Windows 2000 Server System Administration Handbook - 1st Edition - ISBN: 9781928994091, 9780080481753

Windows 2000 Server System Administration Handbook

1st Edition

Authors: Syngress
eBook ISBN: 9780080481753
Paperback ISBN: 9781928994091
Imprint: Syngress
Published Date: 16th February 2000
Page Count: 802
Sales tax will be calculated at check-out Price includes VAT/GST
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
39.95
29.96
29.96
29.96
29.96
29.96
31.96
31.96
31.99
23.99
23.99
23.99
23.99
23.99
25.59
25.59
51.95
38.96
38.96
38.96
38.96
38.96
41.56
41.56
Unavailable
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring, and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead. Windows 2000 Server System Administration Handbook will help NT4 professionals to administer and support the Windows 2000 Server operating system. NT administrators will be able to differentiate the features and technology changes from Windows NT 4.0 to Windows 2000. In the handbook, readers will find a complete overview of the product, catered to their needs.

Key Features

  • This book coincides with the launch of Windows 2000 Server, the host system for the product.
  • Includes the following:
  • Detailed coverage of Active Directory, Microsoft Management Console, and new Windows 2000 hardware support
  • Implementing new Windows 2000 security options
  • Upgrading a network to Windows 2000

Table of Contents


Chapter 1 The Windows 2000 System Administration Migration Path

Brief Overview of Windows 2000 Server

Windows 2000 System Administration Overview

Increased Reliability, Availability, and Scalability

Easier Management and Lower Costs

Comprehensive Internet and Application Server

Why the Change

Migrating to Windows 2000 Server

Getting Ready

Streamlining

Planning

Testing

Deployment

Setting Up Windows 2000 Server

Installing Windows 2000 Server

Upgrading to Windows 2000 Server

Summary

FAQs

Chapter 2 Overview of Windows 2000 Administration

Introduction to Network Administration

Designing and Setting Up the Network

Managing the Network

Protecting the Network

Documenting the Network

Microsoft Management Console

Introduction to Active Directory

Key Concepts

Features and Benefits of Active Directory

Beyond Active Directory

Using Windows 2000 Help

Summary

FAQs

Chapter 3 Setting Up User Accounts

Defining an Acceptable Use Policy

Template: Acceptable Use/Security Policy

Introduction to User Accounts

Requirements for New User Accounts

Default User Account Settings

Creating a Domain User Account

Active Directory Users and Computers

Creating User Accounts

Setting Password Requirements

Security Templates

Changing Account (Password) Policies

Setting Properties for User Accounts

Modifying User Accounts

Managing User Accounts

Deleting User Accounts

Changing User Passwords

Enabling an Account

Disabling an Account

Other Active Directory Users and Computer Functions

Best Practices

Using Active Directory Users and Computers

Administrative Logon

Account (Password) Policies

Summary

FAQs

Chapter 4 Using Groups to Organize User Accounts

Introduction to Groups

Group Type

Group Scope

Implementing Group Strategies

Why Use Groups

Structuring Groups

Implementing Groups

Preparing to Create Groups

Information Needed to Create a Group

Creating a Group

Assigning Users to a Group

Configuring Group Settings

Managing Groups

Implementing Local Groups

Preparing to Create Local Groups

Creating a Local Group

Implementing Built-in Groups

Built-in Domain Local Groups

Built-in Global Groups

Built-in Local Groups

Built-in System Groups

Built-in Group Behavior

Best Practices

Managing Groups

Using Universal Groups

Switching Modes

Summary

FAQs

Chapter 5 Administering File Resources

Introduction

Using Microsoft Windows NT File System (NTFS) Permissions

NTFS Folder Permissions

NTFS File Permissions

How Windows 2000 Applies NTFS Permissions

Access Control Lists

Combining NTFS Permissions

Permission Inheritance

Assigning NTFS Permissions

Planning NTFS Permissions

Managing NTFS Permissions

Special Access Permissions

Using Special Access Permissions

Changing NTFS Permissions

Copying and Moving Files and Folders

Copying Files

Moving Files

Sharing Resources

Securing Network Resources

Shared Folder Permissions

Creating Shared Folders

Developing a Shared Folder Strategy

Sharing Folders

NTFS Permissions and Shared Folders

Troubleshooting Access Problems

Solving Permission Problems

Best Practices

Avoiding Permission-Related Access Problems

Guidelines for Managing Shared Folder Permissions

Summary

FAQs

Chapter 6 Administering User Accounts

Managing User Profiles

User Profiles Overview

Contents of a User Profile

Settings Saved in a User Profile

Local User Profiles

Roaming User Profiles

Creating Home Folders

Home Directories and My Documents

Creating Home Directories

Introduction to Group Policies

Applying Group Policy

Best Practices 2

Allowing for Different Hardware Configurations

Combining the Power of Profiles and Policies

Tightening Security on Home Directories

Summary

FAQs

Chapter 7 Administering Printer Resources

Introduction to Administering Printers

Terminology

Planning the Print Environment

Creating the Print Environment

Printer Properties

General

Sharing

Ports

Advanced

Security

Device Settings

Managing Printer Permissions

Security/Sharing Permissions

Printer Ownership

Managing Printers

Assigning Forms to Paper Trays

Assigning Separator Pages

Creating a Printer Pool

Specifying Printer Priorities

Redirecting a Printer

Removing Printer Drivers

Managing Documents in a Print Queue

Setting Priority, Notification, Printing Time

Administering Printers by Using a Web Browser

Best Practices

Organize Printers by Business Function or Geographic Location

Put Print Devices on a Separate Network

Allow Clients Access to Web Printing Interfaces

Restart Print Spool Service Periodically

FAQs

Chapter 8 Managing Storage Data

Managing Data Compression

Compressing Files and Folders

Managing Disk Quotas

Encrypting Data

File Encryption

Decryption of Files

Storing Encrypted Files on Remote Servers

Accessing Encrypted Data

Moving and Renaming Encrypted Data

Decrypting Data

The Recovery Agent

Using Disk Defragmenter

Analyzing a Drive

Viewing Reports

Defragmenting NTFS File System Partitions

Troubleshooting Data Storage

Best Practices

FAQs

Chapter 9 Monitoring Event Logs

Introduction to Monitoring Event Logs

Viewing Event Logs

Monitoring Security Events

Auditing Files and Folders

Auditing Registry Entries

Analyzing Security Events

Managing Event Logs

Best Practices

Summary

FAQs

Chapter 10 Backing Up and Restoring Data

Introduction to Backing Up and Recovering Data

Types of Backups

Necessary Permissions and User Rights

System State Data

Emergency Repair Disk

Back Up and Restore Options

Backing Up Data

Restoring Data

Authoritative Restore

Maintaining Media

Best Practices

Summary

FAQs

Chapter 11 Advanced Administration of Windows 2000

Administering Windows 2000

Microsoft Management Console

Windows 2000 System Administration

Windows 2000 Network Administration

Adapters and Protocols

Configuring Adapters and Protocols

DHCP Manager

DNS Management

Windows Internet Naming Service (WINS)

Terminal Services

Quality of Service

Routing and Remote Access

Remote Access Service Dial Out

Virtual Private Networks

Demand Dial Routing

Network Address Translation (NAT)

Internet Authentication Service

Connection Manager Administration Kit

Customizing Windows 2000 Tools for Your Environment

Creating Custom MMC Consoles

Using the Task Scheduler

Understanding the Logon Process

Logon Authentication

Secondary Logon Services

Windows 2000 Resource Kit

Direct X Diagnostic Utility

Command Line Kill

Sysprep

Setup Manager

Sysdiff

Dependency Walker

Shutdown

Netdiag

Summary

FAQs

Chapter 12 Administering Active Directory

Introduction to Administering Active Directory

Active Directory Concepts

Active Directory Components

Using Active Directory Management Utilities

Publishing Objects in Active Directory

Sharing Resources

Locating Objects in Active Directory

Controlling Access to Objects

User Authentication

Object-based Access Control

Active Directory Permissions

Delegating Administrative Control of Objects

Delegation of Control Wizard

Overview of Active Directory Service Interface (ADSI)

Best Practices

Summary

FAQs

Chapter 13 Implementing Group Policy

Introduction to Windows 2000 Group Policy

Group Policy Structure

Types of Configurations

Type of Group Policies

Group Policy Objects

Group Policy Containers

Group Policy Templates

How Group Policy Is Applied in Active Directory

Order of Inheritance

Creating a Group Policy Object

Group Policy and Slow Networks

Filtering the Scope of GPO

Modifying Group Policy Inheritance

Modifying Group Policy

Group Policy Tab

Group Policy Editor

Adding Administrative Templates

Using the Group Policy Management Snap-in

Group Policy Configuration Example

Delegating Administrative Control of a Group Policy Object

Creating a Group Policy Object

Modifying a Group Policy Object

Managing a Group Policy Object Link to a Site, Domain, or Organizational Unit

Guidelines for Implementing Group Policy

Best Practices

Summary

FAQs

Chapter 14 Managing User Environments Using Group Policy

Introduction to Managing User Environments

Types of Group Policy for Managing User Environments

Group Policy Snap-In for the Microsoft Management Console

Using Administrative Templates

Assigning Registry-Based Policies

Creating Custom Administrative Templates

Adding Administrative Templates

Using Scripts

Assigning Script Policies to Users and Computers

Folder Redirection

FAQs

Chapter 15 Managing Software by Using Group Policy

Introduction

Introduction to Managing Software Deployment

Deploying Software

Creating Software Packages

Creating a Non-Windows Installer Package File

Managing Software

Maintaining Software

Upgrading Software

Removing Software

Summary

FAQs

Chapter 16 Administering User Accounts and Groups

Introduction to Administration of User Accounts and Groups

Creating Multiple User Accounts

Migrating Users from an NT 4.0 Domain

Creating New Active Directory Users in Bulk

Importing Users from Novell Directory Services (NDS)

Administering Logon Names

Lockout Settings

Password Requirements

Configuring Account Policies Using Group Policy

Troubleshooting User Logon Problems

Unable to Find a Domain Controller

Unable to Load the User Profile

Missing Computer Account

Redirecting User Data to a Network Share

Setting Up Accounts for Mobile Users

Multilink and Bandwidth Allocation Protocol (BAP)

Using Universal Groups

Windows NT 3.x and 4.x Groups Types

Windows 2000 Group Types

Best Practices

Summary

FAQs

Chapter 17 Implementing Security in a Windows 2000 Network

Introduction to Securing a Windows 2000 Network

Applying Security Policies

The Security Settings Extension to Group Policy

Order of Precedence

Creating, Modifying, and Analyzing Security Configurations

Security Configuration and Analysis Snap-in

SECEDIT.EXE

Configuring an Audit Policy

Analyzing Security Configurations

Security Configuration Templates

Implementing Public Key Security

Components of Public Key Services

Using Public Key Services

Enabling and Administering File Encryption

Encrypted File System Architecture

Using the Encrypted File System

Guidelines for Using EFS

Best Practices

Summary

FAQs 7

Chapter 18 Sharing File Resources by Using DFS

Introduction to DFS

Setting Up a Fault-Tolerant DFS Root

Setting Up a Stand-Alone DFS Root

Setting Up Child Nodes

Configuring Child Nodes as Replica Sets

Administering DFS

Connecting to an Existing DFS Root

Command-Line Administration

Removing DFS Roots and Nodes

Client Interactions with DFS

Security Concerns

Best Practices

Summary

FAQs

Chapter 19 Implementing Disaster Protection

Introduction

Protecting a Windows 2000 Network from Disasters

Backing Up Data

The Recovery Console

Advanced Startup Options

Recovering from a System Failure

Repairing and Restoring Active Directory

Authoritative Restore

Summary

FAQs

Index


Details

No. of pages:
802
Language:
English
Copyright:
© Syngress 2000
Published:
Imprint:
Syngress
eBook ISBN:
9780080481753
Paperback ISBN:
9781928994091

About the Author

Ratings and Reviews