Atjaunināt sīkdatņu piekrišanu

E-grāmata: Windows Server 2019 Inside Out

4.17/5 (12 ratings by Goodreads)
  • Formāts: 912 pages
  • Sērija : Inside Out
  • Izdošanas datums: 07-May-2020
  • Izdevniecība: Addison Wesley
  • Valoda: eng
  • ISBN-13: 9780135492239
  • Formāts - PDF+DRM
  • Cena: 47,33 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 912 pages
  • Sērija : Inside Out
  • Izdošanas datums: 07-May-2020
  • Izdevniecība: Addison Wesley
  • Valoda: eng
  • ISBN-13: 9780135492239

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Conquer Windows Server 2019from the inside out! Dive into Windows Server 2019and really put your Windows Serverexpertise to work. Focusing on Windows Server 2019s most powerful and innovative features, this supremely organized reference packs hundreds of timesaving solutions, tips, and workaroundsall you need to plan, implement, or manage Windows Server in enterprise, data center, cloud, and hybrid environments. Fully reflecting new innovations for security, hybrid cloud environments, and Hyper-Converged Infrastructure (HCI), it covers everything from cluster sets to Windows Subsystem for Linux. Youll discover how experts tackle todays essential tasksand challenge yourself to new levels of mastery. Optimize the full Windows Server 2019 lifecycle, from planning and configuration through rollout and administration Leverage new configuration options including App Compatibility Features on Demand (FOD) or Desktop Experience Ensure fast, reliable upgrades and migrations Manage Windows servers, clients, and services through Windows Admin Center Seamlessly deliver and administer core DNS, DHCP, fi le, print, storage, and Internet services Use the Storage Migration Service to simplify storage moves and configuration at the destination Seamlessly integrate Azure IaaS and hybrid services with Windows Server 2019 Improve agility with advanced container technologies, including container networking and integration into Kubernetes orchestration clusters Deliver Active Directory identity, certifi cate, federation, and rights management services Protect servers, clients, VMs, assets, and users with advanced Windows Server 2019 security features, from Just Enough Administration to shielded VMs and guarded virtualization fabrics Monitor performance, manage event logs, confi gure advanced auditing, and perform backup/recovery Windows Server 2019 For Experienced Windows Server Users and IT Professionals Your role: Experienced intermediate to-advanced level Windows Server user or IT professional Prerequisites: Basic understanding of Windows Server procedures, techniques, and navigation
Introduction xxi
Changes since Windows Server 2016 Inside Out xxi
Acknowledgments xxii
Errata, updates, and book support xxii
Chapter 1 Administration Tools
1(30)
Remote not local
1(1)
Privileged Access Workstations
2(2)
Windows Admin Center
4(7)
Installing Windows Admin Center
6(3)
Windows Admin Center extensions
9(1)
Show script
10(1)
Remote Server Administration Tools
11(6)
RSAT consoles
11(3)
Server Manager console
14(3)
PowerShell
17(8)
Modules
18(1)
PowerShell Gallery
19(1)
Remoting
19(2)
One-to-many remoting
21(1)
PowerShell ISE
21(3)
PowerShell Direct
24(1)
Remote Desktop
25(2)
SSH
27(4)
Chapter 2 Installation Options
31(16)
Windows Server 2019 editions
31(2)
Windows Server servicing branches
33(2)
Long Term Servicing Channel
33(1)
Semi Annual Channel
33(1)
Insider Preview Builds
34(1)
Server Core
35(9)
Server Core interface
36(1)
Server Core roles
37(5)
Server Core App Compatibility Features on Demand
42(1)
When to deploy Server Core
43(1)
Server with Desktop Experience
44(1)
Roles and features
45(2)
Chapter 3 Deployment And Configuration
47(62)
Bare metal versus virtualized
47(1)
Windows images
48(9)
Modifying Windows images
49(1)
Servicing Windows images
50(1)
Mounting images
50(3)
Adding drivers and updates to images
53(1)
Adding roles and features
54(2)
Committing an image
56(1)
Build and capture
56(1)
Answer files
57(2)
Windows Deployment Services
59(9)
WDS requirements
60(2)
Managing images
62(1)
Configuring WDS
62(5)
Configuring transmissions
67(1)
Driver groups and packages
68(1)
Virtual Machine Manager
68(11)
Virtual machine templates
68(1)
VMM storage
69(2)
VMM networking
71(4)
Adding a WDS to VMM
75(1)
VMM host groups
76(3)
Infrastructure configuration as code
79(2)
Desired State Configuration
81(4)
DSC configuration files
82(1)
Local Configuration Manager
83(1)
DSC resources
83(1)
DSC push model
84(1)
DSC pull server
84(1)
Chef Infra Server
85(11)
Chef servers
85(4)
Chef Development Kit
89(5)
Deploying Chef agents
94(1)
Deploying Chef cookbooks and recipes
95(1)
Puppet
96(7)
Puppet Master Server
96(3)
Deploying Puppet agent to Windows Server
99(2)
Managing Windows Server configuration
101(1)
Puppet Windows Module Pack
102(1)
Package-management utilities
103(6)
PowerShell Gallery
104(1)
Chocolatey
105(4)
Chapter 4 Active Directory
109(50)
Managing Active Directory
109(9)
Remote rather than local administration
110(1)
Active Directory Administrative Center
110(3)
Active Directory Users and Computers console
113(1)
Active Directory Sites and Services console
114(3)
Active Directory Domains and Trusts console
117(1)
Domain controllers
118(7)
Deployment
118(2)
Server Core
120(1)
Global catalog servers
121(1)
Read only domain controllers
121(3)
Virtual domain controller cloning
124(1)
AD DS structure
125(5)
Domains
125(1)
Domain functional levels
125(1)
Forests
126(1)
Account and resource forests
127(1)
Organizational units
127(1)
Flexible Single Master Operations roles
128(2)
Accounts
130(8)
User accounts
130(2)
Computer accounts
132(1)
Group accounts
133(1)
Default groups
134(2)
Service accounts
136(2)
Group policy
138(8)
GPO management
139(2)
Policy processing
141(2)
Group Policy preferences
143(2)
Administrative templates
145(1)
Restoring deleted items
146(6)
Active Directory Recycle Bin
147(2)
Authoritative restore
149(2)
Active Directory snapshots
151(1)
Managing AD DS with PowerShell
152(7)
Active Directory module
152(4)
Group Policy module
156(1)
ADDSDeployment module
157(2)
Chapter 5 Dns, Dhcr And Ipam
159(32)
DNS
159(18)
DNS zone types
159(3)
Zone delegation
162(1)
Forwarders and conditional forwarders
163(1)
Stub zones
164(1)
GlobalNames zones
164(1)
Peer Name Resolution Protocol
165(1)
Resource records
166(1)
Zone aging and scavenging
167(1)
DNSSEC
168(1)
DNS event logs
169(1)
DNS options
170(4)
Delegated administration
174(1)
Managing DNS with PowerShell
174(3)
DHCP
177(8)
Scopes
177(1)
Server and scope options
178(1)
Reservations
178(1)
DHCP filtering
179(1)
Superscopes
179(1)
Multicast scopes
180(1)
Split scopes
180(1)
Name protection
180(1)
DHCP failover
181(1)
Administration
182(3)
IPAM
185(6)
Deploy IPAM
185(1)
Configure server discovery
185(1)
IPAM Administration
186(2)
Managing IPAM with PowerShell
188(3)
Chapter 6 Hyper-V
191(1)
Dynamic memory
191(1)
Smart paging
192(1)
Resource metering
193(1)
Guest integration services
193(1)
Generation 2 VMs
194(1)
Enhanced Session Mode
195(1)
Discrete Device Assignment
196(1)
Nested virtualization
197(1)
Nested virtualization dynamic memory
197(1)
Nested virtualization networking
197(1)
PowerShell Direct
198(1)
HVC for Linux
198(1)
Virtual hard disks
199(3)
Fixed-sized disks
199(1)
Dynamically expanding disks
199(1)
Differencing disks
200(1)
Modifying virtual hard disks
200(1)
Pass-through disks
201(1)
Managing checkpoints
202(1)
Virtual Fibre Channel adapters
203(1)
Storage QoS
204(1)
Hyper-V storage optimization
204(1)
Deduplication
204(1)
Storage tiering
204(1)
Hyper-V virtual switches
205(1)
External switches
205(1)
Internal switches
205(1)
Private switches
206(1)
Virtual machine network adapters
206(1)
Optimizing network performance
206(2)
Bandwidth management
207(1)
SR-IOV
207(1)
Dynamic virtual machine queue
207(1)
Virtual machine NIC teaming
208(1)
Virtual machine MAC addresses
208(1)
Network isolation
209(1)
Hyper-V replica
209(3)
Configuring Hyper-V replica servers
210(1)
Configuring VM replicas
210(1)
Replica failover
211(1)
Hyper-V replica broker
211(1)
Hyper-V failover clusters
212(5)
Hyper-V host cluster storage
212(1)
Cluster quorum
213(1)
Cluster networking
214(1)
Force Quorum Resiliency
215(1)
Cluster Shared Volumes
215(1)
Active Directory detached clusters
216(1)
Preferred owner and failover settings
216(1)
Hyper-V guest clusters
217(2)
Hyper-V guest cluster storage
218(1)
Shared virtual hard disk
218(1)
Hyper-V VHD Sets
219(1)
Live migration
219(2)
Storage migration
221(1)
Exporting, importing, and copying VMs
221(1)
VM Network Health Detection
222(1)
VM drain on shutdown
222(1)
Domain controller cloning
223(1)
Shielded virtual machines
223(1)
Managing Hyper-V using PowerShell
224(5)
Chapter 7 Storage
229(44)
Storage spaces and storage pools
229(18)
Storage pools
230(4)
Storage space resiliency
234(1)
Storage space tiering
235(2)
Thin provisioning and trim
237(2)
Creating virtual disks
239(1)
Storage Spaces Direct
240(7)
Storage Replica
247(4)
Supported configurations
248(1)
Configuring replication
249(2)
SMB 3.1.1
251(1)
iSCSI
252(4)
iSNS server
256(2)
Scale-Out File Servers
258(1)
Server for NFS
259(1)
Deduplication
260(3)
Storage Quality of Service
263(1)
ReFS
264(2)
Storage-related PowerShell cmdlets
266(7)
Deduplication
266(1)
iSCSI
266(1)
iSCSITarget
267(1)
NFS
267(1)
Storage
268(3)
Storage Replica
271(2)
Chapter 8 File Servers
273(36)
Shared folder permissions
274(6)
Using File Explorer
275(1)
Windows Admin Center
276(1)
Server Manager
277(3)
File Server Resource Manager
280(13)
Folder level quotas
280(2)
File screens
282(4)
Storage reports
286(2)
File classification
288(2)
File management tasks
290(2)
Access-Denied Assistance
292(1)
Distributed File System
293(6)
DFS namespace
293(3)
DFS replication
296(3)
BranchCache
299(3)
PowerShell commands
302(7)
Shared Folder cmdlets
302(1)
File Server Resource Manager cmdlets
303(2)
BranchCache Cmdlets
305(1)
DFS Cmdlets
306(3)
Chapter 9 Internet Information Services
309(28)
Managing sites
309(17)
Adding websites
310(3)
Virtual directories
313(1)
Modifying site settings
314(1)
Adding web applications
314(1)
Configuring TLS certificates
315(3)
Site authentication
318(1)
Modifying custom error response
319(1)
Adding or disabling the default document
320(1)
Directory browsing
321(1)
IP address and domain name filtering
322(1)
URL authorization rules
323(1)
Request filters
324(2)
Application pools
326(3)
Creating application pools
327(1)
Configuring application pool recycling settings
328(1)
IIS users and delegation
329(3)
IIS user accounts
330(1)
Delegating administrative permissions
331(1)
Managing FTP
332(2)
Managing IIS using PowerShell
334(3)
Chapter 10 Containers
337(32)
Container concepts
337(2)
Isolation modes
339(1)
Process Isolation mode
339(1)
Hyper-V Isolation mode
340(1)
Managing containers with Docker
340(7)
Installing Docker
341(1)
Demonjson
342(2)
Retrieving container OS image
344(1)
Container registries and images
345(2)
Managing containers
347(9)
Starting a container
347(3)
Modifying a running container
350(1)
Creating a new image from a container
351(1)
Using Dockerfiles
351(2)
Managing container images
353(2)
Service accounts for Windows containers
355(1)
Applying updates
356(1)
Container networking
357(6)
NAT
359(1)
Transparent
360(2)
Overlay
362(1)
Layer 2 Bridge
362(1)
Linux containers on Windows
363(1)
Container orchestration
364(5)
Kubernetes
365(1)
Docker Swarm
365(4)
Chapter 11 Clustering And High Availability
369(22)
Failover clustering
369(16)
Cluster quorum modes
370(2)
Cluster storage and cluster shared volumes
372(1)
Cluster networks
372(1)
MPIO
373(1)
Cluster Aware Updating
373(1)
Failover and preference settings
374(1)
Multisite clusters
375(1)
Cloud witness
376(1)
Virtual machine failover clustering
377(2)
Rolling upgrades
379(2)
Workgroup clusters
381(1)
Cluster sets
382(1)
Managing failover clustering with PowerShell
383(2)
Network Load Balancing
385(6)
Network Load Balancing prerequisites
386(1)
NLB cluster operation modes
386(1)
Managing cluster hosts
387(1)
Port rules
388(1)
Filtering and affinity
388(1)
Managing NLB with PowerShell
389(2)
Chapter 12 Active Directory Certificate Services
391(46)
CA types
391(15)
Enterprise CA
393(10)
Standalone CAs
403(3)
Certificate revocation lists
406(6)
CRL distribution points
406(1)
Authority Information Access
407(1)
Revoking a certificate
408(2)
Publishing CRLs and delta CRLs
410(2)
Certificate Services role services
412(1)
Certificate templates
413(7)
Template properties
414(6)
Adding and editing templates
420(1)
Certificate autoenrollment and renewal
420(2)
CA management
422(15)
Handling certificate requests
424(1)
CA backup and recovery
425(2)
Key archiving and recovery
427(5)
CAPolicy.inf
432(1)
Managing Certificate Services using PowerShell
433(2)
Managing Certificate Services using Certutil.exe and Certreq.exe
435(2)
Chapter 13 Active Directory Federation Services
437(18)
AD FS components
437(1)
Claims, claim rules, and attribute stores
438(1)
Claims provider
439(1)
Relying party
439(1)
Relying party trust
439(1)
Claims provider trust
440(1)
Configuring certificate relationship
441(1)
Attribute stores
442(1)
Claim rules
443(2)
Relying party trust claim rules
443(1)
Claims provider trust claim rules
444(1)
Configure Web Application Proxy
445(2)
Workplace Join
447(2)
Multifactor authentication
449(1)
Managing AD FS with PowerShell
450(3)
Managing Web Application Proxy with PowerShell
453(2)
Chapter 14 Dynamic Access Control And Active Directory Rights Management Services
455(20)
Dynamic Access Control
455(1)
Configuring Group Policy to support DAC
456(1)
Configuring User and Device Claims
456(1)
Configuring Resource Properties
457(2)
Central access rules
459(2)
Central access policies
461(2)
Staging
463(1)
Access Denied Assistance
463(1)
Installing AD RMS
464(1)
AD RMS certificates and licenses
465(1)
AD RMS Templates
466(3)
AD RMS Administrators and Super Users
469(1)
Trusted User and Publishing Domains
470(1)
Exclusion policies
471(2)
Apply AD RMS templates automatically
471(2)
Managing AD RMS with Windows PowerShell
473(2)
Dynamic Access Control cmdlets
474(1)
Chapter 15 Routing And Remote Access
475(24)
Remote Desktop Gateway
475(4)
RD Gateway connection and resource policies
476(1)
Configuring server settings
477(1)
Configuring clients to use RD Gateway
477(2)
Virtual private networks
479(8)
IKEv2 Always On VPN protocol
479(2)
SSTPVPN protocol
481(1)
L2TP/IPsec protocols
481(1)
PPTPVPN protocol
481(1)
VPN authentication
482(1)
Deploying a VPN server
482(1)
Disable VPN protocols
483(1)
Granting access to a VPN server
483(4)
LAN routing
487(1)
Network Address Translation (NAT)
487(2)
DirectAccess
489(7)
DirectAccess topologies
490(1)
DirectAccess server
490(2)
Network Location Server
492(1)
Configuring DirectAccess
493(3)
Managing Remote Access using PowerShell
496(3)
Chapter 16 Remote Desktop Services
499(20)
Deployment
499(3)
Remote Desktop Connection Broker
502(1)
Deployment properties
502(1)
Remote Desktop Session Host
503(6)
Session collection settings
504(2)
Personal session desktops
506(1)
RemoteApp
506(1)
Group Policy configuration
507(2)
Remote Desktop Virtualization Host
509(4)
Virtual machine preparation
510(1)
Virtual desktop collections
511(1)
Pooled virtual desktops
512(1)
Personal virtual desktops
512(1)
DDA and RemoteFX
512(1)
Remote Desktop Web Access
513(1)
Remote Desktop licensing
513(2)
Installing RDS CALs
514(1)
Activating a License Server
515(1)
Managing Remote Desktop Services using PowerShell
515(4)
Chapter 17 Azure Laas And Hybrid Services
519(56)
Windows Server laaS VMs
519(19)
Creating Azure laaS VMs
520(4)
laaS VM networking
524(8)
laaS VM administration
532(6)
Azure Active Directory
538(26)
Azure Active Directory Connect
540(1)
Azure AD Connect server requirements
541(3)
Installing Azure AD Connect
544(7)
Using UPN suffixes and non-routable domains
551(3)
Monitor Azure AD Connect Health
554(1)
Forcing synchronization
555(2)
Configure object filters
557(3)
Implement and manage Azure AD self-service password reset
560(2)
Azure AD Password Protection
562(1)
Azure AD DS
563(1)
Azure hybrid cloud services
564(11)
Connect Windows Admin Center
565(2)
Creating Azure laaS VMs from Windows Admin Center
567(2)
Azure File Sync
569(3)
Azure Arc
572(1)
Azure Site Recovery
572(1)
Azure Network Adapter
573(2)
Chapter 18 Windows Subsystem For Linux
575(6)
Linux on Windows Server
575(1)
Installing WSL
576(3)
WSL2.0
579(2)
Chapter 19 Hardening Windows Server And Active Directory
581(54)
Hardening Active Directory
582(14)
Hardening domain controllers
582(1)
Least privilege
583(1)
Role-Based Access Control
584(1)
Password policies
585(1)
Account security options
586(2)
Protected accounts
588(1)
Authentication policies silos
589(2)
Disable NTLM
591(1)
Block server operators from scheduling tasks
592(1)
Enable Local Security Authority protection
592(1)
KRBTGT account password
593(1)
Enhanced Security Administrative Environment forest
594(2)
Hardening Windows Server
596(32)
User rights
596(4)
Service accounts
600(3)
Just Enough Administration
603(6)
Privileged Access Management
609(4)
Local Administrator Password Solution
613(2)
Advanced auditing
615(3)
Windows Firewall with Advanced Security
618(10)
Shielded VMs
628(7)
Guarded fabric
631(4)
Chapter 20 Security Systems And Services
635(18)
Security Compliance Toolkit
636(2)
Policy Analyzer tool
636(2)
Local Group Policy Object tool
638(1)
Attack Surface Analyzer
638(2)
Credential Guard
640(2)
Windows Defender Application Control
642(2)
Virtualization-based security
644(1)
Controlled Folder Access
645(2)
Exploit Protection
647(3)
Windows Defender
650(1)
Windows Defender SmartScreen
651(2)
Chapter 21 Maintenance And Monitoring
653(32)
Data collector sets
653(2)
Alerts
655(1)
Event Viewer
655(4)
Event log filters
655(1)
Event log views
656(1)
Event subscriptions
657(1)
Event-driven tasks
658(1)
Network monitoring
659(2)
Resource Monitor
659(1)
Message Analyzer
660(1)
Azure Monitor
661(1)
Windows Server Backup
662(4)
Backup locations
664(1)
Backing up data
664(1)
Role- and application-specific backups
665(1)
Restore from backups
665(1)
Restore to an alternative location
666(1)
Azure Backup
666(4)
Preparing Azure Backup
667(2)
Backing up data to Azure Backup Agent
669(1)
Restore from Azure Backup
669(1)
Vssadmin
670(2)
Windows Server Update Services
672(7)
Products, security classifications, and languages
672(1)
Autonomous and replica modes
673(1)
Update files
673(1)
WSUS security roles
674(1)
WSUS groups
675(1)
WSUS policies
675(2)
Deploying updates
677(1)
Automatic approval rules
677(2)
Azure Update Management
679(4)
Monitoring and maintenance related PowerShell cmdlets
683(1)
WSUS related PowerShell cmdlets
684(1)
Chapter 22 Upgrade And Migration
685(38)
Supported upgrade and migration paths
685(8)
Upgrading roles and features
687(1)
Converting evaluation version to licensed version
688(1)
Upgrading editions
689(1)
Windows Server Migration Tools
689(4)
Active Directory
693(6)
FRS to DFSR migration
695(1)
Migrating to a new forest
696(3)
Active Directory Certificate Services
699(5)
Preparation
700(2)
Migration
702(1)
Verification and post migration tasks
703(1)
DNS
704(1)
DHCP
705(4)
Preparing to migrate DHCP
706(2)
Migration
708(1)
Verification and post migration tasks
709(1)
File and storage servers
709(14)
Migrate file servers using Storage Migration Service
710(8)
Migrate file and storage servers using WSMT
718(5)
Chapter 23 Troubleshooting
723(38)
Troubleshooting methodology
723(6)
Redeployment
724(1)
Symptoms and diagnosis
725(1)
Dependencies
726(1)
Ranking hypothetical solutions
727(1)
Applying solutions
728(1)
Command-line tools
729(4)
Sysinternals tools
733(28)
Process Explorer
734(1)
Process Monitor
735(1)
ProcDump
736(1)
PsTools
737(1)
VMMap
738(1)
SigCheck
739(1)
AccessChk
740(1)
Sysmon
741(3)
AccessEnum
744(1)
ShellRunAs
745(1)
LogonSessions
746(1)
Active Directory Explorer
746(3)
Insight for Active Directory
749(1)
PsPing
750(1)
RAMMap
751(10)
Index 761
Orin Thomas is a principal cloud operations advocate at Microsoft and has written more than three dozen books for Microsoft Press on topics including Windows Server, Windows Client, Azure, Office 365, System Center, Exchange Server, Security, and SQL Server. He has authored Azure Architecture courses at Pluralsight, has authored multiple Microsoft Official Curriculum and EdX courses on a variety of IT Pro topics, and is completing his Doctorate in Information Technology on cloud computing security and compliance at Charles Sturt University. You can follow him on twitter at http://twitter.com/orinthomas.