Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Windows Server 2012 R2 system configuration Guide _ edited by Dai Youwei

2025-03-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

Link: https://pan.baidu.com/s/1WH8S1SVU0yckpogIgs7FzA extraction code: 9wt2

Due to Baidu online disk, sometimes you may not be able to access it. Please contact the landlord immediately and contact the new link immediately.

Title: Windows Server 2012 R2 system configuration Guide

Author: Dai Youwei

Press: Tsinghua University Press

Publication date: 2017-01-01

ISBN:9787302456247

Number of words:

Page number:

Version number: 1

Binding: paperback-binding

Opening book: 16 opening

This book is edited by Mr. Dai Youwei, a well-known senior consultant of Microsoft system engineer in Taiwan. It is the system configuration guide in his three-volume work Windows Server 2012 R2. The book continues the author's consistent writing style: a large number of system configuration examples are both theoretical, as well as a complete and clear operation process, described in easy-to-understand text, rich in content and full of pictures and texts. The book is divided into 18 chapters, including Windows Server 2012 R2 overview, installation and basic environment settings, management of local users and group accounts, establishment of Active Directory domains, security and management of NTFS and ReFS disks, access to network files, settings and management of print servers, use of configuration files to manage user working environment, group policy and security settings, registry and registry editor, remote desktop connection, disk system management Use WSUS to deploy updates, AD RMS enterprise file management, distributed file system, build iSCSI file server failover cluster and troubleshooting of system startup, etc. This book is for the majority of primary and intermediate computer technicians, computer management and maintenance personnel. It can also be used as a teaching book for related professional and technical training courses in colleges and universities, as well as a reference book for Microsoft certification examination.

Chapter 1 Overview of Windows Server 2012 R2 1

1.1 Windows Server 2012 R2 version 2

1.2 Windows Network Architecture 2

1.2.1 Network of the workgroup architecture 2

1.2.2 Network 3 of the domain architecture

1.3 introduction to TCP/IP communication protocol 5

1.3.1 IP address 6

1.3.2 IP Classification 6

1.3.3 Subnet Mask 8

1.3.4 default Gateway 8

1.3.5 use of private IP 9

Chapter 2 installation of WindowsServer 2012 R2 11

2.1 precautions before installation 12

2.1.1 system requirements for Windows Server 2012 R2 12

2.1.2 preparation before installation 12

2.1.3 installation options for Windows Server 2012 R2 13

2.1.4 Select disk Partition 14

2.1.5 File system 16 for Windows Server 2012 R2

2.2 install or upgrade to Windows Server 2012 R2 16

2.2.1 directly use DVD to start the computer and start the installer in DVD 16

2.2.2 using DVD to install 20 in an existing Windows system

2.3 launch and use Windows Server 2012 R2 24

2.3.1 launch and log in to Windows Server 2012 R2 24

2.3.2 driver needs to be signed 27

2.3.3 Logout, login and shutdown 28

Chapter 3 Windows Server 2012 R2 basic Environment Settings 31

3.1 display settings for the screen 32

3.1.1 adjust display resolution, color and refresh frequency 32

3.1.2 resize text and other items 34

3.2 computer name and TCP/IP Settings 34

3.2.1 modify computer name and workgroup name 34

3.2.2 setup and testing of TCP/IP 36

3.3 connecting to the Internet and enabling the Windows system 44

3.3.1 Internet access via router or NAT 44

3.3.2 surfing the Internet through a proxy server 45

3.3.3 surf the Internet via ADSL or VDSL 46

3.3.4 enable or disable IE enhanced security configuration 48

3.3.5 activate Windows Server 2012 R2 49

3.4 Windows Firewall and Network location 50

3.4.1 enable and disable Windows Firewall 51

3.4.2 unblock certain programs 51

3.4.3 Advanced Security Settings for Windows Firewall 52

3.5 Management of hardware equipment 54

3.5.1 disable, uninstall and scan new devices 55

3.5.2 Roll back driver 55

3.5.3 driver signature 56

3.6 default startup system settings 56

3.7 Management of environmental variables 58

3.7.1 View existing environment variables 58

3.7.2 modify environment variable 59

3.7.3 use of environment variables 60

3.8 computer shutdown mode and power plan 60

3.8.1 computer shutdown mode 60

3.8.2 Power Plan 61

3.8.3 Power and sleep buttons work 62

3.8.4 Test sleep and dormancy function 63

3.8.5 Settings for sleep and mixed sleep 64

3.9 other environment settings 65

3.9.1 Desktop experience 65

3.9.2 Microsoft Management console 66

3.9.3 Virtual memory 67

3.9.4 Windows Update and automatic updates 69

3.9.5 dual screen display 69

3.9.6 Task Manager 71

Chapter 4 Management of local users and group accounts 75

4.1 built-in local account 76

4.1.1 built-in local user account 76

4.1.2 built-in local group account 76

4.1.3 Special Group accounts 77

4.2 Management of local user accounts 77

4.2.1 establish a local user account 77

4.2.2 modify local user account 79

4.2.3 user account Management tool in the Control Panel 80

4.3 password modification, backup and restore 81

4.3.1 create password reset disk 81

4.3.2 reset password 83

4.3.3 what if a password reset disk is not made? 84

4.4 Management of local group accounts 85

Chapter 5 Establishment of ActiveDirectory Domain 87

5.1 Active Directory Domain Services 88

5.1.1 scope of application of Active Directory (Scope) 88

5.1.2 Namespace (Namespace) 88

5.1.3 objects (Object) and attributes (Attribute) 89

5.1.4 Container (Container) and organizational Unit (Organization Units,OU) 89

5.1.5 Domain Tree (Domain Tree) 90

5.1.6 Trust (Trust) 91

5.1.7 Forest (Forest) 92

5.1.8 Architecture (Schema) 92

5.1.9 Domain Controller (Domain Controller) 93

5.1.10 Lightweight Directory Access Protocol (LDAP) 93

5.1.11 Global catalog (Global Catalog) 94

5.1.12 site (Site) 94

5.1.13 Domain functional level and forest functional level 95

5.1.14 Directory Partition (Directory Partition) 97

5.2 establish Active Directory domain 98

5.2.1 necessary conditions for establishing a domain 99

5.2.2 establish the first domain controller in the network 99

5.2.3 check whether the records in the DNS server are complete

5.2.4 establish more domain controllers 106

5.3 join or unjoin Windows computers from domain 111

5.3.1 join Windows computers to domain 112

5.3.2 Log in to 115 using computers that have joined the domain

5.3.3 exit domain 117

5.4 manage Active Directory domain user accounts 117

5.4.1 Active Directory management tools built into domain controllers 117

5.4.2 Active Directory management tools in other member computers

5.4.3 Establishment of organizational units (OU) and domain user accounts

5.4.4 login test 123 using a new user account to the domain controller

5.4.5 setting of personal information for domain users 127

5.4.6 limit login time and login to computer 127

5.5 manage Active Directory domain group accounts 129

5.5.1 Group types in the domain 129

5.5.2 range of groups 129

5.5.3 Establishment and management of domain groups 130

5.5.4 AD DS built-in domain group 132

5.6 upgrade domain and forest functional level 134

5.7 Active Directory Recycle Bin 135

5.8 remove domain controller and domain 138

Chapter 6 Security and Management of NTFS and ReFS disks

6.1 types of NTFS and ReFS permissions

6.1.1 types of basic permissions for files 145

6.1.2 categories of basic permissions for folders 145

6.2 effective permissions of the user 146

6.2.1 permissions can be inherited 146

6.2.2 permissions are cumulative 146

6.2.3 deny permission priority is high 146

6.3 setting of permissions 147

6.3.1 set file permissions 147

6.3.2 cancel the permission to inherit the parent folder 149

6.3.3 set folder permissions 150

6.3.4 assign special permissions 150

6.3.5 effective permissions for users 152

6.4 ownership of files and folders 153

6.5 changes in permissions after a file is copied or moved 154

6.6 Compression of files 156

6.6.1 NTFS compression 156

6.6.2 compressed (zipped) folder 158

6.7 encrypted file system 160

6.7.1 File and folder encryption 160

6.7.2 authorize other users to read encrypted files 161

6.7.3 back up the EFS certificate 162

6.8 BitLocker disk drive encryption 163

6.8.1 requirements for BitLocker

6.8.2 BitLocker instance walkthrough

6.9 defragmentation and check disk error 170

6.10 disk quota 171

6.10.1 characteristics of disk quotas 172

6.10.2 setting of disk quota 172

6.10.3 Monitoring disk quota usage per user 174

Chapter 7 access to network files 176

7.1 Public folders 177

7.2 shared folder 178

7.2.1 permissions for shared folders 179

7.2.2 effective permissions for the user 180

7.3 New creation and management of shared folders 181

7.3.1 New shared folder 181

7.3.2 stop sharing and modify permissions 184

7.3.3 add a shared name 186

7.3.4 hide shared folders 186

7.3.5 using computer Management to manage shared folders 187

7.4 how users access network public and shared folders 189

7.4.1 using network discovery to connect network computers 189

7.4.2 use a network drive to connect a network computer 193

7.4.3 other ways to connect to network shared folders 195

7.4.4 disconnect network drive 196

7.5 offline files 196

7.5.1 offline file settings on the network computer side 197

7.5.2 how network users use files 198 offline

7.6 Shadow copy 203

7.6.1 how does a network computer enable the Shadow copy of a shared folder 204

7.6.2 how does the client access the files in the Shadow copy 205

Chapter 8 setup and Management of print Server 207

8.1 print Server Overview 208

8.2 set up print Server 209

8.2.1 set up a print server directly on the local computer 209

8.2.2 using "print Management" to establish Printer Server 213

8.3 how do users connect to the network to share printers 214

8.3.1 deploy shared printers to users or computers 214 using Group Policy

8.3.2 using network discovery to connect to a shared printer 215

8.3.3 use the add Printer Wizard to connect the shared printer 215

8.3.4 use a web browser to connect to a shared printer 217

8.3.5 other ways to connect to a shared printer 218

8.3.6 disconnect from the shared printer 218

8.4 Advanced settings for shared printers 218

8.4.1 set print priority 218

8.4.2 set the print time of the printer 220

8.4.3 set up printer pool 221

8.4.4 other settings for the printer 223

8.5 Printer Rights and ownership 224

8.5.1 assignment of Printer permissions 224

8.5.2 ownership of printers 225

8.6 use delimited pages to separate print files 225

8.6.1 create delimited page file 226

8.6.2 Select delimited page file 227

8.7 manage files waiting to be printed 228

8.7.1 pause, resume, restart, cancel printing of a document 228

8.7.2 pause, resume, cancel printing of all files 229

8.7.3 change the print priority and print time of a file 229

8.7.4 redirect the print file 230

8.8 Communication with UNIX system

8.8.1 receive the print file 231 sent by the UNIX client

8.8.2 send the file to UNIX's print server to print 232

Chapter 9 uses configuration files to manage the user's work environment 235

9.1 Local user profile 236

9.2 roaming and forcing user profile 239

9.2.1 specify a roaming user profile for the user 239

9.2.2 how roaming user profiles work 242

9.2.3 specify a mandatory user profile for the user 243

9.3 Custom Default profile 246

9.3.1 when will local users use Default profile 246

9.3.2 when will domain users use Default profile 246

9.3.3 Custom local and domain Default profiles 247

9.4 Login script 248

9.5 use "home folder" to save private files 250

Chapter 10 Group Policy and Security Settings 253

10.1 Group Policy Overview 254

10.2 Local computer Policy example Walkthrough 254

10.2.1 computer Policy example exercise 254

10.2.2 user Policy instance Walkthrough 255

10.3 Domain Policy instance Walkthrough 256

10.3.1 Group Policy basic Concepts 256

10.3.2 Domain Group Policy instance walkthrough 1-hiding "Windows Firewall" 257

10.3.3 Domain Group Policy instance exercise 2muri-restrict the execution of programs 260

10.3.4 Domain Group Policy instance walkthrough 3muri-restrict the execution of .appx programs 268

10.3.5 Group Policy exception exclusion 272

10.4 Local Security Policy 273

10.4.1 setting of account policy 274

10.4.2 Local Policy 276

10.5 Domain and Domain Controller Security Policy 278

10.5.1 Settings of domain security policy 279

10.5.2 setting of domain controller security policy 280

10.6 Group Policy preferences Settings 281

10.7 use of audit resources 287

10.7.1 Settings for audit policy 288

10.7.2 Audit login event 289

10.7.3 Audit file access behavior 290

10.7.4 Audit printer access behavior 293

10.7.5 auditing the access behavior of AD DS objects

Chapter 11 Registry and Registry Editor 296

11.1 Registry Overview 297

11.1.1 Schema of the registry database 297

11.1.2 subtree 298

11.1.3 Registry hive and registry hive file 299

11.2 example walkthrough of modifying the registry 299

11.3 other registry settings 301

Chapter 12 remote Desktop connection 303

12.1 remote Desktop connection Overview 304

12.2 remote Desktop connection example walkthrough 304

12.2.1 configuration of remote computers 305

12.2.2 remote Desktop connection is used on the local computer to connect to the remote computer 308

12.2.3 Dalian connection quantity 311

12.3 Advanced Settings for remote Desktop connection 312

12.4 remote Desktop Web connection 317

12.4.1 Settings for the remote Desktop Web access website 317

12.4.2 client connects to remote computer 318 through a browser

Chapter 13 Management of disk systems 322

13.1 disk Overview 323

13.1.1 MBR disk and GPT disk 323

13.1.2 basic disk and dynamic disk 324

13.2 Management of basic volumes 328

13.2.1 compressed volume 329

13.2.2 install new disk 330

13.2.3 create primary partition 331

13.2.4 create an extended disk partition 333

13.2.5 specify active disk partition 336

13.2.6 formatting, volume labeling, file system conversion and deletion of disk partitions 337

13.2.7 change drive letter and path 338

13.2.8 extended basic Volume 339

13.3 Management of dynamic disks 340

13.3.1 convert a basic disk to a dynamic disk 341

13.3.2 simple Volume 342

13.3.3 extend simple volume 344

13.3.4 Span Volume 345

13.3.5 Ribbon volume 348

13.3.6 Mirror Volume 351

13.3.7 RAID-5 Volume 358

13.4 removable disk 365

13.4.1 move the basic disk to another computer 365

13.4.2 move the dynamic disk to another computer 365

13.5 storage space 366

13.5.1 Virtual disks and volumes 366

13.5.2 Storage Space instance Walkthrough 367

Chapter 14 using WSUS to deploy Update 376

14.1 WSUS Overview 377

14.2 system requirements for WSUS 377

14.3 characteristics and working methods of WSUS 378

14.3.1 using computer groups to deploy update 378

14.3.2 Architecture of WSUS Server 379

14.3.3 Select the location of the database and store the update 380

14.3.4 delayed download update 381

14.3.5 use Quick install Files 381

14.4 install WSUS Server 382

14.5 set up automatic updates for the client 391

14.6 approval update procedure 393

14.6.1 Establishment of a new computer group 394

14.6.2 approval of the installation of the update 395

14.6.3 refusing to update program 398

14.6.4 automatic approval update 399

14.7 automatically updated Group Policy Settings 400

Chapter 15 AD RMS Enterprise document Rights Management

15.1 AD RMS Overview 405

15.1.1 demand for AD RMS 405

15.1.2 how does AD RMS run 406

15.2 AD RMS instance walkthrough 407

15.3 AD RMS other advanced instructions and settings 419

15.3.1 detailed process run by AD RMS 420

15.3.2 other advanced settings for AD RMS server 421

Chapter 16 distributed File system 425

16.1 Overview of distributed file systems 426

16.1.1 Architecture of DFS 426

16.1.2 replication Topology 428

16.1.3 system requirements for DFS 429

16.2 distributed file system instance walkthrough 429

16.2.1 install related components of DFS 430

16.2.2 create a new namespace 432

16.2.3 create folder 434

16.2.4 replication groups and replication Settings 436

16.2.5 replication Topology and schedule Settings 439

16.2.6 testing whether the DFS function is normal from the client 441

16.2.7 create multiple namespace servers 442

16.3 reference setting for the client 443

16.3.1 caching period 444

16.3.2 set the order of target servers in the reference list 444

16.3.3 client failure reply 445

Chapter 17 Building iSCSI File Server failover Cluster 446

17.1 failover Cluster Overview 447

17.1.1 Cluster 447 with FC SAN or iSCSI SAN architectur

17.1.2 quorum settings for clusters 450

17.2 establishing a failover cluster instance walkthrough 451

17.2.1 hardware and software requirements 451

17.2.2 iSCSI SAN two-node file server cluster instance walkthrough 453

17.3 add nodes, delete nodes and delete clusters in the cluster 489

Chapter 18 troubleshooting of system startup 494

18.1 Select the correct configuration for the last time to start the system 495

18.1.1 suitable for the occasion of "correct configuration for the last time" 495

18.1.2 it is not suitable to choose "correct configuration for the last time" 496

18.1.3 how to choose the correct configuration for the last time 496

18.2 safe mode and other advanced startup options 497

18.3 backup and recovery system 499

18.3.1 Overview of backup and recovery 499

18.3.2 how to back up disk 500

18.3.3 how to recover a file, disk, or system 506

18.3.4 other backup settings 515

Appendix A uses Hyper-V to build test environment 517

A.1 hardware requirements for Hyper-V 518

A.2 install Hyper-V 518

A.2.1 install Hyper-V role 518

A.2.2 Virtual switch 520 for Hyper-V

A.3 create virtual switch and virtual machine 521

A.3.1 create virtual switch 521

A.3.2 create Windows Server 2012 R2 virtual machine 523

A.4 create more virtual machines 528

A.5 Connect to Internet 534 via Hyper-V host

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report