You are previewing Windows Server® 2008 Administrator's Pocket Consultant.
O'Reilly logo
Windows Server® 2008 Administrator's Pocket Consultant

Book Description

Here s the practical, pocket-sized reference for IT professionals who administer and support Windows Server 2008. Designed for quick referencing, this portable guide covers all the essentials for performing everyday system administration tasks. Written by an award-winning author of more than two dozen computer books, this guide puts expert installation, migration, administration, and troubleshooting advice right at your fingertips. You ll discover how to manage workstations and servers, use Microsoft Active Directory® directory service, create and administer user and group accounts, manage files and directories, back up and recover data, and use TCP/IP, WINS, and DNS for network administration. Featuring quick-reference tables, concise lists, and step-by-step instructions, this handy, one-stop guide provides fast, accurate answers on the spot whether you re at your desk or in the field.

Zeroes in on exactly what the administrator needs to perform day-to-day tasks

Delivers information in concise tables, easy-to-scan lists, and step-by-step instructions

Features a pocket-sized format that puts the right information right at your fingertips

Table of Contents

  1. Windows Server® 2008 Administrator’s Pocket Consultant
    1. Acknowledgments
    2. Introduction
      1. Who Is This Book For?
      2. How This Book Is Organized
      3. Conventions Used in This Book
      4. Other Resources
      5. Support
    3. I. Windows Server 2008 Administration Fundamentals
      1. 1. Windows Server 2008 Administration Overview
        1. Windows Server 2008 and Windows Vista
        2. Getting to Know Windows Server 2008
        3. Networking Tools and Protocols
          1. Understanding Networking Options
          2. Working with Networking Protocols
        4. Domain Controllers, Member Servers, and Domain Services
          1. Working with Active Directory
          2. Using Read-Only Domain Controllers
          3. Using Restartable Active Directory Domain Services
        5. Name-Resolution Services
          1. Using Domain Name System (DNS)
          2. Using Windows Internet Name Service (WINS)
          3. Using Link-Local Multicast Name Resolution (LLMNR)
        6. Frequently Used Tools
          1. Using Windows PowerShell
      2. 2. Deploying Windows Server 2008
        1. Server Roles, Role Services, and Features for Windows Server 2008
        2. Full-Server and Core-Server Installations of Windows Server 2008
        3. Installing Windows Server 2008
          1. Performing a Clean Installation
          2. Performing an Upgrade Installation
          3. Performing Additional Administration Tasks During Installation
            1. Using the Command Line During Installation
            2. Forcing Disk Partition Removal During Installation
            3. Loading Disk Device Drivers During Installation
            4. Creating, Formatting, Deleting, and Extending Disk Partitions During Installation
              1. Creating Disk Partitions During Installation
              2. Formatting Disk Partitions During Installation
              3. Deleting Disk Partitions During Installation
              4. Extending Disk Partitions During Installation
        4. Managing Roles, Role Services, and Features
          1. Viewing Configured Roles and Role Services
          2. Adding or Removing Roles on Servers
          3. Viewing and Modifying Role Services on Servers
          4. Adding or Removing Features in Windows Server 2008
      3. 3. Managing Servers Running Windows Server 2008
        1. Performing Initial Configuration Tasks
        2. Managing Your Servers
        3. Managing System Properties
          1. The Computer Name Tab
          2. The Hardware Tab
          3. The Advanced Tab
            1. Setting Windows Performance
            2. Setting Application Performance
            3. Configuring Virtual Memory
            4. Configuring Data Execution Prevention
              1. Using and Configuring DEP
              2. Understanding DEP Compatibility
            5. Configuring System and User Environment Variables
              1. Creating an Environment Variable
              2. Editing an Environment Variable
              3. Deleting an Environment Variable
            6. Configuring System Startup and Recovery
              1. Setting Startup Options
              2. Setting Recovery Options
          4. The Remote Tab
        4. Managing Dynamic-Link Libraries
      4. 4. Monitoring Processes, Services, and Events
        1. Managing Applications, Processes, and Performance
          1. Task Manager
          2. Managing Applications
            1. Right-Clicking a Listing
          3. Administering Processes
          4. Viewing System Services
          5. Viewing and Managing System Performance
            1. Graphs on the Performance Tab
            2. Customizing and Updating the Graph Display
          6. Viewing and Managing Networking Performance
          7. Viewing and Managing Remote User Sessions
        2. Managing System Services
          1. Starting, Stopping, and Pausing Services
          2. Configuring Service Startup
          3. Configuring Service Logon
          4. Configuring Service Recovery
          5. Disabling Unnecessary Services
        3. Event Logging and Viewing
          1. Accessing and Using the Event Logs
          2. Filtering Event Logs
          3. Setting Event Log Options
          4. Clearing Event Logs
          5. Archiving Event Logs
            1. Archive Log Formats
            2. Creating Log Archives
            3. Viewing Log Archives
        4. Monitoring Server Performance and Activity
          1. Why Monitor Your Server?
          2. Getting Ready to Monitor
          3. Using the Reliability And Performance Console
          4. Choosing Counters to Monitor
          5. Performance Logging
            1. Creating and Managing Data Collector Sets
            2. Collecting Performance Counter Data
            3. Collecting Performance Trace Data
            4. Collecting Configuration Data
          6. Viewing Data Collector Reports
          7. Configuring Performance Counter Alerts
        5. Tuning System Performance
          1. Monitoring and Tuning Memory Usage
          2. Monitoring and Tuning Processor Usage
          3. Monitoring and Tuning Disk I/O
          4. Monitoring and Tuning Network Bandwidth and Connectivity
      5. 5. Automating Administrative Tasks, Policies, and Procedures
        1. Understanding Group Policies
          1. Group Policy Essentials
          2. In What Order Are Multiple Policies Applied?
          3. When Are Group Policies Applied?
          4. Group Policy Requirements and Version Compatibility
        2. Navigating Group Policy Changes
        3. Managing Local Group Policies
          1. Local Group Policy Objects
          2. Accessing the Top-Level Local Policy Settings
          3. LGPO Settings
          4. Accessing Administrator, Non-Administrator, and User-Specific Local Group Policy
        4. Managing Site, Domain, and Organizational Unit Policies
          1. Understanding Domain and Default Policies
          2. Using the Group Policy Management Console
          3. Getting to Know the Policy Editor
          4. Using Administrative Templates to Set Policies
          5. Creating a Central Store
          6. Creating and Linking GPOs
          7. Creating and Using Starter GPOs
          8. Delegating Privileges for Group Policy Management
          9. Blocking, Overriding, and Disabling Policies
        5. Maintaining and Troubleshooting Group Policy
          1. Refreshing Group Policy
          2. Configuring the Refresh Interval for Domain Controllers
          3. Modeling Group Policy for Planning Purposes
          4. Copying, Pasting, and Importing Policy Objects
          5. Backing Up and Restoring Policy Objects
          6. Determining Current Group Policy Settings and Refresh Status
          7. Disabling an Unused Part of Group Policy
          8. Changing Policy Processing Preferences
          9. Configuring Slow-Link Detection
          10. Removing Links and Deleting GPOs
          11. Troubleshooting Group Policy
          12. Fixing Default Group Policy
        6. Managing Users and Computers with Group Policy
          1. Centrally Managing Special Folders
            1. Redirecting a Special Folder to a Single Location
            2. Redirecting a Special Folder Based on Group Membership
            3. Removing Redirection
          2. User and Computer Script Management
            1. Assigning Computer Startup and Shutdown Scripts
            2. Assigning User Logon and Logoff Scripts
          3. Deploying Software Through Group Policy
            1. Getting to Know Software Installation Policy
            2. Deploying Software Throughout Your Organization
            3. Configuring Software Deployment Options
            4. Updating Deployed Software
            5. Upgrading Deployed Software
          4. Automatically Enrolling Computer and User Certificates
          5. Managing Automatic Updates in Group Policy
            1. Configuring Automatic Updates
            2. Optimizing Automatic Updates
            3. Using Intranet Update Service Locations
      6. 6. Enhancing Computer Security
        1. Using Security Templates
          1. Using the Security Templates and Security Configuration And Analysis Snap-ins
          2. Reviewing and Changing Template Settings
            1. Changing Settings for Account, Local, and Event Log Policies
            2. Configuring Restricted Groups
            3. Enabling, Disabling, and Configuring System Services
            4. Configuring Security Settings for Registry and File System Paths
          3. Analyzing, Reviewing, and Applying Security Templates
          4. Deploying Security Templates to Multiple Computers
        2. Using the Security Configuration Wizard
          1. Creating Security Policies
          2. Edit Existing Security Policies
          3. Apply Existing Security Policies
          4. Roll Back the Last Applied Security Policy
          5. Deploying a Security Policy to Multiple Computers
    4. II. Windows Server 2008 Directory Services Administration
      1. 7. Using Active Directory
        1. Introducing Active Directory
          1. Active Directory and DNS
          2. Read-Only Domain Controller Deployment
          3. Windows Server 2008 with Windows NT 4.0
        2. Working with Domain Structures
          1. Understanding Domains
          2. Understanding Domain Forests and Domain Trees
          3. Understanding Organizational Units
          4. Understanding Sites and Subnets
        3. Working with Active Directory Domains
          1. Using Windows 2000 and Later Computers with Active Directory
          2. Working with Domain Functional Levels
            1. Using Windows 2000 Native-Mode Operations
            2. Using Windows Server 2003 Mode Operations
            3. Using Windows Server 2008 Mode Operations
          3. Raising Domain and Forest Functionality
        4. Understanding the Directory Structure
          1. Exploring the Data Store
          2. Exploring Global Catalogs
          3. Universal Group Membership Caching
          4. Replication and Active Directory
          5. Active Directory and LDAP
          6. Understanding Operations Master Roles
      2. 8. Core Active Directory Administration
        1. Tools for Managing Active Directory
          1. Active Directory Administration Tools
          2. Active Directory Command-Line Tools
          3. Active Directory Support Tools
        2. Using the Active Directory Users And Computers Tool
          1. Getting Started with Active Directory Users And Computers
          2. Connecting to a Domain Controller
          3. Connecting to a Domain
          4. Searching for Accounts and Shared Resources
          5. Managing Computer Accounts
          6. Creating Computer Accounts on a Workstation or Server
          7. Creating Computer Accounts in Active Directory Users And Computers
          8. Viewing and Editing Computer Account Properties
          9. Deleting, Disabling, and Enabling Computer Accounts
          10. Resetting Locked Computer Accounts
          11. Moving Computer Accounts
          12. Managing Computers
          13. Joining a Computer to a Domain or Workgroup
        3. Managing Domain Controllers, Roles, and Catalogs
          1. Installing and Demoting Domain Controllers
          2. Viewing and Transferring Domain-Wide Roles
          3. Viewing and Transferring the Domain Naming Master Role
          4. Viewing and Transferring Schema Master Roles
          5. Transferring Roles Using the Command Line
          6. Seizing Roles Using the Command Line
          7. Configuring Global Catalogs
          8. Configuring Universal Group Membership Caching
        4. Managing Organizational Units
          1. Creating Organizational Units
          2. Viewing and Editing Organizational Unit Properties
          3. Renaming and Deleting Organizational Units
          4. Moving Organizational Units
        5. Managing Sites
          1. Creating Sites
          2. Creating Subnets
          3. Associating Domain Controllers with Sites
          4. Configuring Site Links
          5. Configuring Site Link Bridges
        6. Maintaining Active Directory
          1. Using ADSI Edit
          2. Examining Inter-Site Topology
        7. Troubleshooting Active Directory
      3. 9. Understanding User and Group Accounts
        1. The Windows Server 2008 Security Model
          1. Authentication Protocols
          2. Access Controls
        2. Differences Between User and Group Accounts
          1. User Accounts
            1. Logon Names, Passwords, and Public Certificates
            2. Security Identifiers and User Accounts
          2. Group Accounts
            1. Group Types
            2. Group Scope
            3. Security Identifiers and Group Accounts
            4. When to Use Domain Local, Global, and Universal Groups
        3. Default User Accounts and Groups
          1. Built-in User Accounts
          2. Predefined User Accounts
            1. The Administrator Account
            2. The Guest Account
          3. Built-in and Predefined Groups
          4. Implicit Groups and Special Identities
        4. Account Capabilities
          1. Privileges
          2. Logon Rights
          3. Built-in Capabilities for Groups in Active Directory
        5. Using Default Group Accounts
          1. Groups Used by Administrators
          2. Implicit Groups and Identities
      4. 10. Creating User and Group Accounts
        1. User Account Setup and Organization
          1. Account Naming Policies
            1. Rules for Display Names
            2. Rules for Logon Names
            3. Naming Schemes
          2. Password and Account Policies
            1. Using Secure Passwords
            2. Setting Account Policies
        2. Configuring Account Policies
          1. Configuring Password Policies
            1. Enforce Password History
            2. Maximum Password Age
            3. Minimum Password Age
            4. Minimum Password Length
            5. Passwords Must Meet Complexity Requirements
            6. Store Password Using Reversible Encryption For All Users In The Domain
          2. Configuring Account Lockout Policies
            1. Account Lockout Threshold
            2. Account Lockout Duration
            3. Reset Account Lockout Counter After
          3. Configuring Kerberos Policies
            1. Enforce User Logon Restrictions
            2. Maximum Lifetime
            3. Maximum Tolerance
        3. Configuring User Rights Policies
          1. Configuring User Rights Globally
          2. Configuring User Rights Locally
        4. Adding a User Account
          1. Creating Domain User Accounts
          2. Creating Local User Accounts
        5. Adding a Group Account
          1. Creating a Global Group
          2. Creating a Local Group and Assigning Members
        6. Handling Global Group Membership
          1. Managing Individual Membership
          2. Managing Multiple Memberships in a Group
          3. Setting the Primary Group for Users and Computers
      5. 11. Managing Existing User and Group Accounts
        1. Managing User Contact Information
          1. Setting Contact Information
          2. Searching for Users and Groups In Active Directory
        2. Configuring the User’s Environment Settings
          1. System Environment Variables
          2. Logon Scripts
          3. Assigning Home Directories
        3. Setting Account Options and Restrictions
          1. Managing Logon Hours
            1. Configuring Logon Hours
            2. Enforcing Logon Hours
          2. Setting Permitted Logon Workstations
          3. Setting Dial-In and VPN Privileges
          4. Setting Account Security Options
        4. Managing User Profiles
          1. Local, Roaming, and Mandatory Profiles
            1. Creating Local Profiles
            2. Creating Roaming Profiles
            3. Creating Mandatory Profiles
          2. Using the System Utility to Manage Local Profiles
            1. Creating a Profile by Hand
            2. Copying an Existing Profile to a New User Account
            3. Copying or Restoring a Profile
            4. Deleting a Local Profile and Assigning a New One
            5. Changing the Profile Type
        5. Updating User and Group Accounts
          1. Renaming User and Group Accounts
          2. Copying Domain User Accounts
          3. Importing and Exporting Accounts
          4. Changing and Resetting Passwords
          5. Enabling User Accounts
            1. Account Disabled
            2. Account Locked Out
            3. Account Expired
        6. Managing Multiple User Accounts
          1. Setting Profiles for Multiple Accounts
          2. Setting Logon Hours for Multiple Accounts
          3. Setting Permitted Logon Workstations for Multiple Accounts
          4. Setting Logon, Password, and Expiration Properties for Multiple Accounts
        7. Troubleshooting Logon Problems
        8. Viewing and Setting Active Directory Permissions
    5. III. Windows Server 2008 Data Administration
      1. 12. Managing File Systems and Drives
        1. Managing the File Services Role
        2. Adding Hard Disk Drives
          1. Physical Drives
          2. Preparing a Physical Drive for Use
          3. Using Disk Management
          4. Removable Storage Devices
          5. Installing and Checking for a New Drive
          6. Understanding Drive Status
        3. Working with Basic and Dynamic Disks
          1. Using Basic and Dynamic Disks
          2. Special Considerations for Basic and Dynamic Disks
          3. Changing Drive Types
            1. Converting a Basic Disk to a Dynamic Disk
            2. Changing a Dynamic Disk Back to a Basic Disk
          4. Reactivating Dynamic Disks
          5. Rescanning Disks
          6. Moving a Dynamic Disk to a New System
        4. Using Basic Disks and Partitions
          1. Partitioning Basics
          2. Creating Partitions and Simple Volumes
          3. Formatting Partitions
        5. Managing Existing Partitions and Drives
          1. Assigning Drive Letters and Paths
          2. Changing or Deleting the Volume Label
          3. Deleting Partitions and Drives
          4. Converting a Volume to NTFS
            1. The Convert Utility Syntax
            2. Using the Convert Utility
          5. Resizing Partitions and Volumes
          6. Repairing Disk Errors and Inconsistencies
            1. Running Check Disk from the Command Line
            2. Running Check Disk Interactively
          7. Defragmenting Disks
          8. Compressing Drives and Data
            1. Compressing Drives
            2. Compressing Directories and Files
            3. Expanding Compressed Drives
            4. Expanding Compressed Directories and Files
          9. Encrypting Drives and Data
          10. Understanding Encryption and the Encrypting File System
            1. Encrypting Directories and Files
          11. Working with Encrypted Files and Folders
          12. Configuring Recovery Policy
            1. Decrypting Files and Directories
      2. 13. Administering Volume Sets and RAID Arrays
        1. Using Volumes and Volume Sets
          1. Understanding Volume Basics
          2. Understanding Volume Sets
          3. Creating Volumes and Volume Sets
          4. Deleting Volumes and Volume Sets
          5. Managing Volumes
        2. Improving Performance and Fault Tolerance with RAIDs
        3. Implementing RAID on Windows Server 2008
          1. Implementing RAID 0: Disk Striping
          2. Implementing RAID 1: Disk Mirroring
            1. Creating a Mirror Set in Disk Management
            2. Mirroring an Existing Volume
          3. Implementing RAID 5: Disk Striping with Parity
            1. Creating a Striped Set with Parity in Disk Management
        4. Managing RAIDs and Recovering from Failures
          1. Breaking a Mirrored Set
          2. Resynchronizing and Repairing a Mirrored Set
          3. Repairing a Mirrored System Volume to Enable Boot
          4. Removing a Mirrored Set
          5. Repairing a Striped Set Without Parity
          6. Regenerating a Striped Set with Parity
        5. Managing LUNs on SANs
          1. Configuring Fibre Channel SAN Connections
          2. Configuring iSCSI SAN Connections
          3. Adding and Removing Targets
          4. Creating, Extending, Assigning, and Deleting LUNs
          5. Defining a Server Cluster in Storage Manager For SANs
      3. 14. Managing File Screening and Storage Reporting
        1. Understanding File Screening and Storage Reporting
        2. Managing File Screening and Storage Reporting
          1. Managing Global File Resource Settings
            1. Configuring E-Mail Notifications
            2. Configuring Notification Limits
            3. Reviewing Reports and Configuring Storage Report Parameters
            4. Configuring Report Locations
            5. Configuring File Screen Auditing
          2. Managing the File Groups to Which Screens Are Applied
          3. Managing File Screen Templates
          4. Creating File Screens
          5. Defining File Screening Exceptions
          6. Scheduling and Generating Storage Reports
      4. 15. Data Sharing, Security, and Auditing
        1. Using and Enabling File Sharing
        2. Configuring Standard File Sharing
          1. Viewing Existing Shares
          2. Creating Shared Folders
          3. Creating Additional Shares on an Existing Share
        3. Managing Share Permissions
          1. The Different Share Permissions
          2. Viewing Share Permissions
          3. Configuring Share Permissions
          4. Modifying Existing Share Permissions
          5. Removing Share Permissions for Users and Groups
        4. Managing Existing Shares
          1. Understanding Special Shares
          2. Connecting to Special Shares
          3. Viewing User and Computer Sessions
            1. Managing Sessions and Shares
              1. Ending Individual Sessions
              2. Ending All Sessions
            2. Managing Open Resources
              1. Closing an Open File
              2. Closing All Open Files
          4. Stopping File and Folder Sharing
        5. Configuring NFS Sharing
        6. Using Shadow Copies
          1. Understanding Shadow Copies
          2. Creating Shadow Copies
          3. Restoring a Shadow Copy
          4. Reverting an Entire Volume to a Previous Shadow Copy
          5. Deleting Shadow Copies
          6. Disabling Shadow Copies
        7. Connecting to Network Drives
          1. Mapping a Network Drive
          2. Disconnecting a Network Drive
        8. Object Management, Ownership, and Inheritance
          1. Objects and Object Managers
          2. Object Ownership and Transfer
          3. Object Inheritance
        9. File and Folder Permissions
          1. Understanding File and Folder Permissions
          2. Setting File and Folder Permissions
        10. Auditing System Resources
          1. Setting Auditing Policies
          2. Auditing Files and Folders
          3. Auditing the Registry
          4. Auditing Active Directory Objects
        11. Using, Configuring, and Managing NTFS Disk Quotas
          1. Understanding NTFS Disk Quotas and How NTFS Quotas Are Used
          2. Setting NTFS Disk Quota Policies
          3. Enabling NTFS Disk Quotas on NTFS Volumes
          4. Viewing Disk Quota Entries
          5. Creating Disk Quota Entries
          6. Deleting Disk Quota Entries
          7. Exporting and Importing NTFS Disk Quota Settings
          8. Disabling NTFS Disk Quotas
        12. Using, Configuring, and Managing Resource Manager Disk Quotas
          1. Understanding Resource Manager Disk Quotas
          2. Managing Disk Quota Templates
          3. Creating Resource Manager Disk Quotas
      5. 16. Data Backup and Recovery
        1. Creating a Backup and Recovery Plan
          1. Figuring Out a Backup Plan
          2. The Basic Types of Backup
          3. Differential and Incremental Backups
          4. Selecting Backup Devices and Media
          5. Common Backup Solutions
          6. Buying and Using Backup Media
          7. Selecting a Backup Utility
        2. Backing Up Your Data: The Essentials
          1. Installing the Windows Backup and Recovery Utilities
          2. Getting Started with Windows Server Backup
          3. Getting Started with the Backup Command-Line Utility
          4. Working with Wbadmin Commands
          5. Using General-Purpose Commands
          6. Using Backup Management Commands
          7. Using Recovery Management Commands
        3. Performing Server Backups
          1. Configuring Scheduled Backups
            1. Schedule a backup for C: and D: 9:00 P.M. daily
            2. Schedule a backup for all operating system volumes and 6:00 A.M. and 9:00 P.M. daily
          2. Modifying or Stopping Scheduled Backups
            1. Adding a new target to scheduled backups
            2. Removing a target from scheduled backups
            3. Modifying the run schedule and included volumes
          3. Creating and Scheduling Backups with Wbadmin
            1. Performing a full backup of the server
            2. Backing up C: and D: to F
            3. Backing up all critical volumes
            4. Backing up C: and D: to a remote shared folder
          4. Running Manual Backups
          5. Recovering Your Server from Hardware or Startup Failure
          6. Starting a Server in Safe Mode
          7. Resuming After a Failed Start
          8. Backing Up and Restoring the System State
          9. Restoring Active Directory
          10. Restoring the Operating System and the Full System
          11. Restoring Applications, Non-System Volumes, and Files and Folders
        4. Managing Encryption Recovery Policy
          1. Understanding Encryption Certificates and Recovery Policy
          2. Configuring the EFS Recovery Policy
        5. Backing Up and Restoring Encrypted Data and Certificates
          1. Backing Up Encryption Certificates
          2. Restoring Encryption Certificates
    6. IV. Windows Server 2008 Network Administration
      1. 17. Managing TCP/IP Networking
        1. Navigating Networking in Windows Server 2008
        2. Networking Enhancements in Windows Vista and Windows Server 2008
        3. Installing TCP/IP Networking
        4. Configuring TCP/IP Networking
          1. Configuring Static IP Addresses
            1. Using the PING Command to Check an Address
            2. Configuring a Static IPv4 or IPv6 Address
          2. Configuring Dynamic IP Addresses and Alternate IP Addressing
          3. Configuring Multiple Gateways
        5. Managing Network Connections
          1. Checking the Status, Speed, and Activity for Local Area Connections
          2. Enabling and Disabling Local Area Connections
          3. Renaming Local Area Connections
      2. 18. Administering Network Printers and Print Services
        1. Managing the Print Services Role
          1. Using Print Devices
          2. Printing Essentials
          3. Configuring Print Servers
          4. Enabling and Disabling Print Sharing
        2. Getting Started with Print Management
        3. Installing Printers
          1. Using the Autoinstall Feature of Print Management
          2. Installing and Configuring Physically Attached Print Devices
          3. Installing Network-Attached Print Devices
          4. Connecting to Printers Created on the Network
          5. Deploying Printer Connections
          6. Configuring Point and Print Restrictions
          7. Moving Printers to a New Print Server
          8. Monitoring Printers and Printer Queues Automatically
          9. Solving Spooling Problems
        4. Configuring Printer Properties
          1. Adding Comments and Location Information
          2. Listing Printers in Active Directory
          3. Managing Printer Drivers
            1. Updating a Printer Driver
            2. Configuring Drivers for Network Clients
          4. Setting a Separator Page and Changing Print Device Mode
          5. Changing the Printer Port
          6. Scheduling and Prioritizing Print Jobs
            1. Scheduling Printer Availability
            2. Setting Printer Priority
            3. Configuring Print Spooling
          7. Starting and Stopping Printer Sharing
          8. Setting Printer Access Permissions
          9. Auditing Print Jobs
          10. Setting Document Defaults
        5. Configuring Print Server Properties
          1. Locating the Spool Folder and Enabling Printing on NTFS
          2. Managing High-Volume Printing
          3. Logging Printer Events
          4. Enabling Print Job Error Notification
        6. Managing Print Jobs on Local and Remote Printers
          1. Viewing Printer Queues and Print Jobs
          2. Pausing the Printer and Resuming Printing
          3. Emptying the Print Queue
          4. Pausing, Resuming, and Restarting Individual Document Printing
          5. Removing a Document and Canceling a Print Job
          6. Checking the Properties of Documents in the Printer
          7. Setting the Priority of Individual Documents
          8. Scheduling the Printing of Individual Documents
      3. 19. Running DHCP Clients and Servers
        1. Understanding DHCP
          1. Using Dynamic IPv4 Addressing and Configuration
          2. Using Dynamic IPv6 Addressing and Configuration
          3. Checking IP Address Assignment
          4. Understanding Scopes
        2. Installing a DHCP Server
          1. Installing DHCP Components
          2. Starting and Using the DHCP Console
          3. Connecting to Remote DHCP Servers
          4. Starting and Stopping a DHCP Server
          5. Authorizing a DHCP Server in Active Directory
        3. Configuring DHCP Servers
          1. Binding a DHCP Server with Multiple Network Interface Cards to a Specific IP Address
          2. Updating DHCP Statistics
          3. DHCP Auditing and Troubleshooting
            1. Understanding DHCP Auditing
            2. Enabling or Disabling DHCP Auditing
            3. Changing the Location of DHCP Auditing Logs
            4. Changing the Log Usage
          4. Integrating DHCP and DNS
          5. Integrating DHCP and NAP
          6. Avoiding IP Address Conflicts
          7. Saving and Restoring the DHCP Configuration
        4. Managing DHCP Scopes
          1. Creating and Managing Superscopes
            1. Creating Superscopes
            2. Adding Scopes to a Superscope
            3. Removing Scopes from a Superscope
            4. Activating and Deactivating a Superscope
            5. Deleting a Superscope
          2. Creating and Managing Scopes
            1. Creating Normal Scopes for IPv4 Addresses
            2. Creating Normal Scopes for IPv6 Addresses
            3. Creating Multicast Scopes
            4. Setting Scope Options
              1. Viewing and Assigning Server Options
              2. Viewing and Assigning Scope Options
              3. Viewing and Assigning Reservation Options
            5. Modifying Scopes
            6. Activating and Deactivating Scopes
              1. Activating a Scope
              2. Deactivating a Scope
            7. Enabling the Bootstrap Protocol
            8. Removing a Scope
            9. Configuring Multiple Scopes on a Network
        5. Managing the Address Pool, Leases, and Reservations
          1. Viewing Scope Statistics
          2. Setting a New Exclusion Range
          3. Deleting an Exclusion Range
          4. Reserving DHCP Addresses
            1. Releasing Addresses and Leases
          5. Modifying Reservation Properties
          6. Deleting Leases and Reservations
        6. Backing Up and Restoring the DHCP Database
          1. Backing Up the DHCP Database
          2. Restoring the DHCP Database from Backup
          3. Using Backup and Restore to Move the DHCP Database to a New Server
          4. Forcing the DHCP Server Service to Regenerate the DHCP Database
          5. Reconciling Leases and Reservations
      4. 20. Optimizing DNS
        1. Understanding DNS
          1. Integrating Active Directory and DNS
          2. Enabling DNS on the Network
        2. Configuring Name Resolution on DNS Clients
        3. Installing DNS Servers
          1. Installing and Configuring the DNS Server Service
          2. Configuring a Primary DNS Server
          3. Configuring a Secondary DNS Server
          4. Configuring Reverse Lookups
          5. Configuring Global Names
        4. Managing DNS Servers
          1. Adding Remote Servers to the DNS Console
          2. Removing a Server from the DNS Console
          3. Starting and Stopping a DNS Server
          4. Creating Child Domains Within Zones
          5. Creating Child Domains in Separate Zones
          6. Deleting a Domain or Subnet
        5. Managing DNS Records
          1. Adding Address and Pointer Records
            1. Adding a PTR Record Later
          2. Adding DNS Aliases with CNAME
          3. Adding Mail Exchange Servers
          4. Adding Name Servers
          5. Viewing and Updating DNS Records
        6. Updating Zone Properties and the SOA Record
          1. Modifying the SOA Record
          2. Allowing and Restricting Zone Transfers
          3. Notifying Secondaries of Changes
          4. Setting the Zone Type
          5. Enabling and Disabling Dynamic Updates
        7. Managing DNS Server Configuration and Security
          1. Enabling and Disabling IP Addresses for a DNS Server
          2. Controlling Access to DNS Servers Outside the Organization
            1. Creating Nonforwarding and Forwarding-Only Servers
            2. Creating Forwarding Servers
            3. Configuring Conditional Forwarding
          3. Enabling and Disabling Event Logging
          4. Using Debug Logging to Track DNS Activity
          5. Monitoring a DNS Server
    7. A. About the Author
    8. Index