The Ultimate Windows Server 2003 System Administrator's Guide

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2003-04-08
Publisher(s): Addison-Wesley Professional
Availability: This title is currently not available.
List Price: $64.19

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

-- Not only explains the new features of Windows .NET Server 2003, but also provides continued support for Windows 2000 administration.-- Covers changes in security, Active Directory, Microsoft Management Console, and integration with the .NET Framework, among many others changes.Windows .NET Server 2003 is the first Microsoft product that is innately affected by the company's recent Trustworthy Computing initiative. If this is successful, this will be the most stable, reliable, and dependable server OS that Microsoft has ever released. It will also feature an integrated environment with the .NET Framework and the Common Language Runtime. The Ultimate Windows .NET Server 2003 System Administrator's Guide is an essential resource for planning, deploying, and administering a Windows .NET enterprise system. The authors draw on years of experience designing and administering Windows NT and UNIX systems in order to guide you through the varied tasks involved in real-world system administration. There are detailed discussions of key Windows .NET Server administrative functions, and descriptions of many advanced tools and optional components. In addition the authors have included a comprehensive and convenient command reference.

Author Biography

G. Robert Williams, Ph.D., is the CEO of Manakoa Services Corporation. He is the coauthor of The Ultimate Windows 2000 System Administrator's Guide (Addison-Wesley, 2000) and Windows NT and UNIX (Addison-Wesley, 1998), in addition to being a regular contributor to Computer World, ITWorld.com, Windows Advantage, and Windows NT/2000 Magazine. Bob has been named a Microsoft Most Valuable Player (MVP) in the field of security.

Mark Walla, MCSE, is the Senior Vice President of Manakoa Services Corporation. He has written numerous technical articles for Computer World, Windows Advantage, and Windows NT/2000 Magazine. He is also coauthor of The Ultimate Windows 2000 System Administrator's Guide (Addison-Wesley, 2000). Mark has been named a Microsoft Most Valuable Player (MVP) in the field of security.



0201791064AB02012005

Table of Contents

Foreword xxvii
Preface xxix
Acknowledgments xxxv
About the Authors xxxvii
Administrative Review
1(24)
Windows Server 2003: A Historical Perspective
2(1)
The Windows Server 2003 Family: What's in a Name?
3(5)
Windows XP Home and Professional Editions
4(1)
Windows Server 2003, Web Edition
5(1)
Windows Server 2003, Standard Edition
5(1)
Windows Server 2003, Enterprise Edition
5(1)
Windows Server 2003, Datacenter Edition
5(3)
Understanding the .NET Framework
8(4)
Foundation Technologies
8(1)
Components of .NET and Product Layers
9(2)
BackOffice Suite Moves Forward as Renamed .NET Products
11(1)
Microsoft Operations Manager
11(1)
Windows Server 2003 Administrative Roles
12(2)
Scope of Responsibility
14(1)
Windows Server 2003 Features and Administrative Implications
14(9)
.NET Framework
15(1)
The Active Directory
16(1)
The Interface
17(1)
The User Interface
17(1)
The Administrator Interface and Tools
18(2)
Networking and Communications
20(1)
Hardware Support
21(1)
File and Storage Systems
22(1)
Security and Authentication
23(1)
Postscript
23(2)
Windows Server 2003 Structure and Architecture
25(44)
Structural Modes, Subsystems, and Managers
26(9)
Structural Layer Modes
26(1)
The Windows Server 2003 Executive Mode
27(1)
The Hardware Abstraction Layer
28(1)
The Microkernal
28(1)
Device Drivers
28(1)
Executive Managers
29(3)
The Executive Services Buffer
32(1)
The Windows Server 2003 User Mode
32(1)
The Protected User Mode System
32(3)
Windows Server 2003 Processes
35(16)
Processes, Threads, and Handles
35(2)
Multiprocessor Support
37(2)
The Task Manager
39(2)
Starting and Killing Processes
41(2)
Scheduling Tasks
43(1)
Viewing Processes
44(4)
The Event Viewer
48(3)
Stored and Virtual Memory
51(6)
Stored Memory and File System Basics
51(1)
The File Allocation Table: FAT and FAT32
51(1)
The NTFS File System
52(2)
File Objects in the NTFS File System
54(2)
The Virtual Memory Manager and Paging
56(1)
The Boot Process
57(3)
The Windows Server 2003 Registry
60(3)
The Registry Structure
61(1)
The Registry Editor
62(1)
Software Tracing
63(1)
Viewing Application Dependencies
64(2)
Application Compatibility
66(1)
Unauthorized Applications
67(1)
IntelliMirror and Other Innovations
67(1)
Postscript
68(1)
Planning and Installation
69(46)
Logical and Physical Structures
70(1)
Understanding the Current Enterprise
71(10)
Taking Stock: First Inventory, Then Document
72(1)
Legacy Enterprise Analysis
72(2)
Organizational Structure Analysis
74(1)
Centralized versus Decentralized Models
75(1)
Organizational Processes and Dynamics Analysis
75(1)
Change and Growth
76(1)
Security Requirements Analysis
76(1)
User Profiles Analysis
77(1)
Physical Structures Analysis
77(1)
Commonsense Planning and Deployment Tips
78(3)
Planning for Upgrades
81(7)
Native versus Mixed-Mode Installations
81(2)
The PDC Emulator
83(1)
Mixed-Mode Security
83(1)
Mixed-Mode Variations
84(1)
Domain Models
85(1)
Upgrade Steps
86(2)
Installation
88(20)
Preparation
89(1)
Gathering Critical System Information
89(1)
Gathering Adapter Information
90(1)
Key Questions
91(3)
Optional Services and Components
94(1)
Server Migration Order
94(2)
Installation Steps
96(1)
Installation Checklist
96(1)
Basic Installation
97(1)
Installation of Windows Server 2003 Versions
98(2)
Installation of Windows Server 2003 across a Network
100(1)
System Configuration
100(3)
Changing the Basic Setup
103(1)
Automated or Unattended Installations
103(2)
Disk Duplication
105(1)
Steps for Supporting Disk Duplication
105(1)
Configuring the System Preparation Tool
105(1)
Remote OS Installation
105(1)
RIS Installation of Windows XP
106(1)
Troubleshooting the Installation
107(1)
Device Driver Management
108(1)
Device Driver Rollback
108(1)
Device Drive Last Known Good Files
108(1)
Hardware Autoplay
109(1)
Windows Product Activation
109(1)
Automatic Product Update
110(1)
File Transfer Wizard
111(1)
System Restoration
112(1)
Uninstalling Windows XP Operating System
113(1)
Postscript
113(2)
Getting Started: The OS Interface
115(34)
Interface Basics
115(22)
The Toolbar and Cascading Menu System
116(1)
Desktop Icons
117(2)
The My Computer Tool
119(3)
My Network Places
122(1)
Dualview Monitoring Facility
123(1)
Microsoft Management Console
124(1)
Creating and Using MMCs
125(1)
Adding a Snap-In
126(2)
MMC Modes
128(1)
Saving MMC Locally or to Delegated Administrators
128(2)
Working with Individual Administrative Tools
130(1)
Control Panel
130(3)
Character-Based Administrative Interface
133(4)
Help and Support
137(3)
Search
140(2)
Search Companion Integration
141(1)
Internet Connectivity and Internet Explorer 6.0
142(4)
Internet Connectivity Enhancements
142(1)
All-User Remote Access Service Credentials
143(1)
Auto-Configuration for Multiple Network Connectivity
143(1)
Connection Managed Favorites
143(1)
Connection Firewall
144(1)
Internet Connection Sharing
144(1)
Connection Manager VPN Server Selection
144(1)
Internet Explorer 6.0 Enhancements
145(1)
Contacts and Instant Messaging Integration
145(1)
Easy Image Acquisition and Automatic Image Resize
145(1)
Home Networking Wizard
146(1)
Web Publishing
146(1)
Winkey Quick Keys
146(1)
Internalization and Localization
147(1)
ClearType Mobile Computer/Liquid Crystal Display Enhancements
147(1)
Postscript
148(1)
The Active Directory
149(38)
Directory Services
150(5)
What Is the Active Directory?
151(1)
File Structure
152(2)
Data Stores and Partitions
154(1)
An Administrative View of the Active Directory
154(1)
Active Directory Structural Components
155(18)
Logical Structure
155(2)
Domains
157(1)
Domain Trees
157(1)
Domain Forests
158(1)
Trees and Forest Scaling and Extensibility
159(1)
Schema
160(2)
Physical Structure
162(1)
Sites
163(1)
Sites and Domain Relationships
163(1)
Domain Controller
164(3)
Replication
167(1)
Intersite and Intrasite Replication
168(1)
Replication Component Objects
168(1)
Preventing Data Replication Collision
169(1)
Special Domain Controller Roles
169(1)
The Global Catalog
170(3)
Open Standards Support and Naming Conventions
173(7)
The Active Directory and DNS
175(1)
Interoperability Issues
176(1)
Namespace and Naming Conventions
176(1)
Naming Conventions
176(1)
Additional Use of Industry Naming Standards
177(1)
Active Directory Use of LDAP
178(2)
Migration and Backward Compatibility
180(1)
Administrative Interface Snap-Ins
181(1)
API Options
182(2)
ADSI Resources
182(1)
Sample ADSI Scripts
183(1)
The User Interface
184(1)
Administrative Security and Trust Relationships
184(2)
Administrative Delegation
186(1)
Postscript
186(1)
Active Directory Management and Use
187(62)
Planning for the Active Directory
188(12)
The DNS Namespace
188(1)
DNS Names for Child Domains and Forests
188(1)
Debugging and Reporting Incorrect DNS Configuration
189(1)
Domain Names for Internal and External Use
189(1)
Renaming a Domain
189(1)
The Physical Structure: Sites and Replication
190(1)
Preparing for Replication and Synchronization
190(1)
Replication Latency
191(1)
Replication Topology
192(1)
Application Directory Partitions and Replica Placement
193(1)
Planning for Operations Master Locations
193(1)
Logical Structure Planning
194(1)
Single Domain and Organizational Units
194(1)
Domain Trees and Child Domains
195(1)
Forests
195(1)
Multiple Forests
196(1)
Cross-Forest Authentication
197(1)
Planning for Upgrades to the Active Directory
197(1)
Upgrading the PDC and the BDC
198(1)
Planning for Domain Controllers
198(1)
Sizing the Active Directory
199(1)
Determining Domain Controller Resources
199(1)
Installing the Active Directory
200(8)
Active Directory Installation Wizard
201(1)
Active Directory Installation Example
201(5)
Installation of Different Structures
206(2)
Active Directory MMC Snap-In Tools
208(28)
The Active Directory Domain and Trust Manager
209(2)
Creating Trust Relationships
211(2)
Changing from Mixed to Native Mode
213(1)
Adding UPN Suffices for User Logon
214(1)
Assigning a Domain Naming Master
214(2)
Delegating Domain Controller Administration
216(1)
The Active Directory Schema Manager Snap-In
217(1)
Identifying and Modifying Object Classes
218(2)
Identifying and Changing Attributes
220(1)
Creating a New Object Class or Attribute
221(1)
Removing Lingering Objects
222(1)
Changing the Domain Schema Master
222(1)
Ensuring Schema Availability and Restoration
223(1)
The Active Directory Sites and Services Snap-In
223(4)
Creating Sites
227(1)
Creating Site Subnets
227(1)
Creating Intersite Links and Transports
227(1)
The Intersite Replication Schedule
227(1)
Selecting an Application Licensing Server
228(1)
Moving Domain Controllers between Sites
229(1)
Domain Controller Backup and Restoration
229(1)
Forced Replication Check
230(1)
Removing a Domain Controller Server from a Site
230(1)
The Active Directory Users and Computers Snap-In
231(1)
Computer Account Management
231(4)
RID, PDC, or Infrastructure Masters
235(1)
The Active Directory Replication Monitor
235(1)
Creating Organizational Units
236(1)
Creating, Deleting, Modifying, and Moving an Organizational Unit
236(1)
Creating an Organizational Unit
236(1)
Deleting an Organizational Unit
236(1)
Modifying Organizational Unit Properties
236(1)
Moving Organizational Units
237(1)
Renaming Organizational Units
237(1)
Locating Objects
237(2)
Active Directory Object Access
238(1)
Object Picker UI Enhancements
239(1)
Standard and Special Permissions
239(2)
Setting and Viewing Object Permissions
239(1)
Permission Inheritance and Preventing Inheritance
240(1)
Active Directory Administrative Delegation
241(3)
The Delegation of Control Wizard
241(3)
Refining the Global Catalog
244(2)
Enabling a Global Catalog
244(1)
Moving, Removing, and Duplicating the Global Catalog
245(1)
Indexing and Adding Attributes to the Global Catalog
245(1)
The Active Directory Connector
246(1)
Configuring Connection Agreements
246(1)
Postscript
247(2)
User Accounts and Groups
249(44)
User Accounts
249(27)
Local User Accounts
250(3)
Creating a Local User Account
253(4)
Domain User Accounts
257(1)
Creating a Domain User Account
258(2)
Understanding User Account Properties
260(7)
User Profiles
267(1)
User Profile Types
267(2)
All User and Individual User Profile Settings
269(2)
Creating User Profiles
271(5)
Groups
276(16)
Group-to-Group and Group-to-User Relationships
277(1)
Group Scope
278(1)
Domain Local Groups
279(1)
Global Groups
280(1)
Universal Groups
281(1)
Group Types
281(1)
Using Groups
282(1)
Default User Account Membership
282(4)
Assigning Groups
286(1)
Group Scope and Membership Example
286(6)
Postscript
292(1)
Group Policies
293(56)
Understanding Group Policies
293(32)
Group Policy Management and Active Directory
294(2)
Group Policy Object Storage
296(1)
Refining Group Policy Inheritance
296(5)
Group Policy Settings
301(1)
User and Computer Policies
301(1)
Administrative Templates
301(2)
Security Settings
303(6)
Software Installation: Assigning and Publishing
309(12)
Scripts
321(3)
Folder Redirection
324(1)
GPO Implementation
325(1)
Refreshing Policy Settings
325(1)
PDC Operations Manager
326(1)
Implementing Group Policy
326(17)
Local Computer Policy
327(5)
Creating a GPO and Linking to the Active Directory Container
332(1)
Disabling Computer and User Configuration Settings
332(7)
Security Group Filtering
339(2)
Scripts
341(1)
Folder Redirection
342(1)
Resultant Set of Policy
343(1)
Group Policy WMI Filtering
343(1)
IntelliMirror
343(5)
Roaming Documents and Preferences
344(1)
Redirecting My Document Folders
344(4)
Postscript
348(1)
Permissions Security, Folder Sharing, and Dfs
349(40)
Reviewing NTFS Permissions
349(17)
Standard and Special Permissions
350(1)
Permissions Levels
351(1)
Working with Folder Permissions
352(1)
Setting Permissions
352(4)
Special Permissions
356(1)
Permission Inheritance
357(4)
Moving and Copying File and Folder Permissions
361(1)
Ownership
362(1)
Denying Rights to a Subfolder
362(1)
Transferring Ownership
363(1)
Owner Sets Permissions
364(1)
Implicit Groups and Permissions
365(1)
Folder Sharing
366(11)
Creating Shared Folders
367(2)
Sharing Folders
369(2)
Facilitating Shared Access
371(1)
Mapping a Network Drive to a Shared Folder
372(1)
The My Network Places Link to a Shared Folder
372(1)
Using the Run Command to Access Shared Folders
373(1)
Accessing a Share from Internet Explorer
374(1)
Special Hidden Shares
374(2)
Using NTFS Permissions and Shared Folders
376(1)
Publishing Files and Folders to the Active Directory
377(1)
Distributed File System Sharing
377(11)
Standalone versus Fault-Tolerant Dfs
377(2)
Creating Dfs
379(1)
The Dfs Root
379(1)
The Dfs Link
380(1)
Dfs Topology
381(1)
More Dfs Advantages
382(1)
Browse and Search Directories
382(1)
Bringing Servers Offline without User Interruption
382(1)
Ease of Web Server Maintenance
383(1)
Concerns Regarding Dfs Use
383(1)
Setting Up a Standalone Dfs Share
383(5)
Deleting a Dfs Share
388(1)
Postscript
388(1)
Kerberos and the Public Key Infrastructure
389(88)
Kerberos Authentication
389(17)
Understanding Kerberos Concepts
390(1)
The Authentication Service Exchange
391(3)
The Ticket-Granting Service Exchange
394(1)
The Client/Server Exchange
394(2)
Further Clarification of the Logon Process
396(1)
Referral Tickets
397(2)
Delegation with Forwarding and Proxy
399(1)
Forwarding Authentication
400(1)
The Kerberos Process
400(1)
Symmetrical Encryption and Shared Keys
401(1)
Shared Secret Keys
402(1)
Kerberos Policies
403(2)
Cross-Forest Authentication
405(1)
New Trust Wizard
405(1)
The Public Key Infrastructure
406(69)
PKI Background
407(1)
Data Encryption
408(1)
The Digital Signature
408(2)
Certification Authority
410(1)
Certificate Components
410(2)
Trusted Authorities and Certificate Stores
412(2)
Certificate Authority Hierarchies
414(4)
Third-Party Certificate Authorities
418(1)
Other PKI Features
418(1)
Microsoft Certificate Authorities
418(1)
The Standalone Certificate Authority
419(1)
The Enterprise Certificate Authority
419(2)
Public Key Policies
421(1)
PKI and Other Components and Applications
422(1)
Web Security
422(3)
Electronic Mail
425(1)
Authenticode
425(1)
The Encrypted File System
426(1)
The EFS Process
427(2)
EFS Issues
429(2)
Smart Cards
431(1)
Certificate Authority Administration
432(1)
Installation
432(1)
Management
433(3)
Distributing Certificates Using Group Policies
436(9)
Retrieving Certificates
445(11)
Exporting Certificates and Backup
456(2)
Certificate Authority Service Management
458(11)
Certificate Authority Properties
469(2)
Certificate Authority Backup
471(4)
Postscript
475(2)
Additional Security Issues and Solutions
477(42)
Security Policy
478(10)
Security Policy Snap-Ins
479(1)
Using Security Template Snap-Ins
480(2)
Building a Custom Template
482(1)
The Security Configuration and Analysis Tool
483(1)
Using the Security Configuration and Analysis Snap-In
484(4)
Security Authorization Manager
488(1)
Windows Server 2003 System Lockdown
488(18)
User Account Security
488(1)
The Administrator Account
489(2)
Backup Operators
491(1)
Guest Account
491(1)
Password Policies
492(1)
Domain Password Policies
492(1)
Password Lockout Policies
493(1)
Local Password Settings
493(1)
Determining Who Sets a Password
494(1)
Password Filtering
494(1)
Other User Account Security Options
494(1)
Registry and File System Lockdown
494(1)
Trojan Horses and Viruses
495(1)
Environmental Path Settings
496(1)
Current Working Directory Security Resource
496(1)
Extension Mapping to Disguise a File Type
497(1)
Spoofing Shortcuts
498(1)
Extraneous Services as a Security Threat
498(1)
Backups and Restoration Security
499(1)
Physical Security
499(1)
Theft of Systems or Storage Media
499(1)
Physical Access to the Boot CD-ROM and Floppy Drives
499(1)
Dual-Boot Environments
500(1)
Auditing as a Line of Defense
500(1)
Using Security Auditing
500(1)
Offline Auditing Policies
501(2)
Event Viewer Use
503(1)
General Auditing Procedures
504(1)
Audit Events That Need the Most Careful Review
505(1)
Secure Network Services and Architecture
506(10)
Protecting Network Shares
507(1)
Firewalls
508(1)
Packet Filtering
509(1)
Proxy Services
510(1)
Stateful Inspection
511(1)
Web Security
511(1)
Restricting Scripts from External Sources
512(1)
HTTP Security
512(1)
IP Security
512(1)
Internet Browser Security
512(1)
Restricting ActiveX Components
513(1)
Internet Certificate Management
513(1)
Securing RAS Servers
514(1)
Securing Electronic Mail
514(1)
Preventing E-Mail Security Abuses
514(2)
Other TCP/IP Security Issues
516(1)
The End User's Responsibility
516(1)
Postscript
517(2)
Networking Basics and Naming Services
519(50)
Networking Basics
519(9)
Network Architecture
519(2)
A Modified Network Model
521(1)
IP Addressing
521(1)
Dissecting IP Addressing
522(1)
Subnet Masks
523(1)
The Address Resolution Protocol
523(2)
IP Routing
525(1)
Client-Side Routing Configuration
526(2)
Naming Services and IP Assignments
528(37)
Domain Name System Conventions
529(1)
Understanding DNS
530(1)
DNS Recursion
530(1)
Standard versus Directory Integrated Zones
531(1)
Installation with the Active Directory
532(4)
Client Configuration
536(1)
DNS Zones and Fault Tolerance
537(7)
Forwarding
544(1)
Scavenging
544(3)
Server-Side DHCP Configurations
547(6)
Vendor and User Classes
553(3)
Superscopes
556(1)
DHCP and BOOTP Relay Agents
556(1)
The 80/20 Rule for Fault Tolerance
557(1)
Client-Side Configurations
558(2)
DNS with DHCP
560(1)
DHCP Server Configuration for DNS
560(1)
The Backup and Restore Options
561(1)
BOOTP
562(1)
WINS
563(2)
Real-Time Communications
565(1)
TAPI Streaming Support
565(1)
DNS Configuration through Group Policy
566(1)
Support for Broadband PPPOE Connections
566(1)
Postscript
567(2)
Virtual Private Networks and IP Security
569(46)
Virtual Private Networks
569(32)
Authentication
570(1)
Role of Encryption
570(1)
Tunnels
570(2)
Point-to-Point Tunneling Protocol
572(1)
Layer 2 Tunneling Protocol
573(1)
IPSec Tunneling
574(1)
VPN Configurations
575(1)
Router-to Router
575(1)
Remote Access
576(1)
Voluntary and Compulsory Tunnels
576(1)
VPN Architecture and Configuration
577(1)
Remote Access over the Internet
577(14)
Routing and Remote Access Server Management
591(1)
Viewing Remote Access Clients
592(1)
Internet Authentication Service and RADIUS
592(4)
IAS Installation
596(3)
RADIUS Account Logging
599(1)
RADIUS Proxy Servers
600(1)
RADIUS Load Balancing
600(1)
IP Security
601(13)
Understanding IPSec Policies
602(1)
Setting IPSec Polities
603(1)
Creating a New IPSec Policy
603(1)
Authentication Methods
603(1)
Tunnel Settings
604(1)
Connection Type
605(2)
IP Filter List
607(4)
IP Filter Actions
611(3)
Postscript
614(1)
Disk Management, Backup and Restoration, and Disaster Recovery
615(34)
Disk Management
616(19)
NTFS and FAT/FAT32 Disk Management
616(1)
Disk Management Tools
616(1)
Disk Storage Types
617(1)
Upgrading a Basic Disk to a Dynamic Disk
618(1)
Managing Partitions and Basic Storage
618(1)
Managing Volumes
619(2)
Creating a Spanned Volume
621(1)
Expanding a Spanned Volume
621(3)
The Disk Management Snap-In Tool
624(1)
Disk Properties Options with NTFS
625(1)
Disk Properties Options under FAT/FAT32
626(1)
Disk Quotas
627(2)
Disk Fragmentation Management
629(1)
Removable Media and Library Management
630(1)
Working with Libraries
630(3)
Operator Request Management
633(1)
Securing Removable Storage
634(1)
Remote Storage
634(1)
Backup and Restoration
635(9)
Backup Strategy Basics
635(1)
Available Backup Types
636(1)
Who Can Back Up
636(1)
Managing Backups with Nbackup
637(1)
Changing Default Back Up Options
638(2)
Restoration Basics
640(1)
How to Restore
640(3)
Using Batch Restoration
643(1)
Authoritative Restoration
644(1)
Disaster Management
644(3)
Automatic System Recovery
645(1)
Creating and ASR Saveset
645(1)
Manual Recovery with the Advanced Options Menu
645(1)
The Command-Line Recovery Console
646(1)
Emergency Repair Disk
646(1)
Fault Tolerance for Disaster Protection
647(1)
Uninterrupted Power Supply Management
647(1)
Postscript
647(2)
Terminal Services
649(26)
Conceptual Review
650(1)
Installing Terminal Services
651(5)
Installing Applications for Use with Terminal Services
654(1)
Sizing Terminal Services Systems
654(2)
Enabling and Disabling Terminal Services
656(1)
Configuring Terminal Services
656(9)
Configuring Connections
656(1)
General Settings
657(1)
Remote Control Options
658(1)
Client Settings for Remote Control
659(1)
Network Adapter Settings
659(2)
Permissions
661(1)
Logon Settings
662(1)
Sessions Options
662(1)
Environment Settings
662(2)
Terminal Services Server Settings
664(1)
Terminal Services Administration
665(6)
Administrative Tools
665(1)
Remote Desktop MMC Administrative Tool
665(1)
Terminal Services Manager
666(1)
Active Directory Users and Computers Snap-In and the Local Users and Groups Snap-In
666(1)
Task Manager Additions
667(1)
Load Management
668(1)
Client Software and Installation
669(1)
Command-Line Programs
670(1)
Terminal Services from a User's Perspective
671(2)
User Launching
672(1)
Terminal Services Client
672(1)
Postscript
673(2)
Internet Information Services
675(38)
Overview
676(11)
New Manageability Features
676(1)
XML Metabase
677(1)
IIS WMI Provider and Command-Line Administration
678(1)
IIS Security Features
678(1)
IIS Security Mechanisms
679(1)
IIS Internet Security Technologies
680(1)
IIS Data and Process Reliability
681(1)
Process Architecture
682(2)
Process Features Common to IIS 5.0 and IIS 6.0
684(1)
IIS 5.0 Isolation Mode
685(1)
The Web Application Environment
686(1)
IIS Management Components
686(1)
Understanding the IIS Web Server
687(12)
Administering IIS Web Services
687(1)
Creating a Web Site Using IIS
687(1)
Basic Web Site Administration
688(2)
Configuring Web Site Properties
690(9)
Working with the SMTP Server
699(6)
SMTP Properties
700(1)
General SMTP Settings
700(1)
Setting SMTP Authentication, Security, and Permissions
700(1)
Regulating the SMTP Delivery
701(1)
Configuring SMTP LDAP Routing
701(2)
Setting SMTP Operator Security
703(1)
Setting SMTP Message Limits
703(2)
Understanding the NNTP Server
705(1)
Understanding the FTP Server
706(6)
FTP Properties
708(1)
Establishing General FTP Site Configuration
708(1)
Establishing Basic FTP Security
708(2)
Establishing the FTP Home Directory and Security
710(2)
Postscript
712(1)
Cluster, Indexing, Message Queuing, SMS, MOM, and WSH
713(44)
Understanding Cluster Services
714(9)
Failover and Failback
714(1)
Cluster Network Concerns
715(1)
The Cluster Database
716(1)
Basic Cluster Planning
717(1)
Application Selection
717(1)
Grouping and Capacity
717(1)
Networks
718(1)
Required Domain Accounts
718(1)
Possible Points of Failure
718(1)
Cluster Administration
719(1)
The Application Configuration Wizard
719(1)
Understanding Default Groups
719(1)
Failover Administration
719(1)
Using the Cluster.exe Command-Line Utility
720(1)
Setting Cluster Properties
720(1)
Clustering Features New to Windows Server 2003
721(2)
Postscript on Cluster Technology
723(1)
Indexing Service
723(8)
Using Indexing Service to Find Data
725(1)
Indexing Service Sizing
725(1)
Indexing Service Query Language
726(1)
Rules and Operators
727(1)
Common Indexing Service Administrative Tasks
728(1)
Creating a Catalog
729(1)
Adding or Excluding a Directory to the Catalog
729(1)
Adding, Editing, and Removing Properties
730(1)
Message Queuing Services
731(14)
Concepts
731(1)
Understanding Messages
731(1)
Understanding Queues
732(1)
Understanding Network Topology for Message Queuing
732(1)
Understanding Message Routing
733(1)
Creating a Routing Link
734(1)
Changing Routing Servers for a Routing Link
734(1)
Creating a Cost for a Routing Link
735(1)
Changing the Routing Server for Independent Clients
735(1)
Testing Connectivity Using MQPing
735(1)
Installing Message Queuing Services
736(1)
Preinstallation Hardware Considerations
736(1)
Installation Considerations
737(2)
Administrative Tools for Message Queuing Services
739(1)
Finding a Message Queuing System
739(1)
Setting a Computer Message Storage Size
739(1)
Limiting Journal Storage Size
739(1)
Finding a Queue
740(1)
Deleting a Queue
740(1)
Enabling or Disabling Journals
740(1)
Viewing Message Properties
740(1)
Purging All Messages
741(1)
Message Queuing Security Issues and Management
741(1)
Setting Permissions for a Computer or Queue
742(1)
Changing Ownership of a Computer or Queue
742(1)
Setting Default Security for Message Queuing Storage Files
743(1)
Setting Up Computer or Queue Auditing
743(1)
Auditing a Routing Link
743(1)
Windows Server 2003 Specific Message Queuing Enhancements
744(1)
Postscript on Message Queuing
745(1)
System Management Server
745(3)
Software and Hardware Inventory
746(1)
Software Installation and Distribution
746(1)
Remote Administrative Tools
746(1)
Software Metering
746(1)
Network Diagnostics
747(1)
Microsoft Operations Manager
748(2)
Microsoft Operations Manager Features
749(1)
Distribute Event Management
749(1)
Administrative Defined Rules Management
749(1)
Alert Management
749(1)
Performance Monitoring
749(1)
Graphical Reporting Tools and Web Reporting
750(1)
Optional Management Packs
750(1)
Windows Scripting Host
750(5)
Using WSH to Run Scripts
751(1)
Running Wscript.exe
751(1)
Running Cscript.exe
752(2)
Sample WSH Scripts
754(1)
Postscript
755(2)
Appendix Windows Server 2003 Commands and Utilities
757(128)
New Command-Line Tools with Windows Server 2003
759(23)
bootcfg Command
760(1)
bitscli Command
761(1)
choice Command
761(1)
clip Command
761(1)
compress Command
761(1)
driverquery Command
762(1)
Directory Services Commands
763(1)
Executing Commands on the Network
763(1)
Command Syntax
764(1)
eventcreate Command
765(1)
Eventquery.vbs Script
765(1)
eventtriggers Command
766(1)
extract Command
766(1)
forfiles Command
767(1)
freedisk Command
767(1)
gettype Command
767(2)
gpresult Command
769(1)
gpupdate Command
769(1)
IIS scripts
770(1)
inuse Command
770(1)
netdom Command
771(1)
netsh Command
771(1)
openfiles Command
771(1)
pagefileconfig Command
771(1)
powercfg Command
771(3)
Print Scripts
774(1)
regfind Command
775(1)
sc Command
775(1)
setx Command
775(2)
shutdown Command
777(1)
systeminfo Command
778(1)
takeown Command
778(1)
taskkill Command
778(1)
tasklist Command
779(1)
timeout Command
779(1)
tsecimp Command
779(2)
whoami Command
781(1)
Backup Commands
782(3)
Using Ntbackup on the Command Line
782(3)
Example of Nibackup Command
785(1)
Batch Commands
785(1)
Comparison Commands
785(4)
fc Command
785(1)
fc Command Examples
786(2)
comp Command
788(1)
Example of Comp Command
789(1)
Windiff
789(1)
Compression Commands
789(2)
compact Command
790(1)
expand Command
791(1)
Display Commands
791(10)
Displaying the Contents of Files
791(1)
cls Command
792(1)
more Command
792(1)
type Command
792(1)
Displaying Attributes and Properties of Files and Folders
793(1)
Displaying File Properties Using Windows Server 2003 Explorer
793(2)
dir Command
795(4)
echo Command
799(1)
Displaying Help
799(1)
help Command
799(1)
net help Command
800(1)
net helpmsg Command
801(1)
File-Management Commands
801(11)
Displaying Path Names
801(1)
Creating and Removing Folders
801(1)
Creating Folders
801(1)
mkdir Command
802(1)
Removing Folders
802(1)
Moving between Folders
803(1)
chdir Command
803(1)
Creating and Removing Files
804(1)
Creating Files
804(1)
Removing Files
804(1)
del and erase Commands
804(1)
Copying and Moving Files
805(1)
Copying Files
806(1)
copy Command
806(2)
xcopy Command
808(1)
Moving Files
809(2)
Renaming Files or Folders
811(1)
rename Command
811(1)
Determining File Type
811(1)
File-Manipulation Commands
812(2)
assoc Command
812(1)
attrib Command
812(1)
attrib Command Example
812(1)
sort Command
813(1)
Miscellaneous Commands
814(4)
cacls Command
814(1)
Converting to NTFS
814(1)
convert Command
814(1)
Setting and Displaying Date and Time
815(1)
date Command
815(1)
time Command
816(1)
net time Command
816(1)
Logging on as Another User
817(1)
Chat Mode
817(1)
net name Command
817(1)
net name Command Example
818(1)
net send Command
818(1)
Networking Commands
818(30)
arp Command
819(1)
HyperTerminal
819(1)
ftp and tftp Commands
820(1)
hostname Command
821(1)
ipconfig Command
821(1)
ipxroute Command
822(1)
netstat Command
823(1)
nslookup Command
824(1)
ping Command
824(1)
pathping Command
824(1)
rcp Command
824(3)
route Command
827(1)
rsh Command
828(1)
Telnet
828(1)
Net Commands
829(1)
net accounts Command
829(1)
net accounts Command Examples
830(1)
net computer Command
831(1)
net config Command
831(1)
net config server Command
831(1)
net config workstation Command
831(2)
net continue Command
833(1)
net file Command
834(1)
net group Command
834(2)
net localgroup Command
836(1)
net help Command
837(1)
net helpmsg Command
837(1)
net name Command
837(1)
net pause Command
837(1)
net print Command
838(1)
net send Command
838(1)
net session Command
838(1)
net share Command
839(1)
net statistics Command
840(1)
net start Command
841(1)
net stop Command
841(1)
net time Command
841(3)
net use Command
844(1)
net user Command
844(4)
net view Command
848(1)
Print Commands
848(7)
Creating a Printer
848(1)
Sending Files to Print
849(1)
lpr Command
850(1)
print Command
850(1)
Print Status
851(1)
lpq Command
851(1)
net print Command
852(1)
Managing Printer Operations
853(1)
Pausing and Resuming a Printer
853(1)
Pausing and Resuming Printing
853(1)
Restarting and Canceling a Document
854(1)
Defining Printer Properties
854(1)
LPD Service
854(1)
Search Commands
855(3)
find Command
855(1)
find Command Examples
856(1)
findstr Command
856(1)
findstr Command Examples
857(1)
System-Management Commands
858(6)
Disk Management
858(1)
chkdsk Command
858(1)
chkntfs Command
859(1)
diskperf Command
860(1)
Process Management
860(1)
at Command
860(2)
Task Manager
862(1)
Other System Management Tools
863(1)
Logging Off the System
863(1)
Shutting Down the System
863(1)
Environment Variables
864(1)
Resource Kit Support Tools
864(20)
Acldiag.exe---ACL Diagnostics
864(1)
Adsiedit.msc---ADSI Editor
864(1)
Apcompat.exe---Application Compatibility Tool
865(1)
Apmstat.exe---Advanced Power Management Status
865(1)
Clonepr.dll---Clone Principal
865(1)
Dcdiag.exe---Domain Controller Diagnostic Tool
866(1)
Depend.exe---Dependency Walker
866(1)
Dfsutil.exe---Distributed File System Utility
866(2)
Dnscmd.exe---DNS Troubleshooting Tool
868(1)
Dsacls.exe---DSACLS
868(2)
Dsastat.exe and DSASTAT Command
870(1)
Dskprobe.exe---Disk Probe
870(1)
Dumpchk.exe---Dump Check
871(1)
Filever.exe---File Version Verification
871(1)
Gflags.exe---Global Flags
872(2)
Kill.exe---Task Killing Utility
874(1)
Ksetup.exe---Kerberos Client Configuration
874(1)
Ktpass.exe---Kerberos Tab Key Setup
874(2)
Lpd.exe---LDAP Tool
876(1)
Memsnap.exe---Memory Profiling Tool
876(1)
Movetree.exe---Movetree Object Manager
876(1)
Msinfo32.exe---MS System Information Tool
876(1)
Netdiag.exe---Network Connectivity Tester
877(2)
Netdom.exe---Domain Manager
879(1)
Nltest.exe---Network Domain Test
879(1)
Pmon.exe---Process Monitor
879(1)
Pviewer.exe---Process Viewer
879(1)
Repadmin.exe---Replication Diagnosis Tool
879(1)
Replmon.exe---Replication Monitor
880(1)
Rsdiag.exe---Remote Storage Diagnosis Tool
880(1)
Sdcheck.exe---Security Descriptor Check Utility
880(2)
secedit Command
882(1)
Sidwalk.exe---SID Walk
883(1)
Snmputilg.exe---SNMP Utility Tool
884(1)
Tlist.exe---Task List Viewer
884(1)
Postscript
884(1)
Glossary 885(24)
Index 909

Excerpts

Windows Server 2003 is more an update of Windows 2000 than a new operating system. This latest version of the base Windows NT technology now expands to support Microsoft's .NET Framework and new security initiatives. This book reflects these changes by expanding our previous book,The Ultimate Windows 2000 System Administrator's Guide. Mindful that Windows 2000 will continue to be deployed, this book not only reflects the new features of Windows Server 2003 but also provides continued support for Windows 2000 administrators. Windows 2000 and Windows Server 2003 are complex, feature-rich operating systems whose deployment in an enterprise requires highly skilled individuals to support its installation, maintenance, and optimization. These individuals are aided by the abundance of tools and wizards for effective operating-system management that Microsoft has provided. Indeed, many of the enhanced tools should shift the traditional role of administrator to that of proactive manager of computing environments. Thus, the depth of function, flexibility, and granularity of Windows 2000 and Windows Server 2003 ultimately represents both opportunity and challenge for system administration. This book is written to help you succeed in the administration of the Windows Server 2003 and Windows 2000 Server family. Much of the information it provides is also applicable to the desktop Professional versions of the software. Although the use and management of client software is incorporated, the server side is clearly our primary focus. In this preface we provide a framework for the primary topics covered, define the target audience, and describe how to use this book. THE ROLE OF THE ADMINISTRATOR Windows Server 2003 will not eliminate the system administrator. To the contrary, features such as the Active Directory and the Microsoft Management Console (MMC) will vastly broaden this role. Rather than spend time on mundane tasks and the management of dozens of disjointed tools, the consolidated approach provided by Windows Server 2003 will free the administrator to concentrate on more mission-critical activities. The functions of the Windows Server 2003 system administrator are generally those that support the user population and those that support the system. The following list summarizes the most common responsibilities: USER-ORIENTED TASKS Addition and removal of users Group management User application support End-user customer service, education, and communication Management of basic services such as mail and printing SYSTEM-ORIENTED TASKS Booting, shutdown, and everything in between Backups and restoration Hardware maintenance, additions, and removal System accounting and monitoring System administration logs System security and password aging Network support General troubleshooting Obviously, this list only scratches the surface of system administration and IT management. However, as a means of setting the reader's expectations, it does underscore the types of activities for which this book can be a guide. BASIS OF OUR RESEARCH In preparing this book, we used three primary sources of information. First, we relied heavily on our combined professional experience in application development, system administration, and IT management. Unlike many books written on theory by technical writers, our recommendations did not emerge from a vacuum but are based on reality and experiences. We hope the knowledge and experience we bring to this book will assist our fellow IT professionals to manage an enterprise as effectively as possible. Second, we used observations from system administrators in the field to provide "reality checks" to our conclusions. Theoretical understanding of Windows Server 2003 is a nice beginning, but it is no substitute for th

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.