About this Book |
|
xv | |
Target Audience |
|
xv | |
Prerequisites |
|
xv | |
The Textbook |
|
xvi | |
The Supplemental Course Materials CD-ROM |
|
xvii | |
Readiness Review Suite Setup Instructions |
|
xvii | |
eBook Setup Instructions |
|
xviii | |
The Lab Manual |
|
xviii | |
Notational Conventions |
|
xix | |
Keyboard Conventions |
|
xx | |
Coverage Of Exam Objectives |
|
xx | |
The Microsoft Certified Professional Program |
|
xxiii | |
Certifications |
|
xxiv | |
MCP Requirements |
|
xxiv | |
About The Authors |
|
xxv | |
For Microsoft Official Academic Course Support |
|
xxvi | |
Evaluation Edition Software Support |
|
xxvi | |
|
Introduction To Windows Server 2003 |
|
|
1 | (38) |
|
Overview Of Windows Server 2003 Editions |
|
|
2 | (7) |
|
Windows Server 2003, Standard Edition |
|
|
3 | (2) |
|
Windows Server 2003, Enterprise Edition |
|
|
5 | (1) |
|
Windows Server 2003, Datacenter Edition |
|
|
6 | (2) |
|
Windows Server 2003, Web Edition |
|
|
8 | (1) |
|
Windows Server 2003 Hardware Requirements |
|
|
9 | (3) |
|
Upgrading To Windows Server 2003 |
|
|
12 | (2) |
|
Upgrading versus Migrating |
|
|
12 | (1) |
|
|
13 | (1) |
|
Verifying System Compatibility |
|
|
14 | (3) |
|
|
15 | (1) |
|
Compatibility Tools and Resources |
|
|
16 | (1) |
|
New Features In Windows Server 2003 |
|
|
17 | (14) |
|
Enhanced Administration Features |
|
|
19 | (1) |
|
New Security Enhancements |
|
|
20 | (2) |
|
New Administrative Tools and Utilities |
|
|
22 | (5) |
|
New Disaster Recovery Tools and Features |
|
|
27 | (4) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
34 | (5) |
|
Scenario 1-1: Upgrade and Migration Strategies |
|
|
34 | (2) |
|
Scenario 1-2: Backup and Recovery Strategies |
|
|
36 | (3) |
|
Reviewing Active Directory Concepts |
|
|
39 | (38) |
|
The Role Of Directory Services |
|
|
40 | (2) |
|
Logical Components Of Active Directory |
|
|
42 | (11) |
|
|
42 | (2) |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Domain and Forest Functional Levels |
|
|
48 | (5) |
|
Physical Components Of Active Directory |
|
|
53 | (5) |
|
|
54 | (2) |
|
|
56 | (2) |
|
Installing Active Directory |
|
|
58 | (8) |
|
Upgrading a Windows 2000 Server Forest to Windows Server 2003 |
|
|
58 | (1) |
|
Installing Active Directory Using the Active Directory Installation Wizard |
|
|
59 | (3) |
|
Installing Active Directory Using an Answer File |
|
|
62 | (1) |
|
Installing Active Directory Using the Network or Backup Media |
|
|
63 | (2) |
|
Installing Active Directory Using the Configure Your Server Wizard |
|
|
65 | (1) |
|
Deploying Global Catalog Servers |
|
|
66 | (1) |
|
Locating Global Catalog Servers |
|
|
66 | (2) |
|
Configuring Global Catalog Servers |
|
|
68 | (1) |
|
Universal Group Membership Caching |
|
|
68 | (2) |
|
Implementing Universal Group Membership Caching |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (2) |
|
|
74 | (3) |
|
Scenario 2-1: Configuring Windows Server 2003 Domain Controllers |
|
|
74 | (1) |
|
Scenario 2-2: Global Catalogs versus Universal Group Membership Caching |
|
|
75 | (2) |
|
|
77 | (24) |
|
Reviewing Group Policy Components |
|
|
78 | (3) |
|
|
81 | (3) |
|
|
81 | (1) |
|
Active Directory-Based GPOs |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
Editing Group Policy Objects |
|
|
83 | (1) |
|
Exploring Group Policy Settings |
|
|
84 | (5) |
|
Computer and User Configuration Nodes |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
Administrative Templates Node |
|
|
87 | (2) |
|
Understanding GPO Application |
|
|
89 | (8) |
|
|
91 | (1) |
|
Exceptions to the Application Order |
|
|
92 | (2) |
|
Using Security Groups to Filter GPO Scope |
|
|
94 | (1) |
|
Using WMI Queries to Filter GPO Scope |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (3) |
|
Scenario 3-1: GPO Application |
|
|
98 | (1) |
|
Scenario 3-2: GPO Application Filtering |
|
|
99 | (2) |
|
Managing Users and Groups |
|
|
101 | (48) |
|
|
102 | (1) |
|
Creating And Modifying User Accounts |
|
|
103 | (13) |
|
Creating User Objects with Active Directory Users and Computers |
|
|
104 | (5) |
|
Managing User Objects with Active Directory Users and Computers |
|
|
109 | (5) |
|
Creating and Using User Object Templates |
|
|
114 | (1) |
|
Active Directory Naming Standards |
|
|
115 | (1) |
|
Understanding, Creating, And Managing Groups |
|
|
116 | (17) |
|
|
117 | (2) |
|
|
119 | (4) |
|
|
123 | (4) |
|
|
127 | (1) |
|
|
128 | (2) |
|
Modifying Group Membership |
|
|
130 | (3) |
|
Securing And Troubleshooting Authentication |
|
|
133 | (9) |
|
Securing Authentication with Policy |
|
|
133 | (6) |
|
|
139 | (1) |
|
Administering and Troubleshooting Authentication |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (4) |
|
Scenario 4-1: Implementing Users and Groups |
|
|
145 | (1) |
|
Scenario 4-2: Managing Users and Authentication |
|
|
146 | (3) |
|
Systems Administration and Terminal Server |
|
|
149 | (52) |
|
Remote Administration Of Windows Server 2003 |
|
|
150 | (26) |
|
The Microsoft Management Console |
|
|
150 | (10) |
|
HTML Remote Administration Tools |
|
|
160 | (2) |
|
Managing Servers with Remote Desktop For Administration |
|
|
162 | (7) |
|
|
169 | (7) |
|
Supporting And Troubleshooting Terminal Server |
|
|
176 | (19) |
|
Installing and Configuring a Terminal Server Environment |
|
|
176 | (5) |
|
Managing and Troubleshooting Terminal Server |
|
|
181 | (9) |
|
|
190 | (5) |
|
|
195 | (1) |
|
|
196 | (2) |
|
|
198 | (3) |
|
Scenario 5-1: Remote Administration |
|
|
198 | (1) |
|
Scenario 5-2: Terminal Server |
|
|
199 | (2) |
|
Automating User and Group Administration |
|
|
201 | (28) |
|
Utilizing Active Directory Command-Line Tools |
|
|
202 | (11) |
|
|
204 | (3) |
|
|
207 | (2) |
|
|
209 | (1) |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
212 | (1) |
|
Importing Objects Using Csvde |
|
|
213 | (1) |
|
Importing Objects With Ldifde |
|
|
214 | (2) |
|
Using VBscript To Automate Administration |
|
|
216 | (9) |
|
Creating Users and Groups with VBScript |
|
|
217 | (2) |
|
Managing Users and Groups with VBScript |
|
|
219 | (6) |
|
|
225 | (1) |
|
|
225 | (2) |
|
|
227 | (2) |
|
Scenario 6-1: Importing User Accounts |
|
|
227 | (1) |
|
Scenario 6-2: Creating User Accounts with VBScript |
|
|
227 | (2) |
|
Configuring and Managing Web Servers Using IIS |
|
|
229 | (28) |
|
|
230 | (3) |
|
|
233 | (1) |
|
Administering the Web Environment |
|
|
234 | (2) |
|
Configuring and Managing FTP and Web Sites |
|
|
236 | (5) |
|
Application Pools and Worker Process Isolation Mode |
|
|
241 | (2) |
|
Backing Up IIS Configuration |
|
|
243 | (1) |
|
|
244 | (5) |
|
|
244 | (1) |
|
Configuring Authentication Methods |
|
|
245 | (2) |
|
Defining Resource Access with Permissions |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
249 | (3) |
|
|
252 | (5) |
|
Scenario 7-1: Managing the Health of Web Applications |
|
|
252 | (2) |
|
Scenario 7-2: Securing Web and FTP Sites |
|
|
254 | (3) |
|
Administering Software Update Services |
|
|
257 | (36) |
|
Hotfixes and Service Packs |
|
|
258 | (1) |
|
|
259 | (1) |
|
Installing SUS on a Windows Server 2003 Computer |
|
|
260 | (12) |
|
Understanding SUS Topology |
|
|
264 | (2) |
|
Configuring and Administering SUS |
|
|
266 | (6) |
|
The Automatic Updates Client |
|
|
272 | (3) |
|
|
273 | (1) |
|
|
274 | (1) |
|
Configuring Automatic Updates through Group Policy |
|
|
275 | (2) |
|
|
277 | (4) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Designing a Network Security Update Infrastructure |
|
|
281 | (1) |
|
Using Microsoft Baseline Security Analyzer |
|
|
282 | (3) |
|
Systems Management Server Software Update Services Feature Pack |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (4) |
|
Scenario 8-1: Tailspin Toys Security Update Infrastructure |
|
|
289 | (2) |
|
Scenario 8-2: City Power & Light Security Update Infrastructure |
|
|
291 | (2) |
|
|
293 | (46) |
|
Reviewing DNS Concepts, Components, and Processes |
|
|
294 | (4) |
|
|
294 | (1) |
|
Name Resolution and the Domain Hierarchy |
|
|
294 | (1) |
|
|
295 | (2) |
|
Caching to Improve DNS Query Performance |
|
|
297 | (1) |
|
Installing and Configuring DNS Servers |
|
|
298 | (18) |
|
|
298 | (2) |
|
Understanding Server Types |
|
|
300 | (2) |
|
Creating Resource Records |
|
|
302 | (5) |
|
Viewing and Clearing the DNS Server Cache |
|
|
307 | (1) |
|
Exploring DNS Server Properties Tabs |
|
|
308 | (8) |
|
Exploring DNS Zone Properties |
|
|
316 | (16) |
|
|
316 | (8) |
|
State of Authority (SOA) Tab |
|
|
324 | (3) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (3) |
|
|
332 | (1) |
|
|
333 | (2) |
|
|
335 | (4) |
|
Scenario 9-1: Zone Types and Properties |
|
|
335 | (1) |
|
Scenario 9-2: Forwarders and Dynamic Updates |
|
|
336 | (3) |
|
|
339 | (34) |
|
Configuring Advanced DNS Server Properties |
|
|
340 | (8) |
|
Tuning Advanced Server Options |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
Fail On Load If Bad Zone Data |
|
|
343 | (1) |
|
|
343 | (2) |
|
|
345 | (1) |
|
Secure Cache Against Pollution |
|
|
346 | (1) |
|
|
346 | (2) |
|
Load Zone Data On Startup |
|
|
348 | (1) |
|
Enable Automatic Scavenging Of Stale Records |
|
|
348 | (1) |
|
|
348 | (8) |
|
|
350 | (2) |
|
|
352 | (4) |
|
|
356 | (7) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (5) |
|
|
362 | (1) |
|
Troubleshooting Active Directory-Integrated Zones |
|
|
363 | (1) |
|
Backing Up and Restoring Active Directory-Integrated Zones |
|
|
363 | (1) |
|
Replication Troubleshooting |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (4) |
|
|
370 | (3) |
|
Scenario 10-1: Zone Delegation |
|
|
370 | (1) |
|
Scenario 10-2: Stub Zones |
|
|
371 | (2) |
|
Windows Server 2003 Security Configuration |
|
|
373 | (48) |
|
|
373 | (2) |
|
Windows Server 2003 Security Settings |
|
|
375 | (12) |
|
|
375 | (1) |
|
|
376 | (6) |
|
|
382 | (2) |
|
Restricted Groups Policies |
|
|
384 | (1) |
|
|
385 | (2) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
Creating Baseline and Role-Specific Server Configurations |
|
|
387 | (11) |
|
Applying the Principle of Least Privilege |
|
|
388 | (1) |
|
Baseline Security Configuration |
|
|
389 | (1) |
|
Role-Specific Security Settings |
|
|
390 | (8) |
|
Deploying Security Configuration with Group Policy Objects |
|
|
398 | (5) |
|
Deploying a Baseline Configuration |
|
|
398 | (1) |
|
Applying Role-Based Security Configurations |
|
|
398 | (5) |
|
Managing Security Configuration with Security Templates |
|
|
403 | (14) |
|
Understanding Security Templates |
|
|
403 | (1) |
|
Using the Security Templates Snap-in |
|
|
404 | (2) |
|
Default Security Templates |
|
|
406 | (2) |
|
Modifying Security Templates |
|
|
408 | (1) |
|
Deploying Security Templates Using Group Policy Objects |
|
|
409 | (2) |
|
The Security Configuration and Analysis Tool |
|
|
411 | (4) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
417 | (2) |
|
|
419 | (2) |
|
Scenario 11-1: Security Settings |
|
|
419 | (1) |
|
Scenario 11-2: Security Templates and Security Configuration and Analysis |
|
|
419 | (2) |
|
|
421 | (28) |
|
|
422 | (5) |
|
Selecting Files to Back Up |
|
|
424 | (1) |
|
Selecting the Backup Destination |
|
|
424 | (1) |
|
Determining a Backup Strategy |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
427 | (3) |
|
|
429 | (1) |
|
Advanced Backup and Restore |
|
|
430 | (6) |
|
Understanding the Volume Shadow Copy Service |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (3) |
|
|
434 | (2) |
|
|
436 | (3) |
|
|
437 | (1) |
|
Appending to a File or Tape |
|
|
437 | (1) |
|
Backing Up to a New Tape or File, or Overwriting an Existing Tape |
|
|
437 | (1) |
|
|
438 | (1) |
|
Backing Up to an Existing Tape |
|
|
438 | (1) |
|
|
439 | (1) |
|
|
439 | (2) |
|
Shadow Copies of Shared Folders |
|
|
441 | (4) |
|
Enabling and Configuring Shadow Copies |
|
|
441 | (2) |
|
|
443 | (2) |
|
|
445 | (1) |
|
|
445 | (2) |
|
|
447 | (2) |
|
Scenario 12-1: Incremental vs. Differential Backups |
|
|
447 | (1) |
|
Scenario 12-2: Ntbackup command |
|
|
447 | (2) |
|
System Backup and Recovery |
|
|
449 | (26) |
|
A Review of Recovery Options |
|
|
450 | (1) |
|
|
451 | (2) |
|
Backing Up and Restoring Active Directory |
|
|
453 | (2) |
|
Creating an Active Directory Backup |
|
|
453 | (2) |
|
Scheduling Active Directory Backup Operations |
|
|
455 | (1) |
|
Restoring Active Directory |
|
|
455 | (9) |
|
Active Directory Restore Methods |
|
|
455 | (3) |
|
Performing a Normal Restore |
|
|
458 | (4) |
|
Performing an Authoritative Restore |
|
|
462 | (2) |
|
|
464 | (6) |
|
Automated System Recovery |
|
|
464 | (3) |
|
|
467 | (3) |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
472 | (3) |
|
Scenario 13-1: Troubleshooting System Startup |
|
|
472 | (1) |
|
Scenario 13-2: Active Directory Recovery |
|
|
472 | (3) |
|
APPENDIX A: Emergency Management Services |
|
|
475 | (8) |
|
In-Band and Out-of-Band Management |
|
|
475 | (1) |
|
Configuring Windows Server 2003 to Use Emergency Management Services |
|
|
476 | (1) |
|
|
477 | (2) |
|
The Special Administration Console |
|
|
479 | (2) |
|
|
481 | (2) |
|
APPENDIX B: Administering Group Policy with Group Policy Management Console |
|
|
483 | (74) |
|
|
484 | (2) |
|
|
485 | (1) |
|
|
485 | (1) |
|
Group Policy Management Console Overview |
|
|
486 | (8) |
|
Managing Multiple Forests |
|
|
488 | (2) |
|
Domain Controllers in GPMC |
|
|
490 | (2) |
|
|
492 | (2) |
|
Creating and Editing GPOs |
|
|
494 | (1) |
|
|
495 | (3) |
|
|
495 | (2) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
498 | (3) |
|
|
501 | (10) |
|
Delegating Creation of GPOs |
|
|
502 | (1) |
|
Delegating an individual GPO |
|
|
503 | (2) |
|
Delegating Policy-Related Permissions on SOMs |
|
|
505 | (3) |
|
Delegating Creation of WMI Filters |
|
|
508 | (2) |
|
Delegating an individual WMI Filter |
|
|
510 | (1) |
|
Reporting on GPO Settings |
|
|
511 | (4) |
|
Administrative Templates Background |
|
|
513 | (1) |
|
Administrative Templates and GPMC |
|
|
513 | (2) |
|
Administrative Templates and Group Policy Object Editor |
|
|
515 | (1) |
|
|
515 | (3) |
|
Ensuring consistency of permissions on a GPO |
|
|
516 | (2) |
|
|
518 | (17) |
|
|
518 | (4) |
|
|
522 | (3) |
|
|
525 | (1) |
|
|
525 | (2) |
|
Using migration tables to facilitate cross-domain import and copy operations |
|
|
527 | (7) |
|
Creating a Staging Environment |
|
|
534 | (1) |
|
|
535 | (2) |
|
|
537 | (3) |
|
|
540 | (4) |
|
|
544 | (2) |
|
|
546 | (1) |
|
|
547 | (1) |
|
Internet Explorer Enhanced Security Configuration Considerations |
|
|
548 | (1) |
|
Scripting Group Policy-related Tasks |
|
|
549 | (6) |
|
|
555 | (2) |
Glossary |
|
557 | (10) |
Index |
|
567 | |