1. Trang chủ
  2. » Công Nghệ Thông Tin

OReilly windows server hacks mar 2004 ISBN 0596006470

767 129 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 767
Dung lượng 4,62 MB

Nội dung

• • • • • • Table of Contents Index Reviews Reader Reviews Errata Academic Windows Server Hacks By Mitch Tulloch Publisher : O'Reilly Pub Date : March 2004 ISBN : 0-596-00647-0 Pages : 384 The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery No matter which Windows Server you use NT, IIS, 2000, or 2003 Windows Server Hacks will put the knowledge and expertise of veteran system administrators to work for you • • • • • • Table of Contents Index Reviews Reader Reviews Errata Academic Windows Server Hacks By Mitch Tulloch Publisher : O'Reilly Pub Date : March 2004 ISBN : 0-596-00647-0 Pages : 384 Copyright Credits About the Author Contributors Acknowledgments Foreword: I'm a Sci-Fi freak Preface Why Windows Server Hacks? Getting and Using the Scripts How to Use This Book Conventions Used in This Book How to Contact Us How This Book Is Organized Using Code Examples Got a Hack? Chapter 1 General Administration Hacks #1-16 Section 1 Use Run As to Perform Administrative Tasks Section 2 Drag and Drop to the Run Menu Section 4 Automatically Log On After Booting Section 6 Shut Down a Remote Computer Section 8 Execute a Command on Each Computer in a Domain Section 10 Extend Group Policy Section 12 Get Event Log Information Section 14 Desktop Checker Section 16 myITforum.com Section 3 Find and Replace Registry Keys from a Command Line Section 5 Wait for and Optionally Terminate a Process Section 7 Rename Mapped Drives Section 9 Add, Remove, or Retrieve Environment Variables Section 11 Disable EFS Section 13 Shortcut to Remote Assistance Section 15 Top Five Tools Chapter 2 Active Directory Hacks #17-24 Section 17 Retrieve the List of Old Domain Computer Accounts Section 18 Automate Creation of OU Structure Section 20 Delegate Control of an OU to a User Section 22 Display Active Directory Information Section 24 Restore the Active Directory Icon in Windows XP Section 19 Modify All Objects in the OU Section 21 Send OU Information in Active Directory to an HTML Page Section 23 Store and Display Contact Information in Active Directory Chapter 3 User Management Hacks #25-35 Section 25 Search for Domain Users Section 26 Manage User Accounts in Active Directory Section 28 Get User Account Information Section 30 Enumerate Group Membership to a CSV File Section 32 Check Group Membership and Map Drives in a Logon Script Section 27 Get a List of Disabled Accounts Section 29 Check for Passwords that Never Expire Section 31 Modify User Properties for All Users in a Particular OU Section 33 Script Creation of a User's Home Directory and Permissions Section 35 Put a Logoff Icon on the Desktop Section 34 Prevent Ordinary Users from Creating Local Accounts Chapter 4 Networking Services Hacks #36-47 Section 36 Manage Services on Remote Machines Section 37 Simplify DNS Aging and Scavenging Section 39 Manually Recreate a Damaged WINS Database Section 41 Ensure DHCP Server Availability Section 43 Change from Static IP to DHCP Section 45 Use netsh to Change Configuration Settings Section 47 Implement Windows 2000 Network Load Balancing Section 38 Troubleshoot DNS Section 40 Change WINS for All Enabled Adapters Section 42 Change a Network Adapter's IP Info Section 44 Release and Renew IP Addresses Section 46 Remove Orphaned Network Cards Chapter 5 File and Print Hacks #48-53 Section 48 Map Network Drives Section 49 Determine Who Has A Particular File Open on the Network Section 51 Automate Printer Management Section 53 Add Printers Based on Name of Computer Section 50 Display a Directory Tree Section 52 Set the Default Printer Based on Location Chapter 6 IIS Hacks #54-61 Section 54 Back Up the Metabase Section 55 Restore the Metabase Section 57 Metabase Hacks Section 59 IIS Administration Scripts Section 61 IISFAQ Section 56 Map the Metabase Section 58 Hide the Metabase Section 60 Run Other Web Servers Chapter 7 Deployment Hacks #62-68 Section 62 Get Started with RIS Section 63 Customize RIS Section 64 Tune RIS Section 66 Remove Windows Components from the Command Line Section 68 Easily Create a Network Boot Disk Section 65 Customize SysPrep Section 67 Unattended Installation of Windows Components Chapter 8 Security Hacks #69-78 Section 69 Fundamentals of a Virus-Free Network Section 70 Antivirus FAQ Section 72 Get a List of Local Administrators Section 74 Grant Administrative Access to a Domain Controller Section 76 Find Computers with Automatic logon Enabled Section 78 Microsoft Security Tools Section 71 Rename the Administrator and Guest Accounts Section 73 Find All Computers that Are Running a Service Section 75 Secure Backups Section 77 Security FAQ Chapter 9 Patch Management Hacks #79-89 Section 79 Best Practices for Patch Management Section 80 Beginners Guide to Enterprise Patch Management Section 82 Enumerate Installed Hotfixes Section 84 Windows Update FAQ Section 86 Use Automatic Updates Effectively Section 88 Automatic Updates FAQ Section 81 Patch-Management FAQ Section 83 Apply Patches in the Correct Order Section 85 Obtain Updates via the Windows Update Catalog Section 87 Use Group Policy to Configure Automatic Updates Section 89 Software Update Services FAQ Chapter 10 Backup and Recovery Hacks #90-100 Section 90 Collect Disaster Recovery Files Section 91 Back Up Individual Files from the Command Line Section 93 Back Up and Restore a Certificate Authority Section 95 Work with Shadow Copies Section 92 Back Up System State on Remote Machines Section 94 Back Up EFS Section 96 Back Up and Clear the Event Logs Section 97 Back Up the DFS Namespace Section 99 Recovery Roadmap Section 98 Recover with Automated System Recovery Section 100 Data Recovery of Last Resort Colophon Index Copyright © 2004 O'Reilly Media, Inc Printed in the United States of America Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472 O'Reilly & Associates books may be purchased for educational, business, or sales promotional use Online editions are also available for most titles (http://safari.oreilly.com) For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc The Hacks series designations, Windows Server Hacks, the image of a squeegee, 'Hacks 100 Industrial-Strength Tips and Tricks,' and related trade dress are trademarks of O'Reilly Media, Inc Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks Where those designations appear in this book, and O'Reilly Media, Inc was aware of a trademark claim, the designations have been printed in caps or initial caps While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein Credits About the Author Contributors Acknowledgments About the Author Mitch Tulloch is the author of over a dozen computer books, including three Nutshells for O'Reilly & Associates, Inc (Microsoft Exchange Server in a Nutshell, Windows 2000 Administration in a Nutshell, and Windows Server 2003 in a Nutshell), two encyclopedias for Microsoft Press (the Microsoft Encyclopedia of Networking, currently in its second edition, and the Microsoft Encyclopedia of Security), and a string of titles for system administrators from Osborne/McGraw-Hill Mitch has also written feature articles for industry magazines such as NetworkWorld and Microsoft Certified Professional Magazine, has developed university-level courses in Windows system administration, and provides training and consulting in Microsoft platforms and products Mitch is based in Winnipeg, Canada, and you can contact him through his web site (http://www.mtit.com) [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] PassList.bat code passwords expiration, checking for non-expired Lost Password Recovery tool policies users changing patch management best practices enterprise patch management FAQ introduction policies processes tools 2nd vulnerable systems and patches Automatic Updates 2nd business impact distribution email notification flavors hotfixes downloadable MSRC ratings system order of application roll-ups service packs SMS SUS testing Windows Update FAQ permissions for using code examples permissions, user configuration physical structure of metabase PPP (Policy, Process, Persistence) Print Manager Plus printers computer name and default, setting based on location managing automatically mappings, group membership and network, connecting to shared Printers folder, Run As processes, finish before terminating PWDNeverExpired.vbs [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] QChain quick backups, metabase [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] rdisk.exe, ER files ReadList.bat code recovery ASR (Automated System Recover) file collection startup troubleshooting Recovery Agents, key backups redundant DHCP servers, installing Regfind utility 2nd Registry keys, find and replace in command line ReleaseRenew.vbs code releasing IP addresses Remote Assistance, shortcuts to remote computers backups configuration System State configuration display network services, managing shut down renaming mapped drives renewing IP addresses Restore Groups restores CAs EFS keys metabase RFCs (Request For Comments) RIS (Remote Installation Services) CIW And configuration customizing installation overview predefining computer accounts system requirements tuning Windows images deployment roll-ups Run As 2nd command line executables and GUI and limitations network shares and Printers folder shortcuts Task Manager Windows Explorer and Run menu, drag and drop to RUNDLL32 command [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] scanning anti-virus software tools for scavenging, DDNS scripting engine, downloading scripts automatic logon downloading event log information IIS administration running remotely testing VB, WMI agents and Secondary Logon service [See Run As] Secure Sockets Layer, clearing security administrator account renaming local, listing antivirus FAQ assessment tools auditing tools awareness and Backup Operators backups computers, finding domain controllers, admin access FAQ file types blocked government clearance guest account, renaming interception and intrusion detection tools lockdown tools Microsoft reporting tools password policies patch management tools reporting to government authorities software update tools virus protection FAQ 2nd tools virus-free networks vulnerability Server Monitor Lite Server Operators, Backup Operators and ServerList.txt code ServerListenBacklog property, metabase hacks and service packs Services node, remote machine management shadow copies backups and implementation uses shared folders, drive mapping shortcuts to Remote Assistance Run As shut down remote computers SMS (Systems Management Server) socket pooling disabling IIS 5 IIS 6 reasons for software update tools, security SQL Server 2000 Security tools startup, troubleshooting static IPs, DHCP switch Static2DHCP.vbs code SUS (Software Update Services) patches and Sysinternals, auto log on SysPrep, Windows deployment and system requirements, RIS System State, backups remote computers [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] Task Manager, Run As and termination, finish process prior to testing scripts third-party tools Data Replicator Lost Password Recovery myITforum.com Network View Server Monitor Lite VNC (Virtual Network Computing) tools DNS troubleshooting patch management third-party Data Replicator Lost Password Recovery myITforum.com Network View Server Monitor Lite VNC trust relationships, listing in Active Directory [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] updates tools for UrlScan Security Tool users account information search, Active Directory accounts, no expiration Active Directory account management disabling domain account name changes groups, enumerating membership to CSV file home directory configuration local accounts, preventing creation membership, logon script information OU, properties modification passwords, changing permissions, configuring searching for utilities Hyena, file use Regfind regfind.exe [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] variables environment adding removing retrieving vbtree.vbs code virus protection FAQ tools virus-free networks anti-virus software basics file types blocked interception and VNC (Virtual Network Computing) VSS (Volume Shadow Copy Service) backups and implementing copies shadow copy uses [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] web applications, administrative scripts Web Server Lockdown Wizard web servers, IIS and web sites administrative scripts DNS troubleshooting tools IISFAQ Windows command line, removing components deployment, SysPrep and image deployment, RIS and installing components, unattended Windows 2000, locking accounts Windows 2000/3000, implementing NLB Windows Backup utility, metabase Windows Explorer, Run As and Windows NT, recreating WINS databases Windows Server 2000/3000, recreating WINS databases Windows Update catalog controls, manual install Critical Updates, personalizing FAQ information collection removing items schedule changes Secure Sockets Layer and Windows XP Active Directory icon restore winmsd.exe utility, ER files and WINS (Windows Internet Name Service) databases, recreating damaged settings, changing for all adapters WMI (Windows Management Instrumentation) agents, VB scripts and IIS administration workstation, printer settings WSH (Windows Scripting Host), IIS administration [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] XML metabase map, IIS 6 ... O'Reilly logo are registered trademarks of O'Reilly Media, Inc The Hacks series designations, Windows Server Hacks, the image of a squeegee, 'Hacks 100 Industrial-Strength Tips and Tricks,' and related trade dress are trademarks of O'Reilly... book WMI Essentials for Automating Windows Management (SAMS), published in 2001 He also cowrote Windows 2003 Server Bible (Wiley) and Mastering Active Directory for Windows Server 2003 (Sybex) Marcin has also been... Table of Contents Index Reviews Reader Reviews Errata Academic Windows Server Hacks By Mitch Tulloch Publisher : O'Reilly Pub Date : March 2004 ISBN : 0-596-00647-0 Pages : 384 Copyright Credits About the Author

Ngày đăng: 26/03/2019, 17:06

TỪ KHÓA LIÊN QUAN