Microsoft Windows 2000 Server布署规划指南:英文

Microsoft Windows 2000 Server布署规划指南:英文
作 者: 美国Microsoft公司著
出版社: 北京大学出版社
丛编项: Windows 2000 Server资源工具大全
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 互连网络
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《Microsoft Windows 2000 Server布署规划指南:英文》作者简介

内容简介

“Microsoft Windows 2000 Server Resource Kit”丛书共由7卷和一张光盘组成,光盘中包括各种工具、附加的参考资料和本丛书的电子版。当需要补充新的信息时,我们将通过Web发布,读者可通过Web得到有关的更新内容和信息。《Microsoft Windows 2000 Server Deployment Planning Guide》首次披露了部署Windows 2000所包含的各种技术的规划准则和策略。本书提供的决策论点和技术信息可帮助您确定部署的顺序和过程;本书还提供了在服务器和客户机上进行自动安装的详细步骤。您可参阅本丛书的其他各卷,以了解有关Windows 2000的各种技术及其工作原理和维护方法的详细信息。

图书目录

Introduction xxxix

About the Deployment Planning Guide

Goals of This Guide

Guide Features

Guide Structure

Chapter Structure

Planning Worksheets

Document Conventions

Artwork Symbols

Resource Kit Compact Disc

Resource Kit Support Policy

Part 1 Planning Wverview

Chapter 1 Introducing windows 2000 Deployment Planning

Starting Your Plan

Effectively Using This Book

How to Begin Planning

Overview of the Windows 2000 Product Family

Windows 2000 Product

Windows 2000 Server

Windows 2000 Server Standard Edition

Windows 2000 Advanced Server

Terminal Services

Using Windows 2000 to Improve the Way You Work

IT Administrator

Department Manager

Sales Representative

Examples of How Business Needs are Satisfied by Windows 2000

Case Study 1: North American Industrial Manufacturer

Existing IT Environment

Goals for Deploying Windows 2000

Case Study 2: Large Multinational Manufacturer

Existing IT Environment

Goals for Deploying Windows 2000

Case Study 3: Multinational Financial Services Corporation

Existing IT Environment

Goals for Deploying Windows 2000

Case Study 4: International Software Development Company

Existing IT Environment

Goals for Deploying Windows 2000

Mapping Windows 2000 Features to Your Business Needs

Management Infrastructure Services

Desktop Management Solutions

Security Features

Information Publishing and Sharing

Component Application Services

Scalability and Availability

Networking and Communications

Storage Management

Planning Task List for Mapping Windows 2000 Features

Chapter 2 Creating a Deployment Roadmap

Creating a Project Plan

Preparing Your Project Planning Process

Determining Goals and Objectives

Feature Design and Development

Windows 2000 Pilot

Production Rollout

Deployment Scenarios

Scenario 1: Multinational Financial Services

Phase 1: Assessment

Phase 2: Design and Engineering

Phase 3: Testing

Phase 4: Migration

Scenario 2: Multinational consumer and Industrial Manufacturer

Deployment Teams

The Server Deployment Team

The Client Deployment Team

Techmology Dependencies

Active Directory and Domain Namespace

Active Directory and exchange Server

Integrating Exchange Server

Remote OS Installation

Tips for Planning Your Windows 2000 Deployment

Planning Task List

Chapter 3 Planning for Deployment

Detailing Your Project Plan

Project Scope and Objectives

Personnel Requirements

Organizing Your Deployment Teams

Assigning Windows 2000 Team Roles

Current Computing Environment

Establishing Standards and Guidelines

Conducting a Gap Analysis

Testing and Piloting Windows 2000

Creating Project Planning Documents

Administrative Documents

Deployment Documents

Functional Specification

Communications Strategy

Education and Training Plan

Capacity Planning

Risk Assessment

Risk Management

Risk Assessment Matrix

Risk-Driven Schedule

Windows 2000 Deployment

Deployment Planning Task List

Chapter 4 Building a Windows 2000 Test Lab

Getting Started with Your Test Environment

Creating a Test Environment

Using the Lab for Risk Management

Lab Development Process

Testing Process

Setting Up a Preliminary Lab

Determining the Lab Strategy

Considering Return on Investment

Using the Lab During the Project Life Cycle

Planning

Developing

Deploying

Post-deployment

Evaluating Lab Models

Ad Hoc Labs

Change Mansgement Labs

selecting a Lab Model

Selecting a Lab Location

Testing in a Distributed Lab Environment

Case Study 1: Functional Lab Sites

Case Study 2: Contingency Lab Sites

Designing the Lab

Prerequisites for Designing the Lab

Designing for Test Scenarios

Simulating the Proposed Server environment

Simulating the Proposed Client Computer environment

Accommodating Test Processes

Documenting the Lab Configuration

Lab Description

Lab Diagrams

Building the Lab

Managing the Lab

Lab Management Responsibilities

Developing Lab Guidelines

Testing

Defining an Escalation Plan

Creating the Test Plan

Scope and Objectives

Testing Methodology

Resources required

Features and Functions

Risks

Schedule

Dsigning Test Cases

Conducting Tests

Documenting Test Results

Testing After Deployment

Using the Lab for Change Management

Defining the Role of the Lab in Change Management

Planning Task Lists for Lab Tesing

Lab Preparation Task List

Testing Task List

Chapter 5 conducting Your Windows 2000 Pilot

Overview of Conducting a Pilot

Pilot Process

Starting with Information Technology

Prerequisites for a Production Pilot

Creating a Pilot Plan

Scope and Objectives

Pilot Scope

Pilot Objectives

Pilot Users and Sites

Pilot Training Plan

Pilot Support Plan

Communication

Pilot Rollback Plan

Schedule

Preparing for the Pilot

Preparing Pilot Sites

Preparing Pilot Users

establishing Early communication

Keeping Participants informed

Developing the Rollout Process

Deploying the Pilot

Evaluating the Pilot

Monitoring the Pilot

Obtaining Feedback

Planning Task List for conducting a Pilot

Part 2 Network Infrastructure Prerequisites

Chapter 6 Preparing Your Network Infrastructure for Windows 2000

documenting Your Current environment

Hardware and Software Inventory

Network Infrastructure

Physical Network Diagram

Logical Network Diagram

Network Configuration

File,Print,and Web Servers

Line-of-Business Applications

Directory Services Architecture

Domain Administration Model

security

Preparing Your Network Architecture

Preliminary Steps

Stabilizing Your Existing Network

reviewing Your Network Protocols

Preparing Your Physical Infrastructure

Preparing Your Servers

Preparing Your Domain Controllers

Preparing Your Member Servers

Preparing Your Security Infrastructure

Preparing Your Clients

Windows 2000 Professional Upgrade considerations

Preparing to Operate with Other Systems

Network Infrastructure Preparation Task List

Chapter 7 Determining Network Connectivity Strategies

Network Connectivity Overview

Sites

Remote Connectivity Methods

Internal Local Area Network Connectivity Within Sites

External Connectivity Within an Organization

designing the Demilitarized Zone

Site Connectivity for an Organization

Remote Client Connectivity

Windows 2000 TCP/IP

New Features in the Windows 2000 TCP/IP Suite

Automatic Private IP Addressing Configuration

Large Windows Support

Improved estimation of Round Trip Time

Planning Considerations for Microsoft TCP/IP

IP Address classes

Subnet Masks and custom Subnetting

TCP/IP and windows Internet Name Service

WINS Design Considerations

Routing and Remote Access

New features of Windows 2000 Routing and Remote Access

Service

Remote Access Policy

Remote Access Design Considerations

VPN Security

benefits of Virual Private Networking

Point-to-Point Tunneling Protocol VPNs

L2TP over IPSec VPNs

L2TP Deployment Considerations

L2TP Examples

UPN Security with IPSec

Internet Authentication Service and Centralized Management

Multihoming

IP Routing Infrastructure

Static Routed Networks

RIP-for-IP Network Design

OSPF Network Design

IPX Routing Structure

IPX Network Design

AppleTalk Routing Structure

Multicast Support

Network Address Translation

windows 2000 DHCP

Benefits of Using DHCP

New Features of Windows 2000 DHCP

enhanced Server Reporting

Additional Scope Support

DHCP and DNS Integration

Unauthorized DHCP Server Detection

Dynamic Support for Bootstrap Protocol Clients

Read-Only Console Access to the DHCP Manager

Designing DHCP Into Your Network

Network Infrastructure Size

Windows 2000 Asynchronous Transfer Mode

Benefits of Using Windows 2000 ATM

Features of windows 2000 ATM

ATM User Network Interface Call Manager

Updated NDIS and ATM Hardware Support

ATM LAN Emulation

IP/ATM

Multicast and Address resolution Service

PPP/ATM

ATM Design Considerations

Quality of Service

Planning Task List for Networking Strategies

Chapter 8 Using Systems Management server to Analyze Your Network Infrastructure

Analyzing Your Network Infrastructure

Using Systems Management server

How systems Management Server Can Expedite Windows 2000 Deployment

Systems Management server 1.2 differences

Collecting Inventory

Assessing the Current State of Your Hardware

Hardware Capacity

Hardware Compatibility

Using Systems Management Server Hardware Inventory

Assessing the current State of Your Software

Using Inventory to Prepare Your Network Infrastructure

Reporting the Collected Data

Sample Systems Management server Report of Windows 2000

Readiness

Using the Product Compliance Subsystem

Analyzing and Using the Collected Data

Monitoring Your Network

Ensuring Application Compatibility

Network Analysis Planning Task List

Additional Resources

Part 3 Active directory Infrastructure

Chapter 9 Designing the Active Directory Structure

Overview of Active Directory

Primary Active Directory Features

Providing a Foundation for New Technologies

Planning for Active Directory

General Design Principles

Composing Your Active Directory Structure Plans

Creating a Forest Plan

Forest Planning Process

Determining the Number of forests for Your Network

Creating a Single Forest Enuironment

Creating a Multiple-Forest Enuironment

Incremental Costs for an Additional Forest

Creating a Forest Change Control Policy

Schema Change Policy

Configuration Change Policy

Changing the Forest plan After Deploymetn

Creating a Domain Plan

Domain Planning Process

Determining the Number of Domains in Each Forest

How Creating Domains Has Changed

When to Create More Than One Domain

Incremental Costs for an Additional Domain

Choosing a Forest Root Domain

Assigning DNS Names to Create a Domain Hierarchy

Arranging Domains into Trees

Domain Naming Recommendations

Domain Names and Computer Names

Planning DNS Server Deployment

Authority and Delegation in DNS

Domain Controller Locator System

DNS Server Requirements

Locate Authoritative Servers

Optimizing Authentication with Shortcut Trust Relationships

Changing the domain Plan After Deployment

Adding New Domains and Removing Existing domains

Merging and Splitting Domains

Renaming domains

Creating an Organizational Unit Plan

OU Structure and Business Structure

OU Planning Process

Creating OUs to Delegate Administration

Modifying Access Control Lists

Deciding What OUs to Create

Delegation Procedures

Creating OUs to Hide Objects

Creating OUs for Group Policy

Changing the OU Plan After Deployment

Creating a Site Topology Plan

Site Topology Planning Process

Defining Sites and Site Links

Creating Sites

Connecting Sites with Site Links

Placing Servers into Sites

Placing Additional Domain Controllers

Placing Global Catalog Servers

Placing DNS Servers

Changing the Site Topology After Deployment

Planning Task List for Designing the Active Directory Structure

Chapter 10 determining Domain Migration Strategies

Starting the Migration Planning Process

Planning Process Phases

Detemining Your Migration Roadmap

Migration Goals

Migration Concepts

Upgrading Clients and Servers

Domain Migration Considerations

Upgrade Decisions

Restructure Decisions

Application Compatibility

Interoperability Requirements

Disk Storage Requirements for Active Directory Objects

Planning Domain Upgrade

Determining Supported Upgrade Paths

Examining the Existing Domain Structure

Developing a Recovery Plan

Managing the Transition to the Windows 2000 Forest

Considering the Upgrade of Resource Domains

Determining a Strategy for Upgrading Domain Controllers

Windows 2000 Domain Modes

Upgrading the Windows NT PDC

PDC Emulation in Windows 2000

Access Control Components

Determining the Order for Upgrading Domains

Guidelines for Upgrading Account Domains

Guidelines for Upgrading Resource Domains

Cild Domains and Trusts

Determining When to Move to Native Mode

Reasons for Continuing in Mixed Mode

Reasons for Moving to Native Mode

Examining Windows 2000 Groups

Local Groups

Domain Local Groups

Global Groups

Universal Groups

Nesting Groups

Group Membership Expansion

Effects of Upgrade on Groups

Using NetBIOS with Windows 2000

Transitioning to File Replication Service

LAN Manager Replication Service Process

The FRS Process

Maintaining LAN Manager Replication Service in a Mixed Environment

Using Routing and Remote Access Service in a Mixed Environment

Planning Domain Restructure

Determining the Reasons to Restructure Domains

Determining When to Reatructure Domains

Examining the Implications of Restructuring Domains

Moving Security Principals

Moving Users and Global Groups

Moving Profiles and SIDhistory

Moving Computers

Moving Member Servers

Establishing Trusts

Cloning Security Principals

Domain Restructure Scenarios

Scenario#1: Migrating Users Incrementally from Windows NT to Windows 2000

Scenario#2: Consolidating a Resource Domain into an OU

Domain Migration Tools

ClonePrincipal

Netdom

Migration Planning Task List

Chapte 11 Planning Distributed Security

Developing a Network Security Plan

Security Risks

Security Concepts

Security Model

Domain Model

Trust Management

Security Policy

Security Configuration and Analysis

Symmetric Key Encryption

Public Key Encryption

Authentication

Single Sign-On

Two-Factor Authentication

Access Control

Data Integrity

Data Confidentiality

Nonrepudiation

Code Authentication

Audit Logs

Physical Security

User Education

Distributed Security Strategies

Authenticating All User Access

Planning Considerations

Kerberos Authentication and Trust

How Kerberos Authentecation Words

Implementing Kereberos Authentication

Considerations about Kerberos Security

Smart Card Logon

How smart Cards Work

Prerequisites for Implementing Smart Cards

How to Implement Smart Cards

Considerations about Smart Cards

Remote Access

How Remote Access Works

Remote Access Policies

How th Enable Remote Access

Considerations About Remote Access

Applying Access Control

Access control Lists

How ACLs Work

Prerequisites for Implementing ACLs

How to Implement ACLs

Security Groups

How Security Groups Work

security Group Types

Default Permissions of Security Groups

Prerequisites for Implementing Security Groups

Implementing Security Groups

Considerations About Security groups

Establishing Trust Relationships

Domain Trust

How Trust Relationships Work

Prerequisites for Implementing Trusts

How to Implement Trusts

Considerations About Trusts

Enabling data Protection

Encrypting File System

How EFS Words

Prerequisites for Implementing EFS

How to Implement EFS

Considerations About EFS

IP Security

How IPSec Words

Prerequisites for Implementing IPSec

How to Implement IPSec

Considerations for IPSec

Setting Uniform Security Policies

Group Policy

How Group Policy Works

Prerequisites for Implementing group Policy

How to Implement group Policy

Considerations About Group Policy

Group Policy Security Settings

Account Policies

Local Computer Policies

Event Log Policies

Restricted Groups Policies

Systems Services Policies

Registry Policies

File System Policies

Public Key Policies

IP Security Policies on Active Directory

Security Templates

How Security Templates Work

Prerequisites for Implementing Security Templates

How to Implement security Templates

Considerations About Security Templates

Deploying Secure Applications

Authenticode and Software Signing

How Authenticode Works

Implementing Authenticode Screening

Considerations for Authenticode and Software Signing

Secure E-mail

How Secure E-mail Works

Considerations for Secure E-mail

Secure Web Sites and Communications

Considerations for Secure Web Sites

Managing Administration

Delegation

Security Groups,Group Policy,and Access Control Lists

Built-in Security Groups

Delegation of Control Wizard

Delegate Administration Wizard

Delegating Control of group Policy Objects

Auditing

How Auditing Works

Prerequisites for Implementing the Audit Function

How to Implement the Audit Function

Considerations About Auditing

Planning Task List for Distributed Security

Chapter 12 Planning Your Public Key Infrastructure

Overview of Public Key Infrastructure

How PKI Works

Prerequisites for Implementing PKI

How to Implement PKI

Creating a Local Certification Authority

Managing Your Certificates

Using the Certificate Serveces Web Pages

Setting Public Key Policies in Group Policy Objects

Building Your Public Key Infrastructure

Designing Your Public Key Infrastructure

Identify Your Certificate Requirements

Basic Security Requirements for Certificates

Determining Which Certificate Types to Issue

Define Certificate Policies and Certification Authority Practices

Certificate Policies

Certificate Practices Statements(CPS)

Define Certification Authority Trust Strategies

Benefits of Certification Authority Trust Hierarchies

Benefits of Certificate trust Lists

Additional Considerations for Certification Authority Trust Strategies

Define Security Requirements for Certification Authorities

Define Certificate Life Cycles

Define Certificate Enrollment and Renewal Processes

Define Certificate Revocation Policies

Policies for Revoking Certificates

Policies for Certificate Revocation Lists

Define Maintenance Strategies

Developing Recovery Plans

Failed Certification Authority

Compromised Certification Authority

Developing Optional Custom Applications

Performing Resource Planning

Deploying Your Public Key Infrastructure

Schedule Production Rollout in Stages

Install Certification Authorities

Install and Configure Supporting Systems and Applications

Configure Certificates to Be iSSUED

Examples of Configurations

Security Access Control Lists for Certificate Templates

Configure Certificate Revocation List Publication

Configure Public Key Group Policy

Configure Certificate Enrollment and Renewal

Start Issuing Certificates

Public Key Infrastructure Planning Task List

Part 4 Windows 2000 Upgrade and Installation

Chapter 13 Automating Server installation and Upgrade

Determining Whether to Upgrade or Clean Insatall

Resolving Critical Planning Issues

Choosing Your Installation Method

Preparing for Inatallation

Creating Distribution Folders

Structuring the Distribution Folder

Installing Mass Storage Devices

Installing Hardware Abstraction Layers

Installing Plug and Play Devices

Converting File Name Size using $$Renane.txt

Reviewing the Answer File

Creating the Answer File

Using the Answer File to Set Passwords

Extending Hard Disk Partitions

Using the Answer File with the Active Directory Installaton Wizard

Reviewing the Windows 2000 Setup Commands

Winnt.exe

Winnt32.exe

Automating the Installation of Server Applications

Using Cmdlines.txt

Using the[GuiRunOnce]Section of the Answer File

Using Application Installation Programs

Using a Batch File to Control How Multiple Applications Are Installed

Automating the Installation of Windows 2000 Server

New Options for Automated Installation

Automated Installation Methods

Using Syspart on Computers with Dissimilar Hardware

Using Sysprep to Duplicate Disks

Overview of the Sysprep Process

Sysprep Files

Running Sysprep Manually

Running Sysprep Automatically After Setup Completes

Using Sysprep to Extend Disk Partitions

Using Systems Management Server

Using a Bootable Compact Disc

Installation Configuration Examples

Existing Servers

Example 1: Windows NT Server with Windows 2000-Compatible Server Applications

Example 2: Computers Running Windows NT Server 3.5 or Earlier,or Servers Running Non-Microsoft Operating Systems

New Servers

Installation Planning Task List

Chpater 14 Using Systems Management Server to Deploy Windows 2000

Using Systems Management Server to Dirtribute Software

Software Distribution with Systems Management Server 2.0

SMS Packages

Distribution

Advertising

SMS Software Distribution Best Practices

How SMS Can Help with windows 2000 deployment

Packaging Windows 2000 for Systems Management Server

Preparing the windows 2000 Server Upgrade Package

Allowing User Input During the Upgrade

Examining the Windows 2000 Server Package Definition

Preparing the Windows 2000 Professional Upgrade Package

Windows 95 and Windows 98 Upgrades

Windows NT Workstation Upgrade

Distributing the Windows 2000 Packages

Preparing to Distribute the Packages

Check the Status of Site Servers and Distribution Points

Ensure Each Site Has an Adequate Number of Distribution Points

Use Distribution Point Groups

Ensure Sender Controls Are in Place

Ensuer Fan-out Distribution Will Work

Select a Test Site

Distributing the Packages to Sites and Distribution Points

Testing the Distribution

Expanding the Distribution

Distributing by Means of the Courier Sender

Monitoring the Distribution

System Status Subsystem

Reporting Package Distributions Status

Troubleshooting the Distributions

Advertising the Windows 2000 Packages

Selecting Computers to Upgrade

Preparing Clients to Receive the Advertisements

Advertising the Packages to Computers

Expanding Security on Distribution Points

Upgrading Computers

Executing the Advertisement at Each Computer

Status of the Upgrade at Each Computer

Monitoring the Advertisements

The System Status Subsystem

Reporting Advertisement Status

Troubleshooting Advertisements

Using Systems Management Server to Ease Domain Consolidation and Migration

Examining Differences Between Systems Management Server 1.2 and Systems Management Server 2.0

Planning Task List for Using Systems Mansgement Server to Deploy

Windows 2000

additional Resources

Chapter 15 Upgrading and Installing Member Servers

Planning for Member Server Upgrade and Installation

Process for Installing or Upgrading to Windows 2000

Creating an Upgrade and Installion Plan

Create a Schedule

Scenario: Minimizing Network Downtime During Server Upgrade

Preparing Member Servers for Upgrade or New Installation

Inventory the Existing Hardware

Determine System Requirements

Determine the Compatibility and Reliability of Existing Software

determine Third-Party Software Compliance

Perform Pre-installation Tasks

Performing an Upgrade or Inatallation

Pre-Upgrade Checklist

Upgrading Member Servers

Performing a New Installation

Determining ServerRoles for Each Windows 2000 Server

File servers

Macintosh Volumes

Novell NetWare Volumes

Test File Shares

Print Servers

Print Server Setup

Guidelines for Setting up a Network Printing Environment

Active Directory Integration with Windows 2000 Server Print Services

Testing Printer Shares

Application Servers

Component Services

Terminal Services

Database server

Web Servers

Proxy Servers

Performing Post-Upgrade and Installation Tasks

Testing Network connectivity

Tuning Network Servers

Tools for System Administration

Planning Task List for Member Servers

Chapter 16 Deploying Terminal Services

Overview of terminal Services

Terminal Serveces Licensing Components

Microsoft Clearingouse

License Server

Terminal Server

Client Licenses

Required Licenses

Optional Terminal Services Licenses

Third-Party Expansion

Creating Your Terminal Services Deployment Plan

Process for Deploying Terminal Services

Assembling the Terminal Services Team

Identifying Your Terminal Services Requirements

Scenario 1: Terminal Services Remote Administration

Scenario 2: Remote Access

Scenario 3: Line of Business Applications

Scenario 4: Central Desktop Deployment

Deployment Requirements

Preparing Your Computing Environment

Install License Server on Domain Controller

Access Over Wide Area Network

Access to Network Services

Connecting the Terminal Services Client and Server

Assessing the Current Environment

Considerations for Application Deployment

Creating Your Terminal Services Deployment design

Setting Up a License Server

Enabling a License Server

Activating a License Server

Installing Licenses

Using the Terminal Services Licensing Administrative Tool

Backing Up Your License Server

Designing Your Network for Terminal Server Access

Network Load Balancing and Terminal Services

Designing and Setting Up Your Domain Structure

Using Windows 2000 User Profiles or Roaming User Profiles

Roaming User Profiles

Group Policy

Access to Applications

Using Home Directories

Planning Security

NTFS File System

User Rights

Administrator Rights

Auto-Logon Procedures

Encryption

Additional Security Considerations

Remote Access

Terminal Services Over the Internet

Firewalls

Configuring Servers for Terminal Services Deployment

Preparing for Client Deployment

Deploying to Windows CE-Based Terminals

Deploying to Client Computers

Upgrading to Terminal Services

Installing and Configuring Applications

Deploying Applications through Group Policy

Deploying Applications from a Domain Controller

Supporting Multilingual and International Users

Printing from Terminal Services

Printing to Your Local Printer by RDP Protocol

Network Shared Printers

Printing Across a WAN or Dial-up Connection

Best Practices for Client Configuration

Planning for Testing and Piloting

Considerations for the Test Lab

Monitoring Performance

Evaluating CPU Performance

Evaluating Memory Performance

Evaluating Network Performance

Using Help Desk and Administrative Tools

Remote Control

Tools for Administration

Terminal Services Deployment Planning Task List

Part 5 Advanced Management

Chapter 17 Determining Windows 2000 Network Security Strategies

Planning for Network Security

Assessing Network Security Risks

Determining Server Size and Placement

Preparing Your Staff

Developing Security Policies and Procedures

Creating a Plan for Deploying Your Security Technologies

Identifying User Categories and Their Security Needs and Risks

Developing Strategies for Secure Network Connections

Creating Secure Boundaries

Securing Against Everyone

Using Microsoft Proxy Server

Monitoring Your Network Security

Connecting to External Networks

Deploying Network Security Technologies

Preparing for Windows 2000 Network Security Technologies

Routing and Remote Access

Routing and Remote Access Security

Virtual Private Networks

deploying VPNs

VPN Server Capacity

Internet Authentication Service

Deploying Strategies for Users

Deploying Strategies for Partners

Planning Task List for Determining Network Security Strategies

Chapter 18 Ensuring the Availability of Applications and Services

Mading Applications and Services Highly Available

Overview of Windows 2000 Advanced Server

Process for Making Applications and Services Highly Available

Overview of Windows Clustering

determining Availability Strategies

Assembling the Clustering Planning Team

Identifying High-Availability Needs for Applications and Services

Determining Hardware Compatiblity for Advanced Features

Dtetrmining Your Clustering Requirements

Planning for Network Load Balancing

Process for Planning Your Network Load Balancing Clusters

Determining Which Applications to Use with Network Load Balancing

Using Network Load Balancing to Deploy Terminal Server Clusters

Configuring Network Loak Balancing Clusters for Servers Running IIS/ASP and COM+Applications

Identifying Network Risks

Planning for Network Load Balancing

Determining Server Capscity Requirements

Optimizing Network Load Balancing Clusters

Requirements for Network Load Balancing

Using a Router

Planning for Cluster Service

Process for Planning Your Server Clusters

Choosing Applications to Run on a Server Cluster

Identifying Network Risks

Determining failover and failback Policies for Resource Groups

Choosing a Server Role

Choosing a Server Cluster Model

Planning for Cluster Service

Tools to Automate the Deployment of Cluster Service

Optimizing Your Clusters

Planning for Fault-Tolerant Disks

Hardware RAID

Error Recovery

Testing Server Capacity

Planning a Cluster Badkup and Recovery Strategy

Windows 2000 Cluster Planning Task List

Additional Resources

Chapter 19 Determining Windows 2000 Storage Management Strategies

Improving Your Storage Management Functions

Creating Your Storage Management Plan

Assessing Your Storage Needs

Selecting a Data Storage System

Managing Disk Rresources

Disk Management

Basic and Dynamic Storage

Volume Management

Volume Mount Points

Disk Defragmentation

Considerations for Using Dynamic Storage

Removable Storage

Remote Storage

Relationship of Remote Storage and Removable Storage

Considerations for Using Remote Storage

Optimizing Data Management

Windows Clustering

Considerations for Using Clustering in Your Storage Strategy

File System Improvements

NTFS

Quota Management

Distributed File System

Considerations for Using Dfs in Your Storage Strategy

Indexing Service

Integration with Windows 2000 Components

Considerations for Using Indexing Service in Your Storage Strategy

Enhancing Data Protection

Fault Tolerance

Disk Management

Selecting a RAID Strategy

Backup

A Data Protection Strategy for Enterprise Networks

Considerations for designing a Fault-Tolerant Storage System

Improving Your disaster Recovery Capabilities

Creating Backup and Off-Site Storage Policies

Backup Policies

Considerations for Off-Site Storage

Creating a Disaster Recovery Plan

Testing System Recovery Strategies

Practicing Recovery Procedures

Documenting Recovery Procedures

Planning Task List for Storage Management

Chapter 20 Synchromizing Active Directory with Exchange Server Directory Service

Overview of Directory Synchronization

Process for Synchronizing the directories

Windows 2000 Server Software Comonents

Key Advantages of Using ADC

Establishing Relationships Using Connection Agreements

Creating the ADC Connection Agreement Plan

Forming the Deployment Planning Team

Examining Your Domain Stucture and Exchange Server Site Topology

Preparing Your Network for ADC Deployment

Considering Specific Network Requirements

Computer Requirements

Deployment Requirements

ADC Implementation Strategy

ADC Schema and Object Mapping

Managing Objects

Administering Objects from Active Directory

Administering Objects from Exchange Server 5.5 Directory Service

Administering Objects from Both Active Directory and Exchange Server 5.5 Directory Service

Defining Objects for Directory Synchromization

Setting up Connection Agreements

Designing Your Connection Agreements

Documenting Your ADC Connection Agreement Plan

Testing Connection Agreement Configurations

Determining a Schedule for Directory Synchronization

Protecting Against Accidental Loss of Data

Planning Task List for Directory Synchronization

Additional Resources

Part 6 Windows 2000 Professional/Client Deployment

Chapter 21 Testing Applications for Compatibility with Windows 2000

Application Testing Overview

Business Application Definition

Application Testing Process

Managing Application testing

Identifying and Prioritizing business Applications

Identifying Your Applications

Gathering Application Information

Simplifying Your Application Environment

Prioritizing Your Applications

Preparing an Application Test Plan

Establishing Testing Scope

Defining the testing Methodology

Case Study 1: Testing Festivals

Case Study 2: Preview Program

Identifying Resource Requirements

Defining Pass-Fail Criteria

Creating a Testing Schedule

Testing Applications

Developing Testing Strategies

Strategies for Commercial Applications

Strategies for Custom Applications

Testing Tips

Common Compatibility Issues

Tracking Test Results

Choosing a Tracking System

Capturing Data

Reporting results

Resolving Application Incompatibilities

Planning Task List for Application Testing

Additional Resources

Chapter 22 Defining a Client Connectivity Strategy

Client Connectivity Overview

Basic Client Connectivity

Windows 2000 Services and Protocols

TCP/IP Network clients

Active Directory

IPX Network Clients

Windows Client to Novell Server

Windows Client to Mixed Novell Netware and Windows 2000 Server environment

Printing to NetWare Printers

UNIX Network Clients

AppleTalk Network Clients

Advanced Client Connectivity

Asynchronous Transfer Mode

Directly Connected ATM

IP/ATM

Infrared Data Association Protocol Suite

Remote Access Client

Dial-up to Private Network

Virtual Private Networks

Remote Network Connection Methods

Small Office Networks

Small Office/Home Office Cinnectivity

SOHO Examples

Medium to Large Networks

Routing and Remote Access

Dial-up to Private Network

Medium to Large Network Example

Planning Task List for Client Connectivity

Chapter 23 Defining Client Administration and Configuration Standards

Making Client Systems Manageable

Defining User Types

Assessing Requirements for User Types

Defining Sfoftware Standards

Defining Hardware Standards

Defining Significant Support Issues

Defining an Administration Model and Standards

Summarizing Your Administrative and Configuration Goals

Using Group Policy to Administer clients

Comparing windows NT 4.0 System Policy and Windows 2000 Group Policy

Applying Windows NT 4.0 Policies to Windows 2000

Using Active Dircetory to Delegate Client Management

Delegating Administration of Group Policy

special group Policy Implementation Options

Comparing Stand-Alone and Active Directory-Based Management Features

Using Group Policy on Stand-alone computers

Configuring Hardware

File System Support

Hardware Profiles

Defining User Interface Standards

Using Group Policy for Configuration Control

Customizing the Logon and Logoff Processes

Restricting Changes to the Desktop

Restricting Changes to the Start Menu

Configuring Options for Remote Users

Adding Multilingual Options

Considerations for Choosing the MultiLanguage Version

Upgrading to the Windows 2000 MultiLanguage Version

Planning a Windows 2000 MultiLanguage Version Installation

Making Systems More Accessible

Configuring Windows 2000 Features for accessibility

Enabling Third-Party Devices

Using Group Policy to Fine-tune Configurations for Accessibility

Client Standards Planning Task List

Chapter 24 Applying Change and Configuration Management

Evaluating Change and Configuration Management

Technologies Used to Enable Change and Configuration Management

Identifying Change and Configuration Management Needs and Opportunities

Key Background Information

Using Systems Management Server to Supplement IntelliMirror

Planning for Enhanced Client Support with IntelliMirror

Enabling Remote OS Installation

defining User Requirements

Using Remote OS Installation

Configuring the Remote Installation Service

Preparing Client Operating System Inages

Using group Policy to Improve Software Management

Preparing Software for Distribution

When Native Authoring Is Not Possible

Using Transforms

Dirtributing Software

Targeting Software

Targeting Software

Software Management Options

Software Roaming Users

Software Shared Computers

Software Mobile Worders

Maintaining Software Using IntelliMirror

Patching Existing Software

Upgrading Existing Software

Software Removal

Maintaining User Data and Settings on a Network

Enabling Roaming User Profiles

Guidelines for Setting Up Roaming User Profiles

Redirecting Folders

Guidelines for Configuring Folder Redirection

Configuring the Synchromization of Offline Files

Guidelines for Configuring Offline Files

Setting Disk Quotas

Guidelines for Setting Disk Quotas

Selecting Change and Configuration Management Options for Your Organization

An Overview of Basic and Advanced options

Meeting the Needs of Technical Users

Meeting the Needs of Stationary Professional Users

Meeting the Needs of Roaming Professional Users

Meeting the Needs of Mobile Professional Users

Meeting the Needs of Task-Based Users

Summary

Change and Configuration Management Planning Task List

Chapter 3 Automating Client Installation and Upgrade

Determining Whether ot Upgrade or Clean Install

Resolving critical Planning Issues

Choosing Your Installation Method

Preparing for installation

Creating the Distribution Folders

Structuring the Distribution Folder

Installing Mass Storage devices

Installing Hardware Abstraction Layers

Installing Plug and Play Devices

Converting File name Size Using $$Rename.txt

Reviewing the Answer File

Creating the Answer File

Using the Answer File to Set Passwords

Extending Hard Disk Partitions

Reviewing the Windows 2000 Setup Commands

Winnt.exe

Winnt32.exe

Automating the Installation of Client Applications

Using Cmdlines.txt

Using the [GuirunOnce]Section of the Answer File

Using Application Installation Programs

Using a Batch File to Control How Multiple Applications Are Installed

Using Windows Installer Service

Windows Installer Terminology

Windows Installer Package File

Automating the Installation of Windows 2000 Professional

New Options for Automated Installation

Automated Installation Methods

Using Syspary for Computers with Dissimilar Hardware

Using Sysprep to Duplicate Disks

Overview of the Sysprep Process

Sysprep Files

Running Sysperp Manually

Running Sysprep Automatically After Setup Completes

using Sysprep to Extend Disk Partitions

using Systems Management Server

using a Bootable Compact Disk

using Remote Operating System Installation

RIS Server Network Load Implications

Optimizing Performance

DHCP and DHCP Servers

Controlling RIS Server Selection and Balancing Load

Working with Routers

Installation Configuration Examples

Existing Client Computers

Existing 1: Windows NT Workstation 4.0 with Windows 2000 Compatible Client Applications

Existing 2: Windows NT Wordstation 3.5 or Earlier,and Non-Microsoft Client Computers

New Client Computers

Installation Task List

Part 7 Appendixes

Appendix A Sample Planning Worksheets

Using This Appendix

Introducing Windows 2000 deployment Planning

Management ifrastructure Services

Desktop Management Solutions

Security Features

Information Publishing and Sharing

Component Application Services

Scalability and Availability

Networking and Communications

Storage Management

Building a Windows 2000 Test Lab

Preparing Your Network Infrastructure for Windows 2000

Determining Domain Migration Strategies

Planning Distributed Security

Automating Server Installation and Upgrade

Upgrading and Installing Member Servers

Member Server Planning Worksheet

Server Data Backup and Disaster Recovery Plan

Decide New Hardware Requirements

Record Server Specifications

Print Server

File Servers

Application Servers

Web Servers

Schedule Your Upgrade or Clean Installation

Prioritize Each Member Server for Deployment

Ensuring the A vailability of Applications and Services

Ieentify Your High-A vailability Needs

Application and Service Specifications

Plan Your Network Load Balancing

Making Specific Choices for Network Load balancing

Synchronizing Active Directory with Exchange Server Directory Service

Create Your Connection Agreements

Identify the Connection Agreement Source and Target Servers

Create Your Directory Synchromization Schedule

Record Your Contacts for Directory Synchromization

Schema Administrators Group

Windows 2000 Domain Administration

Exchange Server 5.5 Site Administration

Testing Applications for Compatibility with Windows 2000

Defining Client Administration and Configuration Standards

Define Your Group Policy Requirements

Appling Change and Configuration Management

Automating Client Installation and Upgrade

Appendix B Setup Commands

Using Setup Commands to Install Windows 2000

Winnt32.exe Command Syntax

Winnt.exe Command Syntax

Appendix C Sample Answer Files for Unattended Setup

Answer File Format

Answer File Keys and Values

Sample Answer File

Sample 1-Default Unattend.txt

Sample 2-Unattended Installation of Windows 2000 Professional from CD-ROM

Sample 3-Install and Configure Windows 2000 and Configure Microsoft Internet Explorer with Proxy Settings

Sample 4-Install and Configure Windows 2000 Server with Two Network Adapters

Sample 5-Install Windows 2000 Advanced Server with Network Load Balancing

Sample 6-Install Windows 2000 Advanced Server with Windows Clustering

Appendix D Deployment Tools

Additional Resources

Appendix E Accessibility for People with Disabilities

Overview of Accessibility in Windows 2000

Accessibility Benefits with Windows 2000

Considerations Before Upgrading to Windows 2000

Deploying Windows 2000 for Accessibility

Microsoft Active Accessibility

Third-Party Products and Services

“Certified for Windows”Logo

Using Serialkeys for Add-on Hardware and Software

Customizing the Computer for Accessibility Options

Remote Installation and Unattended Setup from a CD

Windows Installer

Group Policy

Setting Multiple User Profiles

Administrative Options

Accessibility Reset(Time-out)

Active Desktop

Utility Manager

Configuring Accessibility Features in Windows 2000

Configuring Accessibility Options by Using the Accessibility Wizard

Configuring Accessibility Options by Using Control Panel

Setting Options by Type of Disability

Options for Users with Hearing Impairments

Synchromized Accessible Media Interchange

Options for Users with Hearing Impairments

Customizable Sound Schemes

Adjusting the Volume

ShowSounds

SoundSentry

Synchronized Accessible Media Interchange

Options for Users with Physical Disabilities

Keyboard Options

Mouse Options

Options for Users with Seizure Sensitivity

Timing Patterns

Sound Schemes

Color and Contrast Settings

Options for Users with Visual Impairments

Microsoft Narrator

Keyboard Audio Cues

Microsoft Magnifier

Fonts

Size and Color Schemes

High-Contrast Color Schemes

New Mouse Pointers

Additional Resources

Glossary

Index