The Best Damn Windows Server 2008 Book Period book cover

The Best Damn Windows Server 2008 Book Period

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.

Audience
System Administrators and other IT Professionals responsible for the day-to-day managment of Windows Server 2008 enterprise networks.

Paperback, 824 Pages

Published: June 2008

Imprint: Syngress

ISBN: 978-1-59749-273-7

Contents

  • Configuring Network Access, Configure Remote Access, Configure Network Access Protection (NAP) components, Configure Network Authentication, Configure data transmission protocols, Configure wireless access, Configure certificate services, Configure DHCP, Configure IPv4 and IPv6 addressing, Configure routing; Configuring the Domain Name System (DNS), Configure zones, Configure zone resolution, Configure DNS client settings, Configure DHCP and WINS for DNS; Deploying Servers, Configure Windows Deployment Services (WDS), Capture WDS images, Deploy WDS images, Configure Windows activation, Create virtual machines, Configure Virtual Server settings, Install Windows Server Enterprise, Install server core; Configuring Server Roles, Implement server roles by using Server Manager, Configure ADLDS, Configure ADRMS, Configure the AD server core, Configure the read-only domain controller (RODC), Configure AD Certificate Services and PKI, Configure Active Directory Federation Services (ADFS); Maintaining the Active Directory Environment, Configure backup and recovery, Perform offline maintenance, Configure custom application directory partitions, Configure AD DS auditing, Configure audit policy by using GPOs, Monitor Active Directory; Configuring the Active Directory Infrastructure, Configure communication security for Active Directory, Configure authentication

Advertisement

advert image