Table of Contents

Acknowledgments xxxiii

Introduction xxxv

Part I: Prepare

Introduction to Windows Server 2008 3

Worth the Wait 4

Server Virtualization 4

Server Core 4

PowerShell 5

Read-Only Domain Controller 5

Active Directory Domain Services 5

Restartable Active Directory Domain Services 6

Fine-Grained Password Policies 6

Data Mining Tool 6

Terminal Services 7

Terminal Services Gateway 7

Terminal Services RemoteApp 7

Terminal Services Web Access 7

Terminal Services Session Broker 8

Terminal Services Drain Mode 8

Server Manager 8

Windows Server Backup 8

Clean Service Shutdown 9

More Security Features 9

Address Space Load Randomization 9

BitLocker Drive Encryption 9

Windows Firewall 10

Network Access Protection 10

Versions of Windows Server 2008 10

Summary 11

Introducing Directory Services 13

Understanding Directory Services 13

Active Directory in Microsoft Windows Server 2008 15

Terminology and Concepts in Active Directory 16

The Active Directory Architecture 19

The Directory System Agent 19

Naming Formats 20

The Data Model 20

Schema Implementation 20

The Security Model 21

Naming Contexts and Partitions 22

The Global Catalog 22

Summary 23

Planning Namespace and Domains 25

Analyzing Naming Convention Needs 25

Trees and Forests 26

Defining a Naming Convention 27

Determining Name Resolution 30

Planning a Domain Structure 32

Domains vs. Organizational Units 33

Designing a Domain Structure 34

Domain Security Guidelines 35

Creating Organizational Units 36

Planning Multiple Domains 36

Planning a Contiguous Namespace 37

Determining the Need for a Multi-Tree Forest 37

Creating the Forest 37

Summary 38

Planning Deployment 39

How Information Technology Functions 40

Identifying Business Needs 41

Getting Specific 41

Seeing into the Future 41

Assessing Current Systems 42

Documenting the Network 42

Making a Roadmap 45

Defining Goals 46

Assessing Risk 47

Summary 48

Part II: Install and Configure

Getting Started 51

Reviewing System Requirements 51

Designing a Deployment Environment 53

Choosing an Installation Method 53

Installing Windows Server 2008 53

Automating Server Deployment 61

Installing and Configuring WDS 63

Adding Additional Images 69

Troubleshooting Installations 72

Failure to Boot from a Network Distribution Point 72

Corrupt File During Installation 74

Failure to Find a Hard Disk 75

Stop Errors 76

Summary 77

Upgrading to Windows Server 2008 79

Upgrade Matrix 79

Common Threads to Upgrades 80

Pre-Upgrade Steps 81

Architecture 82

Active Directory 83

Hardware Support 85

Software Support 86

Preparing Domains and Computers 87

Upgrading Clients 88

Performing the Upgrade 88

Upgrading To Windows Server 2008 89

Forest and Domain Functional Levels 94

Summary 94

Configuring a New Installation 95

Overview of the Tasks 96

Initial Logon 97

Configure Hardware 98

Configuring Basic Computer Information 99

Setting the Time Zone 99

Configuring Networking 101

Setting the Computer Name and Domain 103

Updating and Feedback Settings 106

Enable Updates and Feedback 106

Getting Updates 112

Customizing the Server 112

Adding the Windows PowerShell Feature 113

Enable Remote Desktop 116

Configuring Windows Firewall 117

Closing the Initial Configuration Tasks Wizard 118

Summary 119

Installing Server Roles and Features 121

Defining Server Roles 122

Adding and Removing Roles 130

Add a Role 131

Removing a Role 135

Adding and Removing Role Services 139

Adding Role Services 139

Removing Role Services 141

Adding and Removing Features 142

Adding Features 143

Removing Features 144

Summary 145

Installing and Configuring Server Core 147

Benefits of a Server Core Installation 148

Security 148

Resources 149

Installing Server Core 149

Configuration 150

Initial Configuration 150

Installing Roles 157

Managing a Server Core Computer 160

Using Windows Remote Shell 162

Using Terminal Server RemoteApp 162

Summary 164

Managing Printers 165

Planning Printer Deployment 166

Establishing Printer Naming Conventions 166

Creating a Location-Naming Convention 167

Creating a Print Server 168

Enabling Printer Location Tracking 169

Migrating Print Servers 172

Using the Print Migration Wizard 172

Using the Command Line 174

Installing Printers 174

Deploying Printers with Group Policy 176

Adding PushPrinterConnections Using Group Policy 177

Managing Print Jobs from Windows 179

Temporarily Stopping Print Jobs 179

Canceling Print Jobs 179

Restarting a Print Job 179

Changing a Print Job Priority 180

Moving Print Jobs 180

Managing Printers from the Command Line 181

Setting Security Options 182

Changing Printer Availability and Group Priorities 182

Specifying a Separator Page 184

Modifying Print Spooling by Printer 185

Spool Print Documents So Program Finishes Printing Faster 186

Print Directly To The Printer 186

Hold Mismatched Documents 186

Print Spooled Documents First 186

Keep Printed Documents 186

Modifying Spooling on a Print Server 186

Optimizing Print Server Performance 187

Changing the Print Spooling Folder Location 187

Managing Printer Drivers 188

Creating Printer Pools 189

Preparing for Print Server Failure 190

Troubleshooting Printers 191

Starting at the Server 191

Starting at the Client 195

Summary 195

Managing Users and Groups 197

Understanding Groups 197

Assigning Group Scopes 198

Planning Organizational Units 200

Creating Organizational Units 201

Moving Organizational Units 202

Deleting Organizational Units 202

Planning a Group Strategy 202

Determining Group Names 202

Using Global and Domain Local Groups 203

Using Universal Groups 203

Implementing the Group Strategy 204

Creating Groups 204

Deleting Groups 205

Adding Users to a Group 205

Managing Default Groups and User Rights 208

Builtin Local Groups 208

Builtin Domain Local Groups 210

Builtin Global Groups 212

Defining User Rights 213

Creating User Accounts 218

Naming User Accounts 218

Account Options 218

Passwords 219

Creating a Domain User Account 220

Creating a Local User Account 221

Setting User Account Properties 222

Testing User Accounts 223

Managing User Accounts 223

Finding a User Account 224

Disabling and Enabling a User Account 225

Deleting a User Account 226

Moving a User Account 226

Renaming a User Account 226

Resetting a User's Password 227

Unlocking a User Account 227

Using Home Folders 228

Creating Home Folders on a Server 228

Providing Home Folders to Users 229

Maintaining User Profiles 230

Local Profiles 232

Roaming Profiles 232

Assigning a Logon Script to a User Profile 236

Summary 237

Managing File Resources 239

Share Permissions vs. File Permissions 240

Share Permissions 240

File Permissions 241

NTFS Permissions 242

How Permissions Work 244

Considering Inheritance 245

Configuring Folder Permissions 246

Assigning Permissions to Files 247

Configuring Special Permissions 248

Ownership and How It Works 250

Shared Folders 252

Using Share And Storage Management 252

Using the Command Line: Net Share 256

Publishing Shares in Active Directory 256

Distributed File System (DFS) 257

DFS Terminology 258

Namespace Server Requirements 260

Namespace Client Requirements 261

DFS Replication 262

Installing DFS Management 263

Creating or Opening a Namespace Root 265

Adding Namespace Servers 266

Adding DFS Folders 267

Changing Advanced Settings 268

Backing Up and Restoring the DFS Folder Targets 271

Using DFS Replication 271

Summary 280

Group Policy 281

What's New in Server 2008 282

Components of Group Policy 282

Group Policy Objects 282

Order of Implementation 283

Order of Inheritance 283

Creating a Group Policy Object 284

Editing a Group Policy Object 284

Deleting a Group Policy Object 285

Searching for a Group Policy Object 285

Using Starter GPOs 286

Group Policy Preferences 288

Using Group Policy Preferences for Windows 291

Configuring Common Options 305

Using Group Policy Preferences for Control Panel 306

Delegating Permissions on GPOs 335

Delegating Permission to Create 336

Delegating Permission to Link 336

Delegating Permission to Edit, Delete, or Modify Security 336

Disabling a Branch of a GPO 337

Refreshing Group Policy 337

Backing Up a Group Policy Object 338

Restoring a Group Policy Object 338

Using Group Policy for Folder Redirection 339

Redirecting to One Location 339

Redirecting by Group Membership 340

Removing Redirection 341

Using Resultant Set of Policy (RSoP) 341

Running an RSoP Query 342

A Planning RSoP 342

A Logging RSoP 343

Summary 343

Part III: Administer the Network

Managing Daily Operations 347

User Account Control (UAC) for Administration 347

The Admin Approval Mode (AAM) 348

UAC and Registry Virtualization 348

Disabling Aspects of User Account Control 349

Turning Off UAC 352

Using Microsoft Management Console 3.0 353

Setting MMC 3.0 Console Options 353

Creating an MMC Console with Snap-Ins 354

Using the New Taskpad View Wizard 355

Distributing and Using Consoles 356

Using MMC for Remote Administration 356

Setting Auditing Policy 357

Auditing Categories 358

Auditing Directory Service Events 362

Enabling Auditing of AD DS Objects 363

Setting Global Audit Policy 366

Enabling Auditing 367

Using Event Viewer 370

Managing Event Logs 375

Using Task Scheduler 377

Using the AT Command 378

Delegating Tasks 380

Summary 381

Using Scripts for Consistent Administration 383

Introducing Windows PowerShell 384

Understanding Windows PowerShell 385

Basics 386

PowerShell as a Shell 390

Cmdlets 393

Windows Infrastructure 398

The .NET Framework 398

Windows Management Instrumentation (WMI) 402

Windows Remote Management (WinRM) 404

Component Object Model (COM) 405

Creating Popup and Input Boxes 405

Exploring PowerShell 406

Get-Command 407

Get-Help 408

Get-Member 409

Data Display 410

Parameter Sets and Positional Parameters 412

Loading a Snap-in 414

Powershell Scripting Basics 414

Creating a .ps1 Script 415

Comments 417

Variables 418

Scope 418

Strings 419

Here Strings 420

Wildcards and Regular Expressions 421

Arrays 422

Hashtables 424

Operators 424

Functions 425

Conditional Statements 426

Looping Statements 429

Importing and Exporting From and To Files 430

Flow Control 431

Formatting Cmdlets 432

Exiting from Scripts, Functions, and Loops 434

Dot-Sourcing 434

Passing Arguments 435

Param Statement 436

$_ and $input 438

Error Handling 439

Redirection Operators 441

Type Accelerators 442

Escaping Characters 442

Windows PowerShell Examples 442

Typical File System Tasks 442

Testing Whether a File or Directory Exists 443

Windows Server Backup Cmdlets 444

Examples of Managing Server Core 444

XML Support 445

Using the File Transfer Protocol (FTP) 445

Downloading a File Using HTTP 446

Sending E-mail via SMTP 446

Compressing Files 447

Dealing with Dates 447

Timer/Countdown 449

Taking Input from the Console 450

Storing Secure Information 451

Checking Services and Processes 451

Checking the Windows Event Log 453

Getting Memory and CPU Information 455

Accessing Performance Counters 456

Checking Disk Space Usage 458

Working with the Registry 459

Copying Files to Another Directory Recursively 459

Rotating Logs 460

Renaming Files 460

Scheduling Tasks 461

Running Against Multiple Targets 462

Creating XML-Formatted Data 463

Checking Open Ports 464

Head, Tail, Touch, and Tee 464

Summary 466

Installing and Configuring Directory Services 467

Active Directory in Windows Server 2008 467

Active Directory Domain Services 468

Active Directory Lightweight Directory Services 468

Active Directory Rights Management Services 470

Active Directory Federation Services 472

Active Directory Certificate Services 473

Installing Active Directory Domain Services 473

Prerequisites for Installing AD DS 474

Installing AD DS Using the Active Directory Domain Services Installation Wizard 476

Operating System Compatibility 477

Deployment Configuration 478

Naming the Domain 479

Setting the Windows Server 2008 Functional Levels 480

File Locations 482

Completing the Installation 483

Adding a Domain Controller to an Existing Domain 484

Verifying the Installation of AD DS 484

Advanced Options 485

Install from Media 486

Unattended Installation 487

Uninstalling AD DS 489

Installing and Configuring Read-Only Domain Controllers 492

What Are Read-Only Domain Controllers? 492

Why Use RODCs? 493

Delegating RODC Installations and Administration 493

Configuring Password Replication Policies 496

Managing AD DS with Active Directory Users and Computers 498

Viewing AD DS Objects 499

Creating a Computer Object 503

Configuring Computer Objects 503

Using Remote Computer Management 504

Publishing a Shared Folder 504

Publishing a Printer 504

Moving, Renaming, and Deleting Objects 505

Managing AD DS with Active Directory Domains and Trusts 506

Launching Active Directory Domains And Trusts 506

Managing Domain Trust Relationships 507

Specifying the Domain Manager 509

Configuring User Principal Name Suffixes for a Forest 509

Using Active Directory Sites And Services 510

AD DS Sites Overview 512

Understanding AD DS Replication 513

Launching Active Directory Sites And Services 515

Installing and Configuring Active Directory Lightweight Directory Service 521

AD LDS Overview 522

AD LDS Features 522

Configuring Instances and Application Partitions 523

Managing AD LDS 526

Configuring Replication 530

Configuring AD DS and AD LDS Synchronization 531

Summary 533

Managing Active Directory 535

Maintaining the AD DS Database 535

AD DS Data Storage 535

Garbage Collection 537

Online Defragmentation 537

Restartable Active Directory Domain Services 538

Offline Defragmentation of the AD DS Database 540

Moving Database and Transaction Log Locations 541

Backing Up AD DS 541

The Need for Backups 543

Backup Frequency 544

Performing an AD DS Backup with Windows Server Backup 545

Restoring AD DS 546

Removing Domain Controllers from AD DS with Ntdsutil 546

Performing a Nonauthoritative Restore of AD DS 548

Performing an Authoritative Restore of AD DS 550

Managing the AD DS Schema 552

Requirements for Modifying the AD DS Schema 553

Launching Active Directory Schema 554

Modifying the Schema 555

Managing Operations Master Roles 561

Transferring Operations Master Roles 564

Seizing Operations Master Roles 566

Auditing AD DS 567

Configuring the Audit Policy 567

Enabling Auditing of AD DS Changes 570

Summary 572

Administering TCP/IP 573

Using DHCP 574

Designing DHCP Networks 574

Adding the DHCP Server Role 576

Creating a New Scope 582

Authorizing the DHCP Server and Activating Scopes 589

Adding Address Reservations 590

Using Multiple DHCP Servers for Redundancy 592

Setting Up a DHCP Relay Agent 593

DHCP Command-Line Administration 595

Using DNS Server 595

Setting Up a DNS Server 596

Creating Subdomains and Delegating Authority 603

Adding Resource Records 605

Configuring Zone Transfers 608

Interoperating with Other DNS Servers 609

Setting Up a Forwarder 610

Setting Up a WINS Server 613

Summary 614

Implementing Disk Management 615

Understanding Disk Terminology 616

Overview of Disk Management 619

Remote Management 622

Dynamic Disks 622

Command Line 623

Adding a New Disk 623

Partitions and Volumes 625

Creating a Volume or Partition 626

Creating Extended Partitions and Logical Drives 631

Converting a Disk to a Dynamic Disk 631

Converting a Disk to a GPT Disk 632

Changing the Size of a Volume 633

Adding a Mirror to a Volume 637

Setting Disk Quotas 641

Enabling Quotas on a Disk 642

Setting Per-User Quotas 643

Importing and Exporting Quotas 645

Enabling File Encryption 647

Summary 649

Managing Storage 651

Using File Server Resource Manager 651

Installation and Initial Configuration of FSRM 652

Scheduling Storage Reports 654

Using Directory Quotas 657

Screening Files 663

Overview of SAN Manager 670

Concepts and Terminology 672

Installing Storage Manager For SANs 674

Using the Storage Manager For SANs Console 675

Managing Server Connections 676

Managing iSCSI Targets 678

Managing iSCSI Security 679

Logging In to iSCSI Targets 680

Creating and Deploying Logical Units (LUNs) 681

Extending a LUN 687

Removable Storage 689

Concepts and Terminology 689

Use and Management 693

Summary 697

Using Clusters 699

What Is a Cluster? 699

Network Load Balancing Clusters 700

Failover Clusters 700

New Failover Cluster Features 701

Windows Server 2008 Core 702

Cluster Scenarios 703

Web Server 703

Terminal Services 703

Mission-Critical Applications and Services 703

Requirements and Planning 704

Identifying and Addressing Goals 704

Identifying a Solution 705

Identifying and Addressing Risks 705

Making Checklists 706

Network Load Balancing Clusters 706

NLB Concepts 706

Choosing an NLB Cluster Model 707

Creating an NLB Cluster 709

Planning the Capacity of an NLB Cluster 716

Providing Fault Tolerance 717

Optimizing an NLB Cluster 717

Failover Clusters 718

Failover Cluster Concepts 718

Types of Resources 720

Defining Failover and Failback 723

Configuring a Failover Cluster 724

Planning the Capacity of a Failover Cluster 726

Creating a Failover Cluster 727

HPC Clusters 740

Summary 742

Part IV: Secure the Network

Planning Security 745

The Fundamental Principles of Security 745

Confidentiality 746

Integrity 747

Availability 748

The Eight Rules of Security 748

Rule of Least Privilege 749

Rule of Change Management 749

Rule of Trust 749

Rule of the Weakest Link 750

Rule of Separation 750

Rule of the Three-Fold Process 750

Rule of Preventative Action 750

Rule of Immediate and Proper Response 751

The Higher Security Mindset 751

Think in Terms of Zones 753

Create Chokepoints 754

Layer Your Security 755

Understand Relational Security 756

Divide Responsibility 759

Summary 761

Implementing Security 763

Introduction 763

Secure at Installation 764

Server Core 767

Roles and Features Wizards 770

Securing the Startup: BitLocker 773

Setting Up BitLocker 773

Securing the Accounts 779

Disabling the Administrator Account 780

Password Policies on Standalone Servers 781

Password Policies in Domains 781

Windows Server 2008 Firewall 785

Setting Firewall Policies Using Group Policy 786

Firewall Rule Basics 788

Rule Definitions 789

Creating a Firewall Policy 791

Windows Firewall Via Command Line 793

Additional Security Changes 795

New Groups 796

Auditing 796

LanMan Hashes and Authentication Level 797

SMBv2 797

Read Only Domain Controllers 798

Summary 798

Administering Network Access Protection 799

Why the Need for NAP? 799

Planning the Deployment 801

NAP Shopping List 801

Servers Needed for NAP 802

Benefits of NAP 804

Determining the Health Policy 804

Policies Checked 804

Enforcement Levels 806

Determining Exemptions 807

Testing IPsec NAP Enforcement 808

Setting Up a Certificate Server 809

Configuring the NAP Health Policy Server 818

Client Settings for NAP 819

IEEE 802.1x Enforcement in NAP 827

Configuring IEEE 802xz Enforcement 828

Configuring 802.1X Enforcement 828

The Politics of Deployment 830

Summary 832

Patch Management 833

Why It's Important 834

The Patching Cycle 835

Assess 836

Identify 836

Evaluate and Plan 838

Deploy 838

Repeat 839

Deployment Testing 839

Test Network Deployment 839

Beta User Deployment 840

Full Deployment 840

Obtaining Updates 841

Automatic Updates 841

Windows Server Update Services 841

Systems Center Configuration Manager 845

Third-Party Products 845

Summary 846

Implementing Remote Access Strategies: SSTP, VPN, and Wireless 847

Introduction 847

Network Policy Server 848

Planning for NPS 848

Start with the Policies 849

Define the Support 850

Secure Sockets Tunnelling Protocol 850

The SSTP Process 851

Configuring SSTP 852

Installing the Server Authentication Certificate 858

Installing Routing And Remote Access 868

Configuring SSTP-based Connection Clients 877

Making the SSTP Connection 881

Troubleshooting Connections 883

Using NPS in Windows Server 2008 887

Configuring Remote Access Per User 887

Configuring Remote Access in the NPS Network Policy 887

Wireless Deployment 889

Prerequisites 890

Adding RADIUS Clients to the Network 892

Configuring the Access Points 893

Configuring Clients to Use Secure Wireless 894

Summary 899

Part V: Use Support Services and Features

Interoperability 903

General UNIX Interoperability 903

Permissions and Security Concepts 904

A UNIX File Listing 904

Symbolic Links 906

Privilege Levels 907

Basic Connectivity 908

File Transfer Protocol 908

Telnet 909

File Systems 910

Printing 912

Network File System 912

Legacy User Name Mapping 914

Server For NFS 916

Microsoft Identity Management for UNIX 923

Installing Microsoft Identity Management for UNIX 924

Subsystem for UNIX-based Applications 928

Macintosh Interoperability 932

Summary 932

Managing Software 933

Using the Group Policy Software Installation Extension 933

Finding the Right Mix of Services 935

Windows Installer Packages 936

Zap Files 936

Setting Up the Group Policy Software Installation Extension 939

Creating a Software Distribution Point 939

Creating a GPO for Application Deployment 940

Configuring the Group Policy Software Installation Extension 943

Working with Packages 947

Adding a Package to a Group Policy 947

Changing Application Properties 950

Applying Package Upgrades 952

Applying Package Modifications 953

Removing and Redeploying Packages 955

Using Software Restriction Policies 955

How Software Restriction Policies Work 956

Creating Software Restriction Policies 957

Windows Deployment Services 959

Summary 959

Working with Windows Virtualization 961

Hyper-V Overview 962

Scenarios 963

Requirements 964

Installation 965

Installing On Windows Server Core 965

Installing on Windows Server 2008 965

Initial Configuration 968

Configuring Networks 969

Server Settings 972

Creating A Virtual Machine 974

Creating a Basic VM 975

Machine Settings 978

Management Settings 994

Working With A Virtual Machine 998

Starting, Stopping, Saving, Snapshotting 998

Clipboard 999

Export/Import 1000

Summary 1003

Deploying Terminal Services 1005

Concepts 1007

Remote Access 1008

Central Management 1008

Requirements 1009

RAM 1009

CPU 1009

Network Utilization 1010

Capacity Planning 1010

Installation 1011

Improving the User Experience 1020

Enabling Remote Desktop for Administration Mode 1023

Installing Programs 1024

Administration 1027

Terminal Services Manager 1027

Terminal Services Configuration 1037

Terminal Services Licensing 1042

Installing Terminal Server Licensing 1042

RemoteApps 1044

TS RemoteApp Manager 1045

Adding RemoteApps 1050

Deploying RemoteApps 1052

TS Web Access 1056

Remote Desktop Web Connection 1057

TS Web Access RemoteApp Programs 1058

Summary 1059

Internet Information Services 1061

Architecture 1062

Components 1062

Modules 1063

Installing IIS 1065

Installing Using the Server Roles Wizard 1065

Installing Using Windows Package Manager 1066

Administration Tools 1068

Internet Information Server (IIS) Manager 1068

AppCmd.exe 1071

Windows Management Instrumentation (WMI) 1073

Administrative Tasks 1073

Managing Servers 1073

Managing Sites 1084

Managing Web Applications 1093

Managing Virtual Directories 1094

Understanding Delegation and Permissions 1094

Delegating Site and Application Management 1095

Configuring Permissions to View and Manage Content 1097

Understanding the Configuration Store 1098

Using Shared Configuration 1099

Remote Administration 1099

Installing and Managing the FTP Publishing Service 1100

FTP Current Sessions 1102

FTP Directory Browsing 1102

FTP Firewall Support 1102

FTP Messages 1102

FTP SSL Settings 1102

FTP User Isolation 1102

Active Directory Federation Services (AD FS) 1103

Summary 1104

Part VI: Tune, Maintain, and Repair

Windows Reliability And Performance Monitor 1107

Using Resource View 1107

CPU Details 1109

Disk Details 1110

Network Details 1110

Memory Details 1110

Using Performance Monitor 1111

Adding Counters in Performance Monitor 1112

Changing the Performance Monitor Display 1114

Saving the Performance Monitor Display 1114

Connecting to a Remote Computer Using Performance Monitor 1115

Using Reliability Monitor 1115

Viewing Reliability Monitor on a Remote Computer 1116

Interpreting the System Stability Index 1117

Creating a Data Collector Set 1119

Building a Data Collector Set from a Template 1120

Creating a Data Collector Set from Performance Monitor 1123

Constructing a Data Collector Set Manually 1123

Creating a Data Collector Set to Monitor Performance Counters 1125

Scheduling Data Collection 1126

Managing Collected Data 1128

Working with Data Log Files 1129

Viewing Reports 1131

Summary 1132

Disaster Planning 1133

Planning for Disaster 1133

Identifying the Risks 1134

Identifying the Resources 1135

Developing the Responses 1136

Testing the Responses 1139

Iterating 1140

Preparing for a Disaster 1141

Setting Up a Fault-Tolerant System 1141

Backing Up the System 1142

System Repair 1142

Specifying Recovery Options 1144

Summary 1145

Using Backup 1147

Installing the Backup Service 1147

Scheduling a Backup 1149

Choosing Volumes to Back Up 1149

Designating a Storage Location 1149

Creating the Backup Schedule 1150

Implementing a Rotating Backup Set 1154

Modifying a Backup Schedule 1155

Stop Running Scheduled Backups 1156

Using the Backup Once Wizard 1157

Using the Wbadmin Command 1159

Wbadmin enable backup 1160

Wbadmin disable backup 1160

Wbadmin start backup 1160

Wbadmin stop job 1161

Wbadmin start recovery 1161

Wbadmin start systemstatebackup 1161

Wbadmin start sysstaterecovery 1161

Wbadmin start sysrecovery 1162

Windows Recovery Environment 1162

Wbadmin get versions 1162

Wbadmin get status 1163

Recovering Your Server 1165

Recovering Volumes 1166

Recovering Files and Folders from the Local Server 1167

Recovering Files and Folders from Another Server 1168

Recovering Applications and Data 1169

Recovering the Operating System 1171

Restoring a Backup Catalog 1173

Summary 1174

Planning Fault Tolerance and Avoidance 1175

Mean Time to Failure and Mean Time to Recover 1176

Protecting the Power Supply 1177

Local Power Supply Failure 1178

Voltage Variations 1179

Short-Term Power Outages 1182

Long-Term Power Outages 1182

Disk Arrays 1183

Hardware vs. Software 1183

RAID Levels for Fault Tolerance 1183

Hot-Swap and Hot-Spare Disk Systems 1189

Distributed File System 1190

Clustering 1190

Network Load Balancing 1190

Failover Clustering 1190

Summary 1191

Managing the Registry 1193

Introducing the Registry 1193

The Origins of the Registry 1194

How Registry Data Is Used 1195

Functional Changes in Windows Server 2008 1196

Understanding the Registry's Structure 1198

The Root Keys 1201

Major Subkeys 1203

How Data Is Stored 1206

Creating Registry Items with the Registry Wizard 1209

Using the Registry Editors 1211

A Whirlwind Tour of the Registry Editor 1211

A Whirlwind Tour of Reg 1220

Backing Up and Restoring the Registry 1221

Choosing a Backup Method 1221

System Recovery 1222

Summary 1222

Troubleshooting and Recovery 1223

Determining Priorities 1223

Recovering a System 1225

Identifying Possible Causes 1225

Rolling Back a Device Driver 1226

Recovering Your Server 1227

Recovering Volumes 1227

Recovering Files and Folders from the Local Server 1229

Recovering Files and Folders from Another Server 1229

Recovering Applications and Data 1231

Recovering the Operating System 1233

Recovering the System State 1234

Using System Information 1236

Verifying the Status of Services 1236

Using the System Configuration Utility 1239

Using the System File Checker 1240

Using the Shutdown Event Tracker 1241

Summary 1242

A: Interface Changes from Windows Server 2003 1243

B: Optional Components 1247

C: Understanding TCP/IP v4 1257

About the Authors 1281

Index 1283

 

 

© Microsoft. All Rights Reserved.