Windows Server® 2008 R2 Secrets: Orin Thomas [Libro], Asesoramiento y Consejos para Administrar Windows Server 2008 R2 yopi 19:09 Información TécnicaWindows Server® 2008 R2 SecretsInglés | 9.19 MB | PDF | Visualización: Óptima | 578 Pág | Publisher: John Wiley & Sons, Inc.ISBN: 978-1-118-19785-1 | Autores: Orin ThomasDescripción Asesoramiento inmejorable y consejos de expertos para administrar, actualizar o migrar a Windows Server 2008 R2Si usted es un administrador del sistema Windows Server® 2008 R2, este libro es una referencia que usted querrá tener a mano. Escrito por un Microsoft MVP que cuenta con múltiples certificaciones MCITP y autor de éxito en sus publicaciones, este libro le da consejos valiosos y asesoramiento inmejorable para implementar y administrar Windows Server 2008 R2. Cubriendo todos los aspectos del sistema operativo en un formato fácil de seguir y de fácil acceso, el libro revela los secretos útiles y avanzados sobre la configuración de las funciones de Windows como DirectAccess, BranchCache, el mantenimiento de Active Directory, la configuración del acceso remoto y mucho más.Libro escrito por Orin Thomas, un Microsoft Certified Information Technology Professional (MCITP), quien es un reconocido experto en el espacio de Windows y un Microsoft MVP.Proporciona consejos prácticos y conocimientos de expertos sobre la actualización, migración, o el despliegue del sistema operativo Windows Server 2008 R2.Cubre implementación de Active Directory, mantenimiento, seguridad de la infraestructura de red, carpetas compartidas, protección de datos y secretos para el monitoreo.Incluye además anotaciones personalizadas y elementos interiores, áreas resaltadas, y otras maneras de ayudarle rápidamente a cubrir posibles escenarios y soluciones puntuales.Windows Server® 2008 R2 Secrets es como tener tu propio experto en Windows Server 2008 R2 a la mano, que puede ayudarte a evitar errores y ahorrar tiempo!Contenido del LibroPart I DEPLOYMENT AND ADMINISTRATION SECRETS Chapter 1 Windows Server 2008 R2 Deployment Secrets Choosing an Edition of Windows Server 2008 R2 4Deciding Between Types of Installation 6Optimizing Your Deployment Image 12Minimizing Deployment Time 19Activating Windows 27Summary 30Chapter 2 The Windows Server 2008 R2 Administrator's Toolkit Choosing the Right Remote Administration Tool 34Remote Desktop 35Management Consoles 41Remote PowerShell 45Emergency Management Services (When All Else Fails) 46Summary 49Chapter 3 Server Core Secrets Using Server Core Administration Tools 52Performing Server Core Post-Deployment Tasks 54Understanding the Sconfig.cmd 62Administering with Server Core Configurator 63Understanding Server Core Infrastructure Roles 67Summary 72Chapter 4 Active Directory Domains and ForestsUnderstanding Forests and Domains 74Setting Domain and Forest Functional Levels 79Selecting the DNS Server 82Defining Active Directory Sites 89Defining FSMO Roles 91Using Read-Only Domain Controllers 93Securing with Global Catalog Serversand Universal Group Membership Caching 98Maintaining the Active Directory Database 100Summary 110Chapter 5 Effectively Managing Group Policy Applying Group Policy 114Using Group Policy Management Console 117Using Important Group Policy Features 122Completing Common Group Policy Tasks 126Summary 132Chapter 6 Managing Users and Computers Using Organizational Unit Structures 136Managing User Accounts 140Configuring Account Policies 147Managing Groups 155Creating Computer Accounts 161Summary 163Chapter 7 Managing Active Directory Certificate Services Understanding Certification Authority Types 166Managing Certification Authorities 171Using Certificate Templates 175Utilizing Certificate Autoenrollment 181Recovering Certificates 183Backing Up Certificate Services 184Revoking Certificates 186Summary 188Part II Network Infrastructure and Security Secrets Chapter 8 Network Addressing Understanding IPv4 and DHCP 194Understanding IPv6 205Transitioning to IPv6 212Summary 217Chapter 9 Securing the Network: Windows Firewall and Network Access Protection Understanding Windows Firewall with Advanced Security 220Understanding Connection Security Rules 230Understanding and Configuring Network Access Protection 236Summary 244Part III Shared Folder and Data Protection Secrets Chapter 10 Secrets Behind Shared Folders Using the Share and Storage Management Console 250Using File Server Resource Manager 255Working with the Distributed File System 271Utilizing BranchCache 275Working with Offline Files 278Summary 280Chapter 11 Keeping Data PrivateEncrypting File System 282Encrypting with BitLocker 287Using Active Directory Rights Management Services 296Summary 300Chapter 12 Backup and Recovery Using and Configuring Windows Server Backup 304Enabling Shadow Copies of Shared Folders 313Performing Recovery 316Using System Center Data Protection Manager 325Summary 328Part IV INFRASTRUCTURE SERVICES Chapter 13 Internet Information Services Managing Sites 332Managing Application Pools 348IIS Users and Delegation 351Managing FTP 352Summary 355Chapter 14 Configuring Hyper-V Virtual Machine Configuring Hyper-V 358Understanding Virtual Hard Disks 363Understanding Hyper-V Networks 369Using Virtual Machine Snapshots 374Migrating Virtual Machines 376Summary 379Chapter 15 Patch Management with WSUS Defining an Update Process 382Installing and Deploying WSUS 383Deploying Updates 395Understanding WSUS Topologies 401Verifying Update Deployment 402Going Further 407Summary 409Chapter 16 High Availability Understanding Network Load Balancing 412Allocating Storage to iSCSI SAN 417Understanding Failover Clustering 422Summary 431Part V REMOTE ACCESS SECRETS Chapter 17 Presentation and Application Virtualization Understanding Remote Desktop Session Host 436Running RemoteApp 444Using Remote Desktop Web Access 446Utilizing Remote Desktop Connection Broker 447Connecting via Remote Desktop Gateway 448Remote Desktop Licensing 450Understanding Remote Desktop Virtualization Host 453Virtualizing Applications with App-V 453Summary 454Chapter 18 Remote AccessSetting up Remote Desktop Gateway 458Deploying Virtual Private Networks 468Connecting via DirectAccess 478Summary 482Part VI Main ten ance and Moni toring Sec rets Chapter 19 Getting the Most Out of Event Logs and Auditing Auditing Windows Server 2008 R2 486Filtering and Viewing Event Logs 492Event Log Forwarding 497Creating Event Viewer Tasks 499Going Further with Operations Manager 504Summary 505Chapter 20 Performance and Resource ManagementMonitoring Point-in-Time Performance 508Understanding Data Collector Sets 514Using Windows Server Resource Manager 521Summary 525 Enlaces de Descarga Windows Server® 2008 R2 Secrets: Orin Thomas LIBRO PDF Inglés | RAR | 9.19 MB MD5 Checksum: 363bce1b719e844e22303271f894bd82 (?) Links: SolidFiles | BillionUploads | Mega (?)Mega Decryption Key: XQZHOw2VaDbvAMSNUFBepxYgEKBGttQuogHo2WXrfHc