Cover image for Windows Server 2012: Up and Running

Book description

If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows administrators will learn how to deploy, configure, and manage the server’s expanded capabilities and features step-by-step, using clear examples and numerous screen shots. You’ll also discover how to integrate employees’ private mobile devices into your corporate network.

Table of Contents

  1. Special Upgrade Offer
  2. Preface
    1. About This Book
    2. Audience
    3. Goals of This Book
    4. Contents of This Book
    5. Conventions Used in This Book
    6. Using Code Examples
    7. Comments and Questions
    8. Safari® Books Online
    9. Acknowledgments
  3. 1. Windows Server 2012: Overview
    1. Introducing Windows Server 2012
    2. New Capabilities and Updated Features
      1. Installation and Interface
      2. Management
      3. Windows PowerShell 3.0
      4. Storage
      5. Remote Access
      6. Networking
      7. Hyper-V 3.0
      8. IIS 8
      9. Security
      10. Clustering
    3. Requirements
    4. Summary
  4. 2. Windows Server 2012 Requirements and Installation
    1. Server 2012 Editions
      1. Server 2012 Datacenter
      2. Server 2012 Standard
      3. Server 2012 Essentials
      4. Server 2012 Foundation
    2. Server 2012 Requirements
      1. Hyper-V 3.0 Requirements
    3. Installing Server 2012
      1. Server Core Install
        1. Server Core installation procedures
      2. Server with a GUI Install
        1. Server with a GUI installation procedures
    4. Switching Between Install Modes
      1. Converting Server Core to Server with a GUI
      2. Converting Server with a GUI to Server Core
    5. Deploying Minimal Server Interface
    6. Customizing the Interface with Features on Demand
    7. Summary
  5. 3. Managing Server 2012
    1. Server 2012’s Interface
      1. Navigating the Tiled Interface
      2. Accessing and Running Management Tools
        1. Finding management apps
        2. Running as an administrator
        3. Launching the Microsoft Management Console
      3. Customizing the Interface
        1. Customizing the desktop
        2. Customizing the Start menu
    2. Logging Off, Restarting, and Shutting Down
    3. Performing Searches
    4. Server Manager
      1. Launching and Working with Server Manager
        1. Adding server roles and features
        2. Multiserver management and groups
        3. Adding legacy servers to Server Manager
    5. Managing Server 2012 Remotely
      1. Installing RSAT
    6. Summary
  6. 4. Active Directory
    1. Deploying Active Directory Domain Services
      1. Installing Active Directory
    2. Adding Machines to a Server 2012 Domain
      1. Joining Windows 7 to a Server 2012–Level Domain
      2. Joining Windows 8 to a Server 2012–Level Domain
      3. Joining Server 2012 to a Server 2008 R2–Level Domain
    3. Managing Active Directory
      1. Navigating ADAC
      2. AD Recycle Bin
      3. Performing Searches in ADAC
      4. Windows PowerShell History
    4. Using PowerShell to Deploy Active Directory
    5. Summary
  7. 5. Managing Users and Data with Dynamic Access Control
    1. The Building Blocks of DAC
    2. Requirements and Predeployment Pointers
    3. Deploying DAC
      1. Preparing Claims
      2. Configuring Resource Property for Files
      3. Adding a Resource Property to the Global Resource Property List
      4. Creating a New Central Access Rule
      5. Creating a Central Access Policy
      6. Publishing a Central Access Policy
      7. Configuring the File Server
      8. Adding the Central Access Policy to the Folder
      9. Validating the Configuration
    4. Access Denied Remediation
      1. Deploying Access Denied Remediation
        1. Group policy deployment
        2. File server deployment
    5. Auditing
    6. Automatic File Classification
    7. Encrypting Classified Data
    8. Summary
  8. 6. Storage Management and Clustering
    1. ReFS Versus NTFS
    2. Creating a Storage Space
    3. Clustering
      1. Installing Failover Clustering
      2. Creating a Cluster
      3. Cluster-Aware Updating
    4. Summary
  9. 7. Hyper-V
    1. Requirements
    2. Installing the Hyper-V Role
    3. Creating and Configuring Virtual Machines
      1. Configuring Virtual Disks
      2. Creating Virtual Machines
    4. Managing Virtual Machines and Virtual Disks
      1. Live-Migrating Virtual Machines
      2. Hyper-V Replica
      3. Cloning Virtual Domain Controllers
      4. Merging Snapshots
    5. Performance and Virtual Network Management
      1. Resource Metering
    6. Summary
  10. 8. Networking
    1. IPAM
      1. Installing IPAM
      2. Configuring IPAM
      3. Using IPAM
        1. IPAM features
        2. IPAM utilization
        3. DHCP and DNS management and monitoring through IPAM
        4. Auditing and events
    2. NIC Teaming
    3. Quality of Service
      1. QoS Policies
    4. Hyper-V Extensible Network Switch
      1. Configuring Private VLANs
    5. Summary
  11. 9. Remote Access
    1. Unified Remote Access
      1. Requirements
    2. DirectAccess
      1. Deploying DirectAccess
      2. Configuring DirectAccess
        1. Manual configuration
    3. BranchCache
      1. Requirements
      2. Deploying BranchCache
      3. Configuring the Windows Firewall
      4. Deploying the BranchCache Role via Server Manager
      5. Deploying the BranchCache Role with PowerShell
      6. Prepping and Testing Client Connectivity
    4. Virtual Desktop Infrastructure
      1. Remote Desktop Services (RDS)
      2. Remote Desktop Services Install
      3. Remote Desktop Services Management
      4. Associating Apps to a Collection and Publishing Remote Apps
      5. Adding Published Apps to the RD Web Folder
      6. Connecting Clients to Remote Apps
      7. Installing RemoteFX
    5. Summary
  12. 10. Troubleshooting, Securing, and Monitoring
    1. Server Manager
      1. Adding a Server
      2. Creating Server Groups
      3. The Alert Flag
      4. Best Practices Analyzer
    2. Windows PowerShell 3.0
    3. Security
      1. BitLocker
      2. Other Security Enhancements
    4. Summary
  13. Index
  14. About the Author
  15. Colophon
  16. Special Upgrade Offer
  17. Copyright