1. Trang chủ
  2. » Công Nghệ Thông Tin

Que microsoft windows server 2003 delta guide mar 2003 ISBN 0789728494

570 45 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 570
Dung lượng 7,96 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Administrative TemplatesFolders section New User Configuration policies Administrative Templatesindows Components section Computer Configuration policies Application Compatibility settin

Trang 1

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [J] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

JIT (just in time) compilation

Join Session Directory setting (Terminal Servers Session Directory group policies)

[ Team LiB ]

Trang 2

Like the book? Buy it!

Trang 3

[SYMBOL] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 4

[ SYMBOL ] [A] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 6

Administrative TemplatesFolders section (New User Configuration policies)

Administrative Templatesindows Components section (Computer Configuration policies) Application Compatibility settings

Windows Update settings

Administrative Templatesindows Components section (New User Configuration policies) Application Compatibility settings 2nd

Trang 7

Services tab

Affinity setting property (port ranges)

All Programs menu (Start menu)

Allow Time Zone Redirection setting (Terminal Services client/server data redirection policy setting

Trang 8

64-bit architectures

64-bit Windows

EPIC (Explicitly Parallel Instruction Computing) architecture (Intel) IIS (Internet Information Services) console

Trang 9

[ Team LiB ]

Trang 10

[ SYMBOL ] [ A ] [B] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 11

[ SYMBOL ] [ A ] [ B ] [C] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 16

[ Team LiB ]

Trang 17

[ SYMBOL ] [ A ] [ B ] [ C ] [D] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 19

Do Not Allow Smart Card Device Redirection setting (Terminal Services client/server data redirection 2nd

Trang 20

restrictions

domain-based DFS (distributed file system) automatic replication

manual replication

replication

DomainDNSZones (AD integrated zones) domains

AD/AM (Active Directory Application Mode) remote office logons (Active Directory) 2nd renaming

Active Directory administrative tools 2nd downloading

Trang 21

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [E] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 23

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [F] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 26

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [G] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 28

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [H] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 29

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [I] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 32

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [K] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 33

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [L] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 34

auditing

remote office logons (Active Directory) domains 2nd

loopback addresses (Ipv6 protocol)

low-bandwidth connections

RDP (Remote Desktop Protocol) 5.1 2nd

[ Team LiB ]

Trang 35

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [M] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 38

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [N] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 39

NET Enterprise Servers

Datacenter Servers

NLB (Network Load Balancing) 2nd 3rd 4th 5th

Trang 41

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [O] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 42

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [P] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 43

Limit Maximum Color Depth setting

Remove Disconnect Option from Shut Down Dialog setting 2nd

Remove Windows Security Item from Start Menu setting

Restrict Terminal Services Users to a Single Remote Session setting RPC Security PolicyServer (Require Security) group policy

Trang 44

Prevent License Upgrade setting (Terminal Services licensing policy settings) printer drivers

Trang 45

MSMQ (Microsoft Message Queue Service)

SOAP (Simple Object Access Protocol) protocol

Publish tab (Computer Management console)

[ Team LiB ]

Trang 46

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [Q] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

QFE (quick-fix engineering updates) [See hotfixes ]

QFE (quick-fix engineering) [See hotfixes ]

Trang 47

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [R] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 48

Remove Windows Security Item from Start Menu setting (Terminal Services group policy settings)

Trang 51

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [S] [ T ] [ U ] [ V ] [ W ] [ X ] [ Z ]

Trang 52

Security Settings extension (Group Policy) 2nd

Security Templates snap-in 2nd 3rd 4th 5th 6th

security databases

Trang 53

SCA (Security Configuration and Analysis) snap-in 2nd security holes

WebDAV (Web Distributed Authoring and Versioning) 2nd 3rd Security Configuration and Analysis snap-in (MMC)

Trang 54

specifying password policies

SCA (Security Configuration and Analysis) snap-in 2nd security templates, analyzing 2nd

Trang 60

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [T] [ U ] [ V ] [ W ] [ X ] [ Z ]

Terminal Server Session Directory 2nd

Terminal Server SID (Security Identifiers)

Trang 61

Limit Maximum Color Depth setting

Remove Disconnect Option from Shut Down Dialog setting 2nd

Remove Windows Security Item from Start Menu setting

Restrict Terminal Services Users to a Single Remote Session setting licensing policy settings

Trang 62

terminal services client component [See Remote Desktop Connection ]

Trang 63

typeperf command-line tool

[ Team LiB ]

Trang 64

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [U] [ V ] [ W ] [ X ] [ Z ]

Trang 65

[ Team LiB ]

Trang 66

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [V] [ W ] [ X ] [ Z ]

Trang 67

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [W] [ X ] [ Z ]

Trang 70

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [X] [ Z ]

xDSL

permanent virtual circuit encapsulation

[ Team LiB ]

Trang 71

[ SYMBOL ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [Z]

zipped folders [See Compressed Folders feature (Windows Server 2003) ]

[ Team LiB ]

Trang 72

The NET Framework represents an entirely new way of thinkingabout software development You're probably familiareven ifyou don't realize itwith the "old way" of creating software

applications, which is illustrated in Figure 9.1 Developers woulduse a tool such as Visual Basic 6.0 to create software

in one form or another since the beginning of computer

programming and is capable of producing applications with verygood performance

Figure 9.1 Traditional software development produces executables for a specific operating

system and hardware platform.

Trang 73

programming model:

Executables produced in this fashion only run on a specific operating system and hardware platform As

enterprises continue to implement a wider variety of

hardware and operating systemsincluding portable deviceslike Pocket PCsdevelopers have to work harder to make

their programs run throughout the enterprise Each newoperating system/hardware combination requires

Trang 74

perform specific tasks and then easily reuse that code inseveral different projects A powerful object-oriented

language also allows developers to reuse functionality

inherent to the operating system, such as drawing windowsand buttons, accessing files and networks, and so forth

Different programming languages have different

strengths and weaknesses, and developers have to choose one and pretty much stick with it Each

language typically operates in a completely different

fashion, making it very difficult for developers to switch

back and forth between languages when working on

different projects As a result, developers tend to pick onelanguage and stick with it, even if it isn't ideal for the task

programming language from Sun Microsystems Although each

of these languages has a different syntax, or grammar, they all

offer the same basic capabilities For example, developers whowanted to interface closely with the operating system used tochoose Visual C++ as their language, often because languagessuch as Visual Basic didn't provide close operating system

integration Under NET, that's no longer true: Each of the NETlanguages provides the same capabilities, allowing developers

to work in whatever language they're most comfortable with.Even better, all the languages can be used from within the samedevelopment tools (such as Visual Studio NET), so that

developers can switch languages without having to learn anentirely new set of tools

The NET Framework's changes go beyond developer

Trang 75

application, developers produce an executable file In VisualBasic NET (or any other NET language), however, compiling issimply an automated process in which the NET Frameworktranslates the developer's program code into a universal

Trang 76

or less unchanged on any platform for which a CLR is available.Microsoft already provides a CLR for Windows and a CompactCLR for Pocket PCs and other Windows CE devices The futuremight bring Linux- or Unix-compatible CLRs, allowing NET

applications to run (hopefully) unchanged on a completely

different operating system This capability solves another

traditional development problem by allowing developers to writeone program that runs on all of an enterprise's various

computing devices

This business with the CLR and cross-platform compatibilityshould sound familiar because it's what Java advocates havebeen preaching since their product was introduced Java uses asimilar development model in which developers write Java-

specific code, which is executed by a Java Virtual Machine

(JVM) So long as a JVM is available for a specific platform, thatplatform can run virtually all Java applications If you've usedJava applications, however, you might have noticed that theydon't perform quite as quickly as native-code applications

written in Visual Basic 6.0, Visual C++ 6.0, or other traditionalprogramming languages That performance decrease is inherent

in any virtual machine technology: Rather than executing anapplication directly on the operating system, both Java and

.NET execute the application within a virtual machine (the CLR

in the case of NET), and the virtual machine itself is executed

by the operating system In other words, the virtual machinerepresents an extra layer of code that has to be executed,

which reduces performance

Although NET applications tend to perform pretty well, theycan't compete with native-code applications, especially thosewritten in Visual C++ (the language Windows itself is writtenin) For that reason, you won't see Microsoft using the NET

Framework to develop the next versions of its NET EnterpriseServers, such as Exchange Server and SQL Server Those will

Trang 77

powerful server applications to be written in NET, but that day

is probably a long way off

So, what does an administrator need to know about the NETFramework? Prior to Windows Server 2003, the NET

Framework itself had to be installed before NET applicationscould be installed and executed; Windows Server 2003,

however, comes with the NET Framework built right in, so yourdevelopers can immediately start installing and executing NETapplications on your servers So, although deployment is a

piece of cake, an additional administrative effort is involvedbecause the NET Framework adds whole new levels of securityand management to your servers In fact, Windows Server

supports an entirely new console called the NET FrameworkConfiguration Console, shown in Figure 9.3

Figure 9.3 The NET Framework Configuration console enables you to modify the behavior and

other properties of the NET Framework.

Trang 78

Assembly Cache Assemblies are basically modules of code

that are shared by several applications For example, a

developer might create a logon routine and use it in all hiscorporation's custom applications The Assembly Cache acts

Code Access Security Policy The NET CLR includes a

complete set of code access security policies that controlapplications' access to protected resources This extra layer

of security ensures that only authorized applications can get

Trang 79

application with its own set of configured assemblies andremoting services, customizing the behavior of each

application to meet your precise needs

You might find yourself wondering whether many of these tasksare more properly suited to a developer rather than an

administrator Only time will tell if that's the case, but we firmlybelieve that administrators are responsible for the overall

operation, efficiency, and security of the enterprise network,and that places these five configuration tasks firmly in the

administrator's realm Developers often become too focused on

a particular task and don't take the health and well-being of theentire network into consideration, leaving it to the administrator

provide those assemblies for installation on your server

Trang 80

of preinstalled assemblies.

Trang 82

policy and codebase information.

Trang 83

different versions of the assembly Multiple versions of an

assembly can reside in the assembly cache at the same time;which version an application gets when it requests the assemblydepends on the binding policy you set The example in Figure9.5 is for an assembly named Accessibility Any applicationrequesting version 1.0.0.1331.1.2.189 of the assembly is givenversion 1.2.0.239, which must reside in the assembly cache.Binding policy enables you to actively manage backward

compatibility because you can specify which version of the

assembly will be used with a given request for a particular

version

Ngày đăng: 26/03/2019, 16:12

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN