MCTS 70-642 Cert Guide
Pearson IT Certification
978-0-7897-4830-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Master Microsoft’s MCTS 70-642 exam topics
Assess your knowledge with chapter-ending quizzes
Review key concepts with exam preparation tasks
Practice with realistic exam questions on the CD
MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide is a best-of-breed exam study guide. Best-selling author and expert instructor Don Poulton shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.
The companion CD contains the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.
Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.
The study guide helps you master all the topics on the MCTS 70-642 exam, including
IPv4/IPv6 address configuration and troubleshooting
DHCP configuration, installation, management, and troubleshooting
Routing configuration, tables, RRAS, management, and maintenance
Windows Firewall, Advanced Security, and IPsec
DNS installation, configuration, zones, replication, and records
Client name resolution
File services, shared folders, permissions, and encryption
DFS, namespaces, and replication
Backup/restore
File Server Resource Manager (FSRM)
Print services
Remote Access, VPNs, and NAT
Companion CD
The CD contains two free, complete practice exams. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test.
Pearson IT Certification Practice Test minimum system requirements:
Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB hard disk space plus 50 MB for each downloaded practice exam.
Don Poulton (A+, Network+, Security+, MCSA, MCSE) is an independent consultant who has been involved with computers since the days of 80-column punch cards. After a career of more than 20 years in environmental science, Don switched careers and trained as a Windows NT 4.0 MCSE. He has been involved in consulting with a couple of small training providers as a technical writer, during which time he wrote training and exam-prep materials for Windows NT 4.0, Windows 2000, and Windows XP. Don has written or contributed to several titles, including Security+ Lab Manual (Que, 2004), MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) (Que, 2004), MCSE 70-294 Exam Prep: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Que, 2006), MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring (Que, 2008), MCTS 70-680 Exam Prep: Microsoft Windows 7, Configuring (Que, 2011) , and MCTS 70-640 Exam Prep: Microsoft Windows Server 2008 Active Directory, Configuring (Que, 2011). In addition, Don has worked on programming projects, both in his days as an environmental scientist and, more recently, with Visual Basic to update an older statistical package used for multivariate analysis of sediment contaminants. When not working on computers, Don is an avid amateur photographer who has had his photos displayed in international competitions and published in magazines such as Michigan Natural Resources Magazine and National Geographic Traveler . Don also enjoys traveling and keeping fit. Don lives in Burlington, Ontario, with his wife, Terry.
Introduction 3
Chapter 1 Configuring IPv4 and IPv6 Addressing 27
“Do I Know This Already?” Quiz 28
Concepts of TCP/IP 33
TCP/IP History in Brief 33
TCP/IP Protocol Stack 34
OSI Reference Model 34
Four-Layer TCP/IP Model 35
Application Layer 36
Transport Layer 36
Internet Layer 37
Network Interface Layer 37
TCP/IP Component Protocols 38
Transmission Control Protocol 38
User Datagram Protocol 38
Internet Protocol 39
Address Resolution Protocol 39
Internet Control Message Protocol 39
Internet Group Management Protocol 40
Application Layer Protocols 40
IPv4 Addressing 41
Static IPv4 Addressing 42
Subnetting and Supernetting in IPv4 44
Using Subnetting to Divide a Network 44
Using Supernetting to Provide for Additional Hosts on a Network 47
Understanding Private IPv4 Networks 48
Dynamic IP Addressing 48
Configuring IPv4 Address Options 48
Using the Command Line to Configure IPv4 Addressing Options 52
IPv6 Addressing 54
IPv6 Address Syntax 56
IPv6 Prefixes 56
Types of IPv6 Addresses 56
Connecting to a TCP/IP Version 6 Network 59
Interoperability Between IPv4 and IPv6 Addresses 62
Compatibility Addresses 63
ISATAP Addresses 63
6to4 Addresses 64
Teredo Addresses 65
Using Group Policy to Configure IPv6 Transition Technologies 66
Resolving IPv4 and IPv6 Network Connectivity Issues 67
Windows Server 2008 Network Diagnostics Tools 68
Using TCP/IP Utilities to Troubleshoot TCP/IP 70
ARP 70
FTP 70
ipconfig 71
Nbtstat 72
Netstat 72
Nslookup 73
ping 73
tracert 74
pathping 75
Troubleshooting IPv4 and IPv6 Problems 75
Suggested Response to a Connectivity Problem 75
Network Discovery 76
Incorrect IPv4 Address or Subnet Mask 77
Incorrect Default Gateway 78
Unable to Connect to a DHCP Server 78
Duplicate IP Address 78
Unable to Configure an Alternate TCP/IPv4 Configuration 78
Using Event Viewer to Check Network Problems 79
Additional Troubleshooting Hints When Using IPv6 79
Review All the Key Topics 80
Complete the Tables and Lists from Memory 81
Definition of Key Terms 81
Chapter 2 Configuring Dynamic Host Configuration Protocol (DHCP) 83
“Do I Know This Already?” Quiz 83
How DHCP Works 89
Four-Phase DHCP IPv4 Leasing Process 89
IP Lease Request (DHCPDISCOVER) 90
IP Lease Offer (DHCPOFFER) 91
IP Lease Selection (DHCPREQUEST) 91
IP Lease Acknowledgment (DHCPACK) 92
Renewing an IPv4 Lease 92
How DHCPv6 Works 93
Installing and Configuring a DHCP Server 95
Using the Command Line to Install DHCP 100
DHCP Scopes and Options 101
Creating DHCP Scopes 101
Using the Command Line to Create Scopes 104
Superscopes 104
Multicast Scopes 105
Split Scopes 106
Exclusions 107
Configuring DHCP Scope Properties 107
Configuring DHCP Options 108
Server Options 110
Scope Options 111
Option Classes 112
Client Reservations and Options 114
Managing and Troubleshooting a DHCP Server 116
Authorizing a DHCP Server in Active Directory 116
Configuring DHCP Relay Agents 117
PXE Boot 120
Monitoring and Troubleshooting a DHCP Server 121
Review All the Key Topics 124
Complete the Tables and Lists from Memory 1 25
Definition of Key Terms 125
Chapter 3 Configuring Routing 127
“Do I Know This Already?” Quiz 127
The Need for Routing and Routing Tables 132
Routing Protocols 133
Routing Table 135
Routing and Remote Access Service (RRAS) in Windows Server 2008 R2 137
Configuring RRAS as a Router 140
Configuring RIP 142
Configuring Static Routing 145
Using the RRAS Snap-In to Create a Static Route 145
Using the route Command to Create a Static Route 146
Choosing a Default Gateway 147
Displaying the Static Routing Table 147
Managing and Maintaining Routing Servers 148
Demand-Dial Routing 148
Establishing a Demand-Dial Interface 148
Configuring Demand-Dial Interface Properties 150
Specifying Packet Filtering 151
IGMP Proxy 153
Review All the Key Topics 156
Complete the Tables and Lists from Memory 157
Definition of Key Terms 157
Chapter 4 Configuring Windows Firewall with Advanced Security 159
“Do I Know This Already?” Quiz 159
Configuring Windows Firewall 165
Basic Windows Firewall Configuration 167
Using the Windows Firewall with Advanced Security Snap-In 172
Configuring Multiple Firewall Profiles 174
Configuring New Firewall Rules 176
Configuring Inbound Rules or Outbound Rules 176
Configuring Connection Security Rules 180
Configuring Rule Properties 184
Authorizing Users and Computers 185
Modifying Rule Scope 187
Additional Rule Properties 188
Configuring Notifications 189
Importing and Exporting Policies 190
Using IPSec to Secure Network Communications 191
IPSec Modes 191
IPSec Encryption 193
Using Group Policy to Create IPSec Policies 194
Using Group Policy to Configure Windows Firewall Policies 198
Creating Windows Firewall with Advanced Security Policies 198
Windows Firewall Group Policy Property Settings 200
Isolation Policies 201
Review All the Key Topics 202
Definition of Key Terms 203
Chapter 5 Installing and Configuring Domain Name System (DNS) 205
“Do I Know This Already?” Quiz 206
Introduction to DNS 210
Hierarchical Nature of DNS 211
Root-Level Domains 212
Top-Level Domains 212
Second-Level Domain Names 214
Host Names 214
DNS Name Resolution Process 215
Recursive Queries 215
Iterative Queries 216
Reverse Lookup Queries 217
Installing DNS in Windows Server 2008 R2 218
Using the Command Line to Install DNS 221
Using the Command-Line for DNS Server Administration 222
Configuring DNS Server Properties 223
Interfaces Tab 223
Forwarders Tab 224
Conditional Forwarders 227
Advanced Tab 228
Server Options 229
Disable Recursion 229
Name Checking 230
Loading Zone Data 231
Root Hints Tab 231
Debug Logging Tab 233
Event Logging Tab 235
Trust Anchors Tab 235
Monitoring Tab 237
DNS Socket Pooling 238
DNS Cache Locking 239
Review All the Key Topics 241
Definition of Key Terms 241
Chapter 6 Configuring DNS Zones and Replication 243
“Do I Know This Already?” Quiz 243
Zone Types and Their Uses 249
DNS Zone Types 249
Primary Zones 249
Secondary Zones 250
Active Directory–Integrated Zones 250
Stub Zones 251
Forward and Reverse Lookup Zones 251
GlobalNames Zones 252
DNS Name Server Roles 253
Primary Name Servers 253
Secondary Name Servers 254
Caching-Only Servers 255
Forwarders 255
Slave Servers 256
Configuring DNS Zones 257
Creating New DNS Zones 257
Creating a Reverse Lookup Zone 259
Creating Secondary Zones 261
Creating Stub Zones 262
Creating a GlobalNames Zone 262
Configuring DNS Zone Properties 263
Configuring Zone Types 264
Adding Authoritative DNS Servers to a Zone 265
Dynamic DNS, Non-Dynamic DNS, and Secure Dynamic DNS 266
Zone Scavenging 267
Integrating DNS with WINS 269
Subdomains and Zone Delegation 270
Configuring DNS Zone Transfers and Replication 274
Active Directory DNS Replication 274
Application Directory Partitions 274
Replication Scope 275
Types of Zone Transfers 277
Full Zone Transfer 277
Incremental Zone Transfer 278
Configuring Zone Transfers 279
Configuring DNS Notify 281
Secure Zone Transfers 282
Auditing of DNS Replication 283
Troubleshooting DNS Zones and Replication 287
Using the ipconfig, ping, and nslookup Commands 288
Use of the DNSLint Tool 290
Review All the Key Topics 291
Complete the Tables and Lists from Memory 292
Definition of Key Terms 292
Chapter 7 Configuring DNS Records 295
“Do I Know This Already?” Quiz 295
Resource Record Types and Their Uses 299
Creating New Resource Records 300
New Host (A or AAAA) Records 301
New Alias (CNAME) Records 302
New Mail Exchanger (MX) Records 303
Additional New Resource Records 304
Using the Command Line to Create Resource Records 307
Configuring Resource Record Properties 308
Configuring SOA Resource Record Properties 309
Time to Live 311
Configuring Name Server Resource Record Properties 311
Registering Resource Records 314
Using the DnsUpdateProxy Group 314
Configuring Round Robin 316
Enabling Netmask Ordering 317
Configuring DNS Record Security and Auditing 317
Review All the Key Topics 319
Complete the Tables and Lists from Memory 319
Definition of Key Terms 319
Chapter 8 Configuring Client Computer Name Resolution 321
“Do I Know This Already?” Quiz 321
Configuring DNS Client Computer Settings 326
Specifying DNS Server Lists 326
Configuring DNS Suffix Search Order Lists 328
Configuring a Client Computer’s Primary DNS Suffix 330
Using Group Policy to Configure DNS Client Settings 331
Using the ipconfig Command to Update and Register
DNS Records 334
Using the dnscmd Command to Update the DNS Server
Cache 334
Other Types of Name Resolution 335
HOSTS Files 335
NetBIOS Name Resolution 337
NetBIOS Broadcasts 337
LMHOSTS Files 339
WINS Servers 340
Troubleshooting NetBIOS Problems 344
Link Local Multicast Name Resolution 345
Review All the Key Topics 348
Complete the Tables and Lists from Memory 349
Definition of Key Terms 349
Chapter 9 Configuring File Servers 351
“Do I Know This Already?” Quiz 351
Shared Folders in Windows Server 2008 R2 358
Understanding the File Services Role in Windows Server 2008 R2 358
Using the Network and Sharing Center to Configure File Sharing 360
Sharing Files, Folders, and Printers 362
Modifying Shared Folder Properties 363
Mapping a Drive 367
Using the net share Command to Manage Shared Folders 368
NTFS Permissions 369
NTFS File and Folder Permissions 369
Applying NTFS Permissions 371
Specifying Advanced Permissions 373
Configuring NTFS Permissions Inheritance 376
Taking Ownership of Files and Folders 377
Effective Permissions 379
Viewing a User’s Effective Permissions 380
Copying and Moving Files and Folders 381
Copying Files and Folders with NTFS Permissions 381
Moving Files and Folders with NTFS Permissions 382
Using the Mouse to Copy or Move Objects from One Location to Another 383
Practical Guidelines on Sharing and Securing Folders 383
Data Encryption 384
Encrypting File System 384
Encrypting File System Basics 385
Preparing a Disk for EFS 386
Encrypting Files 387
Backing Up EFS Keys 389
Decrypting Files 391
EFS Recovery Agents 392
EFS Group Policies 393
BitLocker Drive Encryption 395
Preparing Your Computer to Use BitLocker 397
Enabling BitLocker 397
Managing BitLocker 402
Configuring BitLocker Group Policies 403
Using Data Recovery Agents 405
Additional File Server Management Resources 408
Using Offline Files 408
Configuring Servers for Offline Files 409
Configuring Client Computers 411
Configuring Offline File Policies 411
Configuring Transparent Caching of Offline Files 413
Configuring BranchCache 414
Using the netsh Command to Configure BranchCache 415
Using Group Policy to Enable BranchCache 417
Specifying BranchCache Firewall Rules 418
Understanding BranchCache Network Infrastructure Requirements 419
Using BranchCache across a Virtual Private Network 419
Managing Certificates with BranchCache 420
Using Share and Storage Management Console 421
Using Share and Storage Management to Provision Shared Resources and Volumes 422
Using Share and Storage Management to Manage Shared Resources 425
Review All the Key Topics 426
Complete the Tables and Lists from Memory 427
Definition of Key Terms 427
Chapter 10 Configuring Distributed File System (DFS) 429
“Do I Know This Already?” Quiz 429
DFS Concepts 433
Improvements to DFS in Windows Server 2008 R2 434
Installing DFS on a Windows Server 2008 R2 Computer 435
Managing DFS Namespaces 438
Creating Additional DFS Namespaces 438
Managing Namespaces 439
Adding Folders to DFS Namespaces 440
Adding Namespace Servers 441
Configuring Referrals 441
Enabling Access-Based Enumeration of a DFS Namespace 443
Configuring Polling of Domain Controllers 444
Managing DFS Replication 445
Setting Up DFS Replication 447
Replication Topologies 449
Working with Replication Groups 450
Adding New Connections 450
Adding Replicated Folders 451
Designating Read-Only Replicated Folders 451
Adding Members to Replication Groups 451
Sharing or Publishing Replicated Folders 451
Configuring Failover Cluster Support 452
Generating Replication Health Reports 454
Review All the Key Topics 456
Complete the Tables and Lists from Memory 457
Definition of Key Terms 457
Chapter 11 Configuring Backup and Restore 459
“Do I Know This Already?” Quiz 459
Protecting Data with Windows Backup 464
Backup Permissions 466
Installing Windows Server Backup 466
Backing Up Your File Server 467
Performing a Bare Metal Backup 472
Scheduling a Backup 472
Using the wbadmin Command 474
Restoring the Backup Catalog 475
Managing Backups Remotely 476
Volume Shadow Copies 477
Using Windows Explorer to Manage Shadow Copies 478
Using the Command Line to Manage Shadow Copies 480
Using Volume Shadow Copies to Recover a File or Folder 480
Restoring Data from Backup 482
Using Windows Backup to Recover Data 482
Restoring User Profiles 485
Recovering System State 486
Performing a Full Server or Bare Metal Recovery of a Windows Server 2008 R2 Computer 488
Using the wbadmin Command to Recover Your Server 491
Review All the Key Topics 492
Complete the Tables and Lists from Memory 493
Definition of Key Terms 493
Chapter 12 Managing File Server Resources 495
“Do I Know This Already?” Quiz 495
File Server Resource Manager 500
Installing FSRM 501
Managing File Screening 501
Using File Groups 502
Creating File Screens and Templates 503
Creating File Screen Exceptions 506
Monitoring File Screening 506
Managing Storage Reports 506
Specifying Report Parameters 507
Additional FSRM Options 508
Scheduling Report Generation 509
Managing File Classification 511
Configuring File-Management Tasks 514
Configuring Disk and Volume Quotas 516
Using Windows Explorer to Enable Disk Quotas 516
Using FSRM to Enable Quotas 519
Using FSRM to Create Quota Templates 520
Some Guidelines for Using Quotas 522
Storage Manager for SANs 523
Review All the Key Topics 527
Complete the Tables and Lists from Memory 528
Definition of Key Terms 528
Chapter 13 Configuring and Monitoring Print Services 531
“Do I Know This Already?” Quiz 531
Printing Terminology in Windows Server 2008 R2 537
Printing Process 538
Installing, Sharing, and Publishing Printers 539
Installing the Print and Document Services Role 540
Installing Printers 541
Using Control Panel to Install a Printer 542
Using the Print Management Console to Install a Printer 544
Sharing Printers 545
Publishing Printers in Active Directory 546
Using Group Policy to Deploy Printer Connections 548
Managing and Troubleshooting Printers 549
Using the Printer Properties Dialog box 549
General Tab 549
Ports Tab and Printer Pooling 549
Advanced Tab 551
Security Tab and Printer Permissions 553
Migrating Print Queues and Printer Settings 556
Isolating Printer Drivers 557
Configuring Location-Aware Printer Settings 558
Delegating Print Management 559
Troubleshooting Printer Problems 561
Some Common Problems 561
Printer Port Problems 562
Enabling Notifications 562
Review All the Key Topics 564
Complete the Tables and Lists from Memory 565
Definition of Key Terms 565
Chapter 14 Configuring Remote Access 567
“Do I Know This Already?” Quiz 567
Remote Access Protocols 573
Remote Access Authentication Protocols 574
New Features of RRAS in Windows Server 2008 576
Configuring Dial-Up Connections 577
Configuring a RAS Server for Dial-Up 577
Configuring Dial-Up RAS Server Properties 579
Enabling Modems used by the Dial-Up RAS Server 581
Configuring Windows Server 2008 as a RAS Client 583
Network Address Translation 584
Enabling the NAT Server for DHCP 586
Enabling Addresses, Services, and Ports on the NAT Server 588
Configuring Internet Connection Sharing 589
Virtual Private Networking 590
How VPNs Function 591
VPN Encapsulation 591
Authentication 591
Data Encryption 592
Configuring a RRAS Server for VPN 592
Creating and Authenticating VPN Connections 594
Configuring VPN Connection Security 596
Enabling VPN Reconnect 598
Configuring Advanced Security Auditing 599
Using Remote Access Policies 601
Configuring VPN Packet Filters 601
Connection Manager 603
Installing the Connection Manager Administration Kit 605
Using Connection Manager Administration Kit to Create a Profile 605
Using the Connection Manager Client Interface 610
Review All the Key Topics 612
Complete the Tables and Lists from Memory 613
Definition of Key Terms 613
Chapter 15 Configuring Network Policy Server (NPS) 615
“Do I Know This Already?” Quiz 615
Wireless Networking Protocols and Standards 619
Wireless Networking Standards 620
Planning the Authentication Methods for a Wireless Network 621
Planning the Encryption Methods for a Wireless Network 622
Wired Equivalent Privacy 622
802.1X 622
Use of IPSec with Wireless Networks 623
The IEEE 802.3 Wired Standard 623
Planning and Configuring Wireless Access Policies 623
Creating a Wireless Access Policy for Windows Vista/7 Clients 624
Creating a Wireless Access Policy for Windows XP Clients 628
Configuring IEEE 802.3 Wired Access Policies 630
RADIUS in Windows Server 2008 R2 633
Installing NPS on a Windows Server 2008 RRAS Server 634
Configuring the NPS Server for Wireless Access 635
Configuring New RADIUS Clients 638
Creating RADIUS Proxies and Proxy Groups 639
Creating Connection Request Policies 641
Configuring RADIUS Accounting 644
Configuring NPS Templates 647
Review All the Key Topics 649
Complete the Tables and Lists from Memory 650
Definition of Key Terms 650
Chapter 16 Configuring Network Access Protection (NAP) 653
“Do I Know This Already?” Quiz 653
Concepts of NAP 658
Components of a Typical NAP Deployment 660
What’s New with NAP in Windows Server 2008 R2 662
NAP Enforcement 663
DHCP Enforcement 663
Enabling NAP on the DHCP Server’s Scopes 667
VPN Enforcement 668
IPSec Enforcement 670
Installing and Configuring an HRA Server 671
Configuring NAP for IPSec Enforcement 674
Configuring the HRA for Health Certificates 674
Using Group Policy to Specify IPSec Enforcement 675
802.1X Enforcement 676
RDS Enforcement 678
System Health Validation 680
Configuring the Windows Security Health Validator 681
Configuring Error Codes 683
Using Multi-Configuration SHV 683
Configuring NAP Policies 684
Review All the Key Topics 689
Definition of Key Terms 690
Chapter 17 Configuring DirectAccess 693
“Do I Know This Already?” Quiz 693
Concepts of DirectAccess 698
DirectAccess Server Requirements 700
Using IPv6 with DirectAccess 701
Using Network Access Protection 701
DirectAccess Client Requirements 702
DirectAccess Connection Process 702
Configuring the DirectAccess Server 703
Installing and Configuring the DirectAccess Server Feature 703
DirectAccess and the Perimeter Network 707
Configuring Authentication 708
Group Policy and DirectAccess 708
Using Group Policy to Configure DirectAccess Clients 708
Name Resolution Policy Table 710
Using NRPT Exemptions 714
Review All the Key Topics 716
Complete the Tables and Lists from Memory 716
Definitions of Key Terms 716
Chapter 18 Windows Server Update Services (WSUS) Server Settings 719
“Do I Know This Already?” Quiz 719
Concepts of WSUS 724
Purposes of Windows Update and WSUS 724
New Features of WSUS 3.0 725
Installing and Configuring a WSUS Server 727
Installing WSUS on a Windows Server 2008 R2 Computer 728
Installing Microsoft Report Viewer Redistributable 2008 731
Getting Started with WSUS 731
Configuring WSUS Options 733
Testing Updates 738
Using Computer Groups 738
Configuring Client-Side Targeting 741
Approving Updates 742
Declining Updates 744
Viewing Reports 745
Using WSUS on a Disconnected Network 747
Configuring Client Computers for WSUS 748
Review All the Key Topics 754
Complete the Tables and Lists from Memory 755
Definition of Key Terms 755
Chapter 19 Configuring Performance Monitoring 757
“Do I Know This Already?” Quiz 757
Performance Monitor 762
Using Performance Monitor to Collect Real-Time Data 764
Customizing Performance Monitor 766
Permissions Required to Run Performance Monitor 767
Data Collector Sets 768
System-Defined Data Collector Sets 768
Using System-Defined Data Collector Sets 769
Viewing Logged Performance Data 771
User-Defined Data Collector Sets 771
Creating a Custom Data Collector Set 774
Using Performance Monitor to Create a Data Collector Set 776
A Few Best Practices for Logging Server Performance 777
Command-Line Utilities 779
Monitoring Print Servers 779
Analyzing Performance Data 780
Optimizing and Troubleshooting Memory Performance 781
Optimizing and Troubleshooting Processor Utilization 783
Optimizing and Troubleshooting Disk Performance 784
Optimizing and Troubleshooting Network Performance 786
Reliability Monitor 787
Resource Monitor 789
Review All the Key Topics 792
Complete the Tables and Lists from Memory 793
Definition of Key Terms 793
Chapter 20 Configuring Event Logs 795
“Do I Know This Already?” Quiz 795
Event Viewer 799
Viewing Logs in Event Viewer 800
Event Log Properties 802
Applications and Services Logs 804
Customizing Event Logs 805
Creating and Using Custom Views 807
Exporting and Importing Custom Views 808
Configuring Event Log Subscriptions 809
Configuring the Source Computers to Forward Events 810
Configuring the Collector Computer to Forward Receive Events 810
Configuring Event Log Subscriptions 811
Configuring Tasks from Events 814
Review All the Key Topics 816
Complete the Tables and Lists from Memory 817
Definitions of Key Terms 817
Chapter 21 Collecting Network Data 819
“Do I Know This Already?” Quiz 819
Simple Network Management Protocol 824
How SNMP Functions 824
Management Information Base 824
SNMP Messages 825
SNMP Communities 826
How SNMP Functions 827
Installing and Configuring SNMP 828
Network Monitor 833
Concepts of Protocol Analyzers 833
Placement of Protocol Analyzers 834
Installing and Running Microsoft Network Monitor 835
Using Network Monitor to Capture Network Data 837
Filtering Captured Network Data 839
Using a Capture Filter 841
Configuring Network Monitor Options 842
Using Aliases 844
Performing a Capture from the Command Prompt 845
Connection Security Rules Monitoring 846
Configuring Authentication Properties 848
Review All the Key Topics 850
Complete the Tables and Lists from Memory 851
Definitions of Key Terms 851
Practice Exam 853
Answers to Practice Exam 921
APPENDIX A Answers to the “Do I Know This Already?” Quizzes 961
CD-only Elements:
APPENDIX B Memory Tables 2
APPENDIX C Memory Tables Answer Key 2
Glossary 2
TOC, 9780789748300, 1/17/2012
Erscheint lt. Verlag | 1.3.2012 |
---|---|
Verlagsort | Upper Saddle River |
Sprache | englisch |
Maße | 196 x 236 mm |
Gewicht | 1904 g |
Themenwelt | Informatik ► Betriebssysteme / Server ► Windows |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 0-7897-4830-4 / 0789748304 |
ISBN-13 | 978-0-7897-4830-0 / 9780789748300 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |