Understanding Networking: The Corporate Perspective
Understanding Networking Jobs
Sarbanes-Oxley Act of 2002
Chapter Summary
2 Laying the Foundation
Bits, Nibbles, and Bytes
Basic Terminology to Describe Networking Speeds
Chapter Summary
3 Understanding Networking
Knowing Network Relationship Types
Learning Network Features
Understanding the OSI Networking Model
Learning About Network Hardware Components
Chapter Summary
4 Understanding Network Cabling
Understanding Cable Topologies
Demystifying Network Cabling
Installing and Maintaining Network Cabling
Chapter Summary
5 Home Networking
Benefits from Home Networking
Choosing a Home Network Technology
Chapter Summary
6 Understanding Network Hardware
Directing Network Traffic
Protecting a Network with Firewalls
Connecting RS-232 Devices with Short-Haul Modems
Chapter Summary
7 Making WAN Connections
Determining WAN Needs
Comparing WAN Connection Types
Chapter Summary
8 Understanding Networking Protocols
Understanding TCP/IP and UDP
Understanding Other Internet Protocols
Comparing Important Proprietary Protocols
Chapter Summary
9 Exploring Directory Services
What Is a Directory Service?
Learning About Specific Directory Services
Chapter Summary
10 Connections from Afar: Remote Network Access
Determining Remote Access Needs
Learning Remote Access Technologies
Chapter Summary
11 Securing Your Network
Understanding Internal Security
Understanding External Threats
Viruses and Other Malicious Software
Chapter Summary
12 Network Disaster Recovery
Notes from the Field: The City of Seattle
Disaster Recovery Plans
Network Backup and Restore Procedures
Chapter Summary
13 Network Servers: Everything You Wanted to Know but Were Afraid to Ask
What Distinguishes a Server from a Workstation?
Choosing Servers for Windows and NetWare
Maintaining and Troubleshooting Servers
Chapter Summary
14 Purchasing and Managing Client Computers
Choosing Desktop Computers
Understanding Network Workstation Requirements
Chapter Summary
Part II: Hands-on Knowledge
15 Designing a Network
The Network Design Process
Assessing Network Needs
Meeting Network Needs
Chapter Summary
16 Installing and Setting Up Windows Server 2008
Understanding Windows Server 2008 Editions
Preparing for Installation
Installing Windows Server 2008
Chapter Summary
17 Administering Windows Server 2008: The Basics
Thinking About Network Security
Working with User Accounts
Working with Active Directory Security Groups
Working with Shares
Working with Printers
Chapter Summary
18 Introducing Exchange Server 2010
Exchange Server 2010 Features
Installing Exchange Server 2010
Setting Up Mailboxes
Chapter Summary
19 Understanding Other Windows Server 2008 Services
Exploring DHCP
Investigating DNS
Understanding RRAS
Exploring IIS
Understanding Windows Terminal Services
Chapter Summary
20 Installing Linux
Configuring Computer Hardware for Linux
Installing Fedora Linux
Chapter Summary
21 Introduction to Linux Systems Administration
Managing Fedora Linux with Graphical Tools
Mastering Linux Command-Line Basics
Chapter Summary
22 Setting Up a Linux Web Server with Apache
Overview of Apache Web Server
Activating Apache Web Server Under Fedora
Downloading and Installing Apache Web Server
Administering Apache Web Server
Chapter Summary
23 Introduction to Virtualization
Benefits of Virtualization
Introducing Windows Server 2008 Hyper-V
Using VMware Virtualization Products
Backing Up Virtual Machine Data
Chapter Summary
Appendix: Understanding the Sarbanes-Oxley Act
Sarbanes-Oxley Act Summary
Title I: Public Company Accounting Oversight Board
Title II: Auditor Independence
Title III: Corporate Responsibility
Title IV: Enhanced Financial Disclosures
Titles V, VI, and VII
Titles VIII, IX, X, and XI
About Internal Controls
Key Procedures for an IT Internal Control System
IT Department Narrative
Disaster Recovery Plan
Access Management
System Maintenance
Change Control
SOX Compliance Testing
Auditing Internal Controls
Deviations from Internal Controls
Sample SOPs
Disaster Recovery Plan
Server Maintenance
System Account Management
Change Control
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Nội dung
257 Chapter 17: Administering Windows Server 2008: The Basics In the second dialog box, shown in Figure 17-3, you enter the initial password that the account will use. You also select several options that apply to the account, as follows: N User Must Change Password at Next Logon Selecting this checkbox forces users to choose their own password when they first log in to the system. N User Cannot Change Password You might select this option for resource accounts if you do not want to allow users to change their passwords. (For instance, you might have a specific user account established for a particular computer that performs a particular function that many people employ.) Generally, however, you should not select this option; most sites allow users to change their own passwords, and you want to permit them to do so if you’ve also set passwords to automatically expire. N Password Never Expires Choose this option to allow the password to remain viable for as long as the user chooses to use it. Activating this option for most users is generally considered a poor security practice. N Account Is Disabled Selecting this option disables the new account. The administrator can enable the account when needed by clearing the checkbox. Figure 17-2. Use the New Object – User dialog box to add a new user. 258 Networking: A Beginner’s Guide After entering the password and selecting the options you want, click Next to continue. You will then see a confirmation screen. Click Next a final time to create the account, or click Back to return to either dialog box to make changes. Modifying a User Account The dialog box in which you modify the information about a user account contains many other fields than the ones to create the account. You can use these to document the account and to set some other security options. To modify an existing user account, right-click the user object you wish to modify and choose Properties from the pop-up menu. You then see the tabbed dialog box shown in Figure 17-4. In the first two tabs, General and Address, you can enter some additional information about the user, such as job title, mailing address, telephone number, e-mail account, and so forth. Because Active Directory also integrates with Exchange Server, this information might be important to enter for your network. In the Account tab, shown in Figure 17-5, you can set some important user account options. At the top of the tab, you can see the user’s logon name, as well as the Windows domain in which the user has primary membership. Below that is the user’s Windows NT Figure 17-3. Setting the user’s password 259 Chapter 17: Administering Windows Server 2008: The Basics logon name (called the pre-Windows 2000 logon name), which the user can optionally use to log in to the domain from a Windows NT computer or to use an application that doesn’t yet support Active Directory logins. (Although you can set these two logon names to be different, doing so rarely is a good idea.) Clicking the Logon Hours button displays the dialog box shown in Figure 17-6. In this dialog box, you select different blocks of time within a standard week, and then click the appropriate option button to permit or deny access to the network for that time period. In Figure 17-6, the settings permit logon times for a normal workday, with some cushion before and after those times to allow for slightly different work hours. By default, users are permitted to log on to the network at any time, any day of the week. For most networks, particularly smaller networks, permitting users to log on at any time is generally acceptable. Figure 17-4. Setting properties for a user’s account 260 Networking: A Beginner’s Guide Clicking the Log On To button on the Account tab opens the Logon Workstations dialog box, as shown in Figure 17-7. By default, users can log on to any workstation in the domain, and the domain authenticates them. In some cases, a system might require stricter security, where you specify the computers to which a user account can log on. For example, you might set up a network backup account that you use to back up the network, and then leave this account logged on all the time in your locked computer room. Because the backup account has access to all files on the network (necessary to do its job), a good idea is to limit that account to log on only to the computer designated for this purpose in the computer room. You use the Log On To feature to set up this type of Figure 17-5. The Account tab of a user’s Properties dialog box lets you set some important user account options. 261 Chapter 17: Administering Windows Server 2008: The Basics Figure 17-6. Setting logon time restrictions for a user Figure 17-7. Restricting the computers to which a user can log on . either dialog box to make changes. Modifying a User Account The dialog box in which you modify the information about a user account contains many other fields than the ones to create the account account. The administrator can enable the account when needed by clearing the checkbox. Figure 17-2. Use the New Object – User dialog box to add a new user. 258 Networking: A Beginner’s Guide After. passwords, and you want to permit them to do so if you’ve also set passwords to automatically expire. N Password Never Expires Choose this option to allow the password to remain viable for as