Windows 2000 Server System Administration Handbook
, by Syngress- ISBN: 9781928994091 | 1928994091
- Cover: Paperback
- Copyright: 3/17/2000
The Windows 2000 System Administration Migration Path | p. 1 |
Overview of Windows 2000 Administration | p. 43 |
Introduction to Network Administration | p. 44 |
Designing and Setting Up the Network | p. 45 |
Managing the Network | p. 46 |
Protecting the Network | p. 46 |
Documenting the Network | p. 48 |
Microsoft Management Console | p. 51 |
Introduction to Active Directory | p. 56 |
Key Concepts | p. 56 |
Features and Benefits of Active Directory | p. 65 |
Beyond Active Directory | p. 72 |
Volume Management | p. 72 |
Disk Quotas | p. 73 |
Defragmentation | p. 74 |
Backup and Recovery | p. 75 |
Hierarchical Storage Management | p. 76 |
File Service Management | p. 76 |
Distributed File System | p. 77 |
Using Windows 2000 Help | p. 79 |
Setting Up User Accounts | p. 87 |
Defining an Acceptable Use Policy | p. 88 |
Template: Acceptable Use/Security Policy | p. 90 |
Introduction to User Accounts | p. 95 |
Requirements for New User Accounts | p. 96 |
Default User Account Settings | p. 97 |
Creating a Domain User Account | p. 99 |
Active Directory Users and Computers | p. 99 |
Creating User Accounts | p. 100 |
Setting Password Requirements | p. 103 |
Security Templates | p. 103 |
Changing Account (Password) Policies | p. 106 |
Setting Properties for User Accounts | p. 110 |
Modifying User Accounts | p. 110 |
Managing User Accounts | p. 121 |
Deleting User Accounts | p. 122 |
Changing User Passwords | p. 122 |
Enabling an Account | p. 123 |
Disabling an Account | p. 123 |
Other Active Directory Users and Computers Functions | p. 123 |
Best Practices | p. 128 |
Using Active Directory Users and Computers | p. 129 |
Administrative Logon | p. 130 |
Account (Password) Policies | p. 132 |
Using Groups to Organize User Accounts | p. 135 |
Introduction to Groups | p. 136 |
Group Type | p. 139 |
Group Scope | p. 140 |
Implementing Group Strategies | p. 142 |
Why Use Groups? | p. 142 |
Structuring Groups | p. 143 |
Implementing Groups | p. 144 |
Preparing to Create Groups | p. 144 |
Information Needed to Create a Group | p. 144 |
Creating a Group | p. 145 |
Assigning Users to a Group | p. 147 |
Configuring Group Settings | p. 151 |
Managing Groups | p. 157 |
Implementing Local Groups | p. 160 |
Preparing to Create Local Groups | p. 160 |
Creating a Local Group | p. 161 |
Implementing Built-in Groups | p. 162 |
Built-in Domain Local Groups | p. 162 |
Built-in Global Groups | p. 163 |
Built-in Local Groups | p. 163 |
Built-in System Groups | p. 164 |
Built-in Group Behavior | p. 164 |
Best Practices | p. 168 |
Managing Groups | p. 169 |
Using Universal Groups | p. 169 |
Switching Modes | p. 170 |
Administering File Resources | p. 175 |
Introduction | p. 176 |
Using Microsoft Windows NT File System (NTFS) Permissions | p. 176 |
NTFS Folder Permissions | p. 176 |
NTFS File Permissions | p. 177 |
How Windows 2000 Applies NTFS Permissions | p. 178 |
Access Control Lists | p. 178 |
Combining NTFS Permissions | p. 179 |
Permission Inheritance | p. 180 |
Assigning NTFS Permissions | p. 181 |
Planning NTFS Permissions | p. 181 |
Managing NTFS Permissions | p. 182 |
Special Access Permissions | p. 185 |
Using Special Access Permissions | p. 188 |
Changing NTFS Permissions | p. 191 |
Copying and Moving Files and Folders | p. 192 |
Copying Files | p. 192 |
Moving Files | p. 193 |
Sharing Resources | p. 196 |
Securing Network Resources | p. 196 |
Shared Folder Permissions | p. 197 |
Creating Shared Folders | p. 198 |
Developing a Shared Folder Strategy | p. 198 |
Sharing Folders | p. 200 |
NTFS Permissions and Shared Folders | p. 211 |
Troubleshooting Access Problems | p. 213 |
Solving Permission Problems | p. 213 |
Best Practices | p. 214 |
Avoiding Permission-Related Access Problems | p. 215 |
Guidelines for Managing Shared Folder Permissions | p. 216 |
Administering User Accounts | p. 221 |
Managing User Profiles | p. 222 |
User Profiles Overview | p. 222 |
Contents of a User Profile | p. 223 |
Settings Saved in a User Profile | p. 225 |
Local User Profiles | p. 226 |
Roaming User Profiles | p. 227 |
Creating Home Folders | p. 235 |
Home Directories and My Documents | p. 235 |
Creating Home Directories | p. 236 |
Introduction to Group Policies | p. 239 |
Applying Group Policy | p. 240 |
Best Practices | p. 242 |
Allowing for Different Hardware Configurations | p. 242 |
Combining the Power of Profiles and Policies | p. 242 |
Tightening Security on Home Directories | p. 243 |
Administering Printer Resources | p. 247 |
Introduction to Administering Printers | p. 248 |
Terminology | p. 248 |
Planning the Print Environment | p. 248 |
Creating the Print Environment | p. 250 |
Printer Properties | p. 261 |
General | p. 261 |
Sharing | p. 262 |
Ports | p. 262 |
Advanced | p. 263 |
Security | p. 263 |
Device Settings | p. 265 |
Managing Printer Permissions | p. 265 |
Security/Sharing Permissions | p. 266 |
Printer Ownership | p. 268 |
Managing Printers | p. 269 |
Assigning Forms to Paper Trays | p. 269 |
Assigning Separator Pages | p. 270 |
Creating a Printer Pool | p. 272 |
Specifying Printer Priorities | p. 273 |
Redirecting a Printer | p. 274 |
Removing Printer Drivers | p. 275 |
Managing Documents in a Print Queue | p. 276 |
Setting Priority, Notification, Printing Time | p. 277 |
Administering Printers by Using a Web Browser | p. 278 |
Best Practices | p. 281 |
Organize Printers by Business Function or Geographic Location | p. 281 |
Put Print Devices on a Separate Network | p. 282 |
Allow Clients Access to Web Printing Interfaces | p. 282 |
Restart Print Spool Service Periodically | p. 283 |
Managing Storage Data | p. 285 |
Managing Data Compression | p. 286 |
Compressing Files and Folders | p. 286 |
Managing Disk Quotas | p. 297 |
Encrypting Data | p. 305 |
File Encryption | p. 308 |
Decryption of Files | p. 308 |
Storing Encrypted Files on Remote Servers | p. 308 |
Accessing Encrypted Data | p. 309 |
Moving and Renaming Encrypted Data | p. 309 |
Decrypting Data | p. 309 |
The Recovery Agent | p. 310 |
Using Disk Defragmenter | p. 311 |
Defragmenting NTFS File System Partitions | p. 316 |
Troubleshooting Data Storage | p. 317 |
Monitoring Event Logs | p. 321 |
Introduction to Monitoring Event Logs | p. 322 |
Viewing Event Logs | p. 325 |
Monitoring Security Events | p. 336 |
Auditing Files and Folders | p. 342 |
Auditing Registry Entries | p. 347 |
Analyzing Security Events | p. 353 |
Managing Event Logs | p. 354 |
Backing Up and Restoring Data | p. 363 |
Introduction to Backing Up and Recovering Data | p. 364 |
Types of Backups | p. 367 |
Necessary Permissions and User Rights | p. 370 |
System State Data | p. 371 |
Emergency Repair Disk | p. 372 |
Back Up and Restore Options | p. 373 |
Backing Up Data | p. 380 |
Restoring Data | p. 389 |
Authoritative Restore | p. 391 |
Maintaining Media | p. 393 |
Advanced Administration of Windows 2000 | p. 399 |
Administering Windows 2000 | p. 400 |
Microsoft Management Console | p. 400 |
Windows 2000 System Administration | p. 402 |
Windows 2000 Network Administration | p. 410 |
Customizing Windows 2000 Tools for Your Environment | p. 452 |
Understanding the Logon Process | p. 460 |
Logon Authentication | p. 460 |
Secondary Logon Services | p. 461 |
Windows 2000 Resource Kit | p. 462 |
Direct X Diagnostic Utility | p. 462 |
Command Line Kill | p. 463 |
Sysprep | p. 463 |
Setup Manager | p. 464 |
Sysdiff | p. 465 |
Dependency Walker | p. 466 |
Shutdown | p. 467 |
Netdiag | p. 467 |
Administering Active Directory | p. 469 |
Introduction to Administering Active Directory | p. 470 |
Active Directory Concepts | p. 471 |
Active Directory Components | p. 482 |
Using Active Directory Management Utilities | p. 486 |
Publishing Objects in Active Directory | p. 503 |
Sharing Resources | p. 503 |
Locating Objects in Active Directory | p. 506 |
Controlling Access to Objects | p. 508 |
User Authentication | p. 509 |
Object-based Access Control | p. 509 |
Active Directory Permissions | p. 512 |
Delegating Administrative Control of Objects | p. 512 |
Delegation of Control Wizard | p. 513 |
Overview of Active Directory Service Interface (ADSI) | p. 515 |
Implementing Group Policy | p. 523 |
Introduction to Windows 2000 Group Policy | p. 524 |
Group Policy Structure | p. 525 |
Types of Configurations | p. 526 |
Type of Group Policies | p. 530 |
Group Policy Objects | p. 531 |
Group Policy Containers | p. 532 |
Group Policy Templates | p. 532 |
How Group Policy Is Applied in Active Directory | p. 536 |
Modifying Group Policy Inheritance | p. 542 |
Modifying Group Policy | p. 543 |
Delegating Administrative Control of a Group Policy Object | p. 550 |
Creating a Group Policy Object | p. 552 |
Modifying a Group Policy Object | p. 554 |
Managing a Group Policy Object Link to a Site, Domain, or Organizational Unit | p. 555 |
Guidelines for Implementing Group Policy | p. 557 |
Managing User Environments Using Group Policy | p. 567 |
Introduction to Managing User Environments | p. 568 |
Types of Group Policy for Managing User Environments | p. 569 |
Group Policy Snap-In for the Microsoft Management Console | p. 570 |
Using Administrative Templates | p. 573 |
Assigning Registry-Based Policies | p. 576 |
Creating Custom Administrative Templates | p. 579 |
Adding Administrative Templates | p. 585 |
Using Scripts | p. 586 |
Assigning Script Policies to Users and Computers | p. 588 |
Folder Redirection | p. 590 |
Managing Software by Using Group Policy | p. 595 |
Introduction to Managing Software Deployment | p. 596 |
Deploying Software | p. 597 |
Creating Software Packages | p. 599 |
Creating a Non-Windows Installer Package File | p. 601 |
Managing Software | p. 605 |
Maintaining Software | p. 615 |
Upgrading Software | p. 621 |
Removing Software | p. 623 |
Administering User Accounts and Groups | p. 629 |
Introduction to Administration of User Accounts and Groups | p. 630 |
Creating Multiple User Accounts | p. 631 |
Migrating Users from an NT 4.0 Domain | p. 632 |
Creating New Active Directory Users in Bulk | p. 634 |
Importing Users from Novell Directory Services (NDS) | p. 636 |
Administering Logon Names | p. 636 |
Lockout Settings | p. 636 |
Password Requirements | p. 639 |
Configuring Account Policies Using Group Policy | p. 641 |
Troubleshooting User Logon Problems | p. 646 |
Unable to Find a Domain Controller | p. 646 |
Unable to Load the User Profile | p. 648 |
Missing Computer Account | p. 650 |
Redirecting User Data to a Network Share | p. 651 |
Setting Up Accounts for Mobile Users | p. 655 |
Multilink and Bandwidth Allocation Protocol (BAP) | p. 658 |
Using Universal Groups | p. 660 |
Implementing Security in a Windows 2000 Network | p. 669 |
Introduction to Securing a Windows 2000 Network | p. 670 |
Applying Security Policies | p. 671 |
The Security Settings Extension to Group Policy | p. 672 |
Order of Precedence | p. 674 |
Creating, Modifying, and Analyzing Security | |
Configurations | p. 675 |
Security Configuration and Analysis Snap-in | p. 675 |
SECEDIT.EXE | p. 677 |
Configuring an Audit Policy | p. 679 |
Analyzing Security Configurations | p. 683 |
Security Configuration Templates | p. 685 |
Implementing Public Key Security | p. 687 |
Components of Public Key Services | p. 688 |
Using Public Key Services | p. 693 |
Enabling and Administering File Encryption | p. 702 |
Encrypted File System Architecture | p. 703 |
Using the Encrypted File System | p. 705 |
Guidelines for Using EFS | p. 709 |
Sharing File Resources by Using DFS | p. 717 |
Introduction to DFS | p. 718 |
Setting Up a Fault-Tolerant DFS Root | p. 722 |
Setting Up a Stand-Alone DFS Root | p. 730 |
Setting Up Child Nodes | p. 736 |
Configuring Child Nodes as Replica Sets | p. 738 |
Administering DFS | p. 741 |
Connecting to an Existing DFS Root | p. 742 |
Command-Line Administration | p. 743 |
Removing DFS Roots and Nodes | p. 745 |
Client Interactions with DFS | p. 748 |
Security Concerns | p. 748 |
Implementing Disaster Protection | p. 753 |
Introduction | p. 754 |
Protecting a Windows 2000 Network from Disasters | p. 754 |
Backing Up Data | p. 758 |
The Recovery Console | p. 765 |
Advanced Startup Options | p. 766 |
Recovering from a System Failure | p. 768 |
Repairing and Restoring Active Directory | p. 771 |
Authoritative Restore | p. 779 |
Index | p. 783 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.