Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000


Book Description

The Group Policy Management Console (GPMC) is a dramatic step forward in the way Group Policy is administered. This book provides all the instruction and insight you need to take full control of your Active Directory with GPMC and other Group Policy tools. You'll also learn techniques for implementing IntelliMirror, making it possible for users to work securely from any location; and you'll find intensive troubleshooting advice, insider tips on keeping your network secure, and hundreds of clear examples that will help you accomplish all your administration goals. You will learn to: Create and manage all Group Policy functions within Active Directory Understand Group Policy differences in Windows 2000, Windows XP, and Windows 2003 systems Troubleshoot Group Policy using Support tools, Resource Kit utilities, log files, registry hacks, and third-party tools Create and deploy custom settings for managing client systems Manage, secure, and audit client and server systems Script complex operations, including linking, back-up, restore, permissions changes, and migrating Set up Local, Roaming, and Mandatory profiles Set up and manage IntelliMirror components with Group Policy Use Group Policy Software Installation to perform hands-off installations Use Remote Installation Services to automate the installation of new Windows systems Ensure the safety of your users' data with Redirected Folders and Shadow Copies About the Series The Mark Minasi Windows Administrator Library is designed to equip system administrators with in-depth technical solutions to the many challenges associated with administering Windows in an enterprise setting. The series editor is leading Windows NT/2003 expert Mark Minasi, who selects the topics and authors and develops and reviews each book to ensure that every entry in the series meets your needs and helps you achieve your goals.




Inside Windows Server 2003


Book Description

Comprehensive, authoritative, and eminently practical, Inside Windowsreg; Server 2003 is an essential resource for IT professionals. Containing in-depth coverage of the newest Windows server technology, this book guides you through the complexities of installing, configuring, and managing a Windows Server 2003 system. Thousands of practical tips, recommendations, diagnostic aids, and troubleshooting techniques based on actual deployments and migrations help you set up and maintain a high-performance, reliable, and secure server that meets or exceeds the needs of its users. You will find coverage of the more than 200 new features incorporated into Windows Server 2003, along with numerous updates and improvements, including: bull; bull;Volume Shadow Copy feature that permits taking snapshots of changes to files bull;Forest Trust type that permits two-way, transitive trusts between forests bull;64-bit architecture that supports Intel Itanium and Itanium-2 servers bull;Many new command line tools, including how to manage a headless server with no keyboard, video, or mouse bull;Dozens of features to improve your systemiquest;s security For each feature, the book discusses underlying design principles, provides process descriptions that help identify interoperability issues, and details procedures for installation and configuration. In particular, the book focuses on the increasingly critical issues of security, remote access, and system interoperability. Specific topics covered include: bull; bull;Performing upgrades and automated installations bull;Adding hardware bull;Managing DNS bull;Managing Active Directory replication and security bull;Working with network access security and Kerberos bull;Managing group policies with a mixture of platforms bull;Managing shared resources bull;Managing file encryption and a public key infrastructure bull;Managing remote access and Internet routing bull;Recovering from system failures With the information and experience-based advice in Inside Windowsreg; Server 2003, you will be well equipped to deploy and manage a highly effective and smoothly functioning system. 0735711585B03172003




Group Policy: Management, Troubleshooting, and Security


Book Description

Presenting a fully updated resource for Windows Vista that shows you how best to use Group Policy in order to take full advantage of Active Directory and create a managed desktop environment. You’ll learn details about the GPMC, Group Policy troubleshooting techniques, and configuring Group Policy to create a resilient desktop environment. You’ll also discover how to create and manage ADMX files and leverage the Group Policy Central Store as well as deploy Office 2007, Office 2003, and more using Group Policy Software Installation.




Microsoft Exchange Server 2003 Advanced Administration


Book Description

Building on the success of his Microsoft Exchange Server 2003 24seven, Jim McBee has fully updated Microsoft Exchange Server 2003 Advanced Administration for Microsoft Exchange Server 2003 SP2 and Windows Server 2003 R2. Starting where documentation, training courses, and other books leave off, McBee offers targeted instruction, practical advice, and insider tips. He covers security, connectivity, anti-spam protection, disaster recovery, and troubleshooting using an informational and common sense approach that will save you time, improve efficiency, and optimize your day-to-day operations. You'll find: What you need to know about Exchange Server 2003 data storage and security. Real-world scenarios that focus on practical applications. Advice for managing interactions with Active Directory. Updates on mobile e-mail, including seamless Direct Push technologies, and enhancements to device security. The latest protections against spam, including updated Exchange Intelligent Message Filter and new support for Sender ID e-mail authentication. Deployment guidelines for Outlook Web Access. Information on what it takes to support POP3 and IMAP4 clients in the field. Part of the In the Field Results series. This series provides seasoned systems administrators with advanced tools, knowledge, and real-world skills to use on the job. Going beyond what the standard documentation or classroom training provides, these practical guides address the real situations IT professionals face every day, offering streamlined solutions to improve productivity.




Mission Critical Windows 2000 Server Administration


Book Description

Announcing the "Mission Critical" series from Syngress Media - providing crucial coverage of the topics necessary for IT professionals to perform and succeed on the job. Mission Critical Windows 2000 Server Administration cuts to the chase and provides system administrators with the most important features of the operating system. There's no "hand-holding", no basic definitions of functions, no step-by-step guidelines - just high-level coverage of the critical components of Windows 2000 that system administrators must know. - Hot topic - since the launch of Windows 2000 in February - there is an increased demand for a high-level book - Comes with free membership to [email protected], which provides readers with regular updates, articles, white papers, and bug alerts - Offers high-level coverage of the following topics: Active Directory, remote installation and deployment, security, network services, Microsoft Management Console and administration




Active Directory Field Guide


Book Description

* Task-based, advanced solutions * Discusses non-traditional or out-of-band solutions * Written from real-world knowledge * Focuses on solutions relevant to consultants







Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist


Book Description

When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a sound and effective security program, a substantial reduction in vulnerability exposure can be achieved. This guide will assist personnel responsible for the administration and security of Windows XP systems. It contains information that can be used to secure local Windows XP workstations, mobile computers, and telecommuter systems more effectively in a variety of environments, including small office, home office and managed enterprise environments. The guidance should only be applied throughout an enterprise by trained and experienced system administrators. Illustrations.




Windows 2000 Server 24seven


Book Description

Here's the Windows 2000 Server book every administrator will need—one that contains only the most advanced information rather than rehashing the basics yet again. Written by a Windows 2000 expert and security consultant, this book provides high-level coverage of Windows 2000 system design and implementation, from planning and security to daily maintenance and troubleshooting. Includes a detailed discussion of assessing your network's security needs and implementing an effective solution. Use this book as a supplement to Mastering Windows 2000 Server.




Windows Vista Security


Book Description

It's not the computer. The hacker's first target is YOU! A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and offsetting them with appropriate and consistently applied Windows settings. These expert authors realize that an effective strategy is two parts technology and one part psychology. Along with learning about Vista's new security features (such as UAC, integrity controls, BitLocker, Protected Mode, and IIS 7), learn common-sense recommendations that will immediately provide reliable value. Vista Security Tips Have a healthy sense of paranoia Understand and apply the basics properly Use longer passwords. No, longer than that Use admin privilege very sparingly Don't believe Internet Explorer Protected Mode will stop all attacks Don't believe DEP can stop all attacks Don't believe any technology can stop all attacks