Windows Server Cookbook. For Windows Server 2003 & Windows 2000 - Helion
ISBN: 978-05-965-5260-2
stron: 698, Format: ebook
Data wydania: 2005-03-18
Księgarnia: Helion
Cena książki: 152,15 zł (poprzednio: 176,92 zł)
Oszczędzasz: 14% (-24,77 zł)
This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000. From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with:
- files
- event logs
- DNS
- DHCP
- security
- the registry
- backup/restore
Osoby które kupowały "Windows Server Cookbook. For Windows Server 2003 & Windows 2000", wybierały także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Windows Server Cookbook. For Windows Server 2003 & Windows 2000 eBook -- spis treści
- Windows Server Cookbook
- Dedication
- Foreword
- Preface
- Who Should Read This Book
- Whats in This Book
- Conventions Used in This Book
- Using Code Examples
- Safari Enabled
- Wed Like to Hear from You
- Acknowledgments
- 1. Introduction
- 1.1. Approach to the Book
- 1.2. Where to Find the Tools
- 1.3. Running Tools with Alternate Credentials
- 1.4. A Brief Word on Windows Scripting
- 1.5. Getting the Most Out of Your Scripts
- 1.6. Where to Find More Information
- 2. System Configuration
- Introduction
- 2.1. Activating Windows Server 2003
- 2.2. Configuring Automatic Updates
- 2.3. Disabling Windows Update
- 2.4. Installing or Uninstalling a Windows Component
- 2.5. Installing an Application or Service Pack via Group Policy
- 2.6. Viewing System Properties
- 2.7. Setting the System Time, Date, and Time Zone
- 2.8. Setting the Name of a Server
- 2.9. Joining a Server to a Domain
- 2.10. Testing and Resetting the Secure Channel
- 2.11. Viewing and Setting Environment Variables
- 2.12. Configuring Page Files
- 2.13. Putting System Information on the Desktop
- 2.14. Configuring System Startup Options
- 2.15. Configuring System Failure Options
- 2.16. Viewing System Uptime
- 2.17. Disabling the Manage/Configure Your Server Screen
- 2.18. Disabling Shutdown Tracker
- 2.19. Restarting or Shutting Down a Server
- 3. Disks, Drives, and Volumes
- Introduction
- 3.1. Viewing the Disk, Drive, and Volume Layout
- 3.2. Converting a Basic Disk to Dynamic
- 3.3. Enabling Disk Performance Statistics
- 3.4. Formatting a Volume
- 3.5. Setting the Drive Letter of a Volume
- 3.6. Setting the Label of a Volume
- 3.7. Cleaning Up a Volume
- 3.8. Defragmenting a Volume
- 3.9. Compressing a Volume
- 3.10. Checking a Volume for Errors
- 3.11. Making a Disk or Volume Read-Only
- 3.12. Mapping a Network Drive
- 3.13. Creating a Virtual Drive to Another Drive or Folder
- 3.14. Finding Large Files and Folders on a Volume
- 3.15. Enabling Disk Quotas
- 3.16. Configuring a Disk Quota for a User
- 3.17. Viewing Disk Quota Usage
- 4. Files, Folders, and Shares
- Introduction
- 4.1. Creating and Deleting a File
- 4.2. Creating and Deleting a Folder
- 4.3. Undeleting a File
- 4.4. Securely Deleting a File
- 4.5. Viewing the Properties of a File or Folder
- 4.6. Creating a Shortcut
- 4.7. Creating a Link or Junction Point
- 4.8. Creating a Program Alias
- 4.9. Searching for Files or Folders
- 4.10. Copying, Moving, or Renaming a File or Folder
- 4.11. Comparing Files or Folders
- 4.12. Hiding a File or Folder
- 4.13. Making a File or Folder Read-Only
- 4.14. Compressing a File or Folder
- 4.15. Encrypting a File or Folder
- 4.16. Replacing a File That Is in Use
- 4.17. Taking Ownership of a File or Folder
- 4.18. Finding Who Last Opened or Modified a File
- 4.19. Finding Open Files
- 4.20. Finding the Process That Has a File Open
- 4.21. Viewing File Activity
- 4.22. Performing an Action on Several Files at Once
- 4.23. Creating and Deleting Shares
- 4.24. Viewing Shares
- 4.25. Restricting Access to a Share
- 4.26. Enabling Web Sharing
- 4.27. Publishing a Share in Active Directory
- 5. Running and Scheduling Tasks
- Introduction
- 5.1. Running a Task with Alternate Credentials
- 5.2. Running a Task on a Remote Server
- 5.3. Running a Task When a User Logs On
- 5.4. Running a Task via a Login Script
- 5.5. Running a Task via Group Policy
- 5.6. Listing Automatic Tasks
- 5.7. Scheduling a Task
- 5.8. Deleting a Scheduled Task
- 5.9. Listing the Scheduled Tasks
- 6. Processes
- Introduction
- 6.1. Setting the Priority of a Process
- 6.2. Suspending a Process
- 6.3. Killing a Process
- 6.4. Viewing the Running Processes
- 6.5. Searching Processes
- 6.6. Finding the Services Run from a Process
- 6.7. Viewing the Properties of a Process
- 6.8. Viewing the Performance Statistics of a Process
- 6.9. Viewing the DLLs Being Used by a Process
- 6.10. Viewing the APIs Called by a Process
- 6.11. Viewing the Handles a Process Has Open
- 6.12. Viewing the Network Ports a Process Has Open
- 6.13. Script: Process Doctor
- 6.14. Script: Process Terminator
- 7. Services
- Introduction
- 7.1. Starting and Stopping a Service
- 7.2. Running Any Program or Script as a Service
- 7.3. Removing a Service
- 7.4. Setting the Service Startup Type
- 7.5. Setting the Service Account and Password
- 7.6. Performing an Action Automatically When a Service Fails
- 7.7. Viewing the List of Services
- 7.8. Searching Services
- 7.9. Finding the Process a Service Is Running From
- 7.10. Viewing the Antecedent and Dependent Services for a Service
- 7.11. Viewing the Service Load Order
- 7.12. Viewing the Startup History of a Service
- 7.13. Granting the Permission to Manage One or More Services
- 7.14. Script: Robust Service Restart
- 7.15. Script: Service Monitor
- 8. Event Logs
- Introduction
- 8.1. Creating an Event
- 8.2. Viewing Events
- 8.3. Creating a New Event Log
- 8.4. Viewing the Size of an Event Log
- 8.5. Setting the Maximum Size of an Event Log
- 8.6. Setting the Event Log Retention Policy
- 8.7. Clearing the Events in an Event Log
- 8.8. Restricting Access to an Event Log
- 8.9. Searching an Event Log on a Server
- 8.10. Searching the Event Logs on Multiple Servers
- 8.11. Archiving an Event Log
- 8.12. Finding More Information About an Event
- 8.13. Triggering an Action When an Event Occurs
- 8.14. Script: Event Watcher
- 9. Registry
- Introduction
- 9.1. Creating and Deleting a Key
- 9.2. Setting a Value
- 9.3. Setting Keys or Values Using Group Policy
- 9.4. Exporting Registry Files
- 9.5. Importing Registry Files
- 9.6. Searching the Registry
- 9.7. Comparing the Registry
- 9.8. Restricting Access to the Registry
- 9.9. Backing Up and Restoring the Registry
- 9.10. Creating a Registry Link
- 9.11. Setting the Maximum Registry Size
- 9.12. Monitoring Registry Activity
- 9.13. Viewing Processes That Have a Registry Key Open
- 10. Network Configuration
- Introduction
- 10.1. Viewing the Network Configuration
- 10.2. Disabling a Connection
- 10.3. Configuring an IP Address
- 10.4. Renewing or Releasing a DHCP IP Address
- 10.5. Configuring DNS Settings
- 10.6. Registering DNS Records or Flushing the DNS Cache
- 10.7. Finding a Computers Active Directory Site
- 10.8. Managing Routes
- 10.9. Viewing the Open Ports and Connections
- 10.10. Troubleshooting Network Connectivity Problems
- 10.11. Viewing Network Traffic
- 10.12. Configuring TCP/IP Filtering
- 10.13. Measuring Link Speed and Latency Between Two Hosts
- 10.14. Installing the IPv6 Stack
- 11. Security Best Practices
- Introduction
- 11.1. Analyzing Your Security Configuration
- 11.2. Enabling Auditing
- 11.3. Renaming the Administrator and Guest Accounts
- 11.4. Disabling or Removing Unused Accounts, Services, and Software
- 11.5. Enabling Screensaver Locking
- 11.6. Disabling Storage of the LM Password Hash
- 11.7. Requiring Strong Passwords
- 11.8. Getting Notified of New Security Vulnerabilities
- 11.9. Script: Mass Admin Password Changer
- 12. Internet Information Services 6.0
- Introduction
- 12.1. Installing IIS
- 12.2. Stopping and Starting IIS
- 12.3. Creating Web Sites
- 12.4. Hosting Multiple Web Sites
- 12.5. Creating Virtual Directories
- 12.6. Configuring Web Permissions
- 12.7. Configuring IP Address and Domain Name Restrictions
- 12.8. Configuring Web Site Authentication
- 12.9. Obtaining and Installing SSL Certificates
- 12.10. Enabling SSL on a Web Site
- 12.11. Backing Up SSL Certificates
- 12.12. Configuring Web Site QoS Settings
- 12.13. Configuring Web Site Logging
- 12.14. Configuring Web Site Redirection
- 12.15. Enabling Direct Metabase Editing
- 12.16. Backing Up and Restoring the Metabase
- 12.17. Exporting and Importing the Metabase
- 12.18. Enabling Dynamic Content
- 12.19. Creating Application Pools
- 12.20. Configuring Application Pool Identities
- 12.21. Creating Applications
- 12.22. Isolating Applications into Pools
- 12.23. Configuring Application Pool Recycling
- 12.24. Creating FTP Sites
- 12.25. Configuring FTP Authentication
- 12.26. Configuring FTP User Isolation
- 13. Domain Name System (DNS)
- Introduction
- 13.1. Installing the DNS Server
- 13.2. Starting and Stopping the DNS Server
- 13.3. Modifying DNS Server Configuration
- 13.4. Creating a Zone
- 13.5. Viewing a DNS Servers Zones
- 13.6. Converting a Zone to an Active Directory-Integrated Zone
- 13.7. Moving Active Directory-Integrated Zones into an Application Partition
- 13.8. Creating a Stub Zone
- 13.9. Configuring Conditional Forwarding
- 13.10. Configuring Zone Transfer
- 13.11. Creating and Deleting Resource Records
- 13.12. Querying Resource Records
- 13.13. Scavenging Old Resource Records
- 13.14. Clearing the DNS Cache
- 13.15. Enabling DNS Server Debug Logging
- 13.16. Viewing DNS Server Utilization Statistics
- 13.17. Preventing Cache Pollution on DNS Servers
- 13.18. Preventing Windows Clients from Attempting Dynamic Updates
- 13.19. Script: DNS Server Configuration Checker
- 14. DHCP Server
- Introduction
- 14.1. Installing DHCP Server
- 14.2. Authorizing a DHCP Server
- 14.3. Configuring Server Options
- 14.4. Enabling Address Conflict Detection
- 14.5. Creating a Scope
- 14.6. Creating a Superscope
- 14.7. Activating or Deactivating a Scope
- 14.8. Configuring Scope Options
- 14.9. Enabling Dynamic DNS Updates from the DHCP Server
- 14.10. Managing the Leases for a Scope
- 14.11. Creating a Reservation
- 14.12. Enabling DHCP Audit Logging
- 14.13. Modifying the DHCP Database and Audit Log Paths
- 14.14. Backing Up the DHCP Database
- 14.15. Restoring the DHCP Database
- 14.16. Importing and Exporting DHCP Server Configuration
- 14.17. Viewing DHCP Utilization Statistics
- 14.18. Finding the DHCP Servers on a Subnet
- 14.19. Running DHCP Server on a Domain Controller
- 15. Active Directory
- Introduction
- 15.1. Creating a New Active Directory Forest
- 15.2. Promoting a Domain Controller from Media
- 15.3. Uninstalling Active Directory
- 15.4. Upgrading from Windows 2000 to Windows Server 2003
- 15.5. Raising the Functional Level
- 15.6. Backing Up Active Directory
- 15.7. Restoring Active Directory
- 15.8. Searching for Objects in a Domain
- 15.9. Creating an Object
- 15.10. Modifying an Object
- 15.11. Moving an Object
- 15.12. Moving an Object to a Different Domain
- 15.13. Renaming an Object
- 15.14. Deleting an Object
- 15.15. Exporting and Importing Objects Using LDIF or CSV
- 15.16. Finding the Closest Domain Controller
- 15.17. Enabling and Disabling the Global Catalog
- 15.18. Finding the FSMO Role Holders
- 15.19. Transferring or Seizing a FSMO Role
- 15.20. Creating and Removing a Trust
- 15.21. Viewing the Trusts for a Domain
- 15.22. Verifying and Resetting Trusts
- 15.23. Enabling Diagnostics Logging
- 15.24. Script: Displaying the Structure of a Forest
- 16. Domain User, Group, and Computer Accounts
- Introduction
- 16.1. Creating a User Account
- 16.2. Creating a Large Number of Users
- 16.3. Modifying an Attribute for Several Users at Once
- 16.4. Unlocking a User
- 16.5. Troubleshooting Account Lockout Problems
- 16.6. Viewing and Modifying the Account Lockout and Password Policies
- 16.7. Enabling and Disabling a User Account
- 16.8. Setting a Users Password
- 16.9. Setting a Users Account Options
- 16.10. Setting a Users Profile Attributes
- 16.11. Finding a Users Last Logon Time
- 16.12. Creating a Group Account
- 16.13. Viewing the Members of a Group
- 16.14. Viewing a Users Group Membership
- 16.15. Adding and Removing Members of a Group
- 16.16. Changing the Scope or Type of a Group
- 16.17. Creating a Computer Account
- 16.18. Joining a Computer to a Domain
- 16.19. Renaming a Computer
- 16.20. Resetting a Computer Account
- 17. Exchange Server 2003
- Introduction
- 17.1. Preparing Active Directory for Exchange
- 17.2. Installing the First Exchange Server
- 17.3. Installing Additional Exchange Servers
- 17.4. Installing an Exchange Service Pack
- 17.5. Creating Unattended Installation Files for Exchange and Exchange Service Pack
- 17.6. Installing Exchange Management Tools
- 17.7. Delegating Exchange for the First Time
- 17.8. Stopping and Starting Exchange Server
- 17.9. Mail-Enabling a User
- 17.10. Mail-Disabling a User
- 17.11. Mailbox-Enabling a User
- 17.12. Deleting a Users Mailbox
- 17.13. Purging a Deleted Mailbox
- 17.14. Reconnecting a Deleted Mailbox
- 17.15. Enumerating Disconnected Mailboxes
- 17.16. Moving a Mailbox
- 17.17. Viewing Mailbox Sizes and Message Counts
- 17.18. Mail-Enabling a Contact
- 17.19. Mail-Disabling a Contact
- 17.20. Creating a Mail-Enabled Distribution List
- 17.21. Creating a Query-Based Distribution List
- 17.22. Creating an Address List
- 17.23. Creating a Recipient Policy
- 17.24. Creating a Storage Group
- 17.25. Creating a Mailbox Store
- 17.26. Listing Domain Controllers and Global Catalog Servers Used by an Exchange Server
- 17.27. Mounting and Dismounting Mailbox Stores
- A. Introduction to WSH
- A.1. How to Write Scripts
- A.2. WSH 2.0 Versus 5.6
- B. Introduction to WMI
- B.1. Referencing an Object
- B.2. Enumerating Objects of a Particular Class
- B.3. Searching with WQL
- B.4. Authentication with WMI
- C. Introduction to ADSI
- C.1. Objects and Interfaces
- C.2. Namespaces, ProgIDs, and ADsPaths
- C.3. Retrieving Objects
- D. List of Default Environment Variables
- E. List of Default Processes
- F. List of Default Services
- Index
- About the Author
- Colophon
- Copyright