Windows Server 2008 R2 Unleashed
Inbunden, Engelska, 2010
Av Rand Morimoto, Michael Noel, Omar Droubi, Ross Mistry, Chris Amaris
1 039 kr
Produktinformation
- Utgivningsdatum2010-02-04
- Mått180 x 240 x 60 mm
- Vikt2 215 g
- FormatInbunden
- SpråkEngelska
- SerieUnleashed
- FörlagPearson Education (US)
- ISBN9780672330926
Tillhör följande kategorier
Rand H. Morimoto, Ph.D., MVP, MCITP, CISSP, has been in the computer industry for over 30 years and has authored, coauthored, or been a contributing writer for dozens of books on Windows, Security, Exchange, BizTalk, and Remote and Mobile Computing. Rand is the president of Convergent Computing, an IT-consulting firm in the San Francisco Bay area that has been one of the key early adopter program partners with Microsoft, implementing beta versions of Microsoft Windows Server 2008 R2, Windows 7, Exchange Server 2010, and SharePoint 2010 in production environments over 18 months before the initial product releases. Michael Noel, MCITP, CISSP, MVP, is an internationally recognized technology expert, best-selling author, and well-known public speaker on a broad range of IT topics. He authored multiple major industry books that have been translated into more than a dozen languages worldwide. Significant titles include SharePoint 2010 Unleashed, Microsoft Exchange Server 2010 Unleashed, SharePoint 2007 Unleashed, Exchange Server 2007 Unleashed, ISA Server 2006 Unleashed, and many more. Currently a partner at Convergent Computing (www.cco.com) in the San Francisco Bay area, Michael’s writing and extensive public speaking experience across six continents leverage his real-world expertise in helping organizations realize business value from Information Technology infrastructure. Omar Droubi, MCSE, has been in the computer industry since 1992 and during this time has coauthored several of Sams Publishing best-selling books, including Microsoft Windows Server 2003 Unleashed and Windows Server 2008 Unleashed, and Omar has been a contributing writer and technical reviewer on several other books on Windows Server 2003, Windows Server 2008, and Exchange Server 2000, 2003, and 2007. Omar has been involved in testing, designing, and prototyping Windows Server 2008 and Windows Server 2008 R2 infrastructures for the past four years, and has primarily focused on upgrading existing networks and utilizing many of the new roles and features included in the product. Also during this time, Omar has assisted several organizations with the development of technical road maps, planning and executing domain and server consolidation and virtualization projects, and deploying Exchange Server 2007 for organizations of all sizes. Ross Mistry, MVP, MCITP, is a principal consultant and partner at Convergent Computing, an author, and a Microsoft MVP. With over a decade of experience, Ross focuses on designing and implementing Windows, Active Directory, Hyper-V, Exchange Server, and SQL Server solutions for Fortune 500 organizations located in the Silicon Valley. His specialties include upgrades, migrations, high availability, security, and virtualization. Ross has also taken on the roles of lead author, contributing writer, and technical editor for many best-selling books published by Sams. His recent works include SQL Server 2008 Management and Administration, Exchange Server 2010 Unleashed, and Windows Server 2008 Unleashed. Ross writes technical articles for many sites including TechTarget.com and frequently speaks at international conferences around the world. Chris Amaris, MCSE, CISSP/ISSAP, CHS III, is the chief technology officer and cofounder of Convergent Computing. He has more than 20 years experience consulting for Fortune 500 companies, leading companies in the technology selection, design, planning, and implementation of complex Information Technology projects. Chris has worked with Microsoft Windows since version 1.0 in 1985. He specializes in messaging, security, performance tuning, systems management, and migration. A Certified Information Systems Security Professional (CISSP) with an Information System Security Architecture Professional (ISSAP) concentration, Certified Homeland Security (CHS III), Windows 2003 MCSE, Novell CNE, Banyan CBE, and a Certified Project Manager, Chris is also an author, writer, and technical editor for a number of IT books, including Network Security for Government and Corporate Executives, Microsoft Exchange Server 2010 Unleashed, and Microsoft Operations Manager 2005 Unleashed. Chris presents on messaging, operations management, security, and Information Technology topics worldwide.
- Introduction 1 Part I Windows Server 2008 R2 OverviewChapter 1 Windows Server 2008 R2 Technology Primer 5Windows Server 2008 R2 Defined 5When Is the Right Time to Migrate? 10Versions of Windows Server 2008 R2 12What’s New and What’s the Same About Windows Server 2008 R2? 16Changes in Active Directory 20Windows Server 2008 R2 Benefits for Administration 22Improvements in Security in Windows Server 2008 R2 26Improvements in Mobile Computing in Windows Server 2008 R2 28Improvements in Windows Server 2008 R2 for Better Branch Office Support 30Improvements for Thin Client Remote Desktop Services 33Improvements in Clustering and Storage Area Network Support 37Addition of Migration Tools 38Improvements in Server Roles in Windows Server 2008 R2 40Identifying Which Windows Server 2008 R2 Service to Install or Migrate to First 43Summary 46Best Practices 47 Chapter 2 Planning, Prototyping, Migrating, and Deploying Windows Server 2008 R2 Best Practices 49Determining the Scope of Your Project 50Identifying the Business Goals and Objectives to Implement Windows Server 2008 R2 50Identifying the Technical Goals and Objectives to Implement Windows Server 2008 R2 53The Discovery Phase: Understanding the Existing Environment 59The Design Phase: Documenting the Vision and the Plan 3The Migration Planning Phase: Documenting the Process for Migration 67The Prototype Phase: Creating and Testing the Plan 73The Pilot Phase: Validating the Plan to a Limited Number of Users 75The Migration/Implementation Phase: Conducting the Migration or Installation 78Summary 79Best Practices 80 Chapter 3 Installing Windows Server 2008 R2 and Server Core 83Preplanning and Preparing a Server Installation .83Installing a Clean Version of Windows Server 2008 R2 Operating System 89Upgrading to Windows Server 2008 R2 98Understanding Server Core Installation 103Managing and Configuring a Server Core Installation 105Performing an Unattended Windows Server 2008 R2 Installation 111Summary 111Best Practices 112 Part II Windows Server 2008 R2 Active DirectoryChapter 4 Active Directory Domain Services Primer 113Examining the Evolution of Directory Services .114Understanding the Development of AD DS 115Examining AD DS’s Structure 116Outlining AD DS’s Components 119Understanding Domain Trusts 124Defining Organizational Units 126Outlining the Role of Groups in an AD DS Environment 127Explaining AD DS Replication 129Outlining the Role of DNS in AD DS 131Outlining AD DS Security 133Outlining AD DS Changes in Windows Server 2008 R2 134Summary 146Best Practices 146 Chapter 5 Designing a Windows Server 2008 R2 Active Directory 149Understanding AD DS Domain Design 149Choosing a Domain Namespace 151Examining Domain Design Features 153Choosing a Domain Structure 154Understanding the Single Domain Model 155Understanding the Multiple Domain Model 157Understanding the Multiple Trees in a Single Forest Model 160Understanding the Federated Forests Design Model 162Understanding the Empty-Root Domain Model 165Understanding the Placeholder Domain Model 167Understanding the Special-Purpose Domain Design Model 169Renaming an AD DS Domain 170Summary 173Best Practices 173 Chapter 6 Designing Organizational Unit and Group Structure 175Defining Organizational Units in AD DS 176Defining AD Groups 178Examining OU and Group Design 182Starting an OU Design 182Using OUs to Delegate Administration 184Group Policies and OU Design 186Understanding Group Design 186Exploring Sample Design Models 188Summary 193Best Practices 193 Chapter 7 Active Directory Infrastructure 195Understanding AD DS Replication in Depth 195Understanding Active Directory Sites 200Planning Replication Topology 207Outlining Windows Server 2008 R2 IPv6 Support 213Detailing Real-World Replication Designs 216Deploying Read-Only Domain Controllers (RODCs) 220Summary 224Best Practices 225 Chapter 8 Creating Federated Forests and Lightweight Directories 227Keeping a Distributed Environment in Sync 227Active Directory Federation Services 232Synchronizing Directory Information with Forefront Identity Manager (FIM) 236Harnessing the Power and Potential of FIM 240Summary 243Best Practices 243 Chapter 9 Integrating Active Directory in a UNIX Environment 245Understanding and Using Windows Server 2008 R2 UNIX Integration Components 245Reviewing the Subsystem for UNIX-Based Applications (SUA) 252Understanding the Identity Management for UNIX Components 253Administrative Improvements with Windows Server 2008 R2 256Summary 258Best Practices 258 Part III Networking ServicesChapter 10 Domain Name System and IPv6 259Understanding the Need for DNS 260Getting Started with DNS on Windows Server 2008 R2 263Resource Records 266Understanding DNS Zones 270Performing Zone Transfers 274Understanding DNS Queries 276Other DNS Components 278Understanding the Evolution of Microsoft DNS 285DNS in Windows Server 2008 R2 286DNS in an Active Directory Domain Services Environment 288Troubleshooting DNS 292IPv6 Introduction 297How to Configure IPv6 on Windows Server 2008 R2 311Secure DNS with DNSSEC 316Summary 323Best Practices 323 Chapter 11 DHCP/WINS/Domain Controllers 325Understanding the Key Components of an Enterprise Network 326Exploring the Dynamic Host Configuration Protocol (DHCP) 328Exploring DHCP Changes in Windows Server 2008 R2 336Enhancing DHCP Reliability .345Implementing Redundant DHCP Services 350Exploring Advanced DHCP Concepts 358Securing DHCP 359Reviewing the Windows Internet Naming Service (WINS) 361Installing and Configuring WINS 364Planning, Migrating, and Maintaining WINS 368Exploring Global Catalog Domain Controller Placement 370Summary 374Best Practices 374 Chapter 12 Internet Information Services 377Understanding Internet Information Services (IIS) 7.5 377Planning and Designing Internet Information Services 7.5 382Installing and Upgrading IIS 7.5 383Installing and Configuring Websites 389Installing and Configuring FTP Services 397Securing Internet Information Services 7.5 407Summary 416Best Practices 417 Part IV SecurityChapter 13 Server-Level Security 419Defining Windows Server 2008 R2 Security 419Deploying Physical Security 420Using the Integrated Windows Firewall with Advanced Security 424Hardening Server Security 427Examining File-Level Security 429Additional Security Mechanisms 433Using Windows Server Update Services 434Summary 440Best Practices 440 Chapter 14 Transport-Level Security 441Introduction to Transport-Level Security in Windows Server 2008 R2 442Deploying a Public Key Infrastructure with Windows Server 2008 R2 443Understanding Active Directory Certificate Services (AD CS) in Windows Server 2008 R2 444Active Directory Rights Management Services 451Using IPSec Encryption with Windows Server 2008 R2 454Summary 456Best Practices 456 Chapter 15 Security Policies, Network Policy Server, and Network Access Protection 459Understanding Network Access Protection (NAP) in Windows Server 2008 R2 459Deploying a Windows Server 2008 R2 Network Policy Server 462Enforcing Policy Settings with a Network Policy Server 465Deploying and Enforcing a Virtual Private Network (VPN) Using an RRAS Server 473Summary 480Best Practices 481 Part V Migrating to Windows Server 2008 R2Chapter 16 Migrating from Windows Server 2003/2008 to Windows Server 2008 R2 483Beginning the Migration Process 484Big Bang Migration 487Phased Migration 491Multiple Domain Consolidation Migration 505Summary 522Best Practices 523 Chapter 17 Compatibility Testing 525The Importance of Compatibility Testing 526Preparing for Compatibility Testing 527Researching Products and Applications 534Verifying Compatibility with Vendors 537Microsoft Assessment and Planning (MAP) Toolkit 542Lab-Testing Existing Applications 543Documenting the Results of the Compatibility Testing 546Determining Whether a Prototype Phase Is Required 546Summary 547Best Practices 548 Part VI Windows Server 2008 R2 Administration and ManagementChapter 18 Windows Server 2008 R2 Administration 549Defining the Administrative Model 550Examining Active Directory Site Administration 551Configuring Sites 554Examining Windows Server 2008 R2 Active Directory Groups 562Creating Groups 564Managing Users with Local Security and Group Policies 568Managing Printers with the Print Management Console 576Summary 582Best Practices 583 Chapter 19 Windows Server 2008 R2 Group Policies and Policy Management 585Group Policy Overview 585Group Policy Processing--How Does It Work? 586Local Group Policies 588Security Templates 590Elements of Group Policy 591Group Policy Administrative Templates Explained 603Policy Management Tools 607Designing a Group Policy Infrastructure 616GPO Administrative Tasks 619Summary 637Best Practices 637 Chapter 20 Windows Server 2008 R2 Management and Maintenance Practices 639Going Green with Windows Server 2008 R2 640Initial Configuration Tasks 641Managing Windows Server 2008 R2 Roles and Features 643Server Manager 647Server Manager Diagnostics Page 652Server Manager Configuration Page 657Server Manager Storage Page 661Auditing the Environment 665Managing Windows Server 2008 R2 Remotely 674Using Common Practices for Securing and Managing Windows Server 2008 R2 679Keeping Up with Service Packs and Updates 681Maintaining Windows Server 2008 R2 685Summary 696Best Practices 696 Chapter 21 Automating Tasks Using PowerShell Scripting 699Understanding Shells 700Introduction to PowerShell 702Understanding the PowerShell Basics 705Using Windows PowerShell 732Summary 762Best Practices 762 Chapter 22 Documenting a Windows Server 2008 R2 Environment 763Benefits of Documentation 764Types of Documents 765Planning to Document the Windows Server 2008 R2 Environment 766Knowledge Sharing and Knowledge Management 766Windows Server 2008 R2 Project Documents 767Administration and Maintenance Documents 780Network Infrastructure 784Disaster Recovery Documentation 785Change Management Procedures 788Performance Documentation 788Baselining Records for Documentation Comparisons 789Routine Reporting 789Security Documentation 790Summary 791Best Practices 791 Chapter 23 Integrating System Center Operations Manager 2007 R2 with Windows Server 2008 R2 793Windows Server 2008 R2 Monitoring 794What’s New in OpsMgr R2 796Explaining How OpsMgr Works 796Outlining OpsMgr Architecture 798Understanding How to Use OpsMgr 802Understanding OpsMgr Component Requirements 805Understanding Advanced OpsMgr Concepts 807Securing OpsMgr 811Installing Operations Manager 2007 R2 814Configuring Operations Manager 2007 R2 822Monitoring DMZ Servers with Certificates 831Using Operations Manager 2007 R2 837Summary 846Best Practices 846 Part VII Remote and Mobile TechnologiesChapter 24 Server-to-Client Remote Access and DirectAccess 849VPN in Windows Server 2008 R2 850Authentication Options to an RRAS System 856VPN Protocols 858DirectAccess in Windows Server 2008 R2 863Choosing Between Traditional VPN Technologies and DirectAccess 873Traditional VPN Scenario 876DirectAccess Scenario 898Connection Manager .916Summary 919Best Practices 919 Chapter 25 Remote Desktop Services 921Why Implement Remote Desktop Services 922How Remote Desktop Works 925Understanding the Name Change 928Understanding Remote Desktop Services 928Planning for Remote Desktop Services 947Deploying Remote Desktop Services 953Securing Remote Desktop Services 979Supporting Remote Desktop Services 981Summary 984Best Practices 985 Part VIII Desktop AdministrationChapter 26 Windows Server 2008 R2 Administration Tools for Desktops 987Managing Desktops and Servers 988Operating System Deployment Options 989Windows Server 2008 R2 Windows Deployment Services 991Installing Windows Deployment Services (WDS) 994Creating Discover Images 1005Creating Custom Installations Using Capture Images 1016General Desktop Administration Tasks 1020Summary 1021Best Practices 1021 Chapter 27 Group Policy Management for Network Clients 1023The Need for Group Policies 1024Windows Group Policies 1025Group Policy Feature Set 1028Planning Workgroup and Standalone Local Group Policy Configuration 1033Planning Domain Group Policy Objects 1036Managing Computers with Domain Policies 1045Managing Users with Policies 1070Managing Active Directory with Policies 1076Summary 1095Best Practices 1096 Part IX Fault-Tolerance TechnologiesChapter 28 File System Management and Fault Tolerance 1097Windows Server 2008 R2 File System Overview/Technologies 1097File System Access Services and Technologies 1102Windows Server 2008 R2 Disks 1105Utilizing External Disk Subsystems 1109Managing Windows Server 2008 R2 Disks 1109System File Reliability 1118Adding the File Services Role 1120Managing Data Access Using Windows Server 2008 R2 Shares 1122Volume-Based NTFS Quota Management 1128File Server Resource Manager (FSRM) 1130The Distributed File System 1147Planning a DFS Deployment 1152Installing DFS 1155Managing and Troubleshooting DFS 1163Backing Up DFS 1166Using the Volume Shadow Copy Service 1167Summary 1170Best Practices 1170 Chapter 29 System-Level Fault Tolerance (Clustering/Network Load Balancing) 1173Building Fault-Tolerant Windows Server 2008 R2 Systems 1174Windows Server 2008 R2 Clustering Technologies 1177Determining the Correct Clustering Technology 1182Overview of Failover Clusters 1184Deploying Failover Clusters 1191Backing Up and Restoring Failover Clusters 1211Deploying Network Load Balancing Clusters 1215Managing NLB Clusters 1223Summary 1225Best Practices 1225 Chapter 30 Backing Up the Windows Server 2008 R2 Environment 1227Understanding Your Backup and Recovery Needs and Options .1228Creating the Disaster Recovery Solution 1232Documenting the Enterprise 1234Developing a Backup Strategy 1234Windows Server Backup Overview 1235Using Windows Server Backup 1239Managing Backups Using the Command-Line Utility wbadmin.exe and PowerShell Cmdlets 1246Backing Up Windows Server 2008 R2 Role Services 1248Volume Shadow Copy Service (VSS) 1262Windows Server 2008 R2 Startup Options 1264Summary 1265Best Practices 1265 Chapter 31 Recovering from a Disaster 1267Ongoing Backup and Recovery Preparedness 1267When Disasters Strike 1271Disaster Scenario Troubleshooting 1274Recovering from a Server or System Failure 1277Managing and Accessing Windows Server Backup Media 1285Windows Server Backup Volume Recovery 1287Recovering Role Services and Features 1291Summary 1302Best Practices 1302 Part X Optimizing, Tuning, Debugging, and Problem SolvingChapter 32 Optimizing Windows Server 2008 R2 for Branch Office Communications 1305Understanding Read-Only Domain Controllers (RODCs) 1306Installing a Read-Only Domain Controller 1310Understanding BitLocker Drive Encryption 1323Configuring BitLocker Drive Encryption on a Windows Server 2008 R2 Branch Office Domain Controller 1326Understanding and Deploying BranchCache 1333Enhancing Replication and WAN Utilization at the Branch Office 1339Summary 1342Best Practices 1342 Chapter 33 Logging and Debugging 1345Using the Task Manager for Logging and Debugging 1345Using Event Viewer for Logging and Debugging 1350Performance and Reliability Monitoring 1359Setting Baseline Values 1369Using the Debugging Tools Available in Windows Server 2008 R2 1371Task Scheduler 1382Summary 1388Best Practices 1389 Chapter 34 Capacity Analysis and Performance Optimization 1391Defining Capacity Analysis 1391Using Capacity-Analysis Tools 1395Monitoring System Performance 1415Optimizing Performance by Server Roles 1423Summary 1430Best Practices 1430 Part XI Integrated Windows Application ServicesChapter 35 Windows SharePoint Services 1433Understanding the History of SharePoint Technologies 1434What Are the Differences Between Windows SharePoint Services 3.0 and SharePoint Server 2007? 1436Identifying the Need for Windows SharePoint Services 1439Installing Windows SharePoint Services 1440Lists and Libraries in Windows SharePoint Services 3.0 1453Integrating Office 2007 Applications with Windows SharePoint Services 3.0 1469Managing the Site Collection 1475Summary 1479Best Practices 1481 Chapter 36 Windows Media Services 1483Understanding Windows Media Services 1484Installing Windows Media Services 1489Using Windows Media Services for Real-Time Live Broadcasts 1492Broadcasting Stored Single Files 1495Hosting a Directory of Videos for On-Demand Playback 1498Combining Multiple Files for a Combined Single Broadcast 1501Understanding Windows Media Encoder 1504Broadcasting a Live Event 1506Capturing Audio or Video for Future Playback 1508Using Other Windows Media Encoder Options 1510Summary 1512Best Practices 1512 Chapter 37 Deploying and Using Windows Virtualization 1515Understanding Microsoft’s Virtualization Strategy 1515Integration of Hypervisor Technology in Windows Server 2008 1517Planning Your Implementation of Hyper-V 1519Installation of the Microsoft Hyper-V Role 1522Becoming Familiar with the Hyper-V Administrative Console 1524Installing a Guest Operating System Session 1529Modifying Guest Session Configuration Settings 1533Launching a Hyper-V Guest Session 1535Using Snapshots of Guest Operating System Sessions 1538Quick Migration and Live Migration 1540Summary 1550Best Practices 1551 Index 1553