Windows Server 2008 R2 Secrets - Orin Thomas

Windows Server 2008 R2 Secrets

(Autor)

Buch | Softcover
576 Seiten
2011
John Wiley & Sons Ltd (Verlag)
978-0-470-88658-8 (ISBN)
34,24 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Unbeatable advice and expert tips for administering, upgrading or migrating to Windows Server 2008 R2 If you're a Windows Server 2008 system administrator, this is a reference you'll want to keep on hand. Written by a Microsoft MVP who has multiple MCITP certifications and bestselling author, this book gives you invaluable tips and unbeatable advice for deploying and managing Windows Server 2008 R2. Covering all aspects of the operating system in an easy-to-follow, easy-access format, the book reveals helpful and advanced secrets on configuring Windows roles like DirectAccess, BranchCache, Active Directory maintenance, setting up remote access, and much more.
Written by Microsoft Certified Information Technology Professional (MCITP) and bestselling author Orin Thomas, who is a well-known expert in the Windows space and a Microsoft MVP Provides practical advice and expert insights on upgrading, migrating to, or deploying the Windows Server 2008 R2 operating system Covers Active Directory deployment, maintenance, network infrastructure security, shared folders, data protection, and secrets for monitoring Features personalized notations, interior elements, highlighted areas, and other ways to help you quickly spot scenarios and solutions Windows Server 2008 R2 Secrets is like having your own, built-in Windows Server 2008 R2 expert on hand, who can help you avoid mistakes and save time!

Orin Thomas is a Microsoft Certified Information Technology Professional (MCITP), Microsoft MVP, author, systems administrator, and trainer who has written more than a dozen books related to Microsoft server and client technologies. He regularly speaks at events such as Microsoft's TechED.

Read This First xv Part I DEPLOYMENT AND ADMINISTRATION SECRETS 1 Chapter 1 Windows Server 2008 R2 Deployment Secrets 3 Choosing an Edition of Windows Server 2008 R2 4 Deciding Between Types of Installation 6 Optimizing Your Deployment Image 12 Minimizing Deployment Time 19 Activating Windows 27 Summary 30 Chapter 2 The Windows Server 2008 R2 Administrator's Toolkit 33 Choosing the Right Remote Administration Tool 34 Remote Desktop 35 Management Consoles 41 Remote PowerShell 45 Emergency Management Services (When All Else Fails) 46 Summary 49 Chapter 3 Server Core Secrets 51 Using Server Core Administration Tools 52 Performing Server Core Post-Deployment Tasks 54 Understanding the Sconfig.cmd 62 Administering with Server Core Configurator 63 Understanding Server Core Infrastructure Roles 67 Summary 72 Chapter 4 Active Directory Domains and Forests73 Understanding Forests and Domains 74 Setting Domain and Forest Functional Levels 79 Selecting the DNS Server 82 Defining Active Directory Sites 89 Defining FSMO Roles 91 Using Read-Only Domain Controllers 93 Securing with Global Catalog Servers and Universal Group Membership Caching 98 Maintaining the Active Directory Database 100 Summary 110 Chapter 5 Effectively Managing Group Policy 113 Applying Group Policy 114 Using Group Policy Management Console 117 Using Important Group Policy Features 122 Completing Common Group Policy Tasks 126 Summary 132 Chapter 6 Managing Users and Computers 135 Using Organizational Unit Structures 136 Managing User Accounts 140 Configuring Account Policies 147 Managing Groups 155 Creating Computer Accounts 161 Summary 163 Chapter 7 Managing Active Directory Certificate Services 165 Understanding Certification Authority Types 166 Managing Certification Authorities 171 Using Certificate Templates 175 Utilizing Certificate Autoenrollment 181 Recovering Certificates 183 Backing Up Certificate Services 184 Revoking Certificates 186 Summary 188 Part II Network Infrastructure and Security Secrets 191 Chapter 8 Network Addressing 193 Understanding IPv4 and DHCP 194 Understanding IPv6 205 Transitioning to IPv6 212 Summary 217 Chapter 9 Securing the Network: Windows Firewall and Network Access Protection 219 Understanding Windows Firewall with Advanced Security 220 Understanding Connection Security Rules 230 Understanding and Configuring Network Access Protection 236 Summary 244 Part III Shared Folde r and Data Protection Se rets 247 Chapter 10 Secrets Behind Shared Folders 249 Using the Share and Storage Management Console 250 Using File Server Resource Manager 255 Working with the Distributed File System 271 Utilizing BranchCache 275 Working with Offline Files 278 Summary 280 Chapter 11 Keeping Data Private 281 Encrypting File System 282 Encrypting with BitLocker 287 Using Active Directory Rights Management Services 296 Summary 300 Chapter 12 Backup and Recovery 303 Using and Configuring Windows Server Backup 304 Enabling Shadow Copies of Shared Folders 313 Performing Recovery 316 Using System Center Data Protection Manager 325 Summary 328 Part IV INFRASTRUCTURE SERVICES 329 Chapter 13 Internet Information Services 331 Managing Sites 332 Managing Application Pools 348 IIS Users and Delegation 351 Managing FTP 352 Summary 355 Chapter 14 Configuring Hyper-V Virtual Machines 357 Configuring Hyper-V 358 Understanding Virtual Hard Disks 363 Understanding Hyper-V Networks 369 Using Virtual Machine Snapshots 374 Migrating Virtual Machines 376 Summary 379 Chapter 15 Patch Management with WSUS 381 Defining an Update Process 382 Installing and Deploying WSUS 383 Deploying Updates 395 Understanding WSUS Topologies 401 Verifying Update Deployment 402 Going Further 407 Summary 409 Chapter 16 High Availability 411 Understanding Network Load Balancing 412 Allocating Storage to iSCSI SAN 417 Understanding Failover Clustering 422 Summary 431 Part V REMOTE ACCESS SECRETS 433 Chapter 17 Presentation and Application Virtualization 435 Understanding Remote Desktop Session Host 436 Running RemoteApp 444 Using Remote Desktop Web Access 446 Utilizing Remote Desktop Connection Broker 447 Connecting via Remote Desktop Gateway 448 Remote Desktop Licensing 450 Understanding Remote Desktop Virtualization Host 453 Virtualizing Applications with App-V 453 Summary 454 Chapter 18 Remote Access 457 Setting up Remote Desktop Gateway 458 Deploying Virtual Private Networks 468 Connecting via DirectAccess 478 Summary 482 Part VI Main ten ance and Moni toring Sec rets 483 Chapter 19 Getting the Most Out of Event Logs and Auditing 485 Auditing Windows Server 2008 R2 486 Filtering and Viewing Event Logs 492 Event Log Forwarding 497 Creating Event Viewer Tasks 499 Going Further with Operations Manager 504 Summary 505 Chapter 20 Performance and Resource Management 507 Monitoring Point-in-Time Performance 508 Understanding Data Collector Sets 514 Using Windows Server Resource Manager 521 Summary 525 Index 527

Erscheint lt. Verlag 3.11.2011
Reihe/Serie Secrets
Zusatzinfo Illustrations
Verlagsort Chichester
Sprache englisch
Maße 190 x 231 mm
Gewicht 964 g
Einbandart Paperback
Themenwelt Informatik Betriebssysteme / Server Windows
Informatik Betriebssysteme / Server Windows Server
Informatik Weitere Themen Hardware
ISBN-10 0-470-88658-7 / 0470886587
ISBN-13 978-0-470-88658-8 / 9780470886588
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Daten abfragen und verarbeiten mit Excel und Power BI

von Ignaz A. Schels

Buch (2023)
Hanser (Verlag)
49,99
Das umfassende Handbuch

von Peter Kloep; Karsten Weigel; Raphael Rojas; Kevin Momber …

Buch | Hardcover (2021)
Rheinwerk (Verlag)
69,90