You are previewing Windows Server 2012 R2 Pocket Consultant: Storage, Security, & Networking.
O'Reilly logo
Windows Server 2012 R2 Pocket Consultant: Storage, Security, & Networking

Book Description

Portable and precise, this pocket-sized guide delivers ready answers for administering Windows Server 2012 R2 storage, security, and networking features.

Table of Contents

  1. Special Upgrade Offer
  2. Acknowledgments
  3. Introduction
    1. Who is this book for?
    2. How is this book organized?
    3. Conventions used in this book
    4. Other resources
    5. Errata and book support
    6. We want to hear from you
    7. Stay in touch
  4. 1. Managing file systems and drives
    1. Managing the File And Storage Services role
    2. Adding hard drives
      1. Physical drives
      2. Preparing a physical drive for use
        1. The MBR and GPT partition styles
        2. Legacy and protective MBRs
        3. Disk types and file systems
      3. Using Disk Management
      4. Using removable storage devices
      5. Installing and checking for a new drive
      6. Understanding drive status
    3. Working with basic, dynamic, and virtual disks
      1. Using basic and dynamic disks
      2. Special considerations for basic and dynamic disks
      3. Changing drive types
        1. Converting a basic disk to a dynamic disk
        2. Changing a dynamic disk back to a basic disk
      4. Reactivating dynamic disks
      5. Rescanning disks
      6. Moving a dynamic disk to a new system
      7. Managing virtual hard disks
    4. Using basic disks and partitions
      1. Partitioning basics
      2. Creating partitions and simple volumes
      3. Formatting partitions
    5. Compressing drives and data
      1. Compressing drives
      2. Compressing directories and files
      3. Expanding compressed drives
      4. Expanding compressed directories and files
    6. Encrypting drives and data
      1. Understanding encryption and the encrypting file system
      2. Encrypting directories and files
      3. Working with encrypted files and folders
      4. Configuring recovery policies
      5. Decrypting files and directories
  5. 2. Configuring storage
    1. Using volumes and volume sets
      1. Understanding volume basics
      2. Understanding volume sets
      3. Creating volumes and volume sets
      4. Deleting volumes and volume sets
      5. Managing volumes
    2. Improving performance and fault tolerance with RAID
    3. Implementing RAID on Windows Server 2012 R2
      1. Implementing RAID-0: disk striping
      2. Implementing RAID-1: disk mirroring
        1. Creating a mirror set in Disk Management
        2. Mirroring an existing volume
      3. Implementing RAID-5: disk striping with parity
        1. Creating a striped set with parity in Disk Management
    4. Managing RAID and recovering from failures
      1. Breaking a mirrored set
      2. Resynchronizing and repairing a mirrored set
      3. Repairing a mirrored system volume to enable boot
      4. Removing a mirrored set
      5. Repairing a striped set without parity
      6. Regenerating a striped set with parity
    5. Standards-based storage management
      1. Getting started with standards-based storage
      2. Working with standards-based storage
      3. Using storage pools and allocating space
      4. Creating a storage pool
      5. Creating a virtual disk in a storage space
      6. Creating a standard volume
      7. Troubleshooting storage spaces
    6. Managing existing partitions and drives
      1. Assigning drive letters and paths
      2. Changing or deleting the volume label
      3. Deleting partitions and drives
      4. Converting a volume to NTFS
        1. Understanding the Convert utility syntax
        2. Using the Convert utility
      5. Resizing partitions and volumes
      6. Repairing disk errors and inconsistencies automatically
        1. Checking disks manually
        2. Running Check Disk interactively
      7. Analyzing and optimizing disks
  6. 3. Data sharing and redundancy
    1. Using and enabling file sharing
    2. Configuring standard file sharing
      1. Understanding SMB changes
      2. Viewing existing shares
      3. Creating shared folders in Computer Management
      4. Creating shared folders in Server Manager
      5. Changing shared folder settings
    3. Managing share permissions
      1. Understanding the various share permissions
      2. Viewing and configuring share permissions
    4. Managing existing shares
      1. Understanding special shares
      2. Connecting to special shares
      3. Viewing user and computer sessions
        1. Managing sessions and shares
          1. Ending Individual Sessions
          2. Ending All Sessions
        2. Managing open resources
          1. Closing an Open File
          2. Closing All Open Files
      4. Stopping file and folder sharing
    5. Configuring NFS sharing
    6. Using shadow copies
      1. Understanding shadow copies
      2. Creating shadow copies
      3. Restoring a shadow copy
      4. Reverting an entire volume to a previous shadow copy
      5. Deleting shadow copies
      6. Disabling shadow copies
    7. Connecting to network drives
      1. Mapping a network drive
      2. Disconnecting a network drive
    8. Configuring synced sharing
      1. Getting started with Work Folders
      2. Creating sync shares and enabling SMB access
      3. Accessing Work Folders on clients
  7. 4. Data security and auditing
    1. Object management, ownership, and inheritance
      1. Objects and object managers
      2. Object ownership and transfer
      3. Object inheritance
    2. File and folder permissions
      1. Understanding file and folder permissions
      2. Setting basic file and folder permissions
      3. Setting special permissions on files and folders
      4. Setting claims-based permissions
    3. Auditing system resources
      1. Setting auditing policies
      2. Auditing files and folders
      3. Auditing the registry
      4. Auditing Active Directory objects
    4. Using, configuring, and managing NTFS disk quotas
      1. Understanding NTFS disk quotas and how NTFS quotas are used
      2. Setting NTFS disk quota policies
      3. Enabling NTFS disk quotas on NTFS volumes
      4. Viewing disk quota entries
      5. Creating disk quota entries
      6. Deleting disk quota entries
      7. Exporting and importing NTFS disk quota settings
      8. Disabling NTFS disk quotas
    5. Using, configuring, and managing Resource Manager disk quotas
      1. Understanding Resource Manager disk quotas
      2. Managing disk quota templates
      3. Creating Resource Manager disk quotas
  8. 5. Enhancing computer security
    1. Using security templates
      1. Using the Security Templates and Security Configuration And Analysis snap-ins
      2. Reviewing and changing template settings
        1. Changing settings for account, local, and event log policies
        2. Configuring restricted groups
        3. Enabling, disabling, and configuring system services
        4. Configuring security settings for registry and file system paths
      3. Analyzing, reviewing, and applying security templates
      4. Deploying security templates to multiple computers
    2. Using the Security Configuration Wizard
      1. Creating security policies
      2. Editing security policies
      3. Applying security policies
      4. Rolling back the last applied security policy
      5. Deploying a security policy to multiple computers
  9. 6. Managing users and computers with Group Policy
    1. Centrally managing special folders
      1. Redirecting a special folder to a single location
      2. Redirecting a special folder based on group membership
      3. Removing redirection
    2. User and computer script management
      1. Assigning computer startup and shutdown scripts
      2. Assigning user logon and logoff scripts
    3. Deploying software through Group Policy
      1. Getting to know Software Installation policy
      2. Deploying software throughout your organization
      3. Configuring software deployment options
      4. Updating deployed software
      5. Upgrading deployed software
    4. Automatically configuring Work Folders
    5. Automatically enrolling computer and user certificates
    6. Managing Automatic Updates in Group Policy
      1. Configuring Automatic Updates
      2. Optimizing Automatic Updates
      3. Using intranet update service locations
  10. 7. Managing TCP/IP networking
    1. Navigating networking in Windows Server 2012 R2
    2. Managing networking in Windows 8.1 and Windows Server 2012 R2
    3. Installing TCP/IP networking
    4. Configuring TCP/IP networking
      1. Configuring static IP addresses
        1. Using the <span xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops" xmlns:m="http://www.w3.org/1998/Math/MathML" xmlns:pls="http://www.w3.org/2005/01/pronunciation-lexicon" xmlns:ssml="http://www.w3.org/2001/10/synthesis" xmlns:svg="http://www.w3.org/2000/svg" class="bolditalic">ping</span> command to check an address command to check an address
        2. Configuring a static IPv4 or IPv6 address
      2. Configuring dynamic IP addresses and alternate IP addressing
      3. Configuring multiple gateways
      4. Configuring networking for Hyper-V
    5. Managing network connections
      1. Checking the status, speed, and activity for network connections
      2. Enabling and disabling network connections
      3. Renaming network connections
  11. 8. Running DHCP clients and servers
    1. Understanding DHCP
      1. Using dynamic IPv4 addressing and configuration
      2. Using dynamic IPv6 addressing and configuration
      3. Checking IP address assignment
      4. Understanding scopes
    2. Installing a DHCP server
      1. Installing DHCP components
      2. Starting and using the DHCP console
      3. Connecting to remote DHCP servers
      4. Starting and stopping a DHCP server
      5. Authorizing a DHCP server in Active Directory
    3. Configuring DHCP servers
      1. Configuring server bindings
      2. Updating DHCP statistics
      3. Auditing and troubleshooting DHCP
      4. Integrating DHCP and DNS
      5. Integrating DHCP and NAP
      6. Avoiding IP address conflicts
      7. Saving and restoring the DHCP configuration
    4. Managing DHCP scopes
      1. Creating and managing superscopes
        1. Creating superscopes
        2. Adding scopes to a superscope
        3. Removing scopes from a superscope
        4. Activating and deactivating a superscope
        5. Deleting a superscope
      2. Creating and managing scopes
        1. Creating normal scopes for IPv4 addresses
        2. Creating normal scopes for IPv6 addresses
        3. Creating multicast scopes
        4. Setting scope options
          1. Viewing and Assigning Server Options
          2. Viewing and Assigning Scope Options
          3. Viewing and Assigning Reservation Options
        5. Modifying scopes
        6. Activating and deactivating scopes
        7. Enabling the Bootstrap Protocol
        8. Removing a scope
        9. Configuring multiple scopes on a network
      3. Creating and managing failover scopes
        1. Creating failover scopes
        2. Modifying or removing failover scopes
    5. Managing the address pool, leases, and reservations
      1. Viewing scope statistics
      2. Enabling and configuring MAC address filtering
      3. Setting a new exclusion range
      4. Reserving DHCP addresses
        1. Releasing addresses and leases
      5. Modifying reservation properties
      6. Deleting leases and reservations
    6. Backing up and restoring the DHCP database
      1. Backing up the DHCP database
      2. Restoring the DHCP database from backup
      3. Using backup and restore to move the DHCP database to a new server
      4. Forcing the DHCP Server service to regenerate the DHCP database
      5. Reconciling leases and reservations
  12. 9. Optimizing DNS
    1. Understanding DNS
      1. Integrating Active Directory and DNS
      2. Enabling DNS on the network
    2. Configuring name resolution on DNS clients
    3. Installing DNS servers
      1. Installing and configuring the DNS Server service
      2. Configuring a primary DNS server
      3. Configuring a secondary DNS server
      4. Configuring reverse lookups
      5. Configuring global names
    4. Managing DNS servers
      1. Adding and removing servers to manage
      2. Starting and stopping a DNS server
      3. Using DNSSEC and Signing Zones
      4. Creating child domains within zones
      5. Creating child domains in separate zones
      6. Deleting a domain or subnet
    5. Managing DNS records
      1. Adding address and pointer records
        1. Adding a PTR record later
      2. Adding DNS aliases with CNAME
      3. Adding mail exchange servers
      4. Adding name servers
      5. Viewing and updating DNS records
    6. Updating zone properties and the SOA record
      1. Modifying the SOA record
      2. Allowing and restricting zone transfers
      3. Notifying secondaries of changes
      4. Setting the zone type
      5. Enabling and disabling dynamic updates
    7. Managing DNS server configuration and security
      1. Enabling and disabling IP addresses for a DNS server
      2. Controlling access to DNS servers outside the organization
        1. Creating nonforwarding and forwarding-only servers
        2. Creating forwarding servers
        3. Configuring conditional forwarding
      3. Enabling and disabling event logging
      4. Using debug logging to track DNS activity
      5. Monitoring a DNS server
  13. 10. Administering network printers and print services
    1. Managing the Print and Document Services role
      1. Using print devices
      2. Printing essentials
      3. Configuring print servers
      4. Enabling and disabling file and printer sharing
    2. Getting started with Print Management
    3. Installing printers
      1. Using the autoinstall feature of Print Management
      2. Installing and configuring physically attached print devices
      3. Installing network-attached print devices
      4. Connecting to printers created on the network
      5. Deploying printer connections
      6. Configuring point and print restrictions
      7. Moving printers to a new print server
      8. Monitoring printers and printer queues automatically
      9. Solving spooling problems
    4. Configuring printer properties
      1. Adding comments and location information
      2. Listing printers in Active Directory
      3. Managing printer drivers
        1. Updating a printer driver
        2. Configuring drivers for network clients
      4. Setting a separator page and changing print device mode
      5. Changing the printer port
      6. Scheduling and prioritizing print jobs
        1. Scheduling printer availability
        2. Setting printer priority
        3. Configuring print spooling
          1. Enabling Spooling
          2. Other Spooling Options
      7. Starting and stopping printer sharing
      8. Setting printer access permissions
      9. Auditing print jobs
      10. Setting document defaults
    5. Configuring print server properties
      1. Locating the Spool folder and enabling printing on NTFS
      2. Managing high-volume printing
      3. Enabling print job error notification
    6. Managing print jobs on local and remote printers
      1. Viewing printer queues and print jobs
      2. Pausing the printer and resuming printing
      3. Emptying the print queue
      4. Pausing, resuming, and restarting individual document printing
      5. Removing a document and canceling a print job
      6. Checking the properties of documents in the printer
      7. Setting the priority of individual documents
      8. Scheduling the printing of individual documents
  14. 11. Data backup and recovery
    1. Creating a backup and recovery plan
      1. Figuring out a backup plan
      2. Basic types of backup
      3. Differential and incremental backups
      4. Selecting backup devices and media
      5. Common backup solutions
      6. Buying and using backup media
      7. Selecting a backup utility
    2. Backing up your data: the essentials
      1. Installing the Windows backup and recovery utilities
      2. Getting started with Windows Server Backup
      3. Getting started with the Backup Command-Line utility
      4. Working with Wbadmin commands
      5. Using general-purpose commands
      6. Using backup management commands
      7. Using recovery management commands
    3. Performing server backups
      1. Configuring scheduled backups
      2. Modifying or stopping scheduled backups
      3. Creating and scheduling backups with Wbadmin
      4. Running manual backups
      5. Recovering your server from hardware or startup failure
      6. Recovering from a failed start
      7. Starting a server in safe mode
      8. Backing up and restoring the system state
      9. Restoring Active Directory
      10. Restoring the operating system and the full system
      11. Restoring applications, nonsystem volumes, and files and folders
    4. Managing encryption recovery policy
      1. Understanding encryption certificates and recovery policy
      2. Configuring the EFS recovery policy
    5. Backing up and restoring encrypted data and certificates
      1. Backing up encryption certificates
      2. Restoring encryption certificates
  15. A. About the author
  16. Index
  17. About the Author
  18. Special Upgrade Offer
  19. Copyright