Check-In | p. xv |
Managing, Securing, and Troubleshooting Servers and Client Computers | p. 1 |
Configuring Client and Server Computers | p. 3 |
Install and Configure Server and Client Computer Hardware | p. 4 |
Assessing Compatibility | p. 4 |
Viewing and Configuring Resource Settings | p. 5 |
Installing Hardware in Windows 2000 | p. 8 |
Installing Plug and Play Devices | p. 8 |
Installing Legacy Devices | p. 9 |
Working with Device Drivers | p. 11 |
Using the System File Checker | p. 12 |
Using the File Signature Verification Utility | p. 13 |
Troubleshoot Starting Servers and Client Computers | p. 14 |
Understanding the Startup Process | p. 15 |
Starting Windows Using Advanced Boot Options | p. 16 |
Creating a Parallel Installation | p. 17 |
Using the Recovery Console | p. 18 |
Install and Manage Windows 2000 Updates | p. 19 |
Installing Windows 2000 Service Packs | p. 20 |
Finding Service Packs | p. 20 |
Deploying Service Packs | p. 21 |
Installing Service Packs During a Windows 2000 Installation | p. 22 |
Installing Windows 2000 Hot Fixes | p. 22 |
Using Windows Update | p. 23 |
Viewing and Removing Updates | p. 23 |
Monitoring Server Health and Performance | p. 31 |
Monitor and Troubleshoot Server Health and Performance | p. 32 |
Using Event Viewer | p. 32 |
Working with an Event Log | p. 33 |
Viewing an Event | p. 34 |
Filtering and Finding Events | p. 35 |
Saving and Loading Log Files | p. 37 |
Using Task Manager | p. 38 |
Managing Applications in Task Manager | p. 38 |
Managing Processes in Task Manager | p. 39 |
Monitoring Performance in Task Manager | p. 42 |
Using System Monitor | p. 43 |
Adding Performance Counters to System Monitor | p. 45 |
Establishing a Baseline and Identifying Bottlenecks | p. 46 |
Using Performance Logs and Alerts | p. 47 |
Configuring, Administering, and Troubleshooting the Network Infrastructure | p. 55 |
Configuring and Troubleshooting TCP/IP | p. 57 |
Configure and Troubleshoot TCP/IP on Servers and Client Computers | p. 58 |
Understanding TCP/IP Architecture | p. 58 |
Application Layer | p. 59 |
Transport Layer | p. 60 |
Internet Layer | p. 61 |
Link Layer | p. 62 |
IP Addressing and Routing | p. 62 |
Classful IP Addressing | p. 64 |
Understanding Routing | p. 65 |
Custom Subnetting | p. 66 |
Using Private Addressing | p. 68 |
Configuring Windows 2000 Computers as TCP/IP Clients | p. 68 |
Troubleshoot Routing | p. 71 |
Using Ipconfig | p. 72 |
Using Ping | p. 73 |
Using Traceroute | p. 74 |
Using Pathping | p. 75 |
Using Route | p. 77 |
Using ARP | p. 78 |
Using Netstat | p. 79 |
Managing Dynamic Host Configuration Protocol (DHCP) | p. 85 |
Configure, Administer, and Troubleshoot DHCP on Servers and Client Computers | p. 86 |
How DHCP Works | p. 86 |
DHCPDISCOVER | p. 87 |
DHCPOFFER | p. 87 |
The DHCP Request | p. 87 |
Acknowledgment | p. 88 |
Lease Renewal | p. 88 |
Installing and Configuring a DHCP Server | p. 89 |
Installing the DHCP Service | p. 89 |
Authorizing a DHCP Server | p. 90 |
Creating a DHCP Scope | p. 91 |
Managing Scopes | p. 95 |
Activating and Deactivating a Scope | p. 96 |
Using Multiple DHCP Servers | p. 97 |
Using DHCP Relay Agents | p. 98 |
Troubleshooting DHCP | p. 99 |
Finding DHCP Events in Event Viewer | p. 99 |
Monitoring DHCP with System Monitor | p. 99 |
DHCP Logging | p. 99 |
Conflict Detection | p. 100 |
Managing Windows Name Resolution | p. 107 |
Troubleshoot Name Resolution on Client Computers | p. 108 |
Resolving NetBIOS Names | p. 108 |
NetBIOS Name Cache | p. 109 |
NetBIOS Broadcasts | p. 109 |
LMHOSTS Files | p. 110 |
WINS Servers | p. 111 |
Using WINS | p. 114 |
Installing the WINS Service | p. 114 |
Configuring a WINS Client | p. 115 |
Troubleshooting Name Resolution Clients | p. 117 |
Managing Domain Name System | p. 123 |
Configure, Administer, and Troubleshoot DNS | p. 124 |
Understanding the Domain Name System | p. 124 |
Domain Name Space | p. 125 |
Zones and Name Servers | p. 127 |
The Name Resolution Process | p. 129 |
Resource Records | p. 131 |
Configuring and Administering DNS in Windows 2000 | p. 133 |
Installing the DNS service | p. 133 |
Configuring DNS | p. 134 |
Creating Records | p. 140 |
Using SRV Records | p. 142 |
Managing DNS Network Traffic | p. 142 |
Using Secondary DNS Servers | p. 143 |
Using Caching-Only Servers | p. 143 |
Using Zone Transfers | p. 143 |
Troubleshooting DNS | p. 146 |
Using the DNS Snap-in | p. 146 |
Using Nslookup | p. 147 |
Creating, Configuring, Managing, Securing, and Troubleshooting File, Print, and Web Resources | p. 155 |
Sharing and Publishing Network Resources | p. 157 |
Create Shared Resources and Configure Access Rights | p. 158 |
Configuring, Managing, and Sharing Printers | p. 158 |
Configure a Local or Network Printer | p. 159 |
Setting Printer Properties | p. 160 |
Printer Pools | p. 162 |
Setting Printer Priorities | p. 163 |
Configuring Printer Availability | p. 163 |
Configuring Permissions for a Printer | p. 164 |
Managing Printers and Documents | p. 166 |
Optimization and Troubleshooting of Your Printers | p. 167 |
Shared Folders and Web Folders | p. 169 |
Configuring Share Permissions | p. 170 |
Using Multiple Share Permissions | p. 172 |
Manage a Domain-Based Distributed File System (Dfs) | p. 172 |
Creating a Dfs Root | p. 173 |
Client Access to Dfs | p. 175 |
Publish Resources in Active Directory | p. 175 |
Introduction to Published Resources | p. 176 |
Publishing a Resource | p. 176 |
Helping Users Find Published Resources | p. 177 |
Searching for a Printer or Folder from Within Active Directory | p. 178 |
Publishing Network Services | p. 179 |
Managing Data Storage and NTFS Permissions | p. 185 |
Manage Data Storage | p. 186 |
Choosing a File System | p. 186 |
Using Disk Quotas | p. 187 |
Configuring Disk Quotas | p. 188 |
Using the Encrypting File System (EFS) | p. 190 |
Encrypting a Folder or File | p. 191 |
EFS Recovery Agent | p. 192 |
Managing NTFS Compression | p. 193 |
Configuring Compression | p. 193 |
Compression Inheritance | p. 194 |
Managing Storage | p. 195 |
Basic Storage | p. 195 |
Dynamic Storage | p. 199 |
Defragmenting Disks | p. 201 |
Mounting Volumes | p. 203 |
Managing NTFS Permissions | p. 203 |
Managing Multiple NTFS Permissions | p. 206 |
Combining NTFS and Share Permissions | p. 207 |
Setting Permissions | p. 209 |
Permissions Inheritance | p. 210 |
Moving and Copying Objects with Permissions | p. 211 |
Managing Internet Information Services | p. 217 |
Configure and Troubleshoot Internet Information Services | p. 218 |
Overview of Internet Information Services | p. 218 |
Installing Internet Information Services | p. 219 |
Creating and Managing Web Sites | p. 220 |
Using the Internet Services Manager | p. 222 |
Creating a New Web Site or Virtual Server | p. 223 |
Starting and Stopping Sites | p. 225 |
Managing Web Sites | p. 226 |
Using Virtual Directories | p. 230 |
Creating and Managing FTP Sites | p. 231 |
Creating a New FTP Site | p. 232 |
Managing FTP Sites | p. 232 |
Managing Security | p. 235 |
Using Alternate Port Assignments | p. 236 |
User Authentication | p. 236 |
IP and Domain Name Restrictions | p. 238 |
Access Permissions | p. 239 |
SSL | p. 239 |
Troubleshooting Internet Information Services | p. 240 |
Configuring, Managing, Securing, and Troubleshooting Active Directory Organizational Units and Group Policy | p. 247 |
Managing Active Directory Objects | p. 249 |
Create, Manage, and Troubleshoot User and Group Objects in Active Directory | p. 250 |
Active Directory Overview | p. 250 |
Domains | p. 251 |
Trees | p. 252 |
Forests | p. 253 |
User Accounts | p. 254 |
Built-in Users | p. 254 |
Creating Users | p. 255 |
Managing Users | p. 256 |
Organizing Users with Organizational Units | p. 258 |
Creating User Profiles | p. 258 |
Home Directories | p. 260 |
Group Objects | p. 261 |
Group Types | p. 262 |
Group Scopes | p. 262 |
How to Use Groups | p. 263 |
Creating Groups | p. 264 |
Managing Groups | p. 265 |
Default Groups | p. 266 |
Manage Object and Container Permissions | p. 269 |
Assigning Permissions to Objects | p. 270 |
Permissions Inheritance | p. 273 |
Using Group Policies | p. 279 |
Group Policy Overview | p. 280 |
Using the Group Policy Snap-In | p. 280 |
Group Policy Settings | p. 282 |
Software Settings | p. 283 |
Windows Settings | p. 283 |
Administrative Templates | p. 283 |
How Multiple GPOs Are Combined | p. 284 |
Group Policy Inheritance | p. 286 |
How Group Policy Is Applied | p. 286 |
Creating and Managing a Group Policy Object | p. 287 |
Creating a GPO | p. 288 |
Controlling Order of GPO Application | p. 289 |
Blocking Inheritance | p. 289 |
Setting Group Policy Options | p. 290 |
Deleting a GPO | p. 290 |
Disabling Unused Policy Settings | p. 290 |
Finding Links to a GPO | p. 291 |
Delegating Control of a GPO | p. 291 |
Filtering GPOs with Permissions | p. 291 |
Refreshing Group Policy | p. 292 |
Deploy Software by Using Group Policy | p. 293 |
Deploying Applications | p. 294 |
Setting Properties for a Specific Software Installation | p. 295 |
Setting Default Properties for All New Software Installations | p. 296 |
Removing Applications | p. 298 |
Implement and Manage Security Policies by Using Group Policy | p. 298 |
Using the Security Configuration and Analysis Tool | p. 302 |
Using the Secedit Tool | p. 304 |
Monitor and Manage Network Security | p. 305 |
Auditing Files, Folders, and Printers | p. 308 |
Auditing Active Directory Objects | p. 310 |
Reviewing Audited Events with the System Security Log File | p. 311 |
Troubleshoot End-User Group Policy | p. 312 |
Managing Active Directory Replication | p. 321 |
Diagnose Active Directory Replication Problems | p. 322 |
Overview of Replication | p. 322 |
Intrasite Replication | p. 323 |
Intersite Replication | p. 323 |
Replication Protocols | p. 324 |
Configuring Sites, Subnets, and Site Links | p. 324 |
Creating a Site Object | p. 324 |
Associating a Subnet Object with a Site | p. 326 |
Creating and Configuring Site Links | p. 327 |
Creating Site Link Bridges | p. 330 |
Designating a Preferred Bridgehead Server | p. 331 |
Replication Convergence and Latency | p. 334 |
Replication Conflicts | p. 337 |
The LostandFound Container | p. 337 |
Sibling Rivalry | p. 338 |
Operations Master Roles | p. 338 |
Forest-Wide Operation Master | p. 338 |
Domain-Wide Operation Masters | p. 339 |
Moving and Seizing FSMO Roles | p. 340 |
Global Catalog Server | p. 341 |
Backup and Recovery of Active Directory | p. 343 |
System State Data | p. 344 |
Restoring System State Data on a Domain Controller | p. 345 |
Configuring, Securing, and Troubleshooting Remote Access | p. 355 |
Configuring Remote Access | p. 357 |
Configure and Troubleshoot Remote Access and Virtual Private Network (VPN) Connections | p. 358 |
Remote Access Overview | p. 358 |
Remote Access Connection Methods | p. 359 |
Protocols Used in RRAS | p. 360 |
Remote Access Security | p. 362 |
Installing Remote Access | p. 364 |
Configuring Remote Access | p. 367 |
Configuring Inbound Connections at the Server | p. 368 |
Configuring a User for Remote Access | p. 372 |
Configuring Virtual Private Networking | p. 374 |
VPN Components | p. 375 |
Installing and Configuring a VPN Server | p. 376 |
Troubleshoot Routing and Remote Access Policy | p. 379 |
Creating a New Remote Access Policy | p. 380 |
Configuring Remote Access Profiles | p. 382 |
Implement and Troubleshoot Terminal Services for Remote Access | p. 382 |
Overview of Terminal Services | p. 383 |
Remote Administration Mode | p. 383 |
Application Server Mode | p. 383 |
Installing Terminal Services | p. 384 |
Terminal Services Licensing | p. 385 |
Providing Client Access to Terminal Services | p. 387 |
Connecting to a Terminal Services Server | p. 388 |
Configuring Network Address Translation and Internet Connection Sharing | p. 393 |
Configure and Troubleshoot Network Address Translation (NAT) and Internet Connection Sharing | p. 394 |
Overview of NAT and ICS | p. 394 |
Benefits of Address Sharing | p. 395 |
How NAT Works | p. 396 |
Differences Between NAT and ICS | p. 398 |
Installing and Configuring Internet Connection Sharing | p. 398 |
Installing ICS | p. 399 |
Installing and Configuring Network Address Translation | p. 400 |
Installing the NAT Service | p. 401 |
Configuring NAT Interfaces | p. 403 |
Configuring NAT Properties | p. 405 |
Appendixes | p. 411 |
About the CD-ROM | p. 413 |
Mike Meyers' Certification Passport CD-ROM Instructions | p. 414 |
System Requirements | p. 414 |
Technical Support | p. 414 |
Career Flight Path | p. 415 |
Core Exams | p. 416 |
Elective Exams | p. 417 |
Choosing Your Path | p. 418 |
Index | p. 419 |
Table of Contents provided by Syndetics. All Rights Reserved. |