Delegation |
|
|
273 | (1) |
|
Netsh Command-Line Utility |
|
|
273 | (1) |
|
DHCP Database Maintenance |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
DHCP and Domain Controller Security |
|
|
275 | (1) |
|
Windows Internet Naming Service Basics |
|
|
276 | (3) |
|
Legacy Microsoft NetBIOS Resolution |
|
|
277 | (1) |
|
|
277 | (1) |
|
Changes in Windows Server 2003 WINS |
|
|
278 | (1) |
|
Installing and Configuring WINS |
|
|
279 | (3) |
|
|
279 | (1) |
|
Configuring Push/Pull Partners |
|
|
279 | (1) |
|
|
280 | (1) |
|
NetBIOS Client Resolution and the LMHOSTS File |
|
|
281 | (1) |
|
WINS Planning, Migrating, and Maintenance |
|
|
282 | (3) |
|
Designing a WINS Environment |
|
|
282 | (1) |
|
Upgrading a WINS Environment |
|
|
283 | (1) |
|
WINS Database Maintenance |
|
|
284 | (1) |
|
Global Catalog Domain Controllers Placement |
|
|
285 | (2) |
|
The Active Directory Global Catalog |
|
|
285 | (1) |
|
Global Catalog/Domain Controller Placement |
|
|
286 | (1) |
|
|
286 | (1) |
|
Global Catalog and Domain Controller Placement |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (2) |
|
Internet Information Services v6 |
|
|
289 | (36) |
|
|
289 | (2) |
|
Planning and Designing IIS |
|
|
291 | (2) |
|
Determining Server Requirements |
|
|
292 | (1) |
|
Determining Fault Tolerance Requirements |
|
|
292 | (1) |
|
Installing and Upgrading IIS |
|
|
293 | (2) |
|
Upgrading from Other Versions of IIS |
|
|
295 | (1) |
|
|
295 | (8) |
|
|
295 | (2) |
|
|
297 | (1) |
|
Creating a Web Site with IIS |
|
|
297 | (5) |
|
Creating and Configuring a Virtual Directory |
|
|
302 | (1) |
|
Configuring and Optimizing Applications |
|
|
303 | (3) |
|
Application Isolation and Pooling |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
Installing and Configuring FTP Services |
|
|
306 | (4) |
|
Isolating FTP Users for Content Protection |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (2) |
|
Examining Optional IIS Components |
|
|
310 | (2) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (4) |
|
Windows Server 2003 Security |
|
|
313 | (1) |
|
Locking Down Web Service Extensions |
|
|
313 | (1) |
|
|
313 | (2) |
|
|
315 | (1) |
|
|
315 | (1) |
|
Configuring FTP Security Options |
|
|
315 | (1) |
|
|
316 | (2) |
|
|
317 | (1) |
|
Internet Explorer Enhanced Security Configuration for Servers |
|
|
318 | (2) |
|
|
320 | (1) |
|
|
320 | (5) |
|
|
|
|
325 | (26) |
|
Windows Server 2003 Security Defined |
|
|
325 | (1) |
|
Microsoft's ``Trustworthy Computing'' Initiative |
|
|
325 | (1) |
|
|
326 | (1) |
|
Layered Approach to Server Security |
|
|
326 | (1) |
|
Physical Security Considerations |
|
|
326 | (5) |
|
Restricting Physical Access |
|
|
327 | (1) |
|
|
327 | (1) |
|
Using the Run As Command for Administrative Access |
|
|
328 | (2) |
|
Using Smartcards for Login Access |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
Hardening Server Security |
|
|
331 | (3) |
|
|
331 | (1) |
|
Securing a Server Using the Configure Your Server Wizard |
|
|
332 | (1) |
|
Shutting Off Unnecessary Services |
|
|
333 | (1) |
|
|
334 | (3) |
|
|
334 | (1) |
|
Share-Level Security Versus NTFS Security |
|
|
335 | (1) |
|
|
336 | (1) |
|
Additional Security Considerations |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (11) |
|
Windows Update Background |
|
|
338 | (1) |
|
|
339 | (1) |
|
Development of Software Update Services |
|
|
339 | (1) |
|
SUS Prerequisites and Limitations |
|
|
339 | (1) |
|
Installing a Software Update Services Server |
|
|
340 | (1) |
|
|
341 | (3) |
|
Synchronizing an SUS Server |
|
|
344 | (1) |
|
Approving SUS Software Patches |
|
|
345 | (1) |
|
Automatically Configuring Clients via Group Policy |
|
|
346 | (2) |
|
Deploying Security Patches with SUS |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (2) |
|
|
351 | (20) |
|
Introduction to Transport-Level Security in Windows Server 2003 |
|
|
351 | (2) |
|
The Need for Transport-Level Security |
|
|
352 | (1) |
|
Security Through Multiple Layers of Defense |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (5) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
L2TP/IPSec Secure Protocol |
|
|
354 | (1) |
|
VPN Administration Using an Internet Authentication Service Server |
|
|
355 | (1) |
|
Using Routing and Remote Access Service to Establish VPNs |
|
|
356 | (2) |
|
Public Key Infrastructure |
|
|
358 | (4) |
|
Private Key Versus Public Key Encryption |
|
|
358 | (1) |
|
|
359 | (1) |
|
Certificate Services in Windows Server 2003 |
|
|
359 | (2) |
|
Smartcards in a PKI Infrastructure |
|
|
361 | (1) |
|
|
362 | (1) |
|
PKI Integration with Non-Microsoft Kerberos Realms |
|
|
362 | (1) |
|
|
362 | (2) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
Configuring Simple IPSec Between Servers in a Windows Server 2003 Domain |
|
|
364 | (4) |
|
Viewing the IPSec Security Monitor |
|
|
364 | (1) |
|
Establishing an IPSec Policy on the Server |
|
|
365 | (1) |
|
Establishing an IPSec Policy on the Client |
|
|
366 | (1) |
|
Verifying IPSec Functionality in Event Viewer |
|
|
366 | (2) |
|
|
368 | (1) |
|
|
368 | (3) |
|
Windows Server 2003 Passports |
|
|
371 | (16) |
|
The Benefits of Using .NET Passports |
|
|
372 | (1) |
|
Installing and Configuring .NET Passports |
|
|
372 | (7) |
|
|
373 | (3) |
|
Using the Passport Manager Administration Utility |
|
|
376 | (1) |
|
Obtaining an Encryption Key |
|
|
377 | (1) |
|
Building .NET Passport for Production |
|
|
378 | (1) |
|
Working with .NET Passport Accounts |
|
|
379 | (2) |
|
|
379 | (1) |
|
Using Site Accounts and .NET Passport |
|
|
379 | (1) |
|
Creating Passport Accounts |
|
|
380 | (1) |
|
Using Passports with Web-Based Applications |
|
|
381 | (1) |
|
Using .NET Passports and Mobile Devices |
|
|
381 | (1) |
|
Additional Layers of Security |
|
|
382 | (1) |
|
.NET Passport Authentication |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
Fair Information Practices |
|
|
384 | (1) |
|
|
384 | (1) |
|
The .NET Passport EP Service |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
Security Policies and Tools |
|
|
387 | (16) |
|
|
387 | (7) |
|
Educating the Organization |
|
|
388 | (1) |
|
|
388 | (1) |
|
Enterprise-Level Security Policies |
|
|
389 | (1) |
|
Network Infrastructure Security Policies |
|
|
390 | (1) |
|
System-Level Security Policies |
|
|
391 | (2) |
|
Desktop Security Policies |
|
|
393 | (1) |
|
The Security Policies Toolbox |
|
|
394 | (5) |
|
|
394 | (2) |
|
|
396 | (1) |
|
|
397 | (1) |
|
Security Configuration and Analysis |
|
|
397 | (2) |
|
|
399 | (1) |
|
|
399 | (4) |
|
Part V Migrating to Windows Server 2003 |
|
|
|
Migrating from Windows NT4 to Windows Server 2003 |
|
|
403 | (36) |
|
Migration Paths to Windows Server 2003 |
|
|
403 | (3) |
|
Determining the Best Migration Path for Your Organization |
|
|
404 | (2) |
|
Preparing Windows NT4 Domains to Migrate to Windows Server 2003 |
|
|
406 | (4) |
|
Hardware and Software Compatibility |
|
|
407 | (1) |
|
Reviewing Hardware and Software Requirements |
|
|
407 | (1) |
|
Migrating Windows NT4 Volumes, Mirrors, and Stripe Sets |
|
|
408 | (1) |
|
Installing and Configuring Services for Compatibility with Windows Server 2003 |
|
|
409 | (1) |
|
Pparing an NT 4.0 SAM Database |
|
|
410 | (1) |
|
Performing an Inplace Upgrade |
|
|
410 | (7) |
|
Upgrading the Windows NT4 Primary Domain Controller |
|
|
411 | (1) |
|
Upgrading to Active Directory |
|
|
412 | (1) |
|
Setting Forest Functionality Levels |
|
|
413 | (1) |
|
Applying Security to the Directory Services Restore Mode |
|
|
414 | (1) |
|
Migrating Backup Domain Controllers and Domain Member Servers |
|
|
414 | (1) |
|
Starting the Domain Controller/Member Server Upgrade |
|
|
415 | (1) |
|
Upgrading the Windows NT4 BDC to a Windows Server 2003 Domain Controller |
|
|
416 | (1) |
|
Migrating Existing NT4 Domains to a New Windows Server 2003 Forest |
|
|
417 | (6) |
|
Installing and Configuring a New Windows Server 2003 Forest and Domain |
|
|
417 | (3) |
|
Configuring Domain Trust Between Windows NT4 and Windows Server 2003 |
|
|
420 | (2) |
|
Migrating Account and Resource Domains to Windows Server 2003 and Active Directory |
|
|
422 | (1) |
|
Implication of Migrating Security Principles |
|
|
423 | (1) |
|
Consolidating Windows NT4 Domains |
|
|
423 | (2) |
|
Upgrading an Existing NT4 Domain to a New Active Directory Forest Root Domain |
|
|
424 | (1) |
|
Restructuring Existing Account and Resource Domains to Active Directory |
|
|
424 | (1) |
|
Using Microsoft Active Directory Migration Tool |
|
|
425 | (12) |
|
Installing the Active Directory Migration Tool |
|
|
426 | (1) |
|
Migrating Domain Accounts and Groups to Active Directory |
|
|
426 | (5) |
|
Migrating NT4 Groups into Active Directory |
|
|
431 | (2) |
|
Migrating Computer Accounts to Active Directory |
|
|
433 | (3) |
|
Migrating Service Accounts to Active Directory |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (2) |
|
Migrating from Windows 2000 to Windows Server 2003 |
|
|
439 | (42) |
|
Windows Server 2003 Migration Overview |
|
|
439 | (1) |
|
|
440 | (2) |
|
Identifying Migration Objectives |
|
|
440 | (1) |
|
Establishing Migration Project Phases |
|
|
440 | (1) |
|
Inplace Upgrade Versus New Hardware Migration |
|
|
441 | (1) |
|
Migration Strategies: ``Big Bang'' Versus Slow Transition |
|
|
442 | (1) |
|
|
442 | (1) |
|
Upgrading a Single Member Server |
|
|
442 | (4) |
|
Verifying Hardware Compatibility |
|
|
443 | (1) |
|
Verifying Application Readiness |
|
|
443 | (1) |
|
Backing Up and Creating a Recovery Process |
|
|
444 | (1) |
|
Upgrading a Standalone Server |
|
|
444 | (2) |
|
Upgrading a Windows 2000 Active Directory Forest |
|
|
446 | (12) |
|
Migrating Domain Controllers |
|
|
447 | (1) |
|
Upgrading the AD Schema Using adprep |
|
|
448 | (3) |
|
Upgrading Existing Domain Controllers |
|
|
451 | (1) |
|
Replacing Existing Domain Controllers |
|
|
451 | (2) |
|
Moving Operation Master Roles |
|
|
453 | (1) |
|
Retiring Existing Windows 2000 Domain Controllers |
|
|
454 | (1) |
|
Retiring ``Ghost'' Windows 2000 Domain Controllers |
|
|
455 | (1) |
|
Upgrading Domain and Forest Functional Levels |
|
|
456 | (1) |
|
Moving AD-Integrated DNS Zones to Application Partition |
|
|
457 | (1) |
|
Upgrading Separate AD Forests to a Single Forest Using Mixed-Mode Domain Redirect |
|
|
458 | (6) |
|
Prerequisites and Limitations of the Mixed-Mode Domain Redirect Procedure |
|
|
458 | (1) |
|
Mixed-Mode Domain Redirect Procedure |
|
|
459 | (5) |
|
Consolidating and Migrating Domains Using the Active Directory Migration Tool v2.0 |
|
|
464 | (1) |
|
Understanding ADMT v2.0 Functionality |
|
|
464 | (1) |
|
Consolidating a Windows 2000 Domain to a Windows Server 2003 Domain Using ADMT v2.0 |
|
|
465 | (15) |
|
Using ADMT in a Lab Environment |
|
|
465 | (1) |
|
ADMT v2.0 Installation Procedure |
|
|
465 | (5) |
|
|
470 | (3) |
|
|
473 | (3) |
|
Migrating Computer Accounts |
|
|
476 | (3) |
|
Migrating Other Domain Functionality |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
Compatibility Testing for Windows Server 2003 |
|
|
481 | (22) |
|
The Importance of Compatibility Testing in Windows Server 2003 |
|
|
482 | (1) |
|
Defining the Goals for Compatibility Testing |
|
|
483 | (5) |
|
The Application Is Windows Server 2003 Compatible |
|
|
484 | (1) |
|
The Application Is Compatible with a Service Update |
|
|
485 | (1) |
|
The Application Is Compatible After a Major Project Upgrade |
|
|
485 | (1) |
|
The Application Is Not Compatible and Will Remain on the Old Operating System |
|
|
486 | (1) |
|
The Application Is Not Compatible and Will Not Be Used |
|
|
487 | (1) |
|
The Application Is Not Officially Compatible but Seems to Work Fine |
|
|
487 | (1) |
|
Choosing Which Compatibility Goals Are Acceptable |
|
|
488 | (1) |
|
Defining the Testing Process |
|
|
488 | (4) |
|
Determining the Scope of Testing |
|
|
488 | (2) |
|
Determining the Testing Timeline |
|
|
490 | (1) |
|
Allocating Additional Time During the Testing Process |
|
|
491 | (1) |
|
Documenting the Compatibility-Testing Plan |
|
|
492 | (1) |
|
Researching Products and Applications |
|
|
492 | (4) |
|
Taking Inventory of Network Systems |
|
|
492 | (1) |
|
Taking Inventory of Applications on Existing Servers |
|
|
493 | (1) |
|
Understanding the Differences Between Applications and Windows Services |
|
|
493 | (1) |
|
Completing an Inventory Sheet per Application |
|
|
494 | (1) |
|
Prioritizing the Applications on the List |
|
|
495 | (1) |
|
Verifying Compatibility with Vendors |
|
|
495 | (1) |
|
Creating an Inventory Summary Sheet |
|
|
495 | (1) |
|
Lab-Testing Existing Applications |
|
|
496 | (2) |
|
Allocating and Configuring Hardware |
|
|
496 | (1) |
|
Loading Existing Applications |
|
|
496 | (1) |
|
Following the Migration and Upgrade Procedures |
|
|
497 | (1) |
|
Documenting the Results of the Compatibility Testing |
|
|
498 | (1) |
|
Determining the Scope and Focus of the Document |
|
|
498 | (1) |
|
Including Supporting Materials to the Documentation |
|
|
499 | (1) |
|
Determining Whether a Prototype Phase Is Required |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (3) |
|
Part VI Windows Server 2003 Administration and Management |
|
|
|
Windows Server 2003 User, Group, and Site Administration |
|
|
503 | (30) |
|
Defining the Administrative Model |
|
|
503 | (2) |
|
The Centralized Administration Model |
|
|
504 | (1) |
|
The Distributed Administration Model |
|
|
504 | (1) |
|
The Mixed Administration Model |
|
|
505 | (1) |
|
Examining Active Directory Sites |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (8) |
|
|
507 | (3) |
|
Configuring Licensing for the Enterprise |
|
|
510 | (1) |
|
|
511 | (2) |
|
Delegating Control at the Site Level |
|
|
513 | (1) |
|
Examining Windows Server 2003 Active Directory Groups |
|
|
514 | (2) |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
516 | (4) |
|
User Administration in a Single Domain |
|
|
516 | (1) |
|
User Administration Across a Forest of Domains |
|
|
516 | (1) |
|
Domain Functionality Level and Groups |
|
|
517 | (1) |
|
Steps to Create AD Groups |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
518 | (2) |
|
Handling User Administration |
|
|
520 | (1) |
|
Understanding User Profiles |
|
|
520 | (3) |
|
|
520 | (2) |
|
Creating a Default Profile |
|
|
522 | (1) |
|
Copying Profiles for the Default User Profile |
|
|
522 | (1) |
|
Managing Users with Local Security and Group Policies |
|
|
523 | (7) |
|
Viewing Policies with the Group Policy Object Editor |
|
|
524 | (1) |
|
Creating New Group Policies |
|
|
525 | (1) |
|
Configuring and Optimizing Group Policy |
|
|
526 | (3) |
|
Troubleshooting Group Policy Applications |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (2) |
|
Windows Server 2003 System Registry |
|
|
533 | (22) |
|
Windows Server 2003 Registry Architecture |
|
|
534 | (7) |
|
|
534 | (1) |
|
Registry Location and Storage |
|
|
535 | (1) |
|
|
535 | (3) |
|
|
538 | (1) |
|
|
539 | (1) |
|
|
539 | (1) |
|
|
540 | (1) |
|
The Windows Server 2003 Registry Editor |
|
|
541 | (3) |
|
Modifying Registry Entries |
|
|
541 | (2) |
|
|
543 | (1) |
|
|
543 | (1) |
|
Connecting to a Remote Registry |
|
|
543 | (1) |
|
|
544 | (4) |
|
|
545 | (1) |
|
|
545 | (2) |
|
|
547 | (1) |
|
|
548 | (3) |
|
|
548 | (3) |
|
|
551 | (3) |
|
|
551 | (2) |
|
Speeding Up Individual Key Backups |
|
|
553 | (1) |
|
Restoring Individual Registry Keys |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
554 | (1) |
|
Windows Server 2003 Server Group Policies |
|
|
555 | (34) |
|
Overview of Group Policies |
|
|
555 | (1) |
|
What's New in Windows 2003 Server Group Policies |
|
|
556 | (1) |
|
Working with Group Policy Objects |
|
|
557 | (4) |
|
Opening the Group Policy Snap-in |
|
|
557 | (1) |
|
Editing a Group Policy Object |
|
|
558 | (1) |
|
Creating a Group Policy Object |
|
|
559 | (1) |
|
Deleting a Group Policy Object |
|
|
560 | (1) |
|
Unlinking a Group Policy Object |
|
|
560 | (1) |
|
Disabling a Group Policy Object |
|
|
561 | (1) |
|
Working Within the Group Policy Snap-in Namespace |
|
|
561 | (7) |
|
Using Computer and User Configurations |
|
|
562 | (1) |
|
Working with Software Settings |
|
|
562 | (1) |
|
Working with Windows Settings |
|
|
562 | (1) |
|
Working with Security Settings |
|
|
563 | (2) |
|
Leveraging Administrative Templates |
|
|
565 | (1) |
|
Deploying Software Installations |
|
|
566 | (1) |
|
Creating and Modifying Scripts |
|
|
567 | (1) |
|
Managing Group Policy Objects |
|
|
568 | (1) |
|
Nonlocal and Local Group Policy Objects |
|
|
568 | (1) |
|
Storage of Group Policy Objects |
|
|
568 | (1) |
|
Working with Group Policy Permissions |
|
|
569 | (2) |
|
Default Permissions Settings |
|
|
569 | (1) |
|
Setting Permissions on a Group Policy Object |
|
|
569 | (2) |
|
Utilizing Policy Inheritance |
|
|
571 | (2) |
|
|
571 | (1) |
|
|
572 | (1) |
|
Getting the Most Out of Folder Redirection |
|
|
573 | (3) |
|
Creating a Folder for Each User Under the Root Path |
|
|
573 | (1) |
|
Redirecting to Home Directory (My Documents) |
|
|
573 | (1) |
|
Redirecting to a Special Path |
|
|
574 | (1) |
|
Redirecting to the Local User Profile |
|
|
575 | (1) |
|
|
576 | (1) |
|
Using Windows Management Interface Filters |
|
|
576 | (1) |
|
Adding a New WMI Filter to a Group Policy Object |
|
|
576 | (1) |
|
Importing to and Exporting from a Group Policy Object |
|
|
577 | (1) |
|
Leveraging Group Policy Precedence |
|
|
577 | (4) |
|
Order of Events in Startup and Logon |
|
|
578 | (1) |
|
Order of Processing Settings |
|
|
579 | (1) |
|
|
579 | (1) |
|
The Role of Applications in Group Policy Precedence |
|
|
580 | (1) |
|
Maximizing Group Policies and Network Infrastructure |
|
|
581 | (2) |
|
Features Supported Across Forests |
|
|
581 | (1) |
|
Group Policies in a Multiplatform Network |
|
|
581 | (1) |
|
Replicated Environments Impact on Group Policies |
|
|
581 | (1) |
|
Group Policies Across Slow Links |
|
|
582 | (1) |
|
Impact of Group Policies on Active Directory Sites |
|
|
582 | (1) |
|
Reporting Through Resultant Set of Policy |
|
|
583 | (2) |
|
RSoP, AD, and Policy Precedence |
|
|
583 | (1) |
|
RSoP and Software Installation |
|
|
584 | (1) |
|
|
584 | (1) |
|
|
584 | (1) |
|
Using the Group Policy Management Console |
|
|
585 | (1) |
|
Using Command-Line Tools for Group Policy |
|
|
586 | (2) |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
588 | (1) |
|
Windows Server 2003 Management and Maintenance Practices |
|
|
589 | (40) |
|
Managing Windows Server 2003 |
|
|
589 | (5) |
|
Managing Based on Server Roles |
|
|
590 | (4) |
|
|
594 | (1) |
|
|
594 | (5) |
|
|
595 | (1) |
|
Tracking Logon and Logoff Events |
|
|
596 | (1) |
|
Monitoring Resource Access |
|
|
596 | (3) |
|
Managing Windows Server 2003 Remotely |
|
|
599 | (3) |
|
|
599 | (1) |
|
Remote Desktop for Administration |
|
|
600 | (1) |
|
Using Telnet for Remote Access Management |
|
|
601 | (1) |
|
Identifying Security Risks |
|
|
602 | (1) |
|
Tracking and Managing Licenses |
|
|
602 | (1) |
|
Using Microsoft Operations Manager to Simplify Management |
|
|
603 | (1) |
|
Employing Windows Server 2003 Maintenance Practices |
|
|
604 | (2) |
|
Maintaining DHCP and WINS |
|
|
604 | (1) |
|
Maintaining DNS Aging and Scavenging |
|
|
605 | (1) |
|
Keeping Up with Service Packs and Hotfixes |
|
|
606 | (3) |
|
|
607 | (1) |
|
|
608 | (1) |
|
|
608 | (1) |
|
Maintaining Windows Server 2003 |
|
|
609 | (18) |
|
|
609 | (4) |
|
|
613 | (8) |
|
|
621 | (3) |
|
|
624 | (3) |
|
Summary of Maintenance Tasks and Recommendations |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
627 | (2) |
|
Automating Tasks Using Windows Server 2003 Scripting |
|
|
629 | (32) |
|
|
629 | (4) |
|
Documented Instruction Scripts |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
631 | (1) |
|
Scripts for User Configuration |
|
|
632 | (1) |
|
Directory Administration Scripts |
|
|
632 | (1) |
|
|
633 | (1) |
|
|
633 | (4) |
|
Visual Basic Script Options |
|
|
633 | (4) |
|
Active Directory Scripting Overview |
|
|
637 | (1) |
|
|
637 | (1) |
|
Active Directory Services Interface |
|
|
638 | (1) |
|
Working with Active Directory Objects |
|
|
638 | (1) |
|
Discovering Object Properties |
|
|
638 | (5) |
|
|
639 | (2) |
|
Active Directory Schema MMC Snap-in |
|
|
641 | (2) |
|
Scripting User Management |
|
|
643 | (5) |
|
|
644 | (2) |
|
Populating Optional User Attributes |
|
|
646 | (1) |
|
Populating User Attributes Using Variables |
|
|
646 | (1) |
|
Scripting Exchange 2000 Properties for Active Directory |
|
|
647 | (1) |
|
Creating a User from File Data |
|
|
648 | (1) |
|
Using Ldifde.exe or Csvde.exe |
|
|
648 | (1) |
|
Connecting to Flat File Data Sources |
|
|
649 | (1) |
|
Searching Active Directory |
|
|
649 | (2) |
|
|
650 | (1) |
|
Creating a Search Using ADO |
|
|
650 | (1) |
|
Searching Using the Active Directory Users and Computers MMC Snap-in |
|
|
651 | (1) |
|
Windows Server 2003 Scripting |
|
|
651 | (2) |
|
Introducing Windows Management Instrumentation |
|
|
651 | (1) |
|
Creating a Simple WMI Script |
|
|
652 | (1) |
|
|
653 | (6) |
|
|
653 | (2) |
|
Creating Users from Data in a CSV File |
|
|
655 | (3) |
|
Checking Domain Servers for Volume Free Space |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (2) |
|
Documenting a Windows Server 2003 Environment |
|
|
661 | (16) |
|
Benefits of Documentation |
|
|
662 | (2) |
|
|
662 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
Design and Planning Documentation |
|
|
664 | (1) |
|
Components to a Design Document |
|
|
664 | (1) |
|
|
665 | (2) |
|
|
665 | (1) |
|
Server Migration Procedures |
|
|
666 | (1) |
|
Desktop Migration Procedures |
|
|
666 | (1) |
|
User Migration Procedures |
|
|
667 | (1) |
|
Active Directory Infrastructure |
|
|
667 | (1) |
|
|
668 | (1) |
|
|
668 | (1) |
|
|
668 | (1) |
|
Administration and Maintenance Documentation |
|
|
669 | (1) |
|
|
669 | (1) |
|
|
669 | (1) |
|
Disaster Recovery Documentation |
|
|
670 | (1) |
|
|
670 | (1) |
|
|
670 | (1) |
|
|
671 | (1) |
|
Change Management Procedures |
|
|
671 | (1) |
|
Performance Documentation |
|
|
671 | (1) |
|
|
671 | (1) |
|
Management-Level Reporting |
|
|
672 | (1) |
|
|
672 | (1) |
|
|
672 | (1) |
|
|
673 | (1) |
|
Management-Level Reporting |
|
|
673 | (1) |
|
|
673 | (1) |
|
|
673 | (1) |
|
|
674 | (1) |
|
|
674 | (1) |
|
|
674 | (1) |
|
|
674 | (3) |
|
Integrating Microsoft Operations Manager with Windows Server 2003 |
|
|
677 | (26) |
|
What Is Microsoft Operations Manager? |
|
|
677 | (1) |
|
|
678 | (1) |
|
Processing Events and Performance Data |
|
|
678 | (1) |
|
Generating Alerts and Responses |
|
|
678 | (1) |
|
|
679 | (3) |
|
How MOM Stores Captured Data |
|
|
680 | (1) |
|
The Role of the Data Access Server in MOM |
|
|
680 | (1) |
|
Responsibility of the Consolidator in MOM |
|
|
680 | (1) |
|
The Task of Agents for System Monitoring |
|
|
680 | (1) |
|
Creating Administrative Boundaries with Configuration Groups |
|
|
680 | (2) |
|
|
682 | (3) |
|
Managing and Monitoring with MOM |
|
|
682 | (1) |
|
|
682 | (2) |
|
|
684 | (1) |
|
|
685 | (3) |
|
Legacy Management Integration |
|
|
687 | (1) |
|
Extended Management Packs |
|
|
687 | (1) |
|
MOM Component Requirements |
|
|
688 | (2) |
|
|
688 | (1) |
|
|
688 | (1) |
|
|
689 | (1) |
|
MOM Backup Considerations |
|
|
689 | (1) |
|
|
690 | (1) |
|
|
690 | (5) |
|
DCAM Versus D-DCAM Servers |
|
|
690 | (1) |
|
Multiple Configuration Groups |
|
|
691 | (1) |
|
Geographic-Based Configuration Groups |
|
|
691 | (1) |
|
Political or Security-Based Configuration Groups |
|
|
691 | (1) |
|
|
692 | (1) |
|
|
693 | (1) |
|
Server and Environment Scalability |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
695 | (2) |
|
|
696 | (1) |
|
|
696 | (1) |
|
|
696 | (1) |
|
|
696 | (1) |
|
Sample Designs of Successful MOM Implementations |
|
|
697 | (3) |
|
Single Server MOM Configuration |
|
|
697 | (1) |
|
Multiple MOM Server Configuration |
|
|
698 | (2) |
|
|
700 | (1) |
|
|
700 | (3) |
|
Part IV Remote and Mobile Technologies |
|
|
|
|
703 | (30) |
|
Windows Server 2003 Routing and Remote Access Features and Services |
|
|
703 | (2) |
|
Point-to-Point Protocol over Ethernet Dial-On-Demand |
|
|
705 | (1) |
|
Background Intelligent Transfer Service Version 1.5 |
|
|
705 | (1) |
|
NAT Traversal Using Universal Plug and Play |
|
|
705 | (1) |
|
Routing and Remote Access Service Architecture |
|
|
705 | (4) |
|
|
706 | (1) |
|
|
706 | (1) |
|
Authentication, Authorization, and Accounting |
|
|
706 | (1) |
|
Dynamic Interface Manager (Mprdim.dll) |
|
|
707 | (1) |
|
|
707 | (1) |
|
Telephony Application Programming Interface |
|
|
707 | (1) |
|
IP Router Manager (Iprtmgr.dll) |
|
|
707 | (1) |
|
IPX Router Manager (Ipxrtmgr.dll) |
|
|
707 | (1) |
|
Unicast Routing Protocols |
|
|
708 | (1) |
|
IP Multicast Routing Protocols |
|
|
708 | (1) |
|
Route Table Manager (Rtm.dll) |
|
|
708 | (1) |
|
|
708 | (1) |
|
IP Filtering Driver (lpfltdrv.sys) |
|
|
709 | (1) |
|
|
709 | (1) |
|
|
709 | (1) |
|
IPX Filtering Driver (Nwlnkflt.sys) |
|
|
709 | (1) |
|
IPX Forwarder Driver (Nwlnkfwd.sys) |
|
|
709 | (1) |
|
|
709 | (2) |
|
Components Needed to Create a VPN Connection |
|
|
710 | (1) |
|
Authentication Options to an RRAS System |
|
|
711 | (2) |
|
Authentication Protocols for PPTP Connections |
|
|
712 | (1) |
|
EAP-TLS Authentication Protocols |
|
|
712 | (1) |
|
Authentication Protocols for L2TP/IPSec Connections |
|
|
712 | (1) |
|
Choosing the Best Authentication Protocol |
|
|
713 | (1) |
|
|
713 | (3) |
|
Tunneling Within a Windows Server 2003 Networking Environment |
|
|
713 | (1) |
|
Point-to-Point Tunneling Protocol |
|
|
714 | (1) |
|
Layer 2 Tunneling Protocol |
|
|
715 | (1) |
|
|
715 | (1) |
|
Choosing Between PPTP and L2TP/IPSec |
|
|
716 | (1) |
|
Advantages of L2TP/IPSec over PPTP |
|
|
716 | (1) |
|
Advantages of PPTP over L2TP/IPSec |
|
|
717 | (1) |
|
Installing and Configuring Routing and Remote Access |
|
|
717 | (2) |
|
Configuring Remote Access Clients |
|
|
719 | (3) |
|
|
720 | (1) |
|
Connection Manager Client Dialer |
|
|
720 | (1) |
|
Connection Manager Administration Kit |
|
|
721 | (1) |
|
Connection Point Services |
|
|
721 | (1) |
|
|
721 | (1) |
|
The Impact of NAT Traversal at Improving Remote Connectivity |
|
|
721 | (1) |
|
|
722 | (6) |
|
Routing and Remote Access MMC Snap-in |
|
|
722 | (2) |
|
The Netsh Command-Line Tool |
|
|
724 | (2) |
|
Authentication and Accounting Logging |
|
|
726 | (1) |
|
|
726 | (1) |
|
|
727 | (1) |
|
|
728 | (3) |
|
Remote Mobile and Home Users |
|
|
728 | (2) |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
731 | (2) |
|
Windows Server 2003 Terminal Services |
|
|
733 | (40) |
|
|
734 | (2) |
|
Terminal Services for Remote Administration |
|
|
734 | (1) |
|
Terminal Services for LAN Users |
|
|
735 | (1) |
|
Terminal Services for Remote User Access |
|
|
735 | (1) |
|
Terminal Services for Remote User Support |
|
|
736 | (1) |
|
Terminal Services for Application Service Providers |
|
|
736 | (1) |
|
How Terminal Services Works |
|
|
736 | (3) |
|
|
737 | (1) |
|
Client-Side Terminal Services |
|
|
738 | (1) |
|
Terminal Services Features |
|
|
739 | (3) |
|
Local Resource Redirection |
|
|
739 | (1) |
|
|
740 | (1) |
|
|
741 | (1) |
|
Terminal Server Console Access |
|
|
742 | (1) |
|
Terminal Server Fault Tolerance |
|
|
742 | (1) |
|
Planning for Terminal Services |
|
|
742 | (5) |
|
Planning for Remote Desktop for Administration Mode |
|
|
742 | (1) |
|
Planning for Terminal Server Mode |
|
|
743 | (1) |
|
|
743 | (1) |
|
Physical Placement of Terminal Servers |
|
|
744 | (1) |
|
Planning for Hosted Applications |
|
|
744 | (1) |
|
|
744 | (1) |
|
Terminal Server Fault Tolerance |
|
|
745 | (1) |
|
Planning Terminal Services Security |
|
|
746 | (1) |
|
Terminal Server Licensing |
|
|
746 | (1) |
|
|
747 | (1) |
|
Deploying Terminal Services |
|
|
747 | (5) |
|
Installing Terminal Services Remote Desktop for Administration |
|
|
747 | (3) |
|
Terminal Services Terminal Server Mode Installation |
|
|
750 | (1) |
|
Installing Applications for Terminal Server |
|
|
751 | (1) |
|
Configuring Terminal Services |
|
|
752 | (5) |
|
|
752 | (1) |
|
|
752 | (1) |
|
Active Directory Users and Computers (Dsa.msc) |
|
|
753 | (1) |
|
Terminal Services Configuration (Tscc.msc) |
|
|
754 | (2) |
|
Group Policy for Terminal Server |
|
|
756 | (1) |
|
Hierarchy of Terminal Server Configuration Settings |
|
|
757 | (1) |
|
Installing a Terminal Services License Server |
|
|
757 | (3) |
|
Activating the Terminal Services License Server |
|
|
758 | (1) |
|
Installing Client Access Licenses |
|
|
759 | (1) |
|
Configuring the Licensing Type on a Terminal Server |
|
|
760 | (1) |
|
Installing and Configuring Fault-Tolerant Terminal Services |
|
|
760 | (3) |
|
Network Load Balancing Terminal Server |
|
|
761 | (1) |
|
Configuring the Session Directory Server |
|
|
761 | (2) |
|
Supporting Terminal Services |
|
|
763 | (3) |
|
Using the Terminal Server Manager |
|
|
763 | (1) |
|
Managing the Command-Line Terminal Services |
|
|
764 | (1) |
|
Managing Terminal Services Using WMI |
|
|
764 | (1) |
|
Supporting and Enabling Terminal Server Users |
|
|
764 | (2) |
|
Monitoring Terminal Server |
|
|
766 | (1) |
|
Applying Service Packs and Updates |
|
|
766 | (1) |
|
Performing Disaster Recovery on a Terminal Server |
|
|
766 | (1) |
|
Accessing a Terminal Server |
|
|
766 | (3) |
|
Accessing Terminal Services Using the 32-bit Windows RDP Client |
|
|
767 | (1) |
|
Accessing Terminal Services Using the Web Client |
|
|
767 | (1) |
|
Using the Remote Desktops MMC (Tsmmc.msc) |
|
|
768 | (1) |
|
Remotely Connecting to a Terminal Server Console |
|
|
768 | (1) |
|
|
769 | (1) |
|
|
769 | (4) |
|
Part VII Desktop Administration |
|
|
|
Windows Server 2003 Administration Tools for Desktops |
|
|
773 | (20) |
|
Examining Desktop Deployment Options |
|
|
773 | (2) |
|
|
774 | (1) |
|
|
774 | (1) |
|
|
774 | (1) |
|
Using Remote Installation Services to Deploy System Images |
|
|
775 | (4) |
|
|
775 | (1) |
|
|
776 | (1) |
|
|
776 | (2) |
|
Configuring DHCP for RIS Clients |
|
|
778 | (1) |
|
Establishing Client Requirements |
|
|
778 | (1) |
|
Creating Windows XP Images |
|
|
779 | (5) |
|
Installing Desktop Software |
|
|
779 | (1) |
|
Standardizing the Desktop |
|
|
780 | (1) |
|
Minimizing Common Image Errors |
|
|
780 | (1) |
|
Using the Windows XP Deployment Tools |
|
|
780 | (2) |
|
Creating a Custom Desktop Image for RIS |
|
|
782 | (1) |
|
Creating an Unattended Installation |
|
|
783 | (1) |
|
Creating an Image for Third-Party Image Software |
|
|
784 | (1) |
|
Managing Windows XP Installation Media and Image Versions |
|
|
784 | (1) |
|
|
785 | (1) |
|
Updating Existing XP and 2000 Workstations |
|
|
785 | (1) |
|
|
785 | (1) |
|
Deploying Hotfixes and Security Updates |
|
|
786 | (1) |
|
|
786 | (1) |
|
|
786 | (1) |
|
Managing Desktop Applications |
|
|
786 | (4) |
|
Managing Applications Using Group Policy |
|
|
787 | (2) |
|
Using Third-Party Application Packaging Software |
|
|
789 | (1) |
|
Manually Installing Applications |
|
|
789 | (1) |
|
Managing Windows XP Desktops Remotely |
|
|
790 | (1) |
|
|
790 | (1) |
|
|
791 | (2) |
|
Group Policy Management for Network Clients |
|
|
793 | (22) |
|
General Recommendations for Managing Clients Through Group Policy |
|
|
793 | (2) |
|
Keeping Group Policies Manageable |
|
|
794 | (1) |
|
Managing Client Software Installations |
|
|
794 | (1) |
|
|
795 | (1) |
|
Real-Life Scenarios of Group Policy Management |
|
|
795 | (14) |
|
Working with Mobile Users |
|
|
796 | (2) |
|
|
798 | (1) |
|
Locking Down Workstations |
|
|
799 | (3) |
|
|
802 | (2) |
|
Providing a High Level of Security |
|
|
804 | (2) |
|
Maintaining Administrator Workstations |
|
|
806 | (3) |
|
|
809 | (1) |
|
|
809 | (6) |
|
Part IX Fault Tolerance Technologies |
|
|
|
File System Fault Tolerance |
|
|
815 | (48) |
|
Examining Windows Server 2003 File System Services |
|
|
815 | (2) |
|
|
816 | (1) |
|
|
816 | (1) |
|
Volume Shadow Copy Service |
|
|
816 | (1) |
|
|
817 | (1) |
|
Using Fault-Tolerant Disk Arrays |
|
|
817 | (7) |
|
|
817 | (2) |
|
|
819 | (1) |
|
|
820 | (1) |
|
Creating Fault-Tolerant Volumes |
|
|
821 | (3) |
|
Managing File Share Access and Volume Usage |
|
|
824 | (5) |
|
|
824 | (3) |
|
Managing Volume Usage with Quotas |
|
|
827 | (2) |
|
Monitoring Disks and Volumes |
|
|
829 | (2) |
|
Using the Performance Console |
|
|
829 | (1) |
|
Using the Fsutil.exe Command-Line Utility |
|
|
829 | (1) |
|
Auditing File and Folder Security |
|
|
829 | (2) |
|
Reviewing Volume Quota Usage |
|
|
831 | (1) |
|
Working with Operating System Files: Fault Tolerance |
|
|
831 | (3) |
|
|
832 | (2) |
|
Using the Distributed File System |
|
|
834 | (2) |
|
|
834 | (1) |
|
|
835 | (1) |
|
|
836 | (1) |
|
Planning a DFS Deployment |
|
|
836 | (4) |
|
Configuring File Share and NTFS Permissions for DFS Root and Link Targets |
|
|
837 | (1) |
|
|
837 | (1) |
|
Planning for Domain DFS and Replication |
|
|
837 | (1) |
|
Using the File Replication Service |
|
|
838 | (1) |
|
Determining the Replication Topology |
|
|
839 | (1) |
|
|
840 | (6) |
|
Creating the DFS Root File Share |
|
|
840 | (1) |
|
|
841 | (1) |
|
|
842 | (1) |
|
Adding Additional Targets |
|
|
843 | (1) |
|
Configuring DFS Replication |
|
|
843 | (2) |
|
Publishing DFS Roots in Active Directory |
|
|
845 | (1) |
|
Best Practices for DFS Replication |
|
|
845 | (1) |
|
|
846 | (1) |
|
Prestaging a New DFS Replica |
|
|
846 | (1) |
|
Managing and Troubleshooting DFS |
|
|
847 | (3) |
|
Checking Status Using the Performance Console |
|
|
847 | (1) |
|
Taking a Target Offline for Maintenance |
|
|
848 | (1) |
|
Disabling Replication for Extended Downtime |
|
|
849 | (1) |
|
|
850 | (1) |
|
|
850 | (1) |
|
Using the DFScmd.exe Utility |
|
|
850 | (1) |
|
|
851 | (5) |
|
Remote Storage Best Practices |
|
|
851 | (1) |
|
Installing Remote Storage |
|
|
851 | (1) |
|
Configuring Remote Storage |
|
|
852 | (4) |
|
Using the Volume Shadow Copy Service |
|
|
856 | (4) |
|
Using VSS and Windows Server 2003 Backup |
|
|
856 | (1) |
|
Configuring Shadow Copies |
|
|
856 | (2) |
|
Recovering Data Using Shadow Copies |
|
|
858 | (1) |
|
|
859 | (1) |
|
|
860 | (1) |
|
|
860 | (3) |
|
System-Level Fault Tolerance (Clustering/Network Load Balancing) |
|
|
863 | (58) |
|
Building Fault-Tolerant Systems |
|
|
864 | (2) |
|
Uninterruptible Power Supplies |
|
|
864 | (1) |
|
|
864 | (1) |
|
|
865 | (1) |
|
Improving Application Reliability |
|
|
866 | (1) |
|
Examining Windows Server 2003 Clustering Technologies |
|
|
866 | (3) |
|
|
867 | (2) |
|
Choosing the Right Clustering Technology |
|
|
869 | (2) |
|
Microsoft Cluster Service |
|
|
870 | (1) |
|
|
871 | (1) |
|
Implementing Cluster Service |
|
|
871 | (6) |
|
The Single-Quorum Device Cluster |
|
|
871 | (1) |
|
|
872 | (1) |
|
The Majority Node Set Cluster |
|
|
872 | (2) |
|
Choosing Applications for Cluster Service |
|
|
874 | (1) |
|
|
875 | (2) |
|
Installing Cluster Service |
|
|
877 | (6) |
|
Working Through the Cluster Pre-Installation Checklist |
|
|
877 | (1) |
|
Installing the First Node in the Cluster |
|
|
878 | (4) |
|
Adding Additional Nodes to a Cluster |
|
|
882 | (1) |
|
|
883 | (9) |
|
|
883 | (1) |
|
|
883 | (1) |
|
Cluster Automation Server |
|
|
884 | (1) |
|
Configuring Failover and Failback |
|
|
884 | (1) |
|
|
885 | (2) |
|
Maintaining Cluster Nodes |
|
|
887 | (2) |
|
Creating Additional Cluster Groups and Resources |
|
|
889 | (1) |
|
Changing the Cluster Service Account Password |
|
|
890 | (1) |
|
|
891 | (1) |
|
Removing a Node from a Cluster |
|
|
891 | (1) |
|
Backing Up and Restoring Clusters |
|
|
892 | (16) |
|
Cluster Node Backup Best Practices |
|
|
893 | (1) |
|
Automated System Recovery Backup |
|
|
894 | (2) |
|
Backing Up the Cluster Quorum |
|
|
896 | (1) |
|
Backing Up the Cluster Node System State |
|
|
896 | (1) |
|
Backing Up the Local Disks on a Cluster Node |
|
|
897 | (1) |
|
Backing Up Shared Disks on a Cluster |
|
|
898 | (1) |
|
Restoring a Single-Node Cluster When the Cluster Service Fails |
|
|
899 | (3) |
|
Restoring a Single Node After a Complete Server Failure |
|
|
902 | (3) |
|
Restoring an Entire Cluster to a Previous State |
|
|
905 | (2) |
|
Restoring Cluster Nodes After a Cluster Failure |
|
|
907 | (1) |
|
|
908 | (1) |
|
|
908 | (1) |
|
Last Node Rolling Upgrade |
|
|
909 | (1) |
|
Installing Network Load Balancing Clusters |
|
|
909 | (6) |
|
NLB Applications and Services |
|
|
909 | (1) |
|
|
910 | (1) |
|
Port Rules Filtering Mode and Affinity |
|
|
910 | (1) |
|
Avoiding Switch Port Flooding |
|
|
911 | (1) |
|
Using Cluster Operation Mode |
|
|
911 | (1) |
|
Configuring Network Cards for NLB |
|
|
911 | (1) |
|
Using the Network Load Balancing Manager to Create a Cluster |
|
|
912 | (2) |
|
Adding Additional Nodes to an Existing NLB Cluster |
|
|
914 | (1) |
|
|
915 | (3) |
|
Backing Up and Restoring NLB Nodes |
|
|
916 | (1) |
|
Performing Maintenance on a Cluster Node |
|
|
916 | (1) |
|
Removing a Node from an NLB Cluster |
|
|
917 | (1) |
|
Deleting the Entire Cluster |
|
|
918 | (1) |
|
|
918 | (1) |
|
|
918 | (3) |
|
Backing Up a Windows Server 2003 Environment |
|
|
921 | (34) |
|
Disaster Recovery Planning |
|
|
922 | (1) |
|
|
922 | (1) |
|
Discovery: Learning the Environment |
|
|
923 | (3) |
|
Identifying the Different Services and Technologies |
|
|
924 | (1) |
|
Identifying Single Points of Failure |
|
|
924 | (1) |
|
Prioritizing the Environment |
|
|
924 | (1) |
|
Identifying Bare Minimum Services |
|
|
925 | (1) |
|
Creating the Disaster Recovery Solution |
|
|
925 | (1) |
|
Getting Disaster Recovery Solutions Approved |
|
|
925 | (1) |
|
Documenting the Enterprise |
|
|
926 | (2) |
|
Server Configuration Documentation |
|
|
926 | (1) |
|
The Server Build Document |
|
|
926 | (1) |
|
|
927 | (1) |
|
|
927 | (1) |
|
|
927 | (1) |
|
|
927 | (1) |
|
Developing a Backup Strategy |
|
|
928 | (3) |
|
Creating a Master Account List |
|
|
928 | (1) |
|
Assigning Tasks and Designating Team Members |
|
|
928 | (1) |
|
Creating Regular Backup Procedures |
|
|
929 | (1) |
|
Creating a Service-Level Agreement for Each Critical Service |
|
|
929 | (1) |
|
Planning Which Devices Need to Be Backed Up |
|
|
930 | (1) |
|
Backing Up the Windows Server 2003 Operating System and Services |
|
|
931 | (2) |
|
Backing Up Boot and System Volumes |
|
|
931 | (1) |
|
|
931 | (1) |
|
Backing Up Windows Server 2003 Services |
|
|
932 | (1) |
|
Backing Up the System State |
|
|
932 | (1) |
|
Using the Directory Services Restore Mode Password |
|
|
932 | (1) |
|
Examining the Windows Server 2003 Backup Programs |
|
|
933 | (2) |
|
Windows Server 2003 Backup Utility (ntbackup.exe) |
|
|
933 | (1) |
|
|
934 | (1) |
|
|
934 | (1) |
|
Using the Windows Server 2003 Backup Utility (ntbackup.exe) |
|
|
935 | (5) |
|
|
935 | (1) |
|
|
936 | (2) |
|
Automated System Recovery |
|
|
938 | (2) |
|
|
940 | (1) |
|
Remote Storage Media Management |
|
|
940 | (1) |
|
Using the Volume Shadow Copy Service |
|
|
941 | (2) |
|
Configuring Shadow Copies |
|
|
941 | (1) |
|
Volume Shadow Copy Best Practices |
|
|
942 | (1) |
|
|
942 | (1) |
|
Shadow Copy Management Using Vssadmin.exe |
|
|
942 | (1) |
|
Windows Server 2003 Service Backup Options |
|
|
943 | (7) |
|
Disk Configuration (Software RAID Sets) |
|
|
943 | (1) |
|
|
943 | (2) |
|
|
945 | (1) |
|
Windows Internet Naming Service |
|
|
945 | (2) |
|
Dynamic Host Configuration Protocol |
|
|
947 | (1) |
|
|
947 | (1) |
|
Internet Information Services |
|
|
948 | (1) |
|
Backing Up the Remote Storage Service |
|
|
949 | (1) |
|
Backing Up the Removable Storage Service |
|
|
950 | (1) |
|
Media Management for Windows Server 2003 Backup and the Remote Storage Service |
|
|
950 | (1) |
|
|
950 | (1) |
|
Windows Server 2003 Startup Troubleshooting Utilities |
|
|
951 | (1) |
|
|
951 | (1) |
|
Emergency Management Services Console Redirection |
|
|
952 | (1) |
|
|
952 | (1) |
|
|
953 | (2) |
|
Recovering from a Disaster |
|
|
955 | (42) |
|
Validating Backup Data and Procedures |
|
|
955 | (1) |
|
|
956 | (1) |
|
Including Test Restores in the Scheduled Maintenance |
|
|
956 | (1) |
|
|
956 | (2) |
|
|
957 | (1) |
|
Configuring a Test User Account |
|
|
957 | (1) |
|
|
957 | (1) |
|
Locating Application and Service Dependencies |
|
|
957 | (1) |
|
Recovering from a Site Failure |
|
|
958 | (4) |
|
Creating Redundant and Failover Sites |
|
|
958 | (1) |
|
Planning for Site Failover (Companyabc.com) |
|
|
959 | (1) |
|
Creating the Failover Site |
|
|
959 | (1) |
|
Failing Over Between Sites |
|
|
960 | (1) |
|
Failing Back After Site Recovery |
|
|
960 | (1) |
|
Providing Alternative Methods of Client Connectivity |
|
|
961 | (1) |
|
Recovering from a Disk Failure |
|
|
962 | (1) |
|
Hardware-Based RAID Array Failure |
|
|
962 | (1) |
|
|
962 | (1) |
|
|
963 | (1) |
|
|
963 | (1) |
|
Recovering from a Boot Failure |
|
|
963 | (2) |
|
|
964 | (1) |
|
Recovering from a Complete Server Failure |
|
|
965 | (5) |
|
Restoring Versus Rebuilding |
|
|
965 | (1) |
|
Manually Recovering a Server |
|
|
966 | (1) |
|
Restoring a Server Using a System State Restore |
|
|
967 | (1) |
|
Restoring a System Using ASR Restore |
|
|
968 | (2) |
|
Restoring the Boot Loader File |
|
|
970 | (1) |
|
Recovering Windows Server 2003 Networking Services |
|
|
970 | (6) |
|
|
970 | (3) |
|
Dynamic Host Configuration Protocol |
|
|
973 | (1) |
|
Windows Internet Naming Service |
|
|
974 | (2) |
|
|
976 | (1) |
|
Recovering Windows Server 2003 File Services and Data |
|
|
976 | (3) |
|
Recovering Data Using Ntbackup.exe |
|
|
976 | (1) |
|
Recovering Data with Volume Shadow Copy |
|
|
977 | (2) |
|
Recovering Internet Information Services |
|
|
979 | (1) |
|
Recovering IIS Data and Logs |
|
|
979 | (1) |
|
Recovering the Cluster Service |
|
|
980 | (1) |
|
Recovering Windows Server 2003 Domain Controllers |
|
|
980 | (1) |
|
Recovering Active Directory |
|
|
980 | (7) |
|
The Active Directory Database |
|
|
981 | (6) |
|
Recovering the Removable Storage Database |
|
|
987 | (3) |
|
Recovering the Remote Storage Database |
|
|
990 | (1) |
|
Recovering Data When Reparse Points Are Missing |
|
|
991 | (1) |
|
Achieving 99.999% Uptime Using Windows Server 2003 |
|
|
991 | (1) |
|
Providing Redundant Domain Services |
|
|
991 | (1) |
|
|
992 | (1) |
|
|
992 | (5) |
|
Part IX Problem Solving, Debugging, and Optimization |
|
|
|
|
997 | (36) |
|
Using the Task Manager for Logging and Debugging |
|
|
997 | (4) |
|
|
998 | (1) |
|
|
999 | (1) |
|
|
999 | (1) |
|
|
1000 | (1) |
|
Monitoring Network Performance |
|
|
1000 | (1) |
|
|
1001 | (8) |
|
Getting the Most Out of the Event Viewer |
|
|
1002 | (2) |
|
Viewing Logs on Remote Servers |
|
|
1004 | (1) |
|
|
1004 | (1) |
|
|
1005 | (1) |
|
Customizing the Event Log |
|
|
1006 | (1) |
|
Understanding the Security Log |
|
|
1007 | (1) |
|
Auditing System Events Through Group Policies |
|
|
1008 | (1) |
|
|
1009 | (6) |
|
Performance Monitoring Tools |
|
|
1010 | (1) |
|
Terms Used in the Performance Monitoring Tools |
|
|
1010 | (1) |
|
|
1010 | (4) |
|
|
1014 | (1) |
|
|
1015 | (2) |
|
Reducing Performance Monitoring Overhead |
|
|
1015 | (1) |
|
Important Objects to Monitor |
|
|
1016 | (1) |
|
Network Monitoring in Windows Server 2003 |
|
|
1017 | (4) |
|
Understanding How Netmon Works |
|
|
1017 | (1) |
|
|
1017 | (2) |
|
Capturing Frames Within Netmon |
|
|
1019 | (1) |
|
|
1020 | (1) |
|
Using the Debugging Tools Available in Windows Server 2003 |
|
|
1021 | (9) |
|
|
1021 | (7) |
|
System Startup and Recovery |
|
|
1028 | (1) |
|
The Software Error Reporting Mechanism |
|
|
1029 | (1) |
|
|
1029 | (1) |
|
|
1030 | (1) |
|
|
1031 | (2) |
|
Capacity Analysis and Performance Optimization |
|
|
1033 | (24) |
|
Defining Capacity Analysis |
|
|
1033 | (2) |
|
The Benefits of Capacity Analysis |
|
|
1034 | (1) |
|
Establishing Policy and Metric Baselines |
|
|
1035 | (3) |
|
|
1036 | (2) |
|
Using Capacity-Analysis Tools |
|
|
1038 | (5) |
|
|
1038 | (4) |
|
|
1042 | (1) |
|
Monitoring System Performance |
|
|
1043 | (5) |
|
|
1044 | (4) |
|
Optimizing Performance by Server Roles |
|
|
1048 | (6) |
|
|
1048 | (1) |
|
|
1049 | (4) |
|
Using the Windows System Resource Manager |
|
|
1053 | (1) |
|
|
1054 | (1) |
|
Automating Patch Management |
|
|
1054 | (1) |
|
|
1055 | (1) |
|
|
1055 | (1) |
|
|
1056 | (1) |
Index |
|
1057 | |