Windows 2000 Server Secrets ®

advertisement
4620-1 FM.f.qc
10/28/99
4:00 PM
Page i
®
Windows 2000 Server
Secrets
®
4620-1 FM.f.qc
10/28/99
4:00 PM
Page ii
4620-1 FM.f.qc
10/28/99
4:00 PM
Page iii
Windows 2000
Server Secrets
®
®
Harry M. Brelsford
IDG Books Worldwide, Inc.
An International Data Group Company
Foster City, CA ♦ Chicago, IL ♦ Indianapolis, IN ♦ New York, NY
4620-1 FM.f.qc
10/28/99
®
4:00 PM
Page iv
Windows 2000 Server Secrets
®
Published by
IDG Books Worldwide, Inc.
An International Data Group Company
919 E. Hillsdale Blvd., Suite 400
Foster City, CA 94404
www.idgbooks.com (IDG Books Worldwide Web
site)
Copyright © 2000 IDG Books Worldwide, Inc. All rights
reserved. No part of this book, including interior design,
cover design, and icons, may be reproduced or
transmitted in any form, by any means (electronic,
photocopying, recording, or otherwise) without the prior
written permission of the publisher.
Library of Congress Catalog Card Number: 99-068328
ISBN: 0-7645-4620-1
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
1B/SZ/RR/ZZ/FC
Distributed in the United States by IDG Books Worldwide,
Inc.
Distributed by CDG Books Canada Inc. for Canada; by
Transworld Publishers Limited in the United Kingdom; by
IDG Norge Books for Norway; by IDG Sweden Books for
Sweden; by IDG Books Australia Publishing Corporation
Pty. Ltd. for Australia and New Zealand; by TransQuest
Publishers Pte Ltd. for Singapore, Malaysia, Thailand,
Indonesia, and Hong Kong; by Gotop Information Inc. for
Taiwan; by ICG Muse, Inc. for Japan; by Intersoft for South
Africa; by Eyrolles for France; by International Thomson
Publishing for Germany, Austria and Switzerland; by
Distribuidora Cuspide for Argentina; by LR International
for Brazil; by Galileo Libros for Chile; by Ediciones ZETA
S.C.R. Ltda. for Peru; by WS Computer Publishing
Corporation, Inc., for the Philippines; by Contemporanea
de Ediciones for Venezuela; by Express Computer
Distributors for the Caribbean and West Indies; by
Micronesia Media Distributor, Inc. for Micronesia; by Chips
Computadoras S.A. de C.V. for Mexico; by Editorial Norma
de Panama S.A. for Panama; by American Bookshops for
Finland.
For general information on IDG Books Worldwide’s books
in the U.S., please call our Consumer Customer Service
department at 800-762-2974. For reseller information,
including discounts and premium sales, please call our
Reseller Customer Service department at 800-434-3422.
For information on where to purchase IDG Books
Worldwide’s books outside the U.S., please contact our
International Sales department at 317-596-5530 or fax
317-596-5692.
For consumer information on foreign language
translations, please contact our Customer Service
department at 800-434-3422, fax 317-596-5692, or e-mail
rights@idgbooks.com.
For information on licensing foreign or domestic rights,
please phone +1-650-655-3109.
For sales inquiries and special prices for bulk quantities,
please contact our Sales department at 650-655-3200 or
write to the address above.
For information on using IDG Books Worldwide’s books in
the classroom or for ordering examination copies, please
contact our Educational Sales department at 800-434-2086
or fax 317-596-5499.
For press review copies, author interviews, or other
publicity information, please contact our Public Relations
department at 650-655-3000 or fax 650-655-3299.
For authorization to photocopy items for corporate,
personal, or educational use, please contact Copyright
Clearance Center, 222 Rosewood Drive, Danvers, MA
01923, or fax 978-750-4470.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND AUTHOR HAVE USED THEIR BEST
EFFORTS IN PREPARING THIS BOOK. THE PUBLISHER AND AUTHOR MAKE NO REPRESENTATIONS OR
WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS BOOK AND
SPECIFICALLY DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. THERE ARE NO WARRANTIES WHICH EXTEND BEYOND THE DESCRIPTIONS CONTAINED IN THIS
PARAGRAPH. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES REPRESENTATIVES OR WRITTEN SALES
MATERIALS. THE ACCURACY AND COMPLETENESS OF THE INFORMATION PROVIDED HEREIN AND THE OPINIONS
STATED HEREIN ARE NOT GUARANTEED OR WARRANTED TO PRODUCE ANY PARTICULAR RESULTS, AND THE
ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY INDIVIDUAL. NEITHER THE
PUBLISHER NOR AUTHOR SHALL BE LIABLE FOR ANY LOSS OF PROFIT OR ANY OTHER COMMERCIAL DAMAGES,
INCLUDING BUT NOT LIMITED TO SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR OTHER DAMAGES.
Trademarks: All brand names and product names used in this book are trade names, service marks, trademarks, or
registered trademarks of their respective owners. IDG Books Worldwide is not associated with any product or vendor
mentioned in this book.
is a registered trademark or trademark under exclusive license
to IDG Books Worldwide, Inc. from International Data Group, Inc.
in the United States and/or other countries.
4620-1 FM.f.qc
10/28/99
4:00 PM
Page v
Welcome to the world of IDG Books Worldwide.
IDG Books Worldwide, Inc., is a subsidiary of International Data Group, the world’s largest publisher of
computer-related information and the leading global provider of information services on information technology.
IDG was founded more than 30 years ago by Patrick J. McGovern and now employs more than 9,000 people
worldwide. IDG publishes more than 290 computer publications in over 75 countries. More than 90 million
people read one or more IDG publications each month.
Launched in 1990, IDG Books Worldwide is today the #1 publisher of best-selling computer books in the
United States. We are proud to have received eight awards from the Computer Press Association in recognition
of editorial excellence and three from Computer Currents’ First Annual Readers’ Choice Awards. Our bestselling ...For Dummies® series has more than 50 million copies in print with translations in 31 languages. IDG
Books Worldwide, through a joint venture with IDG’s Hi-Tech Beijing, became the first U.S. publisher to
publish a computer book in the People’s Republic of China. In record time, IDG Books Worldwide has become
the first choice for millions of readers around the world who want to learn how to better manage their
businesses.
Our mission is simple: Every one of our books is designed to bring extra value and skill-building instructions
to the reader. Our books are written by experts who understand and care about our readers. The knowledge
base of our editorial staff comes from years of experience in publishing, education, and journalism —
experience we use to produce books to carry us into the new millennium. In short, we care about books, so
we attract the best people. We devote special attention to details such as audience, interior design, use of
icons, and illustrations. And because we use an efficient process of authoring, editing, and desktop publishing
our books electronically, we can spend more time ensuring superior content and less time on the technicalities
of making books.
You can count on our commitment to deliver high-quality books at competitive prices on topics you want
to read about. At IDG Books Worldwide, we continue in the IDG tradition of delivering quality for more than
30 years. You’ll find no better book on a subject than one from IDG Books Worldwide.
John Kilcullen
Chairman and CEO
IDG Books Worldwide, Inc.
Eighth Annual
Computer Press
Awards
1992
Ninth Annual
Computer Press
Awards
1993
Steven Berkowitz
President and Publisher
IDG Books Worldwide, Inc.
Tenth Annual
Computer Press
Awards
1994
Eleventh Annual
Computer Press
Awards
1995
IDG is the world’s leading IT media, research and exposition company. Founded in 1964, IDG had 1997 revenues of $2.05
billion and has more than 9,000 employees worldwide. IDG offers the widest range of media options that reach IT buyers
in 75 countries representing 95% of worldwide IT spending. IDG’s diverse product and services portfolio spans six key areas
including print publishing, online publishing, expositions and conferences, market research, education and training, and
global marketing services. More than 90 million people read one or more of IDG’s 290 magazines and newspapers, including
IDG’s leading global brands — Computerworld, PC World, Network World, Macworld and the Channel World family of
publications. IDG Books Worldwide is one of the fastest-growing computer book publishers in the world, with more than
700 titles in 36 languages. The “...For Dummies®” series alone has more than 50 million copies in print. IDG offers online
users the largest network of technology-specific Web sites around the world through IDG.net (http://www.idg.net), which
comprises more than 225 targeted Web sites in 55 countries worldwide. International Data Corporation (IDC) is the world’s
largest provider of information technology data, analysis and consulting, with research centers in over 41 countries and more
than 400 research analysts worldwide. IDG World Expo is a leading producer of more than 168 globally branded conferences
and expositions in 35 countries including E3 (Electronic Entertainment Expo), Macworld Expo, ComNet, Windows World
Expo, ICE (Internet Commerce Expo), Agenda, DEMO, and Spotlight. IDG’s training subsidiary, ExecuTrain, is the world’s
largest computer training company, with more than 230 locations worldwide and 785 training courses. IDG Marketing
Services helps industry-leading IT companies build international brand recognition by developing global integrated marketing
programs via IDG’s print, online and exposition products worldwide. Further information about the company can be found
at www.idg.com.
1/24/99
4620-1 FM.f.qc
10/28/99
4:00 PM
Page vi
Credits
Acquisitions Editor
Jim Sumser
Development Editors
Kurt Stephan
Jennifer Rowe
Brian MacDonald
Technical Editor
James R. Kiniry, Jr.
Copy Editors
Chandani Thapa
Victoria Anne Lee
Lauren Kennedy
Project Coordinator
Linda Marousek
Graphics and Production
Specialists
Mario Amador
Stephanie Hollier
Jude Levinson
Ramses Ramirez
Quality Control Specialist
Chris Weisbart
Book Designer
Drew Moore
Illustrators
Shelley Norris
Karl Brandt
Proofreading and Indexing
York Production Services
Cover Design
Deborah Reinerio
About the Author
Harry M. Brelsford, MCSE, MCT, CNE, CLSE, CNP, MBA, is a contributing
editor at Microsoft Certified Professional Magazine, for which he pens the
regular online column, “Windows 2000 Foundations.” He is a practicing
network consultant in the Seattle, Washington area, where he specializes in
Microsoft BackOffice projects. Harry is an instructor in the online MCSE
program at Seattle Pacific University, a Microsoft AATP. He has published
over 100 technology and business articles in numerous magazines, and is a
founding member of the BackOffice Professionals Association (BOPA) in
Redmond, Washington. A life-long learner, Harry earned his MBA from the
University of Denver in 1986. When time allows, Harry enjoys cross-country
skiing and sailing with his family in the Pacific Northwest. You can contact
him at harryb@nwlink.com or www.nwlink.com/~harryb.
4620-1 FM.f.qc
10/28/99
4:00 PM
Page vii
To Kristen, my wife and the mother of our Geoffrey Sailor and Harry Skier!
You were truly there, whether you knew it or not, typing each key, writing
each page, and reviewing each draft with me. You made contributions to this
book in a billion ways. And let’s not forget dear Mom, Diane Brelsford, who
ultimately made everything possible for me.
4620-1 FM.f.qc
10/28/99
4:00 PM
Page viii
4620-1 FM.f.qc
10/28/99
4:00 PM
Page ix
Foreword
Making the decision to install Windows 2000 Server is really just the first
step in yet another long, challenging journey you face as a network
administrator. That’s why you’ll want to take Harry Brelsford, who’s been
there, along with you.
If you’re a network professional responsible for deploying, supporting, and
maintaining this new and highly complex product, you know that running
MAKEBOOT.EXE to create those first setup disks is just the beginning. What
comes after that is a huge need for hands-on knowledge — far beyond what’s
available from Microsoft sources.
Harry Brelsford knows what it means to sit in front of a server and install a
Microsoft product, then support and maintain it for demanding customers
after the fact. His expertise as a consultant and his years of in-the-field
experience as a practicing network administrator are reflected in this book.
I’ve worked with Harry since shortly after the launch of Microsoft Certified
Professional Magazine in early 1995, so I know that he’s been out there in the
trenches right along with the rest of you. He’s both a contributing editor to
the magazine and an MCSE — further proof that he understands Microsoft
technology in general and Microsoft Windows in particular.
The title of the book says it all. The “secrets” about Windows 2000 Server
inserted throughout the book are truly that: little-known tips and tricks for
saving time and increasing productivity, tested by someone who’s worked
extensively with both Windows NT and Windows 2000 Server in the field.
If you need further proof of Harry’s real-world expertise, take a look at the
table of contents. Only someone who really understands Windows 2000
Server would know that you won’t get far without solid knowledge of
TCP/IP — hence Part II is devoted to the topic.
And only somebody who’s done plenty of installations, troubleshooting, and
support calls would include extensive information on third-party tools that
will be useful in many Windows 2000 Server installations. If you’re not using
some of these now, perhaps this information will be an eye-opener about
what’s out there, and can save you time and hassle. And you’ll also want to
take a look at Harry’s coverage of optimization and troubleshooting — much
of it information that I haven’t seen anywhere else.
If you’re not familiar with Windows 2000 Server yet but are eyeing it with
interest, this is the perfect book to show you the richness and complexity of
the product, from someone who enjoys working with it. You won’t find
marketing spiels or product apologies here. Instead, you’ll get useful,
professional information, all of it written in Harry’s inimitable style.
4620-1 FM.f.qc
x
10/28/99
4:00 PM
Page x
Foreword
■
■
It’s tough to stay on top of new product releases from Microsoft, but this
book is a timely one. In fact, as I read through the diverse topics covered,
I thought over and over, “What a great article idea for the magazine!” Harry’s
been brightening the pages of MCP Magazine for years with his knowledge,
insights, and wit. Spend some time with this book and let him give you a true
insider’s coaching on Windows 2000 Server.
Linda Briggs
Editor-in-Chief, Microsoft Certified Professional Magazine
September 1999
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xi
Preface
Welcome! Windows 2000 Server Secrets is a book based on Microsoft’s latest
release of its successful network operating system. It is a book unlike many
others on the shelf. It is a collection of secrets gathered in the trenches from
my 10+ years of experience as a computer professional. This book is about
having “been there, done that, and still doing it daily” with networking, and
specifically Windows 2000 Server. And with its quippy delivery, it is both a
reference book and a summer-vacation-at-the-beach kind of read.
Why use this book? Can’t you just read a user manual and trade journal story
about Windows 2000 Server? I can give you at least eight reasons to purchase
this book today:
■ Expectation management. Windows 2000 Server is in its infancy as far as
network operating systems go. And while my (and your) enthusiasm is
most likely very high for this product, we need to remain realistic about
what Windows 2000 Server can do today and what it’ll likely deliver on
tomorrow. As often as possible, I draw out areas in Windows 2000 Server
where you should proactively manage your expectations.
■ Windows 2000 Server transition and planning. The adage “proper
planning prevents poor performance” clearly applies to Windows 2000
Server today. By getting your Windows 2000 Server house in order up
front with help from this book, you’ll have more success when you
enhance, upgrade, and expand your network later on for whatever
reason. Transition and planning is a recurring theme that spans the
entire book.
■ Windows 2000 Server. It’s now time! Simply stated, it’s now time to start
using Windows 2000 Server. You’ve waited long enough, riding the
emotional rollercoaster waiting for Windows 2000 Server to arrive. It has
arrived, and this book is focused on deployment. No more talk about
what will be. The talk is about what is.
■ MCSE certification tips. This book is written by a practicing MCSE. Hey,
I’ve taken those demanding exams over the years (sometimes more than
once). May my well-placed MCSE insights enable you to pass your exams
sooner rather than later. And don’t forget the Windows 2000 Server MCSE
track is very different from past MCSE operating system tracks. In fact, if
you’re a Windows NT 4.0 MCSE, you will need to re-certify on Windows
2000 Server.
■ TCP/IP. This is a timeless topic that you can never get enough of.
Mastering TCP/IP is one of the fastest ways to achieve greatness in the
Windows 2000 Server community. I am especially proud of my discussion
on DNS in Chapter 6. DNS is an area I highly recommend you master
immediately, because it has assumed a core role in Windows 2000 Server.
TCP/IP is covered from cradle to grave in Part II, “TCP/IP.”
4620-1 FM.f.qc
xii
10/28/99
4:00 PM
Page xii
Preface
■
■
■ Performance analysis. Like TCP/IP, this topic doesn’t have an expiration
date. In fact, the more experienced you become with Windows 2000 Server,
the more important performance analysis becomes. Too often, you learn
performance analysis in a crisis, but hopefully you’ll read Part VI,
“Optimizing Windows 2000 Server” before that day arrives. Truth be told, I
initially wrote this section for my own benefit because I just could not find
great books on the market that adequately addressed performance analysis
issues, such as Performance Monitor logging and Network Monitor packet
analysis. I hope you will benefit from my efforts in this area.
■ Third-party solutions. Another motivating factor in writing this book was
my use of the Microsoft Official Curriculum (MOC) and other Microsoftcentric texts as a practicing MCT. The MOC is a great first step for getting
certified. But the MOC has not and will probably never highlight thirdparty solutions that we experienced network professionals like to use (and
often must use) to keep our networks humming and our stakeholders
singing. In that spirit, I serve up deft discussions on the use of third-party
applications, utilities, and tools such as NessSoft’s PingPlotter. Let’s face
it — too many books on the shelves are written myopically about Microsoft
networking solutions, such as Windows 2000 Server, in a vacuum. Most of
us, however, supplement Windows 2000 Server with a variety of third-party
applications, utilities, and tools. My book reflects this real-world paradigm.
■ Real-world attitude. Speaking of the real world, I’ve committed my waking
hours, both day and night, to write this book for you as one of you. By day,
I’m an MCSE consultant who is typing commands, rebooting servers, and
downloading drivers. At night, when I’m not training future MCSEs as an
instructor, I morph into a scratch writer, brining you the tools to navigate
your network in the new Windows 2000 Server world. I’m not just a
technology writer, and because of that, this book is unique when
compared against many others. And perhaps most important of all, I don’t
have a staff of writers doing the dirty work for me. The buck stops here.
Introducing Windows 2000 Server
Many of us likened the arrival of Windows 2000 Server to the pathetic main
characters in Samuel Beckett’s Waiting for Godot who wait and wait for Godot.
Fortunately, for you and I, Godot has arrived at long last. It was worth the
wait. On all counts, Microsoft has delivered with Windows 2000 Server a
network operating system that is mature beyond its days (maybe that’s why
it took so long to get it out the door!).
But don’t be lulled into thinking that Windows 2000 Server doesn’t have its
own high need for attention. While you’re not dealing with an infant here,
more often than not you’re dealing with a toddler. At times, you can let
Windows 2000 Server run wild without a great deal of concern. Other times it
must be disciplined. The Windows 2000 Server wisdom contained within
these covers will help you understand these differences.
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xiii
Preface
■
xiii
■
With the first release of Windows 2000 Server (see Figure P-1), you will find
yourself assuming the role of a parent. In other words, you’re the proud
parent of a new network operating system. Congratulations! And while this
book doesn’t recite Microsoft’s Windows 2000 Server’s user manual, consider
this book a “what to expect when you’re raising a network operating system”
supplement. Stick with me on this Windows 2000 Server “secrets” journey and
I can promise you’ll feel a wonderful sense of accomplishment. You will learn
how to use this product in the real world and feel empowered to implement
Windows 2000 Server in ways that weren’t even anticipated by the developers
at Microsoft.
Figure P-2: Microsoft Management Console
What Is Windows 2000 Server?
Microsoft has positioned Windows 2000 Server as a robust, reliable, and
secure network server operating system, with an emphasis on providing
directory services and running applications. It is a 29 million-line, 32-bit
operating system that participates in a “true” server scenario, that of the
Active Directory/domain security model. And don’t overlook its easy-to-use,
Windows 98-like graphical user interface (GUI). The Windows 2000 Server
interface is already appreciated by other NOS crowds such as seasoned
NetWare administrators!
4620-1 FM.f.qc
xiv
10/28/99
4:00 PM
Page xiv
Preface
■
■
Beneath the pretty face, Windows 2000 Server is a huge, powerful network
operating system. Needless to say, Windows 2000 Server is too big for any
one individual to completely master. At the enterprise level, it is common
to see Windows 2000 Server job classes divided so that one person is
responsible for managing only part of the Windows 2000 Server. And while
some would say you’re just a cog in the enterprise wheel, in reality, you’re on
the front line of Windows 2000 Server, seeing it deployed as the masters at
Microsoft intended.
As many of you know the basics of Windows 2000 Server, or at least I assume
you do, you won’t be acting as a feature creature in this or other chapters.
But I will attempt to help define the Windows 2000 Server paradigm in this
book. This includes:
■ Lightweight Directory Access Protocol (LDAP)-based Active Directory
(see Chapters 11 and 12)
■ Different types of Windows 2000 Server such as Professional (Chapter 14)
and Advanced Server and Datacenter (Chapter 15)
■ New domain structure based on the industry standard Domain Name
System (DNS) server (Chapter 6)
■ Robust security based on the Kerberos Internet standard (Chapter 13)
TCP/IP paradigm shift
Clearly, Windows 2000 Server extends the use of the TCP/IP protocol suite
“paradigm shift” that started with Windows NT Server 3.51. Microsoft has not
only embraced the TCP/IP de facto standard for network and internetworking
protocols but, I submit, with Windows 2000 Server, they’ve mastered it. The
paradigm shift I speak of relates to Microsoft using TCP/IP because of its
worldwide acceptance, its open standards (something lacking in IPX/SPX),
and its routable nature (something that’s missing in NetBEUI). And because
the Internet uses the TCP/IP protocol suite, Microsoft’s TCP/IP paradigm shift
was also Microsoft’s Internet paradigm shift — but more on that in a moment.
The default network protocol in Windows 2000 Server, TCP/IP is
automatically installed when you set up Windows 2000 Server (discussed in
Chapter 2). And while you may continue using other network protocols such
as NetBEUI and IPX/SPX, you have fewer and fewer reasons to do so.
With the TCP/IP protocol suite, Windows 2000 Server is a true enterpriselevel network server that conforms to the conventional thinking of the
Internet. In order for you to exploit the vast resources of the Internet on your
Windows 2000 Server network, it is critical that you use the TCP/IP protocol
suite. By reading the chapters in Part II, “TCP/IP,” you will have the
opportunity to master this protocol. The information in Part II may be the
most important part of this book. But whatever your motivations and
viewpoints, mastering TCP/IP is a smart move on your climb to Windows
2000 Server guru status.
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xv
Preface
■
xv
■
Internet paradigm shift
The release of Windows 2000 Server represents Microsoft’s continued shift in
its business mission from its traditional LAN and desktop view of computing
to Internet-based. Many of the improvements that Microsoft has introduced
in Windows 2000 Server, such as the Internet Connection Wizard, have
dramatically increased Internet functionality. This is also apparent with
Microsoft’s further integration between Internet Explorer (IE) and the
operating system. Eat your heart out, U.S. Justice Department!
Windows 2000 Server Zen
With the release of Windows 2000 Server, network professionals are starting a
long journey toward ultimately mastering Microsoft’s new generation of
network operating systems. But there are many smart reasons for
introducing Windows 2000 Server in your organization today.
■ Learning Curve Analysis. Windows 2000 Server has a new look and feel.
That said, you can now exhale a sigh or relief; the GUI changes between
Windows NT Server 3.5x and Windows NT Server 4.0 were more dramatic
than those you’ll discover in Windows 2000 Server. In some ways, you
already know Windows 2000 Server better than you might think. One
example of this is the Microsoft Management Console (MMC) shown in
Figure P-2. If you have ever installed the Windows NT Server 4.0 Option
Pack, you’ve most likely encountered the MMC. If not, don’t worry; it’s
easy to work with and is discussed several times in this book.
■ Applications compatibility testing. Early adopters will jump on the first
opportunity to test critical business applications for basic compatibility
with Windows 2000 Server. Don’t believe me? Look no further than my
good client Jack, who is the MIS manager at a chain of athletic clubs in
the Pacific Northwest. Jack is already testing the membership check-in
program for Windows 2000 Server compatibility.
■ Driver compatibility testing. Second only to application testing will be
the need to test software drivers for common and legacy hardware
devices. Do these devices run on Windows 2000 Server or not? Such an
answer is critical for the landscape architect at a Northwest landscaping
firm hoping to print blueprints from an old HP Plotter via Windows 2000
Server.
■ Planning purposes (Active Directory design). The upstream planning
process is reason enough to deploy Windows 2000 Server sooner rather
than later. One such Windows 2000 Server planning area is Active
Directory (covered in Chapters 11 and 12).
■ Cultural reengineering and acceptance. You may be interested to know
that a recent keynote address at a Windows 2000 conference (summer
1999) brought to my attention that Windows 2000 Server, in particular
Active Directory, will be 20 percent hard work and 80 percent politics at
4620-1 FM.f.qc
xvi
10/28/99
4:00 PM
Page xvi
Preface
■
■
the enterprise level. I suspect that you will encounter similar, noncomputer dynamics in your organization as well.
■ Get the show on the road. Enough already. We’ve waited years for
Windows 2000 Server. The time is now to start mastering it.
And there are several ways to introduce Windows 2000 Server in your
organization before it is truly ready to throw the switch. The following list
goes from silly to serious so as not to ignore the breadth of the Windows 2000
Server community.
■ Basement Weekend Warrior. Like the ham radio operator of the 1960s
and 1970s, the Windows 2000 Server basement weekend warrior is
learning Windows 2000 Server with the idea of introducing it into the
company when appropriate. These are the self-studying types. Bless
their hearts.
■ Skunk Works. To draw on a term floated in the 1980s, within
every company considering Windows 2000 Server, there are network
administrators and engineers operating just under the radar screen.
These individuals, heroes in the eyes of many, are sneaking Windows
2000 Server into the work place, one installation at a time.
■ MCSE Alibis. Repeat the refrain: “I’m getting certified.” Many early
Windows 2000 Server installations are being undertaken more for the
benefit of the certification candidate than the employers. Whatever works.
■ Coexistence. On a more serious note: Early adopters are successfully and
correctly asserting that Windows 2000 Server should be introduced into
the organization today to test for compatibilities.
■ Throw the dog in the water. What the hell: go for it. This is the straight
up approach. Or the “Just do it” Nike approach. Here, Windows 2000
Server is introduced today in the organization. No questions asked.
However, it is important to remember that, like beef and fine wine, an NOS
should be aged to perfection before use. Using an NOS before its time is
certainly not recommended and would be considered foolish among qualified
and experienced network professionals. One of my earliest experiences with
Windows NT Server 4.0 might be applied to today’s Windows 2000 Server
product. Eager to deploy Windows NT Server 4.0 after only its first service
pack (SP1) had been released, I successfully convinced a client not to deploy
Windows NT Server 3.51 with its Service Pack 5 (SP5). Needless to say, this
mistake was serious in a real production environment. Early releases of
Windows NT Server 4.0 were just that: early. Perhaps I was seduced more by
the attractive interface and less by the stability of its predecessor at the SP5
level. If I had to do it again, I would have taken a more conservative approach
in the early days of Windows NT Server 4.0 and deployed Windows NT Server
3.51 (SP5) first.
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xvii
Preface
xvii
■
■
The point is this. Start using Windows 2000 Server today, as it’s finally here
and ready to go. But for goodness’ sake, use it first in a test lab or test
network before deployment on production servers. By following a disciplined
game plan, you’ll avoid failures in deploying Windows 2000 Server in your
organization.
The MCSE
Many readers are pursuing the Microsoft Certified Professional designation
known as Microsoft Certified Systems Engineer (MCSE). As a practicing
MCSE, I know the journey you are on. In general, I have emphasized topics
such as TCP/IP and performance analysis that benefit MCSE candidates
seeking to pass the grueling certification exams. Where possible, I offer
secrets that are MCSE exam-specific. I’ve been there and done that. I hope I
can help you get there too!
The dramatic increase in the popularity of the MCSE designation occurred
before the appearance of Windows 2000 Server. A few of us even started and
obtained our MCSEs during the Windows NT Server 3.x era. Many friends
joined us during the Windows NT Server 4.0 era. And many more peers will
join us as MCSEs in the Windows 2000 Server lifecycle. It’s a good thing!
Designing, installing, implementing, and managing Windows 2000 Server is
enough work for everyone. And mastering such tasks is not only a key aspect
of the MCSE program, but also the underlying emphasis of this book.
This book is not necessarily written for the newly arrived NT professional. In
fact, it is assumed you have worked with Windows 2000 Server before and are
seeking to improve your Windows 2000 Server-specific skill set. Hence the
numerous notes, tips, and (of course) secrets.. Simply stated, this is not a
rewrite of the user manual or the resource kit. I believe you will welcome and
appreciate this approach.
Are You Ready for This Book?
To fully enjoy this book, you must, at a minimum, have a keen interest in
Windows 2000 Server. Add computer-related work experience, network
certifications, degrees, and training, and you’ll get even more benefit from
reading and using this book. In short, you will derive from this book what you
put into it. Those with less networking experience may be the ones to utter
“wow” and “cool” the loudest and longest. The gurus can always benefit from
revisiting many tried-and-true network management methods presented
herein. And I think the gurus will benefit greatly from my inclusion of several
real-world, third-party matters, such as non-Microsoft tools that extend the
reach of Windows 2000 Server.
4620-1 FM.f.qc
10/28/99
xviii
4:00 PM
Page xviii
Preface
■
■
How This Book Is Organized
I have organized the book into six parts, as follows:
■ Part I: Introduction, Planning, Setup, and Implementation. It is here
that I present, in a sincere and honorable way, the steps for installing
Windows 2000 Server. I say “sincere and honorable” because here, as
throughout the book, I go to great lengths to avoid recasting the user
manuals that ship with Windows 2000 Server. Rather, in addition to
providing the installation basics you must follow, I offer supplemental
secrets at every installation and implementation turn in the road.
■ Part II: TCP/IP. Enough said. This important topic is, of course, worthy
of its own book, but I strive to integrate core TCP/IP topics into the
discussion of Windows 2000 Server. I think you will especially enjoy the
DNS, troubleshooting, Internet, and VPN discussions. And no, I don’t
recount for you the history of the Internet, starting with the Department
of Defense (I’m sure you already have books that do that).
■ Part III: Windows 2000 Server Administration. This section could have
been titled “Real-World, Day-to-Day Windows 2000 Server.” I took my own
experiences, validated by a group of peers, and created a list of the 12
most likely Windows NT Server-related tasks you will perform each day.
The result? See Chapter 9, “The Daily Dozen.” Monthly and annual matters
are presented as a baker’s dozen list and are covered in Chapter 10, which
also offers compelling insights into a network vision.
■ Part IV: Active Directory and Security. Clearly this was too large a topic
for a single chapter, so I turned it into an entire section. The two critical
dimensions of Active Directory are covered: planning and
implementation.
■ Part V: All In the Family. Windows 2000 Server doesn’t stand alone as the
only Microsoft networking solution. There are several flavors of Windows
2000 Server, including Professional, Advanced, and Datacenter Server.
These flavors are sampled in this section. And amazingly, for many
smaller businesses, good old Small Business Server (yes, based on
Windows NT Server 4.0) remains the best solution in today’s Windows
2000 world (consider this your first secret in the book). Small Business
Server is covered from A to Z in Chapter 16.
■ Part VI: Optimizing Windows 2000 Server. Here, you will find the secrets
to improving the performance of your Windows 2000 Server network.
Topics include basic quantitative analysis (MBA-style), Performance
Monitor, and the advanced use of Network Monitor. You will also greatly
benefit from the secrets and insights into Windows 2000 Server
troubleshooting. Troubleshooting topics include troubleshooting handson approaches, methodologies, tools, and resources. If some of my tips
save you even just one hour of network downtime, might I suggest this
book has more than paid back the price you bought it for.
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xix
Preface
■
xix
■
In addition, third-party applications discussed in the book are available, in
trial version, on the companion CD-ROM — see Appendix D for more
information.
Conventions Used in This Book
I use five icons throughout this book. You should know their meaning before
proceeding:
The Secret icon underscores why we’re here. Secrets are the foundation of
this book; they are little-known timesavers, productivity gainers, and other
proprietary Swiss Army knife-type workarounds you might like to know as a
Windows 2000 Server professional.
Notes are more widely known tidbits of information, factoids, trivia, and
the like.
Tips fall somewhere between Secrets and Notes. While important, tips are
typically less tasty than Secrets. Got it?
Caution is used to warn of possible danger. It is a yellow light advising you to
slow down and think. Perhaps a red light is approaching faster than you
think.
A Cross-Reference is used to tie together common topics in themes that
occur in several places within the book. It’s your opportunity to learn more
about something in another chapter.
Tell Us What You Think
A book about Windows 2000 Server necessarily assumes some of the
“behaviors” of Windows 2000 Server, right? By that, I mean that you’ve
probably thought of ways in which Windows 2000 Server could be improved.
Likewise, as you read and refer to this book, you’ll undoubtedly think of ways
in which this book could be improved.
That said, both IDG Books Worldwide and I want to hear from you.
Please register your book online at the IDG Books Worldwide Web site (at
my2cents.idgbooks.com) and give us your feedback. If you are interested in
communicating with me directly, send e-mail to harryb@nwlink.com. Bear
with me; I’ll try to answer your e-mails within a few business days. Hey —
when you’re a practicing Windows 2000 Server professional, things
sometimes get a little crazy!
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xx
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxi
Acknowledgments
No author is an island, although many of us live on ‘em. Behind the title and
author’s name on the cover, there is a supporting cast that contributed to the
production of this book.
First and foremost are the contributing writers who assisted with bits and
pieces of this book. They are Steve Crandall, Kevin Kocis, and Dawn Casey.
And, of course, there is the wonderful Jim Kiniry, the technical editor for
this work.
Second is the support team at IDG Books Worldwide, who worked doubletime to get this book out on the market for your benefit. Thanks in particular
to Jim Sumser, Jennifer Rowe, Kurt Stephan, Chandani Thapa, Brian
MacDonald, Victoria Lee, and Lauren Kennedy. (Needless to say, there are
many other cast members at IDG Books whom I’ve overlooked — thanks
again!)
Third, kindly join me in acknowledging my portfolio of consulting clients who
have provided unlimited contributions to this book. Without them, I would be
“secretless in Seattle,” and this book would have suffered greatly as a result.
Fourth, please recognize those rare and special individuals we all have in our
lives. For me, that includes not only my extended family on both sides, but
also a whole host of mentors who have helped pave my road in life. To
Stumpy Faulkner, former President of Jack White Company in Anchorage,
Alaska, who gave me my first computer job. And thanks to countless others,
including one of the best bosses I ever had, Barry MacKechnie. And finally,
without the hardware support from Compaq in Redmond, Washington, my
attempts to create complex Windows 2000 Server network scenarios would
have been futile. Thanks guys!
Whew! Enjoy the book!!!
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxii
Contents at a Glance
Foreword .........................................................................ix
Preface............................................................................xi
Acknowledgments ...........................................................xxi
Part I: Introduction, Planning, Setup, and Implementation .....1
Chapter 1: Windows 2000 Server Planning ..............................................................................................3
Chapter 2: Installation and Implementation .........................................................................................19
Part II: TCP/IP ...............................................................57
Chapter 3: Implementing TCP/IP ............................................................................................................59
Chapter 4: Installing and Configuring TCP/IP .....................................................................................121
Chapter 5: Troubleshooting TCP/IP .....................................................................................................157
Chapter 6: DNS, DHCP, WINS .................................................................................................................199
Chapter 7: Subnetting via TCP/IP .........................................................................................................265
Chapter 8: Internet Secrets ....................................................................................................................281
Part III: Windows 2000 Server Administration .................317
Chapter 9: The Daily Dozen ...................................................................................................................319
Chapter 10: Monthly and Annual Windows 2000 Activities ..............................................................385
Part IV: Active Directory and Security .............................409
Chapter 11: Active Directory, Part I .....................................................................................................411
Chapter 12: Active Directory, Part II ....................................................................................................425
Chapter 13: Windows 2000 Server Security ........................................................................................443
Chapter 14: Windows 2000 Professional ..............................................................................................463
Chapter 15: Windows 2000 Advanced Server and Datacenter Server .............................................471
Chapter 16: Small Business Server 4.5 .................................................................................................503
Part V: All In the Family ................................................539
Chapter 17: Analyzing and Boosting Performance .............................................................................541
Chapter 18: Performance Monitor ........................................................................................................569
Chapter 19: Network Monitor Secrets ..................................................................................................611
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxiii
Contents at a Glance
xxiii
■
■
Part VI: Optimizing Windows 2000 Server ......................655
Chapter 20: Task Manager and Other Neat Tricks .............................................................................657
Chapter 21: Troubleshooting Secrets ..................................................................................................709
Appendix A: Performance Monitor Objects ........................................................................................751
Appendix B: Protocol Definitions .........................................................................................................791
Appendix C: Common Image Names in Task Manager .......................................................................815
Appendix D: About the CD-ROM ...........................................................................................................819
Index ...........................................................................823
End-User License Agreement ..........................................848
CD-ROM Installation Instructions .....................................852
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxiv
Contents
Foreword .........................................................................ix
Preface............................................................................xi
Acknowledgments ...........................................................xxi
Part I: Introduction, Planning, Setup, and Implementation .....1
Chapter 1: Windows 2000 Server Planning ..........................................3
Physical Site ................................................................................................................................................3
Media infrastructure .............................................................................................................................3
As-builts ..................................................................................................................................................4
Physical infrastructure .........................................................................................................................5
Server Hardware .........................................................................................................................................6
Processor ...............................................................................................................................................7
Memory ..................................................................................................................................................9
Network subsystem ............................................................................................................................10
Server internals ...................................................................................................................................10
Disk storage .........................................................................................................................................11
Name brands versus clones ...............................................................................................................12
Software .....................................................................................................................................................13
Service Providers .....................................................................................................................................14
People ...................................................................................................................................................14
Key contact list ....................................................................................................................................15
Loose Ends ................................................................................................................................................15
General .................................................................................................................................................15
Existing networks ................................................................................................................................16
Chapter 2: Installation and Implementation ..........................................19
Creating Windows 2000 Server Setup Disks ..........................................................................................20
Windows 2000 Server Setup Process .....................................................................................................21
Alternate Setup Methods .........................................................................................................................36
Network installation ...........................................................................................................................37
Automated installations .....................................................................................................................37
Disk duplication ..................................................................................................................................39
Remote installations ...........................................................................................................................40
Setup Workarounds and Troubleshooting ............................................................................................40
Fully Implementing Windows 2000 Server ............................................................................................41
Testing Windows 2000 Server .................................................................................................................43
Reasons for a test lab .........................................................................................................................43
Planning your test lab .........................................................................................................................44
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxv
Contents
xxv
■
■
Lab procedures ...................................................................................................................................46
Testing resources ................................................................................................................................48
Budget ...................................................................................................................................................51
Other considerations ..........................................................................................................................52
Testing Specifics .......................................................................................................................................52
Hardware testing .................................................................................................................................52
Software testing ...................................................................................................................................53
LAN and WAN considerations ............................................................................................................54
Testing results .....................................................................................................................................54
Part II: TCP/IP ...............................................................57
Chapter 3: Implementing TCP/IP ........................................................59
About TCP/IP .............................................................................................................................................60
The standard-bearer ...........................................................................................................................60
By committee: Requests for Comments ..........................................................................................61
It’s a suite, not just a protocol ...........................................................................................................64
Comparing TCP/IP to operating systems .........................................................................................67
A Look at the Protocols ...........................................................................................................................67
Transmission Control Protocol ........................................................................................................68
User Datagram Protocol ....................................................................................................................69
Internet Protocol ................................................................................................................................71
Address Resolution Protocol ............................................................................................................72
Internet Control Message Protocol ..................................................................................................74
Internet Group Management Protocol .............................................................................................75
Simple Network Management Protocol ...........................................................................................77
What Is the Microsoft TCP/IP Protocol Suite in Windows 2000 Server? ...........................................77
The TCP/IP Settings in Windows 2000 Server .......................................................................................80
A Day in the Life of a TCP/IP Packet .......................................................................................................83
IP ............................................................................................................................................................84
TCP ........................................................................................................................................................87
Internetworking with TCP/IP ...................................................................................................................90
Breeder networks ................................................................................................................................91
Heterogeneous networks ...................................................................................................................91
Windows Sockets ................................................................................................................................92
Third-party TCP/IP software support ...............................................................................................92
Simple routing .....................................................................................................................................94
Implementing TCP/IP ...............................................................................................................................95
Internet Addressing ..................................................................................................................................96
IP addresses .........................................................................................................................................96
Subnet masks .....................................................................................................................................101
Default gateways ...............................................................................................................................105
Understanding IP Routing .....................................................................................................................113
Routing Tables ........................................................................................................................................116
A Word about Research .........................................................................................................................119
Chapter 4: Installing and Configuring TCP/IP ......................................121
TCP/IP Installation Preparations ..........................................................................................................121
4620-1 FM.f.qc
10/28/99
xxvi
4:00 PM
Page xxvi
Contents
■
■
Installing TCP/IP on Windows 2000 Server .........................................................................................123
At setup ..............................................................................................................................................123
On an existing Windows 2000 server ..............................................................................................125
Supporting roving users with TCP/IP .............................................................................................145
Installing and Configuring Simple Network Management Protocol (SNMP) ...................................145
Planning for SNMP ............................................................................................................................147
Installing SNMP service ....................................................................................................................147
Configuring the SNMP agent ............................................................................................................149
Configuring SNMP communities and traps ....................................................................................151
Configuring SNMP security ..............................................................................................................153
TCP/IP-Related Services ........................................................................................................................155
Chapter 5: Troubleshooting TCP/IP ..................................................157
TCP/IP Troubleshooting Basics ............................................................................................................157
First Step: Ask the Basic Questions ......................................................................................................159
Second Step: Define the Tools ..............................................................................................................159
Third Step: Use the Tools ......................................................................................................................161
IPConfig ..............................................................................................................................................162
Ping .....................................................................................................................................................164
ARP ......................................................................................................................................................168
Nbtstat ................................................................................................................................................172
Route ...................................................................................................................................................173
netstat .................................................................................................................................................174
Tracert ................................................................................................................................................177
hostname ............................................................................................................................................177
FTP ......................................................................................................................................................178
TFTP ....................................................................................................................................................180
Telnet ..................................................................................................................................................181
RCP ......................................................................................................................................................184
RSH ......................................................................................................................................................184
Rexec ..................................................................................................................................................184
Finger ..................................................................................................................................................185
Microsoft Internet Explorer .............................................................................................................185
Other TCP/IP Troubleshooting Angles ................................................................................................185
Troubleshooting TCP/IP database files ..........................................................................................185
Reinstalling TCP/IP ...........................................................................................................................193
TCP/IP Q & A ...........................................................................................................................................194
Additional TCP/IP Troubleshooting Resources ..................................................................................196
Chapter 6: DNS, DHCP, WINS ..........................................................199
Be Resolved .............................................................................................................................................199
NetBIOS name resolution .................................................................................................................200
Host name resolution .......................................................................................................................201
DNS ...........................................................................................................................................................203
How DNS really works ......................................................................................................................207
DNS benefits .......................................................................................................................................208
DNS details and definitions ..............................................................................................................208
Name resolution — how it works ....................................................................................................223
Zone transfer .....................................................................................................................................224
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxvii
Contents
xxvii
■
■
Configuring DNS ................................................................................................................................224
DNS standards and revisions ...........................................................................................................235
DHCP ........................................................................................................................................................236
Benefits and overview of DHCP .......................................................................................................236
Improvements to DHCP in Windows 2000 Server .........................................................................238
How does DHCP really work? ..........................................................................................................239
Installing the DHCP server service .................................................................................................246
Creating DHCP scopes ......................................................................................................................247
Configuring DHCP options ...............................................................................................................251
DHCP and DNS ...................................................................................................................................259
Troubleshooting DHCP servers .......................................................................................................259
WINS .........................................................................................................................................................260
Improvements to WINS in Windows 2000 Server ..........................................................................261
How WINS works ...............................................................................................................................262
Final WINS musings ...........................................................................................................................262
Dynamic DNS ...........................................................................................................................................263
Chapter 7: Subnetting via TCP/IP ....................................................265
What Subnetting Is .................................................................................................................................265
Easier administration .......................................................................................................................266
Less confining ....................................................................................................................................266
IP address conservation ...................................................................................................................266
Improved security .............................................................................................................................266
Another name for switching? ..........................................................................................................267
Bottom line? .......................................................................................................................................268
What Subnetting Isn’t .............................................................................................................................268
Code Breaking 101 ..................................................................................................................................269
Chapter 8: Internet Secrets ............................................................281
Configuring Remote Access Service ....................................................................................................281
Dial-Up Connection .................................................................................................................................288
Configuring a network and dial-up connection .............................................................................289
Dialing the Internet ...........................................................................................................................293
Dial-up connection status ................................................................................................................294
Dial-up networking with ISDN modems ..........................................................................................296
Digital and Wide Area Network Internet Connections .......................................................................297
Scenario 1: ISDN router ....................................................................................................................297
Scenario 2: ISDN and WAN combination ........................................................................................298
Scenario 3: Direct Frame Relay connection ...................................................................................298
Scenario 4: WAN connection ............................................................................................................300
Scenario 5: WAN over the Internet (VPN) ......................................................................................300
Scenario 6: DSL connections ...........................................................................................................301
Scenario 7: Cable modems ...............................................................................................................303
Virtual Private Networks .......................................................................................................................306
Defining Virtual Private Networking ...............................................................................................306
Defining PPTP ....................................................................................................................................306
Internet Explorer Secrets .......................................................................................................................313
4620-1 FM.f.qc
10/28/99
xxviii
4:00 PM
Page xxviii
Contents
■
■
Part III: Windows 2000 Server Administration .................317
Chapter 9: The Daily Dozen ............................................................319
Step 1: Virus Detection ..........................................................................................................................321
Third-party virus protection applications .....................................................................................321
Closing virus entry points ................................................................................................................325
Three levels of virus protection ......................................................................................................325
Ad-hoc DAT file updates ...................................................................................................................329
Step 2: Tape Backup/Restore ................................................................................................................329
Defining data ......................................................................................................................................329
Backup media ....................................................................................................................................330
Backup applications .........................................................................................................................330
Step 3: System Health .............................................................................................................................333
Third-party issues .............................................................................................................................337
Step 4: Adding Users, Groups, and Computers ...................................................................................337
Adding users ......................................................................................................................................338
Adding groups ...................................................................................................................................342
Adding computers ............................................................................................................................343
Group policy ......................................................................................................................................344
Step 5: Security .......................................................................................................................................350
Sharing ................................................................................................................................................350
NTFS security .....................................................................................................................................351
Web sharing .......................................................................................................................................352
Relationship between NTFS and sharing security ........................................................................353
Step 6: Mapping Drives ..........................................................................................................................355
Point and shoot method ...................................................................................................................355
GUI method ........................................................................................................................................357
Geek method ......................................................................................................................................357
Uniform Naming Convention ...........................................................................................................358
Mapping sans drive letters ..............................................................................................................359
Drive mapping scripts ......................................................................................................................360
Step 7: Logon and Logoff Status ...........................................................................................................360
Windows Script Host ........................................................................................................................360
Step 8: Verifying Connectivity ...............................................................................................................361
Once a day .........................................................................................................................................362
Ongoing ..............................................................................................................................................363
Web .....................................................................................................................................................365
Step 9: Add/Remove Software and Hardware .....................................................................................367
Software ..............................................................................................................................................367
Group policies ...................................................................................................................................367
Add/Remove Programs ....................................................................................................................369
InstallShield .......................................................................................................................................370
Setup.exe ............................................................................................................................................370
Hardware ............................................................................................................................................370
Step 10: End User Support .....................................................................................................................372
Physical ..............................................................................................................................................372
Layer seven: applications ................................................................................................................372
Geopolitical ........................................................................................................................................373
Planning ahead ..................................................................................................................................374
Step 11: The Windows 2000 Server/MCSE Toolkit ..............................................................................376
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxix
Contents
xxix
■
■
Real hardware tools ..........................................................................................................................377
A CD-ROM library ..............................................................................................................................377
More MCSE toolkit items ..................................................................................................................379
Step 12: Updating Network Notebook ..................................................................................................381
Chapter 10: Monthly and Annual Windows 2000 Activities ..................385
Auditing Your Network ..........................................................................................................................386
Reviewing Security .................................................................................................................................387
Baselining and Monitoring Performance .............................................................................................388
The Monthly Reboot ..............................................................................................................................389
Managing Disk Space on Servers ..........................................................................................................391
Disk quotas ........................................................................................................................................392
Automatic management ...................................................................................................................392
A real-world war story ......................................................................................................................392
Dynamic disks ...................................................................................................................................393
Distributed file systems (Dfs) ..........................................................................................................394
Recovering from Disaster ......................................................................................................................394
Native clustering ...............................................................................................................................395
Third-party solutions ........................................................................................................................395
Identical spare servers .....................................................................................................................395
Reciprocity agreements/hot sites ...................................................................................................396
Why bother? ......................................................................................................................................397
Annual drill ........................................................................................................................................397
Implementing Service Packs and Hotfixes ..........................................................................................397
Hotfixes ...............................................................................................................................................399
Be conservative .................................................................................................................................399
Upgrading and Removing Applications ...............................................................................................399
Creating Backup Archives .....................................................................................................................399
Budgeting for Your Network ..................................................................................................................400
Zero-based budgeting .......................................................................................................................400
Linear percent growth ......................................................................................................................400
Percent of revenue ............................................................................................................................401
Windows 2000 Server on $5 a day ...................................................................................................402
Creating a Technology Committee .......................................................................................................403
Evaluating Systems on the Horizon .....................................................................................................405
Two real-world examples .................................................................................................................405
Looking inward ..................................................................................................................................406
Remembering the Annual Planning Retreat ........................................................................................407
Part IV: Active Directory and Security .............................409
Chapter 11: Active Directory, Part I ..................................................411
What is Active Directory? ......................................................................................................................412
S – M – L – XL .....................................................................................................................................413
Capabilities ........................................................................................................................................413
Limitations .........................................................................................................................................413
Logical Structure ....................................................................................................................................414
Objects ...............................................................................................................................................414
4620-1 FM.f.qc
10/28/99
xxx
4:00 PM
Page xxx
Contents
■
■
Domains ..............................................................................................................................................415
Organizational units (OU) ................................................................................................................416
Trees ...................................................................................................................................................417
Forests ................................................................................................................................................418
Physical Structure ..................................................................................................................................418
Sites .....................................................................................................................................................419
Domain controllers ...........................................................................................................................419
Global catalog servers ......................................................................................................................420
Active Directory and DNS ......................................................................................................................420
4 P’s of Active Directory Planning ........................................................................................................420
Political ..............................................................................................................................................420
Physical ..............................................................................................................................................421
Perspective ........................................................................................................................................421
Practical .............................................................................................................................................422
Chapter 12: Active Directory, Part II ................................................425
Optimizing Organizational Units ..........................................................................................................425
An OU inside an OU ..........................................................................................................................427
OU permissions .................................................................................................................................428
Delegating control .............................................................................................................................430
Advanced features ............................................................................................................................433
Creating Users, Groups, and Computers .............................................................................................434
Moving Objects .......................................................................................................................................436
Active Directory Sites and Services .....................................................................................................438
Active Directory Domains and Trusts .................................................................................................440
Chapter 13: Windows 2000 Server Security
....................................443
IPsec .........................................................................................................................................................445
Kerberos V5 .............................................................................................................................................453
What is Kerberos? .............................................................................................................................453
Reasons for the move .......................................................................................................................455
How is it implemented in Windows 2000 Server? .........................................................................456
Kerberos extensions in Windows 2000 Server ..............................................................................457
Smart Card Support ................................................................................................................................458
EFS Encryption ........................................................................................................................................460
Chapter 14: Windows 2000 Professional ..........................................463
Where the Work Gets Done ...................................................................................................................463
Improved ease of use ........................................................................................................................464
Improved management .....................................................................................................................466
Troubleshooting ................................................................................................................................467
File management improvements .....................................................................................................468
Hardware Support ..................................................................................................................................468
Security ....................................................................................................................................................469
Chapter 15: Windows 2000 Advanced Server and Datacenter Server ..471
Deconstructing Windows 2000 Advanced Server ..............................................................................472
Planning Your Upgrade ..........................................................................................................................474
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxxi
Contents
xxxi
■
■
Upgrading ................................................................................................................................................477
Upgrade paths ...................................................................................................................................478
Upgrade preparation ........................................................................................................................478
First looks ...........................................................................................................................................479
Dual-Booting ............................................................................................................................................482
Dual booting between Windows NT 4.0 and Windows 2000 Advanced Server .........................483
Dual booting between multiple Windows 2000 partitions ...........................................................484
Dual booting and file system compatibility ...................................................................................484
Choosing the File System ......................................................................................................................485
NTFS ....................................................................................................................................................486
FAT and FAT32 ....................................................................................................................................486
Disk partition planning for new installations ................................................................................487
Advanced Server Components .............................................................................................................488
Symmetric Multiprocessing (SMP) .......................................................................................................491
Analyzing performance on SMP systems .......................................................................................491
SMP impact on system resources ...................................................................................................492
Maximizing performance .................................................................................................................493
Clustering and Fault Tolerance .............................................................................................................494
Caution! Rolling upgrades ................................................................................................................495
Easier Clustering Service setup and configuration ......................................................................496
Network Load Balancing ........................................................................................................................499
Other Enterprise Improvements ...........................................................................................................500
Memory management improvements ............................................................................................501
High performance sorting ................................................................................................................501
Datacenter Server ...................................................................................................................................501
Chapter 16: Small Business Server 4.5 ............................................503
Defining Small Business Server ............................................................................................................504
Small Business Server 4.5 ................................................................................................................506
Windows NT Server 4.0 ....................................................................................................................507
Microsoft Exchange Server 5.5 ........................................................................................................510
SQL Server 7.0 ...................................................................................................................................512
Microsoft Proxy Server 2.0 ...............................................................................................................514
Microsoft Internet Information Server ...........................................................................................516
Microsoft Fax Service 4.5 .................................................................................................................516
Microsoft Modem Sharing Server 1.0 .............................................................................................517
Microsoft Index Server 2.0 ...............................................................................................................518
SBS Console .......................................................................................................................................520
Client-side components ....................................................................................................................525
The Small Business Model .....................................................................................................................527
Small Business Server philosophy ..................................................................................................527
Who are SBS customers? ..................................................................................................................529
Looks can be deceiving ....................................................................................................................529
SBS architecture ................................................................................................................................529
SBS Server-side Setup ............................................................................................................................530
SBS Workstation-side Setup ..................................................................................................................532
SBS Troubleshooting ..............................................................................................................................533
Do your software vendors support SBS? .......................................................................................533
Modem sharing ..................................................................................................................................534
Harmless event logs errors ..............................................................................................................535
4620-1 FM.f.qc
10/28/99
xxxii
4:00 PM
Page xxxii
Contents
■
■
Revisiting SBS security .....................................................................................................................536
Virus detection ..................................................................................................................................536
The Future of SBS ...................................................................................................................................536
Part V: All In the Family ................................................539
Chapter 17: Analyzing and Boosting Performance ..............................541
Performance Analysis ............................................................................................................................542
Built-in performance analysis tools ................................................................................................543
More quantitative tools ....................................................................................................................546
Qualitative tools too! ........................................................................................................................552
Data = information ............................................................................................................................553
Are You Being “Outperformed?” ...........................................................................................................554
System Performance Monitor ..........................................................................................................554
Network Monitor ...............................................................................................................................554
Task Manager .....................................................................................................................................555
Conceptual Steps in Performance Analysis ........................................................................................555
Troubleshooting via Performance Analysis ........................................................................................556
The Four Big Areas to Monitor .............................................................................................................557
Memory ..............................................................................................................................................557
Processor ...........................................................................................................................................557
Disk subsystem .................................................................................................................................558
Network subsystem ..........................................................................................................................559
Why Performance Declines ...................................................................................................................563
Lying with Performance Analysis .........................................................................................................564
Performance Benchmarks .....................................................................................................................565
Chapter 18: Performance Monitor ....................................................569
The Power of Performance Monitor .....................................................................................................570
Comparing Performance Monitor to NetWare MONITOR.NLM ...................................................571
Performance Monitor basics ...........................................................................................................572
Six quick steps to using Performance Monitor .............................................................................574
The Five Faces of Performance Monitor ..............................................................................................577
Chart ...................................................................................................................................................577
Histogram ...........................................................................................................................................578
Alert ....................................................................................................................................................579
Logs .....................................................................................................................................................581
Report .................................................................................................................................................583
Data Collection and Interpretation .......................................................................................................584
Collecting data ...................................................................................................................................584
Interpreting your data ......................................................................................................................589
Performing In-Depth Analysis ...............................................................................................................593
Memory bottlenecks .........................................................................................................................594
Processor bottlenecks ......................................................................................................................597
Disk bottlenecks ................................................................................................................................599
Network bottlenecks .........................................................................................................................601
Analyzing protocols ..........................................................................................................................602
Analysis in Different Computing Environments ..................................................................................603
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxxiii
Contents
xxxiii
■
■
File and print server environment analysis ...................................................................................604
Application server environment system performance ................................................................605
Making Better Use of Performance Monitor .......................................................................................606
Running multiple Performance Monitors .......................................................................................606
Removing clutter ...............................................................................................................................608
Chapter 19: Network Monitor Secrets ..............................................611
Defining Network Monitoring ................................................................................................................611
Network Monitor basics ...................................................................................................................612
Capture window components .........................................................................................................613
Capturing frames ...............................................................................................................................615
Required hardware ...........................................................................................................................615
Analysis ..............................................................................................................................................617
Ongoing Network Monitoring ...............................................................................................................618
Using the capture trigger .................................................................................................................619
Larger capture sessions ...................................................................................................................620
Frame size setting .............................................................................................................................621
Capture filters ....................................................................................................................................622
Display filter .......................................................................................................................................625
Differences between capture filter and display filter ...................................................................629
Watching you watch me ...................................................................................................................632
The name game .................................................................................................................................632
It’s All in the Patterns .............................................................................................................................638
Artificial Intelligence Arrives in Network Monitor .............................................................................640
I Want to Learn More! .............................................................................................................................642
Support incidents ..............................................................................................................................642
Microsoft Certified Solution
Provider Program ...........................................................................................................................642
Official Microsoft Certification Training ........................................................................................643
Display Filter dialog box — protocol definitions ...........................................................................644
Microsoft TechNet CD-ROM .............................................................................................................644
Internet-based research ...................................................................................................................647
Hardware devices ..............................................................................................................................649
Books ..................................................................................................................................................650
Online help .........................................................................................................................................650
Comparing Network Monitors: SMS versus Windows 2000 Server ..................................................651
Part VI: Optimizing Windows 2000 Server ......................655
Chapter 20: Task Manager and Other Neat Tricks ..............................657
Introducing Task Manager .....................................................................................................................658
Configuring Task Manager — Applications view ...........................................................................660
Configuring Task Manager — Performance view ...........................................................................661
Configuring Task Manager — Processes view ................................................................................665
Multiple processors ..........................................................................................................................680
System Information Is a Winner! ...........................................................................................................683
System Summary ...............................................................................................................................684
Hardware Resources .........................................................................................................................684
4620-1 FM.f.qc
10/28/99
xxxiv
4:00 PM
Page xxxiv
Contents
■
■
Components .......................................................................................................................................685
Software Environment ......................................................................................................................687
System Information portal ...............................................................................................................690
Reporting meaningful system information ....................................................................................691
System Properties .............................................................................................................................695
SQL Trace ................................................................................................................................................696
SQL Server ODBCPING and Exchange RPING .....................................................................................697
Event Logs ...............................................................................................................................................698
Microsoft Office — Microsoft System Information .............................................................................699
Last but Not Least — Dr. Watson ..........................................................................................................706
Chapter 21: Troubleshooting Secrets ................................................709
Troubleshooting Steps ...........................................................................................................................710
Defining Troubleshooting ......................................................................................................................712
A methodology ..................................................................................................................................713
The one-hour rule .............................................................................................................................717
Area code changes ............................................................................................................................718
Year 2000 issues ................................................................................................................................718
Workstation side, not server side ...................................................................................................718
The value of downtime .....................................................................................................................719
The Troubleshooting Quilt ....................................................................................................................720
A troubleshooting map .....................................................................................................................721
Learning curve analysis ...................................................................................................................721
Avoiding box canyons ......................................................................................................................722
So much troubleshooting, so little time .........................................................................................723
Hardware versus Software — What a Paradox! ...................................................................................724
Let’s Get Technical! ................................................................................................................................725
Bye-bye BOOT.INI switches ..............................................................................................................726
Recovery Console .............................................................................................................................728
System start values ...........................................................................................................................730
How to Get Out of Trouble ....................................................................................................................731
Troubleshooters ................................................................................................................................732
Expanding your way out of trouble — The case of the missing system files .............................734
911 — Keep a current emergency repair disk ................................................................................736
Double 911 — the emergency repair process ................................................................................738
Examining STOP Screens .......................................................................................................................741
So what to do with STOP screens? .................................................................................................744
Troubleshooting via the Registry .........................................................................................................745
Troubleshooting Resources ..................................................................................................................745
The Internet: The Web and newsgroups ........................................................................................745
Books to help you .............................................................................................................................746
Microsoft TechNet .............................................................................................................................746
Training and education ....................................................................................................................747
Professional resources .....................................................................................................................748
From the Backroom to the Boardroom ................................................................................................749
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxxv
Contents
xxxv
■
■
Appendix A: Performance Monitor Objects ......................751
Appendix B: Protocol Definitions ....................................791
Appendix C: Common Image Names in Task Manager ........815
Appendix D: About the CD-ROM......................................819
Index ...........................................................................823
End-User License Agreement ..........................................848
CD-ROM Installation Instructions .....................................852
4620-1 FM.f.qc
10/28/99
4:00 PM
Page xxxvi
Download