1. Trang chủ
  2. » Công Nghệ Thông Tin

The Best Damn Windows Server 2003 Book Period- P21 ppsx

10 137 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Cấu trúc

  • The Best Damn Windows Server 2003 Book Period

    • Cover

  • Contents

  • Foreword

  • Chapter 1 Overview of Windows Server 2003

    • Introduction

      • Windows XP/Server 2003

    • What's New in Windows Server 2003?

      • New Features

        • New Active Directory Features

        • Improved File and Print Services

        • Revised IIS Architecture

        • Enhanced Clustering Technology

        • New Networking and Communications Features

        • Improved Security

        • Better Storage Management

        • Improved Terminal Services

        • New Media Services

        • XML Web Services

    • The Windows Server 2003 Family

      • Why Four Different Editions?

      • Members of the Family

        • Web Edition

        • Standard Edition

        • Enterprise Edition

        • Datacenter Edition

    • Licensing Issues

      • Product Activation

    • Installation and Upgrade Issues

      • Common Installation Issues

      • Common Upgrade Issues

    • Windows Server 2003 Planning Tools and Documentation

    • Overview of Network Infrastructure Planning

      • Planning Strategies

      • Using Planning Tools

      • Reviewing Legal and Regulatory Considerations

      • Calculating TCO

    • Developing a Windows Server 2003 Test Network Environment

      • Planning the Test Network

        • Exploring the Group Policy Management Console (GMPC)

    • Documenting the Planning and Network Design Process

      • Creating the Planning and Design Document

  • Chapter 2 Using Server Management Tools

    • Introduction

    • Recognizing Types of Management Tools

      • Administrative Tools Menu

      • Custom MMC Snap-Ins

        • MMC Console Modes

      • Command-Line Utilities

      • Wizards

      • Windows Resource Kit

      • The Run As command

    • Managing Your Server Remotely

      • Remote Assistance

      • Using Web Interface for Remote Administration

      • Remote Desktop for Administration

      • Administration Tools Pack (adminpak.msi)

      • Windows Management Instrumentation (WMI)

      • Using Computer Management to Manage a Remote Computer

      • Which Tool To Use?

    • Using Emergency Management Services

    • Managing Printers and Print Queues

      • Using the Graphical Interface

        • Creating a Printer

        • Sharing a Printer

        • Adding Printer Drivers for Earlier Operating Systems

        • Setting Permissions

        • Managing Print Queues

        • Managing Printer Pools

        • Scheduling Printers

        • Setting Printing Priorities

      • Using New Command-Line Tools

      • The Printer Spooler Service

      • The Internet Printing Protocol

      • Using the Graphical Interface

      • Using New Command-Line Utilities

        • Sc.exe

        • Schtasks.exe

        • Setx.exe

        • Shutdown.exe

        • Tasklist.exe

        • Taskkill.exe

    • Using Wizards to Configure and Manage Your Server

      • Using the Configure Your Server Wizard and Manage Your Server

  • Chapter 3 Planning Server Roles and Server Security

    • Introduction

    • Understanding Server Roles

    • Domain Controllers (Authentication Servers)

      • Active Directory

      • Operations Master Roles

    • File and Print Servers

      • Print Servers

      • File Servers

    • DHCP, DNS, and WINS Servers

      • DHCP Servers

      • DNS Servers

      • WINS Servers

    • Web Servers

      • Web Server Protocols

      • Web Server Configuration

    • Database Servers

    • Mail Servers

    • Certificate Authorities

      • Certificate Services

    • Application Servers and Terminal Servers

      • Application Servers

      • Terminal Servers

    • Planning a Server Security Strategy

      • Choosing the Operating System

        • Security Features

      • Identifying Minimum Security Requirements for Your Organization

      • Identifying Configurations to Satisfy Security Requirements

    • Planning Baseline Security

    • Customizing Server Security

      • Securing Servers According to Server Roles

        • Security Issues Related to All Server Roles

        • Securing Domain Controllers

        • Securing File and Print Servers

        • Securing DHCP, DNS, and WINS Servers

        • Securing Web Servers

        • Securing Database Servers

        • Securing Mail Servers

        • Securing Certificate Authorities

        • Securing Application and Terminal Servers

  • Chapter 4 Security Templates and Software Updates

    • Introduction

    • Security Templates

      • Types of Security Templates

      • Network Security Settings

      • Analyzing Baseline Security

      • Applying Security Templates

        • Secedit.exe

        • Group Policy

        • Security Configuration and Analysis

    • Software Updates

      • Install and Configure Software Update Infrastructure

      • Install and Configure Automatic Client Update Settings

      • Supporting Legacy Clients

      • Testing Software Updates

  • Chapter 5 Managing Physical and Logical Disks

    • Introduction

      • Working with Microsoft Disk Technologies

        • Physical vs Logical Disks

        • Basic vs Dynamic Disks

        • Partitions vs Volumes

        • Partition Types and Logical Drives

        • Volume Types

    • Using Disk Management Tools

      • Using the Disk Management MMC

      • Using the Command-Line Utilities

        • Using Diskpart.exe

        • Using Fsutil.exe

        • Using Rss.exe

    • Managing Physical and Logical Disks

      • Managing Basic Disks

        • When to Use Basic Disks

        • Creating Partitions and Logical Drives

        • Formatting a Basic Volume

        • Extending a Basic Volume

      • Managing Dynamic Disks

        • Converting to Dynamic Disk Status

        • Creating and Using RAID-5 Volumes

    • Optimizing Disk Performance

      • Defragmenting Volumes and Partitions

        • Using the Graphical Defragmenter

        • Using Defrag.exe

        • Defragmentation Best Practices

      • Configuring and Monitoring Disk Quotas

        • Brief Overview of Disk Quotas

        • Enabling and Configuring Disk Quotas

        • Monitoring Disk Quotas

        • Exporting and Importing Quota Settings

        • Disk Quota Best Practices

        • Using Fsutil to Manage Disk Quotas

      • Implementing RAID Solutions

        • Understanding Windows Server 2003 RAID

        • Hardware RAID

        • RAID Best Practices

    • Understanding and Using Remote Storage

      • What is Remote Storage?

      • Storage Levels

      • Relationship of Remote Storage and Removable Storage

      • Setting Up Remote Storage

        • Installing Remote Storage

        • Configuring Remote Storage

        • Using Remote Storage

        • Remote Storage Best Practices

    • Troubleshooting Disks and Volumes

    • Troubleshooting Basic Disks

      • New Disks Are Not Showing Up in the Volume List View

      • Disk Status is Not Initialized or Unknown

      • Disk Status is Failed

    • Troubleshooting Dynamic Volumes

      • Disk Status is Foreign

      • Disk Status is Online (Errors)

      • Disk Status is Offline

      • Disk Status is Data Incomplete

    • Troubleshooting Fragmentation Problems

      • Computer is Operating Slowly

      • The Analysis and Defragmentation Reports Do Not Match the Display

      • My Volumes Contain Unmovable Files

    • Troubleshooting Disk Quotas

      • The Quota Tab is Not There

      • Deleting a Quota Entry Gives you Another Window

      • A User Gets an "Insufficient Disk Space" Message When Adding Files to a Volume

    • Troubleshooting Remote Storage

      • Remote Storage Will Not Install

      • Remote Storage Is Not Finding a Valid Media Type

      • Files Can No Longer Be Recalled from Remote Storage

    • Troubleshooting RAID

      • Mirrored or RAID-5 Volume's Status is Data Not Redundant

      • Mirrored or RAID-5 Volume's Status is Failed Redundancy

      • Mirrored or RAID-5 Volume's Status is Stale Data

  • Chapter 6 Implementing Windows Cluster Services and Network Load Balancing

    • Introduction

    • Making Server Clustering Part of Your High-Availability Plan

      • Terminology and Concepts

        • Cluster Nodes

        • Cluster Groups

        • Failover and Failback

        • Cluster Services and Name Resolution

        • How Clustering Works

      • Cluster Models

        • Single Node

        • Single Quorum Device

        • Majority Node Set

      • Server Cluster Deployment Options

        • N-Node Failover Pairs

        • Hot-Standby Server/N+I

        • Failover Ring

        • Random

      • Server Cluster Administration

        • Using the Cluster Administrator Tool

        • Using Command-Line Tools

      • Recovering from Cluster Node Failure

      • Server Clustering Best Practices

        • Hardware Issues

        • Cluster Network Configuration

        • Security

    • Making Network Load Balancing Part of Your High-Availability Plan

      • Terminology and Concepts

        • Hosts/Default Host

        • Load Weight

        • Traffic Distribution

        • Convergence and Heartbeats

        • How NLB Works

      • Relationship of NLB to Clustering

      • Managing NLB Clusters

        • Using the NLB Manager Tool

        • Remote Management

        • Command-Line Tools

        • NLB Error Detection and Handling

      • Monitoring NLB

        • Using the WLBS Cluster Control Utility

      • NLB Best Practices

        • Multiple Network Adapters

        • Protocols and IP Addressing

        • Security

  • Chapter 7 Planning, Implementing, and Maintaining a High-Availability Strategy

    • Introduction

    • Understanding Performance Bottlenecks

      • Identifying System Bottlenecks

        • Memory

        • Processor

        • Disk

        • Network Components

      • Using the System Monitor Tool to Monitor Servers

        • Creating a System Monitor Console

      • Using Event Viewer to Monitor Servers

      • Using Service Logs to Monitor Servers

    • Planning a Backup and Recovery Strategy

      • Understanding Windows Backup

        • Types of Backups

        • Determining What to Back Up

      • Using Backup Tools

        • Using the Windows Backup Utility

        • Using the Command-Line Tools

      • Selecting Backup Media

      • Scheduling Backups

      • Restoring from Backup

        • Create a Backup Schedule

    • Planning System Recovery with ASR

      • What Is ASR?

      • How ASR Works

      • Alternatives to ASR

        • Safe Mode Boot

        • Last Known Good Boot Mode

        • ASR As a Last Resort

      • Using the ASR Wizard

      • Performing an ASR Restore

    • Planning for Fault Tolerance

      • Network Fault-Tolerance Solutions

      • Internet Fault-Tolerance Solutions

      • Disk Fault-Tolerance Solutions

      • Server Fault-Tolerance Solutions

  • Chapter 8 Monitoring and Troubleshooting Network Activity

    • Introduction

    • Using Network Monitor

      • Installing Network Monitor

        • Install Network Monitor

      • Basic Configuration

      • Network Monitor Default Settings

      • Configuring Monitoring Filters

      • Configuring Display Filters

      • Interpreting a Trace

        • Perform a Network Trace

    • Monitoring and Troubleshooting Internet Connectivity

      • NAT Logging

      • Name Resolution

        • NetBIOS Name Resolution

        • Using IPConfig to Troubleshoot Name Resolution

      • IP Addressing

        • Client Configuration Issues

        • Network Access Quarantine Control

        • DHCP Issues

    • Monitoring IPSec Connections

      • IPSec Monitor Console

      • Network Monitor

      • Netsh

      • Ipseccmd

      • Netdiag

      • Event Viewer

  • Chapter 9 Active Directory Infrastructure Overview

    • Introduction

    • Introducing Directory Services

      • Terminology and Concepts

        • Directory Data Store

        • Protecting Your Active Directory Data

        • Policy-Based Administration

        • Directory Access Protocol

        • Naming Scheme

        • Installing Active Directory to Create a Domain Controller

        • Install Active Directory

    • Understanding How Active Directory Works

      • Directory Structure Overview

      • Sites

      • Domains

      • Domain Trees

      • Forests

      • Organizational Units

      • Active Directory Components

      • Logical vs Physical Components

        • Domain Controllers

        • Schema

        • Global Catalog

        • Replication Service

    • Using Active Directory Administrative Tools

      • Graphical Administrative Tools/MMCs

        • Active Directory Users and Computers

        • Active Directory Domains and Trusts

        • Active Directory Sites and Services

      • Command-Line Tools

        • Cacls

        • Cmdkey

        • Csvde

        • Dcgpofix

        • Dsadd

        • Dsget

        • Dsmod

        • Dsmove

        • Ldifde

        • Ntdsutil

        • Whoami

    • Implementing Active Directory Security and Access Control

      • Access Control in Active Directory

        • Set Permissions on AD Objects

        • Role-Based Access Control

        • Authorization Manager

      • Active Directory Authentication

      • Standards and Protocols

        • Kerberos

        • X.509 Certificates

        • LDAP/SSL

        • PKI

    • What's New in Windows Server 2003 Active Directory?

      • New Features Available Only with Windows Server 2003 Domain/Forest Functionality

        • Domain Controller Renaming Tool

        • Domain Rename Utility

        • Forest Trusts

        • Dynamically Links Auxiliary Classes

        • Disabling Classes

        • Replication

        • Raise Domain and Forest Functionality

  • Chapter 10 Working with User, Group, and Computer Accounts

    • Introduction

    • Understanding Active Directory Security Principal Accounts

      • Security Principals and Security Identifiers

        • Tools to View and Manage Security Identifiers

      • Naming Conventions and Limitations

    • Working with Active Directory User Accounts

      • Built-In Domain User Accounts

        • Administrator

        • Guest

        • HelpAssistant

        • SUPPORT_388945a0

      • InetOrgPerson

      • Creating User Accounts

        • Creating Accounts Using Active Directory Users and Computers

        • Create a User Object in Active Directory

        • Creating Accounts Using the DSADD Command

      • Managing User Accounts

        • Personal Information Tabs

        • Account Settings

        • Terminal Services Tabs

        • Security-Related Tabs

    • Working with Active Directory Group Accounts

      • Group Types

        • Security Groups

        • Distribution Groups

      • Group Scopes in Active Directory

        • Universal

        • Global

        • Domain Local

      • Built-In Group Accounts

        • Default Groups in Builtin Container

        • Default Groups in Users Container

      • Creating Group Accounts

        • Creating Groups Using Active Directory Users and Computers

        • Creating Groups Using the DSADD Command

      • Managing Group Accounts

    • Working with Active Directory Computer Accounts

      • Creating Computer Accounts

        • Creating Computer Accounts by Adding a Computer to a Domain

        • Creating Computer Accounts Using Active Directory Users and Computers

        • Creating Computer Accounts Using the DSADD Command

        • Managing Computer Accounts

      • Managing Multiple Accounts

      • Implementing User Principal Name Suffixes

        • Add and Use Alternative UPN Suffixes

      • Moving Account Objects in Active Directory

        • Moving Objects with Active Directory Users and Computers

        • Moving Objects with the DSMOVE Command

        • Moving Objects with the MOVETREE Command

        • Install MOVETREE with AD Support Tools

      • Troubleshooting Problems with Accounts

  • Chapter 11 Creating User and Group Strategies

    • Introduction

    • Creating a Password Policy for Domain Users

      • Creating an Extensive Defense Model

        • Strong Passwords

        • System Key Utility

      • Defining a Password Policy

        • Create a domain password policy

        • Modifying a Password Policy

        • Applying an Account Lockout Policy

        • Create an account lockout policy

    • Creating User Authentication Strategies

      • Need for Authentication

      • Single Sign-On

        • Interactive Logon

        • Network Authentication

    • Authentication Types

      • Kerberos

        • Understanding the Kerberos Authentication Process

      • Secure Sockets Layer/Transport Layer Security

      • NT LAN Manager

      • Digest Authentication

      • Passport Authentication

      • Educating Users

    • Smart Card Authentication

    • Planning a Security Group Strategy

      • Security Group Best Practices

      • Designing a Group Strategy for a Single Domain Forest

      • Designing a Group Strategy for a Multiple Domain Forest

  • Chapter 12 Working with Forests and Domains

    • Introduction

    • Understanding Forest and Domain Functionality

      • The Role of the Forest

        • New Forestwide Features

        • New Domainwide Features

      • Domain Trees

      • Forest and Domain Functional Levels

        • Domain Functionality

        • Forest Functionality

      • Raising the Functional Level of a Domain and Forest

        • Domain Functional Level

        • Verify the domain functional level

      • Raise the domain fuctional level

      • Forest Functional Level

      • Verify the forest functional level

      • Raise the forest functional level

      • Optimizing Your Strategy for Raising Functional Levels

    • Creating the Forest and Domain Structure

      • Deciding When to Create a New DC

      • Installing Domain Controllers

        • Creating a Forest Root Domain

        • Creating a New Domain Tree in an Existing Forest

        • Create a new domain tree in an existing forest

        • Creating a New Child Domain in an Existing Domain

        • Creating a New DC in an Existing Domain

        • Create a new domain controller in an existing domain using the conventional across-the-network method

        • Create a new domain controller in an existing domain using the new system state backup method

        • Assigning and Transferring Master Roles

        • Locate the Schema Operations Master

        • Transfer the Schema Operations Master Role

        • Locate the Domain Naming Operations Master

        • Transer the Domain Naming Master Role

        • Locate the Infrastructure, RID and PDC Operations Masters

        • Transfer the Infrastructure, RID and PDC Master Roles

        • Seize the FSMO Master Roles

        • Using Application Directory Partitions

        • Administer Application Directory Partitions

      • Establishing Trust Relationships

        • Direction and Transitivity

        • Types of Trusts

      • Restructuring the Forest and Renaming Domains

        • Domain Rename Limitations

        • Domain Rename Limitations in a Windows 2000 Forest

        • Domain Rename Limitations in a Windows Server 2003 Forest

        • Domain Rename Dependencies

        • Domain Rename Conditions and Effects

        • Rename a Windows Server 2003 Domain Controller

    • Implementing DNS in the Active Directory Network Environment

      • DNS and Active Directory Namespaces

      • DNS Zones and Active Directory Integration

      • Configuring DNS Servers for Use with Active Directory

        • Integrating an Existing Primary DNS Server with Active Directory

        • Creating the Default DNS Application Directory Partitions

        • Using dnscmd to Administer Application Directory Partitions

      • Securing Your DNS Deployment

  • Chapter 13 Working with Trusts and Organizational Units

    • Introduction

    • Working with Active Directory Trusts

      • Types of Trust Relationships

        • Default Trusts

        • Shortcut Trust

        • Realm Trust

        • External Trust

        • Forest Trust

      • Creating,Verifying, and Removing Trusts

        • Create a transitive, one-way incoming realm trust

      • Securing Trusts Using SID Filtering

      • Understanding the Role of Container Objects

      • Creating and Managing Organizational Units

        • Create an Organizational Unit

        • Applying Group Policy to OUs

        • Delegating Control of OUs

    • Planning an OU Structure and Strategy for Your Organization

      • Delegation Requirements

        • Delegate authority for an OU

      • Security Group Hierarchy

  • Chapter 14 Working with Active Directory Sites

    • Introduction

    • Understanding the Role of Sites

      • Replication

      • Authentication

      • Distribution of Services Information

    • Relationship of Sites to Other Active Directory Components

      • Relationship of Sites and Domains

        • Physical vs Logical Structure of the Network

      • The Relationship of Sites and Subnets

    • Creating Sites and Site Links

      • Site Planning

        • Criteria for Establishing Separate Sites

        • Creating a Site

        • Create a new site

        • Renaming a Site

        • Rename a new site

        • Creating Subnets

        • Create subnets

        • Associating Subnets with Sites

        • Associate subnets with sites

        • Creating Site Links

        • Create site links

        • Configuring Site Link Cost

        • Configure site link costs

    • Site Replication

      • Types of Replication

      • Intra-site Replication

      • Inter-site Replication

      • Planning, Creating, and Managing the Replication Topology

        • Planning Replication Topology

        • Creating Replication Topology

        • Managing Replication Topology

      • Configuring Replication between Sites

        • Configuring Replication Frequency

        • Configuring Site Link Availability

        • Configuring Site Link Bridges

        • Configuring Bridgehead Servers

      • Troubleshooting Replication Failure

        • Troubleshooting Replication

        • Using Replication Monitor

        • Using Event Viewer

        • Using Support Tools

  • Chapter 15 Working with Domain Controllers

    • Introduction

    • Planning and Deploying Domain Controllers

      • Understanding Server Roles

      • Function of Domain Controllers

      • Determining the Number of Domain Controllers

      • Using the Active Directory Installation Wizard

      • Creating Additional Domain Controllers

      • Upgrading Domain Controllers to Windows Server 2003

      • Placing Domain Controllers within Sites

    • Backing Up Domain Controllers

      • Restoring Domain Controllers

    • Managing Operations Masters

  • Chapter 16 Working with Global Catalog Servers and Schema

    • Introduction

    • Working with the Global Catalog and GC Servers

      • Functions of the GC

        • UPN Authentication

        • Directory Information Search

        • Universal Group Membership Information

      • Customizing the GC Using the Schema MMC Snap-In

        • Setup Active Directory Schema MMC Snap-in

      • Creating and Managing GC Servers

      • Understanding GC Replication

        • Universal Group Membership

        • Attributes in GC

      • Placing GC Servers within Sites

        • Bandwidth and Network Traffic Considerations

        • Universal Group Caching

      • Troubleshooting GC Issues

    • Working with the Active Directory Schema

      • Understanding Schema Components

        • Classes

        • Attributes

        • Naming of Schema Objects

      • Working with the Schema MMC Snap-In

      • Modifying and Extending the Schema

      • Deactivating Schema Classes and Attributes

        • Create and deactivate classes or attributes

      • Troubleshooting Schema Issues

  • Chapter 17 Working with Group Policy in an Active Directory Environment

    • Introduction

    • Understanding Group Policy

      • Terminology and Concepts

        • Local and Non-Local Policies

        • User and Computer Policies

        • Group Policy Objects

        • Scope and Application Order of Policies

      • Group Policy Integration in Active Directory

      • Group Policy Propagation and Replication

    • Planning a Group Policy Strategy

      • Using RSoP Planning Mode

        • Opening RSoP in Planning Mode

        • Reviewing RSoP Results

      • Strategy for Configuring the User Environment

      • Strategy for Configuring the Computer Environment

        • Run an RSoP Planning Query

    • Implementing Group Policy

      • The Group Policy Object Editor MMC

      • Creating, Configuring, and Managing GPOs

        • Creating and Configuring GPOs

        • Naming GPOs

        • Managing GPOs

      • Configuring Application of Group Policy

        • General

        • Links

        • Security

        • WMI Filter

      • Delegating Administrative Control

      • Verifying Group Policy

        • Delegate Control for Group Policy to a Non-Administrator

    • Performing Group Policy Administrative Tasks

      • Automatically Enrolling User and Computer Certificates

      • Redirecting Folders

      • Configuring User and Computer Security Settings

        • Computer Configuration

        • User Configuration

        • Redirect the My Documents Folder

      • Using Software Restriction Policies

        • Setting Up Software Restriction Policies

        • Software Policy Rules

        • Precedence of Policies

        • Best Practices

    • Applying Group Policy Best Practices

    • Troubleshooting Group Policy

      • Using RSoP

      • Using gpresult.exe

        • Run an RSoP Query in Logging Mode

  • Chapter 18 Deploying Software via Group Policy

    • Introduction

    • Understanding Group Policy Software Installation Terminology and Concepts

      • Group Policy Software Installation Concepts

        • Assigning Applications

        • Publishing Applications

        • Document Invocation

        • Application Categories

        • Group Policy Software Deployment vs SMS Software Deployment

      • Group Policy Software Installation Components

        • Windows Installer Packages (.msi)

        • Transforms (.mst)

        • Patches and Updates (.msp)

        • Application Assignment Scripts (.aas)

        • Deploying Software to Users

        • Deploying Software to Computers

    • Using Group Policy Software Installation to Deploy Applications

      • Preparing for Group Policy Software Installation

        • Creating Windows Installer Packages

      • Using .zap Setup Files

        • Publish Software Using a .ZAP File

        • Creating Distribution Points

      • Working with the GPO Editor

      • Opening or Creating a GPO for Software Deployment

      • Assigning and Publishing Applications

        • Assign Software to a Group

      • Configuring Software Installation Properties

        • The General Tab

        • The Advanced Tab

        • The File Extensions Tab

        • The Categories Tab

      • Upgrading Applications

        • Configuring Required Updates

      • Removing Managed Applications

      • Managing Application Properties

      • Categorizing Applications

      • Adding and Removing Modifications for Application Packages

        • Apply a Transform to a Software Package

    • Troubleshooting Software Deployment

      • Verbose Logging

      • Software Installation Diagnostics Tool

  • Chapter 19 Ensuring Active Directory Availability

    • Introduction

    • Understanding Active Directory Availability Issues

      • The Active Directory Database

      • Data Modification to the Active Directory Database

      • The Tombstone and Garbage Collection Processes

      • System State Data

      • Fault Tolerance and Performance

    • Performing Active Directory Maintenance Tasks

      • Defragmenting the Database

        • The Offline Defragmentation Process

        • Perform an Offline Defragmentation of the Active Directory Database

      • Moving the Database or Log Files

      • Monitoring the Database

        • Using Event Viewer to Monitor Active Directory

        • Using the Performance Console to Monitor Active Directory

        • Use System Monitor to Monitor Active Directory

    • Backing Up and Restoring Active Directory

      • Backing Up Active Directory

        • Backing Up at the Command Line

      • Restoring Active Directory

        • Directory Services Restore Mode

        • Normal Restore

        • Authoritative Restore

        • Primary Restore

    • Troubleshooting Active Directory Availability

      • Setting Logging Levels for Additional Detail

      • Using Ntdsutil Command Options

        • Using the Integrity Command

        • Using the recover Command

        • Using the Semantic Database Analysis Command

        • Using the esentutl Command

      • Changing the Directory Services Restore Mode Password

  • Chapter 20 Planning, Implementing, and Maintaining a Name Resolution Strategy

    • Introduction

    • Planning for Host Name Resolution

      • Install Windows Server 2003 DNS Service and Configure Forward and Reverse Lookup Zones

      • Designing a DNS Namespace

        • Host Naming Conventions and Limitations

        • Supporting Multiple Namespaces

      • Planning DNS Server Deployment

        • Planning the Number of DNS Servers

        • Planning for DNS Server Capacity

        • Planning DNS Server Placement

        • Planning DNS Server Roles

      • Planning for Zone Replication

        • Active Directory-integrated Zone Replication Scope

        • Security for Zone Replication

        • General Guidelines for Planning for Zone Replication

      • Planning for Forwarding

        • Conditional Forwarding

        • General Guidelines for Using Forwarders

      • DNS/DHCP Interaction

        • Security Considerations for DDNS and DHCP

        • Aging and Scavenging of DNS Records

      • Windows Server 2003 DNS Interoperability

        • BIND and Other DNS Server Implementations

        • Zone Transfers with BIND

        • Supporting AD with BIND

        • Split DNS Configuration

        • Interoperability with WINS

      • DNS Security Issues

        • Common DNS Threats

        • Securing DNS Deployment

        • DNS Security Levels

        • General DNS Security Guidelines

      • Monitoring DNS Servers

        • Testing DNS Server Configuration with the DNS Console Monitoring Tab

        • Debug Logging

        • Event Logging

        • Monitoring DNS Server Using the Performance Console

        • Command-line Tools for Maintaining and Monitoring DNS Servers

    • Planning for NetBIOS Name Resolution

      • Understanding NETBIOS Naming

        • NetBIOS Name Resolution Process

        • Understanding the LMHOSTS File

        • Understanding WINS

        • What's New for WINS in Windows Server 2003

      • Planning WINS Server Deployment

        • Server Number and Placement

      • Planning for WINS Replication

      • Replication Partnership Configuration

      • Replication Models

    • WINS Issues

      • Static WINS Entries

      • Multihomed WINS Servers

      • Client Configuration

      • Preventing Split WINS Registrations

      • Performance Issues

      • Security Issues

      • Planning for WINS Database Backup and Restoration

    • Troubleshooting Name Resolution Issues

      • Troubleshooting Host Name Resolution

        • Issues Related to Client Computer Configuration

        • Issues Related to DNS Services

      • Troubleshooting NetBIOS Name Resolution

        • Issues Related to Client Computer Configuration

        • Issues Related to WINS Servers

  • Chapter 21 Planning, Implementing, and Maintaining the TCP/IP Infrastructure

    • Introduction

    • Understanding Windows 2003 Server Network Protocols

      • The Multiprotocol Network Environment

      • What's New in TCP/IP for Windows Server 2003

        • IGMPv3

        • IPv6

        • Alternate Configuration

        • Automatic Determination of Interface Metric

    • Planning an IP Addressing Strategy

      • Analyzing Addressing Requirements

      • Creating a Subnetting Scheme

      • Troubleshooting IP Addressing

        • Client Configuration Issues

        • DHCP Issues

      • Transitioning to IPv6

        • IPv6 Utilities

        • Install TCP/IP Version 6

        • 6to4 Tunneling

        • IPv6 Helper Service

        • The 6bone

        • Teredo (IPv6 with NAT)

    • Planning the Network Topology

      • Analyzing Hardware Requirements

      • Planning the Placement of Physical Resources

    • Planning Network Traffic Management

      • Monitoring Network Traffic and Network Devices

        • Using System Monitor

      • Determining Bandwidth Requirements

      • Optimizing Network Performance

  • Chapter 22 Planning, Implementing, and Maintaining a Routing Strategy

    • Introduction

    • Understanding IP Routing Basics

      • Routing Tables

      • Static versus Dynamic Routing

      • Gateways

      • Routing Protocols

      • Using Netsh Commands

    • Evaluating Routing Options

      • Selecting Connectivity Devices

      • Switches

      • Routers

    • Windows Server 2003 As a Router

      • Configure a Windows Server 2003 Computer As a Static Router

      • Configure RIP Version 2

    • Security Considerations for Routing

      • Analyzing Requirements for Routing Components

      • Simplifying Network Topology to Provide Fewer Attack Points

        • Minimizing the Number of Network Interfaces and Routes

        • Minimizing the Number of Routing Protocols

      • Router-to-Router VPNs

        • Install and Enable Windows Server 2003 VPN Server

        • Set Up Windows Server 2003 As Router-to-Router VPN Server

      • Packet Filtering and Firewalls

      • Logging Level

    • Troubleshooting IP Routing

      • Identifying Troubleshooting Tools

      • Common Routing Problems

        • Interface Configuration Problems

        • RRAS Configuration Problems

        • Routing Protocol Problems

        • TCP/IP Configuration Problems

        • Routing Table Configuration Problems

  • Chapter 23 Planning, Implementing, and Maintaining Internet Protocol Security

    • Introduction

    • Understanding IP Security (IPSec)

      • How IPSec Works

        • Securing Data in Transit

        • IPSec Cryptography

      • IPSec Modes

        • Tunnel Mode

        • Transport Mode

      • IPSec Protocols

        • Determine IPSec Protocol

        • Additional Protocols

      • IPSec Components

        • IPSec Policy Agent

        • IPSec Driver

      • IPSec and IPv6

    • Deploying IPSec

      • Determining Organizational Needs

      • Security Levels

    • Managing IPSec

      • Using the IP Security Policy Management MMC Snap-in

      • Install the IP Security Policy Management Console

      • Using the netsh Command-line Utility

      • Default IPSec Policies

      • Client (Respond Only)

      • Server (Request Security)

      • Secure Server (Require Security)

      • Custom Policies

        • Customize IP Security Policy

        • Using the IP Security Policy Wizard

        • Create an IPSec Policy with the IP Security Policy Wizard

        • Defining Key Exchange Settings

        • Managing Filter Lists and Filter Actions

      • Assigning and Applying Policies in Group Policy

      • Active Directory Based IPSec Policies

      • IPSec Monitoring

        • Using the netsh Utility for Monitoring

        • Using the IP Security Monitor MMC Snap-in

      • Troubleshooting IPSec

        • Using netdiag for Troubleshooting Windows Server 2003 IPSec

        • Viewing Policy Assignment Information

        • Viewing IPSec Statistics

        • Using Packet Event Logging to Troubleshoot IPSec

        • Using IKE Detailed Tracing to Troubleshoot IPSec

        • Using the Network Monitor to Troubleshoot IPSec

        • Disabling TCP/IP and IPSec Hardware Acceleration to Solve IPSec Problems

    • Addressing IPSec Security Considerations

      • Strong Encryption Algorithm (3DES)

      • Firewall Packet Filtering

      • Diffie-Hellman Groups

      • Pre-shared Keys

        • Advantages and Disadvantages of Pre-shared Keys

        • Considerations when Choosing a Pre-shared Key

      • Soft Associations

      • Security and RSoP

  • Chapter 24 Planning, Implementing, and Maintaining a Public Key Infrastructure

    • Introduction

    • Planning a Windows Server 2003 Certificate-Based PKI

      • Understanding Public Key Infrastructure

        • The Function of the PKI

        • Components of the PKI

      • Understanding Digital Certificates

        • User Certificates

        • Machine Certificates

        • Application Certificates

      • Understanding Certification Authorities

        • CA Hierarchy

        • How Microsoft Certificate Services Works

        • Install Certificate Services

    • Implementing Certification Authorities

      • Configure a Certification Authority

      • Analyzing Certificate Needs within the Organization

      • Determining Appropriate CA Type(s)

        • Enterprise CAs

        • Stand-Alone CAs

        • Planning the CA Hierarchy

        • Planning CA Security

        • Certificate Revocation

    • Planning Enrollment and Distribution of Certificates

      • Certificate Templates

      • Certificate Requests

      • Auto-Enrollment Deployment

      • Role-Based Administration

    • Implementing Smart Card Authentication in the PKI

      • How Smart Card Authentication Works

      • Deploying Smart Card Logon

        • Smart Card Readers

        • Smart Card Enrollment Station

      • Using Smart Cards To Log On to Windows

        • Implement and Use Smart Cards

      • Using Smart Cards for Remote Access VPNs

      • Using Smart Cards To Log On to a Terminal Server

  • Chapter 25 Planning, Implementing, Maintaining Routing and Remote Access

    • Introduction

    • Planning the Remote Access Strategy

      • Analyzing Organizational Needs

      • Analyzing User Needs

      • Selecting Remote Access Types To Allow

        • Dial-In

        • VPN

        • Wireless Remote Access

    • Addressing Dial-In Access Design Considerations

      • Allocating IP Addresses

        • Static Address Pools

        • Using DHCP for Addressing

        • Using APIPA

      • Determining Incoming Port Needs

        • Multilink and BAP

      • Selecting an Administrative Model

        • Access by User

        • Access by Policy

    • Configuring the Windows 2003 Dial-up RRAS Server

    • Configuring RRAS Packet Filters

      • RRAS Packet Filter Configuration

    • Addressing VPN Design Considerations

      • Selecting VPN Protocols

        • Client Support

        • Data Integrity and Sender Authentication

        • PKI Requirements

      • Installing Machine Certificates

      • Configuring Firewall Filters

    • PPP Multilink and Bandwidth Allocation Protocol (BAP)

      • PPP Multilink Protocol

      • BAP Protocols

    • Addressing Wireless Remote Access Design Considerations

      • The 802.11 Wireless Standards

      • Using IAS for Wireless Connections

      • Configuring Remote Access Policies for Wireless Connections

        • Create a Policy for Wireless Access

      • Multiple Wireless Access Points

      • Placing CA on VLAN for New Wireless Clients

      • Configuring WAPs as RADIUS Clients

    • Planning Remote Access Security

      • Domain Functional Level

      • Selecting Authentication Methods

        • Disallowing Password-Based Connections (PAP, SPAP, CHAP, MS-CHAP v1)

        • Disable Password-Based Authentication Methods

        • Using RADIUS/IAS vs.Windows Authentication

      • Selecting the Data Encryption Level

      • Using Callback Security

      • Managed Connections

      • Mandating Operating System/File System

      • Using Smart Cards for Remote Access

    • Configuring Wireless Security Protocols

      • Configure Wireless Networking

    • RRAS NAT Services

      • Configure NAT and Static NAT Mapping

    • ICMP Router Discovery

      • Configure ICMP Router Discovery

    • Creating Remote Access Policies

      • Policies and Profiles

      • Authorizing Remote Access

        • Authorizing Access By Group

      • Restricting Remote Access

        • Restricting by User/Group Membership

        • Restricting by Type of Connection

        • Restricting by Time

        • Restricting by Client Configuration

        • Restricting Authentication Methods

        • Restricting by Phone Number or MAC Address

      • Controlling Remote Connections

        • Controlling Idle Timeout

        • Controlling Maximum Session Time

        • Controlling Encryption Strength

        • Controlling IP Packet Filters

        • Controlling IP Address for PPP Connections

    • Troubleshooting Remote Access Client Connections

    • Troubleshooting Remote Access Server Connections

    • Configuring Internet Authentication Services

      • Configure IAS

  • Chapter 26 Managing Web Servers with IIS 6.0

    • Introduction

    • Installing and Configuring IIS 6.0

      • Pre-Installation Checklist

        • Internet Connection Firewall

      • Installation Methods

        • Using the Configure Your Server Wizard

        • Using the Add or Remove Programs Applet

        • Using Unattended Setup

      • Installation Best Practices

    • What's New in IIS 6.0?

      • New Security Features

        • Advanced Digest Authentication

        • Server-Gated Cryptography (SGC)

        • Selectable Cryptographic Service Provider (CSP)

        • Configurable Worker Process Identity

        • Default Lockdown Status

        • New Authorization Framework

      • New Reliability Features

        • Health Detection

        • New Request Processing Architecture: HTTP.SYS Kernel Mode Driver

      • Other New Features

        • ASP.NET and IIS Integration

        • Unicode Transformation Format-8 (UTF-8)

        • XML Metabase

    • Managing IIS 6.0

      • Performing Common Management Tasks

        • Site Setup

        • Common Administrative Tasks

        • Enable Health Detection

      • Managing IIS Security

        • Configuring Authentication Settings

    • Troubleshooting IIS 6.0

      • Troubleshooting Content Errors

        • Static Files Return 404 Errors

        • Dynamic Content Returns a 404 Error

        • Sessions Lost Due to Worker Process Recycling

        • Configure Worker Process Recycling

        • ASP.NET Pages are Returned as Static Files

      • Troubleshooting Connection Errors

        • 503 Errors

        • Extend The Queue Length of An Application Pool

        • Extend The Error Count and Timeframe

        • Clients Cannot Connect to Server

        • 401 Error-Sub Authentication Error

        • Client Requests Timing Out

      • Troubleshooting Other Errors

        • File Not Found Errors for UNIX and Linux Files

        • ISAPI Filters Are Not Automatically Visible as Properties of the Web Site

        • The Scripts and Msadc Virtual Directories Are Not Found in IIS 6.0

    • Using New IIS Command-Line Utilities

      • iisweb.vbs

      • iisvdir.vbs

      • iisftp.vbs

      • iisftpdr.vbs

      • iisback.vbs

      • iiscnfg.vbs

  • Chapter 27 Managing and Troubleshooting Terminal Services

    • Introduction

    • Understanding Windows Terminal Services

      • Terminal Services Components

        • Remote Desktop for Administration

        • Remote Assistance

        • The Terminal Server Role

    • Using Terminal Services Components for Remote Administration

      • Configuring RDA

      • Enabling RDA Access

      • Remote Desktop Security Issues

      • Using Remote Assistance

        • Configuring Remote Assistance for Use

        • Asking for Assistance

        • Managing Open Invitations

        • Remote Assistance Security Issues

    • Installing and Configuring the Terminal Server Role

      • Install the Terminal Server Role

      • Install Terminal Server Licensing

    • Using Terminal Services Client Tools

      • Installing and Using the Remote Desktop Connection (RDC) Utility

        • Installing the Remote Desktop Connection Utility

        • Launching and Using the Remote Desktop Connection Utility

        • Configuring the Remote Desktop Connection Utility

      • Installing and Using the Remote Desktops MMC Snap-In

        • Install the Remote Desktops MMC Snap-In

        • Configure a New Connection in the RD MMC

        • Configure a Connection's Properties

        • Connecting and Disconnecting

      • Installing and Using the Remote Desktop Web Connection Utility

        • Install the Remote Desktop Web Connection Utility

        • Using the Remote Desktop Web Connection Utility from a Client

    • Using Terminal Services Administrative Tools

      • Use Terminal Services Manager to Connect to Servers

        • Manage Users with the Terminal Services Manager Tool

        • Manage Sessions with the Terminal Services Manager Tool

        • Manage Processes with the Terminal Services Manager Tool

      • Using the Terminal Services Configuration Tool

        • Understanding Listener Connections

        • Modifying the Properties of an Existing Connection

        • Terminal Services Configuration Server Settings

      • User Account Extensions

        • The Terminal Services Profile Tab

        • The Sessions Tab

        • The Environment Tab

        • The Remote Control Tab

      • Using Group Policies to Control Terminal Services Users

      • Using the Terminal Services Command-Line Tools

        • Use Terminal Services Manager to Reset a Session

    • Troubleshooting Terminal Services

      • Not Automatically Logged On

      • "This Initial Program Cannot Be Started"

      • Clipboard Problems

      • License Problems

  • Index

  • Team DDU

Nội dung

■ Using Hardware RAID ■ Use hardware RAID whenever possible because it offers the best performance. ■ Try to use identical hardware for all your servers.This makes it easier to recover if you have a disaster. ■ Always keep spare disks on hand. When you lose one drive (with most RAID levels), you no longer have any fault tolerance.You need to be able to replace failed hardware as quickly as possible. (This also applies to software RAID). ■ Keep RAID controllers updated with the current firmware revision. ■ Always back up your data before updating the firmware on RAID controllers. ■ Using Software RAID ■ Use mirrored volumes for the boot and system partitions. ■ Use RAID-5 volumes for database disks (e.g., Exchange and SQL servers). ■ Use striped volumes on database servers’ disks that contain transaction logs (e.g., Exchange and SQL servers). ■ Use striped volumes for disks that are used for printer spooling. Understanding and Using Remote Storage Windows Server 2003’s Remote Storage provides fast access to data stored on disks and archival capabilities for data that isn’t frequently used, and best of all, it handles switching between the two. It automates the archival process and makes accessing archived data easy for the end user. With Remote Storage the server backs up seldom-used files for you automatically, and then automatically restores them when you attempt to access them. What is Remote Storage? Remote Storage provides a means of extending the disk space on your servers without having to buy more hard disks. Instead, you use a tape or a magneto-optical (MO) disk library to archive less- frequently used files. It costs significantly less per megabyte to buy a library full of tapes compared to equivalent storage space on hard disks. After it is set up, Remote Storage runs on autopilot.You tell Remote Storage which volume(s) to manage and you specify how much free space you want to remain available on your managed volume; when the amount of free space drops below that level, Remote Storage kicks in and moves enough files to the media library to bring the disk back within your predefined parameters. A man- aged volume refers to a disk volume in Windows whose files are monitored and managed by Remote Storage. One big advantage of Remote Storage is that all the files on the server look the same to the end user. When a user needs to open a file, he simply double-clicks it. If the file has not yet been moved to tape, it is opened immediately. If the file has been moved to tape, Remote Storage retrieves it from storage and puts a copy on the local disk (a cached copy). Users might notice a 166 Chapter 5 • Managing Physical and Logical Disks 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 166 delay while this takes place, but they do not have to take any extra steps to retrieve the file. After the file is cached, it will be automatically opened for the user. Storage Levels Remote storage has two defined storage levels.The levels exist in a hierarchical structure: ■ Local storage is the top level. It contains the NTFS disks of the computer that is running Remote Storage. ■ Remote storage is the bottom level.This is the library that is connected to the server run- ning Remote Storage. Remote Storage keeps as much information as possible in the top level for faster access. Only when this level is reaching its storage limit is the data moved to the bottom level. Relationship of Remote Storage and Removable Storage Removable Storage is a feature of Windows Server 2003 that enables multiple programs to share the same storage media. It organizes all your available media into separate media pools. Microsoft defines a media pool as a logical collection of removable media that share the same management policies. Applications use media pools to control access to specific media within the library. Removable Storage requires that all data-management programs run on the computer connected to the library. In other words, Removable Storage provides a standard way for applications to access a media library. By having all applications access the library through Remote Storage, Microsoft has provided a level of compatibility between applications, including Remote Storage. Remote Storage uses Removable Storage to access the media stored in the library. Media Pools Media pools contain either media or other media pools. Using the capability to nest media pools inside each other enables you to create a hierarchical media pool structure for Removable Storage.You can group media pools together and manage them as a single unit. Media pools can span multiple libraries.There are two main types of media pools: system media pools and application media pools. System media pools hold media not currently being used by an application. Removable Storage creates one of each of the following system media pools (as shown in Figure 5.85) for each media type in your system: ■ Free media pools These pools hold media not currently in use by applications.This media is readily available for use. ■ Unrecognized media pools Blank media and media not recognized by Removable Storage go into the unrecognized media pool and are unusable until they are moved into a free media pool. ■ Import media pools These pools are recognized by Removable Storage, but they have not been used by Remote Storage before. After they have been catalogued they can be used. Managing Physical and Logical Disks • Chapter 5 167 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 167 Application media pools contain media created and controlled by applications. For example, Backup and Remote Storage use application media pools for storage. Application media pools dic- tate which media can be accessed by any given application. An application can use more multiple media pools, and more than one application can use a single media pool. Setting Up Remote Storage Remote Storage is not installed by default.You add it via the Add or Remove Programs applet in Control Panel. Before starting the installation, you must verify that enough tapes or disks have been moved to a free media pool in Removable Storage to hold all the files you wish to move to Remote Storage and that the local disks being managed are running Windows 2000’s or Windows Server 2003’s versions of NTFS (NTFS version 5). If you want compression and indexing on local disks, enable these before starting setup.You must be logged on with administrative rights to install Remote Storage.You cannot install Remote Storage into a clustered environment. Remote Storage will not fail over. Also, Remote Storage will not work with shared cluster disks but it will work with local disks that are not shared. Use the following steps to install and configure Remote Storage. Installing Remote Storage 1. Open Control Panel by clicking Start | Control Panel.This will display a screen similar to that shown in Figure 5.86. 2. Double-click Add or Remove Programs.This will display the screen shown in Figure 5.87. 168 Chapter 5 • Managing Physical and Logical Disks Figure 5.85 Understanding How Media Pools Work Together Unrecognized Media Pool Import Media Pool Free Media Pool Application Media Pool New Media Return to Free Pool Get From Free Pool 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 168 3. From the Add or Remove Programs window, click Add/Remove Windows Components.You should see a “Please wait…” message, as shown in Figure 5.88 4. You will next be presented with the Windows Components Wizard, as shown in Figure 5.89. Managing Physical and Logical Disks • Chapter 5 169 Figure 5.86 Opening Control Panel Figure 5.87 Using Add or Remove Programs Figure 5.88 Waiting on Windows Setup 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 169 5. Scroll down and click the check box next to Remote Storage. 6. Click Next to continue. 7. Windows will now configure the newly installed components, as shown in Figure 5.90. 8. Next you will see the Completing the Windows Components Wizard, as shown in Figure 5.91. Click Finish to close the wizard. 170 Chapter 5 • Managing Physical and Logical Disks Figure 5.89 Adding Windows Components Figure 5.90 Waiting While Windows Configures Components 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 170 Configuring Remote Storage 1. Open the Remote Storage MMC by clicking Start | All Programs | Administrative Tools | Remote Storage. 2. Because this is the first time you have opened the Remote Storage MMC, the Remote Storage Setup Wizard will automatically start, as shown in Figure 5.92. Click Next to continue. 3. You will next be asked which volumes you want Remote Storage to manage, as shown in Figure 5.93. For this example, we select the C drive. Select the disk(s) that you want to manage and click Next to continue. Managing Physical and Logical Disks • Chapter 5 171 Figure 5.91 Completing the Components Wizard Figure 5.92 Running the Remote Storage Setup Wizard 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 171 4. Set the criteria for managing free space on the volume with the Volume Settings dialog box shown in Figure 5.94. Click Next to continue. 5. You will next be asked to choose which media type to use, as shown in Figure 5.95. For this example, select Removable media and click Next to continue. 172 Chapter 5 • Managing Physical and Logical Disks Figure 5.93 Selecting the Volumes to be Managed Figure 5.94 Managing Free Space on Your Volumes Figure 5.95 Selecting a Media Type 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 172 6. The last item to configure is the schedule for copying files, as shown in Figure 5.96.To accept the defaults, click Next and skip to step 9. To customize the schedule, click the Change Schedule button.This will display the Schedule window shown in Figure 5.97. 7. Set the schedule to copy files at a time that is least busy in your environment and click OK. 8. You will be returned to the screen shown in Figure 5.96. Click Next to continue. 9. On the Completing the Remote Storage Setup Wizard screen (5.98), review the set- tings to make sure they are correct, and then click Finish to complete the configuration of Remote Storage. Managing Physical and Logical Disks • Chapter 5 173 Figure 5.96 Verifying the Schedule for Copying Files Figure 5.97 Customizing the Schedule for Copying Files 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 173 Using Remote Storage Now that you have installed and configured Remote Storage, you need to know how to administer it. Like Microsoft’s other administrative tools, Remote Storage is managed through an MMC snap- in.The Remote Storage MMC has two panes: the console pane on the left is used to navigate the various components of Remote Storage and the details pane on the right displays specifics of whichever component is selected in the left console pane. The Remote Storage MMC (see Figure 5.99) that is accessed from the Administrative Tools menu also contains the snap-ins for Removable Storage and Event Viewer. However, Remote Storage itself has only two containers to manage: the Managed Volumes container and the Media container. We previously discussed storage levels within Remote Storage. We said the top level was for local storage and the bottom level was for remote storage.The Managed Volumes container is the top level of storage and is used for managing local storage.The Media container is the bottom level and is used for managing remote storage. The Managed Volumes container is used to perform the following tasks: ■ Set the desired free space. ■ Specify file-selection criteria and rules. ■ Change the file-copy schedule. ■ Set the maximum number of drives to access simultaneously. ■ Set the runaway recall limit. ■ Validate files. ■ Discontinue volume management. ■ Modify files on managed volumes. 174 Chapter 5 • Managing Physical and Logical Disks Figure 5.98 Completing the Remote Storage Setup Wizard 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 174 The Media container is used to perform the following tasks: ■ Create media copies. ■ Synchronize media copies. ■ Recreate the media master. Setting the Desired Free Space You can configure how much free space you want available on your managed volume. If the volume falls below your specified threshold, then Remote Storage deletes cached files until the volume is back within acceptable limits.You can also tell Remote Storage to delete all cached files from the volume to create a large amount of available free space. Specifying File-Selection Criteria and Rules You tell Remote Storage which files to manage on your volume.You set criteria that must be met in order for the file to be copied to remote storage.After the criteria have been met, the files are copied. Minimum files size and elapsed time since last use are the common criteria used by Remote Storage. In addition to using criteria to control which files get copied to Remote Storage, you can also create rules.There are two types of rules, inclusion and exclusion. Inclusion rules control which files are copied to Remote Storage and exclusion rules control which files are not copied to Remote Storage. Rules are processed in order and the first rule that matches is applied. Change the order of your rules to set their priority. Remote Storage has a predefined list of rules available for use.You cannot modify these rules or change their order.You can create your own rules and order them however you see fit. By default, all system, hidden, encrypted, extended attribute, and sparse files are excluded from the file rule list as these files cannot be copied to remote storage. Managing Physical and Logical Disks • Chapter 5 175 Figure 5.99 Using the Remote Storage MMC 301_BD_W2k3_05.qxd 5/12/04 12:32 PM Page 175 . between the two. It automates the archival process and makes accessing archived data easy for the end user. With Remote Storage the server backs up seldom-used files for you automatically, and then. to a disk volume in Windows whose files are monitored and managed by Remote Storage. One big advantage of Remote Storage is that all the files on the server look the same to the end user. When a. limit is the data moved to the bottom level. Relationship of Remote Storage and Removable Storage Removable Storage is a feature of Windows Server 2003 that enables multiple programs to share the same

Ngày đăng: 04/07/2014, 23:20

TỪ KHÓA LIÊN QUAN