Book description
This version of the Server Bible will be the largest yet, catering to what is certainly the most advanced operating system introduced by Microsoft. The book will cater to the needs of the server administration community and will be designed to be a critical reference. The book will extensively cover the most notable new feature of Windows Server known as the "Server Core." Server Core is a significantly scaled-back installation where no graphical shell (explorer.exe) is installed, and all configuration and maintenance is done entirely through the command-line windows, or by connecting to the machine remotely using Microsoft Management Console. Server Core will also not include the .NET Framework, Internet Explorer or many other features not related to core server features. A Server Core machine can be configured for four basic roles: Domain controller, DNS Server, DHCP Server, and file server. Chapters on setup and installation will also cover the new componentized operating system Image-based setup and deployment tools, using WIM.
In addition to the already extensive Active Directory support this book will now fully cover the "Read-Only Domain Controller" operation mode in Active Directory, intended for use in branch office scenarios where a domain controller may reside in a low physical security environment, was introduced in Windows Server 2003 R2 and will be extended in the 2008 version. Chapters covering policy-based networking, branch management and enhanced end user collaboration will be extended. Windows Server 2008 will also ship Internet Information Services 7 and the current chapters on IIS will thus be extended. Coverage of Windows SharePoint Services 3.0 will also be introduced into this part of the book. We will also include coverage of the improved hot patching technology, which is a feature that allows non-kernel patches to occur without the need for a reboot.
A significantly upgraded Terminal Services component, supporting RDP 6.0. will be covered in the chapter on terminal services. The most notable improvement is the ability to share a single application over a Remote Desktop connection, instead of the entire desktop. This will be added to an already extended chapter on this remote access technology. In addition to these new features the book will also carry over existing features brought over from (SP1/R2) of Server 2003. These include covering of new security features of the operating system, Group Policy management, change control and service level, and administration practices.
Table of contents
- Copyright
- About the Author
- Credits
- Acknowledgments
- Introduction
-
I. Windows Server 2008, Core, Configuration, Networking, and Communication Services
-
1. Installing Windows Server 2008
- 1.1. It's All About the Core
-
1.2. Installation and Configuration Strategy
- 1.2.1. Getting psyched up about installing
-
1.2.2. Server recipes
- 1.2.2.1. Server Core or bare-bones system recipe
- 1.2.2.2. Small file and print server recipe
- 1.2.2.3. Application-server installation recipe
- 1.2.2.4. Terminal Services installation recipe
- 1.2.2.5. Line-of-business role-server installation recipe
- 1.2.2.6. High-road, or mission-critical recipe
- 1.2.2.7. Redundant or standby system recipe
- 1.2.2.8. Large systems, clusters, and Datacenter Server installations
- 1.3. Overview of Hardware
- 1.4. Installing Windows Server 2008
- 1.5. Roles, Features, and Applications
- 1.6. Windows Server 2008 as a Communications Server and Microsoft Exchange
- 1.7. System Monitoring Using Windows Management Instrumentation
- 1.8. Windows Server 2008 for Database Services with SQL Server
- 1.9. Windows Server 2008 for IIS and ASP.NET
- 1.10. Windows Server 2008 for Application Services
- 1.11. Windows Server 2008 for Resolutions Services
- 1.12. Summary
-
2. Configuring Windows Server 2008
- 2.1. Using the Microsoft Management Console
- 2.2. Windows Firewall Changes for MMC Tools
-
2.3. Getting to Know the MMC Tools
- 2.3.1. Certification Authority
- 2.3.2. Failover Cluster Management
- 2.3.3. Component Services
- 2.3.4. Computer Management
- 2.3.5. Event Viewer
- 2.3.6. Reliability and Performance
- 2.3.7. Shared Folders
- 2.3.8. Using Event Viewer
- 2.3.9. Server extensions
- 2.4. Using the Security Configuration Wizard
- 2.5. Working with Data Sources (ODBC)
-
2.6. Understanding Control Panel Applets
- 2.6.1. Ease of Access applet
- 2.6.2. Add Hardware applet
- 2.6.3. Default Programs applet
- 2.6.4. Administrative Tools applet
- 2.6.5. Windows Update
- 2.6.6. Date and Time applet
- 2.6.7. Display object . . . Personalization
- 2.6.8. Folder Options applet
- 2.6.9. Internet Options applet
- 2.6.10. Network and Sharing Center applet
- 2.6.11. Power Options applet
- 2.6.12. Printers Control Panel applet
- 2.6.13. System applet
- 2.7. Windows PowerShell
- 2.8. Summary
-
3. Networking Windows Server 2008
- 3.1. TCP/IP on Windows Server 2008
- 3.2. TCP/IP Basics (IPv4)
- 3.3. Setting Up TCP/IP
- 3.4. Understanding and Using IPv6
- 3.5. Troubleshooting TCP/IP
- 3.6. SNMP
- 3.7. Windows Firewall Configuration and Management
- 3.8. Summary
-
4. DHCP
- 4.1. Overview of DHCP
- 4.2. The Windows Server DHCP Service
- 4.3. Installing and Configuring the DHCP Server
- 4.4. Defining and Implementing User and Vendor Classes
- 4.5. Creating and Using Superscopes
- 4.6. Creating Multicast Scopes
- 4.7. Configuring Global DHCP Server Properties
- 4.8. Managing the DHCP Database
- 4.9. Configuring Windows DHCP Clients
- 4.10. Network Access Protection
- 4.11. Summary
-
5. Windows Name Services
- 5.1. Overview of the Domain Name Service
- 5.2. Microsoft Domain Name Services
- 5.3. Managing DNS Server Options and Behavior
- 5.4. Configuring Subdomains and Delegation
- 5.5. DNS and Active Directory
- 5.6. Dynamic DNS
- 5.7. Windows Internet Name Service (WINS)
- 5.8. How WINS Works
- 5.9. WINS Forever
- 5.10. WINS Installation and Configuration
- 5.11. Configuring Windows Clients for DNS and WINS
- 5.12. Using Hosts and LMHOSTS Files for Name Resolution
- 5.13. Summary
-
6. Routing and Remote Access
- 6.1. Windows Server 2008 RAS and Telephony Services
- 6.2. RAS Connection Types and Protocols
- 6.3. Enabling and Configuring RRAS
-
6.4. IP Routing
- 6.4.1. IP routing overview
- 6.4.2. Routing with RRAS
- 6.4.3. Configuring a basic router
- 6.4.4. Dynamic routing
- 6.4.5. Adding and configuring RIP
- 6.4.6. DHCP relay agent
- 6.4.7. IGMP – multicast forwarding
- 6.4.8. Network address translation
- 6.4.9. Configuring NAT
- 6.5. Configuring Services and Ports
- 6.6. Configuring RAS for Inbound Connections
- 6.7. Configuring a VPN Server
- 6.8. Using Multilink and BAP
- 6.9. Policy Server
- 6.10. Using RADIUS
- 6.11. Configuring Outgoing Dial-Up Networking Connections
- 6.12. Summary
-
7. Backup and Restore
- 7.1. Why Back Up Data?
- 7.2. What to Back Up
- 7.3. Understanding Backup
- 7.4. Removable Storage and Media Pools
- 7.5. Establishing Quality of Support Baselines for Data Backup/Restore
- 7.6. Establishing Quality of Capture
- 7.7. Backup Procedure
- 7.8. Performing a Backup
- 7.9. Rotation Schemes
- 7.10. Restoring Data
- 7.11. Tape Location
- 7.12. Backup Bandwidth
- 7.13. Working with Shadow Copies
- 7.14. Summary
-
8. Disaster Recovery
- 8.1. Disaster Recovery Planning
- 8.2. Identifying Resources
- 8.3. Developing Response Plans
- 8.4. Testing Response Plans
- 8.5. Mock Disaster Programs
- 8.6. Identifying the Weak Links
- 8.7. Recovery from Backup
- 8.8. Mirrored Services, Data, and Hardware
- 8.9. Recovery of Key Services
- 8.10. Crash Analysis
- 8.11. Summary
- 9. The Registry
- 10. Auditing Windows Server 2008
- 11. .NET Framework Services
-
1. Installing Windows Server 2008
-
II. File, Print, and Storage Services
-
12. Print Services
- 12.1. Print Services
-
12.2. Understanding Windows Server Printer Services
-
12.2.1. Printer services: the logical environment
- 12.2.1.1. Print routers
- 12.2.1.2. Printer drivers
- 12.2.1.3. The spooler service stack
- 12.2.1.4. Spooler output files
- 12.2.1.5. Print queues
- 12.2.1.6. The print processor
- 12.2.1.7. Ports
- 12.2.1.8. Print monitors
- 12.2.1.9. Local print monitor
- 12.2.1.10. LPR print monitor (TCP/IP printing)
- 12.2.1.11. Standard TCP/IP print monitor
- 12.2.1.12. Third-party print monitors
- 12.2.2. Printer services: the physical environment
-
12.2.1. Printer services: the logical environment
- 12.3. Print Services Strategy
- 12.4. Installing and Setting Up Printers
- 12.5. Publishing Printers
- 12.6. Printer Administration
- 12.7. Troubleshooting
- 12.8. Auditing Printer Usage and Management
- 12.9. Summary
-
13. Storage Management
- 13.1. Overview of Storage
- 13.2. Storage Management
- 13.3. Disk Management
- 13.4. Partition Styles
- 13.5. Removable Storage
- 13.6. Remote Storage and HSM
- 13.7. The Disk Management Snap-in
- 13.8. Basic Storage
- 13.9. Dynamic Volumes and Fault Tolerance
- 13.10. Hardware RAID
-
13.11. Dynamic Storage Management
- 13.11.1. Converting basic disks to dynamic
- 13.11.2. Creating simple volumes
- 13.11.3. Extending simple volumes and spanned volumes
- 13.11.4. Creating and managing RAID-0 volumes (striping)
- 13.11.5. Creating and managing RAID-1 volumes
- 13.11.6. Creating and managing RAID-5 volumes
- 13.11.7. Importing disks
- 13.12. Managing Storage with Disk Quotas
- 13.13. Troubleshooting
- 13.14. Storage Explorer
- 13.15. Summary
-
14. Windows Server 2008 File Systems
- 14.1. An Overview of Disk Structure
- 14.2. FAT16 and FAT32
- 14.3. NTFS
- 14.4. Choosing a File System
- 14.5. Optimizing Storage Capacity
- 14.6. Managing the Distributed File System
- 14.7. Working with Mounted Volumes
- 14.8. Services for Network File System
- 14.9. Summary
-
15. Sharing and Securing Files and Folders
- 15.1. Sharing and Securing Your Data
- 15.2. Ownership
- 15.3. Configuring the File Server Role
- 15.4. Publishing Shares in Active Directory
- 15.5. Creating a Share
- 15.6. Share Attributes
- 15.7. Administrative Shares
- 15.8. Commonsense Strategies for Sharing Folders
- 15.9. Offline Access (Caching)
- 15.10. Securing Files and Folders by Using Permissions
- 15.11. Permission Types
- 15.12. Permissions Attributes
- 15.13. Inheritance
- 15.14. Taking Ownership
- 15.15. Copying and Moving
- 15.16. Strategies for Managing Permissions
-
15.17. Securing Files by Using the Encrypting File System
- 15.17.1. How EFS works
- 15.17.2. Recoverability and the encryption recovery policy
- 15.17.3. Using EFS
- 15.17.4. Copying, moving, or renaming encrypted files
- 15.17.5. Accessing encrypted data remotely
- 15.17.6. Sharing encrypted data
- 15.17.7. Encrypting files for multiple users
- 15.17.8. Backing up and recovering encrypted data
-
15.17.9. Configuring and using a recovery policy
- 15.17.9.1. Securing the default recovery key—workgroup/standalone computer
- 15.17.9.2. Securing the default recovery key—domain
- 15.17.9.3. Obtaining a file-recovery certificate
- 15.17.9.4. Defining a domainwide recovery policy
- 15.17.9.5. Defining a recovery policy for an organizational unit
- 15.17.9.6. Forcing EFS use
- 15.17.9.7. Disabling EFS
- 15.18. Summary
-
12. Print Services
-
III. Security and Active Directory
-
16. Windows Server 2008 Security
- 16.1. An Overview of Windows Server 2008 Security
- 16.2. Rising to the Security Challenge
- 16.3. Security Enhancements in Server Roles
- 16.4. Understanding Encryption Basics
- 16.5. Getting to Know Cryptography
- 16.6. Understanding Kerberos
- 16.7. Getting to Know IPSec
- 16.8. SSL/TLS
- 16.9. Understanding Active Directory Certificate Services
- 16.10. Support for Legacy NTLM
- 16.11. Smart Cards
- 16.12. Domains
- 16.13. Logon and Authentication
- 16.14. Trusts
- 16.15. Access Control
- 16.16. Auditing
- 16.17. Security Planning
- 16.18. Firewalls
- 16.19. Active Directory Security Policy
- 16.20. Secure Sockets
- 16.21. Firewalls, Proxies, and Bastions
- 16.22. Introduction to the Public Key Infrastructure
- 16.23. Setting up and Configuring Active Directory Certificate Services
- 16.24. Understanding Active Directory Certificate Services
- 16.25. Setting Up and Configuring a Certificate Authority
-
16.26. Deploying a PKI
-
16.26.1. Trust model
- 16.26.1.1. Certificate Policy
- 16.26.1.2. Certificate Practice Statement
- 16.26.1.3. CA keys and certificate safety
- 16.26.1.4. Certificate validation
- 16.26.1.5. Active Directory integration
- 16.26.1.6. Certificate enrollment architecture
- 16.26.1.7. The restricted enrollment agent
- 16.26.1.8. Group Policy
- 16.26.1.9. Certificate revocation architecture
- 16.26.1.10. Online Certificate Status Protocol support
- 16.26.1.11. User certificates
-
16.26.1. Trust model
- 16.27. Summary
-
17. Windows 2008 and Active Directory
- 17.1. The Omniscient Active Directory
- 17.2. The Elements of Active Directory
-
17.3. Inside Active Directory
- 17.3.1. If it walks like a duck ...
- 17.3.2. The Active Directory database structure
- 17.3.3. Active Directory objects
- 17.3.4. Active Directory schema
- 17.3.5. Object attributes
- 17.3.6. Walking the Active Directory
- 17.3.7. Naming conventions
- 17.3.8. Domain objects
- 17.3.9. Organizational units
- 17.3.10. Trees
- 17.3.11. Forests
- 17.3.12. Trusts
- 17.3.13. The global catalog
- 17.3.14. My active directory
- 17.4. Bridging the Divide: Legacy Windows and Windows Server 2008
- 17.5. Summary
-
18. Planning for Active Directory
- 18.1. Active Directory Overview
- 18.2. Basic Design Principles
- 18.3. Active Directory Structure
- 18.4. Planning for the Active Directory Enterprise
- 18.5. Administration Planning
- 18.6. Migration Planning
- 18.7. Deploying the Plan
- 18.8. Summary
-
19. Organizing a Logical Domain Structure
- 19.1. Keepers of the New Order
- 19.2. Active Directory Infrastructure Planning
-
19.3. Planning for the Logical Domain Structure
- 19.3.1. Preparing yourself mentally
- 19.3.2. Assembling the team
- 19.3.3. The domain planning committee
- 19.3.4. Domain management
- 19.3.5. Change control management
- 19.3.6. Domain security
- 19.3.7. Intradomain communication
- 19.3.8. Education and information
- 19.3.9. Surveying the enterprise
- 19.3.10. Enterprise analysis
- 19.3.11. Enterprise environments
- 19.3.12. Working with organizational charts
- 19.3.13. Identifying the Key Management Entities
- 19.3.14. Strategic drivers
- 19.3.15. Identifying the logical units
- 19.3.16. Identifying the physical units
- 19.3.17. Documentation
- 19.3.18. Administrative modeling
-
19.4. Logical Domain Structure: The Blueprint
- 19.4.1. The top-level domain
- 19.4.2. DNS naming practices
-
19.4.3. Second-level domains
- 19.4.3.1. Managing separated departments
- 19.4.3.2. Managing replication overhead and network latency
- 19.4.3.3. Managing the decentralized administration models
- 19.4.3.4. Managing autonomous divisions
- 19.4.3.5. Managing a diversity of domain policy
- 19.4.3.6. Managing international partitions
- 19.4.3.7. Managing security requirements
- 19.4.3.8. Managing information hiding and resource publishing
- 19.4.3.9. Constructive partitioning of the directory
- 19.5. Partitioning the Domain
- 19.6. Summary
-
20. Active Directory Physical Architecture
- 20.1. Past, Present, and Future
- 20.2. Forests and Trusts
- 20.3. Domain Controllers and Global Catalogs
- 20.4. Sites
- 20.5. Active Directory Replication
- 20.6. Directory Synchronization
- 20.7. Active Directory Site Design and Configuration
- 20.8. A Site Architecture
- 20.9. Time
- 20.10. Summary
-
21. Active Directory Installation and Deployment
- 21.1. Getting Ready to Deploy
- 21.2. Millennium City Active Directory Deployment Plan
- 21.3. Executive Summary
- 21.4. Installing and Testing the Active Directory Domain Controllers
- 21.5. Implementation
- 21.6. Summary
-
22. Active Directory Management
- 22.1. Installing New Directory Services into an Existing Infrastructure
- 22.2. Replication Management
- 22.3. Installing New Domain Controllers
- 22.4. Installing New Catalog Servers
- 22.5. Protecting Active Directory from Corruption
- 22.6. Moving Active Directory
- 22.7. Integrating Active Directory with Other Services
- 22.8. Logon without the Global Catalog
- 22.9. Active Directory and DNS
- 22.10. Active Directory Administration Architecture
- 22.11. Summary
-
16. Windows Server 2008 Security
-
IV. Change Control and Workplace Management
-
23. Managing Users and Groups
-
23.1. The Windows Server 2008 Account: A User's Resource
- 23.1.1. What is a user?
- 23.1.2. What are contacts?
- 23.1.3. Local users and "local users"
- 23.1.4. What is a group?
- 23.1.5. Exploring the Users and Computers management tools
- 23.1.6. Windows Server 2008 user accounts
- 23.1.7. Account policy
- 23.1.8. Security principals and the logon authentication process
- 23.1.9. Security identifiers
- 23.1.10. SAM and LSA authentication
-
23.2. User Accounts in Action
- 23.2.1. Getting familiar with RunAs
- 23.2.2. Naming user accounts
- 23.2.3. Passwords
- 23.2.4. Understanding logon
- 23.2.5. Granting remote access
- 23.2.6. Creating a user account
- 23.2.7. Renaming user accounts
- 23.2.8. Deleting and disabling user accounts
- 23.2.9. Copying accounts
- 23.3. Computer Accounts
- 23.4. Group Accounts
- 23.5. The Zen of Managing Users and Groups
- 23.6. User and Group Management Strategies
- 23.7. Summary
-
23.1. The Windows Server 2008 Account: A User's Resource
-
24. Change Control, Group Policy, and Workspace Management
- 24.1. What Is Change Control?
- 24.2. Understanding Change Management
- 24.3. Taking Control
- 24.4. Understanding Group Policy
- 24.5. How Group Policy Works
- 24.6. Putting Group Policy to Work
- 24.7. Group Policy and Change Management: Putting It All Together
- 24.8. Getting Started
- 24.9. Change Control Management for Group Policy
- 24.10. Architecting Group Policy
- 24.11. Summary
-
25. Service Level
- 25.1. Understanding Service Level
- 25.2. Service Level Management
- 25.3. SLM and Windows Server 2008
- 25.4. Windows Server 2008 System Monitoring Architecture
- 25.5. Task Manager
- 25.6. Reliability and Performance Console
- 25.7. Getting to Know Your Servers
- 25.8. Performance Monitoring Overhead
- 25.9. Service Level with Microsoft Systems Center Operations Manager
- 25.10. Summary
-
23. Managing Users and Groups
Product information
- Title: Windows Server® 2008 Bible
- Author(s):
- Release date: July 2008
- Publisher(s): Wiley
- ISBN: 9780470170694
You might also like
book
Windows Server® 2008 R2 Unleashed
Windows Server 2008 R2 Unleashed is the most comprehensive and realistic guide to planning, design, prototyping, …
book
Inside Windows® Server 2003
Inside Windows .NET Server contains comprehensive information on deploying, managing, and troubleshooting systems using both Windows …
book
Windows Server® 2008 R2 Hyper-V™: Insiders Guide to Microsoft's Hypervisor
Get the inside scoop on Hyper-V for Windows Server 2008 R2 Virtualization is a top priority …
book
Mastering Microsoft Windows Server® 2008 R2
The one book you absolutely need to get up and running with Windows Server 2008 R2. …