Introduction |
|
xxiii | |
Assessment Test |
|
xl | |
|
|
1 | (356) |
|
Installing, Licensing, and Updating Windows Server 2003 |
|
|
3 | (74) |
|
Features of Windows Server 2003 |
|
|
4 | (7) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
Networking and Communications |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Storage Management Services |
|
|
9 | (1) |
|
Internet Information Server (IIS) 6.0 |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
Universal Description, Discovery, and Integration (UDDI) Services |
|
|
11 | (1) |
|
Windows Server 2003 Family Features |
|
|
11 | (2) |
|
Preparing to Install Windows Server 2003 |
|
|
13 | (4) |
|
|
14 | (1) |
|
The Hardware Compatibility List (HCL) |
|
|
15 | (1) |
|
Checking System Compatibility |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Installing Windows Server 2003 |
|
|
17 | (7) |
|
Steps for Windows Server 2003 Installation |
|
|
17 | (3) |
|
Upgrading a Server to a Domain Controller |
|
|
20 | (4) |
|
Setting Up Your Computers for Hands-on Exercises |
|
|
24 | (7) |
|
Installing Windows Server 2003 as a Domain Controller |
|
|
24 | (3) |
|
Installing Windows XP Professional within the Windows 2003 Domain |
|
|
27 | (4) |
|
Post-installation Product Activation |
|
|
31 | (2) |
|
|
33 | (12) |
|
Understanding and Selecting a Licensing Mode |
|
|
33 | (2) |
|
Administering the License Logging Service |
|
|
35 | (1) |
|
Administering Licensing Locally |
|
|
36 | (2) |
|
Administering Licensing in an Enterprise |
|
|
38 | (7) |
|
Managing Software Installation and Maintenance |
|
|
45 | (21) |
|
|
46 | (2) |
|
Using Windows Automatic Updates |
|
|
48 | (1) |
|
Using Software Update Services |
|
|
49 | (13) |
|
Using the Microsoft Baseline Security Analyzer |
|
|
62 | (4) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (7) |
|
Answers to Review Questions |
|
|
75 | (2) |
|
Managing Users, Groups, and Computers |
|
|
77 | (64) |
|
Working with Active Directory User Accounts |
|
|
78 | (28) |
|
Built-In Users Created in Active Directory |
|
|
79 | (1) |
|
Username and Password Rules and Conventions |
|
|
80 | (2) |
|
Usernames and Security Identifiers |
|
|
82 | (1) |
|
Creating Active Directory Users |
|
|
82 | (4) |
|
Disabling or Deleting User Accounts |
|
|
86 | (1) |
|
|
87 | (1) |
|
Changing a User's Password |
|
|
88 | (1) |
|
Managing Active Directory User Properties |
|
|
89 | (15) |
|
|
104 | (1) |
|
Troubleshooting User Authentication |
|
|
105 | (1) |
|
Working with Active Directory Group Accounts |
|
|
106 | (11) |
|
Understanding Group Scope and Group Type |
|
|
106 | (1) |
|
Default Groups Created in Windows 2003 Domain |
|
|
107 | (6) |
|
|
113 | (1) |
|
Managing Group Properties |
|
|
114 | (2) |
|
Identifying Group Membership |
|
|
116 | (1) |
|
Working with Computer Accounts |
|
|
117 | (9) |
|
Creating Computer Accounts |
|
|
117 | (4) |
|
Managing Computer Properties |
|
|
121 | (3) |
|
Resetting Computer Accounts |
|
|
124 | (1) |
|
Troubleshooting Computer Accounts |
|
|
125 | (1) |
|
Advanced User, Group, and Computer Management |
|
|
126 | (6) |
|
Locating Objects within the Active Directory |
|
|
126 | (2) |
|
Moving Objects within the Active Directory |
|
|
128 | (2) |
|
Creating Users, Groups, and Computers through Automation |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (5) |
|
Answers to Review Questions |
|
|
139 | (2) |
|
System Recovery and Web Services |
|
|
141 | (54) |
|
Safeguarding Your Computer and Recovering from Disaster |
|
|
142 | (1) |
|
|
143 | (20) |
|
|
144 | (4) |
|
Managing System State Data |
|
|
148 | (3) |
|
Configuring Backup Options |
|
|
151 | (4) |
|
Using Automated System Recovery |
|
|
155 | (2) |
|
|
157 | (6) |
|
|
163 | (22) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (2) |
|
Configuring and Administering IIS |
|
|
167 | (16) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (6) |
|
Answers to Review Questions |
|
|
193 | (2) |
|
Managing Windows Server 2003 Remotely |
|
|
195 | (54) |
|
Understanding Terminal Services |
|
|
196 | (5) |
|
|
197 | (1) |
|
Benefits of Terminal Services |
|
|
198 | (2) |
|
Terminal Services Improvements and Enhancements for Windows Server 2003 |
|
|
200 | (1) |
|
Terminal Services Components |
|
|
201 | (1) |
|
Planning the Terminal Services Configuration |
|
|
201 | (2) |
|
Determining Client Applications |
|
|
202 | (1) |
|
Determining Hardware Requirements |
|
|
202 | (1) |
|
Installing Terminal Services Server |
|
|
203 | (3) |
|
Using the Terminal Services Configuration Utility |
|
|
206 | (13) |
|
Configuring and Managing Terminal Services Connections |
|
|
206 | (9) |
|
|
215 | (1) |
|
Managing Terminal Services Users |
|
|
216 | (3) |
|
Using the Terminal Services Manager Utility |
|
|
219 | (1) |
|
Using Terminal Services Licensing |
|
|
220 | (5) |
|
Running Applications on the Terminal Services Server |
|
|
225 | (1) |
|
|
225 | (1) |
|
Configuring Application Sharing |
|
|
225 | (1) |
|
Troubleshooting Terminal Services |
|
|
226 | (2) |
|
Using Remote Desktop and Remote Assistance for Administration |
|
|
228 | (13) |
|
|
228 | (7) |
|
|
235 | (6) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (4) |
|
Answers to Review Questions |
|
|
247 | (2) |
|
Installing and Managing Domain Name Service (DNS) |
|
|
249 | (58) |
|
|
250 | (17) |
|
|
251 | (2) |
|
Servers, Clients, and Resolvers |
|
|
253 | (1) |
|
DNS and Windows Server 2003 |
|
|
254 | (1) |
|
|
255 | (12) |
|
Installing and Configuring a DNS Server |
|
|
267 | (16) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
269 | (4) |
|
|
273 | (5) |
|
Configuring Zones for Dynamic Updates |
|
|
278 | (1) |
|
|
279 | (1) |
|
Manually Creating DNS Records |
|
|
280 | (3) |
|
Monitoring and Troubleshooting DNS |
|
|
283 | (11) |
|
Monitoring DNS with the DNS Snap-in |
|
|
283 | (2) |
|
Monitoring DNS Servers with System Monitor |
|
|
285 | (1) |
|
Monitoring DNS Events in the Event Viewer |
|
|
286 | (1) |
|
Monitoring DNS in Replication Monitor |
|
|
287 | (2) |
|
|
289 | (5) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
297 | (6) |
|
Answers to Review Questions |
|
|
303 | (4) |
|
Administering Security Policy |
|
|
307 | (50) |
|
An Overview of User and Group Accounts |
|
|
308 | (2) |
|
|
308 | (2) |
|
|
310 | (1) |
|
Security Policy Types and Tools |
|
|
310 | (21) |
|
Group Policies within Active Directory |
|
|
311 | (7) |
|
Administering Local Computer Policy |
|
|
318 | (1) |
|
Configuring Security Settings |
|
|
319 | (12) |
|
Administering the Local Computer's System Policies |
|
|
331 | (5) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
Windows File Protection Policies |
|
|
335 | (1) |
|
Analyzing Security Configurations with the Security Configuration and Analysis Tool |
|
|
336 | (7) |
|
Specifying a Security Database |
|
|
337 | (1) |
|
Importing a Security Template |
|
|
337 | (3) |
|
Performing a Security Analysis |
|
|
340 | (1) |
|
Reviewing the Security Analysis and Resolving Discrepancies |
|
|
340 | (3) |
|
Managing Windows Server 2003 Services |
|
|
343 | (4) |
|
Configuring General Service Properties |
|
|
343 | (1) |
|
Configuring Service Log On Properties |
|
|
344 | (1) |
|
Configuring Service Recovery Properties |
|
|
345 | (1) |
|
Checking Service Dependencies |
|
|
345 | (2) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (6) |
|
Answers to Review Questions |
|
|
355 | (2) |
|
Part II MCSE Upgrade Exam |
|
|
357 | (426) |
|
Planning and Implementing Server Roles |
|
|
359 | (24) |
|
|
360 | (10) |
|
Using the Configure Your Server Wizard |
|
|
365 | (3) |
|
Using the Manage Your Server Tool |
|
|
368 | (2) |
|
Planning a Security Update Infrastructure |
|
|
370 | (5) |
|
Using Microsoft Software Update Services |
|
|
371 | (2) |
|
Using Microsoft Baseline Security Analyzer |
|
|
373 | (2) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (4) |
|
Answers to Review Questions |
|
|
381 | (2) |
|
Planning the Domain Name Service (DNS) |
|
|
383 | (34) |
|
|
384 | (3) |
|
|
385 | (2) |
|
|
387 | (7) |
|
Selecting the Appropriate Zone Type |
|
|
387 | (1) |
|
Selecting the Zone Data Location |
|
|
388 | (1) |
|
|
389 | (3) |
|
|
392 | (2) |
|
Planning DNS Zone Replication and Delegation |
|
|
394 | (5) |
|
|
395 | (1) |
|
Zone Transfers and Replication |
|
|
395 | (2) |
|
|
397 | (1) |
|
|
397 | (2) |
|
Planning DNS Caching and Forwarding |
|
|
399 | (3) |
|
Planning Caching-Only Servers |
|
|
399 | (1) |
|
|
400 | (1) |
|
Planning Conditional Forwarders |
|
|
400 | (2) |
|
Planning Forward-Only Servers |
|
|
402 | (1) |
|
Planning DNS Server Resources |
|
|
402 | (4) |
|
Planning General DNS Server Requirements |
|
|
403 | (1) |
|
Planning for Server Capacity |
|
|
403 | (1) |
|
|
404 | (2) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (6) |
|
Answers to Review Questions |
|
|
414 | (3) |
|
Planning, Implementing, and Maintaining Server Availability |
|
|
417 | (44) |
|
Evaluating Availability and Scalability Solutions |
|
|
418 | (4) |
|
Identifying Threats to High Availability |
|
|
420 | (1) |
|
Evaluating Scalability Methods |
|
|
421 | (1) |
|
Evaluating Clustering Technologies |
|
|
421 | (1) |
|
|
422 | (18) |
|
Understanding the Terminology |
|
|
423 | (1) |
|
Analyzing Business and Application Requirements |
|
|
424 | (1) |
|
Evaluating Application Deployment Considerations |
|
|
425 | (8) |
|
Determining the Cluster Model |
|
|
433 | (3) |
|
Planning Multisite Clusters |
|
|
436 | (2) |
|
|
438 | (2) |
|
Planning Network Load Balancing |
|
|
440 | (6) |
|
|
442 | (4) |
|
Administering NLB Remotely |
|
|
446 | (1) |
|
Recovering from Cluster Node Failure |
|
|
446 | (4) |
|
|
446 | (1) |
|
Recovering from Cluster Failure |
|
|
447 | (3) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
452 | (7) |
|
Answers to Review Questions |
|
|
459 | (2) |
|
Planning Network Security |
|
|
461 | (68) |
|
|
462 | (17) |
|
|
464 | (13) |
|
|
477 | (1) |
|
Planning an IPSec Deployment |
|
|
477 | (2) |
|
|
479 | (30) |
|
Using the IP Security Policy Management Console |
|
|
480 | (3) |
|
|
483 | (6) |
|
Configuring IPSec Policies |
|
|
489 | (12) |
|
Configuring IPSec for Tunnel Mode |
|
|
501 | (8) |
|
Planning Secure Remote Administration Methods |
|
|
509 | (8) |
|
Planning to Remotely Administer Computers with Remote Desktop for Administration |
|
|
509 | (3) |
|
Planning to Offer Remote Assistance to Client Computers |
|
|
512 | (5) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (6) |
|
Answers to Review Questions |
|
|
526 | (3) |
|
Planning, Implementing, and Maintaining Certificate Services |
|
|
529 | (70) |
|
Understanding the Public Key Infrastructure |
|
|
531 | (15) |
|
|
532 | (3) |
|
|
535 | (6) |
|
|
541 | (5) |
|
Planning and Managing the Certificate Server |
|
|
546 | (27) |
|
Installing Microsoft Certificate Server |
|
|
546 | (6) |
|
Controlling the CA Service |
|
|
552 | (4) |
|
|
556 | (9) |
|
Configuring Revocation and Trust |
|
|
565 | (8) |
|
|
573 | (14) |
|
Introducing the Certificates Snap-In |
|
|
573 | (1) |
|
Viewing and Changing Certificate Properties |
|
|
574 | (4) |
|
Requesting New Certificates |
|
|
578 | (4) |
|
Rekeying an Existing Certificate |
|
|
582 | (1) |
|
|
582 | (1) |
|
Importing, Exporting, and Locating Certificates |
|
|
583 | (4) |
|
|
587 | (1) |
|
|
588 | (2) |
|
|
590 | (1) |
|
|
591 | (5) |
|
Answers to Review Questions |
|
|
596 | (3) |
|
Planning and Implementing Domains, Trees, and Forests |
|
|
599 | (68) |
|
Preparing for Active Directory Installation |
|
|
601 | (9) |
|
Planning and Installing DNS |
|
|
601 | (3) |
|
Verifying the File System |
|
|
604 | (1) |
|
Verifying Network Connectivity |
|
|
605 | (2) |
|
Determining the Domain Functional Level |
|
|
607 | (2) |
|
Planning the Domain Structure |
|
|
609 | (1) |
|
Installing the Active Directory |
|
|
610 | (5) |
|
Verifying the Active Directory Installation |
|
|
615 | (6) |
|
|
615 | (3) |
|
Using the Active Directory Administrative Tools |
|
|
618 | (1) |
|
|
618 | (3) |
|
Creating and Configuring Application Data Partitions |
|
|
621 | (5) |
|
Creating Application Data Partitions |
|
|
621 | (2) |
|
|
623 | (1) |
|
|
624 | (1) |
|
Using ntdsutil to Manage Application Data Partitions |
|
|
624 | (2) |
|
Reasons for Creating Multiple Domains |
|
|
626 | (3) |
|
Reasons for Using Multiple Domains |
|
|
626 | (2) |
|
Drawbacks of Multiple Domains |
|
|
628 | (1) |
|
Creating Domain Trees and Forests |
|
|
629 | (17) |
|
Planning Trees and Forests |
|
|
629 | (4) |
|
|
633 | (1) |
|
|
633 | (7) |
|
Joining a New Domain Tree to a Forest |
|
|
640 | (4) |
|
Adding Additional Domain Controllers |
|
|
644 | (2) |
|
Demoting a Domain Controller |
|
|
646 | (2) |
|
Managing Multiple Domains |
|
|
648 | (8) |
|
|
648 | (6) |
|
|
654 | (1) |
|
Managing Global Catalog Servers |
|
|
654 | (2) |
|
|
656 | (1) |
|
|
657 | (2) |
|
|
659 | (1) |
|
|
660 | (4) |
|
Answers to Review Questions |
|
|
664 | (3) |
|
Managing and Maintaining the Active Directory |
|
|
667 | (44) |
|
Active Directory Security Overview |
|
|
668 | (8) |
|
Understanding Security Principals |
|
|
669 | (4) |
|
Managing Security and Permissions |
|
|
673 | (2) |
|
|
675 | (1) |
|
Using Group Policy for Security |
|
|
676 | (4) |
|
Understanding Smart Card Authentication |
|
|
680 | (3) |
|
Preparing a Smart Card Certificate Enrollment Station |
|
|
681 | (2) |
|
Backup and Recovery of the Active Directory |
|
|
683 | (18) |
|
Overview of the Windows Server 2003 Backup Utility |
|
|
685 | (4) |
|
Backing Up the Active Directory |
|
|
689 | (3) |
|
Restoring the Active Directory |
|
|
692 | (9) |
|
|
701 | (1) |
|
|
702 | (1) |
|
|
703 | (1) |
|
|
704 | (5) |
|
Answers to Review Questions |
|
|
709 | (2) |
|
Planning, Implementing, and Managing Group Policy |
|
|
711 | (72) |
|
Planning a Group Policy Strategy |
|
|
713 | (1) |
|
Implementing Group Policy |
|
|
713 | (9) |
|
|
714 | (5) |
|
Linking GPOs to the Active Directory |
|
|
719 | (1) |
|
Using Administrative Templates |
|
|
720 | (2) |
|
|
722 | (14) |
|
|
722 | (1) |
|
|
723 | (3) |
|
Delegating Administrative Control of GPOs |
|
|
726 | (1) |
|
Controlling Inheritance and Filtering Group Policy |
|
|
727 | (2) |
|
Assigning Script Policies |
|
|
729 | (2) |
|
Managing Network Configuration |
|
|
731 | (1) |
|
Automatically Enrolling User and Computer Certificates in Group Policy |
|
|
732 | (2) |
|
Redirecting Folders Using Group Policy |
|
|
734 | (2) |
|
Troubleshooting Group Policy |
|
|
736 | (10) |
|
|
737 | (7) |
|
|
744 | (1) |
|
Using the gpresult.exe Command |
|
|
744 | (2) |
|
Overview of Software Deployment |
|
|
746 | (6) |
|
The Software Management Life Cycle |
|
|
746 | (1) |
|
|
747 | (4) |
|
|
751 | (1) |
|
Implementing Software Deployment |
|
|
752 | (11) |
|
Preparing for Software Deployment |
|
|
752 | (2) |
|
Publishing and Assigning Applications |
|
|
754 | (3) |
|
Applying Software Updates |
|
|
757 | (2) |
|
Verifying Software Installation |
|
|
759 | (1) |
|
Configuring Automatic Updates in Group Policy |
|
|
759 | (4) |
|
Configuring Software Deployment Settings |
|
|
763 | (5) |
|
The Software Installation Properties Dialog Box |
|
|
763 | (3) |
|
|
766 | (1) |
|
Windows Installer Settings |
|
|
767 | (1) |
|
Optimizing and Troubleshooting Software Deployment |
|
|
768 | (4) |
|
|
772 | (1) |
|
|
772 | (2) |
|
|
774 | (1) |
|
|
775 | (6) |
|
Answers to Review Questions |
|
|
781 | (2) |
Glossary |
|
783 | (26) |
Index |
|
809 | |