Windows Server 2008 R2 Unleashed (343 page)

BOOK: Windows Server 2008 R2 Unleashed
6.42Mb size Format: txt, pdf, ePub
ads

FREE Online

Edition

Your purchase of
Windows Server® 2008 R2 Unleashed
includes access to a free online

edition for 45 days through the Safari Books Online subscription service. Nearly every

Sams book is available online through Safari Books Online, along with more than 5,000

other technical books and videos from publishers such as Addison-Wesley Professional,

ptg

Cisco Press, Exam Cram, IBM Press, O’Reilly, Prentice Hall, and Que.

SAFARI BOOKS ONLINE
allows you to search for a specific answer, cut and paste

code, download chapters, and stay current with emerging technologies.

Activate your FREE Online Edition at

www.informit.com/safarifree

STEP 1:
Enter the coupon code: UHDUOXA.

STEP 2:
New Safari users, complete the brief registration form.

Safari subscribers, just log in.

If you have difficulty registering on Safari or accessing the online edition,

please e-mail [email protected]

Document Outline
  • Sams - Windows Server 2008 R2 Unleashed (2010) (ATTiCA)
  • Table of Contents
  • Introduction
  • Part I: Windows Server 2008 R2 Overview
    • 1 Windows Server 2008 R2 Technology Primer
      • Windows Server 2008 R2 Defined
      • When Is the Right Time to Migrate?
      • Versions of Windows Server 2008 R2
      • What's New and What's the Same About Windows Server 2008 R2?
      • Changes in Active Directory
      • Windows Server 2008 R2 Benefits for Administration
      • Improvements in Security in Windows Server 2008 R2
      • Improvements in Mobile Computing in Windows Server 2008 R2
      • Improvements in Windows Server 2008 R2 for Better Branch Office Support
      • Improvements for Thin Client Remote Desktop Services
      • Improvements in Clustering and Storage Area Network Support
      • Addition of Migration Tools
      • Improvements in Server Roles in Windows Server 2008 R2
      • Identifying Which Windows Server 2008 R2 Service to Install or Migrate to First
      • Summary
      • Best Practices
    • 2 Planning, Prototyping, Migrating, and Deploying Windows Server 2008 R2 Best Practices
      • Determining the Scope of Your Project
      • Identifying the Business Goals and Objectives to Implement Windows Server 2008 R2
      • Identifying the Technical Goals and Objectives to Implement Windows Server 2008 R2
      • The Discovery Phase: Understanding the Existing Environment
      • The Design Phase: Documenting the Vision and the Plan
      • The Migration Planning Phase: Documenting the Process for Migration
      • The Prototype Phase: Creating and Testing the Plan
      • The Pilot Phase: Validating the Plan to a Limited Number of Users
      • The Migration/Implementation Phase: Conducting the Migration or Installation
      • Summary
      • Best Practices
    • 3 Installing Windows Server 2008 R2 and Server Core
      • Preplanning and Preparing a Server Installation
      • Installing a Clean Version of Windows Server 2008 R2 Operating System
      • Upgrading to Windows Server 2008 R2
      • Understanding Server Core Installation
      • Managing and Configuring a Server Core Installation
      • Performing an Unattended Windows Server 2008 R2 Installation
      • Summary
      • Best Practices
  • Part II: Windows Server 2008 R2 Active Directory
    • 4 Active Directory Domain Services Primer
      • Examining the Evolution of Directory Services
      • Understanding the Development of AD DS
      • Examining AD DS's Structure
      • Outlining AD DS's Components
      • Understanding Domain Trusts
      • Defining Organizational Units
      • Outlining the Role of Groups in an AD DS Environment
      • Explaining AD DS Replication
      • Outlining the Role of DNS in AD DS
      • Outlining AD DS Security
      • Outlining AD DS Changes in Windows Server 2008 R2
      • Summary
      • Best Practices
    • 5 Designing a Windows Server 2008 R2 Active Directory
      • Understanding AD DS Domain Design
      • Choosing a Domain Namespace
      • Examining Domain Design Features
      • Choosing a Domain Structure
      • Understanding the Single Domain Model
      • Understanding the Multiple Domain Model
      • Understanding the Multiple Trees in a Single Forest Model
      • Understanding the Federated Forests Design Model
      • Understanding the Empty-Root Domain Model
      • Understanding the Placeholder Domain Model
      • Understanding the Special-Purpose Domain Design Model
      • Renaming an AD DS Domain
      • Summary
      • Best Practices
    • 6 Designing Organizational Unit and Group Structure
      • Defining Organizational Units in AD DS
      • Defining AD Groups
      • Examining OU and Group Design
      • Starting an OU Design
      • Using OUs to Delegate Administration
      • Group Policies and OU Design
      • Understanding Group Design
      • Exploring Sample Design Models
      • Summary
      • Best Practices
    • 7 Active Directory Infrastructure
      • Understanding AD DS Replication in Depth
      • Understanding Active Directory Sites
      • Planning Replication Topology
      • Outlining Windows Server 2008 R2 IPv6 Support
      • Detailing Real-World Replication Designs
      • Deploying Read-Only Domain Controllers (RODCs)
      • Summary
      • Best Practices
    • 8 Creating Federated Forests and Lightweight Directories
      • Keeping a Distributed Environment in Sync
      • Active Directory Federation Services
      • Synchronizing Directory Information with Forefront Identity Manager (FIM)
      • Harnessing the Power and Potential of FIM
      • Summary
      • Best Practices
    • 9 Integrating Active Directory in a UNIX Environment
      • Understanding and Using Windows Server 2008 R2 UNIX Integration Components
      • Reviewing the Subsystem for UNIX-Based Applications (SUA)
      • Understanding the Identity Management for UNIX Components
      • Administrative Improvements with Windows Server 2008 R2
      • Summary
      • Best Practices
  • Part III: Networking Services
    • 10 Domain Name System and IPv6
      • Understanding the Need for DNS
      • Getting Started with DNS on Windows Server 2008 R2
      • Resource Records
      • Understanding DNS Zones
      • Performing Zone Transfers
      • Understanding DNS Queries
      • Other DNS Components
      • Understanding the Evolution of Microsoft DNS
      • DNS in Windows Server 2008 R2
      • DNS in an Active Directory Domain Services Environment
      • Troubleshooting DNS
      • IPv6 Introduction
      • How to Configure IPv6 on Windows Server 2008 R2
      • Secure DNS with DNSSEC
      • Summary
      • Best Practices
    • 11 DHCP/WINS/Domain Controllers
      • Understanding the Key Components of an Enterprise Network
      • Exploring the Dynamic Host Configuration Protocol (DHCP)
      • Exploring DHCP Changes in Windows Server 2008 R2
      • Enhancing DHCP Reliability
      • Implementing Redundant DHCP Services
      • Exploring Advanced DHCP Concepts
      • Securing DHCP
      • Reviewing the Windows Internet Naming Service (WINS)
      • Installing and Configuring WINS
      • Planning, Migrating, and Maintaining WINS
      • Exploring Global Catalog Domain Controller Placement
      • Summary
      • Best Practices
    • 12 Internet Information Services
      • Understanding Internet Information Services (IIS) 7.5
      • Planning and Designing Internet Information Services 7.5
      • Installing and Upgrading IIS 7.5
      • Installing and Configuring Websites
      • Installing and Configuring FTP Services
      • Securing Internet Information Services 7.5
      • Summary
      • Best Practices
  • Part IV: Security
    • 13 Server-Level Security
      • Defining Windows Server 2008 R2 Security
      • Deploying Physical Security
      • Using the Integrated Windows Firewall with Advanced Security
      • Hardening Server Security
      • Examining File-Level Security
      • Additional Security Mechanisms
      • Using Windows Server Update Services
      • Summary
      • Best Practices
    • 14 Transport-Level Security
      • Introduction to Transport-Level Security in Windows Server 2008 R2
      • Deploying a Public Key Infrastructure with Windows Server 2008 R2
      • Understanding Active Directory Certificate Services (AD CS) in Windows Server 2008 R2
      • Active Directory Rights Management Services
      • Using IPSec Encryption with Windows Server 2008 R2
      • Summary
      • Best Practices
    • 15 Security Policies, Network Policy Server, and Network Access Protection
      • Understanding Network Access Protection (NAP) in Windows Server 2008 R2
      • Deploying a Windows Server 2008 R2 Network Policy Server
      • Enforcing Policy Settings with a Network Policy Server
      • Deploying and Enforcing a Virtual Private Network (VPN) Using an RRAS Server
      • Summary
      • Best Practices
  • Part V: Migrating to Windows Server 2008 R2
    • 16 Migrating from Windows Server 2003/2008 to Windows Server 2008 R2
      • Beginning the Migration Process
      • Big Bang Migration
      • Phased Migration
      • Multiple Domain Consolidation Migration
      • Summary
      • Best Practices
    • 17 Compatibility Testing
      • The Importance of Compatibility Testing
      • Preparing for Compatibility Testing
      • Researching Products and Applications
      • Verifying Compatibility with Vendors
      • Microsoft Assessment and Planning (MAP) Toolkit
      • Lab-Testing Existing Applications
      • Documenting the Results of the Compatibility Testing
      • Determining Whether a Prototype Phase Is Required
      • Summary
      • Best Practices
  • Part VI: Windows Server 2008 R2 Administration and Management
    • 18 Windows Server 2008 R2 Administration
      • Defining the Administrative Model
      • Examining Active Directory Site Administration
      • Configuring Sites
      • Examining Windows Server 2008 R2 Active Directory Groups
      • Creating Groups
      • Managing Users with Local Security and Group Policies
      • Managing Printers with the Print Management Console
      • Summary
      • Best Practices
    • 19 Windows Server 2008 R2 Group Policies and Policy Management
      • Group Policy Overview
      • Group Policy Processing�How Does It Work?
      • Local Group Policies
      • Security Templates
      • Elements of Group Policy
      • Group Policy Administrative Templates Explained
      • Policy Management Tools
      • Designing a Group Policy Infrastructure
      • GPO Administrative Tasks
      • Summary
      • Best Practices
    • 20 Windows Server 2008 R2 Management and Maintenance Practices
      • Going Green with Windows Server 2008 R2
      • Initial Configuration Tasks
      • Managing Windows Server 2008 R2 Roles and Features
      • Server Manager
      • Server Manager Diagnostics Page
      • Server Manager Configuration Page
      • Server Manager Storage Page
      • Auditing the Environment
      • Managing Windows Server 2008 R2 Remotely
      • Using Common Practices for Securing and Managing Windows Server 2008 R2
      • Keeping Up with Service Packs and Updates
      • Maintaining Windows Server 2008 R2
      • Summary
      • Best Practices
    • 21 Automating Tasks Using PowerShell Scripting
      • Understanding Shells
      • Introduction to PowerShell
      • Understanding the PowerShell Basics
      • Using Windows PowerShell
      • Summary
      • Best Practices
    • 22 Documenting a Windows Server 2008 R2 Environment
      • Benefits of Documentation
      • Types of Documents
      • Planning to Document the Windows Server 2008 R2 Environment
      • Knowledge Sharing and Knowledge Management
      • Windows Server 2008 R2 Project Documents
      • Administration and Maintenance Documents
      • Network Infrastructure
      • Disaster Recovery Documentation
      • Change Management Procedures
      • Performance Documentation
      • Baselining Records for Documentation Comparisons
      • Routine Reporting
      • Security Documentation
      • Summary
      • Best Practices
    • 23 Integrating System Center Operations Manager 2007 R2 with Windows Server 2008 R2
      • Windows Server 2008 R2 Monitoring
      • What's New in OpsMgr R2
      • Explaining How OpsMgr Works
      • Outlining OpsMgr Architecture
      • Understanding How to Use OpsMgr
      • Understanding OpsMgr Component Requirements
      • Understanding Advanced OpsMgr Concepts
      • Securing OpsMgr
      • Installing Operations Manager 2007 R2
      • Configuring Operations Manager 2007 R2
      • Monitoring DMZ Servers with Certificates
      • Using Operations Manager 2007 R2
      • Summary
      • Best Practices
  • Part VII: Remote and Mobile Technologies
    • 24 Server-to-Client Remote Access and DirectAccess
      • VPN in Windows Server 2008 R2
      • Authentication Options to an RRAS System
      • VPN Protocols
      • DirectAccess in Windows Server 2008 R2
      • Choosing Between Traditional VPN Technologies and DirectAccess
      • Traditional VPN Scenario
      • DirectAccess Scenario
      • Connection Manager
      • Summary
      • Best Practices
    • 25 Remote Desktop Services
      • Why Implement Remote Desktop Services
      • How Remote Desktop Works
      • Understanding the Name Change
      • Understanding Remote Desktop Services
      • Planning for Remote Desktop Services
      • Deploying Remote Desktop Services
      • Securing Remote Desktop Services
      • Supporting Remote Desktop Services
      • Summary
      • Best Practices
  • Part VIII: Desktop Administration
    • 26 Windows Server 2008 R2 Administration Tools for Desktops
      • Managing Desktops and Servers
      • Operating System Deployment Options
      • Windows Server 2008 R2 Windows Deployment Services
      • Installing Windows Deployment Services (WDS)
      • Creating Discover Images
      • Creating Custom Installations Using Capture Images
      • General Desktop Administration Tasks
      • Summary
      • Best Practices
    • 27 Group Policy Management for Network Clients
      • The Need for Group Policies
      • Windows Group Policies
      • Group Policy Feature Set
      • Planning Workgroup and Standalone Local Group Policy Configuration
      • Planning Domain Group Policy Objects
      • Managing Computers with Domain Policies
      • Managing Users with Policies
      • Managing Active Directory with Policies
      • Summary
      • Best Practices
BOOK: Windows Server 2008 R2 Unleashed
6.42Mb size Format: txt, pdf, ePub
ads

Other books

The Chimera Sanction by André K. Baby
Lust Killer by Ann Rule
Tracy Tam: Santa Command by Drown, Krystalyn
Changed By Fire (Book 3) by D.K. Holmberg
Red Mist by Patricia Cornwell
Strings of the Heart by Katie Ashley
Sleeping With the Wolf by Maddy Barone
The Gauntlet by Lindsay McKenna
Lust: A Dictionary for the Insatiable by Adams Media Corporation