Preface |
|
xiii | |
|
UNIT 1: THE COMMAND ENVIRONMENT |
|
|
1 | (120) |
|
Introduction to the Command Line |
|
|
3 | (36) |
|
|
4 | (1) |
|
The Continuing Importance of the Command Line |
|
|
5 | (5) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Environmental Considerations |
|
|
6 | (1) |
|
Automation Scripts and Batch Files |
|
|
6 | (1) |
|
Data and File Manipulation |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Introduction to the Command Prompt |
|
|
10 | (4) |
|
|
12 | (1) |
|
Opening and Closing Command Windows Without a Mouse |
|
|
13 | (1) |
|
|
14 | (4) |
|
Running Commands from the Run Line |
|
|
15 | (2) |
|
|
17 | (1) |
|
Displaying File and Directory Names |
|
|
17 | (1) |
|
Customizing Command Window Settings |
|
|
18 | (9) |
|
Copying and Pasting Within the Command Window |
|
|
21 | (2) |
|
Changing the Appearance of the Command Window |
|
|
23 | (3) |
|
Changing the Command Prompt Text |
|
|
26 | (1) |
|
Using Variables in the Command Environment |
|
|
27 | (4) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Output Redirection and Logging |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (50) |
|
Printing from the Command Line |
|
|
40 | (1) |
|
Navigating Without a Mouse |
|
|
41 | (12) |
|
|
42 | (5) |
|
|
47 | (2) |
|
Directories, Files, and Extensions |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
Finding and Viewing Files and Directories |
|
|
53 | (15) |
|
Tree File and Directory Structure |
|
|
53 | (1) |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
59 | (1) |
|
Determining File Ownership |
|
|
60 | (1) |
|
|
61 | (2) |
|
|
63 | (5) |
|
|
68 | (9) |
|
|
68 | (5) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (2) |
|
Creating New Data Files and Directories |
|
|
77 | (4) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
|
84 | (3) |
|
|
87 | (2) |
|
|
89 | (32) |
|
Creating and Saving a Batch File |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (11) |
|
|
92 | (1) |
|
|
93 | (1) |
|
Using ECHO to Control What the User Sees |
|
|
94 | (3) |
|
Logging Batch Events and Status |
|
|
97 | (2) |
|
Batch Documentation Using REM Statements |
|
|
99 | (1) |
|
Subroutines and Subprograms |
|
|
100 | (3) |
|
|
103 | (1) |
|
|
103 | (11) |
|
|
103 | (8) |
|
Prompting for User Input Using CHOICE |
|
|
111 | (1) |
|
|
112 | (2) |
|
Automating a Batch or Other Program |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (4) |
|
|
120 | (1) |
|
UNIT 2: COMPUTER ADMINISTRATION |
|
|
121 | (118) |
|
|
123 | (44) |
|
Viewing What Is Installed on a System |
|
|
124 | (4) |
|
|
128 | (4) |
|
|
132 | (6) |
|
Automatic Program Launch Within the Registry |
|
|
134 | (2) |
|
|
136 | (1) |
|
Manipulating the Registry |
|
|
137 | (1) |
|
|
138 | (3) |
|
Changing the Page File Configuration |
|
|
139 | (2) |
|
|
141 | (1) |
|
|
141 | (7) |
|
Finding Information on a Service |
|
|
142 | (1) |
|
Starting and Stopping a Service |
|
|
143 | (1) |
|
Converting a Program into a Service |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (2) |
|
Stopping a Task Manager Process |
|
|
147 | (1) |
|
|
148 | (7) |
|
|
150 | (1) |
|
Backup Frequency and Timing |
|
|
151 | (1) |
|
|
152 | (3) |
|
Monitoring and Optimization |
|
|
155 | (2) |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (3) |
|
|
164 | (3) |
|
|
167 | (42) |
|
Managing Disks and Drives |
|
|
168 | (28) |
|
Disk Condition and Viability |
|
|
168 | (5) |
|
|
173 | (16) |
|
Formatting FAT, FAT32, and NTFS |
|
|
189 | (4) |
|
|
193 | (3) |
|
Compression and Encryption |
|
|
196 | (4) |
|
|
196 | (1) |
|
Decompressing Distribution Files |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
200 | (2) |
|
|
202 | (2) |
|
|
204 | (3) |
|
|
207 | (2) |
|
User Administration and Data Security |
|
|
209 | (30) |
|
|
210 | (15) |
|
Creating and Deleting User Accounts |
|
|
210 | (3) |
|
Modifying Default Account Behaviors |
|
|
213 | (2) |
|
Modifying Existing User Accounts |
|
|
215 | (7) |
|
Creating and Modifying User Groups |
|
|
222 | (3) |
|
|
225 | (4) |
|
Security and Authentication |
|
|
229 | (3) |
|
Stored Users and Passwords |
|
|
229 | (1) |
|
Using Elevated Privileges Without Logging Off |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (4) |
|
|
237 | (2) |
|
|
239 | (100) |
|
Introduction to Networking |
|
|
241 | (36) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
245 | (2) |
|
Maintaining a Network Using Commands |
|
|
247 | (9) |
|
|
248 | (1) |
|
|
249 | (3) |
|
|
252 | (4) |
|
|
256 | (8) |
|
|
256 | (6) |
|
|
262 | (2) |
|
|
264 | (1) |
|
|
264 | (4) |
|
User, Group, and Computer Accounts |
|
|
266 | (1) |
|
More on the CACLS Command |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (4) |
|
|
275 | (2) |
|
|
277 | (28) |
|
Services Essential for Networking |
|
|
278 | (8) |
|
|
280 | (2) |
|
|
282 | (3) |
|
Monitoring the Workstation and Server Services |
|
|
285 | (1) |
|
Viewing Workstation Components |
|
|
286 | (5) |
|
The NET SESSION and NET FILE Commands |
|
|
286 | (1) |
|
More About Network Shares |
|
|
287 | (4) |
|
Viewing Network Components |
|
|
291 | (3) |
|
Universal Naming Convention |
|
|
291 | (1) |
|
|
291 | (2) |
|
|
293 | (1) |
|
|
294 | (2) |
|
|
294 | (2) |
|
Server Time Synchronization |
|
|
296 | (2) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (3) |
|
|
302 | (3) |
|
Manipulating Network Resources |
|
|
305 | (34) |
|
GUI Tools for Network Administration |
|
|
306 | (12) |
|
|
306 | (4) |
|
|
310 | (8) |
|
Running Programs Remotely |
|
|
318 | (2) |
|
Remote System Information |
|
|
320 | (10) |
|
Changing Configurations on Remote Computers |
|
|
323 | (6) |
|
Gathering Remote Network Data |
|
|
329 | (1) |
|
|
330 | (2) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (4) |
|
|
337 | (2) |
|
UNIT 4: DOMAIN ADMINISTRATION |
|
|
339 | (110) |
|
Active Directory: The Windows Server 2003 Domain |
|
|
341 | (38) |
|
Understanding Active Directory |
|
|
342 | (6) |
|
Standard Protocols for Active Directory |
|
|
342 | (1) |
|
Active Directory's Logical and Physical Structure |
|
|
343 | (5) |
|
Installing Active Directory |
|
|
348 | (6) |
|
Preinstallation Requirements |
|
|
348 | (1) |
|
|
348 | (2) |
|
Verifying Active Directory Installation |
|
|
350 | (3) |
|
Dealing with Active Directory Installation Problems |
|
|
353 | (1) |
|
Active Directory Domain Administration |
|
|
354 | (14) |
|
Managing Active Directory |
|
|
354 | (13) |
|
Naming in Active Directory |
|
|
367 | (1) |
|
Accessing Domain Resources |
|
|
368 | (3) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (4) |
|
|
377 | (2) |
|
Securing Active Directory |
|
|
379 | (34) |
|
Lightweight Directory Access Protocol |
|
|
380 | (6) |
|
|
380 | (6) |
|
Active Directory Security |
|
|
386 | (16) |
|
|
388 | (1) |
|
Security Configuration and Analysis |
|
|
389 | (1) |
|
|
389 | (5) |
|
|
394 | (6) |
|
Additional Security Tools |
|
|
400 | (1) |
|
The GPUPDATE Command and Group Policies |
|
|
401 | (1) |
|
Kerberos and Authentication |
|
|
401 | (1) |
|
Analyzing Active Directory with the DCDIAG Command |
|
|
402 | (5) |
|
|
407 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
408 | (4) |
|
|
412 | (1) |
|
Name Resolution Using DNS, WINS, and DHCP |
|
|
413 | (36) |
|
Name Resolution for a Network |
|
|
414 | (13) |
|
DNS and Windows Server 2003 |
|
|
416 | (1) |
|
|
417 | (1) |
|
Fine-Tuning Your DNS Installation |
|
|
418 | (2) |
|
|
420 | (5) |
|
|
425 | (2) |
|
The NETSH Command Environment |
|
|
427 | (2) |
|
|
429 | (3) |
|
The WINS Naming Resolution Process |
|
|
429 | (1) |
|
WINS Name Resolution with Existing Names |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
432 | (3) |
|
|
432 | (1) |
|
Planning WINS Server Replication Configuration |
|
|
433 | (2) |
|
Using DHCP to Manage Connectivity |
|
|
435 | (6) |
|
|
435 | (2) |
|
|
437 | (1) |
|
|
438 | (3) |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
443 | (3) |
|
|
446 | (3) |
|
APPENDIX A Command Dictionary |
|
|
449 | (44) |
|
APPENDIX B Advanced Networking Commands |
|
|
493 | (4) |
|
Terminal Services Commands |
|
|
493 | (1) |
|
Internet Information Server Commands |
|
|
493 | (1) |
|
Certificate Services Commands |
|
|
494 | (1) |
|
|
494 | (1) |
|
New Commands for Windows Server 2003 |
|
|
494 | (3) |
Glossary |
|
497 | (10) |
Index |
|
507 | |