Microsoft Windows 2000 Server Unleashed

by ; ; ;
Format: Paperback
Pub. Date: 2000-01-01
Publisher(s): Sams
Availability: This title is currently not available.
List Price: $49.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

Windows 2000 Server Unleashed is a hardcore reference for the networking professional who needs answers fast. Windows 2000 Server Unleashed shows you how your existing knowledge of Windows NT Server carries over to Windows 2000. Then learn how to better manage your corporate infrastructure, at the same time reducing the enormous expense of maintaining constant service to network users. Topics Include Windows 2000 storage management, Windows 2000 management services, Windows 2000 security services, managing the Active Directory, remote administration tools, interoperability with NetWare and Unix, and managing network security in Windows 2000.

Author Biography

Todd Brown, MCSE, is a senior consultant for Bell Industries. Chris Miller, MCSD, is the database administrator and systems engineer for the Internet services company GeoAccess. He was formerly a network administrator and project leader for a major telecommunications company.

Table of Contents

Introductionp. 1
Overviewp. 3
Windows 2000 Introductionp. 5
A Network Operating Systemp. 6
The Product Familyp. 9
Windows 2000 Operating System Environmentp. 19
Architecturep. 21
The Subsystem and Kernel Architecturep. 22
User Mode and Kernel Modep. 23
The Hardware Abstraction Layerp. 24
The Kernelp. 25
The Windows 2000 Executivep. 26
Subsystems: A Closer Lookp. 28
The Win32 Subsystemp. 30
The POSIX Subsystemp. 32
The OS/2 Subsystemp. 33
Memory Model and Managementp. 34
Installation Considerationsp. 39
System Requirementsp. 40
Hardware Compatibility Listp. 41
Installation Overviewp. 42
The Installation Processp. 45
Automated Installationp. 61
Installing the Recovery Consolep. 62
The BOOT. INI Filep. 65
The Emergency Repair Diskp. 66
Migration from Preexisting Systemsp. 66
Advanced Hardware Notesp. 67
Interruptsp. 67
EIDE Devicesp. 68
Windows Updatep. 68
Busses and Devicesp. 69
Summaryp. 69
File Systemsp. 71
Hardware Considerationsp. 72
Hard Disk Technologyp. 73
Hard Disk Controllersp. 75
Principles of SCSIp. 77
Advanced Controller Technologyp. 78
Hard Disk Partitionsp. 81
System Startupp. 81
Basic Disksp. 83
Dynamic Disksp. 84
Basic and Dynamic Disksp. 84
Using the Disk Management Applicationp. 86
Starting Disk Managementp. 87
Disk Propertiesp. 87
Volume or Partition Propertiesp. 88
Partition and Volume Managementp. 93
Working with Dynamic Disksp. 96
Setting Up Disk Quotasp. 96
File System Formatsp. 99
The FAT File Systemp. 100
NTFSp. 101
Working with Formatsp. 109
Recommendationsp. 110
Working with Volumesp. 111
Working with Simple Volumesp. 111
Spanned Volumesp. 112
Mirrored Volumesp. 112
Striped Volumesp. 114
RAID-5 Volumesp. 115
A Few Notes on Windows 2000 Volumesp. 115
Working with Network Sharesp. 116
Sharing Directoriesp. 116
Connecting to Shared Directoriesp. 120
DFS: The Distributed File Systemp. 121
DFS Conceptsp. 122
Setting Up DFSp. 122
Using DFSp. 123
Remote Storage Serverp. 123
Remote Storage Conceptsp. 124
Setting Up Remote Storagep. 124
Removable Storage Managementp. 124
Summaryp. 126
Networking Briefp. 127
Microsoft Networking Conceptsp. 128
Workgroups and Domainsp. 128
Active Directoryp. 138
Network Services Setupp. 140
Networks (Your LAN or WAN) Versus Networks (Segmentation)p. 140
Switched Segmentation (Collision Domain Segments)p. 142
Routed Segmentationp. 144
RRASp. 145
Remote Dial-Inp. 145
Multiprotocol Routingp. 146
Summaryp. 147
Printingp. 149
Printing Conceptsp. 150
Printersp. 150
Fontsp. 152
Print Driversp. 152
Communicating with Printersp. 153
The Life of a Print Jobp. 155
Creating Print Queuesp. 155
Using Print Managerp. 159
Managing Print Queuesp. 164
The Forms Tabp. 164
The Ports Tabp. 165
The Drivers Tabp. 166
The Advanced Tabp. 167
Troubleshootingp. 168
Diagnosing Client-to-Server Printing Communications Problemsp. 168
Diagnosing Print Quality Problemsp. 176
Know Your Printer's Limitationsp. 176
Know Your Printer's Specificationsp. 176
Know Your Driver Versionsp. 177
Matching everything Upp. 177
Summaryp. 178
The Registryp. 179
What Is the Registry?p. 180
The Structure of the Registryp. 181
The Classes Hivep. 181
The Users Hivep. 182
The Local Machine Hivep. 183
The Current Configuration Hivep. 185
How the Registry Is Used by Applicationsp. 185
Using the Registry Editorp. 187
When to Use Registry Editing Toolsp. 187
How to Use REGEDITp. 188
Finding Registry Changes Using REGEDITp. 191
How to Use REGEDT32p. 191
Using the Last Known Good Configurationp. 193
Summaryp. 193
TCP/IP Networkingp. 195
TCP/IP Concepts Briefp. 196
IP Addressingp. 196
Microsoft TCP/IPp. 205
Introduction to Microsoft TCP/IPp. 205
Installingp. 205
Routingp. 207
Dynamic Host Configuration Protocol (DHCP)p. 208
Windows Internet Name Servicep. 217
Dynamic Domain Name Server (DDNS)p. 220
Migrating from WINS to DNSp. 226
Multiple Address Assignment for One Cardp. 226
IP Securityp. 227
Summaryp. 227
Active Directory and Account Managementp. 229
Directory and Access Concepts Briefp. 231
Security Conceptp. 232
Kerberosp. 232
NTLMp. 237
ACLp. 239
Active Directory Controlp. 239
Workgroups and Domainsp. 239
Active Directory/Domain Objectsp. 251
Which Comes First: The Users or the Groups?p. 252
Creating Objectsp. 253
Controlling User Access to Resourcesp. 257
File Share Permissionsp. 257
Printer Permissionsp. 260
Summaryp. 261
Active Directory Designp. 263
Sites and Replicationp. 264
Sitesp. 265
Replicationp. 266
Site Creationp. 267
Design Standardsp. 269
Politicalp. 270
Geographicp. 271
Mixed Environmentp. 272
Organizational Unitsp. 272
Dynamic DNSp. 273
How Dynamic Update Worksp. 274
Secure Dynamic Updatep. 276
Summaryp. 276
User Account Creation and Managementp. 277
User Accountsp. 278
Predefined or Built-in Usersp. 278
Naming and Password Conventionsp. 280
User Creationp. 282
User Environment Needsp. 287
Hard Drive Spacep. 298
Groupsp. 300
Group Scopep. 300
Creating a New Groupp. 302
Predefined (Default) Groupsp. 302
Summaryp. 304
Intellimirror and User Controlp. 305
Nuts and Bolts of Intellimirrorp. 306
Control Conceptsp. 307
Profilesp. 308
Policies: A General Introductionp. 311
Managing Group Policiesp. 315
Creating and Assigningp. 315
Policy Modificationp. 319
Group Policy Administratorsp. 319
Windows Installerp. 320
WinInstallerp. 321
Delivery of the Packagep. 324
Remote Installation Servicesp. 325
Summaryp. 327
Network Servicesp. 329
Network Browsingp. 331
Understanding Network Browsing Conceptsp. 332
Browser Server Rolesp. 334
Browser Election Criteriap. 336
Election Processp. 337
Browsing Operationsp. 340
Browser Announcementsp. 342
Master Browserp. 343
Browse Listp. 344
Multiple Domain and WAN Considerationsp. 344
Browsing Failuresp. 349
Configuring a Windows 2000 Server to Never Be a Browserp. 350
Active Directory-Based Browsing Considerationsp. 352
Summaryp. 354
Remote Access (RAS)p. 355
Understanding the RRAS Servicep. 356
Protocol Supportp. 357
Transmission Control Protocol/Internet Protocol (TCP/IP)p. 357
AppleTalkp. 358
NWLink IPX/SPX/NetBIOS Compatible Transportp. 358
NetBIOS Extended User Interface (NetBEUI)p. 359
Remote Access Securityp. 359
Installing the RRAS Toolsp. 361
Remote Access Server Configurationsp. 362
Advanced Remote Access Server Configurationsp. 369
Routing Configurationsp. 389
Protocol Supportp. 399
Modem Considerationsp. 400
WAN Supportp. 400
Authenticationp. 401
Troubleshooting RASp. 402
Summaryp. 403
Multiprotocol Environmentsp. 405
Supported Protocols in Windows 2000p. 406
Installing New Protocolp. 406
Load Them All!p. 408
Connection Stylep. 409
TCP/IPp. 409
IPX/SPXp. 411
AppleTalkp. 414
NetBEUIp. 416
Routing and Remote Access Servicesp. 417
PPPp. 418
RIPp. 418
Troubleshootingp. 419
Summaryp. 420
Client Workstation Considerationsp. 421
Client Services Briefp. 422
Specific Client Operating System Considerationsp. 429
Novell NetWare Clientsp. 430
DOS, OS/2, Windows 3.x and Windows for Workgroupsp. 436
Macintoshp. 440
UNIX Connectivityp. 444
Summaryp. 447
Connectivityp. 449
NetWare Connectivityp. 451
Conceptual Differencesp. 452
Securityp. 452
Active Directory Versus NetWare Directory Servicesp. 453
File Sharesp. 455
Printingp. 456
Connectivity to NetWarep. 457
Gateway Service for NetWarep. 458
File and Print Services for NetWarep. 463
Directory Service Migration Toolp. 463
NDS for NT (by Novell)p. 469
Summaryp. 470
UNIX Host to Windows 2000 Server Connectivityp. 471
Conceptual Differences Between Windows 2000 Server and UNIX-Style Operating Systemsp. 472
User Accountsp. 472
Securityp. 473
Directory Servicesp. 474
Different Flavors of UNIXp. 475
Simple TCP/IP Toolsp. 476
Telnetp. 477
FTPp. 479
The Lesser-Known Utilitiesp. 482
Application Connectivityp. 484
XWindows and Windows 2000p. 484
Connecting to NFSp. 485
About Sambap. 486
Printing in a UNIX Worldp. 487
The Future: Microsoft and UNIXp. 488
Summaryp. 488
SNA Connectivity with BackOfficep. 489
Host Computing Briefp. 490
SNA Server Conceptsp. 491
Manageable Secure Connectivityp. 493
Routing and Distributing Connectionsp. 493
SNA Connectivity Optionsp. 495
LU Configurationp. 496
Summaryp. 497
Internet Applications, Communications, and Toolsp. 499
Internet Information Server (IIS)p. 501
Internet Information Server Conceptsp. 502
Before You Begin with IISp. 503
System Requirementsp. 503
Internet Connectivityp. 505
Installing IISp. 507
Administering and Configuring IISp. 511
Common IIS Controlsp. 511
Administering the FTP Sitep. 534
Advanced Web Site Administrationp. 535
Administering the Gopher Sitep. 538
Administering the Telnet Servicep. 539
Advanced Security Conceptsp. 539
Summaryp. 547
Other Internet Services for Windows 2000p. 549
Access Security and Speed with Proxy Serverp. 550
Acquisition and Cachingp. 550
Access Controlp. 551
Network Security: Firewallp. 553
Logging of Trafficp. 554
Exchange Email Serverp. 556
Robust General Emailp. 556
Public Foldersp. 557
Directory Structurep. 559
Internet Access and Receptionp. 559
FrontPagep. 564
Creating Web Sites, Not Just Web Pagesp. 565
Server Extensionsp. 567
Summaryp. 567
Virtual Private Networksp. 569
Making the Internet Your Own WANp. 570
What Is a Virtual Private Network?p. 571
Security and Encryptionp. 572
Tunnel Serversp. 573
VPN Tunnel Servers and Firewallsp. 574
Filtering Traffic with a Tunnel Serverp. 575
Microsoft Windows 2000 VPNp. 576
IPSecp. 577
Layer 2 Tunneling Protocolp. 577
Synchronous and Asynchronous Keysp. 578
L2TP and IPSecp. 579
Setting Up a Basic VPN in Windows 2000p. 579
Setting Up a Tunnel Server VPN with Windows 2000p. 582
RRAS Enhancementsp. 585
Summaryp. 586
Server Administrationp. 587
Server Managementp. 589
Microsoft Management Console (MMC)p. 590
Server Management Utilitiesp. 593
Event Viewerp. 594
System Informationp. 599
Device Managerp. 600
SNMPp. 603
Summaryp. 604
Optimizing Performance and Tuningp. 605
Windows 2000 Support Toolsp. 606
Automatic Optimizationp. 611
Avoiding Fragmentationp. 611
Multiprocessingp. 615
Prioritizing Processes and Threadsp. 616
Caching Disk Requestsp. 629
Stripe Sets and Virtual Memory Pagefilesp. 630
Striped Volumesp. 630
Optimizing Virtual Memory Pagesp. 636
Performance-Monitoring Utilityp. 641
Objects and Object Countersp. 644
Creating a Chartp. 649
Interpreting Chartsp. 652
Reports and Logsp. 655
Summaryp. 667
Server Backup Utilitiesp. 669
Windows 2000 Backup Utilityp. 670
Windows 2000 Server Backup Operator Permissionsp. 672
Backing Up Windows 2000p. 673
Attended Operationsp. 690
Unattended Operationsp. 691
Command-Line Backupp. 693
Restoring a Backupp. 694
Authoritative Restorep. 701
Restoring Encrypted Filesp. 702
Supported Backup Drive Devicesp. 703
Recovery Consolep. 703
Emergency Repair Diskp. 704
Third-Party Backup Toolsp. 705
Summaryp. 705
Recovering from a Disasterp. 707
Have a Plan, Work the Planp. 708
Documentation and Eventsp. 709
Disaster Staffp. 710
Physical Considerationsp. 710
Data Recoveryp. 712
Backup Operationsp. 712
Time-tested Backup Plansp. 715
Hardware Fail-Over Optionsp. 718
Hardware-Controlled RAIDp. 719
Clustered Serversp. 719
Disaster-Recovery Planning Software and Sitesp. 722
Binomial's Phoenix 3.0p. 722
CDI Vaults Companyp. 723
Business Protections Services' Business Protector for Windowsp. 723
Summaryp. 724
Appendixesp. 725
Troubleshooting/Error Listp. 727
Service Packsp. 728
STOP Errorsp. 728
Steps for Kernel Mode STOP Screensp. 728
STOP Error Solutionsp. 731
Summaryp. 739
IP Address Decimal to Binary Tablep. 741
Subnet Mask Answer Sheetp. 750
Indexp. 755
Table of Contents provided by Syndetics. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.