The Best Damn Windows Server 2008 Book Period

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller. New to this Edition: * Web server management with Internet Information Services 7.0 * Virtualize multiple operating systems on a single server * Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller

Author(s): Anthony Piltzecker
Edition: 2
Publisher: Syngress; Elsevier Science [distributor]
Year: 2008

Language: English
Pages: 821
City: Rockland, Mass. :, Oxford

cover.jpg......Page 1
Technical Editors......Page 2
Contributing Authors......Page 3
Configuring Network Services......Page 8
Introduction......Page 9
Configuring Domain Name System (DNS)......Page 10
Identifying DNS Record Requirements......Page 15
Installing and Configuring DNS......Page 19
Using Server Core and DNS......Page 24
Configuring Zones......Page 26
Zone Transfer......Page 29
Active Directory Records......Page 33
Reverse Lookup Zones......Page 34
Configuring Reverse Lookup Zones......Page 35
Configuring Zone Resolution......Page 38
Configuring Dynamic Host Configuration Protocol (DHCP)......Page 41
DHCP Design Principles......Page 42
Installing and Configuring DHCP......Page 44
Using Server Core and DHCP......Page 47
Configuring DHCP for DNS......Page 49
Configuring Windows Internet Naming Service (WINS)......Page 50
Automatic Partner Configuration......Page 52
Push Partnerships......Page 53
Pull Partnerships......Page 54
Replication Models......Page 55
Hub-and-Spoke Models......Page 56
Static WINS Entries......Page 57
Installing and Configuring......Page 58
Using Server Core for WINS......Page 59
Configuring WINS for DNS......Page 60
Summary......Page 61
Configuring Dynamic Host Configuration Protocol (DHCP)......Page 62
Configuring Windows Internet Naming Service (WINS)......Page 63
Frequently Asked Questions......Page 64
Configuring the Active Directory Infrastructure......Page 66
Introduction......Page 67
Working with Forests and Domains......Page 68
Understanding Domains......Page 69
Forest and Domain Functional Levels......Page 71
Using the Windows 2000 Domain Functional Level......Page 73
Windows Server 2003 Domain Functional Level......Page 74
Configuring Forest Functional Levels......Page 75
Windows Server 2003 Forest Functional Level......Page 76
Windows Server 2008 Forest Functional Level......Page 77
Raising the Domain Functional Level......Page 78
Understanding the Global Catalog......Page 80
Directory Information Search......Page 82
Universal Group Membership Information......Page 83
Universal Group Membership......Page 84
Attributes in the Global Catalog......Page 85
Placing GC Servers within Sites......Page 86
Bandwidth and Network Traffic Considerations......Page 87
Universal Group Membership Caching......Page 88
Working with Flexible Single Master Operation (FSMO) Roles......Page 89
Locating and Transferring the Schema Master Role......Page 93
Locating and Transferring the Domain Naming Master Role......Page 96
Locating and Transferring the Infrastructure, RID, and PDC Operations Master Roles......Page 98
Placing the FSMO Roles within an Active Directory Environment......Page 101
Working with Sites......Page 102
Understanding Sites......Page 103
Subnets......Page 105
Site Planning......Page 106
Creating a Site......Page 107
Renaming a Site......Page 111
Creating Subnets......Page 113
Associating Subnets with Sites......Page 116
Creating Site Links......Page 118
Configuring Site Link Cost......Page 121
Understanding Replication......Page 123
Intrasite Replication......Page 125
Intersite Replication......Page 126
Bridgehead Servers......Page 127
Scheduling......Page 128
Replication Protocols......Page 129
Creating Replication Topology......Page 130
Configuring Replication between Sites......Page 131
Troubleshooting Replication......Page 132
Using Event Viewer......Page 133
Working with Trusts......Page 135
Forest Trusts......Page 140
External Trusts......Page 141
Shortcut Trusts......Page 142
SID Filtering......Page 143
Summary......Page 144
Working with Sites......Page 146
Working with Trusts......Page 147
Frequently Asked Questions......Page 148
Configuring Certificate Services and PKI......Page 152
Introduction......Page 153
What Is PKI?......Page 154
The Function of the PKI......Page 156
Components of PKI......Page 157
How PKI Works......Page 159
PKCS Standards......Page 161
How Certificates Work......Page 165
Public Key Functionality......Page 168
Digital Signatures......Page 169
Authentication......Page 170
Bulk Data Encryption without Prior Shared Secrets......Page 171
User Certificates......Page 182
Analyzing Certificate Needs within the Organization......Page 183
Certificate Authorities......Page 184
Standard vs. Enterprise......Page 185
Root vs. Subordinate Certificate Authorities......Page 186
Certificate Requests......Page 187
Certificate Practice Statement......Page 191
Backup and Restore......Page 192
Assigning Roles......Page 198
Revocation......Page 199
Working with Templates......Page 203
General Properties......Page 205
Request Handling......Page 207
Cryptography......Page 208
Subject Name......Page 209
Issuance Requirements......Page 210
Security......Page 213
User Certificate Types......Page 214
Computer Certificate Types......Page 216
Other Certificate Types......Page 217
Custom Certificate Templates......Page 218
Securing Permissions......Page 221
Key Recovery Agent......Page 222
Summary......Page 224
Planning a Windows Server 2008 Certificate-Based PKI......Page 225
Planning Enrollment and Distribution of Certificates......Page 226
Frequently Asked Questions......Page 227
Windows Server 2008 Core......Page 230
Introduction......Page 231
Using Server Core and Active Directory......Page 234
Using Server Core and DNS......Page 240
Configuring Dynamic Host Configuration Protocol (DHCP) Using Server Core......Page 242
Installing DHCP Using Server Core......Page 244
Installing Internet Information Services......Page 246
Installing the FTP Publishing Service......Page 251
Installing and Managing Hyper-V on Windows Server Core Installations......Page 254
Solutions Fast Track......Page 255
Frequently Asked Questions......Page 256
Configuring DNS......Page 257
An Introduction to Domain Name System (DNS)......Page 258
Understanding Public Name Resolution......Page 261
Understanding Private Name Resolution......Page 262
Understanding Microsoft’s DNS Terminology......Page 263
Installing the DNS Server Role......Page 264
Configuring Root Hints......Page 265
Adding Root Hint Records......Page 266
Editing Root Hints Records......Page 267
Configuring Server-Level Forwarders......Page 269
Creating Conditional Forwarders......Page 272
Managing Conditional Forwarders......Page 274
Server Core......Page 276
Creating DNS Zones......Page 277
Creating a Standard Primary Forward Lookup Zone......Page 280
Creating a Secondary Forward Lookup Zone......Page 284
Creating an Active Directory Integrated Forward Lookup Zone......Page 285
Creating a Standard Primary Reverse Lookup Zone......Page 289
Creating a Standard Secondary Reverse Lookup Zone......Page 292
Creating a Zone Delegation......Page 293
Using the New GlobalNames Zone Feature......Page 296
Enabling a Domain Controller to Support GlobalNames Zones......Page 297
Creating the GlobalNames Zone......Page 298
Configuring DNS Servers to Allow Zone Transfers......Page 300
Configuring a Standard Primary Zone for Transfers......Page 301
Configuring an AD Integrated or Secondary Zone for Transfers......Page 302
Configuring the SOA Record......Page 303
Creating an Application Directory Partition......Page 305
Creating Host Records......Page 306
Creating A Records......Page 307
Creating AAAA Records......Page 308
Creating Pointer Records......Page 310
Creating MX Records......Page 311
Creating SRV Records......Page 313
Creating CNAME Records......Page 316
Creating NS Records......Page 317
Configuring Windows Internet Name Service (WINS) and DNS Integration......Page 318
Creating a WINS Lookup Record......Page 319
Creating a WINS Reverse Lookup Record......Page 321
Understanding the Dynamic Domain Name System (DDNS)......Page 324
Configuring DDNS Aging and Scavenging......Page 325
Enabling Automatic Scavenging......Page 327
Initiating Manual Scavenging......Page 328
Configuring Name Resolution for Client Computers......Page 329
How Name Resolution Works in Windows XP and Later......Page 331
Configuring the DNS Server List......Page 332
Configuring the Suffix Search Order......Page 334
Configuring the HOSTS File......Page 335
Configuring the NetBIOS Node Type......Page 336
Configuring the WINS Server List......Page 338
Configuring the LMHOSTS File......Page 340
Managing Client Settings by Using Group Policy......Page 342
Summary......Page 346
Configuring a DNS Server......Page 348
Configuring Name Resolution for Client Computers......Page 349
Frequently Asked Questions......Page 351
Configuring Network Access......Page 354
Introduction......Page 355
Windows Server 2008 and Routing......Page 356
Windows Server 2008 and Wireless Access......Page 357
Routing Fundamentals......Page 358
Static Routing......Page 360
Routing Internet Protocol (RIP)......Page 361
Open Shortest Path First (OSPF)......Page 362
Configuring Remote Access......Page 363
Routing and Remote Access Services (RRAS)......Page 364
Network Policy Server and Network Access Protection......Page 366
Dial-Up......Page 369
Remote Access Policy......Page 370
Network Address Translation (NAT)......Page 373
Internet Connection Sharing (ICS)......Page 375
Remote Access Protocols......Page 378
Virtual Private Networks......Page 383
Installing and Configuring a SSL VPN Server......Page 384
Inbound/Outbound Filters......Page 388
Configuring Remote Authentication Dial-In User Service (RADIUS) Server......Page 389
Configuring Wireless Access......Page 393
Set Service Identifier (SSID)......Page 397
Wi-Fi Protected Access 2 (WPA2)......Page 398
Ad Hoc vs. Infrastructure Mode......Page 399
Wireless Group Policy......Page 401
Configuring Routing......Page 402
Configuring Remote Access......Page 403
Configuring Wireless Access......Page 404
Frequently Asked Questions......Page 406
Configuring File and Print Services......Page 408
Configuring a File Server......Page 409
File Share Publishing......Page 410
Additional Role Services......Page 413
File Screening......Page 415
Sharing a Folder......Page 416
Share Permissions......Page 418
NTFS Permissions......Page 419
Offline Files......Page 421
Encrypting File System (EFS)......Page 428
Working with EFS......Page 429
DFS Namespaces......Page 434
DFS Configuration and Application......Page 435
Creating and Configuring Targets......Page 438
DFS Replication......Page 439
Configuring Shadow Copy Services......Page 440
Recovering Previous Versions......Page 442
Setting the Schedule......Page 444
Configuring Backup and Restore......Page 445
Backup Schedules......Page 446
Managing Remotely......Page 449
Restoring Data......Page 451
Quota by Volume or Quota by User......Page 452
Quota Entries......Page 454
Configuring Quotas Using FSRM......Page 455
Printer Share......Page 457
Printer Permissions......Page 459
Deploying Printer Connections......Page 461
Installing Printer Drivers......Page 462
Exporting and Importing Print Queues and Printer Settings......Page 464
Adding Counters to Reliability and Performance Monitor to Monitor Print Servers......Page 466
Printer Pooling......Page 468
Print Priority......Page 469
Summary......Page 471
Configuring Shadow Copy Services......Page 473
Configuring and Monitoring Print Services......Page 474
Frequently Asked Questions......Page 476
Monitoring and Managing a Network Infrastructure......Page 481
Configuring Windows Server Update Services Server Settings......Page 482
Installing Windows Server Update Services......Page 483
Update Type Selection......Page 495
Client Settings......Page 497
Configuring WSUS Computer Group Assignment Settings......Page 499
Group Policy Objects (GPOs)......Page 501
Software Updates......Page 505
Test and Approval......Page 507
Disconnected Networks......Page 511
Data Collector Sets......Page 513
Performance Monitor......Page 526
Reliability Monitor......Page 530
Monitoring the System Stability Index......Page 532
Custom Views......Page 533
Operational Logs......Page 537
Subscriptions......Page 538
DNS Event Log......Page 541
Simple Network Management Protocol (SNMP)......Page 542
Baseline Security Analyzer......Page 546
Network Monitor......Page 549
Configuring Windows Server Update Services Server Settings......Page 553
Gathering Network Data......Page 554
Frequently Asked Questions......Page 555
Network Access Protection......Page 556
Introduction......Page 557
Network Layer Protection......Page 558
NAP Clients......Page 559
Active Directory Domain Services......Page 560
Restricted Network......Page 561
DHCP Enforcement......Page 562
Communication Process with VPN Client and NAP......Page 568
Configuring NAP Health Policies......Page 572
Connection Request Policies......Page 573
Network Policies......Page 574
Health Policies......Page 575
Network Access Protection Settings......Page 577
IPsec Enforcement......Page 579
Boundary Network......Page 580
Flexible Host Isolation......Page 581
Summary......Page 587
Working with Network Access Protection......Page 588
Frequently Asked Questions......Page 590
Configuring Windows Server Hyper-V and Virtual Machines......Page 591
Advancing Microsoft’s Strategy for Virtualization......Page 592
Understanding Virtualization......Page 594
Understanding the Components of Hyper-V......Page 598
Installing Hyper-V......Page 601
Installing and Managing Hyper-V on Windows Server Core Installations......Page 604
Virtual Networking......Page 605
Virtualization Hardware Requirements......Page 608
Virtual Hard Disks......Page 609
Adding Virtual Machines......Page 611
Migrating from Physical to Virtual Machines......Page 616
Backing Up Virtual Machines......Page 621
Virtual Server Optimization......Page 625
Summary......Page 628
Migrating from Physical to Virtual Machines......Page 629
Backing Up Virtual Machines......Page 630
Virtual Server Optimization......Page 631
Frequently Asked Questions......Page 632
Configuring Web Application Services......Page 634
Installing and Configuring Internet Information Services......Page 635
Differences in Windows Editions......Page 640
Small Web Farms......Page 641
Large Web Farms......Page 642
Installing Internet Information Services......Page 643
Provisioning Web Sites......Page 650
Configuring the Default Document......Page 654
Enabling Directory Browsing......Page 655
Customizing Error Pages......Page 657
Redirecting Requests......Page 660
Adding Custom Response Headers......Page 661
Adding MIME Types......Page 662
Configuring Web Applications......Page 663
Application Pool Settings......Page 669
Application Development Settings......Page 671
Enabling Third-Party Runtime Environments......Page 672
Migrating from Previous Releases......Page 674
Securing Your Web Sites and Applications......Page 675
Transport Security......Page 676
Authentication......Page 685
Considerations When Using Client Certificates......Page 688
URL Authorization......Page 690
IP Authorization......Page 694
Request Filtering......Page 695
.NET Trust Levels......Page 697
Configuration and Delegation......Page 698
Remote Administration......Page 702
Health and Diagnostics......Page 703
Failed Request Tracing......Page 704
Logging......Page 707
Output Caching......Page 708
Compression......Page 711
Network Load Balancing......Page 714
TCP and HTTP Service Unavailable Responses......Page 715
Backing Up and Restoring Server Configuration......Page 716
Summary......Page 718
Securing Your Web Sites and Applications......Page 720
Managing Internet Information Services......Page 721
Frequently Asked Questions......Page 723
Configuring Web Infrastructure Services......Page 725
Installing and Configuring FTP Publishing Services......Page 726
Installing the FTP Publishing Service......Page 727
Provisioning FTP Sites......Page 734
Directory Browsing......Page 737
Firewall Support......Page 739
Messages......Page 740
Virtual Directories......Page 741
Application Pools......Page 742
Transport Security......Page 744
Authorization......Page 751
URL Authorization......Page 752
IP Authorization......Page 753
User Isolation......Page 754
Installing and Configuring SMTP Services......Page 756
Installing Simple Mail Transfer (SMTP) Services......Page 757
Provisioning Virtual Servers......Page 760
Configuring a Virtual Server......Page 762
Server Bindings......Page 763
Logging......Page 764
Message Limits......Page 765
Delivery Options......Page 766
LDAP Routing......Page 769
Transport Security......Page 770
Authentication......Page 771
Connection Control......Page 772
Relay Restrictions......Page 773
Summary......Page 775
Installing and Configuring FTP Publishing Service......Page 776
Installing and Configuring SMTP Services......Page 777
Frequently Asked Questions......Page 778
A......Page 780
C......Page 781
D......Page 782
E......Page 784
G......Page 785
I......Page 786
M......Page 787
P......Page 788
R......Page 789
S......Page 791
V......Page 792
W......Page 793
Z......Page 795