Table of Contents
Acknowledgments xxxiii
Introduction xxxv
Part I: Prepare
Introduction to Windows Server 2008 3
Worth the Wait 4
Server Virtualization 4
Server Core 4
PowerShell 5
Read-Only Domain Controller 5
Active Directory Domain Services 5
Restartable Active Directory Domain Services 6
Fine-Grained Password Policies 6
Data Mining Tool 6
Terminal Services 7
Terminal Services Gateway 7
Terminal Services RemoteApp 7
Terminal Services Web Access 7
Terminal Services Session Broker 8
Terminal Services Drain Mode 8
Server Manager 8
Windows Server Backup 8
Clean Service Shutdown 9
More Security Features 9
Address Space Load Randomization 9
BitLocker Drive Encryption 9
Windows Firewall 10
Network Access Protection 10
Versions of Windows Server 2008 10
Summary 11
Introducing Directory Services 13
Understanding Directory Services 13
Active Directory in Microsoft Windows Server 2008 15
Terminology and Concepts in Active Directory 16
The Active Directory Architecture 19
The Directory System Agent 19
Naming Formats 20
The Data Model 20
Schema Implementation 20
The Security Model 21
Naming Contexts and Partitions 22
The Global Catalog 22
Summary 23
Planning Namespace and Domains 25
Analyzing Naming Convention Needs 25
Trees and Forests 26
Defining a Naming Convention 27
Determining Name Resolution 30
Planning a Domain Structure 32
Domains vs. Organizational Units 33
Designing a Domain Structure 34
Domain Security Guidelines 35
Creating Organizational Units 36
Planning Multiple Domains 36
Planning a Contiguous Namespace 37
Determining the Need for a Multi-Tree Forest 37
Creating the Forest 37
Summary 38
Planning Deployment 39
How Information Technology Functions 40
Identifying Business Needs 41
Getting Specific 41
Seeing into the Future 41
Assessing Current Systems 42
Documenting the Network 42
Making a Roadmap 45
Defining Goals 46
Assessing Risk 47
Summary 48
Part II: Install and Configure
Getting Started 51
Reviewing System Requirements 51
Designing a Deployment Environment 53
Choosing an Installation Method 53
Installing Windows Server 2008 53
Automating Server Deployment 61
Installing and Configuring WDS 63
Adding Additional Images 69
Troubleshooting Installations 72
Failure to Boot from a Network Distribution Point 72
Corrupt File During Installation 74
Failure to Find a Hard Disk 75
Stop Errors 76
Summary 77
Upgrading to Windows Server 2008 79
Upgrade Matrix 79
Common Threads to Upgrades 80
Pre-Upgrade Steps 81
Architecture 82
Active Directory 83
Hardware Support 85
Software Support 86
Preparing Domains and Computers 87
Upgrading Clients 88
Performing the Upgrade 88
Upgrading To Windows Server 2008 89
Forest and Domain Functional Levels 94
Summary 94
Configuring a New Installation 95
Overview of the Tasks 96
Initial Logon 97
Configure Hardware 98
Configuring Basic Computer Information 99
Setting the Time Zone 99
Configuring Networking 101
Setting the Computer Name and Domain 103
Updating and Feedback Settings 106
Enable Updates and Feedback 106
Getting Updates 112
Customizing the Server 112
Adding the Windows PowerShell Feature 113
Enable Remote Desktop 116
Configuring Windows Firewall 117
Closing the Initial Configuration Tasks Wizard 118
Summary 119
Installing Server Roles and Features 121
Defining Server Roles 122
Adding and Removing Roles 130
Add a Role 131
Removing a Role 135
Adding and Removing Role Services 139
Adding Role Services 139
Removing Role Services 141
Adding and Removing Features 142
Adding Features 143
Removing Features 144
Summary 145
Installing and Configuring Server Core 147
Benefits of a Server Core Installation 148
Security 148
Resources 149
Installing Server Core 149
Configuration 150
Initial Configuration 150
Installing Roles 157
Managing a Server Core Computer 160
Using Windows Remote Shell 162
Using Terminal Server RemoteApp 162
Summary 164
Managing Printers 165
Planning Printer Deployment 166
Establishing Printer Naming Conventions 166
Creating a Location-Naming Convention 167
Creating a Print Server 168
Enabling Printer Location Tracking 169
Migrating Print Servers 172
Using the Print Migration Wizard 172
Using the Command Line 174
Installing Printers 174
Deploying Printers with Group Policy 176
Adding PushPrinterConnections Using Group Policy 177
Managing Print Jobs from Windows 179
Temporarily Stopping Print Jobs 179
Canceling Print Jobs 179
Restarting a Print Job 179
Changing a Print Job Priority 180
Moving Print Jobs 180
Managing Printers from the Command Line 181
Setting Security Options 182
Changing Printer Availability and Group Priorities 182
Specifying a Separator Page 184
Modifying Print Spooling by Printer 185
Spool Print Documents So Program Finishes Printing Faster 186
Print Directly To The Printer 186
Hold Mismatched Documents 186
Print Spooled Documents First 186
Keep Printed Documents 186
Modifying Spooling on a Print Server 186
Optimizing Print Server Performance 187
Changing the Print Spooling Folder Location 187
Managing Printer Drivers 188
Creating Printer Pools 189
Preparing for Print Server Failure 190
Troubleshooting Printers 191
Starting at the Server 191
Starting at the Client 195
Summary 195
Managing Users and Groups 197
Understanding Groups 197
Assigning Group Scopes 198
Planning Organizational Units 200
Creating Organizational Units 201
Moving Organizational Units 202
Deleting Organizational Units 202
Planning a Group Strategy 202
Determining Group Names 202
Using Global and Domain Local Groups 203
Using Universal Groups 203
Implementing the Group Strategy 204
Creating Groups 204
Deleting Groups 205
Adding Users to a Group 205
Managing Default Groups and User Rights 208
Builtin Local Groups 208
Builtin Domain Local Groups 210
Builtin Global Groups 212
Defining User Rights 213
Creating User Accounts 218
Naming User Accounts 218
Account Options 218
Passwords 219
Creating a Domain User Account 220
Creating a Local User Account 221
Setting User Account Properties 222
Testing User Accounts 223
Managing User Accounts 223
Finding a User Account 224
Disabling and Enabling a User Account 225
Deleting a User Account 226
Moving a User Account 226
Renaming a User Account 226
Resetting a User's Password 227
Unlocking a User Account 227
Using Home Folders 228
Creating Home Folders on a Server 228
Providing Home Folders to Users 229
Maintaining User Profiles 230
Local Profiles 232
Roaming Profiles 232
Assigning a Logon Script to a User Profile 236
Summary 237
Managing File Resources 239
Share Permissions vs. File Permissions 240
Share Permissions 240
File Permissions 241
NTFS Permissions 242
How Permissions Work 244
Considering Inheritance 245
Configuring Folder Permissions 246
Assigning Permissions to Files 247
Configuring Special Permissions 248
Ownership and How It Works 250
Shared Folders 252
Using Share And Storage Management 252
Using the Command Line: Net Share 256
Publishing Shares in Active Directory 256
Distributed File System (DFS) 257
DFS Terminology 258
Namespace Server Requirements 260
Namespace Client Requirements 261
DFS Replication 262
Installing DFS Management 263
Creating or Opening a Namespace Root 265
Adding Namespace Servers 266
Adding DFS Folders 267
Changing Advanced Settings 268
Backing Up and Restoring the DFS Folder Targets 271
Using DFS Replication 271
Summary 280
Group Policy 281
What's New in Server 2008 282
Components of Group Policy 282
Group Policy Objects 282
Order of Implementation 283
Order of Inheritance 283
Creating a Group Policy Object 284
Editing a Group Policy Object 284
Deleting a Group Policy Object 285
Searching for a Group Policy Object 285
Using Starter GPOs 286
Group Policy Preferences 288
Using Group Policy Preferences for Windows 291
Configuring Common Options 305
Using Group Policy Preferences for Control Panel 306
Delegating Permissions on GPOs 335
Delegating Permission to Create 336
Delegating Permission to Link 336
Delegating Permission to Edit, Delete, or Modify Security 336
Disabling a Branch of a GPO 337
Refreshing Group Policy 337
Backing Up a Group Policy Object 338
Restoring a Group Policy Object 338
Using Group Policy for Folder Redirection 339
Redirecting to One Location 339
Redirecting by Group Membership 340
Removing Redirection 341
Using Resultant Set of Policy (RSoP) 341
Running an RSoP Query 342
A Planning RSoP 342
A Logging RSoP 343
Summary 343
Part III: Administer the Network
Managing Daily Operations 347
User Account Control (UAC) for Administration 347
The Admin Approval Mode (AAM) 348
UAC and Registry Virtualization 348
Disabling Aspects of User Account Control 349
Turning Off UAC 352
Using Microsoft Management Console 3.0 353
Setting MMC 3.0 Console Options 353
Creating an MMC Console with Snap-Ins 354
Using the New Taskpad View Wizard 355
Distributing and Using Consoles 356
Using MMC for Remote Administration 356
Setting Auditing Policy 357
Auditing Categories 358
Auditing Directory Service Events 362
Enabling Auditing of AD DS Objects 363
Setting Global Audit Policy 366
Enabling Auditing 367
Using Event Viewer 370
Managing Event Logs 375
Using Task Scheduler 377
Using the AT Command 378
Delegating Tasks 380
Summary 381
Using Scripts for Consistent Administration 383
Introducing Windows PowerShell 384
Understanding Windows PowerShell 385
Basics 386
PowerShell as a Shell 390
Cmdlets 393
Windows Infrastructure 398
The .NET Framework 398
Windows Management Instrumentation (WMI) 402
Windows Remote Management (WinRM) 404
Component Object Model (COM) 405
Creating Popup and Input Boxes 405
Exploring PowerShell 406
Get-Command 407
Get-Help 408
Get-Member 409
Data Display 410
Parameter Sets and Positional Parameters 412
Loading a Snap-in 414
Powershell Scripting Basics 414
Creating a .ps1 Script 415
Comments 417
Variables 418
Scope 418
Strings 419
Here Strings 420
Wildcards and Regular Expressions 421
Arrays 422
Hashtables 424
Operators 424
Functions 425
Conditional Statements 426
Looping Statements 429
Importing and Exporting From and To Files 430
Flow Control 431
Formatting Cmdlets 432
Exiting from Scripts, Functions, and Loops 434
Dot-Sourcing 434
Passing Arguments 435
Param Statement 436
$_ and $input 438
Error Handling 439
Redirection Operators 441
Type Accelerators 442
Escaping Characters 442
Windows PowerShell Examples 442
Typical File System Tasks 442
Testing Whether a File or Directory Exists 443
Windows Server Backup Cmdlets 444
Examples of Managing Server Core 444
XML Support 445
Using the File Transfer Protocol (FTP) 445
Downloading a File Using HTTP 446
Sending E-mail via SMTP 446
Compressing Files 447
Dealing with Dates 447
Timer/Countdown 449
Taking Input from the Console 450
Storing Secure Information 451
Checking Services and Processes 451
Checking the Windows Event Log 453
Getting Memory and CPU Information 455
Accessing Performance Counters 456
Checking Disk Space Usage 458
Working with the Registry 459
Copying Files to Another Directory Recursively 459
Rotating Logs 460
Renaming Files 460
Scheduling Tasks 461
Running Against Multiple Targets 462
Creating XML-Formatted Data 463
Checking Open Ports 464
Head, Tail, Touch, and Tee 464
Summary 466
Installing and Configuring Directory Services 467
Active Directory in Windows Server 2008 467
Active Directory Domain Services 468
Active Directory Lightweight Directory Services 468
Active Directory Rights Management Services 470
Active Directory Federation Services 472
Active Directory Certificate Services 473
Installing Active Directory Domain Services 473
Prerequisites for Installing AD DS 474
Installing AD DS Using the Active Directory Domain Services Installation Wizard 476
Operating System Compatibility 477
Deployment Configuration 478
Naming the Domain 479
Setting the Windows Server 2008 Functional Levels 480
File Locations 482
Completing the Installation 483
Adding a Domain Controller to an Existing Domain 484
Verifying the Installation of AD DS 484
Advanced Options 485
Install from Media 486
Unattended Installation 487
Uninstalling AD DS 489
Installing and Configuring Read-Only Domain Controllers 492
What Are Read-Only Domain Controllers? 492
Why Use RODCs? 493
Delegating RODC Installations and Administration 493
Configuring Password Replication Policies 496
Managing AD DS with Active Directory Users and Computers 498
Viewing AD DS Objects 499
Creating a Computer Object 503
Configuring Computer Objects 503
Using Remote Computer Management 504
Publishing a Shared Folder 504
Publishing a Printer 504
Moving, Renaming, and Deleting Objects 505
Managing AD DS with Active Directory Domains and Trusts 506
Launching Active Directory Domains And Trusts 506
Managing Domain Trust Relationships 507
Specifying the Domain Manager 509
Configuring User Principal Name Suffixes for a Forest 509
Using Active Directory Sites And Services 510
AD DS Sites Overview 512
Understanding AD DS Replication 513
Launching Active Directory Sites And Services 515
Installing and Configuring Active Directory Lightweight Directory Service 521
AD LDS Overview 522
AD LDS Features 522
Configuring Instances and Application Partitions 523
Managing AD LDS 526
Configuring Replication 530
Configuring AD DS and AD LDS Synchronization 531
Summary 533
Managing Active Directory 535
Maintaining the AD DS Database 535
AD DS Data Storage 535
Garbage Collection 537
Online Defragmentation 537
Restartable Active Directory Domain Services 538
Offline Defragmentation of the AD DS Database 540
Moving Database and Transaction Log Locations 541
Backing Up AD DS 541
The Need for Backups 543
Backup Frequency 544
Performing an AD DS Backup with Windows Server Backup 545
Restoring AD DS 546
Removing Domain Controllers from AD DS with Ntdsutil 546
Performing a Nonauthoritative Restore of AD DS 548
Performing an Authoritative Restore of AD DS 550
Managing the AD DS Schema 552
Requirements for Modifying the AD DS Schema 553
Launching Active Directory Schema 554
Modifying the Schema 555
Managing Operations Master Roles 561
Transferring Operations Master Roles 564
Seizing Operations Master Roles 566
Auditing AD DS 567
Configuring the Audit Policy 567
Enabling Auditing of AD DS Changes 570
Summary 572
Administering TCP/IP 573
Using DHCP 574
Designing DHCP Networks 574
Adding the DHCP Server Role 576
Creating a New Scope 582
Authorizing the DHCP Server and Activating Scopes 589
Adding Address Reservations 590
Using Multiple DHCP Servers for Redundancy 592
Setting Up a DHCP Relay Agent 593
DHCP Command-Line Administration 595
Using DNS Server 595
Setting Up a DNS Server 596
Creating Subdomains and Delegating Authority 603
Adding Resource Records 605
Configuring Zone Transfers 608
Interoperating with Other DNS Servers 609
Setting Up a Forwarder 610
Setting Up a WINS Server 613
Summary 614
Implementing Disk Management 615
Understanding Disk Terminology 616
Overview of Disk Management 619
Remote Management 622
Dynamic Disks 622
Command Line 623
Adding a New Disk 623
Partitions and Volumes 625
Creating a Volume or Partition 626
Creating Extended Partitions and Logical Drives 631
Converting a Disk to a Dynamic Disk 631
Converting a Disk to a GPT Disk 632
Changing the Size of a Volume 633
Adding a Mirror to a Volume 637
Setting Disk Quotas 641
Enabling Quotas on a Disk 642
Setting Per-User Quotas 643
Importing and Exporting Quotas 645
Enabling File Encryption 647
Summary 649
Managing Storage 651
Using File Server Resource Manager 651
Installation and Initial Configuration of FSRM 652
Scheduling Storage Reports 654
Using Directory Quotas 657
Screening Files 663
Overview of SAN Manager 670
Concepts and Terminology 672
Installing Storage Manager For SANs 674
Using the Storage Manager For SANs Console 675
Managing Server Connections 676
Managing iSCSI Targets 678
Managing iSCSI Security 679
Logging In to iSCSI Targets 680
Creating and Deploying Logical Units (LUNs) 681
Extending a LUN 687
Removable Storage 689
Concepts and Terminology 689
Use and Management 693
Summary 697
Using Clusters 699
What Is a Cluster? 699
Network Load Balancing Clusters 700
Failover Clusters 700
New Failover Cluster Features 701
Windows Server 2008 Core 702
Cluster Scenarios 703
Web Server 703
Terminal Services 703
Mission-Critical Applications and Services 703
Requirements and Planning 704
Identifying and Addressing Goals 704
Identifying a Solution 705
Identifying and Addressing Risks 705
Making Checklists 706
Network Load Balancing Clusters 706
NLB Concepts 706
Choosing an NLB Cluster Model 707
Creating an NLB Cluster 709
Planning the Capacity of an NLB Cluster 716
Providing Fault Tolerance 717
Optimizing an NLB Cluster 717
Failover Clusters 718
Failover Cluster Concepts 718
Types of Resources 720
Defining Failover and Failback 723
Configuring a Failover Cluster 724
Planning the Capacity of a Failover Cluster 726
Creating a Failover Cluster 727
HPC Clusters 740
Summary 742
Part IV: Secure the Network
Planning Security 745
The Fundamental Principles of Security 745
Confidentiality 746
Integrity 747
Availability 748
The Eight Rules of Security 748
Rule of Least Privilege 749
Rule of Change Management 749
Rule of Trust 749
Rule of the Weakest Link 750
Rule of Separation 750
Rule of the Three-Fold Process 750
Rule of Preventative Action 750
Rule of Immediate and Proper Response 751
The Higher Security Mindset 751
Think in Terms of Zones 753
Create Chokepoints 754
Layer Your Security 755
Understand Relational Security 756
Divide Responsibility 759
Summary 761
Implementing Security 763
Introduction 763
Secure at Installation 764
Server Core 767
Roles and Features Wizards 770
Securing the Startup: BitLocker 773
Setting Up BitLocker 773
Securing the Accounts 779
Disabling the Administrator Account 780
Password Policies on Standalone Servers 781
Password Policies in Domains 781
Windows Server 2008 Firewall 785
Setting Firewall Policies Using Group Policy 786
Firewall Rule Basics 788
Rule Definitions 789
Creating a Firewall Policy 791
Windows Firewall Via Command Line 793
Additional Security Changes 795
New Groups 796
Auditing 796
LanMan Hashes and Authentication Level 797
SMBv2 797
Read Only Domain Controllers 798
Summary 798
Administering Network Access Protection 799
Why the Need for NAP? 799
Planning the Deployment 801
NAP Shopping List 801
Servers Needed for NAP 802
Benefits of NAP 804
Determining the Health Policy 804
Policies Checked 804
Enforcement Levels 806
Determining Exemptions 807
Testing IPsec NAP Enforcement 808
Setting Up a Certificate Server 809
Configuring the NAP Health Policy Server 818
Client Settings for NAP 819
IEEE 802.1x Enforcement in NAP 827
Configuring IEEE 802xz Enforcement 828
Configuring 802.1X Enforcement 828
The Politics of Deployment 830
Summary 832
Patch Management 833
Why It's Important 834
The Patching Cycle 835
Assess 836
Identify 836
Evaluate and Plan 838
Deploy 838
Repeat 839
Deployment Testing 839
Test Network Deployment 839
Beta User Deployment 840
Full Deployment 840
Obtaining Updates 841
Automatic Updates 841
Windows Server Update Services 841
Systems Center Configuration Manager 845
Third-Party Products 845
Summary 846
Implementing Remote Access Strategies: SSTP, VPN, and Wireless 847
Introduction 847
Network Policy Server 848
Planning for NPS 848
Start with the Policies 849
Define the Support 850
Secure Sockets Tunnelling Protocol 850
The SSTP Process 851
Configuring SSTP 852
Installing the Server Authentication Certificate 858
Installing Routing And Remote Access 868
Configuring SSTP-based Connection Clients 877
Making the SSTP Connection 881
Troubleshooting Connections 883
Using NPS in Windows Server 2008 887
Configuring Remote Access Per User 887
Configuring Remote Access in the NPS Network Policy 887
Wireless Deployment 889
Prerequisites 890
Adding RADIUS Clients to the Network 892
Configuring the Access Points 893
Configuring Clients to Use Secure Wireless 894
Summary 899
Part V: Use Support Services and Features
Interoperability 903
General UNIX Interoperability 903
Permissions and Security Concepts 904
A UNIX File Listing 904
Symbolic Links 906
Privilege Levels 907
Basic Connectivity 908
File Transfer Protocol 908
Telnet 909
File Systems 910
Printing 912
Network File System 912
Legacy User Name Mapping 914
Server For NFS 916
Microsoft Identity Management for UNIX 923
Installing Microsoft Identity Management for UNIX 924
Subsystem for UNIX-based Applications 928
Macintosh Interoperability 932
Summary 932
Managing Software 933
Using the Group Policy Software Installation Extension 933
Finding the Right Mix of Services 935
Windows Installer Packages 936
Zap Files 936
Setting Up the Group Policy Software Installation Extension 939
Creating a Software Distribution Point 939
Creating a GPO for Application Deployment 940
Configuring the Group Policy Software Installation Extension 943
Working with Packages 947
Adding a Package to a Group Policy 947
Changing Application Properties 950
Applying Package Upgrades 952
Applying Package Modifications 953
Removing and Redeploying Packages 955
Using Software Restriction Policies 955
How Software Restriction Policies Work 956
Creating Software Restriction Policies 957
Windows Deployment Services 959
Summary 959
Working with Windows Virtualization 961
Hyper-V Overview 962
Scenarios 963
Requirements 964
Installation 965
Installing On Windows Server Core 965
Installing on Windows Server 2008 965
Initial Configuration 968
Configuring Networks 969
Server Settings 972
Creating A Virtual Machine 974
Creating a Basic VM 975
Machine Settings 978
Management Settings 994
Working With A Virtual Machine 998
Starting, Stopping, Saving, Snapshotting 998
Clipboard 999
Export/Import 1000
Summary 1003
Deploying Terminal Services 1005
Concepts 1007
Remote Access 1008
Central Management 1008
Requirements 1009
RAM 1009
CPU 1009
Network Utilization 1010
Capacity Planning 1010
Installation 1011
Improving the User Experience 1020
Enabling Remote Desktop for Administration Mode 1023
Installing Programs 1024
Administration 1027
Terminal Services Manager 1027
Terminal Services Configuration 1037
Terminal Services Licensing 1042
Installing Terminal Server Licensing 1042
RemoteApps 1044
TS RemoteApp Manager 1045
Adding RemoteApps 1050
Deploying RemoteApps 1052
TS Web Access 1056
Remote Desktop Web Connection 1057
TS Web Access RemoteApp Programs 1058
Summary 1059
Internet Information Services 1061
Architecture 1062
Components 1062
Modules 1063
Installing IIS 1065
Installing Using the Server Roles Wizard 1065
Installing Using Windows Package Manager 1066
Administration Tools 1068
Internet Information Server (IIS) Manager 1068
AppCmd.exe 1071
Windows Management Instrumentation (WMI) 1073
Administrative Tasks 1073
Managing Servers 1073
Managing Sites 1084
Managing Web Applications 1093
Managing Virtual Directories 1094
Understanding Delegation and Permissions 1094
Delegating Site and Application Management 1095
Configuring Permissions to View and Manage Content 1097
Understanding the Configuration Store 1098
Using Shared Configuration 1099
Remote Administration 1099
Installing and Managing the FTP Publishing Service 1100
FTP Current Sessions 1102
FTP Directory Browsing 1102
FTP Firewall Support 1102
FTP Messages 1102
FTP SSL Settings 1102
FTP User Isolation 1102
Active Directory Federation Services (AD FS) 1103
Summary 1104
Part VI: Tune, Maintain, and Repair
Windows Reliability And Performance Monitor 1107
Using Resource View 1107
CPU Details 1109
Disk Details 1110
Network Details 1110
Memory Details 1110
Using Performance Monitor 1111
Adding Counters in Performance Monitor 1112
Changing the Performance Monitor Display 1114
Saving the Performance Monitor Display 1114
Connecting to a Remote Computer Using Performance Monitor 1115
Using Reliability Monitor 1115
Viewing Reliability Monitor on a Remote Computer 1116
Interpreting the System Stability Index 1117
Creating a Data Collector Set 1119
Building a Data Collector Set from a Template 1120
Creating a Data Collector Set from Performance Monitor 1123
Constructing a Data Collector Set Manually 1123
Creating a Data Collector Set to Monitor Performance Counters 1125
Scheduling Data Collection 1126
Managing Collected Data 1128
Working with Data Log Files 1129
Viewing Reports 1131
Summary 1132
Disaster Planning 1133
Planning for Disaster 1133
Identifying the Risks 1134
Identifying the Resources 1135
Developing the Responses 1136
Testing the Responses 1139
Iterating 1140
Preparing for a Disaster 1141
Setting Up a Fault-Tolerant System 1141
Backing Up the System 1142
System Repair 1142
Specifying Recovery Options 1144
Summary 1145
Using Backup 1147
Installing the Backup Service 1147
Scheduling a Backup 1149
Choosing Volumes to Back Up 1149
Designating a Storage Location 1149
Creating the Backup Schedule 1150
Implementing a Rotating Backup Set 1154
Modifying a Backup Schedule 1155
Stop Running Scheduled Backups 1156
Using the Backup Once Wizard 1157
Using the Wbadmin Command 1159
Wbadmin enable backup 1160
Wbadmin disable backup 1160
Wbadmin start backup 1160
Wbadmin stop job 1161
Wbadmin start recovery 1161
Wbadmin start systemstatebackup 1161
Wbadmin start sysstaterecovery 1161
Wbadmin start sysrecovery 1162
Windows Recovery Environment 1162
Wbadmin get versions 1162
Wbadmin get status 1163
Recovering Your Server 1165
Recovering Volumes 1166
Recovering Files and Folders from the Local Server 1167
Recovering Files and Folders from Another Server 1168
Recovering Applications and Data 1169
Recovering the Operating System 1171
Restoring a Backup Catalog 1173
Summary 1174
Planning Fault Tolerance and Avoidance 1175
Mean Time to Failure and Mean Time to Recover 1176
Protecting the Power Supply 1177
Local Power Supply Failure 1178
Voltage Variations 1179
Short-Term Power Outages 1182
Long-Term Power Outages 1182
Disk Arrays 1183
Hardware vs. Software 1183
RAID Levels for Fault Tolerance 1183
Hot-Swap and Hot-Spare Disk Systems 1189
Distributed File System 1190
Clustering 1190
Network Load Balancing 1190
Failover Clustering 1190
Summary 1191
Managing the Registry 1193
Introducing the Registry 1193
The Origins of the Registry 1194
How Registry Data Is Used 1195
Functional Changes in Windows Server 2008 1196
Understanding the Registry's Structure 1198
The Root Keys 1201
Major Subkeys 1203
How Data Is Stored 1206
Creating Registry Items with the Registry Wizard 1209
Using the Registry Editors 1211
A Whirlwind Tour of the Registry Editor 1211
A Whirlwind Tour of Reg 1220
Backing Up and Restoring the Registry 1221
Choosing a Backup Method 1221
System Recovery 1222
Summary 1222
Troubleshooting and Recovery 1223
Determining Priorities 1223
Recovering a System 1225
Identifying Possible Causes 1225
Rolling Back a Device Driver 1226
Recovering Your Server 1227
Recovering Volumes 1227
Recovering Files and Folders from the Local Server 1229
Recovering Files and Folders from Another Server 1229
Recovering Applications and Data 1231
Recovering the Operating System 1233
Recovering the System State 1234
Using System Information 1236
Verifying the Status of Services 1236
Using the System Configuration Utility 1239
Using the System File Checker 1240
Using the Shutdown Event Tracker 1241
Summary 1242
A: Interface Changes from Windows Server 2003 1243
B: Optional Components 1247
C: Understanding TCP/IP v4 1257
About the Authors 1281
Index 1283
© Microsoft. All Rights Reserved.