Introduction |
|
1 | (4) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (2) |
|
BOOK 1 INSTALLING AND SETTING UP WINDOWS SERVER 2022 |
|
|
5 | (68) |
|
Chapter 1 An Overview of Windows Server 2022 |
|
|
7 | (12) |
|
Extra! Extra! Read All About It! Seeing What's New in Windows Server 2022 |
|
|
8 | (1) |
|
Deciding Which Windows Server 2022 Edition Is Right for You |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Walking the Walk: Windows Server 2022 User Experiences |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Seeing What Server Manager Has to Offer |
|
|
13 | (2) |
|
Windows Admin Center: Your New Best Friend |
|
|
15 | (3) |
|
Extending and Improving Your Datacenter |
|
|
18 | (1) |
|
|
18 | (1) |
|
Azure Automanage: Hotpatch |
|
|
18 | (1) |
|
Chapter 2 Using Boot Diagnostics |
|
|
19 | (14) |
|
Accessing Boot Diagnostics |
|
|
19 | (1) |
|
|
19 | (3) |
|
Using Advanced Boot Options |
|
|
22 | (1) |
|
|
22 | (3) |
|
|
25 | (1) |
|
Enable Low-Resolution Video |
|
|
25 | (1) |
|
Last Known Good Configuration |
|
|
25 | (1) |
|
Directory Services Restore Mode |
|
|
25 | (1) |
|
|
26 | (1) |
|
Disable Automatic Restart on System Failure |
|
|
27 | (1) |
|
Disable Driver Signature Enforcement |
|
|
27 | (1) |
|
Disable Early Launch Anti-Malware Driver |
|
|
28 | (1) |
|
|
28 | (2) |
|
|
30 | (1) |
|
Working with Third-Party Boot Utilities |
|
|
31 | (2) |
|
Chapter 3 Performing the Basic Installation |
|
|
33 | (12) |
|
Making Sure You Have What It Takes |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Performing a Clean Install |
|
|
38 | (3) |
|
|
41 | (2) |
|
Performing a Network Install with Windows Deployment Services |
|
|
43 | (2) |
|
Chapter 4 Performing Initial Configuration Tasks |
|
|
45 | (28) |
|
Understanding Default Settings |
|
|
46 | (1) |
|
Getting an Overview of the Configuration Process |
|
|
47 | (1) |
|
Providing Computer Information |
|
|
48 | (1) |
|
Windows Server 2022 with Desktop Experience |
|
|
48 | (4) |
|
|
52 | (6) |
|
Updating Windows Server 2022 |
|
|
58 | (1) |
|
Windows Server 2022 with Desktop Experience |
|
|
59 | (1) |
|
|
60 | (2) |
|
Customizing Windows Server 2022 |
|
|
62 | (1) |
|
Windows Server 2022 with Desktop Experience |
|
|
62 | (3) |
|
|
65 | (4) |
|
Configuring Startup Options with BCDEdit |
|
|
69 | (4) |
|
BOOK 2 CONFIGURING WINDOWS SERVER 2022 |
|
|
73 | (144) |
|
Chapter 1 Configuring Server Roles and Features |
|
|
75 | (28) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Configure and Manage Storage |
|
|
79 | (1) |
|
Understanding Server Roles |
|
|
80 | (1) |
|
Active Directory Certificate Services |
|
|
80 | (1) |
|
Active Directory Domain Services |
|
|
81 | (1) |
|
Active Directory Federation Services |
|
|
81 | (1) |
|
Active Directory Lightweight Directory Services |
|
|
81 | (1) |
|
Active Directory Rights Management Services |
|
|
82 | (1) |
|
Device Health Attestation |
|
|
82 | (1) |
|
Dynamic Host Configuration Protocol |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
File and Storage Services |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Network Policy and Access Services |
|
|
85 | (1) |
|
Print and Document Services |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
Volume Activation Services |
|
|
86 | (1) |
|
|
87 | (1) |
|
Windows Deployment Services |
|
|
87 | (1) |
|
Windows Server Update Services |
|
|
87 | (1) |
|
Understanding Server Features |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Background Intelligent Transfer Service |
|
|
88 | (1) |
|
BitLocker Drive Encryption |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
Host Guardian Hyper-V Support |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
IP Address Management Server |
|
|
92 | (1) |
|
|
92 | (1) |
|
Management OData IIS Extension |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
Microsoft Defender Antivirus |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Peer Name Resolution Protocol |
|
|
94 | (1) |
|
Quality Windows Audio Video Experience |
|
|
94 | (1) |
|
RAS Connection Manager Administration Kit |
|
|
94 | (1) |
|
|
94 | (1) |
|
Remote Differential Compression |
|
|
94 | (1) |
|
Remote Server Administration Tools |
|
|
94 | (1) |
|
|
95 | (1) |
|
Setup and Boot Event Collection |
|
|
95 | (1) |
|
|
95 | (1) |
|
SMB 1.0/CIFS File Sharing Support |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
Simple Network Management Protocol Service |
|
|
96 | (1) |
|
|
96 | (1) |
|
Storage Migration Service |
|
|
96 | (1) |
|
Storage Migration Service Proxy |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
VM Shielding Tools for Fabric Management |
|
|
98 | (1) |
|
|
98 | (1) |
|
Windows Biometric Framework |
|
|
98 | (1) |
|
Windows Identity Foundation 3.5 |
|
|
98 | (1) |
|
Windows Internal Database |
|
|
99 | (1) |
|
|
99 | (1) |
|
Windows Process Activation Service |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Windows Server Migration Tools |
|
|
100 | (1) |
|
Windows Standards-Based Storage Management |
|
|
100 | (1) |
|
Windows Subsystem for Linux |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (2) |
|
Chapter 2 Configuring Server Hardware |
|
|
103 | (42) |
|
Working with Device Manager |
|
|
104 | (1) |
|
|
104 | (1) |
|
Configuring how Device Manager displays |
|
|
104 | (2) |
|
Viewing devices that are not working properly |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Working with older devices |
|
|
109 | (1) |
|
Viewing individual device settings |
|
|
109 | (2) |
|
|
111 | (1) |
|
Configuring power management |
|
|
112 | (1) |
|
Using the Add Hardware Wizard |
|
|
113 | (1) |
|
Performing Hard-Drive-Related Tasks |
|
|
114 | (1) |
|
Choosing basic or dynamic disks |
|
|
114 | (1) |
|
|
115 | (2) |
|
Working with storage area networks |
|
|
117 | (1) |
|
Understanding Storage Spaces Direct |
|
|
118 | (6) |
|
Working with Storage Replica |
|
|
124 | (1) |
|
Using Storage Quality of Service |
|
|
125 | (1) |
|
Encrypting with BitLocker |
|
|
125 | (8) |
|
Performing Printer-Related Tasks |
|
|
133 | (1) |
|
Using the Printer Install Wizard |
|
|
133 | (2) |
|
Configuring print options |
|
|
135 | (1) |
|
Configuring the Print Server role |
|
|
136 | (4) |
|
Connecting to a Printer on a Print Server |
|
|
140 | (1) |
|
Performing Other Configuration Tasks |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (2) |
|
Chapter 3 Using the Settings Menu |
|
|
145 | (10) |
|
Accessing the Settings Menu |
|
|
145 | (1) |
|
Understanding Settings Menu Items |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (2) |
|
Chapter 4 Working with Workgroups |
|
|
155 | (16) |
|
Knowing What a Workgroup Is |
|
|
156 | (1) |
|
Knowing If a Workgroup Is Right for You |
|
|
156 | (1) |
|
Comparing Centralized and Group Sharing |
|
|
157 | (1) |
|
Configuring a Server for a Workgroup |
|
|
157 | (1) |
|
Changing the name of your workgroup |
|
|
158 | (2) |
|
|
160 | (1) |
|
Creating users and adding users to the group |
|
|
161 | (1) |
|
|
162 | (4) |
|
|
166 | (1) |
|
The Computer Management console |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (2) |
|
Examining the Peer Name Resolution Protocol |
|
|
169 | (2) |
|
Chapter 5 Promoting Your Server to Domain Controller |
|
|
171 | (32) |
|
|
172 | (1) |
|
|
172 | (1) |
|
Forests and domains and OUs, oh my! |
|
|
172 | (1) |
|
Understanding privileged domain groups |
|
|
173 | (1) |
|
Examining Flexible Single Master Operation roles on domain controllers |
|
|
173 | (2) |
|
Preparing to Create a Domain |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
Performing Domain Configuration Prerequisites |
|
|
178 | (1) |
|
Checking for unsupported roles and features |
|
|
178 | (1) |
|
Installing and configuring Domain Name System |
|
|
178 | (4) |
|
Installing and configuring Dynamic Host Configuration Protocol |
|
|
182 | (4) |
|
Configuring the Server as a Domain Controller |
|
|
186 | (1) |
|
Installing Active Directory Domain Services |
|
|
186 | (1) |
|
Configuring Active Directory Domain Services |
|
|
187 | (2) |
|
Converting your DNS Zone to an Active Directory Integrated Zone |
|
|
189 | (3) |
|
Authorizing your DHCP Server for your Active Directory environment |
|
|
192 | (1) |
|
Configuring the user accounts |
|
|
192 | (2) |
|
Sharing resources on a domain |
|
|
194 | (2) |
|
Joining clients to the domain |
|
|
196 | (4) |
|
|
200 | (3) |
|
Chapter 6 Managing DNS and DHCP with IP Address Management |
|
|
203 | (14) |
|
Installing IP Address Management |
|
|
204 | (1) |
|
Configuring IP Address Management |
|
|
205 | (4) |
|
Using IP Address Management |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
211 | (2) |
|
|
213 | (1) |
|
|
214 | (3) |
|
BOOK 3 ADMINISTERING WINDOWS SERVER 2022 |
|
|
217 | (122) |
|
Chapter 1 An Overview of the Tools Menu in Server Manager |
|
|
219 | (14) |
|
Accessing the Server Manager Tools Menu |
|
|
219 | (3) |
|
Working with Common Administrative Tools |
|
|
222 | (1) |
|
|
222 | (1) |
|
Defragment and Optimize Drives |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (2) |
|
|
227 | (1) |
|
|
227 | (2) |
|
|
229 | (1) |
|
Installing and Using Remote Server Administration Tools |
|
|
229 | (1) |
|
Installing Remote Server Administration Tools |
|
|
230 | (1) |
|
Using Remote Server Administration Tools |
|
|
230 | (3) |
|
Chapter 2 Setting Group Policy |
|
|
233 | (14) |
|
Understanding How Group Policy Works |
|
|
234 | (1) |
|
Starting the Group Policy Editor |
|
|
235 | (2) |
|
Performing Computer Management |
|
|
237 | (1) |
|
Modifying computer software settings |
|
|
238 | (1) |
|
Modifying computer settings |
|
|
238 | (2) |
|
Using Administrative Templates |
|
|
240 | (1) |
|
Performing User Configuration |
|
|
241 | (1) |
|
Modifying user software settings |
|
|
241 | (1) |
|
Modifying a user's Windows Settings |
|
|
241 | (2) |
|
Using user Administrative Templates |
|
|
243 | (1) |
|
Viewing Resultant Set of Policy |
|
|
244 | (3) |
|
Chapter 3 Configuring the Registry |
|
|
247 | (16) |
|
|
248 | (1) |
|
Importing and Exporting Registry Elements |
|
|
248 | (1) |
|
Exporting Registry elements |
|
|
249 | (1) |
|
Importing Registry elements |
|
|
249 | (1) |
|
Finding Registry Elements |
|
|
250 | (1) |
|
Understanding Registry Data Types |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Loading and Unloading Hives |
|
|
256 | (1) |
|
Connecting to Network Registries |
|
|
257 | (2) |
|
Setting Registry Security |
|
|
259 | (1) |
|
Setting permissions in the Windows Registry |
|
|
259 | (1) |
|
Disabling Remote Registry access |
|
|
259 | (1) |
|
Securing remote administration |
|
|
260 | (3) |
|
Chapter 4 Working with Active Directory |
|
|
263 | (16) |
|
|
263 | (1) |
|
Configuring Objects in Active Directory |
|
|
264 | (1) |
|
Using Active Directory Domains and Trusts |
|
|
265 | (4) |
|
Using Active Directory Sites and Services |
|
|
269 | (1) |
|
Using Active Directory Users and Computers |
|
|
270 | (4) |
|
Using Active Directory Administrative Center |
|
|
274 | (5) |
|
Chapter 5 Performing Standard Maintenance |
|
|
279 | (34) |
|
|
279 | (1) |
|
Through the graphical user interface |
|
|
280 | (1) |
|
|
280 | (2) |
|
Configuring the User Interface |
|
|
282 | (1) |
|
Working with the Folder Options dialog box |
|
|
282 | (2) |
|
Setting your Internet Options |
|
|
284 | (2) |
|
Focusing on your Personalization settings |
|
|
286 | (1) |
|
|
287 | (1) |
|
Setting your Regional and Language Options |
|
|
288 | (1) |
|
Working with the Performance Options dialog box |
|
|
288 | (2) |
|
Understanding How User Access Control Affects Maintenance Tasks |
|
|
290 | (1) |
|
Adding and Removing Standard Applications |
|
|
291 | (1) |
|
Measuring Reliability and Performance |
|
|
292 | (1) |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
294 | (2) |
|
Protecting the Data on Your Server |
|
|
296 | (1) |
|
|
296 | (3) |
|
|
299 | (1) |
|
Performing Disk Management Tasks |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
Automating Diagnostic Tasks with Task Scheduler |
|
|
302 | (1) |
|
|
303 | (1) |
|
Using preconfigured tasks |
|
|
303 | (3) |
|
|
306 | (1) |
|
Working with Remote Desktop |
|
|
306 | (2) |
|
Working with Remote Server Administration Tools |
|
|
308 | (1) |
|
Figuring out firewall rules |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
308 | (2) |
|
Working with Admin Center |
|
|
310 | (1) |
|
Focusing on firewall rules |
|
|
310 | (1) |
|
|
310 | (1) |
|
Using Windows Admin Center to manage your servers |
|
|
311 | (1) |
|
Creating a Windows Recovery Drive |
|
|
312 | (1) |
|
Chapter 6 Working at the Command Line |
|
|
313 | (12) |
|
Opening an Administrative Command Prompt |
|
|
313 | (1) |
|
Configuring the Command Line |
|
|
314 | (1) |
|
Customizing how you interact with the Command Prompt |
|
|
315 | (2) |
|
|
317 | (1) |
|
Choosing your window layout |
|
|
317 | (1) |
|
|
318 | (1) |
|
Making the Command Prompt your own |
|
|
318 | (2) |
|
Setting Environmental Variables |
|
|
320 | (1) |
|
Getting Help at the Command Line |
|
|
321 | (2) |
|
Understanding Command Line Symbols |
|
|
323 | (2) |
|
Chapter 7 Working with PowerShell |
|
|
325 | (14) |
|
Opening an Administrative PowerShell Window |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (2) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
Customizing PowerShell a Little Further |
|
|
332 | (1) |
|
|
333 | (1) |
|
Setting Environmental Variables |
|
|
334 | (2) |
|
Getting Help in PowerShell |
|
|
336 | (1) |
|
Understanding PowerShell Punctuation |
|
|
337 | (2) |
|
BOOK 4 CONFIGURING NETWORKING IN WINDOWS SERVER 2022 |
|
|
339 | (2) |
|
Chapter 1 Overview of Windows Server 2022 |
|
|
|
|
341 | (1) |
|
Getting Acquainted with the Network and Sharing Center |
|
|
342 | (2) |
|
Using the Network Connections Tools |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
345 | (2) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (3) |
|
|
351 | (1) |
|
|
352 | (2) |
|
|
354 | (2) |
|
|
356 | (1) |
|
Making DNS fault tolerant |
|
|
356 | (3) |
|
Chapter 2 Performing Basic Network Tasks |
|
|
359 | (12) |
|
Viewing Network Properties |
|
|
359 | (2) |
|
Connecting to Another Network |
|
|
361 | (1) |
|
Connecting to the Internet |
|
|
362 | (1) |
|
Setting up a dial-up connection |
|
|
363 | (1) |
|
Connecting to a virtual private network |
|
|
364 | (1) |
|
Managing Network Connections |
|
|
365 | (1) |
|
Understanding the Client for Microsoft Networks feature |
|
|
366 | (1) |
|
Configuring the Internet Protocol |
|
|
366 | (2) |
|
Installing network features |
|
|
368 | (1) |
|
Uninstalling network features |
|
|
369 | (2) |
|
Chapter 3 Accomplishing Advanced Network Tasks |
|
|
371 | (18) |
|
Working with Remote Desktop Services |
|
|
371 | (1) |
|
Installing Remote Desktop Services |
|
|
372 | (2) |
|
Configuring user-specific settings |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (2) |
|
Configuring and using RDS licensing |
|
|
378 | (4) |
|
Working with Network Policy and Access Services |
|
|
382 | (1) |
|
|
382 | (4) |
|
Troubleshooting at the Command Line |
|
|
386 | (3) |
|
Chapter 4 Diagnosing and Repairing Network Connection Problems |
|
|
389 | (12) |
|
Using Windows Network Diagnostics |
|
|
390 | (2) |
|
Repairing Individual Connections |
|
|
392 | (1) |
|
Network Troubleshooting at the Command Line |
|
|
393 | (2) |
|
Working with Windows Firewall |
|
|
395 | (2) |
|
Making Sense of Common Configuration Errors |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (1) |
|
An application is experiencing network issues |
|
|
398 | (1) |
|
Everything should be working, but it's not |
|
|
398 | (1) |
|
Working with Other Troubleshooting Tools |
|
|
398 | (3) |
|
BOOK 5 MANAGING SECURITY WITH WINDOWS SERVER 2022 |
|
|
401 | (112) |
|
Chapter 1 Understanding Windows Server 2022 Security |
|
|
403 | (16) |
|
Understanding Basic Windows Server Security |
|
|
403 | (1) |
|
The CIA triad: Confidentiality, integrity, and availability |
|
|
404 | (1) |
|
Authentication, authorization, and accounting |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (3) |
|
Working with Files and Folders |
|
|
409 | (1) |
|
Setting file and folder security |
|
|
409 | (4) |
|
Creating a Local Security Policy |
|
|
413 | (1) |
|
Paying Attention to Windows Security |
|
|
414 | (1) |
|
Virus & Threat Protection |
|
|
415 | (1) |
|
Firewall & Network Protection |
|
|
415 | (1) |
|
|
416 | (2) |
|
|
418 | (1) |
|
Chapter 2 Configuring Shared Resources |
|
|
419 | (20) |
|
Comparing Share Security with File System Security |
|
|
420 | (1) |
|
Shared folder permissions |
|
|
420 | (1) |
|
|
421 | (1) |
|
Effective permissions validation |
|
|
422 | (2) |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
Configuring Access with Federated Rights Management |
|
|
426 | (1) |
|
Working with Active Directory Federation Services |
|
|
426 | (5) |
|
Working with Active Directory Rights Management Services |
|
|
431 | (8) |
|
Chapter 3 Configuring Operating System Security |
|
|
439 | (18) |
|
Understanding and Using User Account Control |
|
|
439 | (1) |
|
Using User Account Control to protect the server |
|
|
440 | (1) |
|
Running tasks as administrator |
|
|
441 | (1) |
|
Watching out for automatic privilege elevation |
|
|
441 | (1) |
|
Overriding User Account Control settings |
|
|
441 | (4) |
|
|
445 | (1) |
|
Understanding Credential Guard |
|
|
446 | (1) |
|
How Credential Guard works |
|
|
446 | (1) |
|
Credential Guard Hardware Requirements |
|
|
446 | (1) |
|
How to enable Credential Guard |
|
|
447 | (3) |
|
Configuring Startup and Recovery Options |
|
|
450 | (2) |
|
|
452 | (1) |
|
Cipher protocols and cipher suites |
|
|
452 | (1) |
|
Changing the default priority order of cipher suites |
|
|
453 | (1) |
|
Disabling older protocols |
|
|
454 | (3) |
|
Chapter 4 Working with the Internet |
|
|
457 | (14) |
|
|
457 | (1) |
|
Getting acquainted with the Windows Defender Firewall profiles |
|
|
458 | (1) |
|
Enabling and disabling the Windows Defender Firewall |
|
|
459 | (2) |
|
Configuring Windows Defender Firewall with Advanced Security |
|
|
461 | (2) |
|
Working with profile settings |
|
|
463 | (1) |
|
Working with inbound/outbound rules |
|
|
464 | (4) |
|
|
468 | (1) |
|
Configuring the IPSec settings |
|
|
469 | (2) |
|
Chapter 5 Understanding Digital Certificates |
|
|
471 | (8) |
|
Certificates in Windows Server 2022 |
|
|
472 | (1) |
|
|
472 | (2) |
|
Certificate-specific concepts |
|
|
474 | (1) |
|
Types of Certificates in Active Directory Certificate Services |
|
|
475 | (1) |
|
|
475 | (2) |
|
|
477 | (2) |
|
Chapter 6 Installing and Configuring AD CS |
|
|
479 | (20) |
|
Introducing Certificate Authority Architecture |
|
|
480 | (1) |
|
Root certificate authorities |
|
|
480 | (1) |
|
Issuing certificate authorities |
|
|
481 | (1) |
|
Policy certificate authorities |
|
|
481 | (1) |
|
Installing a Certificate Authority |
|
|
481 | (1) |
|
Creating the CAPolicy.inf file |
|
|
481 | (2) |
|
Installing the root certificate authority |
|
|
483 | (4) |
|
Installing the issuing certificate authority |
|
|
487 | (2) |
|
Enrolling for certificates |
|
|
489 | (2) |
|
Setting up web enrollment |
|
|
491 | (1) |
|
Installing Online Certificate Status Protocol |
|
|
492 | (4) |
|
Configuring Certificate Auto-Enrollment |
|
|
496 | (1) |
|
|
496 | (1) |
|
|
497 | (2) |
|
Chapter 7 Securing Your DNS Infrastructure |
|
|
499 | (14) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (4) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (3) |
|
Protecting DNS Traffic with DNS-over-HTTPS |
|
|
509 | (1) |
|
Enabling DoH in Server 2022 |
|
|
510 | (1) |
|
Using Group Policy to enable DoH |
|
|
511 | (2) |
|
BOOK 6 WORKING WITH WINDOWS POWERSHELL |
|
|
513 | (80) |
|
Chapter 1 Introducing PowerShell |
|
|
515 | (32) |
|
Understanding the Basics of PowerShell |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
519 | (2) |
|
|
521 | (1) |
|
Writing PowerShell commands and scripts |
|
|
521 | (4) |
|
|
525 | (1) |
|
Working with the pipeline |
|
|
526 | (2) |
|
|
528 | (2) |
|
Working with comparison operators |
|
|
530 | (1) |
|
Getting information out of PowerShell |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
534 | (4) |
|
Running PowerShell Remotely |
|
|
538 | (1) |
|
|
538 | (1) |
|
|
539 | (1) |
|
|
539 | (1) |
|
Getting Help in PowerShell |
|
|
540 | (1) |
|
|
540 | (1) |
|
|
541 | (1) |
|
|
541 | (1) |
|
Identifying Security Issues with PowerShell |
|
|
541 | (1) |
|
|
542 | (1) |
|
|
542 | (2) |
|
Firewall requirements for PowerShell remoting |
|
|
544 | (3) |
|
Chapter 2 Understanding the NET Framework |
|
|
547 | (8) |
|
Introducing the Various Versions of NET Framework |
|
|
547 | (3) |
|
Focusing on New Features in NET 4.8 |
|
|
550 | (1) |
|
Viewing the Global Assembly Cache |
|
|
551 | (1) |
|
Understanding assembly security |
|
|
552 | (1) |
|
Identifying the two types of assembly privacy |
|
|
552 | (1) |
|
Viewing assembly properties |
|
|
552 | (1) |
|
Understanding NET Standard and NET Core |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
|
Tying it all together: NET and PowerShell |
|
|
554 | (1) |
|
Chapter 3 Working with Scripts and Cmdlets |
|
|
555 | (10) |
|
Introducing Common Scripts and Cmdlets |
|
|
555 | (2) |
|
Executing Scripts or Cmdlets |
|
|
557 | (1) |
|
|
557 | (1) |
|
Combining multiple cmdlets |
|
|
558 | (1) |
|
Working from Another Location |
|
|
559 | (1) |
|
Performing Simple Administrative Tasks with PowerShell |
|
|
|
|
560 | (1) |
|
Adding users in Active Directory |
|
|
560 | (1) |
|
Creating a CSV file and populating it with data from |
|
|
|
|
561 | (1) |
|
Checking to see if a patch is installed |
|
|
562 | (1) |
|
Checking running processes or services |
|
|
563 | (2) |
|
Chapter 4 Creating Your Own Scripts and Advanced Functions |
|
|
565 | (16) |
|
Creating a PowerShell Script |
|
|
566 | (1) |
|
|
566 | (5) |
|
|
571 | (1) |
|
|
572 | (1) |
|
Signing a PowerShell Script |
|
|
573 | (1) |
|
Creating a PowerShell Advanced Function |
|
|
573 | (1) |
|
|
574 | (1) |
|
Creating the advanced function |
|
|
575 | (2) |
|
Using the advanced function |
|
|
577 | (4) |
|
Chapter 5 PowerShell Desired State Configuration |
|
|
581 | (12) |
|
Getting an Overview of PowerShell Desired State Configuration |
|
|
582 | (1) |
|
|
582 | (1) |
|
|
583 | (2) |
|
Local Configuration Manager |
|
|
585 | (1) |
|
Creating a PowerShell Desired State Configuration Script |
|
|
586 | (2) |
|
Applying the PowerShell Desired State Configuration Script |
|
|
588 | (1) |
|
|
588 | (1) |
|
Applying the new configuration |
|
|
589 | (1) |
|
Push and Pull: Using PowerShell Desired State Configuration at Scale |
|
|
590 | (1) |
|
|
590 | (1) |
|
|
591 | (2) |
|
BOOK 7 INSTALLING AND ADMINISTERING HYPER-V |
|
|
593 | (74) |
|
Chapter 1 What Is Hyper-V? |
|
|
595 | (12) |
|
Introduction to Virtualization |
|
|
595 | (1) |
|
Type 1 and Type 2 Hypervisors |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
597 | (1) |
|
Installing and Configuring Hyper-V |
|
|
597 | (1) |
|
|
598 | (2) |
|
|
600 | (4) |
|
|
604 | (1) |
|
|
605 | (2) |
|
Chapter 2 Virtual Machines |
|
|
607 | (12) |
|
Creating a Virtual Machine |
|
|
607 | (4) |
|
Configuring a Virtual Machine |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
612 | (1) |
|
|
612 | (1) |
|
|
613 | (1) |
|
|
614 | (1) |
|
|
615 | (1) |
|
|
616 | (1) |
|
|
617 | (1) |
|
|
617 | (1) |
|
|
617 | (1) |
|
Smart Paging File Location |
|
|
617 | (1) |
|
|
618 | (1) |
|
|
618 | (1) |
|
Shielded Virtual Machines |
|
|
618 | (1) |
|
Chapter 3 Virtual Networking |
|
|
619 | (18) |
|
Identifying the Types of Virtual Switches? |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
Creating a Virtual Switch |
|
|
621 | (1) |
|
|
621 | (1) |
|
|
622 | (3) |
|
Getting into Advanced Hyper-V Networking |
|
|
625 | (1) |
|
Virtual local area network tagging |
|
|
625 | (2) |
|
|
627 | (1) |
|
Network interface card teaming |
|
|
628 | (4) |
|
Looking at single-root I/O virtualization |
|
|
632 | (5) |
|
Chapter 4 Virtual Storage |
|
|
637 | (14) |
|
Understanding Virtual Disk Formats |
|
|
637 | (1) |
|
Considering Types of Disks |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
639 | (1) |
|
Adding Storage to the Host |
|
|
639 | (1) |
|
|
639 | (2) |
|
Changing the default save locations of virtual disk files |
|
|
641 | (2) |
|
Adding Storage to the Virtual Machine |
|
|
643 | (1) |
|
Adding a new virtual drive |
|
|
643 | (2) |
|
|
645 | (1) |
|
Adding a pass-through disk |
|
|
646 | (2) |
|
Converting a VHD disk file to a VHDX disk file |
|
|
648 | (1) |
|
Attaching the converted drive to the virtual machine |
|
|
649 | (2) |
|
Chapter 5 High Availability in Hyper-V |
|
|
651 | (16) |
|
|
651 | (1) |
|
Setting up Hyper-V Replica on the Hyper-V hosts |
|
|
652 | (2) |
|
Setting up replication on the virtual machines |
|
|
654 | (2) |
|
|
656 | (1) |
|
Setting up live migration |
|
|
657 | (2) |
|
Kicking off a live migration |
|
|
659 | (1) |
|
|
660 | (1) |
|
|
661 | (1) |
|
Installing Failover Clustering |
|
|
661 | (1) |
|
Configuring Failover Clustering |
|
|
662 | (2) |
|
Configuring a witness for your failover cluster |
|
|
664 | (3) |
|
BOOK 8 INSTALLING, CONFIGURING, AND USING CONTAINERS |
|
|
667 | (66) |
|
Chapter 1 Introduction to Containers in Windows Server 2022 |
|
|
669 | (6) |
|
|
670 | (1) |
|
Knowing what a container looks like |
|
|
670 | (1) |
|
Defining important container terms |
|
|
671 | (1) |
|
Seeing how containers run on Windows |
|
|
671 | (1) |
|
Considering Use Cases for Containers |
|
|
672 | (1) |
|
|
672 | (1) |
|
|
672 | (1) |
|
Deciding What Type of Containers You Want to Use |
|
|
673 | (1) |
|
Windows Server containers |
|
|
673 | (1) |
|
|
673 | (1) |
|
Managing Containers at Scale |
|
|
674 | (1) |
|
Chapter 2 Docker and Docker Hub |
|
|
675 | (10) |
|
|
675 | (1) |
|
|
676 | (1) |
|
|
676 | (1) |
|
Introduction to Docker Hub |
|
|
677 | (1) |
|
|
677 | (2) |
|
Creating a private repository |
|
|
679 | (3) |
|
Using a private repository |
|
|
682 | (3) |
|
Chapter 3 Installing Containers on Windows Server 2022 |
|
|
685 | (10) |
|
Installing Windows Containers |
|
|
686 | (1) |
|
Installing Hyper-V Containers |
|
|
687 | (1) |
|
|
688 | (1) |
|
Testing Your Container Installation |
|
|
689 | (1) |
|
|
690 | (2) |
|
|
692 | (3) |
|
Chapter 4 Configuring Docker and Containers on Windows Server 2022 |
|
|
695 | (10) |
|
|
695 | (3) |
|
Applying Custom Metadata to Containers and Other Objects |
|
|
698 | (1) |
|
|
699 | (1) |
|
|
699 | (1) |
|
|
700 | (1) |
|
Starting containers automatically |
|
|
700 | (1) |
|
Limiting a container's resources |
|
|
701 | (1) |
|
Configuring the Docker Daemon with daemon.json |
|
|
702 | (3) |
|
Chapter 5 Managing Container Images |
|
|
705 | (10) |
|
Making Changes to Images and Saving the Changes You Make |
|
|
705 | (1) |
|
|
706 | (1) |
|
Connecting to the container and making changes |
|
|
707 | (1) |
|
Saving the changes to the container |
|
|
708 | (1) |
|
Pushing Images to Docker Hub |
|
|
709 | (1) |
|
Understanding private versus public repositories |
|
|
710 | (1) |
|
|
710 | (1) |
|
Pulling Images from Docker Hub |
|
|
711 | (1) |
|
Pulling from a public repository |
|
|
711 | (1) |
|
Pulling from a private repository |
|
|
712 | (1) |
|
Handling Image Versioning |
|
|
713 | (2) |
|
Chapter 6 Container Networking |
|
|
715 | (10) |
|
Considering the Different Types of Network Connections |
|
|
716 | (1) |
|
Viewing Your Network Adapters and Virtual Switches |
|
|
717 | (1) |
|
Configuring a Network Address Translation Network Connection |
|
|
718 | (1) |
|
Configuring a Transparent Network Connection |
|
|
719 | (1) |
|
Configuring an Overlay Network Connection |
|
|
720 | (1) |
|
Configuring an I2bridge Network Connection |
|
|
721 | (1) |
|
Configuring an I2tunnel Network Connection |
|
|
722 | (1) |
|
Removing a Network Connection |
|
|
723 | (1) |
|
|
723 | (2) |
|
Chapter 7 Container Storage |
|
|
725 | (8) |
|
Getting Acquainted with Container Storage |
|
|
725 | (1) |
|
Creating a Volume Inside of a Container |
|
|
726 | (3) |
|
Working with Persistent Volumes |
|
|
729 | (1) |
|
|
729 | (2) |
|
|
731 | (2) |
Index |
|
733 | |