Atjaunināt sīkdatņu piekrišanu

Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSA Certified on Windows 2000 (70-292) [Mīkstie vāki]

3.73/5 (15 ratings by Goodreads)
  • Formāts: Paperback / softback, 776 pages
  • Izdošanas datums: 01-Oct-2006
  • Izdevniecība: John Wiley & Sons Inc
  • ISBN-10: 0470068892
  • ISBN-13: 9780470068892
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 128,60 €*
  • * Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena
  • Šī grāmata vairs netiek publicēta. Jums tiks paziņota lietotas grāmatas cena.
  • Daudzums:
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 776 pages
  • Izdošanas datums: 01-Oct-2006
  • Izdevniecība: John Wiley & Sons Inc
  • ISBN-10: 0470068892
  • ISBN-13: 9780470068892
Citas grāmatas par šo tēmu:
A complete program with textbook, lab manual, and software, this Microsoft Official Academic Course provides everything students need to build the knowledge and skills necessary to install, configure, administer, and support the primary services in the Windows Server 2003 operating system. In addition, this textbook will help students to prepare for Microsoft Certified Professional (MCP) Exam 70-292: Managing and Maintaining a Microsoft Windows Server 2003 Environment for an MCSA Certified on Windows 2000. A complete set of instructor resources supports the book.
About this Book xv
Target Audience xv
Prerequisites xv
The Textbook xvi
The Supplemental Course Materials CD-ROM xvii
Readiness Review Suite Setup Instructions xvii
eBook Setup Instructions xviii
The Lab Manual xviii
Notational Conventions xix
Keyboard Conventions xx
Coverage Of Exam Objectives xx
The Microsoft Certified Professional Program xxiii
Certifications xxiv
MCP Requirements xxiv
About The Authors xxv
For Microsoft Official Academic Course Support xxvi
Evaluation Edition Software Support xxvi
Introduction To Windows Server 2003
1(38)
Overview Of Windows Server 2003 Editions
2(7)
Windows Server 2003, Standard Edition
3(2)
Windows Server 2003, Enterprise Edition
5(1)
Windows Server 2003, Datacenter Edition
6(2)
Windows Server 2003, Web Edition
8(1)
Windows Server 2003 Hardware Requirements
9(3)
Upgrading To Windows Server 2003
12(2)
Upgrading versus Migrating
12(1)
Supported Upgrade Paths
13(1)
Verifying System Compatibility
14(3)
The Windows Catalog
15(1)
Compatibility Tools and Resources
16(1)
New Features In Windows Server 2003
17(14)
Enhanced Administration Features
19(1)
New Security Enhancements
20(2)
New Administrative Tools and Utilities
22(5)
New Disaster Recovery Tools and Features
27(4)
Summary
31(1)
Review Questions
32(2)
Case Scenarios
34(5)
Scenario 1-1: Upgrade and Migration Strategies
34(2)
Scenario 1-2: Backup and Recovery Strategies
36(3)
Reviewing Active Directory Concepts
39(38)
The Role Of Directory Services
40(2)
Logical Components Of Active Directory
42(11)
Domains
42(2)
Trees
44(2)
Forests
46(1)
Organizational Units
47(1)
Domain and Forest Functional Levels
48(5)
Physical Components Of Active Directory
53(5)
Sites
54(2)
Domain Controllers
56(2)
Installing Active Directory
58(8)
Upgrading a Windows 2000 Server Forest to Windows Server 2003
58(1)
Installing Active Directory Using the Active Directory Installation Wizard
59(3)
Installing Active Directory Using an Answer File
62(1)
Installing Active Directory Using the Network or Backup Media
63(2)
Installing Active Directory Using the Configure Your Server Wizard
65(1)
Deploying Global Catalog Servers
66(1)
Locating Global Catalog Servers
66(2)
Configuring Global Catalog Servers
68(1)
Universal Group Membership Caching
68(2)
Implementing Universal Group Membership Caching
70(1)
Summary
71(1)
Review Questions
72(2)
Case Scenarios
74(3)
Scenario 2-1: Configuring Windows Server 2003 Domain Controllers
74(1)
Scenario 2-2: Global Catalogs versus Universal Group Membership Caching
75(2)
Reviewing Group Policy
77(24)
Reviewing Group Policy Components
78(3)
Understanding GPOs
81(3)
Local GPOs
81(1)
Active Directory-Based GPOs
81(1)
GPO Storage
82(1)
Creating GPOs
82(1)
Linking GPOs
83(1)
Editing Group Policy Objects
83(1)
Exploring Group Policy Settings
84(5)
Computer and User Configuration Nodes
84(1)
Software Settings Node
85(1)
Windows Settings Node
86(1)
Administrative Templates Node
87(2)
Understanding GPO Application
89(8)
Group Policy Inheritance
91(1)
Exceptions to the Application Order
92(2)
Using Security Groups to Filter GPO Scope
94(1)
Using WMI Queries to Filter GPO Scope
95(1)
Resultant Set of Policy
96(1)
Summary
97(1)
Review Questions
97(1)
Case Scenarios
98(3)
Scenario 3-1: GPO Application
98(1)
Scenario 3-2: GPO Application Filtering
99(2)
Managing Users and Groups
101(48)
Users And Groups
102(1)
Creating And Modifying User Accounts
103(13)
Creating User Objects with Active Directory Users and Computers
104(5)
Managing User Objects with Active Directory Users and Computers
109(5)
Creating and Using User Object Templates
114(1)
Active Directory Naming Standards
115(1)
Understanding, Creating, And Managing Groups
116(17)
Group Types
117(2)
Group Scope
119(4)
Default Groups
123(4)
Special Identities
127(1)
Creating Security Groups
128(2)
Modifying Group Membership
130(3)
Securing And Troubleshooting Authentication
133(9)
Securing Authentication with Policy
133(6)
Auditing Authentication
139(1)
Administering and Troubleshooting Authentication
140(2)
Summary
142(1)
Review Questions
143(2)
Case Scenarios
145(4)
Scenario 4-1: Implementing Users and Groups
145(1)
Scenario 4-2: Managing Users and Authentication
146(3)
Systems Administration and Terminal Server
149(52)
Remote Administration Of Windows Server 2003
150(26)
The Microsoft Management Console
150(10)
HTML Remote Administration Tools
160(2)
Managing Servers with Remote Desktop For Administration
162(7)
Using Remote Assistance
169(7)
Supporting And Troubleshooting Terminal Server
176(19)
Installing and Configuring a Terminal Server Environment
176(5)
Managing and Troubleshooting Terminal Server
181(9)
Managing User Sessions
190(5)
Summary
195(1)
Review Questions
196(2)
Case Scenarios
198(3)
Scenario 5-1: Remote Administration
198(1)
Scenario 5-2: Terminal Server
199(2)
Automating User and Group Administration
201(28)
Utilizing Active Directory Command-Line Tools
202(11)
Dsquery
204(3)
Dsadd
207(2)
Dsget
209(1)
Dsmod
210(2)
Dsmove
212(1)
Dsrm
212(1)
Importing Objects Using Csvde
213(1)
Importing Objects With Ldifde
214(2)
Using VBscript To Automate Administration
216(9)
Creating Users and Groups with VBScript
217(2)
Managing Users and Groups with VBScript
219(6)
Summary
225(1)
Review Questions
225(2)
Case Scenarios
227(2)
Scenario 6-1: Importing User Accounts
227(1)
Scenario 6-2: Creating User Accounts with VBScript
227(2)
Configuring and Managing Web Servers Using IIS
229(28)
What's New In IIS 6
230(3)
Installing IIS 6
233(1)
Administering the Web Environment
234(2)
Configuring and Managing FTP and Web Sites
236(5)
Application Pools and Worker Process Isolation Mode
241(2)
Backing Up IIS Configuration
243(1)
Securing Files On IIS
244(5)
Address Restriction
244(1)
Configuring Authentication Methods
245(2)
Defining Resource Access with Permissions
247(2)
Summary
249(1)
Review Questions
249(3)
Case Scenarios
252(5)
Scenario 7-1: Managing the Health of Web Applications
252(2)
Scenario 7-2: Securing Web and FTP Sites
254(3)
Administering Software Update Services
257(36)
Hotfixes and Service Packs
258(1)
Understanding SUS
259(1)
Installing SUS on a Windows Server 2003 Computer
260(12)
Understanding SUS Topology
264(2)
Configuring and Administering SUS
266(6)
The Automatic Updates Client
272(3)
Download Behavior
273(1)
Installation Behavior
274(1)
Configuring Automatic Updates through Group Policy
275(2)
Monitoring SUS
277(4)
SUS System Events
278(1)
Troubleshooting SUS
279(1)
SUS Backup and Recovery
280(1)
Designing a Network Security Update Infrastructure
281(1)
Using Microsoft Baseline Security Analyzer
282(3)
Systems Management Server Software Update Services Feature Pack
285(2)
Summary
287(1)
Review Questions
287(2)
Case Scenarios
289(4)
Scenario 8-1: Tailspin Toys Security Update Infrastructure
289(2)
Scenario 8-2: City Power & Light Security Update Infrastructure
291(2)
DNS Installation
293(46)
Reviewing DNS Concepts, Components, and Processes
294(4)
Understanding Domains
294(1)
Name Resolution and the Domain Hierarchy
294(1)
Reverse Name Resolution
295(2)
Caching to Improve DNS Query Performance
297(1)
Installing and Configuring DNS Servers
298(18)
Configuring a DNS Server
298(2)
Understanding Server Types
300(2)
Creating Resource Records
302(5)
Viewing and Clearing the DNS Server Cache
307(1)
Exploring DNS Server Properties Tabs
308(8)
Exploring DNS Zone Properties
316(16)
General Tab
316(8)
State of Authority (SOA) Tab
324(3)
Name Servers Tab
327(1)
WINS Tab
328(1)
Zone Transfers Tab
329(3)
Summary
332(1)
Review Questions
333(2)
Case Scenarios
335(4)
Scenario 9-1: Zone Types and Properties
335(1)
Scenario 9-2: Forwarders and Dynamic Updates
336(3)
Advanced DNS Operations
339(34)
Configuring Advanced DNS Server Properties
340(8)
Tuning Advanced Server Options
340(1)
Disable Recursion
341(1)
BIND Secondaries
342(1)
Fail On Load If Bad Zone Data
343(1)
Enable Netmask Ordering
343(2)
Enable Round Robin
345(1)
Secure Cache Against Pollution
346(1)
Name Checking
346(2)
Load Zone Data On Startup
348(1)
Enable Automatic Scavenging Of Stale Records
348(1)
Delegating Zones
348(8)
When To Delegate Zones
350(2)
How Delegations Work
352(4)
Deploying Stub Zones
356(7)
Understanding Stub Zones
356(1)
Benefits of Stub Zones
357(1)
When To Use Stub Zones
357(5)
Stub Zone Updates
362(1)
Troubleshooting Active Directory-Integrated Zones
363(1)
Backing Up and Restoring Active Directory-Integrated Zones
363(1)
Replication Troubleshooting
364(1)
Reverse Lookup Zones
364(1)
Summary
365(1)
Review Questions
366(4)
Case Scenarios
370(3)
Scenario 10-1: Zone Delegation
370(1)
Scenario 10-2: Stub Zones
371(2)
Windows Server 2003 Security Configuration
373(48)
Introduction
373(2)
Windows Server 2003 Security Settings
375(12)
Account Policies
375(1)
Local Policies
376(6)
Event Log Policies
382(2)
Restricted Groups Policies
384(1)
System Services Policies
385(2)
Registry Policies
387(1)
File System Policies
387(1)
Other Security Policies
387(1)
Creating Baseline and Role-Specific Server Configurations
387(11)
Applying the Principle of Least Privilege
388(1)
Baseline Security Configuration
389(1)
Role-Specific Security Settings
390(8)
Deploying Security Configuration with Group Policy Objects
398(5)
Deploying a Baseline Configuration
398(1)
Applying Role-Based Security Configurations
398(5)
Managing Security Configuration with Security Templates
403(14)
Understanding Security Templates
403(1)
Using the Security Templates Snap-in
404(2)
Default Security Templates
406(2)
Modifying Security Templates
408(1)
Deploying Security Templates Using Group Policy Objects
409(2)
The Security Configuration and Analysis Tool
411(4)
Secedit.exe
415(2)
Summary
417(1)
Review Questions
417(2)
Case Scenarios
419(2)
Scenario 11-1: Security Settings
419(1)
Scenario 11-2: Security Templates and Security Configuration and Analysis
419(2)
Data Backup and Recovery
421(28)
Fundamentals of Backup
422(5)
Selecting Files to Back Up
424(1)
Selecting the Backup Destination
424(1)
Determining a Backup Strategy
425(1)
Combining Backup Types
426(1)
Restoring Data
427(3)
Restore Options
429(1)
Advanced Backup and Restore
430(6)
Understanding the Volume Shadow Copy Service
430(1)
Backup Security
431(1)
Managing Media
431(3)
Backup Options
434(2)
The Ntbackup Command
436(3)
Backing Up to a File
437(1)
Appending to a File or Tape
437(1)
Backing Up to a New Tape or File, or Overwriting an Existing Tape
437(1)
Backing Up to a New Tape
438(1)
Backing Up to an Existing Tape
438(1)
Job Options
439(1)
Scheduling Backup Jobs
439(2)
Shadow Copies of Shared Folders
441(4)
Enabling and Configuring Shadow Copies
441(2)
Using Shadow Copy
443(2)
Summary
445(1)
Review Questions
445(2)
Case Scenarios
447(2)
Scenario 12-1: Incremental vs. Differential Backups
447(1)
Scenario 12-2: Ntbackup command
447(2)
System Backup and Recovery
449(26)
A Review of Recovery Options
450(1)
System State
451(2)
Backing Up and Restoring Active Directory
453(2)
Creating an Active Directory Backup
453(2)
Scheduling Active Directory Backup Operations
455(1)
Restoring Active Directory
455(9)
Active Directory Restore Methods
455(3)
Performing a Normal Restore
458(4)
Performing an Authoritative Restore
462(2)
Server Recovery
464(6)
Automated System Recovery
464(3)
Recovery Console
467(3)
Summary
470(1)
Review Questions
471(1)
Case Scenarios
472(3)
Scenario 13-1: Troubleshooting System Startup
472(1)
Scenario 13-2: Active Directory Recovery
472(3)
APPENDIX A: Emergency Management Services
475(8)
In-Band and Out-of-Band Management
475(1)
Configuring Windows Server 2003 to Use Emergency Management Services
476(1)
Console Redirection
477(2)
The Special Administration Console
479(2)
Terminal Concentrators
481(2)
APPENDIX B: Administering Group Policy with Group Policy Management Console
483(74)
Introduction
484(2)
GPMC System Requirements
485(1)
Installing GPMC
485(1)
Group Policy Management Console Overview
486(8)
Managing Multiple Forests
488(2)
Domain Controllers in GPMC
490(2)
Domain Contents Overview
492(2)
Creating and Editing GPOs
494(1)
Scoping GPOs
495(3)
Linking GPOs
495(2)
Security Filtering
497(1)
Linking WMI Filters
498(1)
Group Policy Inheritance
498(3)
Delegating Group Policy
501(10)
Delegating Creation of GPOs
502(1)
Delegating an individual GPO
503(2)
Delegating Policy-Related Permissions on SOMs
505(3)
Delegating Creation of WMI Filters
508(2)
Delegating an individual WMI Filter
510(1)
Reporting on GPO Settings
511(4)
Administrative Templates Background
513(1)
Administrative Templates and GPMC
513(2)
Administrative Templates and Group Policy Object Editor
515(1)
GPO Details
515(3)
Ensuring consistency of permissions on a GPO
516(2)
GPO Operations
518(17)
Backup
518(4)
Restore
522(3)
Import
525(1)
Copy
525(2)
Using migration tables to facilitate cross-domain import and copy operations
527(7)
Creating a Staging Environment
534(1)
WMI Filters
535(2)
Searching for GPOs
537(3)
Group Policy Modeling
540(4)
Group Policy Results
544(2)
Platform Dependencies
546(1)
GPMC Options
547(1)
Internet Explorer Enhanced Security Configuration Considerations
548(1)
Scripting Group Policy-related Tasks
549(6)
Related Links
555(2)
Glossary 557(10)
Index 567