图书介绍

MCSE Windows 2000活动目录服务 英文版【2025|PDF下载-Epub版本|mobi电子书|kindle百度云盘下载】

MCSE Windows 2000活动目录服务 英文版
  • (美)Microsoft著 著
  • 出版社: 北京:北京大学出版社
  • ISBN:7301014791
  • 出版时间:2000
  • 标注页数:695页
  • 文件大小:123MB
  • 文件页数:744页
  • 主题词:操作系统

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

MCSE Windows 2000活动目录服务 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 Introduction to Microsoft Windows 20001

About This Chapter1

Before You Begin1

Lesson 1:Windows 2000 Overview2

Overview of Windows 20002

Windows 2000 Network Environments8

Lesson Summary11

Lesson 2:Windows 2000 Architecture Overview12

Windows 2000 Lavers.Subsvstems.and Managers12

User Mode12

Environment Subsvstems13

Kernel Mode14

Lesson Summary16

Lesson 3:Windows 2000 Directory Services Overview17

What Is a Directory Service?17

Why Have a Directory Service?18

Windows 2000 Directory Services19

Simplified Administration19

Scalability19

Open Standards Support20

Support for Standard Name Formats21

Active Directory in the Windows 2000 Architecture21

Active Directory Architecture22

Lesson Summary24

Lesson 4:Logging On to Windows 200025

Logging On to a Domain25

Logging On to a Local Computer26

Windows 2000 Authentication Process27

Practice:Logging On to a Stand-Alone Server28

Lesson Summary28

Lesson 5:The Windows Security Dialog Box29

Using the Windows Security Dialog Box29

Practice:Using the Windows Security Dialog Box30

Lesson Summary33

Review34

Chapter 2 Introduction to Active Directory35

About This Chapter35

Before You Begin35

Lesson 1:Active Directory Overview36

Active Directory Objects36

Active Directory Components37

Logical Structures38

Physical Structure41

Lesson Summary43

Lesson 2:Understanding Active Directory Concepts44

Global Catalog44

Replication45

Trust Relationships48

DNS Namespace49

Name Servers53

Naming Conventions54

Lesson Summary56

Review57

Chapter 3 Active Directory Administration Tasks and Tools59

About This Chapter59

Before You Begin59

Lesson 1:Active Directory Administration Tasks60

Windows 2000 Active Directory Administration Tasks60

Lesson Summary61

Lesson 2:Active Directory Administrative Tools62

Active Directory Administrative Tools62

Other Active Directory Administrative Tools63

The Microsoft Management Console(MMC)66

Console Tree and Details Pane69

Snap-Ins69

Console Options71

Author Mode71

Lesson Summary72

Lesson 3:Using Microsoft Management Consoles73

Using Preconfigured MMCs73

Using Custom MMCs73

Using MMCs for Remote Administration74

Practice:Using Microsoft Management Console74

Lesson Summary79

Lesson 4:Using Task Scheduler80

Introduction to Task Scheduler80

Practice:Using Task Scheduler81

Lesson Summary84

Review85

Chapter 4 Implementing Active Directory87

About This Chapter87

Before You Begin87

Lesson 1:Planning Active Directory Implementation88

Planning a Domain Structure88

Planning a Domain Namespace92

Planning an OU Structure97

Planning a Site Structure100

Lesson Summary101

Lesson 2:Installing Active Directory103

The Active Directory Installation Wizard103

Configuring DNS for Active Directory104

The Database and Shared System Volume104

Domain Modes105

Removing Active Directory Services from a Domain Controller106

Practice:Installing Active Directory107

Lesson Summary110

Lesson 3:Operations Master Roles111

Operations Master Roles111

Forest-Wide Operations Master Roles111

Domain-Wide Operations Master Roles112

Planning Operations Master Locations113

Identifying Operations Master Role Assignments115

Transferring Operations Master Role Assignments116

Responding to Operations Master Failures118

Lesson Summary119

Lesson 4:Implementing an Organizational Unit Structure120

Creating OUs120

Setting OU Properties120

Practice:Creating an OU122

Lesson Summary123

Review124

Chapter 5 DNS and Active Directory Integration125

About This Chapter125

Before You Begin125

Lesson 1:Understanding DNS Name Resolution126

Name Resolution126

Forward Lookup Query127

Name Server Caching128

Reverse Lookup Query129

Lesson Summary130

Lesson 2:Understanding and Configuring Zones131

Zones131

Zone Planning131

Forward Lookup Zones132

Reverse Lookup Zones134

Resource Records135

Delegating Zones136

Configuring Dynamic DNS138

Practice:Configuring Zones139

Lesson Summary142

Lesson 3:Zone Replication and Transfer143

Zone Replication and Zone Transfers143

DNS Notification146

The DNS Notify Process147

Lesson Summary148

Lesson 4:Monitoring and Troubleshooting DNS for Active Directory149

Monitoring DNS Servers149

DNS Troubleshooting Scenarios150

Lesson Summary152

Review153

Chapter 6 Configuring Sites155

About This Chapter155

Before You Begin155

Lesson 1:Configuring Site Settings156

Configuring Site Settings156

Sites156

Subnets157

Site Links159

Site Licensing161

Practice:Configuring a Site162

Lesson Summary164

Lesson 2:Configuring Inter-Site Replication165

Configuring Inter-Site Replication165

Site Link Attributes165

Site Link Bridges168

Manually Configuring Connections169

Designating a Preferred Bridgehead Server171

Practice:Configuring Inter-Site Replication172

Lesson Summary173

Lesson 3:Troubleshooting Replication174

Troubleshooting Replication174

Checking Replication Topology175

Lesson Summary175

Lesson 4:Maintaining Server Settings176

Maintaining Server Settings176

Creating a Server Object in a Site176

Moving Server Objects Between Sites176

Enabling or Disabling a Global Catalog177

Removing an Inoperative Server Object from a Site177

Lesson Summary177

Review178

Chapter 7 User Account Administration179

About This Chapter179

Before You Begin179

Lesson 1:Introduction to User Accounts180

Local User Accounts180

Domain User Accounts181

Built-In User Accounts182

Lesson Summary183

Lesson 2:Planning New User Accounts184

Naming Conventions184

Password Requirements185

Account Options186

Practice:Planning New User Accounts186

Lesson Summary189

Lesson 3:Creating User Accounts190

Creating Local User Accounts190

Creating Domain User Accounts191

Practice:Creating Domain User Accounts194

User Account Properties196

Setting Personal Properties197

Setting Account Properties197

Setting Logon Hours199

Setting the Computers from Which Users Can Log On200

Configuring Dial-In Settings201

Practice:Modifying User Account Properties202

Lesson Summary206

Lesson 4:Creating User Profiles207

User Profiles207

Local User Profiles210

Roaming User Profiles210

Mandatory User Profiles213

Practice:Managing User Profiles214

Lesson Summary219

Lesson 5:Creating Home Directories220

Introducing Home Directories220

Creating Home Directories on a Server220

Lesson Summary221

Lesson 6:Maintaining User Accounts222

Disabling,Enabling,Renaming,and Deleting User Accounts222

Resetting Passwords and Unlocking User Accounts223

Resetting Passwords223

Unlocking User Accounts224

Practice:Administering User Accounts224

Lesson Summary226

Review227

Chapter 8 Group Account Administration229

About This Chapter229

Before You Begin229

Lesson 1:Introduction to Groups230

Groups and Permissions230

Group Types231

Group Scopes231

Group Nesting233

Rules for Group Membership233

Local Groups234

Using Local Groups234

Lesson Summary234

Lesson 2:Planning a Group Strategy236

Planning Global and Domain Local Groups236

Using Universal Groups237

Practice:Planning New Group Accounts238

Lesson Summary240

Lesson 3:Creating Groups241

Creating and Deleting Groups241

Deleting a Group242

Adding Members to a Group242

Changing the Group Type244

Changing the Group Scope to Universal244

Creating Local Groups245

Practice:Creating Groups247

Lesson Summary249

Lesson 4:Understanding Default Groups250

Predefined Groups250

Built-In Groups251

Built-In Local Groups252

Special Identity Groups253

Lesson Summary254

Lesson 5:Groups for Administrators255

Why You Should Not Run Your Computer as an Administrator255

Administrators as Members of the Users and Power Users Groups255

Using Run As to Start a Program256

RUNAS Command257

RUNAS Examples258

Practice:Using Run As to Start a Program as an Administrator259

Lesson Summary259

Review260

Chapter 9 Securing Network Resources263

About This Chapter263

Before You Begin263

Lesson 1:Understanding NTFS Permissions264

NTFS Permissions264

NTFS Folder Permissions264

NTFS File Permissions265

Access Control List265

Multiple NTFS Permissions266

NTFS Permissions Inheritance267

Lesson Summary268

Lesson 2:Assigning NTFS Permissions269

Planning NTFS Permissions269

Setting NTFS Permissions270

Practice:Planning and Assigning NTFS Permissions272

Lesson Summary279

Lesson 3:Assigning Special Permissions280

Special Permissions280

Setting Special Permissions284

Taking Ownership of a File or Folder286

Practice:Taking Ownership of a File286

Lesson Summary288

Lesson 4:Copying and Moving Files And Folders289

Copying Files and Folders289

Moving Files and Folders290

Practice:Copying and Moving Folders291

Lesson Summary292

Lesson 5:Troubleshooting Permissions Problems293

Troubleshooting Permissions Problems293

Avoiding Permissions Problems294

Practice:Deleting a File with All Permissions Denied295

Lesson Summary296

Review297

Chapter 10 Administering Shared Folders299

About This Chapter299

Before You Begin300

Lesson 1:Understanding Shared Folders301

Shared Folders301

Shared Folder Permissions301

How Shared Folder Permissions Are Applied303

Guidelines for Shared Folder Permissions303

Practice:Applied Permissions304

Lesson Summary305

Lesson 2:Planning Shared Folders306

Application Folders306

Data Folders307

Lesson Summary308

Lesson 3:Sharing Folders310

Requirements for Sharing Folders310

Administrative Shared Folders310

Sharing a Folder311

Assigning Shared Folder Permissions312

Modifying Shared Folders314

Connecting to a Shared Folder315

Lesson Summary316

Lesson 4:Combining Shared Folder Permissions and NTFS Permissions317

Strategies for Combining Shared Folder Permissions and NTFS Permissions317

Practice:Managing Shared Folders318

Lesson Summary327

Lesson 5:Configuring Dfs to Gain Access to Network Resources328

Understanding Dfs328

Reasons for Using Dfs330

Dfs Topology330

Creating a Dfs330

Creating a Dfs Root330

Creating a Dfs Link331

Adding a Dfs Shared Folder332

Setting Replication Policy333

Practice:Using Dfs335

Lesson Summary339

Review340

Chapter 11 Administering Active Directory341

About This Chapter341

Before You Begin342

Lesson 1:Locating Active Directory Objects343

Understanding Common Active Directory Objects343

Using Find344

Practice:Searching Active Directory346

Lesson Summary348

Lesson 2:Controlling Access to Active Directory Objects349

Understanding Active Directory Permissions349

Assigning Active Directory Permissions350

Using Permissions Inheritance353

Preventing Permissions Inheritance354

Practice:Controlling Access to Active Directory Objects354

Lesson Summary357

Lesson 3:Publishing Resources in Active Directory358

Publishing Resources in Active Directory358

Publishing Users and Computers358

Publishing Shared Resources358

Publishing Network Services359

Lesson Summary361

Lesson 4:Moving Active Directory Objects362

Moving Objects362

Moving Objects Within a Domain362

Moving Objects Between Domains363

Moving Workstations or Member Servers Between Domains367

Moving Domain Controllers Between Sites368

Practice:Moving Objects Within a Domain369

Lesson Summary370

Lesson 5:Delegating Administrative Control of Active Directory Objects371

Guidelines for Delegating Control371

Delegation Of Control Wizard372

Guidelines for Administering Active Directory372

Practice:Delegating Administrative Control in Active Directory373

Lesson Summary375

Lesson 6:Backing Up Active Directory376

Performing Preliminary Tasks376

The Backup Wizard376

What to Back Up377

Where to Store the Backup377

Specifying Advanced Backup Settings379

Scheduling Active Directory Backup Jobs380

Lesson Summary381

Lesson 7:Restoring Active Directory382

Preparing to Restore Active Directory382

Nonauthoritative Restore382

Authoritative Restore382

Performing a Nonauthoritative Restore383

Specifying Advanced Restore Settings385

Performing an Authoritative Restore386

Lesson Summary388

Lesson 8:Troubleshooting Active Directory389

Troubleshooting Active Directory389

Lesson Summary390

Review391

Chapter 12 Administering Group Policy393

About This Chapter393

Before You Begin393

Lesson 1:Group Policy Concepts394

What Is Group Policy?394

Group Policy Objects394

Delegating Control of Group Policy395

The Group Policy Snap-In395

Group Policy Settings397

Computer and User Configuration Settings397

The MMC Snap-In Model400

Group Policy Snap-In Namespace401

How Group Policy Affects Startup and Logon401

How Group Policy Is Processed402

Group Policy Inheritance404

Using Security Groups to Filter Group Policy404

Lesson Summary405

Lesson 2:Group Policy Implementation Planning406

Designing GPOs by Setting Type406

GPO Implementation Strategies407

Layered vs.Monolithic GPO Design407

Functional Roles vs.Team Design409

OU Delegation with Central or Distributed Control410

Lesson Summary411

Lesson 3:Implementing Group Policy412

Implementing Group Policy412

Creating a GPO412

Creating a GPO Console413

Delegating Administrative Control of a GPO414

Specifying Group Policy Settings415

Disabling Unused Group Policy Settings416

Indicating GPO Processing Exceptions417

Filtering GPO Scope419

Linking a GPO420

Modifying Group Policy420

Removing a GPO Link421

Deleting a GPO421

Editing a GPO and GPO Settings421

Practice:Implementing a Group Policy422

Lesson Summary426

Lesson 4:Managing Software Using Group Policy427

Software Management Tools427

Assigning Applications428

Publishing Applications428

How Software Installation Works428

Implementing Software Installation430

Planning and Preparing a Software Installation430

Setting Up an SDP431

Specifying Software Installation Defaults432

Deploying Software Applications433

Setting Automatic Installation Options437

Setting Up Application Categories438

Setting Software Application Properties439

Maintaining Software Applications442

Lesson Summary445

Lesson 5:Managing Special Folders Using Group Policy446

Folder Redirection446

Default Special Folder Locations447

Setting Up Folder Redirection447

Policy Removal Considerations452

Lesson Summary453

Lesson 6:Troubleshooting Group Policy454

Troubleshooting Group Policy454

Group Policy Best Practices457

Lesson Summary459

Review460

Chapter 13 Administering a Security Configuration461

About This Chapter461

Before You Begin461

Lesson 1:Security Configuration Overview462

Security Configuration Settings462

Lesson Summary465

Lesson 2:Auditing466

Understanding Auditing466

Using an Audit Policy466

Audit Policy Guidelines467

Configuring Auditing468

Setting Up an Audit Policy469

Auditing Access to Files and Folders472

Auditing Access to Active Directory Objects475

Auditing Access to Printers477

Auditing Practices478

Practice:Auditing Resources and Events479

Lesson Summary483

Lesson 3:Using Security Logs484

Understanding Windows 2000 Logs484

Viewing Security Logs485

Locating Events486

Filtering Events487

Configuring Security Logs488

Archiving Security Logs490

Practice:Using the Security Log491

Lesson Summary492

Lesson 4:User Rights493

User Rights493

Privileges493

Logon Rights497

Assigning User Rights497

Lesson Summary498

Lesson 5:Using Security Templates499

Security Templates Overview499

Security Template Uses499

Predefined Security Templates499

Managing Security Templates501

Practice:Managing Security Templates505

Lesson Summary506

Lesson 6:Security Configuration and Analysis507

How the Security Configuration and Analysis Console Works507

Security Configuration507

Security Analysis507

Using Security Configuration and Analysis508

Practice:Using Security Configuration and Analysis513

Lesson Summary515

Lesson 7:Troubleshooting a Security Configuration516

Troubleshooting a Security Configuration516

Lesson Summary517

Review518

Chapter 14 Managing Active Directory Performance519

About This Chapter519

Before You Begin519

Lesson 1:Active Directory Performance Monitoring Tools520

Performance Monitoring Tools520

The Event Viewer Console520

The Performance Console522

System Monitor522

Performance Logs and Alerts528

Practice:Using System Monitor536

Lesson Summary538

Lesson 2:Active Directory Support Tools540

Active Directory Support Tools540

LDP.EXE:Active Directory Administration Tool540

REPLMON.EXE:Active Directory Replication Monitor541

REPADMIN.EXE:Replication Diagnostics Tool543

DSASTAT.EXE:Active Directory Diagnostic Tool543

SDCHECK.EXE:Security Descriptor Check Utility543

NLTEST.EXE544

ACLDIAG.EXE:ACL Diagnostics544

DSACLS.EXE545

Lesson Summary545

Lesson 3:Monitoring Access to Shared Folders546

Why Monitor Network Resources?546

Network Resource Monitoring Requirements547

Monitoring Access to Shared Folders547

Monitoring Open Files548

Disconnecting Users from Open Files549

Sending Console Messages550

Practice:Managing Shared Folders550

Lesson Summary551

Review552

Chapter 15 Deploying Windows 2000 Using RIS553

About This Chapter553

Before You Begin553

Lesson 1:RIS Overview554

Remote OS Installation Overview554

Remote Install Server Components555

Remote Install Client Components555

How the Remote OS Installation Process Works557

RIS Server and Client Requirements559

Network Cards Supported by RIS Boot Disk560

Lesson Summary561

Lesson 2:Implementing RIS562

Implementing RIS562

Setting Up RIS562

Configuring RIS564

Create an RIPrep Image572

Creating an RIS Boot Disk575

Verifying an RIS Configuration576

Lesson Summary577

Lesson 3:Administering RIS578

Administering RIS578

Managing RIS Client Installation Images578

Managing RIS Client Computers579

Managing RIS Security583

Lesson Summary586

Lesson 4:RIS Frequently Asked Questions and Troubleshooting587

Frequently Asked RIS Questions587

Troubleshooting RIS590

Lesson Summary591

Review592

Appendix A Questions and Answers593

Appendix B Installing and Configuring the DHCP Service637

Glossary643

Index675

热门推荐