You are previewing Windows Server® 2008 Inside Out.
O'Reilly logo
Windows Server® 2008 Inside Out

Book Description

Learn how to conquer Windows Server 2008—from the inside out! Designed for system administrators, this definitive resource features hundreds of timesaving solutions, expert insights, troubleshooting tips, and workarounds for administering Windows Server 2008—all in concise, fast-answer format. You will learn how to perform upgrades and migrations, automate deployments, implement security features, manage software updates and patches, administer users and accounts, manage Active Directory directory services, and more. With INSIDE OUT, you’ll discover the best and fastest ways to perform core administrative tasks, with an award-winning format that makes it easy to find exactly the tips, troubleshooting solutions, and workarounds you need. Plus, the companion CD comes packed with a fully searchable eBook and more than 100 timesaving tools and scripts. With INSIDE OUT, you get all muscle and no fluff!

For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Table of Contents

  1. Windows Server® 2008 Inside Out
  2. A Note Regarding Supplemental Files
  3. Acknowledgments
  4. About the CD
    1. What’s on the CD
    2. System Requirements
      1. Viewing the E-Book
    3. Support Information
      1. Find Additional Content Online
      2. How to Reach the Author
  5. Conventions and Features Used in This Book
    1. Text Conventions
    2. Design Conventions
  6. 1. Windows Server 2008 Overview and Planning
    1. 1. Introducing Windows Server 2008
      1. What’s New in Windows Server 2008
        1. Windows Server 2008 Standard
        2. Windows Server 2008 Enterprise
        3. Windows Server 2008 Datacenter
        4. Windows Web Server 2008
      2. 64-Bit Computing
      3. Virtualized Computing
      4. Windows Vista and Windows Server 2008
        1. Windows Vista Editions
        2. Windows Vista and Active Directory
      5. Architecture Improvements
        1. Kernel Architecture
        2. Boot Environment
        3. Support Architecture
          1. Network Diagnostics Framework
          2. Windows Diagnostics Infrastructure
          3. Other Diagnostics Enhancements
    2. 2. Planning for Windows Server 2008
      1. Overview of Planning
        1. The Microsoft Solutions Framework Process Model
        2. Your Plan: The Big Picture
      2. Identifying Your Organizational Teams
        1. Microsoft Solutions Framework Team Model
        2. Your Project Team
      3. Assessing Project Goals
        1. The Business Perspective
        2. Identifying IT Goals
        3. Examining IT—Business Interaction
        4. Predicting Network Change
      4. Analyzing the Existing Network
        1. Evaluating the Network Infrastructure
        2. Assessing Systems
        3. Identify Network Services and Applications
        4. Identifying Security Infrastructure
        5. Reviewing Network Administration
          1. Network Administrative Model
          2. Disaster Recovery
          3. Network Management Tools
      5. Defining Objectives and Scope
        1. Specifying Organizational Objectives
        2. Setting the Schedule
        3. Shaping the Budget
        4. Allowing for Contingencies
        5. Finalizing Project Scope
      6. Defining the New Network Environment
        1. Defining Domain and Security Architecture
          1. Assess Domain Architecture and Changes
          2. Impact on Network
          3. Identify Security Requirements
        2. Changing the Administrative Approach
          1. Management Tools
          2. Select and Implement Standards
          3. Change Management
        3. Thinking About Active Directory
          1. Designing the Active Directory Namespace
          2. Managing Domain Trusts
          3. Identifying Domain and Forest Functional Levels
          4. Defining Active Directory Server Roles
        4. Planning for Server Usage
          1. Server Roles
        5. Determining Which Windows Edition to Use
          1. Using Windows Server 2008 Standard
          2. Using Windows Server 2008 Enterprise
          3. Using Windows Server 2008 Datacenter
          4. Using Windows Web Server 2008
      7. Selecting a Software Licensing Program
        1. Retail Product Licenses
        2. Volume-Licensing Programs
          1. Open License Program
          2. Select License
          3. Enterprise Agreement License
          4. Software Assurance
      8. Final Considerations for Planning and Deployment
    3. 3. Installing Windows Server 2008
      1. Getting a Quick Start
        1. Product Licensing
      2. Preparing for Windows Server 2008 Installation
        1. System Hardware Requirements
        2. How a Clean Installation and an Upgrade Differ
        3. Supported Upgrade Paths
        4. Using Windows Update
        5. Preinstallation Tasks
      3. Installing Windows Server 2008
        1. Installation on x86-Based Systems
        2. Installation on 64-Bit Systems
        3. Planning Partitions
        4. Installation Type
        5. Naming Computers
        6. Network and Domain Membership Options
          1. Protocols
          2. Domain Membership
          3. Networking Components
        7. Performing a Clean Installation
        8. Performing an Upgrade Installation
        9. Activation Sequence
          1. Activate Windows over the Internet
          2. Activate Windows by Telephone
      4. Performing Additional Administration Tasks During Installation
        1. Accessing a Command Prompt During Installation
        2. Forcing Disk Partition Removal During Installation
          1. Loading Disk Device Drivers During Installation
        3. Creating, Deleting, and Extending Disk Partitions During Installation
      5. Troubleshooting Installation
        1. Start with the Potential Points of Failure
          1. Setup Refuses to Install or Start
          2. Setup Reports a Media or DVD-ROM Error
          3. Setup Reports Insufficient System Resources
        2. Continue Past Lockups and Freezes
      6. Postinstallation
  7. 2. Managing Windows Server 2008 Systems
    1. 4. Managing Windows Server 2008
      1. Working with the Administration Tools
        1. Using Control Panel Utilities
        2. Using Graphical Administrative Tools
        3. Using Command-Line Utilities
          1. Utilities to Know
          2. Using Net Tools
          3. Using Windows PowerShell
      2. Using the Initial Configuration Tasks Console
      3. Working with Computer Management
        1. Computer Management System Tools
        2. Computer Management Storage Tools
        3. Computer Management Services And Applications Tools
      4. Working with Server Manager
      5. Using Control Panel
        1. Using the Appearance And Personalization Console
        2. Using the Date And Time Utility
        3. Using the Folder Options Utility
        4. Using the Regional and Language Options Utility
      6. Using the System Console
    2. 5. Configuring Windows Server 2008
      1. Optimizing the Menu System
        1. Navigating the Start Menu Options
        2. Modifying the Start Menu Content
          1. Adding, Copying, and Moving Menu Items
          2. Highlighting and Hiding Menu Items
          3. Controlling the Frequently Used Programs List
          4. Sorting and Renaming Menu Items
          5. Removing Items from the Start Menu
      2. Customizing the Desktop and the Taskbar
        1. Configuring Desktop Items
        2. Configuring the Taskbar
          1. Changing the Taskbar Size and Position
          2. Using Auto Hide and Locking
          3. Grouping Similar Taskbar Items
          4. Controlling Programs in the Notification Area
      3. Optimizing Toolbars
        1. Customizing the Quick Launch Toolbar
        2. Displaying Other Custom Toolbars
        3. Creating Personal Toolbars
    3. 6. Windows Server 2008 MMC Administration
      1. Introducing the MMC
      2. Using the MMC
        1. MMC Snap-Ins
        2. MMC Modes
        3. MMC Windows and Startup
        4. MMC Tool Availability
        5. MMC and Remote Computers
      3. Building Custom MMCs
        1. Step 1: Creating the Console
        2. Step 2: Adding Snap-Ins to the Console
        3. Step 3: Saving the Finished Console
          1. Setting the Initial Console View Before Saving
          2. Setting the Console Mode Before Saving
          3. Setting the Console Icon Before Saving
          4. Saving the Console Tool to the Desktop, the Start Menu, or a Folder
      4. Designing Custom Taskpads for the MMC
        1. Getting Started with Taskpads
        2. Understanding Taskpad View Styles
        3. Creating and Managing Taskpads
        4. Creating and Managing Tasks
          1. Creating Menu Command Tasks
          2. Creating Shell Command Tasks
          3. Creating Navigation Tasks
          4. Arranging, Editing, and Removing Tasks
      5. Publishing and Distributing Your Custom Tools
    4. 7. Configuring Roles, Role Services, and Features
      1. Using Roles, Role Services, and Features
      2. Making Supplemental Components Available
      3. Installing Components with Server Manager
        1. Viewing Configured Roles and Role Services
        2. Managing Server Roles
          1. Adding a Server Role
          2. Removing a Server Role
        3. Managing Role Services
          1. Adding a Role Service
          2. Removing a Role Service
        4. Managing Windows Features
          1. Adding a Feature
          2. Removing a Feature
      4. Installing Components at the Command Line
        1. Getting Started with ServerManagerCmd
        2. Understanding Component Names
        3. Determining the Installed Roles, Role Services, and Features
        4. Installing Components Using ServerManagerCmd
        5. Removing Components Using ServerManagerCmd
    5. 8. Managing and Troubleshooting Hardware
      1. Understanding Hardware Installation Changes
        1. Choosing Internal Devices
        2. Choosing External Devices
      2. Installing Devices
        1. Understanding Device Installation
        2. Installing New Devices
        3. Viewing Device and Driver Details
      3. Working with Device Drivers
        1. Device Driver Essentials
        2. Using Signed and Unsigned Device Drivers
        3. Viewing Driver Information
        4. Viewing Advanced, Resources, and Other Settings
        5. Installing and Updating Device Drivers
        6. Restricting Device Installation Using Group Policy
        7. Rolling Back Drivers
        8. Removing Device Drivers for Removed Devices
        9. Uninstalling, Reinstalling, and Disabling Device Drivers
      4. Managing Hardware
        1. Adding Non–Plug and Play Hardware
        2. Enabling and Disabling Hardware
        3. Troubleshooting Hardware
        4. Resolving Resource Conflicts
    6. 9. Managing the Registry
      1. Introducing the Registry
      2. Understanding the Registry Structure
      3. Registry Root Keys
        1. Hkey_Local_Machine
          1. Hklm\Components
          2. Hklm\Hardware
          3. Hklm\Sam
          4. Hklm\Security
          5. Hklm\Software
          6. Hklm\System
        2. Hkey_Users
        3. Hkey_Classes_Root
        4. Hkey_Current_Config
        5. Hkey_Current_User
      4. Registry Data: How It Is Stored and Used
        1. Where Registry Data Comes From
        2. Types of Registry Data Available
      5. Working with the Registry
        1. Searching the Registry
        2. Modifying the Registry
          1. Modifying Values
          2. Adding Keys and Values
          3. Removing Keys and Values
        3. Modifying the Registry of a Remote Machine
        4. Importing and Exporting Registry Data
        5. Loading and Unloading Hive Files
        6. Working with the Registry from the Command Line
      6. Backing Up and Restoring the Registry
      7. Maintaining the Registry
        1. Using the Windows Installer Clean Up Utility
        2. Using the Windows Installer Zapper
          1. Removing Registry Settings for Active Installations That Have Failed
          2. Removing Partial or Damaged Settings for Individual Applications
      8. Securing the Registry
        1. Preventing Access to the Registry Utilities
        2. Applying Permissions to Registry Keys
        3. Controlling Remote Registry Access
        4. Auditing Registry Access
    7. 10. Software and User Account Control Administration
      1. Understanding Software Installation Changes
      2. Mastering User Account Control
        1. Elevation, Prompts, and the Secure Desktop
        2. Configuring UAC and Admin Approval Mode
      3. Maintaining Application Integrity
        1. Application Access Tokens
        2. Application Run Levels
        3. Configuring Run Levels
        4. Controlling Application Installation and Run Behavior
    8. 11. Performance Monitoring and Tuning
      1. Tuning Performance, Memory Usage, and Data Throughput
        1. Tuning Windows Operating System Performance
        2. Tuning Processor Scheduling
        3. Tuning Virtual Memory
      2. Tracking a System’s General Health
        1. Monitoring Essentials
        2. Getting Processor and Memory Usage for Troubleshooting
        3. Getting Information on Running Applications
        4. Monitoring and Troubleshooting Processes
        5. Monitoring and Troubleshooting Services
        6. Getting Network Usage Information
        7. Getting Information on User and Remote User Sessions
      3. Tracking Events and Troubleshooting by Using Event Viewer
        1. Understanding the Event Logs
        2. Accessing the Event Logs and Viewing Events
        3. Viewing Event Logs on Remote Systems
        4. Sorting, Finding, and Filtering Events
          1. Sorting the Event Logs
          2. Searching the Event Logs
          3. Filtering the Event Logs
        5. Archiving Event Logs
        6. Tracking Events Using PowerShell
        7. Using Subscriptions and Forwarded Events
    9. 12. Comprehensive Performance Analysis and Logging
      1. Establishing Performance Baselines
      2. Monitoring Reliability and Performance
      3. Comprehensive Performance Monitoring
        1. Using Performance Monitor
        2. Selecting Performance Objects and Counters to Monitor
        3. Choosing Views and Controlling the Display
        4. Monitoring Performance Remotely
      4. Resolving Performance Bottlenecks
        1. Resolving Memory Bottlenecks
        2. Resolving Processor Bottlenecks
        3. Resolving Disk I/O Bottlenecks
        4. Resolving Network Bottlenecks
      5. Performance Logging
        1. Creating and Managing Data Collector Sets
        2. Collecting Performance Counter Data
        3. Collecting Performance Trace Data
        4. Collecting Configuration Data
        5. Viewing Data Collector Reports
        6. Configuring Performance Counter Alerts
        7. Monitoring Performance from the Command Line
        8. Analyzing Trace Logs at the Command Line
  8. 3. Managing Windows Server 2008 Storage and File Systems
    1. 13. Boot Configuration
      1. Boot from Hardware and Firmware
        1. Hardware and Firmware Power States
        2. Diagnosing Hardware and Firmware Startup Problems
        3. Resolving Hardware and Firmware Startup Problems
      2. Boot Environment Essentials
      3. Managing Startup and Boot Configuration
        1. Managing Startup and Recovery Options
        2. Managing System Boot Configuration
        3. Working with the BCD Editor
      4. Managing the Boot Configuration Data Store and Its Entries
        1. Viewing BCD Entries
        2. Creating and Identifying the BCD Store
        3. Importing and Exporting the BCD Store
        4. Creating, Copying, and Deleting BCD Entries
        5. Setting BCD Entry Values
        6. Changing Data Execution Prevention and Physical Address Extension Options
        7. Changing the Operating System Display Order
        8. Changing the Default Operating System Entry
        9. Changing the Default Timeout
        10. Changing the Boot Sequence Temporarily
    2. 14. Storage Management
      1. Essential Storage Technologies
        1. Using Internal and External Storage Devices
        2. Improving Storage Management
        3. Booting from SANs and Using SANs with Clusters
      2. Configuring Multipath I/O
        1. Adding Multipath Hardware Devices
        2. Removing Multipath Hardware Devices
        3. Meeting Performance, Capacity, and Availability Requirements
      3. Installing and Configuring File Services
        1. Optimizing the File Services Role
        2. Configuring the File Services Role
      4. Configuring Storage
        1. Using the Disk Management Tools
        2. Adding New Disks
        3. Using the MBR and GPT Partition Styles
          1. Working with MBR Disks
          2. Working with GPT Disks
          3. Using and Converting MBR and GPT Disks
        4. Using the Disk Storage Types
          1. Working with Basic and Dynamic Disks
          2. Using and Converting Basic and Dynamic Disks
            1. Using Disk Management to Convert a Basic Disk to a Dynamic Disk
            2. Using DiskPart to Convert a Basic Disk to a Dynamic Disk
            3. Using Disk Management to Change a Dynamic Disk Back to a Basic Disk
            4. Using DiskPart to Convert a Dynamic Disk to a Basic Disk
        5. Converting FAT or FAT32 to NTFS
          1. Working with Removable Disks
      5. Managing MBR Disk Partitions on Basic Disks
        1. Creating Partitions and Simple Volumes
        2. Formatting a Partition, Logical Drive, or Volume
        3. Configuring Drive Letters
        4. Configuring Mount Points
        5. Extending Partitions
        6. Shrinking Partitions
        7. Deleting a Partition, Logical Drive, or Volume
      6. Managing GPT Disk Partitions on Basic Disks
        1. ESP
        2. MSR Partitions
        3. Primary Partitions
        4. LDM Metadata and LDM Data Partitions
        5. OEM or Unknown Partitions
      7. Managing Volumes on Dynamic Disks
        1. Creating a Simple or Spanned Volume
        2. Configuring RAID 0: Striping
        3. Recovering a Failed Simple, Spanned, or Striped Disk
        4. Moving Dynamic Disks
        5. Configuring RAID 1: Disk Mirroring
          1. Creating a Mirrored Set Using Two New Disks
          2. Adding a Mirror to an Existing Volume
        6. Mirroring Boot and System Volumes
          1. Mirroring Boot and System Volumes on MBR Disks
          2. Mirroring Boot and System Volumes on GPT Disks
        7. Configuring RAID 5: Disk Striping with Parity
        8. Breaking or Removing a Mirrored Set
        9. Resolving Problems with Mirrored Sets
        10. Repairing a Mirrored System Volume
          1. Rebuilding Mirrored System Volumes on MBR Disks
          2. Rebuilding Mirrored System Volumes on GPT Disks
        11. Resolving Problems with RAID-5 Sets
    3. 15. TPM and BitLocker Drive Encryption
      1. Working with Trusted Platforms
      2. Managing TPM
        1. Understanding TPM States and Tools
        2. Initializing a TPM for First Use
        3. Turning an Initialized TPM On or Off
        4. Clearing the TPM
        5. Changing the TPM Owner Password
      3. Introducing BitLocker Drive Encryption
      4. Deploying BitLocker Drive Encryption
      5. Setting Up and Managing BitLocker Drive Encryption
        1. Creating the BitLocker Drive Encryption Partition for a Computer with No Operating System
        2. Creating the BitLocker Drive Encryption Partition for a Computer with an Operating System
        3. Configuring and Enabling BitLocker Drive Encryption
        4. Determining Whether a Computer Has BitLocker Encrypted Volumes
        5. Managing BitLocker Passwords and PINs
        6. Encrypting Server Data Volumes
        7. Recovering Data Protected by BitLocker Drive Encryption
        8. Disabling or Turning Off BitLocker Drive Encryption
    4. 16. Managing Windows Server 2008 File Systems
      1. Understanding Disk and File System Structure
      2. Using FAT
        1. File Allocation Table Structure
        2. FAT Features
      3. Using NTFS
        1. NTFS Structures
        2. NTFS Features
        3. Analyzing NTFS Structure
      4. Advanced NTFS Features
        1. Hard Links
        2. Data Streams
        3. Change Journals
        4. Object Identifiers
        5. Reparse Points
        6. Sparse Files
        7. Transactional NTFS
      5. Using File-Based Compression
        1. NTFS Compression
        2. Compressed (Zipped) Folders
      6. Managing Disk Quotas
        1. How Quota Management Works
        2. Configuring Disk Quotas
        3. Customizing Quota Entries for Individual Users
        4. Managing Disk Quotas After Configuration
        5. Exporting and Importing Quota Entries
      7. Maintaining File System Integrity
        1. How File System Errors Occur
        2. Fixing File System Errors by Using Check Disk
        3. Analyzing FAT Volumes by Using ChkDsk
        4. Analyzing NTFS Volumes by Using ChkDsk
        5. Repairing Volumes and Marking Bad Sectors by Using ChkDsk
      8. Defragmenting Disks
        1. Configuring Automated Defragmentation
        2. Fixing Fragmentation by Using Disk Defragmenter
        3. Understanding the Fragmentation Analysis
    5. 17. File Sharing and Security
      1. File Sharing Essentials
        1. Understanding File-Sharing Models
        2. Using and Finding Shares
        3. Hiding and Controlling Share Access
        4. Special and Administrative Shares
          1. C$, D$, E$, and Other Drive Shares
          2. ADMIN$
          3. FAX$
          4. IPC$
          5. NETLOGON
          6. PRINT$
          7. PUBLIC
          8. SYSVOL
        5. Accessing Shares for Administration
      2. Creating and Publishing Shared Folders
        1. Creating Shares by Using Windows Explorer
        2. Creating Shares by Using Computer Management
        3. Publishing Shares in Active Directory
      3. Managing Share Permissions
        1. Understanding Share Permissions
        2. Configuring Share Permissions
      4. Managing File and Folder Permissions
        1. File and Folder Ownership
          1. Taking Ownership of a File or Folder
          2. Transferring Ownership
        2. Permission Inheritance for Files and Folders
          1. Changing Shaded Permissions and Stopping Inheritance
          2. Resetting and Replacing Permissions
        3. Configuring File and Folder Permissions
          1. Basic Permissions
          2. Special Permissions
        4. Determining Effective Permissions
      5. Managing File Shares After Configuration
      6. Auditing File and Folder Access
        1. Enabling Auditing for Files and Folders
        2. Specifying Files and Folders to Audit
        3. Monitoring the Security Logs
    6. 18. Using Volume Shadow Copy
      1. Shadow Copy Essentials
        1. Using Shadow Copies of Shared Folders
        2. How Shadow Copies Works
        3. Implementing Shadow Copies for Shared Folders
      2. Managing Shadow Copies in Computer Management
        1. Configuring Shadow Copies in Computer Management
        2. Maintaining Shadow Copies After Configuration
        3. Reverting an Entire Volume
      3. Configuring Shadow Copies at the Command Line
        1. Enabling Shadow Copying from the Command Line
        2. Create Manual Snapshots from the Command Line
        3. Viewing Shadow Copy Information
        4. Deleting Snapshot Images from the Command Line
        5. Disabling Shadow Copies from the Command Line
        6. Reverting Volumes from the Command Line
      4. Using Shadow Copies on Clients
    7. 19. Using Remote Desktop for Administration
      1. Remote Desktop for Administration Essentials
      2. Configuring Remote Desktop for Administration
        1. Enabling Remote Desktop for Administration on Servers
        2. Permitting and Restricting Remote Logon
        3. Configuring Remote Desktop for Administration Through Group Policy
      3. Supporting Remote Desktop Connection Clients
        1. Remote Desktop Connection Client
        2. Running the Remote Desktop Connection Client
        3. Running Remote Desktops
      4. Tracking Who’s Logged On
  9. 4. Managing Windows Server 2008 Networking and Print Services
    1. 20. Networking with TCP/IP
      1. Navigating Networking in Windows Server 2008
      2. Using TCP/IP
      3. Understanding IPv4 Addressing
        1. Unicast IPv4 Addresses
          1. Class A Networks
          2. Class B Networks
          3. Class C Networks
          4. Loopback, Public, and Private Addresses
        2. Multicast IPv4 Addresses
        3. Broadcast IPv4 Addresses
      4. Special IPv4 Addressing Rules
      5. Using Subnets and Subnet Masks
        1. Subnet Masks
        2. Network Prefix Notation
        3. Subnetting
          1. Subnetting Class A Networks
          2. Subnetting Class B Networks
          3. Subnetting Class C Networks
        4. Understanding IP Data Packets
      6. Getting and Using IPv4 Addresses
      7. Understanding IPv6
      8. Understanding Name Resolution
        1. Domain Name System
          1. Host Names
          2. Domain Names
          3. Fully Qualified Domain Name (FQDN)
          4. Name Resolution
        2. Windows Internet Naming Service (WINS)
        3. Link-Local Multicast Name Resolution (LLMNR)
    2. 21. Managing TCP/IP Networking
      1. Installing TCP/IP Networking
        1. Preparing for Installation of TCP/IP Networking
        2. Installing Network Adapters
        3. Installing Networking Services (TCP/IP)
      2. Configuring TCP/IP Networking
        1. Configuring Static IP Addresses
          1. Using the PING Command to Check an Address
          2. Configuring a Static IPv4 or IPv6 Address
        2. Configuring Dynamic IP Addresses and Alternate IP Addressing
        3. Configuring Multiple IP Addresses and Gateways
        4. Configuring DNS Resolution
          1. Basic DNS Settings
          2. Advanced DNS Settings
        5. Configuring WINS Resolution
      3. Managing Network Connections
        1. Checking the Status, Speed, and Activity for Local Area Connections
        2. Viewing Network Configuration Information
        3. Enabling and Disabling Local Area Connections
        4. Renaming Local Area Connections
      4. Troubleshooting and Testing Network Settings
        1. Diagnosing and Resolving Local Area Connection Problems
        2. Diagnosing and Resolving Internet Connection Problems
        3. Performing Basic Network Tests
        4. Diagnosing and Resolving IP Addressing Problems
        5. Diagnosing and Resolving Routing Problems
        6. Releasing and Renewing DHCP Settings
        7. Diagnosing and Resolving Name Resolution Issues
    3. 22. Managing DHCP
      1. DHCP Essentials
        1. DHCPv4 and Autoconfiguration
        2. DHCPv6 and Autoconfiguration
      2. DHCP Security Considerations
      3. Planning DHCPv4 and DHCPv6 Implementations
        1. DHCPv4 Messages and Relay Agents
        2. DHCPv6 Messages and Relay Agents
        3. DHCP Availability and Fault Tolerance for IPv4 and IPv6
          1. 50/50 Failover
          2. 80/20 Failover
          3. 100/100 Failover
      4. Setting Up DHCP Servers
        1. Installing the DHCP Server Service
        2. Authorizing DHCP Servers in Active Directory
        3. Creating and Configuring Scopes
          1. Creating Normal Scopes for IPv4 Addresses
          2. Creating Normal Scopes for IPv6 Addresses
          3. Creating Normal Scopes Using Netsh
        4. Using Exclusions
        5. Using Reservations
        6. Activating Scopes
      5. Configuring TCP/IP Options
        1. Levels of Options and Their Uses
        2. Options Used by Windows Clients
        3. Using User-Specific and Vendor-Specific TCP/IP Options
        4. Settings Options for All Clients
        5. Settings Options for RRAS and NAP Clients
        6. Setting Add-On Options for Directly Connected Clients
        7. Defining Classes to Get Different Option Sets
          1. Creating the Class
          2. Configuring Clients to Use the Class
      6. Advanced DHCP Configuration and Maintenance
        1. Configuring DHCP Audit Logging
        2. Binding the DHCP Server Service to a Network Interface
        3. Integrating DHCP and DNS
        4. Integrating DHCP and NAP
        5. Enabling Conflict Detection on DHCP Servers
        6. Saving and Restoring the DHCP Configuration
        7. Managing and Maintaining the DHCP Database
          1. Setting DHCP Database Properties
          2. Backing Up and Restoring the Database
      7. Setting Up DHCP Relay Agents
        1. Configuring and Enabling Routing and Remote Access
        2. Adding and Configuring the DHCP Relay Agent
    4. 23. Architecting DNS Infrastructure
      1. DNS Essentials
      2. Planning DNS Implementations
        1. Public and Private Namespaces
        2. Name Resolution Using DNS
        3. DNS Resource Records
        4. DNS Zones and Zone Transfers
          1. Zones That Aren’t Integrated with Active Directory
          2. Zones That Are Integrated with Active Directory
        5. Secondary Zones, Stub Zones, and Conditional Forwarding
        6. Integration with Other Technologies
      3. Security Considerations
        1. DNS Queries and Security
        2. DNS Dynamic Updates and Security
        3. External DNS Name Resolution and Security
      4. Architecting a DNS Design
        1. Split-Brain Design: Same Internal and External Names
        2. Separate-Name Design: Different Internal and External Names
    5. 24. Implementing and Managing DNS
      1. Installing the DNS Server Service
        1. Using DNS with Active Directory
        2. Using DNS Without Active Directory
        3. DNS Setup
      2. Configuring DNS Using the Wizard
        1. Configuring a Small Network Using the Configure A DNS Server Wizard
        2. Configuring a Large Network Using the Configure A DNS Server Wizard
      3. Configuring DNS Zones, Subdomains, Forwarders, and Zone Transfers
        1. Creating Forward Lookup Zones
        2. Creating Reverse Lookup Zones
        3. Configuring Forwarders and Conditional Forwarding
        4. Configuring Subdomains and Delegating Authority
        5. Configuring Zone Transfers
        6. Configuring Secondary Notification
      4. Adding Resource Records
        1. Host Address (A and AAAA) and Pointer (PTR) Records
        2. Canonical Name (CNAME) Records
        3. Mail Exchanger (MX) Records
        4. Name Server (NS) Records
        5. Start of Authority (SOA) Records
        6. Service Location (SRV) Records
      5. Deploying Global Names
      6. Maintaining and Monitoring DNS
        1. Configuring Default Application Directory Partitions and Replication Scope
        2. Setting Aging and Scavenging
        3. Configuring Logging and Checking DNS Server Logs
      7. Troubleshooting the DNS Client Service
        1. Try Reregistering the Client
        2. Check the Client’s TCP/IP Configuration
          1. Checking IPv4
          2. Checking IPv6
        3. Check the Client’s Resolver Cache
        4. Perform Lookups for Troubleshooting
      8. Troubleshooting the DNS Server Service
        1. Check the Server’s TCP/IP Configuration
        2. Check the Server’s Cache
        3. Check Replication to Other Name Servers
        4. Examine the Configuration of the DNS Server
        5. Examine Zones and Zone Records
    6. 25. Implementing and Maintaining WINS
      1. WINS Essentials
        1. NetBIOS Namespace and Scope
        2. NetBIOS Node Types
        3. WINS Name Registration and Cache
        4. WINS Implementation Details
      2. Setting Up WINS Servers
      3. Configuring Replication Partners
        1. Replication Essentials
        2. Configuring Automatic Replication Partners
        3. Using Designated Replication Partners
      4. Configuring and Maintaining WINS
        1. Configuring Burst Handling
        2. Checking Server Status and Configuration
        3. Checking Active Registrations and Scavenging Records
        4. Maintaining the WINS Database
          1. Verifying the WINS Database Consistency
          2. Compacting the WINS Database
          3. Backing Up the WINS Database
          4. Restoring the WINS Database
      5. Enabling WINS Lookups Through DNS
    7. 26. Deploying Print Services
      1. Understanding Windows Server 2008 Print Services
      2. Planning for Printer Deployments and Consolidation
        1. Sizing Print Server Hardware and Optimizing Configuration
        2. Sizing Printer Hardware and Optimizing Configuration
      3. Setting Up Print Servers
        1. Installing a Print Server
        2. Installing Network Printers Automatically
        3. Adding Local Printers
        4. Adding Network-Attached Printers
        5. Changing Standard TCP/IP Port Monitor Settings
        6. Connecting Users to Shared Printers
          1. Accessing Shared Printers on Windows 2000 or Later
          2. Connecting to Shared Printers Using the Command Line and Scripts
        7. Deploying Printer Connections
        8. Configuring Point and Print Restrictions
      4. Managing Printers Throughout the Organization
        1. Managing Your Printers
        2. Migrating Printers and Print Queues
        3. Monitoring Printers and Printer Queues Automatically
    8. 27. Managing and Maintaining Print Services
      1. Managing Printer Permissions
        1. Understanding Printer Permissions
        2. Configuring Printer Permissions
        3. Assigning Printer Ownership
        4. Auditing Printer Access
      2. Managing Print Server Properties
        1. Viewing and Creating Printer Forms
        2. Viewing and Configuring Printer Ports
        3. Viewing and Configuring Print Drivers
        4. Configuring Print Spool, Logging, and Notification Settings
      3. Managing Printer Properties
        1. Setting General Properties, Printing Preferences, and Document Defaults
        2. Setting Overlays and Watermarks for Documents
        3. Installing and Updating Print Drivers on Clients
        4. Configuring Printer Sharing and Publishing
        5. Optimizing Printing Through Queues and Pooling
          1. Configuring Queue Priority and Scheduling
          2. Configuring Printer Pooling
        6. Configuring Print Spooling
        7. Viewing the Print Processor and Default Data Type
        8. Configuring Separator Pages
          1. Using Separator Pages
          2. Setting a Separator Page
          3. Customizing Separator Pages
        9. Configuring Color Profiles
      4. Managing Print Jobs
        1. Pausing, Starting, and Canceling All Printing
        2. Viewing Print Jobs
        3. Managing a Print Job and Its Properties
      5. Printer Maintenance and Troubleshooting
        1. Monitoring Print Server Performance
        2. Preparing for Print Server Failure
        3. Solving Printing Problems
          1. Printer Troubleshooting Essentials
          2. Comprehensive Printer Troubleshooting
          3. Resolving Garbled or Incorrect Printing
    9. 28. Deploying Terminal Services
      1. Using Terminal Services
        1. Terminal Services Clients
        2. Terminal Services Servers
        3. Terminal Services Licensing
      2. Designing the Terminal Services Infrastructure
        1. Capacity Planning for Terminal Services
        2. Planning Organizational Structure for Terminal Services
        3. Deploying Single-Server Environments
        4. Deploying Multi-Server Environments
      3. Setting Up Terminal Services
        1. Installing a Terminal Server
        2. Installing Applications for Clients to Use
          1. Choosing Applications for Terminal Services Users
          2. Application Licensing for Terminal Services Users
          3. Installing Applications for Terminal Services Users
          4. Using Application Compatibility Scripts
          5. Modifying Applications After Installation
        3. Enabling and Joining the Terminal Services Session Broker Service
          1. Enable and Start the Terminal Services Session Broker Service
          2. Authorize Terminal Servers to Use the Terminal Services Session Broker Service
          3. Configure Each Server to Join the TS Session Broker
          4. Configure Round Robin DNS
        4. Setting Up a Terminal Services License Server
          1. Considerations for Installing a Terminal Services License Server
          2. Installing a Terminal Services License Server
          3. Activating the License Server and Configuring Licenses for Use
      4. Using the Terminal Services Configuration Tool
        1. Configuring Global Connection Settings
        2. Configuring Server Settings
        3. Configuring Terminal Services Security
        4. Auditing Terminal Services Access
      5. Configuring RemoteApps
        1. Making Programs Available as RemoteApps
        2. Deploying RemoteApps
          1. Accessing RemoteApps Using TS Web Access
          2. Creating an .RDP File
          3. Creating a Windows Installer Package
        3. Configuring Deployment Settings for All RemoteApps
        4. Modifying or Removing a RemoteApp Program
      6. Using Terminal Services Manager
        1. Connecting to Terminal Servers
        2. Getting Terminal Services Information
        3. Managing User Sessions in Terminal Services Manager
      7. Managing Terminal Services from the Command Line
        1. Gathering Terminal Services Information
        2. Managing User Sessions from the Command Line
      8. Other Useful Terminal Services Commands
      9. Configuring Terminal Services Per-User Settings
        1. Getting Remote Control of a User’s Session
        2. Setting Up the Terminal Services Profile for Users
  10. 5. Managing Active Directory and Security
    1. 29. Active Directory Architecture
      1. Active Directory Physical Architecture
        1. Active Directory Physical Architecture: A Top-Level View
        2. Active Directory Within the Local Security Authority
        3. Directory Service Architecture
          1. Protocols and Client Interfaces
          2. Directory System Agent and Database Layer
          3. Extensible Storage Engine
        4. Data Store Architecture
      2. Active Directory Logical Architecture
        1. Active Directory Objects
        2. Active Directory Domains, Trees, and Forests
        3. Active Directory Trusts
        4. Active Directory Namespaces and Partitions
        5. Active Directory Data Distribution
    2. 30. Designing and Managing the Domain Environment
      1. Design Considerations for Active Directory Replication
      2. Design Considerations for Active Directory Search and Global Catalogs
        1. Searching the Tree
        2. Accessing the Global Catalog
        3. Designating Global Catalog Servers
        4. Designating Replication Attributes
      3. Design Considerations for Compatibility
        1. Understanding Domain Functional Level
        2. Understanding Forest Functional Level
        3. Raising the Domain or Forest Functional Level
      4. Design Considerations for Active Directory Authentication and Trusts
        1. Universal Groups and Authentication
          1. Understanding Security Tokens and Universal Group Membership Caching
          2. Enabling Universal Group Membership Caching
        2. NTLM and Kerberos Authentication
          1. Establishing the Initial Authentication
          2. Accessing Resources After Authentication
        3. Authentication and Trusts Across Domain Boundaries
          1. Two-Way Transitive Trusts
          2. Shortcut Trusts
        4. Authentication and Trusts Across Forest Boundaries
        5. Examining Domain and Forest Trusts
        6. Establishing External, Shortcut, Realm, and Cross-Forest Trusts
        7. Verifying and Troubleshooting Trusts
      5. Delegating Authentication
        1. Delegated Authentication Essentials
        2. Configuring Delegated Authentication
          1. Configuring the Delegated User Account
          2. Configuring the Delegated Service or Computer Account
      6. Design Considerations for Active Directory Operations Masters
        1. Operations Master Roles
        2. Using, Locating, and Transferring the Schema Master Role
        3. Using, Locating, and Transferring the Domain Naming Master Role
        4. Using, Locating, and Transferring the Relative ID Master Role
        5. Using, Locating, and Transferring the PDC Emulator Role
        6. Using, Locating, and Transferring the Infrastructure Master Role
        7. Seizing Operations Master Roles
    3. 31. Organizing Active Directory
      1. Creating an Active Directory Implementation or Update Plan
        1. Developing a Forest Plan
        2. Forest Namespace
        3. Single vs. Multiple Forests
        4. Forest Administration
      2. Developing a Domain Plan
        1. Domain Design Considerations
        2. Single vs. Multiple Domains
        3. Forest Root Domain Design Configurations
        4. Changing Domain Design
      3. Developing an Organizational Unit Plan
        1. Using Organizational Units (OUs)
        2. Using OUs for Delegation
        3. Using OUs for Group Policy
        4. Creating an OU Design
          1. OU Design: Division or Business Unit Model
          2. OU Design: Geographic Model
          3. OU Design: The Cost Center Model
          4. OU Design: The Administration Model
    4. 32. Configuring Active Directory Sites and Replication
      1. Working with Active Directory Sites
        1. Single Site vs. Multiple Sites
        2. Replication Within and Between Sites
        3. Determining Site Boundaries
      2. Understanding Active Directory Replication
        1. Replication Enhancements for Active Directory
        2. Replication Enhancements for the Active Directory System Volume
        3. Replication Architecture: An Overview
        4. Intersite Replication Essentials
      3. Replication Rings and Directory Partitions
      4. Developing or Revising a Site Design
        1. Mapping Network Infrastructure
        2. Creating a Site Design
          1. Mapping the Network Structure to Site Structure
          2. Designing Each Individual Site
          3. Designing the Intersite Replication Topology
          4. Considering the Impact of Site Link Bridging
          5. Planning the Placement of Servers in Sites
    5. 33. Implementing Active Directory Domain Services
      1. Preinstallation Considerations for Active Directory
        1. Hardware and Configuration Considerations for Domain Controllers
        2. Configuring Active Directory for Fast Recovery with Storage Area Networks
        3. Connecting Clients to Active Directory
      2. Installing Active Directory Domain Services
        1. Active Directory Installation Options and Issues
        2. Using the Active Directory Domain Services Installation Wizard
          1. Creating Additional Domain Controllers for an Existing Domain
          2. Creating New Domains in New Forests
          3. Creating a New Domain or Domain Tree Within an Existing Forest
        3. Performing an Active Directory Installation from Media
      3. Uninstalling Active Directory
      4. Creating and Managing Organizational Units (OUs)
        1. Creating an OU
        2. Setting OU Properties
        3. Creating or Moving Accounts and Resources for Use with an OU
      5. Delegating Administration of Domains and OUs
        1. Understanding Delegation of Administration
        2. Delegating Administration
    6. 34. Deploying Read-Only Domain Controllers
      1. Introducing Read-Only Domain Controllers
      2. Design Considerations for Read-Only Replication
      3. Installing RODCs
        1. Preparing for an RODC Installation
        2. Installing an RODC
        3. Installing an RODC from Media
      4. Managing Password Replication Policy
        1. Working with Password Replication Policy
        2. Allowing or Denying Accounts in Password Replication Policy
        3. Viewing and Managing Credentials on an RODC
        4. Determining Whether an Account Is Allowed or Denied Access
        5. Resetting Credentials
        6. Delegating Administrative Permissions
    7. 35. Managing Users, Groups, and Computers
      1. Managing Domain User Accounts
        1. Types of Users
        2. Configuring User Account Policies
          1. Enforcing Password Policy
          2. Configuring Account Lockout Policy
          3. Setting Kerberos Policy
        3. Creating Password Settings Objects and Applying Secondary Settings
        4. Understanding User Account Capabilities, Privileges, and Rights
        5. Assigning User Rights
          1. Assigning User Rights for a Domain or OU
          2. Assigning User Rights on a Specific Computer
        6. Creating and Configuring Domain User Accounts
          1. Viewing and Setting User Account Properties
          2. Obtaining Effective Permissions
        7. Configuring Account Options
        8. Configuring Profile Options
        9. Troubleshooting User Accounts
      2. Managing User Profiles
        1. Profile Essentials
        2. Implementing and Creating Preconfigured Profiles
        3. Configuring Local User Profiles
        4. Configuring Roaming User Profiles
        5. Implementing Mandatory User Profiles
        6. Switching Between a Local and a Roaming User Profile
      3. Managing User Data
        1. Using Folder Redirection
        2. Using Offline Files
          1. Configuring Offline Files on File Servers
          2. Configuring Offline Files on Clients
          3. Configuring Offline Files in Group Policy
        3. Managing File Synchronization
      4. Maintaining User Accounts
        1. Deleting User Accounts
        2. Disabling and Enabling User Accounts
        3. Moving User Accounts
        4. Renaming User Accounts
        5. Resetting a User’s Domain Password
        6. Unlocking User Accounts
        7. Creating a User Account Password Backup
      5. Managing Groups
        1. Understanding Groups
          1. Types of Groups
          2. Understanding the Scopes of Groups
            1. Domain Local Groups
            2. Global Groups
            3. Universal Groups
            4. Which Group Scope Should You Use?
            5. Why Use Domain Local Groups?
            6. Why Use Global Groups?
            7. Why Use Universal Groups?
        2. Creating a Group
        3. Adding Members to Groups
        4. Deleting a Group
        5. Modifying Groups
          1. Finding a Group
          2. Managing the Properties of Groups
          3. Modifying Other Group Settings
      6. Managing Computer Accounts
        1. Creating a Computer Account in Active Directory
        2. Joining Computers to a Domain
        3. Moving a Computer Account
        4. Disabling a Computer Account
        5. Deleting a Computer Account
        6. Managing a Computer Account
        7. Resetting a Computer Account
        8. Configuring Properties of Computer Accounts
        9. Troubleshooting Computer Accounts
    8. 36. Managing Group Policy
      1. Understanding Group Policy
        1. Local and Active Directory Group Policy
        2. Group Policy Settings
        3. Group Policy Architecture
        4. Administrative Templates
      2. Implementing Group Policy
        1. Working with Local Group Policy
        2. Working with the Group Policy Management Console
          1. Using the Group Policy Management Console
          2. Accessing Forests, Domains, and Sites in the Group Policy Management Console
          3. Creating and Linking a New GPO in the Group Policy Management Console
          4. Editing an Existing GPO in the Group Policy Management Console
          5. Linking to an Existing GPO in the Group Policy Management Console
          6. Working with Starter GPOs
          7. Deleting an Existing GPO in the Group Policy Management Console
        3. Working with the Default Group Policy Objects
      3. Managing Group Policy Through Delegation
        1. Managing GPO Creation Rights
        2. Reviewing Group Policy Management Privileges
        3. Delegating Group Policy Management Privileges
        4. Delegating Privileges for Links and RSoP
      4. Managing Group Policy Inheritance and Processing
        1. Group Policy Inheritance
        2. Changing Link Order and Precedence
        3. Overriding Inheritance
        4. Blocking Inheritance
        5. Enforcing Inheritance
        6. Filtering Group Policy Application
        7. Group Policy Processing
        8. Modifying Group Policy Processing
        9. Modifying User Policy Preference Using Loopback Processing
      5. Using Scripts in Group Policy
        1. Configuring Computer Startup and Shutdown Scripts
        2. Configuring User Logon and Logoff Scripts
      6. Applying Group Policy Through Security Templates
        1. Working with Security Templates
        2. Applying Security Templates
      7. Maintaining and Troubleshooting Group Policy
        1. Group Policy Refresh
        2. Modifying Group Policy Refresh
        3. Viewing Applicable GPOs and Last Refresh
        4. Modeling GPOs for Planning
        5. Refreshing Group Policy Manually
        6. Backing Up GPOs
        7. Restoring GPOs
        8. Fixing Default Group Policy
    9. 37. Active Directory Site Administration
      1. Managing Sites and Subnets
        1. Creating an Active Directory Site
        2. Creating a Subnet and Associating It with a Site
        3. Associating Domain Controllers with a Site
      2. Managing Site Links and Intersite Replication
        1. Understanding IP and SMTP Replication Transports
        2. Creating a Site Link
        3. Configuring Replication Schedules for Site Links
        4. Configuring Site Link Bridges
        5. Determining the ISTG
        6. Configuring Site Bridgehead Servers
        7. Configuring Advanced Site Link Options
      3. Monitoring and Troubleshooting Replication
        1. Using the Replication Administrator
        2. Monitoring Replication
        3. Modifying Intersite Replication for Testing
  11. 6. Windows Server 2008 Disaster Planning and Recovery
    1. 38. Planning for High Availability
      1. Planning for Software Needs
      2. Planning for Hardware Needs
        1. Planning for Support Structures and Facilities
        2. Planning for Day-to-Day Operations
        3. Planning for Deploying Highly Available Servers
    2. 39. Preparing and Deploying Server Clusters
      1. Introducing Server Clustering
        1. Benefits and Limitations of Clustering
        2. Cluster Organization
        3. Cluster Operating Modes
        4. Multisite Options for Clusters
      2. Using Network Load Balancing
        1. Using Network Load Balancing Clusters
        2. Network Load Balancing Configuration
        3. Network Load Balancing Port and Client Affinity Configurations
        4. Planning Network Load Balancing Clusters
      3. Managing Network Load Balancing Clusters
        1. Creating a New Network Load Balancing Cluster
        2. Adding Nodes to a Network Load Balancing Cluster
        3. Removing Nodes from a Network Load Balancing Cluster
        4. Configuring Event Logging for Network Load Balancing Clusters
        5. Controlling Cluster and Host Traffic
      4. Using Failover Clustering
        1. Failover Cluster Configurations
        2. Understanding Failover Cluster Resources
        3. Optimizing Hardware for Failover Clusters
        4. Optimizing Networking for Failover Clusters
      5. Running Failover Clusters
        1. The Cluster Service and Cluster Objects
        2. The Cluster Heartbeat
        3. The Cluster Database
        4. The Cluster Quorum Resource
        5. The Cluster Interface and Network States
      6. Creating Failover Clusters
        1. Validating a Configuration
        2. Creating a Failover Cluster
        3. Add Nodes to a Cluster
      7. Managing Failover Clusters and Their Resources
        1. Adding Storage to a Cluster
        2. Modifying Cluster Network Settings
        3. Configuring Cluster Quorum Settings
        4. Creating Clustered Resources
        5. Controlling the Cluster Service
        6. Configuring Resource Failover and Failback
        7. Creating a Shared Folder on a Clustered File Server
        8. Configuring Print Settings for a Clustered Print Server
    3. 40. Disaster Planning
      1. Preparing for a Disaster
        1. Developing Contingency Procedures
        2. Implementing Problem Escalation and Response Procedures
        3. Creating a Problem Resolution Policy Document
      2. Disaster Preparedness Procedures
        1. Performing Backups
        2. Using Startup Repair
        3. Getting Outside Help
        4. Other Windows Recovery Environment Features
        5. Setting Startup and Recovery Options
    4. 41. Backup and Recovery
      1. Developing Backup Strategies
        1. Creating Your Backup Strategy
        2. Backup Strategy Considerations
        3. Selecting the Optimal Backup Techniques
        4. Understanding Backup Types
        5. Using Media Rotation and Maintaining Additional Media Sets
      2. Backing Up and Recovering Your Data
        1. Using the Backup Utility
        2. Backing Up Your Data
        3. Scheduling Backups
        4. Performing a One-Time Backup
        5. Tracking Scheduled and Manual Backups
        6. Recovering Your Data
          1. Recovering Data from the Current Server
          2. Recovering Data from Another Server
        7. Recovering the System State
        8. Restoring the Operating System and the Full System
      3. Backing Up and Restoring Active Directory
        1. Backup and Recovery Strategies for Active Directory
        2. Performing a Nonauthoritative Restore of Active Directory
        3. Performing an Authoritative Restore of Active Directory
        4. Restoring Sysvol Data
        5. Restoring a Failed Domain Controller by Installing a New Domain Controller
      4. Troubleshooting Startup and Shutdown
        1. Resolving Startup Issues
        2. Repairing Missing or Corrupted System Files
        3. Resolving Restart or Shutdown Issues
  12. A. Index to Troubleshooting Topics
  13. B. About the Author
  14. C. Additional Resources for IT Professionals from Microsoft Press
    1. Windows Server
    2. Windows Client
    3. SQL Server 2005
    4. Exchange Server 2007
    5. Scripting
  15. D. More Great Resources for IT Professionals from Microsoft Press
    1. Administrator’s Pocket Consultant
    2. Administrator’s Companion
    3. Resource Kit
    4. Self-Paced Training Kit
  16. Index
  17. About the Author
  18. Copyright