Windows Server 2008 R2 secrets [[electronic resource] /] / Orin Thomas |
Autore | Thomas Orin <1973-> |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, 2011 |
Descrizione fisica | 1 online resource (578 p.) |
Disciplina |
005.4476
005.713 |
Collana | Secrets |
Soggetto topico | Operating systems (Computers) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-28308-5
9786613283085 1-118-19784-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Windows Server 2008 R2 Secrets; About the Author; About the Technical Editor; Acknowledgments; Read This First; Who This Book Is For; What This Book Covers; How This Book Is Structured; What You Need to Use This Book; Features and Icons Used in This Book; Part I: Deployment and Administration Secrets; Chapter 1: Windows Server 2008 R2 Deployment Secrets; Choosing an Edition of Windows Server 2008 R2; Deciding Between Types of Installation; Optimizing Your Deployment Image; Minimizing Deployment Time; Activating Windows; Summary; Chapter 2: The Windows Server 2008 R2 Administrator's Toolkit
Choosing the Right Remote Administration ToolRemote Desktop; Management Consoles; Remote Windows PowerShell; Emergency Management Services (When All Else Fails); Summary; Chapter 3: Server Core Secrets; Using Server Core Administration Tools; Performing Server Core Post-Deployment Tasks; Understanding the Sconfig.cmd; Administering with Server Core Configurator; Understanding Server Core Infrastructure Roles; Summary; Chapter 4: Active Directory Domains and Forests; Understanding Forests and Domains; Setting Domain and Forest Functional Levels; Selecting the DNS Server Defining Active Directory Sites Defining FSMO Roles; Using Read-Only Domain Controllers; Securing with Global Catalog Servers and Universal Group Membership Caching; Maintaining the Active Directory Database; Summary; Chapter 5: Effectively Managing Group Policy; Applying Group Policy; Using Group Policy Management Console; Using Important Group Policy Features; Completing Common Group Policy Tasks; Summary; Chapter 6: Managing Users and Computers; Using Organizational Unit Structures; Managing User Accounts; Configuring Account Policies; Managing Groups; Creating Computer Accounts; Summary Chapter 7: Managing Active Directory Certificate Services Understanding Certification Authority Types; Managing Certification Authorities; Using Certificate Templates; Utilizing Certificate Auto enrollment; Recovering Certificates; Backing Up Certificate Services; Revoking Certificates; Summary; Part II: Network Infrastructure and Security Secrets; Chapter 8: Network Addressing; Understanding IPv4 and DHCP; Understanding IPv6; Transitioning to IPv6; Summary; Chapter 9: Securing the Network: Windows Firewall and Network Access Protection; Understanding Windows Firewall with Advanced Security Understanding Connection Security Rules Understanding and Configuring Network Access Protection; Summary; Part III: Shared Folder and Data Protection Secrets; Chapter 10: Secrets behind Shared Folders; Using the Share and Storage Management Console; Using File Server Resource Manager; Working with the Distributed File System; Utilizing BranchCache; Working with Offline Files; Summary; Chapter 11: Keeping Data Private; Encrypting File System; Encrypting with BitLocker; Using Active Directory Rights Management Services; Summary; Chapter 12: Backup and Recovery Using and Configuring Windows Server Backup |
Record Nr. | UNINA-9910461823203321 |
Thomas Orin <1973-> | ||
Hoboken, N.J., : Wiley, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows Server 2008 R2 secrets [[electronic resource] /] / Orin Thomas |
Autore | Thomas Orin <1973-> |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, 2011 |
Descrizione fisica | 1 online resource (578 p.) |
Disciplina |
005.4476
005.713 |
Collana | Secrets |
Soggetto topico | Operating systems (Computers) |
ISBN |
1-118-19785-2
1-283-28308-5 9786613283085 1-118-19784-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Windows Server 2008 R2 Secrets; About the Author; About the Technical Editor; Acknowledgments; Read This First; Who This Book Is For; What This Book Covers; How This Book Is Structured; What You Need to Use This Book; Features and Icons Used in This Book; Part I: Deployment and Administration Secrets; Chapter 1: Windows Server 2008 R2 Deployment Secrets; Choosing an Edition of Windows Server 2008 R2; Deciding Between Types of Installation; Optimizing Your Deployment Image; Minimizing Deployment Time; Activating Windows; Summary; Chapter 2: The Windows Server 2008 R2 Administrator's Toolkit
Choosing the Right Remote Administration ToolRemote Desktop; Management Consoles; Remote Windows PowerShell; Emergency Management Services (When All Else Fails); Summary; Chapter 3: Server Core Secrets; Using Server Core Administration Tools; Performing Server Core Post-Deployment Tasks; Understanding the Sconfig.cmd; Administering with Server Core Configurator; Understanding Server Core Infrastructure Roles; Summary; Chapter 4: Active Directory Domains and Forests; Understanding Forests and Domains; Setting Domain and Forest Functional Levels; Selecting the DNS Server Defining Active Directory Sites Defining FSMO Roles; Using Read-Only Domain Controllers; Securing with Global Catalog Servers and Universal Group Membership Caching; Maintaining the Active Directory Database; Summary; Chapter 5: Effectively Managing Group Policy; Applying Group Policy; Using Group Policy Management Console; Using Important Group Policy Features; Completing Common Group Policy Tasks; Summary; Chapter 6: Managing Users and Computers; Using Organizational Unit Structures; Managing User Accounts; Configuring Account Policies; Managing Groups; Creating Computer Accounts; Summary Chapter 7: Managing Active Directory Certificate Services Understanding Certification Authority Types; Managing Certification Authorities; Using Certificate Templates; Utilizing Certificate Auto enrollment; Recovering Certificates; Backing Up Certificate Services; Revoking Certificates; Summary; Part II: Network Infrastructure and Security Secrets; Chapter 8: Network Addressing; Understanding IPv4 and DHCP; Understanding IPv6; Transitioning to IPv6; Summary; Chapter 9: Securing the Network: Windows Firewall and Network Access Protection; Understanding Windows Firewall with Advanced Security Understanding Connection Security Rules Understanding and Configuring Network Access Protection; Summary; Part III: Shared Folder and Data Protection Secrets; Chapter 10: Secrets behind Shared Folders; Using the Share and Storage Management Console; Using File Server Resource Manager; Working with the Distributed File System; Utilizing BranchCache; Working with Offline Files; Summary; Chapter 11: Keeping Data Private; Encrypting File System; Encrypting with BitLocker; Using Active Directory Rights Management Services; Summary; Chapter 12: Backup and Recovery Using and Configuring Windows Server Backup |
Record Nr. | UNINA-9910789718203321 |
Thomas Orin <1973-> | ||
Hoboken, N.J., : Wiley, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows Server 2008 R2 secrets [[electronic resource] /] / Orin Thomas |
Autore | Thomas Orin <1973-> |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, 2011 |
Descrizione fisica | 1 online resource (578 p.) |
Disciplina |
005.4476
005.713 |
Collana | Secrets |
Soggetto topico | Operating systems (Computers) |
ISBN |
1-118-19785-2
1-283-28308-5 9786613283085 1-118-19784-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Windows Server 2008 R2 Secrets; About the Author; About the Technical Editor; Acknowledgments; Read This First; Who This Book Is For; What This Book Covers; How This Book Is Structured; What You Need to Use This Book; Features and Icons Used in This Book; Part I: Deployment and Administration Secrets; Chapter 1: Windows Server 2008 R2 Deployment Secrets; Choosing an Edition of Windows Server 2008 R2; Deciding Between Types of Installation; Optimizing Your Deployment Image; Minimizing Deployment Time; Activating Windows; Summary; Chapter 2: The Windows Server 2008 R2 Administrator's Toolkit
Choosing the Right Remote Administration ToolRemote Desktop; Management Consoles; Remote Windows PowerShell; Emergency Management Services (When All Else Fails); Summary; Chapter 3: Server Core Secrets; Using Server Core Administration Tools; Performing Server Core Post-Deployment Tasks; Understanding the Sconfig.cmd; Administering with Server Core Configurator; Understanding Server Core Infrastructure Roles; Summary; Chapter 4: Active Directory Domains and Forests; Understanding Forests and Domains; Setting Domain and Forest Functional Levels; Selecting the DNS Server Defining Active Directory Sites Defining FSMO Roles; Using Read-Only Domain Controllers; Securing with Global Catalog Servers and Universal Group Membership Caching; Maintaining the Active Directory Database; Summary; Chapter 5: Effectively Managing Group Policy; Applying Group Policy; Using Group Policy Management Console; Using Important Group Policy Features; Completing Common Group Policy Tasks; Summary; Chapter 6: Managing Users and Computers; Using Organizational Unit Structures; Managing User Accounts; Configuring Account Policies; Managing Groups; Creating Computer Accounts; Summary Chapter 7: Managing Active Directory Certificate Services Understanding Certification Authority Types; Managing Certification Authorities; Using Certificate Templates; Utilizing Certificate Auto enrollment; Recovering Certificates; Backing Up Certificate Services; Revoking Certificates; Summary; Part II: Network Infrastructure and Security Secrets; Chapter 8: Network Addressing; Understanding IPv4 and DHCP; Understanding IPv6; Transitioning to IPv6; Summary; Chapter 9: Securing the Network: Windows Firewall and Network Access Protection; Understanding Windows Firewall with Advanced Security Understanding Connection Security Rules Understanding and Configuring Network Access Protection; Summary; Part III: Shared Folder and Data Protection Secrets; Chapter 10: Secrets behind Shared Folders; Using the Share and Storage Management Console; Using File Server Resource Manager; Working with the Distributed File System; Utilizing BranchCache; Working with Offline Files; Summary; Chapter 11: Keeping Data Private; Encrypting File System; Encrypting with BitLocker; Using Active Directory Rights Management Services; Summary; Chapter 12: Backup and Recovery Using and Configuring Windows Server Backup |
Record Nr. | UNINA-9910820786003321 |
Thomas Orin <1973-> | ||
Hoboken, N.J., : Wiley, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|