| Foreword |
|
xxvii | |
| Preface |
|
xxix | |
| Acknowledgments |
|
xxxv | |
| About the Authors |
|
xxxvii | |
|
|
|
1 | (24) |
|
Windows Server 2003: A Historical Perspective |
|
|
2 | (1) |
|
The Windows Server 2003 Family: What's in a Name? |
|
|
3 | (5) |
|
Windows XP Home and Professional Editions |
|
|
4 | (1) |
|
Windows Server 2003, Web Edition |
|
|
5 | (1) |
|
Windows Server 2003, Standard Edition |
|
|
5 | (1) |
|
Windows Server 2003, Enterprise Edition |
|
|
5 | (1) |
|
Windows Server 2003, Datacenter Edition |
|
|
5 | (3) |
|
Understanding the .NET Framework |
|
|
8 | (4) |
|
|
|
8 | (1) |
|
Components of .NET and Product Layers |
|
|
9 | (2) |
|
BackOffice Suite Moves Forward as Renamed .NET Products |
|
|
11 | (1) |
|
Microsoft Operations Manager |
|
|
11 | (1) |
|
Windows Server 2003 Administrative Roles |
|
|
12 | (2) |
|
|
|
14 | (1) |
|
Windows Server 2003 Features and Administrative Implications |
|
|
14 | (9) |
|
|
|
15 | (1) |
|
|
|
16 | (1) |
|
|
|
17 | (1) |
|
|
|
17 | (1) |
|
The Administrator Interface and Tools |
|
|
18 | (2) |
|
Networking and Communications |
|
|
20 | (1) |
|
|
|
21 | (1) |
|
|
|
22 | (1) |
|
Security and Authentication |
|
|
23 | (1) |
|
|
|
23 | (2) |
|
Windows Server 2003 Structure and Architecture |
|
|
25 | (44) |
|
Structural Modes, Subsystems, and Managers |
|
|
26 | (9) |
|
|
|
26 | (1) |
|
The Windows Server 2003 Executive Mode |
|
|
27 | (1) |
|
The Hardware Abstraction Layer |
|
|
28 | (1) |
|
|
|
28 | (1) |
|
|
|
28 | (1) |
|
|
|
29 | (3) |
|
The Executive Services Buffer |
|
|
32 | (1) |
|
The Windows Server 2003 User Mode |
|
|
32 | (1) |
|
The Protected User Mode System |
|
|
32 | (3) |
|
Windows Server 2003 Processes |
|
|
35 | (16) |
|
Processes, Threads, and Handles |
|
|
35 | (2) |
|
|
|
37 | (2) |
|
|
|
39 | (2) |
|
Starting and Killing Processes |
|
|
41 | (2) |
|
|
|
43 | (1) |
|
|
|
44 | (4) |
|
|
|
48 | (3) |
|
Stored and Virtual Memory |
|
|
51 | (6) |
|
Stored Memory and File System Basics |
|
|
51 | (1) |
|
The File Allocation Table: FAT and FAT32 |
|
|
51 | (1) |
|
|
|
52 | (2) |
|
File Objects in the NTFS File System |
|
|
54 | (2) |
|
The Virtual Memory Manager and Paging |
|
|
56 | (1) |
|
|
|
57 | (3) |
|
The Windows Server 2003 Registry |
|
|
60 | (3) |
|
|
|
61 | (1) |
|
|
|
62 | (1) |
|
|
|
63 | (1) |
|
Viewing Application Dependencies |
|
|
64 | (2) |
|
Application Compatibility |
|
|
66 | (1) |
|
Unauthorized Applications |
|
|
67 | (1) |
|
IntelliMirror and Other Innovations |
|
|
67 | (1) |
|
|
|
68 | (1) |
|
Planning and Installation |
|
|
69 | (46) |
|
Logical and Physical Structures |
|
|
70 | (1) |
|
Understanding the Current Enterprise |
|
|
71 | (10) |
|
Taking Stock: First Inventory, Then Document |
|
|
72 | (1) |
|
Legacy Enterprise Analysis |
|
|
72 | (2) |
|
Organizational Structure Analysis |
|
|
74 | (1) |
|
Centralized versus Decentralized Models |
|
|
75 | (1) |
|
Organizational Processes and Dynamics Analysis |
|
|
75 | (1) |
|
|
|
76 | (1) |
|
Security Requirements Analysis |
|
|
76 | (1) |
|
|
|
77 | (1) |
|
Physical Structures Analysis |
|
|
77 | (1) |
|
Commonsense Planning and Deployment Tips |
|
|
78 | (3) |
|
|
|
81 | (7) |
|
Native versus Mixed-Mode Installations |
|
|
81 | (2) |
|
|
|
83 | (1) |
|
|
|
83 | (1) |
|
|
|
84 | (1) |
|
|
|
85 | (1) |
|
|
|
86 | (2) |
|
|
|
88 | (20) |
|
|
|
89 | (1) |
|
Gathering Critical System Information |
|
|
89 | (1) |
|
Gathering Adapter Information |
|
|
90 | (1) |
|
|
|
91 | (3) |
|
Optional Services and Components |
|
|
94 | (1) |
|
|
|
94 | (2) |
|
|
|
96 | (1) |
|
|
|
96 | (1) |
|
|
|
97 | (1) |
|
Installation of Windows Server 2003 Versions |
|
|
98 | (2) |
|
Installation of Windows Server 2003 across a Network |
|
|
100 | (1) |
|
|
|
100 | (3) |
|
|
|
103 | (1) |
|
Automated or Unattended Installations |
|
|
103 | (2) |
|
|
|
105 | (1) |
|
Steps for Supporting Disk Duplication |
|
|
105 | (1) |
|
Configuring the System Preparation Tool |
|
|
105 | (1) |
|
|
|
105 | (1) |
|
RIS Installation of Windows XP |
|
|
106 | (1) |
|
Troubleshooting the Installation |
|
|
107 | (1) |
|
|
|
108 | (1) |
|
|
|
108 | (1) |
|
Device Drive Last Known Good Files |
|
|
108 | (1) |
|
|
|
109 | (1) |
|
Windows Product Activation |
|
|
109 | (1) |
|
|
|
110 | (1) |
|
|
|
111 | (1) |
|
|
|
112 | (1) |
|
Uninstalling Windows XP Operating System |
|
|
113 | (1) |
|
|
|
113 | (2) |
|
Getting Started: The OS Interface |
|
|
115 | (34) |
|
|
|
115 | (22) |
|
The Toolbar and Cascading Menu System |
|
|
116 | (1) |
|
|
|
117 | (2) |
|
|
|
119 | (3) |
|
|
|
122 | (1) |
|
Dualview Monitoring Facility |
|
|
123 | (1) |
|
Microsoft Management Console |
|
|
124 | (1) |
|
|
|
125 | (1) |
|
|
|
126 | (2) |
|
|
|
128 | (1) |
|
Saving MMC Locally or to Delegated Administrators |
|
|
128 | (2) |
|
Working with Individual Administrative Tools |
|
|
130 | (1) |
|
|
|
130 | (3) |
|
Character-Based Administrative Interface |
|
|
133 | (4) |
|
|
|
137 | (3) |
|
|
|
140 | (2) |
|
Search Companion Integration |
|
|
141 | (1) |
|
Internet Connectivity and Internet Explorer 6.0 |
|
|
142 | (4) |
|
Internet Connectivity Enhancements |
|
|
142 | (1) |
|
All-User Remote Access Service Credentials |
|
|
143 | (1) |
|
Auto-Configuration for Multiple Network Connectivity |
|
|
143 | (1) |
|
Connection Managed Favorites |
|
|
143 | (1) |
|
|
|
144 | (1) |
|
Internet Connection Sharing |
|
|
144 | (1) |
|
Connection Manager VPN Server Selection |
|
|
144 | (1) |
|
Internet Explorer 6.0 Enhancements |
|
|
145 | (1) |
|
Contacts and Instant Messaging Integration |
|
|
145 | (1) |
|
Easy Image Acquisition and Automatic Image Resize |
|
|
145 | (1) |
|
|
|
146 | (1) |
|
|
|
146 | (1) |
|
|
|
146 | (1) |
|
Internalization and Localization |
|
|
147 | (1) |
|
ClearType Mobile Computer/Liquid Crystal Display Enhancements |
|
|
147 | (1) |
|
|
|
148 | (1) |
|
|
|
149 | (38) |
|
|
|
150 | (5) |
|
What Is the Active Directory? |
|
|
151 | (1) |
|
|
|
152 | (2) |
|
Data Stores and Partitions |
|
|
154 | (1) |
|
An Administrative View of the Active Directory |
|
|
154 | (1) |
|
Active Directory Structural Components |
|
|
155 | (18) |
|
|
|
155 | (2) |
|
|
|
157 | (1) |
|
|
|
157 | (1) |
|
|
|
158 | (1) |
|
Trees and Forest Scaling and Extensibility |
|
|
159 | (1) |
|
|
|
160 | (2) |
|
|
|
162 | (1) |
|
|
|
163 | (1) |
|
Sites and Domain Relationships |
|
|
163 | (1) |
|
|
|
164 | (3) |
|
|
|
167 | (1) |
|
Intersite and Intrasite Replication |
|
|
168 | (1) |
|
Replication Component Objects |
|
|
168 | (1) |
|
Preventing Data Replication Collision |
|
|
169 | (1) |
|
Special Domain Controller Roles |
|
|
169 | (1) |
|
|
|
170 | (3) |
|
Open Standards Support and Naming Conventions |
|
|
173 | (7) |
|
The Active Directory and DNS |
|
|
175 | (1) |
|
|
|
176 | (1) |
|
Namespace and Naming Conventions |
|
|
176 | (1) |
|
|
|
176 | (1) |
|
Additional Use of Industry Naming Standards |
|
|
177 | (1) |
|
Active Directory Use of LDAP |
|
|
178 | (2) |
|
Migration and Backward Compatibility |
|
|
180 | (1) |
|
Administrative Interface Snap-Ins |
|
|
181 | (1) |
|
|
|
182 | (2) |
|
|
|
182 | (1) |
|
|
|
183 | (1) |
|
|
|
184 | (1) |
|
Administrative Security and Trust Relationships |
|
|
184 | (2) |
|
Administrative Delegation |
|
|
186 | (1) |
|
|
|
186 | (1) |
|
Active Directory Management and Use |
|
|
187 | (62) |
|
Planning for the Active Directory |
|
|
188 | (12) |
|
|
|
188 | (1) |
|
DNS Names for Child Domains and Forests |
|
|
188 | (1) |
|
Debugging and Reporting Incorrect DNS Configuration |
|
|
189 | (1) |
|
Domain Names for Internal and External Use |
|
|
189 | (1) |
|
|
|
189 | (1) |
|
The Physical Structure: Sites and Replication |
|
|
190 | (1) |
|
Preparing for Replication and Synchronization |
|
|
190 | (1) |
|
|
|
191 | (1) |
|
|
|
192 | (1) |
|
Application Directory Partitions and Replica Placement |
|
|
193 | (1) |
|
Planning for Operations Master Locations |
|
|
193 | (1) |
|
Logical Structure Planning |
|
|
194 | (1) |
|
Single Domain and Organizational Units |
|
|
194 | (1) |
|
Domain Trees and Child Domains |
|
|
195 | (1) |
|
|
|
195 | (1) |
|
|
|
196 | (1) |
|
Cross-Forest Authentication |
|
|
197 | (1) |
|
Planning for Upgrades to the Active Directory |
|
|
197 | (1) |
|
Upgrading the PDC and the BDC |
|
|
198 | (1) |
|
Planning for Domain Controllers |
|
|
198 | (1) |
|
Sizing the Active Directory |
|
|
199 | (1) |
|
Determining Domain Controller Resources |
|
|
199 | (1) |
|
Installing the Active Directory |
|
|
200 | (8) |
|
Active Directory Installation Wizard |
|
|
201 | (1) |
|
Active Directory Installation Example |
|
|
201 | (5) |
|
Installation of Different Structures |
|
|
206 | (2) |
|
Active Directory MMC Snap-In Tools |
|
|
208 | (28) |
|
The Active Directory Domain and Trust Manager |
|
|
209 | (2) |
|
Creating Trust Relationships |
|
|
211 | (2) |
|
Changing from Mixed to Native Mode |
|
|
213 | (1) |
|
Adding UPN Suffices for User Logon |
|
|
214 | (1) |
|
Assigning a Domain Naming Master |
|
|
214 | (2) |
|
Delegating Domain Controller Administration |
|
|
216 | (1) |
|
The Active Directory Schema Manager Snap-In |
|
|
217 | (1) |
|
Identifying and Modifying Object Classes |
|
|
218 | (2) |
|
Identifying and Changing Attributes |
|
|
220 | (1) |
|
Creating a New Object Class or Attribute |
|
|
221 | (1) |
|
Removing Lingering Objects |
|
|
222 | (1) |
|
Changing the Domain Schema Master |
|
|
222 | (1) |
|
Ensuring Schema Availability and Restoration |
|
|
223 | (1) |
|
The Active Directory Sites and Services Snap-In |
|
|
223 | (4) |
|
|
|
227 | (1) |
|
|
|
227 | (1) |
|
Creating Intersite Links and Transports |
|
|
227 | (1) |
|
The Intersite Replication Schedule |
|
|
227 | (1) |
|
Selecting an Application Licensing Server |
|
|
228 | (1) |
|
Moving Domain Controllers between Sites |
|
|
229 | (1) |
|
Domain Controller Backup and Restoration |
|
|
229 | (1) |
|
|
|
230 | (1) |
|
Removing a Domain Controller Server from a Site |
|
|
230 | (1) |
|
The Active Directory Users and Computers Snap-In |
|
|
231 | (1) |
|
Computer Account Management |
|
|
231 | (4) |
|
RID, PDC, or Infrastructure Masters |
|
|
235 | (1) |
|
The Active Directory Replication Monitor |
|
|
235 | (1) |
|
Creating Organizational Units |
|
|
236 | (1) |
|
Creating, Deleting, Modifying, and Moving an Organizational Unit |
|
|
236 | (1) |
|
Creating an Organizational Unit |
|
|
236 | (1) |
|
Deleting an Organizational Unit |
|
|
236 | (1) |
|
Modifying Organizational Unit Properties |
|
|
236 | (1) |
|
Moving Organizational Units |
|
|
237 | (1) |
|
Renaming Organizational Units |
|
|
237 | (1) |
|
|
|
237 | (2) |
|
Active Directory Object Access |
|
|
238 | (1) |
|
Object Picker UI Enhancements |
|
|
239 | (1) |
|
Standard and Special Permissions |
|
|
239 | (2) |
|
Setting and Viewing Object Permissions |
|
|
239 | (1) |
|
Permission Inheritance and Preventing Inheritance |
|
|
240 | (1) |
|
Active Directory Administrative Delegation |
|
|
241 | (3) |
|
The Delegation of Control Wizard |
|
|
241 | (3) |
|
Refining the Global Catalog |
|
|
244 | (2) |
|
Enabling a Global Catalog |
|
|
244 | (1) |
|
Moving, Removing, and Duplicating the Global Catalog |
|
|
245 | (1) |
|
Indexing and Adding Attributes to the Global Catalog |
|
|
245 | (1) |
|
The Active Directory Connector |
|
|
246 | (1) |
|
Configuring Connection Agreements |
|
|
246 | (1) |
|
|
|
247 | (2) |
|
|
|
249 | (44) |
|
|
|
249 | (27) |
|
|
|
250 | (3) |
|
Creating a Local User Account |
|
|
253 | (4) |
|
|
|
257 | (1) |
|
Creating a Domain User Account |
|
|
258 | (2) |
|
Understanding User Account Properties |
|
|
260 | (7) |
|
|
|
267 | (1) |
|
|
|
267 | (2) |
|
All User and Individual User Profile Settings |
|
|
269 | (2) |
|
|
|
271 | (5) |
|
|
|
276 | (16) |
|
Group-to-Group and Group-to-User Relationships |
|
|
277 | (1) |
|
|
|
278 | (1) |
|
|
|
279 | (1) |
|
|
|
280 | (1) |
|
|
|
281 | (1) |
|
|
|
281 | (1) |
|
|
|
282 | (1) |
|
Default User Account Membership |
|
|
282 | (4) |
|
|
|
286 | (1) |
|
Group Scope and Membership Example |
|
|
286 | (6) |
|
|
|
292 | (1) |
|
|
|
293 | (56) |
|
Understanding Group Policies |
|
|
293 | (32) |
|
Group Policy Management and Active Directory |
|
|
294 | (2) |
|
Group Policy Object Storage |
|
|
296 | (1) |
|
Refining Group Policy Inheritance |
|
|
296 | (5) |
|
|
|
301 | (1) |
|
User and Computer Policies |
|
|
301 | (1) |
|
|
|
301 | (2) |
|
|
|
303 | (6) |
|
Software Installation: Assigning and Publishing |
|
|
309 | (12) |
|
|
|
321 | (3) |
|
|
|
324 | (1) |
|
|
|
325 | (1) |
|
Refreshing Policy Settings |
|
|
325 | (1) |
|
|
|
326 | (1) |
|
Implementing Group Policy |
|
|
326 | (17) |
|
|
|
327 | (5) |
|
Creating a GPO and Linking to the Active Directory Container |
|
|
332 | (1) |
|
Disabling Computer and User Configuration Settings |
|
|
332 | (7) |
|
|
|
339 | (2) |
|
|
|
341 | (1) |
|
|
|
342 | (1) |
|
|
|
343 | (1) |
|
Group Policy WMI Filtering |
|
|
343 | (1) |
|
|
|
343 | (5) |
|
Roaming Documents and Preferences |
|
|
344 | (1) |
|
Redirecting My Document Folders |
|
|
344 | (4) |
|
|
|
348 | (1) |
|
Permissions Security, Folder Sharing, and Dfs |
|
|
349 | (40) |
|
Reviewing NTFS Permissions |
|
|
349 | (17) |
|
Standard and Special Permissions |
|
|
350 | (1) |
|
|
|
351 | (1) |
|
Working with Folder Permissions |
|
|
352 | (1) |
|
|
|
352 | (4) |
|
|
|
356 | (1) |
|
|
|
357 | (4) |
|
Moving and Copying File and Folder Permissions |
|
|
361 | (1) |
|
|
|
362 | (1) |
|
Denying Rights to a Subfolder |
|
|
362 | (1) |
|
|
|
363 | (1) |
|
|
|
364 | (1) |
|
Implicit Groups and Permissions |
|
|
365 | (1) |
|
|
|
366 | (11) |
|
|
|
367 | (2) |
|
|
|
369 | (2) |
|
Facilitating Shared Access |
|
|
371 | (1) |
|
Mapping a Network Drive to a Shared Folder |
|
|
372 | (1) |
|
The My Network Places Link to a Shared Folder |
|
|
372 | (1) |
|
Using the Run Command to Access Shared Folders |
|
|
373 | (1) |
|
Accessing a Share from Internet Explorer |
|
|
374 | (1) |
|
|
|
374 | (2) |
|
Using NTFS Permissions and Shared Folders |
|
|
376 | (1) |
|
Publishing Files and Folders to the Active Directory |
|
|
377 | (1) |
|
Distributed File System Sharing |
|
|
377 | (11) |
|
Standalone versus Fault-Tolerant Dfs |
|
|
377 | (2) |
|
|
|
379 | (1) |
|
|
|
379 | (1) |
|
|
|
380 | (1) |
|
|
|
381 | (1) |
|
|
|
382 | (1) |
|
Browse and Search Directories |
|
|
382 | (1) |
|
Bringing Servers Offline without User Interruption |
|
|
382 | (1) |
|
Ease of Web Server Maintenance |
|
|
383 | (1) |
|
Concerns Regarding Dfs Use |
|
|
383 | (1) |
|
Setting Up a Standalone Dfs Share |
|
|
383 | (5) |
|
|
|
388 | (1) |
|
|
|
388 | (1) |
|
Kerberos and the Public Key Infrastructure |
|
|
389 | (88) |
|
|
|
389 | (17) |
|
Understanding Kerberos Concepts |
|
|
390 | (1) |
|
The Authentication Service Exchange |
|
|
391 | (3) |
|
The Ticket-Granting Service Exchange |
|
|
394 | (1) |
|
The Client/Server Exchange |
|
|
394 | (2) |
|
Further Clarification of the Logon Process |
|
|
396 | (1) |
|
|
|
397 | (2) |
|
Delegation with Forwarding and Proxy |
|
|
399 | (1) |
|
Forwarding Authentication |
|
|
400 | (1) |
|
|
|
400 | (1) |
|
Symmetrical Encryption and Shared Keys |
|
|
401 | (1) |
|
|
|
402 | (1) |
|
|
|
403 | (2) |
|
Cross-Forest Authentication |
|
|
405 | (1) |
|
|
|
405 | (1) |
|
The Public Key Infrastructure |
|
|
406 | (69) |
|
|
|
407 | (1) |
|
|
|
408 | (1) |
|
|
|
408 | (2) |
|
|
|
410 | (1) |
|
|
|
410 | (2) |
|
Trusted Authorities and Certificate Stores |
|
|
412 | (2) |
|
Certificate Authority Hierarchies |
|
|
414 | (4) |
|
Third-Party Certificate Authorities |
|
|
418 | (1) |
|
|
|
418 | (1) |
|
Microsoft Certificate Authorities |
|
|
418 | (1) |
|
The Standalone Certificate Authority |
|
|
419 | (1) |
|
The Enterprise Certificate Authority |
|
|
419 | (2) |
|
|
|
421 | (1) |
|
PKI and Other Components and Applications |
|
|
422 | (1) |
|
|
|
422 | (3) |
|
|
|
425 | (1) |
|
|
|
425 | (1) |
|
The Encrypted File System |
|
|
426 | (1) |
|
|
|
427 | (2) |
|
|
|
429 | (2) |
|
|
|
431 | (1) |
|
Certificate Authority Administration |
|
|
432 | (1) |
|
|
|
432 | (1) |
|
|
|
433 | (3) |
|
Distributing Certificates Using Group Policies |
|
|
436 | (9) |
|
|
|
445 | (11) |
|
Exporting Certificates and Backup |
|
|
456 | (2) |
|
Certificate Authority Service Management |
|
|
458 | (11) |
|
Certificate Authority Properties |
|
|
469 | (2) |
|
Certificate Authority Backup |
|
|
471 | (4) |
|
|
|
475 | (2) |
|
Additional Security Issues and Solutions |
|
|
477 | (42) |
|
|
|
478 | (10) |
|
|
|
479 | (1) |
|
Using Security Template Snap-Ins |
|
|
480 | (2) |
|
Building a Custom Template |
|
|
482 | (1) |
|
The Security Configuration and Analysis Tool |
|
|
483 | (1) |
|
Using the Security Configuration and Analysis Snap-In |
|
|
484 | (4) |
|
Security Authorization Manager |
|
|
488 | (1) |
|
Windows Server 2003 System Lockdown |
|
|
488 | (18) |
|
|
|
488 | (1) |
|
The Administrator Account |
|
|
489 | (2) |
|
|
|
491 | (1) |
|
|
|
491 | (1) |
|
|
|
492 | (1) |
|
|
|
492 | (1) |
|
Password Lockout Policies |
|
|
493 | (1) |
|
|
|
493 | (1) |
|
Determining Who Sets a Password |
|
|
494 | (1) |
|
|
|
494 | (1) |
|
Other User Account Security Options |
|
|
494 | (1) |
|
Registry and File System Lockdown |
|
|
494 | (1) |
|
Trojan Horses and Viruses |
|
|
495 | (1) |
|
Environmental Path Settings |
|
|
496 | (1) |
|
Current Working Directory Security Resource |
|
|
496 | (1) |
|
Extension Mapping to Disguise a File Type |
|
|
497 | (1) |
|
|
|
498 | (1) |
|
Extraneous Services as a Security Threat |
|
|
498 | (1) |
|
Backups and Restoration Security |
|
|
499 | (1) |
|
|
|
499 | (1) |
|
Theft of Systems or Storage Media |
|
|
499 | (1) |
|
Physical Access to the Boot CD-ROM and Floppy Drives |
|
|
499 | (1) |
|
|
|
500 | (1) |
|
Auditing as a Line of Defense |
|
|
500 | (1) |
|
|
|
500 | (1) |
|
Offline Auditing Policies |
|
|
501 | (2) |
|
|
|
503 | (1) |
|
General Auditing Procedures |
|
|
504 | (1) |
|
Audit Events That Need the Most Careful Review |
|
|
505 | (1) |
|
Secure Network Services and Architecture |
|
|
506 | (10) |
|
Protecting Network Shares |
|
|
507 | (1) |
|
|
|
508 | (1) |
|
|
|
509 | (1) |
|
|
|
510 | (1) |
|
|
|
511 | (1) |
|
|
|
511 | (1) |
|
Restricting Scripts from External Sources |
|
|
512 | (1) |
|
|
|
512 | (1) |
|
|
|
512 | (1) |
|
Internet Browser Security |
|
|
512 | (1) |
|
Restricting ActiveX Components |
|
|
513 | (1) |
|
Internet Certificate Management |
|
|
513 | (1) |
|
|
|
514 | (1) |
|
|
|
514 | (1) |
|
Preventing E-Mail Security Abuses |
|
|
514 | (2) |
|
Other TCP/IP Security Issues |
|
|
516 | (1) |
|
The End User's Responsibility |
|
|
516 | (1) |
|
|
|
517 | (2) |
|
Networking Basics and Naming Services |
|
|
519 | (50) |
|
|
|
519 | (9) |
|
|
|
519 | (2) |
|
|
|
521 | (1) |
|
|
|
521 | (1) |
|
|
|
522 | (1) |
|
|
|
523 | (1) |
|
The Address Resolution Protocol |
|
|
523 | (2) |
|
|
|
525 | (1) |
|
Client-Side Routing Configuration |
|
|
526 | (2) |
|
Naming Services and IP Assignments |
|
|
528 | (37) |
|
Domain Name System Conventions |
|
|
529 | (1) |
|
|
|
530 | (1) |
|
|
|
530 | (1) |
|
Standard versus Directory Integrated Zones |
|
|
531 | (1) |
|
Installation with the Active Directory |
|
|
532 | (4) |
|
|
|
536 | (1) |
|
DNS Zones and Fault Tolerance |
|
|
537 | (7) |
|
|
|
544 | (1) |
|
|
|
544 | (3) |
|
Server-Side DHCP Configurations |
|
|
547 | (6) |
|
|
|
553 | (3) |
|
|
|
556 | (1) |
|
DHCP and BOOTP Relay Agents |
|
|
556 | (1) |
|
The 80/20 Rule for Fault Tolerance |
|
|
557 | (1) |
|
Client-Side Configurations |
|
|
558 | (2) |
|
|
|
560 | (1) |
|
DHCP Server Configuration for DNS |
|
|
560 | (1) |
|
The Backup and Restore Options |
|
|
561 | (1) |
|
|
|
562 | (1) |
|
|
|
563 | (2) |
|
|
|
565 | (1) |
|
|
|
565 | (1) |
|
DNS Configuration through Group Policy |
|
|
566 | (1) |
|
Support for Broadband PPPOE Connections |
|
|
566 | (1) |
|
|
|
567 | (2) |
|
Virtual Private Networks and IP Security |
|
|
569 | (46) |
|
|
|
569 | (32) |
|
|
|
570 | (1) |
|
|
|
570 | (1) |
|
|
|
570 | (2) |
|
Point-to-Point Tunneling Protocol |
|
|
572 | (1) |
|
Layer 2 Tunneling Protocol |
|
|
573 | (1) |
|
|
|
574 | (1) |
|
|
|
575 | (1) |
|
|
|
575 | (1) |
|
|
|
576 | (1) |
|
Voluntary and Compulsory Tunnels |
|
|
576 | (1) |
|
VPN Architecture and Configuration |
|
|
577 | (1) |
|
Remote Access over the Internet |
|
|
577 | (14) |
|
Routing and Remote Access Server Management |
|
|
591 | (1) |
|
Viewing Remote Access Clients |
|
|
592 | (1) |
|
Internet Authentication Service and RADIUS |
|
|
592 | (4) |
|
|
|
596 | (3) |
|
|
|
599 | (1) |
|
|
|
600 | (1) |
|
|
|
600 | (1) |
|
|
|
601 | (13) |
|
Understanding IPSec Policies |
|
|
602 | (1) |
|
|
|
603 | (1) |
|
Creating a New IPSec Policy |
|
|
603 | (1) |
|
|
|
603 | (1) |
|
|
|
604 | (1) |
|
|
|
605 | (2) |
|
|
|
607 | (4) |
|
|
|
611 | (3) |
|
|
|
614 | (1) |
|
Disk Management, Backup and Restoration, and Disaster Recovery |
|
|
615 | (34) |
|
|
|
616 | (19) |
|
NTFS and FAT/FAT32 Disk Management |
|
|
616 | (1) |
|
|
|
616 | (1) |
|
|
|
617 | (1) |
|
Upgrading a Basic Disk to a Dynamic Disk |
|
|
618 | (1) |
|
Managing Partitions and Basic Storage |
|
|
618 | (1) |
|
|
|
619 | (2) |
|
Creating a Spanned Volume |
|
|
621 | (1) |
|
Expanding a Spanned Volume |
|
|
621 | (3) |
|
The Disk Management Snap-In Tool |
|
|
624 | (1) |
|
Disk Properties Options with NTFS |
|
|
625 | (1) |
|
Disk Properties Options under FAT/FAT32 |
|
|
626 | (1) |
|
|
|
627 | (2) |
|
Disk Fragmentation Management |
|
|
629 | (1) |
|
Removable Media and Library Management |
|
|
630 | (1) |
|
|
|
630 | (3) |
|
Operator Request Management |
|
|
633 | (1) |
|
Securing Removable Storage |
|
|
634 | (1) |
|
|
|
634 | (1) |
|
|
|
635 | (9) |
|
|
|
635 | (1) |
|
|
|
636 | (1) |
|
|
|
636 | (1) |
|
Managing Backups with Nbackup |
|
|
637 | (1) |
|
Changing Default Back Up Options |
|
|
638 | (2) |
|
|
|
640 | (1) |
|
|
|
640 | (3) |
|
|
|
643 | (1) |
|
Authoritative Restoration |
|
|
644 | (1) |
|
|
|
644 | (3) |
|
Automatic System Recovery |
|
|
645 | (1) |
|
|
|
645 | (1) |
|
Manual Recovery with the Advanced Options Menu |
|
|
645 | (1) |
|
The Command-Line Recovery Console |
|
|
646 | (1) |
|
|
|
646 | (1) |
|
Fault Tolerance for Disaster Protection |
|
|
647 | (1) |
|
Uninterrupted Power Supply Management |
|
|
647 | (1) |
|
|
|
647 | (2) |
|
|
|
649 | (26) |
|
|
|
650 | (1) |
|
Installing Terminal Services |
|
|
651 | (5) |
|
Installing Applications for Use with Terminal Services |
|
|
654 | (1) |
|
Sizing Terminal Services Systems |
|
|
654 | (2) |
|
Enabling and Disabling Terminal Services |
|
|
656 | (1) |
|
Configuring Terminal Services |
|
|
656 | (9) |
|
|
|
656 | (1) |
|
|
|
657 | (1) |
|
|
|
658 | (1) |
|
Client Settings for Remote Control |
|
|
659 | (1) |
|
|
|
659 | (2) |
|
|
|
661 | (1) |
|
|
|
662 | (1) |
|
|
|
662 | (1) |
|
|
|
662 | (2) |
|
Terminal Services Server Settings |
|
|
664 | (1) |
|
Terminal Services Administration |
|
|
665 | (6) |
|
|
|
665 | (1) |
|
Remote Desktop MMC Administrative Tool |
|
|
665 | (1) |
|
Terminal Services Manager |
|
|
666 | (1) |
|
Active Directory Users and Computers Snap-In and the Local Users and Groups Snap-In |
|
|
666 | (1) |
|
|
|
667 | (1) |
|
|
|
668 | (1) |
|
Client Software and Installation |
|
|
669 | (1) |
|
|
|
670 | (1) |
|
Terminal Services from a User's Perspective |
|
|
671 | (2) |
|
|
|
672 | (1) |
|
|
|
672 | (1) |
|
|
|
673 | (2) |
|
Internet Information Services |
|
|
675 | (38) |
|
|
|
676 | (11) |
|
New Manageability Features |
|
|
676 | (1) |
|
|
|
677 | (1) |
|
IIS WMI Provider and Command-Line Administration |
|
|
678 | (1) |
|
|
|
678 | (1) |
|
|
|
679 | (1) |
|
IIS Internet Security Technologies |
|
|
680 | (1) |
|
IIS Data and Process Reliability |
|
|
681 | (1) |
|
|
|
682 | (2) |
|
Process Features Common to IIS 5.0 and IIS 6.0 |
|
|
684 | (1) |
|
|
|
685 | (1) |
|
The Web Application Environment |
|
|
686 | (1) |
|
IIS Management Components |
|
|
686 | (1) |
|
Understanding the IIS Web Server |
|
|
687 | (12) |
|
Administering IIS Web Services |
|
|
687 | (1) |
|
Creating a Web Site Using IIS |
|
|
687 | (1) |
|
Basic Web Site Administration |
|
|
688 | (2) |
|
Configuring Web Site Properties |
|
|
690 | (9) |
|
Working with the SMTP Server |
|
|
699 | (6) |
|
|
|
700 | (1) |
|
|
|
700 | (1) |
|
Setting SMTP Authentication, Security, and Permissions |
|
|
700 | (1) |
|
Regulating the SMTP Delivery |
|
|
701 | (1) |
|
Configuring SMTP LDAP Routing |
|
|
701 | (2) |
|
Setting SMTP Operator Security |
|
|
703 | (1) |
|
Setting SMTP Message Limits |
|
|
703 | (2) |
|
Understanding the NNTP Server |
|
|
705 | (1) |
|
Understanding the FTP Server |
|
|
706 | (6) |
|
|
|
708 | (1) |
|
Establishing General FTP Site Configuration |
|
|
708 | (1) |
|
Establishing Basic FTP Security |
|
|
708 | (2) |
|
Establishing the FTP Home Directory and Security |
|
|
710 | (2) |
|
|
|
712 | (1) |
|
Cluster, Indexing, Message Queuing, SMS, MOM, and WSH |
|
|
713 | (44) |
|
Understanding Cluster Services |
|
|
714 | (9) |
|
|
|
714 | (1) |
|
|
|
715 | (1) |
|
|
|
716 | (1) |
|
|
|
717 | (1) |
|
|
|
717 | (1) |
|
|
|
717 | (1) |
|
|
|
718 | (1) |
|
|
|
718 | (1) |
|
Possible Points of Failure |
|
|
718 | (1) |
|
|
|
719 | (1) |
|
The Application Configuration Wizard |
|
|
719 | (1) |
|
Understanding Default Groups |
|
|
719 | (1) |
|
|
|
719 | (1) |
|
Using the Cluster.exe Command-Line Utility |
|
|
720 | (1) |
|
Setting Cluster Properties |
|
|
720 | (1) |
|
Clustering Features New to Windows Server 2003 |
|
|
721 | (2) |
|
Postscript on Cluster Technology |
|
|
723 | (1) |
|
|
|
723 | (8) |
|
Using Indexing Service to Find Data |
|
|
725 | (1) |
|
|
|
725 | (1) |
|
Indexing Service Query Language |
|
|
726 | (1) |
|
|
|
727 | (1) |
|
Common Indexing Service Administrative Tasks |
|
|
728 | (1) |
|
|
|
729 | (1) |
|
Adding or Excluding a Directory to the Catalog |
|
|
729 | (1) |
|
Adding, Editing, and Removing Properties |
|
|
730 | (1) |
|
|
|
731 | (14) |
|
|
|
731 | (1) |
|
|
|
731 | (1) |
|
|
|
732 | (1) |
|
Understanding Network Topology for Message Queuing |
|
|
732 | (1) |
|
Understanding Message Routing |
|
|
733 | (1) |
|
|
|
734 | (1) |
|
Changing Routing Servers for a Routing Link |
|
|
734 | (1) |
|
Creating a Cost for a Routing Link |
|
|
735 | (1) |
|
Changing the Routing Server for Independent Clients |
|
|
735 | (1) |
|
Testing Connectivity Using MQPing |
|
|
735 | (1) |
|
Installing Message Queuing Services |
|
|
736 | (1) |
|
Preinstallation Hardware Considerations |
|
|
736 | (1) |
|
Installation Considerations |
|
|
737 | (2) |
|
Administrative Tools for Message Queuing Services |
|
|
739 | (1) |
|
Finding a Message Queuing System |
|
|
739 | (1) |
|
Setting a Computer Message Storage Size |
|
|
739 | (1) |
|
Limiting Journal Storage Size |
|
|
739 | (1) |
|
|
|
740 | (1) |
|
|
|
740 | (1) |
|
Enabling or Disabling Journals |
|
|
740 | (1) |
|
Viewing Message Properties |
|
|
740 | (1) |
|
|
|
741 | (1) |
|
Message Queuing Security Issues and Management |
|
|
741 | (1) |
|
Setting Permissions for a Computer or Queue |
|
|
742 | (1) |
|
Changing Ownership of a Computer or Queue |
|
|
742 | (1) |
|
Setting Default Security for Message Queuing Storage Files |
|
|
743 | (1) |
|
Setting Up Computer or Queue Auditing |
|
|
743 | (1) |
|
|
|
743 | (1) |
|
Windows Server 2003 Specific Message Queuing Enhancements |
|
|
744 | (1) |
|
Postscript on Message Queuing |
|
|
745 | (1) |
|
|
|
745 | (3) |
|
Software and Hardware Inventory |
|
|
746 | (1) |
|
Software Installation and Distribution |
|
|
746 | (1) |
|
Remote Administrative Tools |
|
|
746 | (1) |
|
|
|
746 | (1) |
|
|
|
747 | (1) |
|
Microsoft Operations Manager |
|
|
748 | (2) |
|
Microsoft Operations Manager Features |
|
|
749 | (1) |
|
Distribute Event Management |
|
|
749 | (1) |
|
Administrative Defined Rules Management |
|
|
749 | (1) |
|
|
|
749 | (1) |
|
|
|
749 | (1) |
|
Graphical Reporting Tools and Web Reporting |
|
|
750 | (1) |
|
Optional Management Packs |
|
|
750 | (1) |
|
|
|
750 | (5) |
|
|
|
751 | (1) |
|
|
|
751 | (1) |
|
|
|
752 | (2) |
|
|
|
754 | (1) |
|
|
|
755 | (2) |
|
Appendix Windows Server 2003 Commands and Utilities |
|
|
757 | (128) |
|
New Command-Line Tools with Windows Server 2003 |
|
|
759 | (23) |
|
|
|
760 | (1) |
|
|
|
761 | (1) |
|
|
|
761 | (1) |
|
|
|
761 | (1) |
|
|
|
761 | (1) |
|
|
|
762 | (1) |
|
Directory Services Commands |
|
|
763 | (1) |
|
Executing Commands on the Network |
|
|
763 | (1) |
|
|
|
764 | (1) |
|
|
|
765 | (1) |
|
|
|
765 | (1) |
|
|
|
766 | (1) |
|
|
|
766 | (1) |
|
|
|
767 | (1) |
|
|
|
767 | (1) |
|
|
|
767 | (2) |
|
|
|
769 | (1) |
|
|
|
769 | (1) |
|
|
|
770 | (1) |
|
|
|
770 | (1) |
|
|
|
771 | (1) |
|
|
|
771 | (1) |
|
|
|
771 | (1) |
|
|
|
771 | (1) |
|
|
|
771 | (3) |
|
|
|
774 | (1) |
|
|
|
775 | (1) |
|
|
|
775 | (1) |
|
|
|
775 | (2) |
|
|
|
777 | (1) |
|
|
|
778 | (1) |
|
|
|
778 | (1) |
|
|
|
778 | (1) |
|
|
|
779 | (1) |
|
|
|
779 | (1) |
|
|
|
779 | (2) |
|
|
|
781 | (1) |
|
|
|
782 | (3) |
|
Using Ntbackup on the Command Line |
|
|
782 | (3) |
|
Example of Nibackup Command |
|
|
785 | (1) |
|
|
|
785 | (1) |
|
|
|
785 | (4) |
|
|
|
785 | (1) |
|
|
|
786 | (2) |
|
|
|
788 | (1) |
|
|
|
789 | (1) |
|
|
|
789 | (1) |
|
|
|
789 | (2) |
|
|
|
790 | (1) |
|
|
|
791 | (1) |
|
|
|
791 | (10) |
|
Displaying the Contents of Files |
|
|
791 | (1) |
|
|
|
792 | (1) |
|
|
|
792 | (1) |
|
|
|
792 | (1) |
|
Displaying Attributes and Properties of Files and Folders |
|
|
793 | (1) |
|
Displaying File Properties Using Windows Server 2003 Explorer |
|
|
793 | (2) |
|
|
|
795 | (4) |
|
|
|
799 | (1) |
|
|
|
799 | (1) |
|
|
|
799 | (1) |
|
|
|
800 | (1) |
|
|
|
801 | (1) |
|
|
|
801 | (11) |
|
|
|
801 | (1) |
|
Creating and Removing Folders |
|
|
801 | (1) |
|
|
|
801 | (1) |
|
|
|
802 | (1) |
|
|
|
802 | (1) |
|
|
|
803 | (1) |
|
|
|
803 | (1) |
|
Creating and Removing Files |
|
|
804 | (1) |
|
|
|
804 | (1) |
|
|
|
804 | (1) |
|
|
|
804 | (1) |
|
|
|
805 | (1) |
|
|
|
806 | (1) |
|
|
|
806 | (2) |
|
|
|
808 | (1) |
|
|
|
809 | (2) |
|
Renaming Files or Folders |
|
|
811 | (1) |
|
|
|
811 | (1) |
|
|
|
811 | (1) |
|
File-Manipulation Commands |
|
|
812 | (2) |
|
|
|
812 | (1) |
|
|
|
812 | (1) |
|
|
|
812 | (1) |
|
|
|
813 | (1) |
|
|
|
814 | (4) |
|
|
|
814 | (1) |
|
|
|
814 | (1) |
|
|
|
814 | (1) |
|
Setting and Displaying Date and Time |
|
|
815 | (1) |
|
|
|
815 | (1) |
|
|
|
816 | (1) |
|
|
|
816 | (1) |
|
Logging on as Another User |
|
|
817 | (1) |
|
|
|
817 | (1) |
|
|
|
817 | (1) |
|
|
|
818 | (1) |
|
|
|
818 | (1) |
|
|
|
818 | (30) |
|
|
|
819 | (1) |
|
|
|
819 | (1) |
|
|
|
820 | (1) |
|
|
|
821 | (1) |
|
|
|
821 | (1) |
|
|
|
822 | (1) |
|
|
|
823 | (1) |
|
|
|
824 | (1) |
|
|
|
824 | (1) |
|
|
|
824 | (1) |
|
|
|
824 | (3) |
|
|
|
827 | (1) |
|
|
|
828 | (1) |
|
|
|
828 | (1) |
|
|
|
829 | (1) |
|
|
|
829 | (1) |
|
net accounts Command Examples |
|
|
830 | (1) |
|
|
|
831 | (1) |
|
|
|
831 | (1) |
|
net config server Command |
|
|
831 | (1) |
|
net config workstation Command |
|
|
831 | (2) |
|
|
|
833 | (1) |
|
|
|
834 | (1) |
|
|
|
834 | (2) |
|
|
|
836 | (1) |
|
|
|
837 | (1) |
|
|
|
837 | (1) |
|
|
|
837 | (1) |
|
|
|
837 | (1) |
|
|
|
838 | (1) |
|
|
|
838 | (1) |
|
|
|
838 | (1) |
|
|
|
839 | (1) |
|
|
|
840 | (1) |
|
|
|
841 | (1) |
|
|
|
841 | (1) |
|
|
|
841 | (3) |
|
|
|
844 | (1) |
|
|
|
844 | (4) |
|
|
|
848 | (1) |
|
|
|
848 | (7) |
|
|
|
848 | (1) |
|
|
|
849 | (1) |
|
|
|
850 | (1) |
|
|
|
850 | (1) |
|
|
|
851 | (1) |
|
|
|
851 | (1) |
|
|
|
852 | (1) |
|
Managing Printer Operations |
|
|
853 | (1) |
|
Pausing and Resuming a Printer |
|
|
853 | (1) |
|
Pausing and Resuming Printing |
|
|
853 | (1) |
|
Restarting and Canceling a Document |
|
|
854 | (1) |
|
Defining Printer Properties |
|
|
854 | (1) |
|
|
|
854 | (1) |
|
|
|
855 | (3) |
|
|
|
855 | (1) |
|
|
|
856 | (1) |
|
|
|
856 | (1) |
|
|
|
857 | (1) |
|
System-Management Commands |
|
|
858 | (6) |
|
|
|
858 | (1) |
|
|
|
858 | (1) |
|
|
|
859 | (1) |
|
|
|
860 | (1) |
|
|
|
860 | (1) |
|
|
|
860 | (2) |
|
|
|
862 | (1) |
|
Other System Management Tools |
|
|
863 | (1) |
|
|
|
863 | (1) |
|
|
|
863 | (1) |
|
|
|
864 | (1) |
|
Resource Kit Support Tools |
|
|
864 | (20) |
|
Acldiag.exe---ACL Diagnostics |
|
|
864 | (1) |
|
Adsiedit.msc---ADSI Editor |
|
|
864 | (1) |
|
Apcompat.exe---Application Compatibility Tool |
|
|
865 | (1) |
|
Apmstat.exe---Advanced Power Management Status |
|
|
865 | (1) |
|
Clonepr.dll---Clone Principal |
|
|
865 | (1) |
|
Dcdiag.exe---Domain Controller Diagnostic Tool |
|
|
866 | (1) |
|
Depend.exe---Dependency Walker |
|
|
866 | (1) |
|
Dfsutil.exe---Distributed File System Utility |
|
|
866 | (2) |
|
Dnscmd.exe---DNS Troubleshooting Tool |
|
|
868 | (1) |
|
|
|
868 | (2) |
|
Dsastat.exe and DSASTAT Command |
|
|
870 | (1) |
|
Dskprobe.exe---Disk Probe |
|
|
870 | (1) |
|
|
|
871 | (1) |
|
Filever.exe---File Version Verification |
|
|
871 | (1) |
|
Gflags.exe---Global Flags |
|
|
872 | (2) |
|
Kill.exe---Task Killing Utility |
|
|
874 | (1) |
|
Ksetup.exe---Kerberos Client Configuration |
|
|
874 | (1) |
|
Ktpass.exe---Kerberos Tab Key Setup |
|
|
874 | (2) |
|
|
|
876 | (1) |
|
Memsnap.exe---Memory Profiling Tool |
|
|
876 | (1) |
|
Movetree.exe---Movetree Object Manager |
|
|
876 | (1) |
|
Msinfo32.exe---MS System Information Tool |
|
|
876 | (1) |
|
Netdiag.exe---Network Connectivity Tester |
|
|
877 | (2) |
|
Netdom.exe---Domain Manager |
|
|
879 | (1) |
|
Nltest.exe---Network Domain Test |
|
|
879 | (1) |
|
Pmon.exe---Process Monitor |
|
|
879 | (1) |
|
Pviewer.exe---Process Viewer |
|
|
879 | (1) |
|
Repadmin.exe---Replication Diagnosis Tool |
|
|
879 | (1) |
|
Replmon.exe---Replication Monitor |
|
|
880 | (1) |
|
Rsdiag.exe---Remote Storage Diagnosis Tool |
|
|
880 | (1) |
|
Sdcheck.exe---Security Descriptor Check Utility |
|
|
880 | (2) |
|
|
|
882 | (1) |
|
|
|
883 | (1) |
|
Snmputilg.exe---SNMP Utility Tool |
|
|
884 | (1) |
|
Tlist.exe---Task List Viewer |
|
|
884 | (1) |
|
|
|
884 | (1) |
| Glossary |
|
885 | (24) |
| Index |
|
909 | |