Windows Server® 2012 Pocket Consultant

Book description

Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of Windows Server 2012. Zero in on core operations and daily tasks using quick-reference tables, instructions, and lists. You’ll get the focused information to solve problems and get the job done—whether at your desk or in the field.

Get fast facts on these essential topics:

  • Managing servers running Windows Server 2012

  • Creating user and group accounts

  • Monitoring services, processes, and events

  • Administering Active Directory

  • Managing files, folders, drives

  • Automating administrative tasks and policies

  • Administering data sharing, security, and auditing

  • Managing TCP/IP networking

  • Implementing data backup and recovery

  • Administering network printers and print services

  • Table of contents

    1. Windows Server® 2012 Pocket Consultant
    2. Dedication
    3. Introduction
      1. Who Is This Book For?
      2. How This Book Is Organized
      3. Conventions Used in This Book
      4. Other Resources
      5. Errata & Book Support
      6. We Want to Hear from You
      7. Stay in Touch
    4. I. Windows Server 2012 Administration Fundamentals
      1. 1. Windows Server 2012 Administration Overview
        1. Windows Server 2012 and Windows 8
        2. Getting to Know Windows Server 2012
        3. Power Management Options
        4. Networking Tools and Protocols
          1. Understanding Networking Options
          2. Working with Networking Protocols
        5. Domain Controllers, Member Servers, and Domain Services
          1. Working with Active Directory
          2. Using Read-Only Domain Controllers
          3. Using Restartable Active Directory Domain Services
        6. Name-Resolution Services
          1. Using Domain Name System
          2. Using Windows Internet Name Service
          3. Using Link-Local Multicast Name Resolution
        7. Frequently Used Tools
          1. Windows PowerShell 3.0
          2. Windows Remote Management
            1. Enabling and Using WinRM
            2. Configuring WinRM
      2. 2. Managing Servers Running Windows Server 2012
        1. Server Roles, Role Services, and Features for Windows Server 2012
        2. Full-Server, Minimal-Interface, and Server Core Installations
          1. Navigating Server Core
        3. Installing Windows Server 2012
          1. Performing a Clean Installation
          2. Performing an Upgrade Installation
          3. Performing Additional Administration Tasks During Installation
            1. Using the Command Line During Installation
            2. Forcing Disk Partition Removal During Installation
            3. Loading Disk Device Drivers During Installation
            4. Creating, Formatting, Deleting, and Extending Disk Partitions During Installation
            5. Creating Disk Partitions During Installation
            6. Formatting Disk Partitions During Installation
            7. Deleting Disk Partitions During Installation
            8. Extending Disk Partitions During Installation
          4. Changing the Installation Type
            1. Converting Full-Server and Minimal-Interface Installations
            2. Converting Server Core Installations
        4. Managing Roles, Role Services, and Features
          1. Performing Initial Configuration Tasks
          2. Server Manager Essentials and Binaries
          3. Managing Your Servers Remotely
          4. Connecting to and Working with Remote Servers
          5. Adding and Removing Roles, Role Services, and Features
        5. Managing System Properties
          1. The Computer Name Tab
          2. The Hardware Tab
          3. The Advanced Tab
            1. Setting Windows Performance
            2. Setting Application Performance
            3. Configuring Virtual Memory
            4. Configuring Data Execution Prevention
            5. Using and Configuring DEP
            6. Understanding DEP Compatibility
            7. Configuring System and User Environment Variables
            8. Creating an Environment Variable
            9. Editing an Environment Variable
            10. Deleting an Environment Variable
            11. Configuring System Startup and Recovery
            12. Setting Startup Options
            13. Setting Recovery Options
          4. The Remote Tab
      3. 3. Monitoring Processes, Services, and Events
        1. Managing Applications, Processes, and Performance
          1. Task Manager
          2. Viewing and Working with Processes
          3. Administering Processes
          4. Viewing System Services
          5. Viewing and Managing System Performance
            1. CPU Usage: The Basics
            2. Memory Usage: The Basics
            3. Network Usage: The Basics
          6. Viewing and Managing Remote User Sessions
        2. Managing System Services
          1. Navigating Services in Server Manager
          2. Navigating Services in Computer Management
          3. Starting, Stopping, and Pausing Services
          4. Configuring Service Startup
          5. Configuring Service Logon
          6. Configuring Service Recovery
          7. Disabling Unnecessary Services
        3. Event Logging and Viewing
          1. Accessing Events in Server Manager
          2. Accessing Events in Event Viewer
          3. Filtering Event Logs
          4. Setting Event Log Options
          5. Clearing Event Logs
          6. Archiving Event Logs
            1. Archive Log Formats
            2. Creating Log Archives
            3. Viewing Log Archives
        4. Monitoring Server Performance and Activity
          1. Why Monitor Your Server?
          2. Getting Ready to Monitor
          3. Using the Monitoring Consoles
          4. Choosing Counters to Monitor
          5. Performance Logging
            1. Creating and Managing Data Collector Sets
            2. Collecting Performance Counter Data
            3. Collecting Performance Trace Data
            4. Collecting Configuration Data
          6. Viewing Data Collector Reports
          7. Configuring Performance Counter Alerts
        5. Tuning System Performance
          1. Monitoring and Tuning Memory Usage
          2. Monitoring and Tuning Processor Usage
          3. Monitoring and Tuning Disk I/O
          4. Monitoring and Tuning Network Bandwidth and Connectivity
      4. 4. Automating Administrative Tasks, Policies, and Procedures
        1. Understanding Group Policies
          1. Group Policy Essentials
          2. In What Order Are Multiple Policies Applied?
          3. When Are Group Policies Applied?
          4. Group Policy Requirements and Version Compatibility
        2. Navigating Group Policy Changes
        3. Managing Local Group Policies
          1. Local Group Policy Objects
          2. Accessing the Top-Level Local Policy Settings
          3. Local Group Policy Object Settings
          4. Accessing Administrator, Non-Administrator, and User-Specific Local Group Policy
        4. Managing Site, Domain, and Organizational Unit Policies
          1. Understanding Domain and Default Policies
          2. Using the Group Policy Management Console
          3. Getting to Know the Policy Editor
          4. Using Administrative Templates to Set Policies
          5. Creating and Linking GPOs
          6. Creating and Using Starter GPOs
          7. Delegating Privileges for Group Policy Management
          8. Blocking, Overriding, and Disabling Policies
        5. Maintaining and Troubleshooting Group Policy
          1. Refreshing Group Policy
          2. Configuring the Refresh Interval
          3. Modeling Group Policy for Planning Purposes
          4. Copying, Pasting, and Importing Policy Objects
          5. Backing Up and Restoring Policy Objects
          6. Determining Current Group Policy Settings and Refresh Status
          7. Disabling an Unused Part of Group Policy
          8. Changing Policy Processing Preferences
          9. Configuring Slow-Link Detection
          10. Removing Links and Deleting GPOs
          11. Troubleshooting Group Policy
          12. Fixing Default Group Policy Objects
        6. Managing Users and Computers with Group Policy
          1. Centrally Managing Special Folders
            1. Redirecting a Special Folder to a Single Location
            2. Redirecting a Special Folder Based on Group Membership
            3. Removing Redirection
          2. User and Computer Script Management
            1. Assigning Computer Startup and Shutdown Scripts
            2. Assigning User Logon and Logoff Scripts
          3. Deploying Software Through Group Policy
            1. Getting to Know Software Installation Policy
            2. Deploying Software Throughout Your Organization
            3. Configuring Software Deployment Options
            4. Updating Deployed Software
            5. Upgrading Deployed Software
          4. Automatically Enrolling Computer and User Certificates
          5. Managing Automatic Updates in Group Policy
            1. Configuring Automatic Updates
            2. Optimizing Automatic Updates
            3. Using Intranet Update Service Locations
      5. 5. Enhancing Computer Security
        1. Using Security Templates
          1. Using the Security Templates and Security Configuration And Analysis Snap-ins
          2. Reviewing and Changing Template Settings
            1. Changing Settings for Account, Local, and Event Log Policies
            2. Configuring Restricted Groups
            3. Enabling, Disabling, and Configuring System Services
            4. Configuring Security Settings for Registry and File System Paths
          3. Analyzing, Reviewing, and Applying Security Templates
          4. Deploying Security Templates to Multiple Computers
        2. Using the Security Configuration Wizard
          1. Creating Security Policies
          2. Editing Security Policies
          3. Applying Security Policies
          4. Rolling Back the Last-Applied Security Policy
          5. Deploying a Security Policy to Multiple Computers
    5. II. Windows Server 2012 Directory Services Administration
      1. 6. Using Active Directory
        1. Introducing Active Directory
          1. Active Directory and DNS
          2. Read-Only Domain Controller Deployment
          3. Active Directory Features for Windows Server 2008 R2
          4. Active Directory Features for Windows Server 2012
        2. Working with Domain Structures
          1. Understanding Domains
          2. Understanding Domain Forests and Domain Trees
          3. Understanding Organizational Units
          4. Understanding Sites and Subnets
        3. Working with Active Directory Domains
          1. Using Computers with Active Directory
          2. Working with Domain Functional Levels
            1. Using Windows Server 2003 Functional Level
            2. Using Windows Server 2008 Functional Level
            3. Using Windows Server 2008 R2 Functional Level
            4. Using Windows Server 2012 Functional Level
          3. Raising or Lowering Domain and Forest Functionality
        4. Understanding the Directory Structure
          1. Exploring the Data Store
          2. Exploring Global Catalogs
          3. Universal Group Membership Caching
          4. Replication and Active Directory
          5. Active Directory and LDAP
          6. Understanding Operations Master Roles
        5. Using the Active Directory Recycle Bin
          1. Preparing Schema for the Recycle Bin
          2. Recovering Deleted Objects
            1. Using Ldp.exe for Basic Recovery
            2. Using Windows PowerShell for Basic and Advanced Recovery
            3. Using the Enhanced Recycle Bin for Recovery
      2. 7. Core Active Directory Administration
        1. Tools for Managing Active Directory
          1. Active Directory Administration Tools
          2. Active Directory Command-Line Tools
          3. Active Directory Support Tools
          4. Using Active Directory Users And Computers
          5. Active Directory Administrative Center and Windows PowerShell
        2. Managing Computer Accounts
          1. Creating Computer Accounts on a Workstation or Server
          2. Creating Computer Accounts in Active Directory Administrative Center
          3. Creating Computer Accounts in Active Directory Users And Computers
          4. Viewing and Editing Computer Account Properties
          5. Deleting, Disabling, and Enabling Computer Accounts
          6. Resetting Locked Computer Accounts
          7. Moving Computer Accounts
          8. Managing Computers
          9. Joining a Computer to a Domain or Workgroup
          10. Using Offline Domain Join
        3. Managing Domain Controllers, Roles, and Catalogs
          1. Installing and Demoting Domain Controllers
          2. Viewing and Transferring Domainwide Roles
          3. Viewing and Transferring the Domain Naming Master Role
          4. Viewing and Transferring Schema Master Roles
          5. Transferring Roles Using the Command Line
          6. Seizing Roles Using the Command Line
          7. Configuring Global Catalogs
          8. Configuring Universal Group Membership Caching
        4. Managing Organizational Units
          1. Creating Organizational Units
          2. Viewing and Editing Organizational Unit Properties
          3. Renaming and Deleting Organizational Units
          4. Moving Organizational Units
        5. Managing Sites
          1. Creating Sites
          2. Creating Subnets
          3. Associating Domain Controllers with Sites
          4. Configuring Site Links
          5. Configuring Site Link Bridges
        6. Maintaining Active Directory
          1. Using ADSI Edit
          2. Examining Intersite Topology
        7. Troubleshooting Active Directory
      3. 8. Creating User and Group Accounts
        1. The Windows Server Security Model
          1. Authentication Protocols
          2. Access Controls
          3. Claims-Based Access Controls
          4. Central Access Policies
        2. Differences Between User and Group Accounts
          1. User Accounts
            1. Logon Names, Passwords, and Public Certificates
            2. Security Identifiers and User Accounts
          2. Group Accounts
            1. Group Types
            2. Group Scope
            3. Security Identifiers and Group Accounts
            4. When to Use Domain Local, Global, and Universal Groups
        3. Default User Accounts and Groups
          1. Built-in User Accounts
          2. Predefined User Accounts
            1. The Administrator Account
            2. The Guest Account
          3. Built-in and Predefined Groups
          4. Implicit Groups and Special Identities
        4. Account Capabilities
          1. Privileges
          2. Logon Rights
          3. Built-in Capabilities for Groups in Active Directory
        5. Using Default Group Accounts
          1. Groups Used by Administrators
          2. Implicit Groups and Identities
        6. User Account Setup and Organization
          1. Account Naming Policies
            1. Rules for Display Names
            2. Rules for Logon Names
            3. Naming Schemes
          2. Password and Account Policies
            1. Using Secure Passwords
            2. Setting Account Policies
        7. Configuring Account Policies
          1. Configuring Password Policies
            1. Enforce Password History
            2. Maximum Password Age
            3. Minimum Password Age
            4. Minimum Password Length
            5. Passwords Must Meet Complexity Requirements
            6. Store Password Using Reversible Encryption For All Users
          2. Configuring Account Lockout Policies
            1. Account Lockout Threshold
            2. Account Lockout Duration
            3. Reset Account Lockout Counter After
          3. Configuring Kerberos Policies
            1. Enforce User Logon Restrictions
            2. Maximum Lifetime
            3. Maximum Tolerance
        8. Configuring User Rights Policies
          1. Configuring Global User Rights
          2. Configuring Local User Rights
        9. Adding a User Account
          1. Creating Domain User Accounts
          2. Creating Local User Accounts
        10. Adding a Group Account
          1. Creating a Global Group
          2. Creating a Local Group and Assigning Members
        11. Handling Global Group Membership
          1. Managing Individual Membership
          2. Managing Multiple Memberships in a Group
          3. Setting the Primary Group for Users and Computers
        12. Implementing Managed Accounts
          1. Creating and Using Managed Service Accounts
          2. Configuring Services to Use Managed Service Accounts
          3. Removing Managed Service Accounts
          4. Moving Managed Service Accounts
          5. Using Virtual Accounts
      4. 9. Managing User and Group Accounts
        1. Managing User Contact Information
          1. Setting Contact Information
          2. Searching for Users and Groups in Active Directory
        2. Configuring the User’s Environment Settings
          1. System Environment Variables
          2. Logon Scripts
          3. Assigning Home Directories
        3. Setting Account Options and Restrictions
          1. Managing Logon Hours
            1. Configuring Logon Hours
            2. Enforcing Logon Hours
          2. Setting Permitted Logon Workstations
          3. Setting Dial-in and VPN Privileges
          4. Setting Account Security Options
        4. Managing User Profiles
          1. Local, Roaming, and Mandatory Profiles
            1. Working with Roaming and Mandatory Profiles
            2. Restricting Roaming Profiles
            3. Creating Local Profiles
            4. Creating Roaming Profiles
            5. Creating Mandatory Profiles
          2. Using the System Utility to Manage Local Profiles
            1. Creating a Profile by Hand
            2. Copying an Existing Profile to a New User Account
            3. Copying or Restoring a Profile
            4. Deleting a Local Profile and Assigning a New One
            5. Changing the Profile Type
        5. Updating User and Group Accounts
          1. Renaming User and Group Accounts
          2. Copying Domain User Accounts
          3. Importing and Exporting Accounts
          4. Deleting User and Group Accounts
          5. Changing and Resetting Passwords
          6. Enabling User Accounts
            1. Account Disabled
            2. Account Locked Out
            3. Account Expired
        6. Managing Multiple User Accounts
          1. Setting Profiles for Multiple Accounts
          2. Setting Logon Hours for Multiple Accounts
          3. Setting Permitted Logon Workstations for Multiple Accounts
          4. Setting Logon, Password, and Expiration Properties for Multiple Accounts
        7. Troubleshooting Logon Problems
        8. Viewing and Setting Active Directory Permissions
    6. III. Windows Server 2012 Data Administration
      1. 10. Managing File Systems and Drives
        1. Managing the File Services Role
        2. Adding Hard Disk Drives
          1. Physical Drives
          2. Preparing a Physical Drive for Use
          3. Using Disk Management
          4. Removable Storage Devices
          5. Installing and Checking for a New Drive
          6. Understanding Drive Status
        3. Working with Basic, Dynamic, and Virtual Disks
          1. Using Basic and Dynamic Disks
          2. Special Considerations for Basic and Dynamic Disks
          3. Changing Drive Types
            1. Converting a Basic Disk to a Dynamic Disk
            2. Changing a Dynamic Disk Back to a Basic Disk
          4. Reactivating Dynamic Disks
          5. Rescanning Disks
          6. Moving a Dynamic Disk to a New System
          7. Managing Virtual Hard Disks
        4. Using Basic Disks and Partitions
          1. Partitioning Basics
          2. Creating Partitions and Simple Volumes
          3. Formatting Partitions
        5. Compressing Drives and Data
          1. Compressing Drives
          2. Compressing Directories and Files
          3. Expanding Compressed Drives
          4. Expanding Compressed Directories and Files
        6. Encrypting Drives and Data
          1. Understanding Encryption and the Encrypting File System
          2. Encrypting Directories and Files
          3. Working with Encrypted Files and Folders
          4. Configuring Recovery Policy
          5. Decrypting Files and Directories
      2. 11. Configuring Volumes and RAID Arrays
        1. Using Volumes and Volume Sets
          1. Understanding Volume Basics
          2. Understanding Volume Sets
          3. Creating Volumes and Volume Sets
          4. Deleting Volumes and Volume Sets
          5. Managing Volumes
        2. Improving Performance and Fault Tolerance with RAID
        3. Implementing RAID on Windows Server 2012
          1. Implementing RAID-0: Disk Striping
          2. Implementing RAID-1: Disk Mirroring
            1. Creating a Mirror Set in Disk Management
            2. Mirroring an Existing Volume
          3. Implementing RAID-5: Disk Striping with Parity
            1. Creating a Striped Set with Parity in Disk Management
        4. Managing RAID and Recovering from Failures
          1. Breaking a Mirrored Set
          2. Resynchronizing and Repairing a Mirrored Set
          3. Repairing a Mirrored System Volume to Enable Boot
          4. Removing a Mirrored Set
          5. Repairing a Striped Set Without Parity
          6. Regenerating a Striped Set with Parity
        5. Standards-Based Storage Management
          1. Getting Started with Standards-Based Storage
          2. Working with Standards-Based Storage
          3. Creating Storage Pools and Allocating Space
          4. Creating a Storage Space
          5. Creating a Virtual Disk in a Storage Space
          6. Creating a Standard Volume
        6. Managing Existing Partitions and Drives
          1. Assigning Drive Letters and Paths
          2. Changing or Deleting the Volume Label
          3. Deleting Partitions and Drives
          4. Converting a Volume to NTFS
            1. The Convert Utility Syntax
            2. Using the Convert Utility
          5. Resizing Partitions and Volumes
          6. Repairing Disk Errors and Inconsistencies Automatically
            1. Checking Disks Manually
            2. Running Check Disk Interactively
          7. Analyzing and Optimizing Disks
      3. 12. Data Sharing, Security, and Auditing
        1. Using and Enabling File Sharing
        2. Configuring Standard File Sharing
          1. Viewing Existing Shares
          2. Creating Shared Folders in Computer Management
          3. Creating Shared Folders in Server Manager
          4. Changing Shared Folder Settings
        3. Managing Share Permissions
          1. Various Share Permissions
          2. Viewing and Configuring Share Permissions
        4. Managing Existing Shares
          1. Understanding Special Shares
          2. Connecting to Special Shares
          3. Viewing User and Computer Sessions
            1. Managing Sessions and Shares
              1. Ending Individual Sessions
              2. Ending All Sessions
            2. Managing Open Resources
              1. Closing an Open File
              2. Closing All Open Files
          4. Stopping File and Folder Sharing
        5. Configuring NFS Sharing
        6. Using Shadow Copies
          1. Understanding Shadow Copies
          2. Creating Shadow Copies
          3. Restoring a Shadow Copy
          4. Reverting an Entire Volume to a Previous Shadow Copy
          5. Deleting Shadow Copies
          6. Disabling Shadow Copies
        7. Connecting to Network Drives
          1. Mapping a Network Drive
          2. Disconnecting a Network Drive
        8. Object Management, Ownership, and Inheritance
          1. Objects and Object Managers
          2. Object Ownership and Transfer
          3. Object Inheritance
        9. File and Folder Permissions
          1. Understanding File and Folder Permissions
          2. Setting Basic File and Folder Permissions
          3. Setting Special Permissions on Files and Folders
          4. Setting Claims-Based Permissions
        10. Auditing System Resources
          1. Setting Auditing Policies
          2. Auditing Files and Folders
          3. Auditing the Registry
          4. Auditing Active Directory Objects
        11. Using, Configuring, and Managing NTFS Disk Quotas
          1. Understanding NTFS Disk Quotas and How NTFS Quotas Are Used
          2. Setting NTFS Disk Quota Policies
          3. Enabling NTFS Disk Quotas on NTFS Volumes
          4. Viewing Disk Quota Entries
          5. Creating Disk Quota Entries
          6. Deleting Disk Quota Entries
          7. Exporting and Importing NTFS Disk Quota Settings
          8. Disabling NTFS Disk Quotas
        12. Using, Configuring, and Managing Resource Manager Disk Quotas
          1. Understanding Resource Manager Disk Quotas
          2. Managing Disk Quota Templates
          3. Creating Resource Manager Disk Quotas
      4. 13. Data Backup and Recovery
        1. Creating a Backup and Recovery Plan
          1. Figuring Out a Backup Plan
          2. The Basic Types of Backup
          3. Differential and Incremental Backups
          4. Selecting Backup Devices and Media
          5. Common Backup Solutions
          6. Buying and Using Backup Media
          7. Selecting a Backup Utility
        2. Backing Up Your Data: The Essentials
          1. Installing the Windows Backup and Recovery Utilities
          2. Getting Started with Windows Server Backup
          3. Getting Started with the Backup Command-Line Utility
          4. Working with Wbadmin Commands
          5. Using General-Purpose Commands
          6. Using Backup Management Commands
          7. Using Recovery Management Commands
        3. Performing Server Backups
          1. Configuring Scheduled Backups
          2. Modifying or Stopping Scheduled Backups
          3. Creating and Scheduling Backups with Wbadmin
          4. Running Manual Backups
          5. Recovering Your Server from Hardware or Startup Failure
          6. Recovering from a Failed Start
          7. Starting a Server in Safe Mode
          8. Backing Up and Restoring the System State
          9. Restoring Active Directory
          10. Restoring the Operating System and the Full System
          11. Restoring Applications, Nonsystem Volumes, and Files and Folders
        4. Managing Encryption Recovery Policy
          1. Understanding Encryption Certificates and Recovery Policy
          2. Configuring the EFS Recovery Policy
        5. Backing Up and Restoring Encrypted Data and Certificates
          1. Backing Up Encryption Certificates
          2. Restoring Encryption Certificates
    7. IV. Windows Server 2012 Network Administration
      1. 14. Managing TCP/IP Networking
        1. Navigating Networking in Windows Server 2012
        2. Managing Networking in Windows 8 and Windows Server 2012
        3. Installing TCP/IP Networking
        4. Configuring TCP/IP Networking
          1. Configuring Static IP Addresses
            1. Using the ping Command to Check an Address
            2. Configuring a Static IPv4 or IPv6 Address
          2. Configuring Dynamic IP Addresses and Alternate IP Addressing
          3. Configuring Multiple Gateways
          4. Configuring Networking for Hyper-V
        5. Managing Network Connections
          1. Checking the Status, Speed, and Activity for Network Connections
          2. Enabling and Disabling Network Connections
          3. Renaming Network Connections
      2. 15. Running DHCP Clients and Servers
        1. Understanding DHCP
          1. Using Dynamic IPv4 Addressing and Configuration
          2. Using Dynamic IPv6 Addressing and Configuration
          3. Checking IP Address Assignment
          4. Understanding Scopes
        2. Installing a DHCP Server
          1. Installing DHCP Components
          2. Starting and Using the DHCP Console
          3. Connecting to Remote DHCP Servers
          4. Starting and Stopping a DHCP Server
          5. Authorizing a DHCP Server in Active Directory
        3. Configuring DHCP Servers
          1. Configuring Server Bindings
          2. Updating DHCP Statistics
          3. DHCP Auditing and Troubleshooting
          4. Integrating DHCP and DNS
          5. Integrating DHCP and NAP
          6. Avoiding IP Address Conflicts
          7. Saving and Restoring the DHCP Configuration
        4. Managing DHCP Scopes
          1. Creating and Managing Superscopes
            1. Creating Superscopes
            2. Adding Scopes to a Superscope
            3. Removing Scopes from a Superscope
            4. Activating and Deactivating a Superscope
            5. Deleting a Superscope
          2. Creating and Managing Scopes
            1. Creating Normal Scopes for IPv4 Addresses
            2. Creating Normal Scopes for IPv6 Addresses
            3. Creating Multicast Scopes
            4. Setting Scope Options
              1. Viewing and Assigning Server Options
              2. Viewing and Assigning Scope Options
              3. Viewing and Assigning Reservation Options
            5. Modifying Scopes
            6. Activating and Deactivating Scopes
            7. Enabling the Bootstrap Protocol
            8. Removing a Scope
            9. Configuring Multiple Scopes on a Network
          3. Creating and Managing Failover Scopes
            1. Creating Failover Scopes
            2. Modifying or Removing Failover Scopes
        5. Managing the Address Pool, Leases, and Reservations
          1. Viewing Scope Statistics
          2. Enabling and Configuring MAC Address Filtering
          3. Setting a New Exclusion Range
          4. Reserving DHCP Addresses
            1. Releasing Addresses and Leases
          5. Modifying Reservation Properties
          6. Deleting Leases and Reservations
        6. Backing Up and Restoring the DHCP Database
          1. Backing Up the DHCP Database
          2. Restoring the DHCP Database from Backup
          3. Using Backup and Restore to Move the DHCP Database to a New Server
          4. Forcing the DHCP Server Service to Regenerate the DHCP Database
          5. Reconciling Leases and Reservations
      3. 16. Optimizing DNS
        1. Understanding DNS
          1. Integrating Active Directory and DNS
          2. Enabling DNS on the Network
        2. Configuring Name Resolution on DNS Clients
        3. Installing DNS Servers
          1. Installing and Configuring the DNS Server Service
          2. Configuring a Primary DNS Server
          3. Configuring a Secondary DNS Server
          4. Configuring Reverse Lookups
          5. Configuring Global Names
        4. Managing DNS Servers
          1. Adding and Removing Servers to Manage
          2. Starting and Stopping a DNS Server
          3. Using DNSSEC and Signing Zones
          4. Creating Child Domains Within Zones
          5. Creating Child Domains in Separate Zones
          6. Deleting a Domain or Subnet
        5. Managing DNS Records
          1. Adding Address and Pointer Records
            1. Adding a PTR Record Later
          2. Adding DNS Aliases with CNAME
          3. Adding Mail Exchange Servers
          4. Adding Name Servers
          5. Viewing and Updating DNS Records
        6. Updating Zone Properties and the SOA Record
          1. Modifying the SOA Record
          2. Allowing and Restricting Zone Transfers
          3. Notifying Secondaries of Changes
          4. Setting the Zone Type
          5. Enabling and Disabling Dynamic Updates
        7. Managing DNS Server Configuration and Security
          1. Enabling and Disabling IP Addresses for a DNS Server
          2. Controlling Access to DNS Servers Outside the Organization
            1. Creating Nonforwarding and Forwarding-Only Servers
            2. Creating Forwarding Servers
            3. Configuring Conditional Forwarding
          3. Enabling and Disabling Event Logging
          4. Using Debug Logging to Track DNS Activity
          5. Monitoring a DNS Server
    8. Index
    9. About the Author
    10. Copyright

    Product information

    • Title: Windows Server® 2012 Pocket Consultant
    • Author(s):
    • Release date: September 2012
    • Publisher(s): Microsoft Press
    • ISBN: 9780735668614