Introduction |
|
xxxvii | |
Assessment Test |
|
lv | |
Chapter 1 Installing Windows Server 2016 |
|
1 | (44) |
|
Features and Advantages of Windows Server 2016 |
|
|
2 | (4) |
|
Planning the Windows Server 2016 Installation |
|
|
6 | (25) |
|
Server Roles in Windows Server 2016 |
|
|
6 | (4) |
|
Migrating Roles and Features to Windows Server 2016 |
|
|
10 | (1) |
|
Deciding Which Windows Server 2016 Versions to Use |
|
|
11 | (2) |
|
Deciding on the Type of Installation |
|
|
13 | (3) |
|
|
16 | (1) |
|
Installing Windows Server 2016 |
|
|
17 | (14) |
|
Activating and Servicing Windows |
|
|
31 | (4) |
|
|
32 | (1) |
|
Automatic Virtual Machine Activation |
|
|
33 | (1) |
|
Active Directory-Based Activation |
|
|
34 | (1) |
|
Servicing Windows Server 2016 |
|
|
34 | (1) |
|
Using Windows Deployment Services |
|
|
35 | (4) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Installing the WDS Server Components |
|
|
37 | (2) |
|
|
39 | (1) |
|
Understanding Features On Demand |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (3) |
Chapter 2 Installing in the Enterprise |
|
45 | (40) |
|
Understanding Automated Deployment Options |
|
|
46 | (18) |
|
An Overview of the Microsoft Deployment Toolkit 2013 Update 2 |
|
|
47 | (8) |
|
An Overview of Unattended Installation |
|
|
55 | (2) |
|
An Overview of the System Preparation Tool and Disk Imaging |
|
|
57 | (4) |
|
Overview of the Windows Assessment and Deployment Kit |
|
|
61 | (1) |
|
Windows Imaging and Configuration Designer |
|
|
62 | (1) |
|
Summary of Windows Server 2016 Deployment Options |
|
|
62 | (2) |
|
Deploying Unattended Installations |
|
|
64 | (13) |
|
Using the System Preparation Tool to Prepare an Installation for Imaging |
|
|
65 | (2) |
|
Using Windows Imaging and Configuration Designer (Windows ICD) to Create a Disk Image |
|
|
67 | (2) |
|
Installing from a Disk Image |
|
|
69 | (1) |
|
Using the Deployment Image Servicing and Management Tool |
|
|
70 | (3) |
|
Using Windows System Image Manager to Create Answer Files |
|
|
73 | (2) |
|
Microsoft Assessment and Planning (MAP) Toolkit |
|
|
75 | (2) |
|
|
77 | (2) |
|
|
78 | (1) |
|
Linux and FreeBSD Image Deployments |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (4) |
Chapter 3 Configuring Storage and Replication |
|
85 | (52) |
|
Understanding File Systems |
|
|
86 | (5) |
|
Resilient File System (ReFS) |
|
|
87 | (1) |
|
|
88 | (3) |
|
Storage in Windows Server 2016 |
|
|
91 | (18) |
|
|
91 | (1) |
|
Configuring Basic and Dynamic Disks |
|
|
92 | (2) |
|
|
94 | (1) |
|
Storage Spaces in Windows Server 2016 |
|
|
95 | (1) |
|
Redundant Array of Independent Disks |
|
|
96 | (3) |
|
|
99 | (1) |
|
|
100 | (2) |
|
|
102 | (1) |
|
Internet Storage Name Service |
|
|
103 | (2) |
|
Implement Thin Provisioning and Trim |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
106 | (2) |
|
Understanding Data Center Bridging |
|
|
108 | (1) |
|
|
109 | (9) |
|
|
109 | (1) |
|
|
110 | (2) |
|
Understanding Shared Permissions |
|
|
112 | (2) |
|
How NTFS Security and Shared Permissions Work Together |
|
|
114 | (2) |
|
|
116 | (2) |
|
|
118 | (2) |
|
|
120 | (5) |
|
|
125 | (2) |
|
|
126 | (1) |
|
Understanding Data Deduplication |
|
|
127 | (5) |
|
Backup and Restoring Deduplicated Volumes |
|
|
128 | (1) |
|
Installing and Enabling Data Deduplication |
|
|
129 | (3) |
|
Monitoring Data Deduplicated |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (2) |
|
|
135 | (2) |
Chapter 4 Understanding Hyper-V |
|
137 | (50) |
|
|
139 | (9) |
|
|
139 | (1) |
|
|
140 | (5) |
|
|
145 | (2) |
|
|
147 | (1) |
|
Hyper-V Installation and Configuration |
|
|
148 | (14) |
|
|
148 | (3) |
|
Hyper-V in Server Manager |
|
|
151 | (1) |
|
|
152 | (1) |
|
Configure Hyper-V Settings |
|
|
153 | (1) |
|
|
154 | (3) |
|
Managing Virtual Hard Disks |
|
|
157 | (5) |
|
Configuring Virtual Machines |
|
|
162 | (17) |
|
Creating and Managing Virtual Machines |
|
|
162 | (13) |
|
Linux and FreeBSD Image Deployments |
|
|
175 | (4) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (2) |
|
|
185 | (2) |
Chapter 5 Configuring High Availability |
|
187 | (28) |
|
Components of High Availability |
|
|
188 | (1) |
|
Achieving High Availability |
|
|
189 | (2) |
|
High Availability Foundation |
|
|
190 | (1) |
|
Understanding Network Load Balancing |
|
|
191 | (9) |
|
|
193 | (1) |
|
|
193 | (5) |
|
|
198 | (1) |
|
PowerShell Commands for an NLB Cluster |
|
|
199 | (1) |
|
Achieving High Availability with Hyper-V |
|
|
200 | (11) |
|
Implementing a Hyper-V Replica |
|
|
201 | (4) |
|
Understanding Live Migration |
|
|
205 | (3) |
|
Implementing Storage Migration |
|
|
208 | (2) |
|
PowerShell Commands for Hyper-V High Availability |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (2) |
Chapter 6 Understanding Clustering |
|
215 | (36) |
|
Achieving High Availability with Failover Clustering |
|
|
216 | (20) |
|
Failover Clustering Requirements |
|
|
218 | (1) |
|
Workgroup and Multi-Domain clusters |
|
|
219 | (1) |
|
Site-Aware, Stretched, or Geographically Dispersed Clusters (Geoclustering) |
|
|
220 | (1) |
|
|
220 | (3) |
|
Validating a Cluster Configuration |
|
|
223 | (5) |
|
|
228 | (3) |
|
Clustered Application Settings |
|
|
231 | (2) |
|
|
233 | (3) |
|
Windows Server 2016 Clustering Features |
|
|
236 | (3) |
|
PowerShell Commands for Clustering |
|
|
239 | (2) |
|
Implementing Storage Spaces Direct |
|
|
241 | (6) |
|
The Benefits of Storage Spaces Direct |
|
|
243 | (1) |
|
|
243 | (1) |
|
Requirements to Set Up Storage Spaces Direct |
|
|
244 | (1) |
|
Storage Spaces Direct Using Windows PowerShell |
|
|
245 | (2) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (3) |
Chapter 7 Configuring Windows Containers |
|
251 | (26) |
|
Understanding Windows Containers |
|
|
252 | (19) |
|
|
253 | (1) |
|
Install and Configure Server Containers |
|
|
253 | (7) |
|
Install and Configure Windows Containers |
|
|
260 | (5) |
|
|
265 | (1) |
|
Uninstall an Operating System Image |
|
|
265 | (1) |
|
Creating New Images Using Dockerfile |
|
|
266 | (2) |
|
Understanding Hyper-V Containers |
|
|
268 | (1) |
|
Managing Container Networking |
|
|
269 | (1) |
|
Using Docker Hub Repository |
|
|
270 | (1) |
|
Using Microsoft Azure for Images |
|
|
271 | (1) |
|
Using PowerShell for Containers |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (2) |
Chapter 8 Maintaining Windows Server |
|
277 | (42) |
|
Configuring Windows Server Updates |
|
|
278 | (19) |
|
|
279 | (3) |
|
Using Windows Server Update Services |
|
|
282 | (15) |
|
|
297 | (15) |
|
Overview of the Windows Server 2016 Backup Utility |
|
|
298 | (5) |
|
Setting Up an Active Directory Backup |
|
|
303 | (3) |
|
Restoring Active Directory |
|
|
306 | (2) |
|
Active Directory Recycle Bin |
|
|
308 | (1) |
|
Understanding the ntdsutil Utility |
|
|
309 | (1) |
|
Wbadmin Command-Line Utility |
|
|
310 | (1) |
|
Backing Up Virtual Machines |
|
|
311 | (1) |
|
|
312 | (2) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (3) |
Chapter 9 Understanding Monitoring |
|
319 | (32) |
|
Overview of Windows Server 2016 Performance Monitoring |
|
|
321 | (2) |
|
Using Windows Server 2016 Performance Tools |
|
|
323 | (24) |
|
Introducing Performance Monitor |
|
|
323 | (9) |
|
Using Other Monitoring Tools |
|
|
332 | (15) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (2) |
Chapter 10 Configuring TCP/IP |
|
351 | (50) |
|
|
352 | (3) |
|
Details of the TCP/IP Model |
|
|
352 | (1) |
|
How TCP/IP Layers Communicate |
|
|
353 | (1) |
|
Understanding Port Numbers |
|
|
354 | (1) |
|
Understanding IP Addressing |
|
|
355 | (5) |
|
The Hierarchical IP Addressing Scheme |
|
|
355 | (1) |
|
Understanding Network Classes |
|
|
356 | (4) |
|
|
360 | (23) |
|
|
361 | (7) |
|
An Easier Way to Apply Subnetting |
|
|
368 | (4) |
|
Applying Subnetting the Traditional Way |
|
|
372 | (7) |
|
Working with Classless Inter-Domain Routing |
|
|
379 | (3) |
|
|
382 | (1) |
|
|
383 | (12) |
|
|
383 | (1) |
|
New and Improved IPv6 Concepts |
|
|
384 | (2) |
|
|
386 | (5) |
|
IPv6 Integration/Migration |
|
|
391 | (4) |
|
|
395 | (1) |
|
|
395 | (2) |
|
|
397 | (4) |
Chapter 11 Configuring DNS |
|
401 | (66) |
|
|
402 | (13) |
|
The Form of an IP Address |
|
|
403 | (5) |
|
Understanding Servers, Clients, and Resolvers |
|
|
408 | (1) |
|
Understanding the DNS Process |
|
|
409 | (6) |
|
Introducing DNS Database Zones |
|
|
415 | (9) |
|
Understanding Primary Zones |
|
|
415 | (1) |
|
Understanding Secondary Zones |
|
|
416 | (1) |
|
Understanding Active Directory Integrated DNS |
|
|
417 | (2) |
|
|
419 | (1) |
|
|
420 | (1) |
|
Zone Transfers and Replication |
|
|
421 | (3) |
|
Advantages of DNS in Windows Server 2016 |
|
|
424 | (6) |
|
|
424 | (1) |
|
Support for IPv6 Addresses |
|
|
425 | (1) |
|
Support for Read-Only Domain Controllers |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
Introducing DNS Record Types |
|
|
430 | (5) |
|
Start of Authority (SOA) Records |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
435 | (10) |
|
|
436 | (1) |
|
Load Balancing with Round Robin |
|
|
436 | (1) |
|
Configuring a Caching-Only Server |
|
|
437 | (1) |
|
|
438 | (3) |
|
Configuring Zones for Dynamic Updates |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
443 | (1) |
|
Manually Creating DNS Records |
|
|
444 | (1) |
|
|
445 | (1) |
|
Monitoring and Troubleshooting DNS |
|
|
445 | (13) |
|
Monitoring DNS with the DNS Snap-In |
|
|
446 | (2) |
|
|
448 | (9) |
|
Integrating Dynamic DNS and IPv4 DHCP |
|
|
457 | (1) |
|
|
458 | (3) |
|
|
461 | (1) |
|
|
462 | (2) |
|
|
464 | (3) |
Chapter 12 Configuring DHCP |
|
467 | (48) |
|
|
468 | (6) |
|
Introducing the DORA Process |
|
|
469 | (1) |
|
Advantages and Disadvantages of DHCP |
|
|
470 | (1) |
|
|
471 | (1) |
|
Understanding Scope Details |
|
|
472 | (2) |
|
Installing and Authorizing DHCP |
|
|
474 | (4) |
|
|
474 | (1) |
|
Introducing the DHCP Snap-In |
|
|
475 | (1) |
|
Authorizing DHCP for Active Directory |
|
|
476 | (2) |
|
Creating and Managing DHCP Scopes |
|
|
478 | (25) |
|
Creating a New Scope in IPv4 |
|
|
479 | (7) |
|
Creating a New Scope in IPv6 |
|
|
486 | (3) |
|
Changing Scope Properties (IPv4 and IPv6) |
|
|
489 | (1) |
|
Changing Server Properties |
|
|
490 | (1) |
|
Managing Reservations and Exclusions |
|
|
491 | (2) |
|
Setting Scope Options for IPv4 |
|
|
493 | (3) |
|
Activating and Deactivating Scopes |
|
|
496 | (1) |
|
Creating a Superscope for IPv4 |
|
|
496 | (1) |
|
Creating IPv4 Multicast Scopes |
|
|
497 | (2) |
|
Integrating Dynamic DNS and IPv4 DHCP |
|
|
499 | (2) |
|
Using DHCP Failover Architecture |
|
|
501 | (1) |
|
Working with the DHCP Database Files |
|
|
502 | (1) |
|
Working with Advanced DHCP Configuration Options |
|
|
503 | (5) |
|
|
504 | (1) |
|
Configure High Availability for DHCP, |
|
|
|
Including DHCP Failover and Split Scopes |
|
|
505 | (2) |
|
Configure DHCP Name Protection |
|
|
507 | (1) |
|
|
508 | (2) |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
512 | (3) |
Chapter 13 Implement IP Address Management |
|
515 | (42) |
|
|
516 | (12) |
|
|
517 | (3) |
|
Provision IPAM Manually or by Using Group Policy |
|
|
520 | (6) |
|
Configure Server Discovery |
|
|
526 | (1) |
|
Create and Manage IP Blocks and Ranges |
|
|
527 | (1) |
|
|
528 | (11) |
|
|
529 | (5) |
|
|
534 | (5) |
|
|
539 | (11) |
|
|
541 | (1) |
|
Delegate IPAM Administration |
|
|
541 | (4) |
|
|
545 | (1) |
|
Virtual Machine Manager and IPAM |
|
|
545 | (2) |
|
|
547 | (3) |
|
PowerShell Commands for IPAM |
|
|
550 | (3) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
554 | (3) |
Chapter 14 Configuring Network Access |
|
557 | (70) |
|
Overview of Dial-Up Networking |
|
|
558 | (4) |
|
|
559 | (1) |
|
|
559 | (3) |
|
Overview of Virtual Private Networks |
|
|
562 | (5) |
|
|
563 | (1) |
|
VPNs and Windows Server 2016 |
|
|
563 | (1) |
|
|
564 | (3) |
|
Configuring Your Remote Access Server |
|
|
567 | (7) |
|
|
567 | (7) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
575 | (4) |
|
|
576 | (3) |
|
Managing Your Remote Access Server |
|
|
579 | (7) |
|
Managing Remote Users with a RADIUS Server |
|
|
579 | (1) |
|
Monitoring Overall Activity |
|
|
579 | (1) |
|
Controlling Remote Access Logging |
|
|
579 | (4) |
|
Reviewing the Remote Access Event Log |
|
|
583 | (1) |
|
Monitoring Ports and Port Activity |
|
|
583 | (1) |
|
Network Address Translation |
|
|
584 | (1) |
|
|
584 | (2) |
|
|
586 | (1) |
|
|
586 | (7) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | (2) |
|
|
591 | (1) |
|
|
592 | (1) |
|
Configuring a Web Application Proxy |
|
|
593 | (2) |
|
|
593 | (1) |
|
Configuring Pass-Through Authentication |
|
|
594 | (1) |
|
Understanding DirectAccess |
|
|
595 | (3) |
|
|
595 | (1) |
|
Understanding the DirectAccess Process |
|
|
595 | (2) |
|
Knowing the DirectAccess Infrastructure Requirements |
|
|
597 | (1) |
|
Overview of Wireless Access |
|
|
598 | (2) |
|
Configuring Wireless Access |
|
|
599 | (1) |
|
|
600 | (3) |
|
|
600 | (2) |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (15) |
|
|
604 | (2) |
|
Using Network Access Policies |
|
|
606 | (3) |
|
NPS as a RADIUS Proxy Server |
|
|
609 | (2) |
|
Importing and Exporting NPS Policies |
|
|
611 | (2) |
|
Using Remote Access Profiles |
|
|
613 | (3) |
|
Setting Up a VPN Network Access Policy |
|
|
616 | (2) |
|
|
618 | (4) |
|
Controlling Server Security |
|
|
618 | (2) |
|
Configuring Network Access Protection |
|
|
620 | (2) |
|
PowerShell for Remote Access |
|
|
622 | (1) |
|
|
623 | (1) |
|
|
624 | (1) |
|
|
624 | (1) |
|
|
625 | (2) |
Chapter 15 Understanding File Services |
|
627 | (40) |
|
Configuring File Server Resource Manager |
|
|
628 | (2) |
|
|
628 | (1) |
|
Installing the FSRM Role Service |
|
|
629 | (1) |
|
Configure File and Disk Encryption |
|
|
630 | (7) |
|
Using BitLocker Drive Encryption |
|
|
630 | (1) |
|
|
631 | (2) |
|
Windows 7 and 2008 R2 vs. Windows 10 and 2016 |
|
|
633 | (2) |
|
Using EFS Drive Encryption |
|
|
635 | (2) |
|
Configuring Distributed File System |
|
|
637 | (8) |
|
|
637 | (1) |
|
|
638 | (2) |
|
What's New in Windows Server 2016 |
|
|
640 | (2) |
|
Remote Differential Compression |
|
|
642 | (3) |
|
Configure Advanced File Services |
|
|
645 | (8) |
|
Configure the NFS Data Store |
|
|
645 | (1) |
|
|
646 | (7) |
|
Implementing an Audit Policy |
|
|
653 | (5) |
|
|
653 | (1) |
|
|
654 | (1) |
|
Viewing Auditing Information |
|
|
655 | (1) |
|
Using the Auditpol.exe Command |
|
|
656 | (1) |
|
Windows Server 2016 Auditing Features |
|
|
657 | (1) |
|
Configure and Optimize Storage |
|
|
658 | (4) |
|
Configure iSCSI Target and Initiator |
|
|
658 | (1) |
|
Configure Internet Storage Name Server |
|
|
659 | (2) |
|
Implement Thin Provisioning and Trim |
|
|
661 | (1) |
|
Manage Server Free Space Using Features on Demand |
|
|
661 | (1) |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
662 | (2) |
|
|
664 | (3) |
Chapter 16 Configuring High Availability |
|
667 | (62) |
|
Components of High Availability |
|
|
668 | (1) |
|
Achieving High Availability |
|
|
669 | (2) |
|
High Availability Foundation |
|
|
670 | (1) |
|
Understanding Network Load Balancing |
|
|
671 | (9) |
|
|
673 | (1) |
|
|
673 | (5) |
|
|
678 | (1) |
|
|
678 | (1) |
|
PowerShell Commands for an NLB Cluster |
|
|
679 | (1) |
|
Achieving High Availability with Failover Clustering |
|
|
680 | (20) |
|
Failover Clustering Requirements |
|
|
682 | (2) |
|
Workgroup and Multi-Domain Clusters |
|
|
684 | (1) |
|
Site-Aware, Stretched, or Geographically Dispersed Clusters (Geoclustering) |
|
|
684 | (1) |
|
|
685 | (2) |
|
Validating a Cluster Configuration |
|
|
687 | (5) |
|
|
692 | (3) |
|
Clustered Application Settings |
|
|
695 | (2) |
|
|
697 | (3) |
|
Windows Server 2016 Clustering Features |
|
|
700 | (4) |
|
PowerShell Commands for Clustering |
|
|
704 | (1) |
|
Implementing Storage Spaces Direct |
|
|
705 | (6) |
|
The Benefits of Storage Spaces Direct |
|
|
707 | (1) |
|
|
708 | (1) |
|
Requirements to Set up Storage Spaces Direct |
|
|
708 | (1) |
|
Storage Spaces Direct Using Windows PowerShell |
|
|
709 | (2) |
|
Achieving High Availability with Hyper-V |
|
|
711 | (14) |
|
Implementing a Hyper-V Replica |
|
|
711 | (8) |
|
Understanding Live Migration |
|
|
719 | (3) |
|
Implementing Storage Migration |
|
|
722 | (2) |
|
PowerShell Commands for Hyper-V High Availability |
|
|
724 | (1) |
|
|
725 | (1) |
|
|
726 | (1) |
|
|
726 | (1) |
|
|
727 | (2) |
Chapter 17 Implementing Software Defined Networking |
|
729 | (54) |
|
Understanding Software Defined Networking |
|
|
730 | (7) |
|
|
731 | (1) |
|
Internal DNS Service (iDNS) |
|
|
731 | (3) |
|
Remote Direct Memory Access and Switch |
|
|
|
|
734 | (1) |
|
Windows Server Containers |
|
|
735 | (2) |
|
|
737 | (1) |
|
|
737 | (9) |
|
|
737 | (1) |
|
|
738 | (5) |
|
|
743 | (1) |
|
|
744 | (2) |
|
Hyper-V Installation and Configuration |
|
|
746 | (14) |
|
|
746 | (3) |
|
Hyper-V in Server Manager |
|
|
749 | (1) |
|
|
749 | (2) |
|
Configure Hyper-V Settings |
|
|
751 | (1) |
|
|
752 | (3) |
|
Managing Virtual Hard Disks |
|
|
755 | (5) |
|
Configuring Virtual Machines |
|
|
760 | (16) |
|
Creating and Managing Virtual Machines |
|
|
760 | (12) |
|
Linux and FreeBSD Image Deployments |
|
|
772 | (4) |
|
|
776 | (4) |
|
|
780 | (1) |
|
|
780 | (1) |
|
|
781 | (2) |
Chapter 18 Installing Active Directory |
|
783 | (42) |
|
Verifying the File System |
|
|
784 | (5) |
|
Resilient File System (ReFS) |
|
|
785 | (1) |
|
|
786 | (3) |
|
Verifying Network Connectivity |
|
|
789 | (3) |
|
|
789 | (1) |
|
Tools and Techniques for Testing Network Configuration |
|
|
790 | (2) |
|
Understanding Domain and Forest Functionality |
|
|
792 | (3) |
|
About the Domain Functional Level |
|
|
792 | (2) |
|
About Forest Functionality |
|
|
794 | (1) |
|
Planning the Domain Structure |
|
|
795 | (1) |
|
Installing Active Directory |
|
|
796 | (11) |
|
|
796 | (1) |
|
Read-Only Domain Controllers |
|
|
797 | (1) |
|
|
797 | (1) |
|
Active Directory Prerequisites |
|
|
798 | (1) |
|
|
798 | (8) |
|
Deploying Active Directory in Windows Azure |
|
|
806 | (1) |
|
Installing Additional Domain Controllers by Using Install from Media |
|
|
806 | (1) |
|
Verifying Active Directory Installation |
|
|
807 | (5) |
|
|
807 | (2) |
|
Using Active Directory Administrative Tools |
|
|
809 | (2) |
|
|
811 | (1) |
|
Creating and Configuring Application Data Partitions |
|
|
812 | (5) |
|
Creating Application Data Partitions |
|
|
813 | (1) |
|
|
814 | (1) |
|
|
815 | (1) |
|
Using ntdsutil to Manage Application Data Partitions |
|
|
815 | (2) |
|
Configuring DNS Integration with Active Directory |
|
|
817 | (2) |
|
|
819 | (1) |
|
|
819 | (2) |
|
|
821 | (4) |
Chapter 19 Administer Active Directory |
|
825 | (60) |
|
Active Directory Overview |
|
|
826 | (3) |
|
Understanding Active Directory Features |
|
|
827 | (1) |
|
Understanding Security Principals |
|
|
828 | (1) |
|
|
829 | (2) |
|
|
830 | (1) |
|
|
830 | (1) |
|
Planning the OU Structure |
|
|
831 | (4) |
|
Logical Grouping of Resources |
|
|
831 | (2) |
|
Understanding OU Inheritance |
|
|
833 | (1) |
|
Delegating Administrative Control |
|
|
833 | (2) |
|
|
835 | (1) |
|
|
835 | (4) |
|
|
839 | (5) |
|
Moving, Deleting, and Renaming OUs |
|
|
839 | (1) |
|
Administering Properties of OUs |
|
|
840 | (1) |
|
Delegating Control of OUs |
|
|
841 | (3) |
|
|
844 | (1) |
|
Creating and Managing Active Directory Objects |
|
|
845 | (19) |
|
Overview of Active Directory Objects |
|
|
845 | (7) |
|
Managing Object Properties |
|
|
852 | (4) |
|
|
856 | (2) |
|
Filtering and Advanced Active Directory Features |
|
|
858 | (1) |
|
Moving, Renaming, and Deleting Active Directory Objects |
|
|
859 | (2) |
|
Resetting an Existing Computer Account |
|
|
861 | (1) |
|
Understanding Dynamic Access Control |
|
|
861 | (1) |
|
Managing Security and Permissions |
|
|
862 | (1) |
|
|
863 | (1) |
|
Using Group Policy for Security |
|
|
864 | (4) |
|
Fine-Grained Password Policies |
|
|
866 | (2) |
|
Publishing Active Directory Objects |
|
|
868 | (8) |
|
Making Active Directory Objects Available to Users |
|
|
869 | (1) |
|
|
869 | (1) |
|
Publishing Shared Folders |
|
|
870 | (1) |
|
Querying Active Directory |
|
|
871 | (1) |
|
Using the Active Directory Administrative Center |
|
|
872 | (4) |
|
Using the Command Prompt for Active Directory |
|
|
|
|
876 | (1) |
|
PowerShell for Active Directory |
|
|
877 | (2) |
|
|
879 | (1) |
|
|
879 | (2) |
|
|
881 | (4) |
Chapter 20 Maintaining Active Directory |
|
885 | (76) |
|
Overview of Network Planning |
|
|
886 | (2) |
|
The Three Types of Networks |
|
|
887 | (1) |
|
Exploring Network Constraints |
|
|
887 | (1) |
|
Overview of Active Directory Replication and Sites |
|
|
888 | (6) |
|
Replicating Active Directory |
|
|
889 | (1) |
|
Understanding Active Directory Site Concepts |
|
|
889 | (4) |
|
Understanding Distributed File System Replication |
|
|
893 | (1) |
|
Implementing Sites and Subnets |
|
|
894 | (5) |
|
|
895 | (2) |
|
|
897 | (1) |
|
|
898 | (1) |
|
|
899 | (12) |
|
|
900 | (1) |
|
|
900 | (6) |
|
|
906 | (1) |
|
Configuring Server Topology |
|
|
907 | (3) |
|
Using Universal Group Membership Caching |
|
|
910 | (1) |
|
Configuring DNS SRV Records |
|
|
911 | (1) |
|
Monitoring and Troubleshooting Active Directory Replication |
|
|
911 | (3) |
|
|
912 | (1) |
|
Troubleshooting Replication |
|
|
912 | (2) |
|
Reasons for Creating Multiple Domains |
|
|
914 | (3) |
|
Reasons for Using Multiple Domains |
|
|
914 | (3) |
|
Drawbacks of Multiple Domains |
|
|
917 | (1) |
|
Creating Domain Trees and Forests |
|
|
917 | (8) |
|
Planning Trees and Forests |
|
|
918 | (3) |
|
|
921 | (1) |
|
|
922 | (2) |
|
Joining a New Domain Tree to a Forest |
|
|
924 | (1) |
|
Adding Additional Domain Controllers |
|
|
924 | (1) |
|
Demoting a Domain Controller |
|
|
925 | (1) |
|
Managing Multiple Domains |
|
|
926 | (13) |
|
Managing Single-Master Operations |
|
|
927 | (4) |
|
|
931 | (4) |
|
|
935 | (1) |
|
|
935 | (1) |
|
Managing Global Catalog Servers |
|
|
935 | (2) |
|
Managing Universal Group Membership Caching |
|
|
937 | (1) |
|
Upgrading Existing Domains and Forests |
|
|
938 | (1) |
|
Maintain Active Directory |
|
|
939 | (14) |
|
Overview of the Windows Server 2016 Backup Utility |
|
|
940 | (5) |
|
Setting Up an Active Directory Backup |
|
|
945 | (1) |
|
Restoring Active Directory |
|
|
946 | (2) |
|
Active Directory Recycle Bin |
|
|
948 | (1) |
|
Restartable Active Directory |
|
|
948 | (1) |
|
|
949 | (2) |
|
|
951 | (1) |
|
|
952 | (1) |
|
Wbadmin Command-Line Utility |
|
|
952 | (1) |
|
|
953 | (1) |
|
|
954 | (3) |
|
|
957 | (4) |
Chapter 21 Implementing GPOs |
|
961 | (64) |
|
|
962 | (7) |
|
Understanding Group Policy Settings |
|
|
963 | (3) |
|
The Security Settings Section of the GPO |
|
|
966 | (1) |
|
|
967 | (1) |
|
|
967 | (1) |
|
|
968 | (1) |
|
Planning a Group Policy Strategy |
|
|
969 | (1) |
|
Implementing Group Policy |
|
|
970 | (23) |
|
|
970 | (3) |
|
Linking Existing GPOs to Active Directory |
|
|
973 | (1) |
|
|
973 | (2) |
|
|
975 | (1) |
|
|
975 | (2) |
|
Security Filtering of a Group Policy |
|
|
977 | (2) |
|
Delegating Administrative Control of GPOs |
|
|
979 | (1) |
|
Controlling Inheritance and Filtering Group Policy |
|
|
980 | (1) |
|
Assigning Script Policies |
|
|
981 | (2) |
|
Understanding the Loopback Policy |
|
|
983 | (1) |
|
Managing Network Configuration |
|
|
983 | (2) |
|
Configuring Network Settings |
|
|
985 | (1) |
|
Automatically Enrolling User and |
|
|
|
Computer Certificates in Group Policy |
|
|
985 | (2) |
|
|
987 | (1) |
|
Managing GPOs with Windows PowerShell |
|
|
|
|
988 | (1) |
|
|
989 | (1) |
|
Back Up, Restore, Import, Copy, and Migration Tables |
|
|
990 | (3) |
|
Deploying Software Through a GPO |
|
|
993 | (7) |
|
The Software Management Life Cycle |
|
|
993 | (2) |
|
|
995 | (4) |
|
|
999 | (1) |
|
Implementing Software Deployment |
|
|
1000 | (6) |
|
Preparing for Software Deployment |
|
|
1000 | (1) |
|
Software Restriction Policies |
|
|
1001 | (1) |
|
|
1002 | (1) |
|
Group Policy Slow Link Detection |
|
|
1002 | (1) |
|
Publishing and Assigning Applications |
|
|
1002 | (2) |
|
Applying Software Updates |
|
|
1004 | (1) |
|
Verifying Software Installation |
|
|
1005 | (1) |
|
Configuring Automatic Updates in Group Policy |
|
|
1006 | (1) |
|
Configuring Software Deployment Settings |
|
|
1006 | (5) |
|
The Software Installation Properties Dialog Box |
|
|
1007 | (3) |
|
|
1010 | (1) |
|
Microsoft Windows Installer Settings |
|
|
1011 | (1) |
|
Troubleshooting Group Policies |
|
|
1011 | (7) |
|
|
1013 | (2) |
|
|
1015 | (1) |
|
Using the gpresult.exe Command |
|
|
1016 | (2) |
|
Using the Group Policy Infrastructure Status Dashboard |
|
|
1018 | (1) |
|
|
1018 | (1) |
|
|
1019 | (2) |
|
|
1021 | (4) |
Chapter 22 Understanding Certificates |
|
1025 | (30) |
|
Features of Windows Server 2016 Certificate Services |
|
|
1026 | (22) |
|
Active Directory Certificate Services Roles |
|
|
1027 | (1) |
|
Planning the Certificate Authority Hierarchy |
|
|
1028 | (6) |
|
|
1034 | (3) |
|
Configuring Active Directory Certificate Services |
|
|
1037 | (11) |
|
|
1048 | (1) |
|
|
1049 | (1) |
|
|
1050 | (1) |
|
|
1051 | (4) |
Chapter 23 Configure Access and Information Protection Solutions |
|
1055 | (42) |
|
Implement Active Directory Federation Services |
|
|
1056 | (18) |
|
|
1056 | (4) |
|
What's New for AD FS in Windows Server 2016? |
|
|
1060 | (2) |
|
Active Directory Federation Services Installation |
|
|
1062 | (12) |
|
|
1074 | (1) |
|
Device Registration Service |
|
|
1074 | (1) |
|
Workplace Join Your Device |
|
|
1074 | (1) |
|
Active Directory Rights Management Services |
|
|
1075 | (13) |
|
Considerations and Requirements for AD RMS |
|
|
1076 | (2) |
|
|
1078 | (2) |
|
Managing AD RMS: AD RMS Service Connection Point |
|
|
1080 | (8) |
|
Configuring a Web Application Proxy |
|
|
1088 | (3) |
|
|
1088 | (1) |
|
Configuring Pass-Through Authentication |
|
|
1089 | (1) |
|
Authentication Capabilities |
|
|
1090 | (1) |
|
|
1091 | (2) |
|
|
1093 | (1) |
|
|
1093 | (2) |
|
|
1095 | (2) |
Appendix Answers to the Review Questions |
|
1097 | (20) |
|
Chapter 1 Installing Windows Server 2016 |
|
|
1098 | (1) |
|
Chapter 2 Installing in the Enterprise |
|
|
1098 | (1) |
|
Chapter 3 Configuring Storage and Replication |
|
|
1099 | (1) |
|
Chapter 4 Understanding Hyper-V |
|
|
1100 | (1) |
|
Chapter 5 Configuring High Availability |
|
|
1101 | (1) |
|
Chapter 6 Understanding Clustering |
|
|
1102 | (1) |
|
Chapter 7 Configuring Windows Containers |
|
|
1103 | (1) |
|
Chapter 8 Maintaining Windows Server |
|
|
1103 | (1) |
|
Chapter 9 Understanding Monitoring |
|
|
1104 | (1) |
|
Chapter 10 Configuring TCP/IP |
|
|
1105 | (2) |
|
Chapter 11 Configuring DNS |
|
|
1107 | (1) |
|
Chapter 12 Configuring DHCP |
|
|
1108 | (1) |
|
Chapter 13 Implement IP Address Management |
|
|
1109 | (1) |
|
Chapter 14 Configuring Network Access |
|
|
1110 | (1) |
|
Chapter 15 Understanding File Services |
|
|
1110 | (1) |
|
Chapter 16 Configuring High Availability |
|
|
1111 | (1) |
|
Chapter 17 Implementing Software Defined Networking |
|
|
1112 | (1) |
|
Chapter 18 Installing Active Directory |
|
|
1113 | (1) |
|
Chapter 19 Administer Active Directory |
|
|
1114 | (1) |
|
Chapter 20 Maintaining Active Directory |
|
|
1115 | (1) |
|
Chapter 21 Implementing GPOs |
|
|
1115 | (1) |
|
Chapter 22 Understanding Certificates |
|
|
1116 | (1) |
|
Chapter 23 Configure Access and Information |
|
|
Protection Solutions |
|
1117 | (2) |
Index |
|
1119 | |