Table of Contents from MCSA/MCSE Self-Paced Training Kit: Microsoft® Windows® 2000 Professional, Exam 70-210, Second Edition by Microsoft Corporation
Special Offers

MCSA/MCSE Self-Paced Training Kit (Exam 70-210): Microsoft® Windows® 2000 Professional, Second Edition
Author Microsoft Corporation
Pages 1056
Disk 1 Companion CD(s)
Level Int/Adv
Published 08/14/2002
ISBN 9780735617667
Price $59.99
To see this book's discounted price, select a reseller below.

More Information

About the Book
Table of Contents
Sample Chapter
Related Series
Related Books
About the Author

Support: Book & CD

Rate this book
Barnes Noble Amazon Quantum Books


Table of Contents continued

CHAPTER 15  Administering Shared Folders343
            About This Chapter343
            Before You Begin344
        Lesson 1: Understanding Shared Folders345
            Shared Folder Permissions345
            How Shared Folder Permissions Are Applied347
            Guidelines for Shared Folder Permissions347
            Practice: Applied Permissions348
            Lesson Summary349
        Lesson 2: Planning Shared Folders350
            Application Folders350
            Data Folders351
            Lesson Summary352
        Lesson 3: Sharing Folders353
            Requirements for Sharing Folders353
            Administrative Shared Folders353
            Sharing a Folder354
            Assigning Shared Folder Permissions357
            Modifying Shared Folders358
            Connecting to a Shared Folder358
            Lesson Summary360
        Lesson 4: Combining Shared Folder Permissions and NTFS Permissions361
            Strategies for Combining Shared Folder Permissions and NTFS Permissions361
            Practice: Managing Shared Folders362
            Lesson Summary371
CHAPTER 16  Auditing Resources and Events373
            About This Chapter373
            Before You Begin373
        Lesson 1: Understanding Auditing374
            Using an Audit Policy374
            Using Event Viewer to View Security Logs374
            Lesson Summary375
        Lesson 2: Planning an Audit Policy376
            Audit Policy Guidelines376
            Lesson Summary377
        Lesson 3: Implementing an Audit Policy378
            Configuring Auditing378
            Setting an Audit Policy378
            Auditing Access to Files and Folders381
            Auditing Access to Printers382
            Lesson Summary384
        Lesson 4: Using Event Viewer385
            Understanding Windows 2000 Logs385
            Viewing Security Logs385
            Locating Events386
            Managing Audit Logs388
            Archiving Logs388
            Practice: Auditing Resources and Events389
            Lesson Summary393
CHAPTER 17  Configuring Group Policy and Local Security Policy395
            About This Chapter395
            Before You Begin395
        Lesson 1: Configuring Account Policies396
            Configuring Password Policy396
            Configuring Account Lockout Policy398
            Practice: Configuring Account Policies400
            Lesson Summary403
        Lesson 2: Configuring Security Options404
            Shutting Down the Computer Without Logging On404
            Clear Virtual Memory Pagefile When System Shuts Down405
            Disable CTRL+ALT+DEL Requirement For Logon405
            Do Not Display Last User Name In Logon Screen406
            Practice: Configuring Security Settings407
            Lesson Summary407
CHAPTER 18  Managing Data Storage409
            About This Chapter409
            Before You Begin409
        Lesson 1: Managing NTFS Compression410
            Using Compressed Files and Folders410
            Compressing Files and Folders410
            Selecting an Alternate Display Color for Compressed Files and Folders412
            Copying and Moving Compressed Files and Folders412
            Using NTFS Compression413
            Practice: Managing NTFS Compression414
            Lesson Summary418
        Lesson 2: Managing Disk Quotas419
            Understanding Windows 2000 Disk Quota Management419
            Setting Disk Quotas420
            Determining the Status of Disk Quotas421
            Monitoring Disk Quotas422
            Determining Best Uses of Disk Quotas422
            Practice: Enabling and Disabling Disk Quotas423
            Lesson Summary426
        Lesson 3: Increasing Security with EFS427
            Understanding EFS427
            Using the Cipher Command429
            Using the Recovery Agent430
            Practice: Encrypting and Decrypting Files431
            Lesson Summary433
        Lesson 4: Using Disk Defragmenter434
            Defragmenting Disks434
            Using Disk Defragmenter Effectively435
            Lesson Summary436
CHAPTER 19  Backing Up and Restoring Data439
            About This Chapter439
            Before You Begin439
        Lesson 1: Understanding How to Back Up and Restore Data440
            Introducing Windows Backup440
            Planning Issues for Windows Backup441
            Examining Backup Types442
            Lesson Summary445
        Lesson 2: Backing Up Data446
            Performing Preliminary Tasks446
            Selecting Files and Folders to Back Up447
            Specifying Backup Destination and Media Settings448
            Specifying Advanced Backup Settings450
            Scheduling Backup Jobs450
            Practice: Backing Up Files451
            Lesson Summary456
        Lesson 3: Restoring Data457
            Preparing to Restore Data457
            Selecting Backup Sets, Files, and Folders to Restore458
            Specifying Advanced Restore Settings458
            Practice: Restoring Files460
            Lesson Summary462
        Lesson 4: Changing Windows Default Backup Options463
            Lesson Summary464
CHAPTER 20  Monitoring Access to Network Resources467
            About This Chapter467
            Before You Begin467
        Lesson 1: Monitoring Network Resources468
            Understanding the Purposes for Monitoring Network Resources468
            Understanding the Requirements to Monitor Network Resources469
            Lesson Summary469
        Lesson 2: Monitoring Access to Shared Folders470
            Monitoring Shared Folders470
            Monitoring Open Files472
            Disconnecting Users from Open Files473
            Practice: Managing Shared Folders473
            Lesson Summary474
        Lesson 3: Sharing a Folder Using the Shared Folders Snap-In475
            Practice: Creating a Shared Folder476
            Sharing a Folder on a Remote Computer477
            Lesson Summary478
        Lesson 4: Monitoring Network Users479
            Monitoring User Sessions479
            Disconnecting Users480
            Sending Administrative Messages to Users481
            Practice: Sending Console Messages481
            Lesson Summary482
CHAPTER 21  Configuring Remote Access485
            About This Chapter485
            Before You Begin485
        Lesson 1: Understanding the New Authentication Protocols in Windows 2000486
            The Extensible Authentication Protocol486
            The Remote Authentication Dial-in User Service487
            The Internet Protocol Security487
            The Layer Two Tunneling Protocol488
            The Bandwidth Allocation Protocol488
            Lesson Summary489
        Lesson 2: Configuring Inbound Connections490
            Allowing Inbound Dial-up Connections490
            Practice: Configuring an Inbound Connection493
            Lesson Summary494
        Lesson 3: Configuring Outbound Connections495
            Dial-up Connections495
            Connections to a Virtual Private Network496
            Direct Connections to Another Computer Through a Cable497
            Practice: Configuring an Outbound Connection497
            Lesson Summary499
CHAPTER 22  The Windows 2000 Boot Process501
            About This Chapter501
            Before You Begin501
        Lesson 1: The Boot Process502
            Files Used in the Boot Process502
            Preboot Sequence503
            Boot Sequence503
            Kernel Load505
            Kernel Initialization505
            Lesson Summary507
        Lesson 2: Control Sets in the Registry508
            Windows 2000 Control Sets508
            The Last Known Good Process509
            Lesson Summary511
        Lesson 3: Advanced Boot Options512
            Safe Mode512
            Other Advanced Boot Options513
            Lesson Summary514
        Lesson 4: The Boot.ini File515
            Components of the Boot.ini File515
            ARC Paths516
            Boot.ini Switches517
            Modifications to Boot.ini518
            Lesson Summary518
        Lesson 5: Using the Recovery Console519
            Installing and Starting the Recovery Console519
            Using the Windows 2000 Recovery Console519
            Understanding the Recovery Console Commands520
            Practice: Using the Windows 2000 Recovery Console521
            Lesson Summary524
CHAPTER 23  Deploying Windows 2000527
            About This Chapter527
            Before You Begin527
        Lesson 1: Automating Installations528
            Automating Installations by Using the Windows 2000 Setup Manager528
            Practice: Installing the Windows 2000 Installation Deployment Tools530
            Lesson Summary536
        Lesson 2: Using Disk Duplication to Deploy Windows 2000537
            Examining the Disk Duplication Process537
            Extracting the Windows 2000 System Preparation Tool537
            Using the System Preparation Tool to Prepare the Master Image 537
            Practice: Using the System Preparation Tool to Create a Master Disk Image539
            Installing Windows 2000 from a Master Disk Image540
            Practice: Using the System Preparation Tool to Install Windows 2000 Professional540
            Lesson Summary542
        Lesson 3: Performing Remote Installations543
            Understanding Remote Installation543
            Installing and Configuring Remote Installation Services544
            Practice: Installing RIS545
            Understanding Client Requirements for Remote Installation548
            Net PCs548
            Computers Not Meeting the Net PC Specification548
            Creating Boot Floppies549
            Practice: Creating a Remote Boot Disk550
            Lesson Summary551
        Lesson 4: Upgrading Previous Versions of Windows to Windows 2000552
            Identifying Client Upgrade Paths552
            Identifying Hardware Requirements and Compatibility553
            Generating a Hardware Compatibility Report553
            Identifying Software Compatibility554
            Upgrading Compatible Windows 95 and Windows 98 Computers554
            Installing the Directory Service Client555
            Upgrading Windows NT 3.51 and 4 Clients556
            Lesson Summary557
        Lesson 5: Installing Service Packs558
            Slipstreaming Service Packs 558
            Deploying Service Packs After Installing Windows 2000558
            Lesson Summary559
CHAPTER 24  Configuring Windows 2000 for Mobile Computers561
            About This Chapter561
            Before You Begin561
        Lesson 1: Using Offline Folders and Files562
            Configuring Your Computer to Use Offline Folders and Files562
            Practice: Configuring Offline Folders563
            Configuring Your Computer to Provide Offline Folders and Files563
            Practice: Configuring a Network Share564
            Synchronizing Files565
            Configuring Synchronization Manager565
            Practice: Configuring Synchronization Manager566
            Lesson Summary567
        Lesson 2: Configuring Power Options568
            Configuring Power Schemes568
            Using Hibernate Mode568
            Configuring Advanced Power Management568
            Practice: Configuring Power Options569
            Lesson Summary570
CHAPTER 25  Implementing, Managing, and Troubleshooting Hardware Devices and Drivers573
            About This Chapter573
            Before You Begin574
        Lesson 1: Using Device Manager and System Information575
            Introducing Device Manager575
            Installing Devices576
            Configuring and Troubleshooting Devices576
            Using the System Information Snap-In578
            Practice: Using Device Manager and System Information579
            Lesson Summary580
        Lesson 2: Configuring, Monitoring, and Troubleshooting Driver Signing581
            Configuring Driver Signing581
            Monitoring and Troubleshooting Driver Signing582
            Using the File Signature Verification Utility582
            Practice: Using the Windows Signature Verification Utility583
            Lesson Summary583
        Lesson 3: Configuring Computers with Multiple Processors and Monitoring System Performance 584
            Updating Drivers584
            Using Performance Console to Monitor System Performance585
            Adding Counters585
            Lesson Summary587
        Lesson 4: Installing, Managing, and Troubleshooting Devices588
            Configuring and Troubleshooting Fax Support588
            Managing and Troubleshooting I/O Devices589
            Lesson Summary591
OBJECTIVE DOMAIN 1  Installing Windows 2000 Professional595
            Tested Skills and Suggested Practices596
            Further Reading598
        Objective 1.1: Perform an attended installation of Windows 2000 Professional.601
        Objective 1.2: Perform an unattended installation of Windows 2000 Professional.609
        Objective 1.3: Upgrade from a previous version of Windows to Windows 2000 Professional.617
        Objective 1.4: Deploy service packs.623
        Objective 1.5: Troubleshoot failed installations.629
OBJECTIVE DOMAIN 2  Implementing and Conducting Administration of Resources635
            Tested Skills and Suggested Practices636
            Further Reading637
        Objective 2.1: Monitor, manage, and troubleshoot access to files and folders.639
        Objective 2.2: Manage and troubleshoot access to shared folders.647
        Objective 2.3: Connect to local and network print devices.653
        Objective 2.4: Configure and manage file systems.659
OBJECTIVE DOMAIN 3  Implementing, Managing, and Troubleshooting Hardware Devices and Drivers665
            Tested Skills and Suggested Practices665
            Further Reading667
        Objective 3.1: Implement, manage, and troubleshoot disk devices.669
        Objective 3.2: Implement, manage, and troubleshoot display devices.677
        Objective 3.3: Implement, manage, and troubleshoot mobile computer hardware.683
        Objective 3.4: Implement, manage, and troubleshoot input and output (I/O) devices.689
        Objective 3.5: Update drivers.699
        Objective 3.6: Monitor and configure multiple processing units.705
        Objective 3.7: Install, configure, and troubleshoot network adapters.711
OBJECTIVE DOMAIN 4  Monitoring and Optimizing System Performance and Reliability717
            Tested Skills and Suggested Practices718
            Further Reading721
        Objective 4.1: Manage and troubleshoot driver signing.723
        Objective 4.2: Configure, manage, and troubleshoot Scheduled Tasks.729
        Objective 4.3: Manage and troubleshoot the use and synchronization of Offline Files.735
        Objective 4.4: Optimize and troubleshoot performance of the Windows 2000 Professional desktop.743
        Objective 4.5: Manage hardware profiles.751
        Objective 4.6: Recover systems and user data.755
OBJECTIVE DOMAIN 5  Configuring and Troubleshooting the Desktop Environment763
            Tested Skills and Suggested Practices764
            Further Reading768
        Objective 5.1: Configure and manage user profiles.771
        Objective 5.2: Configure support for multiple languages or multiple locations.779
        Objective 5.3: Manage applications by using Windows Installer packages.785
        Objective 5.4: Configure and troubleshoot desktop settings.791
        Objective 5.5: Configure and troubleshoot fax support.801
        Objective 5.6: Configure and troubleshoot accessibility services.807
OBJECTIVE DOMAIN 6  Implementing, Managing, and Troubleshooting Network Protocols and Services813
            Tested Skills and Suggested Practices814
            Further Reading816
        Objective 6.1: Configure and troubleshoot the TCP/IP protocol.819
        Objective 6.2: Connect to computers by using dial-up networking.827
        Objective 6.3: Connect to shared resources on a Microsoft network.837
OBJECTIVE DOMAIN 7  Implementing, Monitoring, and Troubleshooting Security843
            Tested Skills and Suggested Practices844
            Further Reading846
        Objective 7.1: Encrypt data on a hard disk by using Encrypting File System (EFS).849
        Objective 7.2: Implement, configure, manage, and troubleshoot local security policy.857
        Objective 7.3: Implement, configure, manage, and troubleshoot local user accounts.865
        Objective 7.4: Implement, configure, manage, and troubleshoot local user authentication.873
        Objective 7.5: Implement, configure, manage, and troubleshoot a security configuration.879
APPENDIX A  Questions and Answers885
APPENDIX B  Creating Setup Boot Disks925
APPENDIX C  Understanding the DHCP Service927
            The Bootstrap Protocol927
            Manual Versus Automatic TCP/IP Configuration928
            Requirements for a Server Running the DHCP Service929
            Requirements for DHCP Clients929
            The DHCP Lease Process930
            IP Lease Renewal and Release 932
APPENDIX D  Managing Backup Tapes935
            Rotating and Archiving Tapes935


Last Updated: August 9, 2002
Top of Page