- William R Stanek
- Windows Server® 2012 R2 Inside Out: Configuration, Storage, & Essentials
- ixA.html
A
- access control, Hiding and controlling share access,
File security,
access controls, and auditing, Managing file shares after configuration,
Defining central
access policies, Extending access policies to auditing
-
- claims-based, Managing file shares after configuration,
Extending access
policies to auditing
- file and folders, Defining central access policies
- managing permissions, Hiding and controlling share access,
File security,
access controls, and auditing
- access control list (ACL), Controlling remote registry access,
Enabling advanced
auditing
- access permissions, File-sharing essentials, File security, access
controls, and auditing, Managing access permissions, Permission inheritance for
files and folders, Configuring access permissions, Basic permissions,
Basic
permissions, Troubleshooting permissions
-
- configuring, Configuring access permissions
- customizing, Basic permissions
- described, File-sharing essentials, File security, access
controls, and auditing
- editing, Basic
permissions
- file and folder ownership, Managing access permissions
- permission inheritance, Permission inheritance for files and
folders
- troubleshooting, Troubleshooting permissions
- access tokens, Configuring UAC and Admin Approval
Mode
- access-based enumeration, Hiding and controlling share access,
Creating shared
folders in Server Manager
- access-denied assistance, Configuring classification
- Access-Denied Assistance dialog box, Enabling access-denied assistance
- ACL (access control list), Controlling remote registry access,
Enabling advanced
auditing
- ACPI (Advanced Configuration and Power Interface), Diagnosing hardware and
firmware startup problems, Viewing Advanced, Resources, and other
settings, Troubleshooting hardware, HKLM\BCD00000000
-
- BIOS-based systems and, Viewing Advanced, Resources, and other
settings, Troubleshooting hardware
- described, Diagnosing hardware and firmware startup
problems
- registry subkey, HKLM\BCD00000000
- Action Center, Getting to know Server Manager, Adding non–Plug and Play,
older hardware, Preventing disk-integrity problems,
Diagnosing and
resolving problems with storage spaces
- activation, product, Product licensing, Performing a clean installation,
Performing an
upgrade installation, Activation sequence, Activate Windows by telephone,
Activate Windows by
telephone
-
- activating by phone, Activate Windows by telephone
- activating over Internet, Activation sequence
- activation sequence, Performing an upgrade installation
- clean installations, Performing a clean installation
- described, Product licensing
- managed activation, Activate Windows by telephone
- active cooling mode, Diagnosing hardware and firmware startup
problems
- Active Directory, Identify security requirements, Final considerations for
planning and deployment, Planning for server usage, Designing the Active
Directory namespace, Designing the Active Directory namespace,
Identifying the
domain and forest functional level, Activate Windows by telephone, Adding servers for
management, Introducing the registry, Storage-management role
services, Using
and finding shares, Navigating SMB versions, ADMIN$, Publishing shares in Active
Directory, Understanding central access policies,
Defining central
access policies
-
- central access policies, Understanding central access policies,
Defining central
access policies
- configuration information, Introducing the registry
- creating server groups, Adding servers for management
- defining server roles, Identifying the domain and forest functional
level
- described, Identify security requirements
- designing namespaces, Planning for server usage
- DFS and, Storage-management role services
- hidden shares and, Navigating SMB versions
- identifying domain and forest functional levels, Designing the Active
Directory namespace
- managing domain trusts, Designing the Active Directory
namespace
- planning for server usage, Final considerations for planning and
deployment
- publishing shares in, Using and finding shares, Publishing shares in Active
Directory
- SYSVOL share, ADMIN$
- volume activation, Activate Windows by telephone
- Active Directory Administrative Center, Using graphical administrative tools,
MMC tool
availability, Enabling dynamic controls and claims-based
policy, Configuring classification
- Active Directory Certificate Services (AD CS), Using roles, role services,
and features
- Active Directory Domain Services (AD DS), Using roles, role services, and
features, Managing the registry, Understanding the event
logs, Storage-management role services,
Deploying BitLocker
Drive Encryption
-
- described, Using
roles, role services, and features
- DFS directory trees, Storage-management role services
- event logs and, Understanding the event logs
- recovery passwords and, Deploying BitLocker Drive Encryption
- registry settings, Managing the registry
- Active Directory Domains And Trusts, Using graphical administrative tools,
MMC tool
availability
- Active Directory Federation Services (AD FS), Using roles, role services,
and features
- Active Directory Lightweight Directory Services (AD LDS),
Using roles, role
services, and features
- Active Directory Rights Management Services (AD RMS), Using graphical
administrative tools, MMC tool availability, Using roles, role services,
and features
- Active Directory Sites And Services, Using graphical administrative tools,
MMC tool
availability
- Active Directory Users And Computers, Using graphical administrative tools,
Using the MMC,
MMC tool
availability, Using and finding shares
- active partition/volume, Installing Windows Server 2012 R2,
Deploying BitLocker
Drive Encryption
- active partitions/volumes, Working with basic and dynamic disks
- active screening, Managing file screening and storage
reporting
- Active/Active controller model, Configuring the File And Storage Services
role
- Activity Directory Diagnostics template (Performance Monitor),
Creating and
managing data collector sets
- AD CS (Active Directory Certificate Services), Using roles, role services,
and features
- AD DS (Active Directory Domain Services), Using roles, role services, and
features, Managing the registry, Understanding the event
logs, Storage-management role services,
Deploying BitLocker
Drive Encryption
-
- described, Using
roles, role services, and features
- DFS directory trees, Storage-management role services
- event logs and, Understanding the event logs
- recovery passwords and, Deploying BitLocker Drive Encryption
- registry settings, Managing the registry
- AD FS (Active Directory Federation Services), Using roles, role services,
and features
- AD LDS (Active Directory Lightweight Directory Services),
Using roles, role
services, and features
- AD RMS (Active Directory Rights Management Services), Using graphical
administrative tools, MMC tool availability, Using roles, role services,
and features
- Add Counters dialog box, Using Performance Monitor, Monitoring performance
remotely, Configuring performance counter
alerts
- Add Drive Letter Or Path dialog box, Configuring mount points
- Add Hardware Wizard, Rolling back drivers
- Add Mirror dialog box, Adding a mirror to an existing volume,
Resolving problems
with mirrored sets
- Add MPIO Support dialog box, Adding and removing multipath hardware
devices
- Add New Quota Entry dialog box, Customizing quota entries for individual
users
- Add Or Remove Snap-Ins dialog box, Step 2: Adding snap-ins to the
console
- Add Physical Disk dialog box, Creating a standard volume
- Add Roles and Features Wizard, Windows 8.1 and Windows Server 2012 R2,
Windows 8.1 and
Windows Server 2012 R2, Postinstallation tasks, Using graphical
administrative tools, Using graphical administrative tools,
Using graphical
administrative tools, Using graphical administrative tools,
Using graphical
administrative tools, Using graphical administrative tools,
Working with Server
Manager, MMC
tool availability, MMC tool availability, MMC tool availability,
MMC tool
availability, Managing server roles and features,
Managing server
roles and features, Adding server roles and features,
Adding server roles
and features, Adding server roles and features,
Adding server roles
and features, Adding server roles and features,
Adding server roles
and features, Adding server roles and features,
Working with SMB
3.0, Configuring
the File And Storage Services role, Configuring the File And Storage Services
role, Configuring the File And Storage Services
role, Configuring the File And Storage Services
role, Configuring the File And Storage Services
role, Configuring the File And Storage Services
role, Configuring the File And Storage Services
role, Installing
Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V,
Installing
Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V,
Installing
Hyper-V, Installing Hyper-V, Setting up and managing BitLocker Drive
Encryption, Setting up and managing BitLocker Drive
Encryption
-
- Before You Begin page, Using graphical administrative tools,
MMC tool
availability, Managing server roles and features,
Configuring the File
And Storage Services role, Installing Hyper-V
- Confirm Installation Selections page, Adding server roles and features,
Configuring the File
And Storage Services role, Installing Hyper-V
- converting Minimal Server Interface installation, Postinstallation
tasks
- Create Virtual Switches page, Installing Hyper-V
- Default Stores page, Installing Hyper-V
- Desktop Experiences, Windows 8.1 and Windows Server 2012
R2
- Installation Progress page, Using graphical administrative tools,
Adding server roles
and features, Adding server roles and features,
Configuring the File
And Storage Services role, Installing Hyper-V
- installing and configuring file services, Working with SMB 3.0
- installing BitLocker, Setting up and managing BitLocker Drive
Encryption
- installing Hyper-V, Installing Hyper-V
- installing management tools, Using graphical administrative tools
- installing Network Unlock, Setting up and managing BitLocker Drive
Encryption
- process steps, Managing server roles and features
- Remote Assistance, Windows 8.1 and Windows Server 2012
R2
- Select Destination Server page, Using graphical administrative tools,
MMC tool
availability, Adding server roles and features,
Configuring the File
And Storage Services role, Installing Hyper-V
- Select Features page, Using graphical administrative tools,
MMC tool
availability, Adding server roles and features,
Configuring the File
And Storage Services role
- Select Installation Type page, Using graphical administrative tools,
MMC tool
availability, Adding server roles and features,
Configuring the File
And Storage Services role, Installing Hyper-V
- Select Server Roles page, Adding server roles and features,
Configuring the File
And Storage Services role, Installing Hyper-V
- starting, Working with Server Manager
- Virtual Machine Migration page, Installing Hyper-V
- Add Servers dialog box, Working with Server Manager, Getting to know Server
Manager
- Add To Favorites dialog box, Creating shell command tasks
- Add-Windowsfeature cmdlet, Setting up and managing BitLocker Drive
Encryption
- address space layout randomization (ASLR), Windows 8.1 and Windows Server 2012
R2
- Admin Approval Mode (UAC), Elevation, prompts, and the secure
desktop
- ADMIN$ share, ADMIN$, Managing file shares after
configuration
- administration tasks, Identify security requirements, Accessing a command prompt
during installation, Accessing a command prompt during
installation, Forcing disk-partition removal during
installation, Creating, deleting, and extending disk
partitions during installation, Creating, deleting, and extending disk
partitions during installation, Creating, deleting, and extending disk
partitions during installation, Windows Server 2012 R2 MMC administration,
Managing server
binaries, Introducing the registry, Software and User Account
Control administration, Elevation, prompts, and the secure
desktop, Application access tokens, Understanding the event
logs, Accessing
shares for administration
-
- accessing command prompt during installation, Accessing a command prompt
during installation
- accessing event logs, Understanding the event logs
- accessing shares for, Accessing shares for administration
- changing administrative approach, Identify security requirements
- creating partitions during installation, Creating, deleting, and extending disk
partitions during installation
- deleting partitions during installation, Creating, deleting, and extending disk
partitions during installation
- elevated prompt for, Managing server binaries, Introducing the registry,
Software and User
Account Control administration, Elevation, prompts, and the secure
desktop, Application access tokens
- extending partitions during installation, Creating, deleting, and extending disk
partitions during installation
- forcing partition removal during installation, Accessing a command prompt
during installation
- loading mass storage drivers during installation, Forcing disk-partition
removal during installation
- MMC administration, Windows Server 2012 R2 MMC
administration
- administration tools, Managing Windows Server 2012 R2, Working with the
administration tools, Working with the administration tools,
Working with the
administration tools, Working with the administration tools,
Working with the
administration tools, Using graphical administrative tools,
Using the Disk
Management tools, Creating and managing virtual hard disks for
Hyper-V
-
- command-line utilities, Working with the administration tools,
Using graphical
administrative tools
- Control Panel, Working with the administration tools,
Working with the
administration tools
- described, Managing Windows Server 2012 R2
- graphical, Working with the administration tools,
Working with the
administration tools, Using the Disk Management tools, Creating and managing virtual
hard disks for Hyper-V
- administrative shares, Hiding and controlling share access
- administrative wizards., Working with the administration tools
-
- (see also specific wizards)
- Administrator account, Performing a clean installation, Enabling remote
management, Elevation, prompts, and the secure
desktop, Application run levels
-
- application run levels, Application run levels
- remote management, Enabling remote management
- strong passwords, Performing a clean installation
- UAC and, Elevation, prompts, and the secure
desktop
- administrator applications, Application access tokens
- administrator permissions, Software and User Account Control
administration, Elevation, prompts, and the secure
desktop, Application access tokens
- administrator tokens, Introducing the registry
- Administrators group, Understanding TPM states and tools,
How quota management
works, Configuring disk quotas, Hiding and controlling share
access, ADMIN$, Creating shares by using File Explorer,
Creating shares by
using Computer Management
-
- ADMIN$ shares, ADMIN$
- disk quotas, How
quota management works, Configuring disk quotas
- drive shares, Hiding and controlling share access
- shared folders, Creating shares by using File Explorer,
Creating shares by
using Computer Management
- TPM management, Understanding TPM states and tools
- ADSI Edit, MMC
tool availability
- Advanced Attributes dialog box, NTFS compression
- Advanced Configuration and Power Interface (ACPI), Diagnosing hardware and
firmware startup problems, Viewing Advanced, Resources, and other
settings, Troubleshooting hardware, HKLM\BCD00000000
-
- BIOS-based systems and, Viewing Advanced, Resources, and other
settings, Troubleshooting hardware
- described, Diagnosing hardware and firmware startup
problems
- registry subkey, HKLM\BCD00000000
- Advanced Encryption Standard (AES), Working with SMB 3.0, BitLocker changes
- advanced format hard drives, Choosing internal devices, Adding new disks
- Advanced profile (folder shares), Creating shared folders in Server
Manager
- Advanced Security Settings dialog box, Applying permissions to registry
keys, Auditing
registry access, Creating shared folders in Server Manager,
Configuring share
permissions, Managing access permissions, Permission inheritance for
files and folders, Resetting and replacing permissions,
Basic
permissions, Special permissions, Troubleshooting permissions,
Specifying files and
folders to audit
-
- applying permissions to registry keys, Applying permissions to registry
keys
- auditing registry access, Auditing registry access
- auditing settings, Specifying files and folders to audit
- changing permissions, Configuring share permissions
- confirming desired permissions, Creating shared folders in Server
Manager
- customizing permissions, Basic permissions
- disabling inheritance, Permission inheritance for files and
folders
- effective permissions, Troubleshooting permissions
- enabling inheritance, Resetting and replacing permissions
- file and folder ownership, Managing access permissions
- setting special permissions, Special permissions
- Advanced Security Settings For Global File SACL dialog box,
Specifying files and
folders to audit
- Advanced Sharing dialog box, Creating shares by using File
Explorer
- Advanced Subscription Settings dialog box, Using subscriptions and forwarded
events
- AES (Advanced Encryption Standard), Working with SMB 3.0, BitLocker changes
- AES-CCM, Working
with SMB 3.0
- AES-CMAC, Working with SMB 3.0
- aliases, Using
Windows PowerShell
- Allow permissions, Configuring share permissions, Permission inheritance for
files and folders, Basic permissions
- AllowedPaths key (registry), Controlling remote registry access
- ALUA controller model, Configuring the File And Storage Services
role
- AMD Virtualization (AMD-V), Understanding Hyper-V
- AMD-V (AMD Virtualization), Understanding Hyper-V
- American Standard Code for Information Interchange (ASCII),
Searching the
registry
- analyzing existing networks, Your plan: The big picture, Predicting network
change, Predicting network change, Evaluating the network
infrastructure, Assessing systems, Identify network services and
applications, Identifying security infrastructure,
Reviewing network
administration
-
- assessing systems, Evaluating the network infrastructure
- described, Your
plan: The big picture, Predicting network change
- disaster recovery, Reviewing network administration
- evaluating network infrastructure, Predicting network change
- identifying network services and applications, Assessing systems
- identifying security infrastructure, Identify network services and
applications
- reviewing network administration, Identifying security infrastructure
- anchor tags, Enabling access-denied assistance
- Anonymous Logon special identity, Accessing the event logs and viewing
events
- antivirus software, Identify security requirements
- Appcmd command, Utilities to know
- Append Data permission, Special permissions
- Application Information service, Application access tokens
- Application log, Understanding the event logs, Understanding the event
logs
- application objects (BCD), HKEY_LOCAL_MACHINE
- application run levels, Introducing the registry
- Application Server role, Planning for server usage, Using roles, role services,
and features
- application virtualization, Introducing the registry
- Applications And Services logs, Understanding the event logs, Tracking events using Windows
PowerShell
- Applications profile (folder shares), Creating shared folders in Server
Manager
- applications., Configuring run levels (see software
applications)
- architecture teams, Your plan: The big picture
- archiving event logs, Filtering the event logs
- Arp command, Accessing a command prompt during
installation, Utilities to know
- ASCII (American Standard Code for Information Interchange),
Searching the
registry
- ASLR (address space layout randomization), Windows 8.1 and Windows Server 2012
R2
- ASR (Automated System Recovery), HKLM\SYSTEM
- assessing project goals, Your plan: The big picture, Identifying your
organizational teams, Assessing project goals, The business perspective,
Examining the
interaction between IT and business units, Examining the interaction between IT and
business units, Predicting network change
-
- business perspective, Assessing project goals
- described, Your
plan: The big picture, Identifying your organizational teams
- examining interactions between IT and business units, Examining the interaction
between IT and business units
- identifying IT goals, The business perspective
- impact of growth on management, Predicting network change
- predicting network change, Examining the interaction between IT and
business units
- ASSOC command, Accessing a command prompt during
installation, MMC window and startup
- atomic permissions, Special permissions
- Attach Virtual Hard Disk dialog box, Creating and managing virtual hard disks for
Hyper-V
- Attrib command, Accessing a command prompt during
installation
- Audit Failure event level, Accessing the event logs and viewing
events
- Audit Object Access Properties dialog box, Enabling basic auditing for files and
folders
- Audit Success event level, Accessing the event logs and viewing
events
- Auditing Entry For dialog box, Auditing registry access, Specifying files and folders
to audit
- auditing policies, Planning for day-to-day operations,
Controlling remote
registry access, Accessing the event logs and viewing
events, Deploying sync shares through Group
Policy, Defining
central access policies, Enabling advanced auditing, Configuring report
locations
-
- establishing, Planning for day-to-day operations
- file and folder access, Defining central access policies
- file-screen, Configuring report locations
- permissions to perform tasks, Accessing the event logs and viewing
events
- Properties dialog box, Enabling advanced auditing
- registry access, Controlling remote registry access
- shared folders, Deploying sync shares through Group
Policy
- Authenticated Users group, Troubleshooting permissions
- authentication, Designing the Active Directory namespace,
Installing
components at the prompt, Installing components at the prompt,
Getting information
on user and remote user sessions, Installing Hyper-V, BitLocker modes, Setting permitted encryption types,
Preparing BitLocker
for startup authentication and secure boot, Enabling BitLocker on
operating-system volumes, Enabling dynamic controls and claims-based
policy
-
- BitLocker Drive Encryption, Setting permitted encryption types,
Enabling BitLocker
on operating-system volumes
- explicit trust relationships and, Designing the Active Directory
namespace
- Kerberos armoring and, Enabling dynamic controls and claims-based
policy
- Kerberos authentication, Installing components at the prompt,
Installing
Hyper-V
- Network Level Authentication, Getting information on user and remote user
sessions
- Network Unlock, Preparing BitLocker for startup authentication
and secure boot
- resolving failure, Installing components at the prompt
- TPM and, BitLocker modes
- authentication key, Hardware-encrypted drives
- author mode (MMC), MMC modes, Creating and managing taskpads
- authorization, Understanding TPM states and tools,
Turning an
initialized TPM on or off, Deploying BitLocker Drive Encryption,
Managing file shares
after configuration
- Automated System Recovery (ASR), HKLM\SYSTEM
- Automatic Update, Windows 8.1 and Windows Server 2012
R2
- Autorun.inf file, Enabling BitLocker on removable data
drives