“Microsoft Windows 2000 Server Resource Kit”叢書共由7卷和一張光盤組成,光盤中包括各種工具、附加的參考資料和本叢書的電子版。當(dāng)需要補(bǔ)充新的信息時,我們將通過Web發(fā)布,讀者可通過Web得到有關(guān)的更新內(nèi)容和信息?!禡icrosoft Windows 2000 Server Deployment Planning Guide》首次披露了部署Windows 2000所包含的各種技術(shù)的規(guī)劃準(zhǔn)則和策略。本書提供的決策論點(diǎn)和技術(shù)信息可幫助您確定部署的順序和過程;本書還提供了在服務(wù)器和客戶機(jī)上進(jìn)行自動安裝的詳細(xì)步驟。您可參閱本叢書的其他各卷,以了解有關(guān)Windows 2000的各種技術(shù)及其工作原理和維護(hù)方法的詳細(xì)信息。
作者簡介
暫缺《Microsoft Windows 2000 Server布署規(guī)劃指南:英文》作者簡介
圖書目錄
Introduction xxxix About the Deployment Planning Guide Goals of This Guide Guide Features Guide Structure Chapter Structure Planning Worksheets Document Conventions Artwork Symbols Resource Kit Compact Disc Resource Kit Support Policy Part 1 Planning Wverview Chapter 1 Introducing windows 2000 Deployment Planning Starting Your Plan Effectively Using This Book How to Begin Planning Overview of the Windows 2000 Product Family Windows 2000 Product Windows 2000 Server Windows 2000 Server Standard Edition Windows 2000 Advanced Server Terminal Services Using Windows 2000 to Improve the Way You Work IT Administrator Department Manager Sales Representative Examples of How Business Needs are Satisfied by Windows 2000 Case Study 1: North American Industrial Manufacturer Existing IT Environment Goals for Deploying Windows 2000 Case Study 2: Large Multinational Manufacturer Existing IT Environment Goals for Deploying Windows 2000 Case Study 3: Multinational Financial Services Corporation Existing IT Environment Goals for Deploying Windows 2000 Case Study 4: International Software Development Company Existing IT Environment Goals for Deploying Windows 2000 Mapping Windows 2000 Features to Your Business Needs Management Infrastructure Services Desktop Management Solutions Security Features Information Publishing and Sharing Component Application Services Scalability and Availability Networking and Communications Storage Management Planning Task List for Mapping Windows 2000 Features Chapter 2 Creating a Deployment Roadmap Creating a Project Plan Preparing Your Project Planning Process Determining Goals and Objectives Feature Design and Development Windows 2000 Pilot Production Rollout Deployment Scenarios Scenario 1: Multinational Financial Services Phase 1: Assessment Phase 2: Design and Engineering Phase 3: Testing Phase 4: Migration Scenario 2: Multinational consumer and Industrial Manufacturer Deployment Teams The Server Deployment Team The Client Deployment Team Techmology Dependencies Active Directory and Domain Namespace Active Directory and exchange Server Integrating Exchange Server Remote OS Installation Tips for Planning Your Windows 2000 Deployment Planning Task List Chapter 3 Planning for Deployment Detailing Your Project Plan Project Scope and Objectives Personnel Requirements Organizing Your Deployment Teams Assigning Windows 2000 Team Roles Current Computing Environment Establishing Standards and Guidelines Conducting a Gap Analysis Testing and Piloting Windows 2000 Creating Project Planning Documents Administrative Documents Deployment Documents Functional Specification Communications Strategy Education and Training Plan Capacity Planning Risk Assessment Risk Management Risk Assessment Matrix Risk-Driven Schedule Windows 2000 Deployment Deployment Planning Task List Chapter 4 Building a Windows 2000 Test Lab Getting Started with Your Test Environment Creating a Test Environment Using the Lab for Risk Management Lab Development Process Testing Process Setting Up a Preliminary Lab Determining the Lab Strategy Considering Return on Investment Using the Lab During the Project Life Cycle Planning Developing Deploying Post-deployment Evaluating Lab Models Ad Hoc Labs Change Mansgement Labs selecting a Lab Model Selecting a Lab Location Testing in a Distributed Lab Environment Case Study 1: Functional Lab Sites Case Study 2: Contingency Lab Sites Designing the Lab Prerequisites for Designing the Lab Designing for Test Scenarios Simulating the Proposed Server environment Simulating the Proposed Client Computer environment Accommodating Test Processes Documenting the Lab Configuration Lab Description Lab Diagrams Building the Lab Managing the Lab Lab Management Responsibilities Developing Lab Guidelines Testing Defining an Escalation Plan Creating the Test Plan Scope and Objectives Testing Methodology Resources required Features and Functions Risks Schedule Dsigning Test Cases Conducting Tests Documenting Test Results Testing After Deployment Using the Lab for Change Management Defining the Role of the Lab in Change Management Planning Task Lists for Lab Tesing Lab Preparation Task List Testing Task List
Chapter 5 conducting Your Windows 2000 Pilot Overview of Conducting a Pilot Pilot Process Starting with Information Technology Prerequisites for a Production Pilot Creating a Pilot Plan Scope and Objectives Pilot Scope Pilot Objectives Pilot Users and Sites Pilot Training Plan Pilot Support Plan Communication Pilot Rollback Plan Schedule Preparing for the Pilot Preparing Pilot Sites Preparing Pilot Users establishing Early communication Keeping Participants informed Developing the Rollout Process Deploying the Pilot Evaluating the Pilot Monitoring the Pilot Obtaining Feedback Planning Task List for conducting a Pilot Part 2 Network Infrastructure Prerequisites Chapter 6 Preparing Your Network Infrastructure for Windows 2000 documenting Your Current environment Hardware and Software Inventory Network Infrastructure Physical Network Diagram Logical Network Diagram Network Configuration File,Print,and Web Servers Line-of-Business Applications Directory Services Architecture Domain Administration Model security Preparing Your Network Architecture Preliminary Steps Stabilizing Your Existing Network reviewing Your Network Protocols Preparing Your Physical Infrastructure Preparing Your Servers Preparing Your Domain Controllers Preparing Your Member Servers Preparing Your Security Infrastructure Preparing Your Clients Windows 2000 Professional Upgrade considerations Preparing to Operate with Other Systems Network Infrastructure Preparation Task List Chapter 7 Determining Network Connectivity Strategies Network Connectivity Overview Sites Remote Connectivity Methods Internal Local Area Network Connectivity Within Sites External Connectivity Within an Organization designing the Demilitarized Zone Site Connectivity for an Organization Remote Client Connectivity Windows 2000 TCP/IP New Features in the Windows 2000 TCP/IP Suite Automatic Private IP Addressing Configuration Large Windows Support Improved estimation of Round Trip Time Planning Considerations for Microsoft TCP/IP IP Address classes Subnet Masks and custom Subnetting TCP/IP and windows Internet Name Service WINS Design Considerations Routing and Remote Access New features of Windows 2000 Routing and Remote Access Service Remote Access Policy Remote Access Design Considerations VPN Security benefits of Virual Private Networking Point-to-Point Tunneling Protocol VPNs L2TP over IPSec VPNs L2TP Deployment Considerations L2TP Examples UPN Security with IPSec Internet Authentication Service and Centralized Management Multihoming IP Routing Infrastructure Static Routed Networks RIP-for-IP Network Design OSPF Network Design IPX Routing Structure IPX Network Design AppleTalk Routing Structure Multicast Support Network Address Translation windows 2000 DHCP Benefits of Using DHCP New Features of Windows 2000 DHCP enhanced Server Reporting Additional Scope Support DHCP and DNS Integration Unauthorized DHCP Server Detection Dynamic Support for Bootstrap Protocol Clients Read-Only Console Access to the DHCP Manager Designing DHCP Into Your Network Network Infrastructure Size Windows 2000 Asynchronous Transfer Mode Benefits of Using Windows 2000 ATM Features of windows 2000 ATM ATM User Network Interface Call Manager Updated NDIS and ATM Hardware Support ATM LAN Emulation IP/ATM Multicast and Address resolution Service PPP/ATM ATM Design Considerations Quality of Service Planning Task List for Networking Strategies Chapter 8 Using Systems Management server to Analyze Your Network Infrastructure Analyzing Your Network Infrastructure Using Systems Management server How systems Management Server Can Expedite Windows 2000 Deployment Systems Management server 1.2 differences Collecting Inventory Assessing the Current State of Your Hardware Hardware Capacity Hardware Compatibility Using Systems Management Server Hardware Inventory Assessing the current State of Your Software Using Inventory to Prepare Your Network Infrastructure Reporting the Collected Data Sample Systems Management server Report of Windows 2000 Readiness Using the Product Compliance Subsystem Analyzing and Using the Collected Data Monitoring Your Network Ensuring Application Compatibility Network Analysis Planning Task List Additional Resources Part 3 Active directory Infrastructure Chapter 9 Designing the Active Directory Structure Overview of Active Directory Primary Active Directory Features Providing a Foundation for New Technologies Planning for Active Directory General Design Principles Composing Your Active Directory Structure Plans Creating a Forest Plan Forest Planning Process Determining the Number of forests for Your Network Creating a Single Forest Enuironment Creating a Multiple-Forest Enuironment Incremental Costs for an Additional Forest Creating a Forest Change Control Policy Schema Change Policy Configuration Change Policy Changing the Forest plan After Deploymetn Creating a Domain Plan Domain Planning Process Determining the Number of Domains in Each Forest How Creating Domains Has Changed When to Create More Than One Domain Incremental Costs for an Additional Domain Choosing a Forest Root Domain Assigning DNS Names to Create a Domain Hierarchy Arranging Domains into Trees Domain Naming Recommendations Domain Names and Computer Names Planning DNS Server Deployment Authority and Delegation in DNS Domain Controller Locator System DNS Server Requirements Locate Authoritative Servers Optimizing Authentication with Shortcut Trust Relationships Changing the domain Plan After Deployment Adding New Domains and Removing Existing domains Merging and Splitting Domains Renaming domains Creating an Organizational Unit Plan OU Structure and Business Structure OU Planning Process Creating OUs to Delegate Administration Modifying Access Control Lists Deciding What OUs to Create Delegation Procedures Creating OUs to Hide Objects Creating OUs for Group Policy Changing the OU Plan After Deployment Creating a Site Topology Plan Site Topology Planning Process Defining Sites and Site Links Creating Sites Connecting Sites with Site Links Placing Servers into Sites Placing Additional Domain Controllers Placing Global Catalog Servers Placing DNS Servers Changing the Site Topology After Deployment Planning Task List for Designing the Active Directory Structure Chapter 10 determining Domain Migration Strategies Starting the Migration Planning Process Planning Process Phases Detemining Your Migration Roadmap Migration Goals Migration Concepts Upgrading Clients and Servers Domain Migration Considerations Upgrade Decisions Restructure Decisions Application Compatibility Interoperability Requirements Disk Storage Requirements for Active Directory Objects Planning Domain Upgrade Determining Supported Upgrade Paths Examining the Existing Domain Structure Developing a Recovery Plan Managing the Transition to the Windows 2000 Forest Considering the Upgrade of Resource Domains Determining a Strategy for Upgrading Domain Controllers Windows 2000 Domain Modes Upgrading the Windows NT PDC PDC Emulation in Windows 2000 Access Control Components Determining the Order for Upgrading Domains Guidelines for Upgrading Account Domains Guidelines for Upgrading Resource Domains Cild Domains and Trusts Determining When to Move to Native Mode Reasons for Continuing in Mixed Mode Reasons for Moving to Native Mode Examining Windows 2000 Groups Local Groups Domain Local Groups Global Groups Universal Groups Nesting Groups Group Membership Expansion Effects of Upgrade on Groups Using NetBIOS with Windows 2000 Transitioning to File Replication Service LAN Manager Replication Service Process The FRS Process Maintaining LAN Manager Replication Service in a Mixed Environment Using Routing and Remote Access Service in a Mixed Environment Planning Domain Restructure Determining the Reasons to Restructure Domains Determining When to Reatructure Domains Examining the Implications of Restructuring Domains Moving Security Principals Moving Users and Global Groups Moving Profiles and SIDhistory Moving Computers Moving Member Servers Establishing Trusts Cloning Security Principals Domain Restructure Scenarios Scenario#1: Migrating Users Incrementally from Windows NT to Windows 2000 Scenario#2: Consolidating a Resource Domain into an OU Domain Migration Tools ClonePrincipal Netdom Migration Planning Task List Chapte 11 Planning Distributed Security Developing a Network Security Plan Security Risks Security Concepts Security Model Domain Model Trust Management Security Policy Security Configuration and Analysis Symmetric Key Encryption Public Key Encryption Authentication Single Sign-On Two-Factor Authentication Access Control Data Integrity Data Confidentiality Nonrepudiation Code Authentication Audit Logs Physical Security User Education Distributed Security Strategies Authenticating All User Access Planning Considerations Kerberos Authentication and Trust How Kerberos Authentecation Words Implementing Kereberos Authentication Considerations about Kerberos Security Smart Card Logon How smart Cards Work Prerequisites for Implementing Smart Cards How to Implement Smart Cards Considerations about Smart Cards Remote Access How Remote Access Works Remote Access Policies How th Enable Remote Access Considerations About Remote Access Applying Access Control Access control Lists How ACLs Work Prerequisites for Implementing ACLs How to Implement ACLs Security Groups How Security Groups Work security Group Types Default Permissions of Security Groups Prerequisites for Implementing Security Groups Implementing Security Groups Considerations About Security groups Establishing Trust Relationships Domain Trust How Trust Relationships Work Prerequisites for Implementing Trusts How to Implement Trusts Considerations About Trusts Enabling data Protection Encrypting File System How EFS Words Prerequisites for Implementing EFS How to Implement EFS Considerations About EFS IP Security How IPSec Words Prerequisites for Implementing IPSec How to Implement IPSec Considerations for IPSec Setting Uniform Security Policies Group Policy How Group Policy Works Prerequisites for Implementing group Policy How to Implement group Policy Considerations About Group Policy Group Policy Security Settings Account Policies Local Computer Policies Event Log Policies Restricted Groups Policies Systems Services Policies Registry Policies File System Policies Public Key Policies IP Security Policies on Active Directory Security Templates How Security Templates Work Prerequisites for Implementing Security Templates How to Implement security Templates Considerations About Security Templates Deploying Secure Applications Authenticode and Software Signing How Authenticode Works Implementing Authenticode Screening Considerations for Authenticode and Software Signing Secure E-mail How Secure E-mail Works Considerations for Secure E-mail Secure Web Sites and Communications Considerations for Secure Web Sites Managing Administration Delegation Security Groups,Group Policy,and Access Control Lists Built-in Security Groups Delegation of Control Wizard Delegate Administration Wizard Delegating Control of group Policy Objects Auditing How Auditing Works Prerequisites for Implementing the Audit Function How to Implement the Audit Function Considerations About Auditing Planning Task List for Distributed Security Chapter 12 Planning Your Public Key Infrastructure Overview of Public Key Infrastructure How PKI Works Prerequisites for Implementing PKI How to Implement PKI Creating a Local Certification Authority Managing Your Certificates Using the Certificate Serveces Web Pages Setting Public Key Policies in Group Policy Objects Building Your Public Key Infrastructure Designing Your Public Key Infrastructure Identify Your Certificate Requirements Basic Security Requirements for Certificates Determining Which Certificate Types to Issue Define Certificate Policies and Certification Authority Practices Certificate Policies Certificate Practices Statements(CPS) Define Certification Authority Trust Strategies Benefits of Certification Authority Trust Hierarchies Benefits of Certificate trust Lists Additional Considerations for Certification Authority Trust Strategies Define Security Requirements for Certification Authorities Define Certificate Life Cycles Define Certificate Enrollment and Renewal Processes Define Certificate Revocation Policies Policies for Revoking Certificates Policies for Certificate Revocation Lists Define Maintenance Strategies Developing Recovery Plans Failed Certification Authority Compromised Certification Authority Developing Optional Custom Applications Performing Resource Planning Deploying Your Public Key Infrastructure Schedule Production Rollout in Stages Install Certification Authorities Install and Configure Supporting Systems and Applications Configure Certificates to Be iSSUED Examples of Configurations Security Access Control Lists for Certificate Templates Configure Certificate Revocation List Publication Configure Public Key Group Policy Configure Certificate Enrollment and Renewal Start Issuing Certificates Public Key Infrastructure Planning Task List Part 4 Windows 2000 Upgrade and Installation Chapter 13 Automating Server installation and Upgrade Determining Whether to Upgrade or Clean Insatall Resolving Critical Planning Issues Choosing Your Installation Method Preparing for Inatallation Creating Distribution Folders Structuring the Distribution Folder Installing Mass Storage Devices Installing Hardware Abstraction Layers Installing Plug and Play Devices Converting File Name Size using $$Renane.txt Reviewing the Answer File Creating the Answer File Using the Answer File to Set Passwords Extending Hard Disk Partitions Using the Answer File with the Active Directory Installaton Wizard Reviewing the Windows 2000 Setup Commands Winnt.exe Winnt32.exe Automating the Installation of Server Applications Using Cmdlines.txt Using the[GuiRunOnce]Section of the Answer File Using Application Installation Programs Using a Batch File to Control How Multiple Applications Are Installed Automating the Installation of Windows 2000 Server New Options for Automated Installation Automated Installation Methods Using Syspart on Computers with Dissimilar Hardware Using Sysprep to Duplicate Disks Overview of the Sysprep Process Sysprep Files Running Sysprep Manually Running Sysprep Automatically After Setup Completes Using Sysprep to Extend Disk Partitions Using Systems Management Server Using a Bootable Compact Disc Installation Configuration Examples Existing Servers Example 1: Windows NT Server with Windows 2000-Compatible Server Applications Example 2: Computers Running Windows NT Server 3.5 or Earlier,or Servers Running Non-Microsoft Operating Systems New Servers Installation Planning Task List Chpater 14 Using Systems Management Server to Deploy Windows 2000 Using Systems Management Server to Dirtribute Software Software Distribution with Systems Management Server 2.0 SMS Packages Distribution Advertising SMS Software Distribution Best Practices How SMS Can Help with windows 2000 deployment Packaging Windows 2000 for Systems Management Server Preparing the windows 2000 Server Upgrade Package Allowing User Input During the Upgrade Examining the Windows 2000 Server Package Definition Preparing the Windows 2000 Professional Upgrade Package Windows 95 and Windows 98 Upgrades Windows NT Workstation Upgrade Distributing the Windows 2000 Packages Preparing to Distribute the Packages Check the Status of Site Servers and Distribution Points Ensure Each Site Has an Adequate Number of Distribution Points Use Distribution Point Groups Ensure Sender Controls Are in Place Ensuer Fan-out Distribution Will Work Select a Test Site Distributing the Packages to Sites and Distribution Points Testing the Distribution Expanding the Distribution Distributing by Means of the Courier Sender Monitoring the Distribution System Status Subsystem Reporting Package Distributions Status Troubleshooting the Distributions Advertising the Windows 2000 Packages Selecting Computers to Upgrade Preparing Clients to Receive the Advertisements Advertising the Packages to Computers Expanding Security on Distribution Points Upgrading Computers Executing the Advertisement at Each Computer Status of the Upgrade at Each Computer Monitoring the Advertisements The System Status Subsystem Reporting Advertisement Status Troubleshooting Advertisements Using Systems Management Server to Ease Domain Consolidation and Migration Examining Differences Between Systems Management Server 1.2 and Systems Management Server 2.0 Planning Task List for Using Systems Mansgement Server to Deploy Windows 2000 additional Resources Chapter 15 Upgrading and Installing Member Servers Planning for Member Server Upgrade and Installation Process for Installing or Upgrading to Windows 2000 Creating an Upgrade and Installion Plan Create a Schedule Scenario: Minimizing Network Downtime During Server Upgrade Preparing Member Servers for Upgrade or New Installation Inventory the Existing Hardware Determine System Requirements Determine the Compatibility and Reliability of Existing Software determine Third-Party Software Compliance Perform Pre-installation Tasks Performing an Upgrade or Inatallation Pre-Upgrade Checklist Upgrading Member Servers Performing a New Installation Determining ServerRoles for Each Windows 2000 Server File servers Macintosh Volumes Novell NetWare Volumes Test File Shares Print Servers Print Server Setup Guidelines for Setting up a Network Printing Environment Active Directory Integration with Windows 2000 Server Print Services Testing Printer Shares Application Servers Component Services Terminal Services Database server Web Servers Proxy Servers Performing Post-Upgrade and Installation Tasks Testing Network connectivity Tuning Network Servers Tools for System Administration Planning Task List for Member Servers Chapter 16 Deploying Terminal Services Overview of terminal Services Terminal Serveces Licensing Components Microsoft Clearingouse License Server Terminal Server Client Licenses Required Licenses Optional Terminal Services Licenses Third-Party Expansion Creating Your Terminal Services Deployment Plan Process for Deploying Terminal Services Assembling the Terminal Services Team Identifying Your Terminal Services Requirements Scenario 1: Terminal Services Remote Administration Scenario 2: Remote Access Scenario 3: Line of Business Applications Scenario 4: Central Desktop Deployment Deployment Requirements Preparing Your Computing Environment Install License Server on Domain Controller Access Over Wide Area Network Access to Network Services Connecting the Terminal Services Client and Server Assessing the Current Environment Considerations for Application Deployment Creating Your Terminal Services Deployment design Setting Up a License Server Enabling a License Server Activating a License Server Installing Licenses Using the Terminal Services Licensing Administrative Tool Backing Up Your License Server Designing Your Network for Terminal Server Access Network Load Balancing and Terminal Services Designing and Setting Up Your Domain Structure Using Windows 2000 User Profiles or Roaming User Profiles Roaming User Profiles Group Policy Access to Applications Using Home Directories Planning Security NTFS File System User Rights Administrator Rights Auto-Logon Procedures Encryption Additional Security Considerations Remote Access Terminal Services Over the Internet Firewalls Configuring Servers for Terminal Services Deployment Preparing for Client Deployment Deploying to Windows CE-Based Terminals Deploying to Client Computers Upgrading to Terminal Services Installing and Configuring Applications Deploying Applications through Group Policy Deploying Applications from a Domain Controller Supporting Multilingual and International Users Printing from Terminal Services Printing to Your Local Printer by RDP Protocol Network Shared Printers Printing Across a WAN or Dial-up Connection Best Practices for Client Configuration Planning for Testing and Piloting Considerations for the Test Lab Monitoring Performance Evaluating CPU Performance Evaluating Memory Performance Evaluating Network Performance Using Help Desk and Administrative Tools Remote Control Tools for Administration Terminal Services Deployment Planning Task List Part 5 Advanced Management Chapter 17 Determining Windows 2000 Network Security Strategies Planning for Network Security Assessing Network Security Risks Determining Server Size and Placement Preparing Your Staff Developing Security Policies and Procedures Creating a Plan for Deploying Your Security Technologies Identifying User Categories and Their Security Needs and Risks Developing Strategies for Secure Network Connections Creating Secure Boundaries Securing Against Everyone Using Microsoft Proxy Server Monitoring Your Network Security Connecting to External Networks Deploying Network Security Technologies Preparing for Windows 2000 Network Security Technologies Routing and Remote Access Routing and Remote Access Security Virtual Private Networks deploying VPNs VPN Server Capacity Internet Authentication Service Deploying Strategies for Users Deploying Strategies for Partners Planning Task List for Determining Network Security Strategies Chapter 18 Ensuring the Availability of Applications and Services Mading Applications and Services Highly Available Overview of Windows 2000 Advanced Server Process for Making Applications and Services Highly Available Overview of Windows Clustering determining Availability Strategies Assembling the Clustering Planning Team Identifying High-Availability Needs for Applications and Services Determining Hardware Compatiblity for Advanced Features Dtetrmining Your Clustering Requirements Planning for Network Load Balancing Process for Planning Your Network Load Balancing Clusters Determining Which Applications to Use with Network Load Balancing Using Network Load Balancing to Deploy Terminal Server Clusters Configuring Network Loak Balancing Clusters for Servers Running IIS/ASP and COM+Applications Identifying Network Risks Planning for Network Load Balancing Determining Server Capscity Requirements Optimizing Network Load Balancing Clusters Requirements for Network Load Balancing Using a Router Planning for Cluster Service Process for Planning Your Server Clusters Choosing Applications to Run on a Server Cluster Identifying Network Risks Determining failover and failback Policies for Resource Groups Choosing a Server Role Choosing a Server Cluster Model Planning for Cluster Service Tools to Automate the Deployment of Cluster Service Optimizing Your Clusters Planning for Fault-Tolerant Disks Hardware RAID Error Recovery Testing Server Capacity Planning a Cluster Badkup and Recovery Strategy Windows 2000 Cluster Planning Task List Additional Resources Chapter 19 Determining Windows 2000 Storage Management Strategies Improving Your Storage Management Functions Creating Your Storage Management Plan Assessing Your Storage Needs Selecting a Data Storage System Managing Disk Rresources Disk Management Basic and Dynamic Storage Volume Management Volume Mount Points Disk Defragmentation Considerations for Using Dynamic Storage Removable Storage Remote Storage Relationship of Remote Storage and Removable Storage Considerations for Using Remote Storage Optimizing Data Management Windows Clustering Considerations for Using Clustering in Your Storage Strategy File System Improvements NTFS Quota Management Distributed File System Considerations for Using Dfs in Your Storage Strategy Indexing Service Integration with Windows 2000 Components Considerations for Using Indexing Service in Your Storage Strategy Enhancing Data Protection Fault Tolerance Disk Management Selecting a RAID Strategy Backup A Data Protection Strategy for Enterprise Networks Considerations for designing a Fault-Tolerant Storage System Improving Your disaster Recovery Capabilities Creating Backup and Off-Site Storage Policies Backup Policies Considerations for Off-Site Storage Creating a Disaster Recovery Plan Testing System Recovery Strategies Practicing Recovery Procedures Documenting Recovery Procedures Planning Task List for Storage Management Chapter 20 Synchromizing Active Directory with Exchange Server Directory Service Overview of Directory Synchronization Process for Synchronizing the directories Windows 2000 Server Software Comonents Key Advantages of Using ADC Establishing Relationships Using Connection Agreements Creating the ADC Connection Agreement Plan Forming the Deployment Planning Team Examining Your Domain Stucture and Exchange Server Site Topology Preparing Your Network for ADC Deployment Considering Specific Network Requirements Computer Requirements Deployment Requirements ADC Implementation Strategy ADC Schema and Object Mapping Managing Objects Administering Objects from Active Directory Administering Objects from Exchange Server 5.5 Directory Service Administering Objects from Both Active Directory and Exchange Server 5.5 Directory Service Defining Objects for Directory Synchromization Setting up Connection Agreements Designing Your Connection Agreements Documenting Your ADC Connection Agreement Plan Testing Connection Agreement Configurations Determining a Schedule for Directory Synchronization Protecting Against Accidental Loss of Data Planning Task List for Directory Synchronization Additional Resources Part 6 Windows 2000 Professional/Client Deployment Chapter 21 Testing Applications for Compatibility with Windows 2000 Application Testing Overview Business Application Definition Application Testing Process Managing Application testing Identifying and Prioritizing business Applications Identifying Your Applications Gathering Application Information Simplifying Your Application Environment Prioritizing Your Applications Preparing an Application Test Plan Establishing Testing Scope Defining the testing Methodology Case Study 1: Testing Festivals Case Study 2: Preview Program Identifying Resource Requirements Defining Pass-Fail Criteria Creating a Testing Schedule Testing Applications Developing Testing Strategies Strategies for Commercial Applications Strategies for Custom Applications Testing Tips Common Compatibility Issues Tracking Test Results Choosing a Tracking System Capturing Data Reporting results Resolving Application Incompatibilities Planning Task List for Application Testing Additional Resources Chapter 22 Defining a Client Connectivity Strategy Client Connectivity Overview Basic Client Connectivity Windows 2000 Services and Protocols TCP/IP Network clients Active Directory IPX Network Clients Windows Client to Novell Server Windows Client to Mixed Novell Netware and Windows 2000 Server environment Printing to NetWare Printers UNIX Network Clients AppleTalk Network Clients Advanced Client Connectivity Asynchronous Transfer Mode Directly Connected ATM IP/ATM Infrared Data Association Protocol Suite Remote Access Client Dial-up to Private Network Virtual Private Networks Remote Network Connection Methods Small Office Networks Small Office/Home Office Cinnectivity SOHO Examples Medium to Large Networks Routing and Remote Access Dial-up to Private Network Medium to Large Network Example Planning Task List for Client Connectivity Chapter 23 Defining Client Administration and Configuration Standards Making Client Systems Manageable Defining User Types Assessing Requirements for User Types Defining Sfoftware Standards Defining Hardware Standards Defining Significant Support Issues Defining an Administration Model and Standards Summarizing Your Administrative and Configuration Goals Using Group Policy to Administer clients Comparing windows NT 4.0 System Policy and Windows 2000 Group Policy Applying Windows NT 4.0 Policies to Windows 2000 Using Active Dircetory to Delegate Client Management Delegating Administration of Group Policy special group Policy Implementation Options Comparing Stand-Alone and Active Directory-Based Management Features Using Group Policy on Stand-alone computers Configuring Hardware File System Support Hardware Profiles Defining User Interface Standards Using Group Policy for Configuration Control Customizing the Logon and Logoff Processes Restricting Changes to the Desktop Restricting Changes to the Start Menu Configuring Options for Remote Users Adding Multilingual Options Considerations for Choosing the MultiLanguage Version Upgrading to the Windows 2000 MultiLanguage Version Planning a Windows 2000 MultiLanguage Version Installation Making Systems More Accessible Configuring Windows 2000 Features for accessibility Enabling Third-Party Devices Using Group Policy to Fine-tune Configurations for Accessibility Client Standards Planning Task List Chapter 24 Applying Change and Configuration Management Evaluating Change and Configuration Management Technologies Used to Enable Change and Configuration Management Identifying Change and Configuration Management Needs and Opportunities Key Background Information Using Systems Management Server to Supplement IntelliMirror Planning for Enhanced Client Support with IntelliMirror Enabling Remote OS Installation defining User Requirements Using Remote OS Installation Configuring the Remote Installation Service Preparing Client Operating System Inages Using group Policy to Improve Software Management Preparing Software for Distribution When Native Authoring Is Not Possible Using Transforms Dirtributing Software Targeting Software Targeting Software Software Management Options Software Roaming Users Software Shared Computers Software Mobile Worders Maintaining Software Using IntelliMirror Patching Existing Software Upgrading Existing Software Software Removal Maintaining User Data and Settings on a Network Enabling Roaming User Profiles Guidelines for Setting Up Roaming User Profiles Redirecting Folders Guidelines for Configuring Folder Redirection Configuring the Synchromization of Offline Files Guidelines for Configuring Offline Files Setting Disk Quotas Guidelines for Setting Disk Quotas Selecting Change and Configuration Management Options for Your Organization An Overview of Basic and Advanced options Meeting the Needs of Technical Users Meeting the Needs of Stationary Professional Users Meeting the Needs of Roaming Professional Users Meeting the Needs of Mobile Professional Users Meeting the Needs of Task-Based Users Summary Change and Configuration Management Planning Task List Chapter 3 Automating Client Installation and Upgrade Determining Whether ot Upgrade or Clean Install Resolving critical Planning Issues Choosing Your Installation Method Preparing for installation Creating the Distribution Folders Structuring the Distribution Folder Installing Mass Storage devices Installing Hardware Abstraction Layers Installing Plug and Play Devices Converting File name Size Using $$Rename.txt Reviewing the Answer File Creating the Answer File Using the Answer File to Set Passwords Extending Hard Disk Partitions Reviewing the Windows 2000 Setup Commands Winnt.exe Winnt32.exe Automating the Installation of Client Applications Using Cmdlines.txt Using the [GuirunOnce]Section of the Answer File Using Application Installation Programs Using a Batch File to Control How Multiple Applications Are Installed Using Windows Installer Service Windows Installer Terminology Windows Installer Package File Automating the Installation of Windows 2000 Professional New Options for Automated Installation Automated Installation Methods Using Syspary for Computers with Dissimilar Hardware Using Sysprep to Duplicate Disks Overview of the Sysprep Process Sysprep Files Running Sysperp Manually Running Sysprep Automatically After Setup Completes using Sysprep to Extend Disk Partitions using Systems Management Server using a Bootable Compact Disk using Remote Operating System Installation RIS Server Network Load Implications Optimizing Performance DHCP and DHCP Servers Controlling RIS Server Selection and Balancing Load Working with Routers Installation Configuration Examples Existing Client Computers Existing 1: Windows NT Workstation 4.0 with Windows 2000 Compatible Client Applications Existing 2: Windows NT Wordstation 3.5 or Earlier,and Non-Microsoft Client Computers New Client Computers Installation Task List Part 7 Appendixes Appendix A Sample Planning Worksheets Using This Appendix Introducing Windows 2000 deployment Planning Management ifrastructure Services Desktop Management Solutions Security Features Information Publishing and Sharing Component Application Services Scalability and Availability Networking and Communications Storage Management Building a Windows 2000 Test Lab Preparing Your Network Infrastructure for Windows 2000 Determining Domain Migration Strategies Planning Distributed Security Automating Server Installation and Upgrade Upgrading and Installing Member Servers Member Server Planning Worksheet Server Data Backup and Disaster Recovery Plan Decide New Hardware Requirements Record Server Specifications Print Server File Servers Application Servers Web Servers Schedule Your Upgrade or Clean Installation Prioritize Each Member Server for Deployment Ensuring the A vailability of Applications and Services Ieentify Your High-A vailability Needs Application and Service Specifications Plan Your Network Load Balancing Making Specific Choices for Network Load balancing Synchronizing Active Directory with Exchange Server Directory Service Create Your Connection Agreements Identify the Connection Agreement Source and Target Servers Create Your Directory Synchromization Schedule Record Your Contacts for Directory Synchromization Schema Administrators Group Windows 2000 Domain Administration Exchange Server 5.5 Site Administration Testing Applications for Compatibility with Windows 2000 Defining Client Administration and Configuration Standards Define Your Group Policy Requirements Appling Change and Configuration Management Automating Client Installation and Upgrade Appendix B Setup Commands Using Setup Commands to Install Windows 2000 Winnt32.exe Command Syntax Winnt.exe Command Syntax Appendix C Sample Answer Files for Unattended Setup Answer File Format Answer File Keys and Values Sample Answer File Sample 1-Default Unattend.txt Sample 2-Unattended Installation of Windows 2000 Professional from CD-ROM Sample 3-Install and Configure Windows 2000 and Configure Microsoft Internet Explorer with Proxy Settings Sample 4-Install and Configure Windows 2000 Server with Two Network Adapters Sample 5-Install Windows 2000 Advanced Server with Network Load Balancing Sample 6-Install Windows 2000 Advanced Server with Windows Clustering Appendix D Deployment Tools Additional Resources Appendix E Accessibility for People with Disabilities Overview of Accessibility in Windows 2000 Accessibility Benefits with Windows 2000 Considerations Before Upgrading to Windows 2000 Deploying Windows 2000 for Accessibility Microsoft Active Accessibility Third-Party Products and Services “Certified for Windows”Logo Using Serialkeys for Add-on Hardware and Software Customizing the Computer for Accessibility Options Remote Installation and Unattended Setup from a CD Windows Installer Group Policy Setting Multiple User Profiles Administrative Options Accessibility Reset(Time-out) Active Desktop Utility Manager Configuring Accessibility Features in Windows 2000 Configuring Accessibility Options by Using the Accessibility Wizard Configuring Accessibility Options by Using Control Panel Setting Options by Type of Disability Options for Users with Hearing Impairments Synchromized Accessible Media Interchange Options for Users with Hearing Impairments Customizable Sound Schemes Adjusting the Volume ShowSounds SoundSentry Synchronized Accessible Media Interchange Options for Users with Physical Disabilities Keyboard Options Mouse Options Options for Users with Seizure Sensitivity Timing Patterns Sound Schemes Color and Contrast Settings Options for Users with Visual Impairments Microsoft Narrator Keyboard Audio Cues Microsoft Magnifier Fonts Size and Color Schemes High-Contrast Color Schemes New Mouse Pointers Additional Resources Glossary Index