Download Windows.server.2008.R2.Secrets PDF

TitleWindows.server.2008.R2.Secrets
File Size10.5 MB
Total Pages578
Table of Contents
                            Windows Server 2008 R2 Secrets
	About the Author
	About the Technical Editor
	Acknowledgments
	Read This First
		Who This Book Is For
		What This Book Covers
		How This Book Is Structured
		What You Need to Use This Book
		Features and Icons Used in This Book
	Part I: Depolyment and Administration Secrets
		Chapter 1: Windows Server 2008 R2 Deployment Secrets
			Choosing an Edition of Windows Server 2008 R2
			Deciding Between Types of Installation
			Optimizing Your Deployment Image
			Minimizing Deployment Time
			Activating Windows
			Summary
		Chapter 2: The Windows Server 2008 R2 Administrator's Toolkit
			Choosing the Right Remote Administration Tool
			Remote Desktop
			Management Consoles
			Remote Windows PowerShell
			Emergency Management Services (When All Else Fails)
			Summary
		Chapter 3: Server Core Secrets
			Using Server Core Administration Tools
			Performing Server Core Post-Deployment Tasks
			Understanding the Sconfig.cmd
			Administering with Server Core Configurator
			Understanding Server Core Infrastructure Roles
			Summary
		Chapter 4: Active Directory Domains and Forests
			Understanding Forests and Domains
			Setting Domain and Forest Functional Levels
			Selecting the DNS Server
			Defining Active Directory Sites
			Defining FSMO Roles
			Using Read-Only Domain Controllers
			Securing with Global Catalog Servers and Universal Group Membership Caching
			Maintaining the Active Directory Database
			Summary
		Chapter 5: Effectively Managing Group Policy
			Applying Group Policy
			Using Group Policy Management Console
			Using Important Group Policy Features
			Completing Common Group Policy Tasks
			Summary
		Chapter 6: Managing Users and Computers
			Using Organizational Unit Structures
			Managing User Accounts
			Configuring Account Policies
			Managing Groups
			Creating Computer Accounts
			Summary
		Chapter 7: Managing Active Directory Certificate Services
			Understanding Certification Authority Types
			Managing Certification Authorities
			Using Certificate Templates
			Utilizing Certificate Autoenrollment
			Recovering Certificates
			Backing Up Certificate Services
			Revoking Certificates
			Summary
	Part II: Network Infrastructure and Security Secrets
		Chapter 8: Network Addressing
			Understanding IPv4 and DHCP
			Understanding IPv6
			Transitioning to IPv6
			Summary
			Understanding Windows Firewall with Advanced Security
		Chapter 9: Securing the Network: Windows Firewall and Network Access Protection
			Understanding Connection Security Rules
			Understanding and Configuring Network Access Protection
			Summary
	Part III: Shared Folder and Data Protection Secrets
		Chapter 10: Secrets behind Shared Folders
			Using the Share and Storage Management Console
			Using File Server Resource Manager
			Working with the Distributed File System
			Utilizing BranchCache
			Working with Offline Files
			Summary
		Chapter 11: Keeping Data Private
			Encrypting File System
			Encrypting with BitLocker
			Using Active Directory Rights Management Services
			Summary
		Chapter 12: Backup and Recovery
			Using and Configuring Windows Server Backup
			Enabling Shadow Copies of Shared Folders
			Performing Recovery
			Using System Center Data Protection Manager
			Summary
	Part IV: Infrastructure Services
		Chapter 13: Internet Information Services
			Managing Sites
			Managing Application Pools
			IIS Users and Delegation
			Managing FTP
			Summary
		Chapter 14: Configuring Hyper-V Virtual Machines
			Configuring Hyper-V
			Understanding Virtual Hard Disks
			Understanding Hyper-V Networks
			Using Virtual Machine Snapshots
			Migrating Virtual Machines
			Summary
		Chapter 15: Patch Management with WSUS
			Defining an Update Process
			Installing and Deploying WSUS
			Deploying Updates
			Understanding WSUS Topologies
			Verifying Update Deployment
			Going Further
			Summary
		Chapter 16: High Availablity
			Understanding Network Load Balancing
			Allocating Storage to iSCSI SAN
			Understanding Failover Clustering
			Summary
	Part V: Remote Access Secrets
		Chapter 17: Presentation and Application Virtualization
			Understanding Remote Desktop Session Host
			Running RemoteApp
			Using Remote Desktop Web Access
			Utilizing Remote Desktop Connection Broker
			Connecting via Remote Desktop Gateway
			Remote Desktop Licensing
			Understanding Remote Desktop Virtualization Host
			Virtualizing Applications with App-V
			Summary
		Chapter 18: Remote Access
			Setting up Remote Desktop Gateway
			Deploying Virtual Private Networks
			Connecting via DirectAccess
			Summary
	Part VI: Maintenance and Monitoring Secrets
		Chapter 19: Getting the Most Out of Event Logs and Auditing
			Auditing Windows Server 2008 R2
			Filtering and Viewing Event Logs
			Event Log Forwarding
			Creating Event Viewer Tasks
			Going Further with Operations Manager
			Summary
			Monitoring Point-in-Time Performance
		Chapter 20: Performance and Resource Management
			Understanding Data Collector Sets
			Using Windows Server Resource Manager
			Summary
	Index
                        

Similer Documents