Product Cover Image

MCTS 70-642 Cert Guide: Windows Server 2008 Network Infrastructure, Configuring

By Don Poulton

Published by Pearson IT Certification

Published Date: Feb 17, 2012

More Product Info


Learn, prepare, and practice for Microsoft MCTS 70-642 exam success with this MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide from Pearson IT Certification, a leader in IT Certification learning. The companion CD features two complete practice exams.

  • Master Microsoft’s MCTS 70-642 exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions on the CD

MCTS 70-642: Windows Server 2008 Network Infrastructure, Configuring Cert Guide is a best-of-breed exam study guide. Best-selling author and expert instructor Don Poulton shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.


The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.


The companion CD contains the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.


Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.


The study guide helps you master all the topics on the MCTS 70-642 exam, including

  • IPv4/IPv6 address configuration and troubleshooting
  • DHCP configuration, installation, management, and troubleshooting
  • Routing configuration, tables, RRAS, management, and maintenance
  • Windows Firewall, Advanced Security, and IPsec
  • DNS installation, configuration, zones, replication, and records
  • Client name resolution
  • File services, shared folders, permissions, and encryption
  • DFS, namespaces, and replication
  • Backup/restore
  • File Server Resource Manager (FSRM)
  • Print services
  • Remote Access, VPNs, and NAT

Companion CD

The CD contains two free, complete practice exams. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test.


Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB hard disk space plus 50 MB for each downloaded practice exam.


Table of Contents

Introduction 3

Chapter 1 Configuring IPv4 and IPv6 Addressing 27

    “Do I Know This Already?” Quiz 28

    Concepts of TCP/IP 33

        TCP/IP History in Brief 33

        TCP/IP Protocol Stack 34

        OSI Reference Model 34

        Four-Layer TCP/IP Model 35

        Application Layer 36

        Transport Layer 36

        Internet Layer 37

        Network Interface Layer 37

        TCP/IP Component Protocols 38

        Transmission Control Protocol 38

        User Datagram Protocol 38

        Internet Protocol 39

        Address Resolution Protocol 39

        Internet Control Message Protocol 39

        Internet Group Management Protocol 40

        Application Layer Protocols 40

    IPv4 Addressing 41

        Static IPv4 Addressing 42

        Subnetting and Supernetting in IPv4 44

        Using Subnetting to Divide a Network 44

        Using Supernetting to Provide for Additional Hosts on a Network 47

        Understanding Private IPv4 Networks 48

        Dynamic IP Addressing 48

        Configuring IPv4 Address Options 48

        Using the Command Line to Configure IPv4 Addressing Options 52

    IPv6 Addressing 54

        IPv6 Address Syntax 56

        IPv6 Prefixes 56

        Types of IPv6 Addresses 56

        Connecting to a TCP/IP Version 6 Network 59

        Interoperability Between IPv4 and IPv6 Addresses 62

        Compatibility Addresses 63

        ISATAP Addresses 63

        6to4 Addresses 64

        Teredo Addresses 65

        Using Group Policy to Configure IPv6 Transition Technologies 66

    Resolving IPv4 and IPv6 Network Connectivity Issues 67

        Windows Server 2008 Network Diagnostics Tools 68

        Using TCP/IP Utilities to Troubleshoot TCP/IP 70

        ARP 70

        FTP 70

        ipconfig 71

        Nbtstat 72

        Netstat 72

        Nslookup 73

        ping 73

        tracert 74

        pathping 75

        Troubleshooting IPv4 and IPv6 Problems 75

        Suggested Response to a Connectivity Problem 75

        Network Discovery 76

        Incorrect IPv4 Address or Subnet Mask 77

        Incorrect Default Gateway 78

        Unable to Connect to a DHCP Server 78

        Duplicate IP Address 78

        Unable to Configure an Alternate TCP/IPv4 Configuration 78

        Using Event Viewer to Check Network Problems 79

        Additional Troubleshooting Hints When Using IPv6 79

    Review All the Key Topics 80

    Complete the Tables and Lists from Memory 81

    Definition of Key Terms 81

Chapter 2 Configuring Dynamic Host Configuration Protocol (DHCP) 83

    “Do I Know This Already?” Quiz 83

    How DHCP Works 89

        Four-Phase DHCP IPv4 Leasing Process 89

        IP Lease Request (DHCPDISCOVER) 90

        IP Lease Offer (DHCPOFFER) 91

        IP Lease Selection (DHCPREQUEST) 91

        IP Lease Acknowledgment (DHCPACK) 92

        Renewing an IPv4 Lease 92

        How DHCPv6 Works 93

    Installing and Configuring a DHCP Server 95

        Using the Command Line to Install DHCP 100

    DHCP Scopes and Options 101

        Creating DHCP Scopes 101

        Using the Command Line to Create Scopes 104

        Superscopes 104

        Multicast Scopes 105

        Split Scopes 106

        Exclusions 107

        Configuring DHCP Scope Properties 107

        Configuring DHCP Options 108

        Server Options 110

        Scope Options 111

        Option Classes 112

        Client Reservations and Options 114

    Managing and Troubleshooting a DHCP Server 116

        Authorizing a DHCP Server in Active Directory 116

        Configuring DHCP Relay Agents 117

        PXE Boot 120

        Monitoring and Troubleshooting a DHCP Server 121

    Review All the Key Topics 124

    Complete the Tables and Lists from Memory 1 25

    Definition of Key Terms 125

Chapter 3 Configuring Routing 127

    “Do I Know This Already?” Quiz 127

    The Need for Routing and Routing Tables 132

        Routing Protocols 133

        Routing Table 135

    Routing and Remote Access Service (RRAS) in Windows Server 2008 R2 137

        Configuring RRAS as a Router 140

        Configuring RIP 142

        Configuring Static Routing 145

        Using the RRAS Snap-In to Create a Static Route 145

        Using the route Command to Create a Static Route 146

        Choosing a Default Gateway 147

        Displaying the Static Routing Table 147

    Managing and Maintaining Routing Servers 148

        Demand-Dial Routing 148

        Establishing a Demand-Dial Interface 148

        Configuring Demand-Dial Interface Properties 150

        Specifying Packet Filtering 151

        IGMP Proxy 153

    Review All the Key Topics 156

    Complete the Tables and Lists from Memory 157

    Definition of Key Terms 157

Chapter 4 Configuring Windows Firewall with Advanced Security 159

    “Do I Know This Already?” Quiz 159

    Configuring Windows Firewall 165

        Basic Windows Firewall Configuration 167

    Using the Windows Firewall with Advanced Security Snap-In 172

        Configuring Multiple Firewall Profiles 174

        Configuring New Firewall Rules 176

        Configuring Inbound Rules or Outbound Rules 176

        Configuring Connection Security Rules 180

        Configuring Rule Properties 184

        Authorizing Users and Computers 185

        Modifying Rule Scope 187

        Additional Rule Properties 188

        Configuring Notifications 189

        Importing and Exporting Policies 190

    Using IPSec to Secure Network Communications 191

        IPSec Modes 191

        IPSec Encryption 193

        Using Group Policy to Create IPSec Policies 194

        Using Group Policy to Configure Windows Firewall Policies 198

        Creating Windows Firewall with Advanced Security Policies 198

        Windows Firewall Group Policy Property Settings 200

        Isolation Policies 201

    Review All the Key Topics 202

    Definition of Key Terms 203

Chapter 5 Installing and Configuring Domain Name System (DNS) 205

    “Do I Know This Already?” Quiz 206

    Introduction to DNS 210

        Hierarchical Nature of DNS 211

        Root-Level Domains 212

        Top-Level Domains 212

        Second-Level Domain Names 214

        Host Names 214

        DNS Name Resolution Process 215

        Recursive Queries 215

        Iterative Queries 216

        Reverse Lookup Queries 217

    Installing DNS in Windows Server 2008 R2 218

        Using the Command Line to Install DNS 221

        Using the Command-Line for DNS Server Administration 222

    Configuring DNS Server Properties 223

        Interfaces Tab 223

        Forwarders Tab 224

        Conditional Forwarders 227

        Advanced Tab 228

        Server Options 229

        Disable Recursion 229

        Name Checking 230

        Loading Zone Data 231

        Root Hints Tab 231

        Debug Logging Tab 233

        Event Logging Tab 235

        Trust Anchors Tab 235

        Monitoring Tab 237

        DNS Socket Pooling 238

        DNS Cache Locking 239

    Review All the Key Topics 241

    Definition of Key Terms 241

Chapter 6 Configuring DNS Zones and Replication 243

    “Do I Know This Already?” Quiz 243

    Zone Types and Their Uses 249

        DNS Zone Types 249

        Primary Zones 249

        Secondary Zones 250

        Active Directory–Integrated Zones 250

        Stub Zones 251

        Forward and Reverse Lookup Zones 251

        GlobalNames Zones 252

        DNS Name Server Roles 253

        Primary Name Servers 253

        Secondary Name Servers 254

        Caching-Only Servers 255

        Forwarders 255

        Slave Servers 256

    Configuring DNS Zones 257

        Creating New DNS Zones 257

        Creating a Reverse Lookup Zone 259

        Creating Secondary Zones 261

        Creating Stub Zones 262

        Creating a GlobalNames Zone 262

        Configuring DNS Zone Properties 263

        Configuring Zone Types 264

        Adding Authoritative DNS Servers to a Zone 265

        Dynamic DNS, Non-Dynamic DNS, and Secure Dynamic DNS 266

        Zone Scavenging 267

        Integrating DNS with WINS 269

        Subdomains and Zone Delegation 270

    Configuring DNS Zone Transfers and Replication 274

        Active Directory DNS Replication 274

        Application Directory Partitions 274

        Replication Scope 275

        Types of Zone Transfers 277

        Full Zone Transfer 277

        Incremental Zone Transfer 278

        Configuring Zone Transfers 279

        Configuring DNS Notify 281

        Secure Zone Transfers 282

        Auditing of DNS Replication 283

    Troubleshooting DNS Zones and Replication 287

        Using the ipconfig, ping, and nslookup Commands 288

        Use of the DNSLint Tool 290

    Review All the Key Topics 291

    Complete the Tables and Lists from Memory 292

    Definition of Key Terms 292

Chapter 7 Configuring DNS Records 295

    “Do I Know This Already?” Quiz 295

    Resource Record Types and Their Uses 299

        Creating New Resource Records 300

        New Host (A or AAAA) Records 301

        New Alias (CNAME) Records 302

        New Mail Exchanger (MX) Records 303

        Additional New Resource Records 304

        Using the Command Line to Create Resource Records 307

    Configuring Resource Record Properties 308

        Configuring SOA Resource Record Properties 309

        Time to Live 311

        Configuring Name Server Resource Record Properties 311

        Registering Resource Records 314

        Using the DnsUpdateProxy Group 314

        Configuring Round Robin 316

        Enabling Netmask Ordering 317

        Configuring DNS Record Security and Auditing 317

    Review All the Key Topics 319

    Complete the Tables and Lists from Memory 319

    Definition of Key Terms 319

Chapter 8 Configuring Client Computer Name Resolution 321

    “Do I Know This Already?” Quiz 321

    Configuring DNS Client Computer Settings 326

        Specifying DNS Server Lists 326

        Configuring DNS Suffix Search Order Lists 328

        Configuring a Client Computer’s Primary DNS Suffix 330

        Using Group Policy to Configure DNS Client Settings 331

        Using the ipconfig Command to Update and Register

        DNS Records 334

        Using the dnscmd Command to Update the DNS Server

        Cache 334

    Other Types of Name Resolution 335

        HOSTS Files 335

        NetBIOS Name Resolution 337

        NetBIOS Broadcasts 337

        LMHOSTS Files 339

        WINS Servers 340

        Troubleshooting NetBIOS Problems 344

        Link Local Multicast Name Resolution 345

    Review All the Key Topics 348

    Complete the Tables and Lists from Memory 349

    Definition of Key Terms 349

Chapter 9 Configuring File Servers 351

    “Do I Know This Already?” Quiz 351

    Shared Folders in Windows Server 2008 R2 358

        Understanding the File Services Role in Windows Server 2008 R2 358

        Using the Network and Sharing Center to Configure File Sharing 360

        Sharing Files, Folders, and Printers 362

        Modifying Shared Folder Properties 363

        Mapping a Drive 367

        Using the net share Command to Manage Shared Folders 368

    NTFS Permissions 369

        NTFS File and Folder Permissions 369

        Applying NTFS Permissions 371

        Specifying Advanced Permissions 373

        Configuring NTFS Permissions Inheritance 376

        Taking Ownership of Files and Folders 377

        Effective Permissions 379

        Viewing a User’s Effective Permissions 380

        Copying and Moving Files and Folders 381

        Copying Files and Folders with NTFS Permissions 381

        Moving Files and Folders with NTFS Permissions 382

        Using the Mouse to Copy or Move Objects from One Location to Another 383

        Practical Guidelines on Sharing and Securing Folders 383

    Data Encryption 384

        Encrypting File System 384

        Encrypting File System Basics 385

        Preparing a Disk for EFS 386

        Encrypting Files 387

        Backing Up EFS Keys 389

        Decrypting Files 391

        EFS Recovery Agents 392

        EFS Group Policies 393

        BitLocker Drive Encryption 395

        Preparing Your Computer to Use BitLocker 397

        Enabling BitLocker 397

        Managing BitLocker 402

        Configuring BitLocker Group Policies 403

        Using Data Recovery Agents 405

    Additional File Server Management Resources 408

        Using Offline Files 408

        Configuring Servers for Offline Files 409

        Configuring Client Computers 411

        Configuring Offline File Policies 411

        Configuring Transparent Caching of Offline Files 413

        Configuring BranchCache 414

        Using the netsh Command to Configure BranchCache 415

        Using Group Policy to Enable BranchCache 417

        Specifying BranchCache Firewall Rules 418

        Understanding BranchCache Network Infrastructure Requirements 419

        Using BranchCache across a Virtual Private Network 419

        Managing Certificates with BranchCache 420

        Using Share and Storage Management Console 421

        Using Share and Storage Management to Provision Shared Resources and Volumes 422

        Using Share and Storage Management to Manage Shared Resources 425

    Review All the Key Topics 426

    Complete the Tables and Lists from Memory 427

    Definition of Key Terms 427

Chapter 10 Configuring Distributed File System (DFS) 429

    “Do I Know This Already?” Quiz 429

    DFS Concepts 433

        Improvements to DFS in Windows Server 2008 R2 434

        Installing DFS on a Windows Server 2008 R2 Computer 435

    Managing DFS Namespaces 438

        Creating Additional DFS Namespaces 438

        Managing Namespaces 439

        Adding Folders to DFS Namespaces 440

        Adding Namespace Servers 441

        Configuring Referrals 441

        Enabling Access-Based Enumeration of a DFS Namespace 443

        Configuring Polling of Domain Controllers 444

    Managing DFS Replication 445

        Setting Up DFS Replication 447

        Replication Topologies 449

        Working with Replication Groups 450

        Adding New Connections 450

        Adding Replicated Folders 451

        Designating Read-Only Replicated Folders 451

        Adding Members to Replication Groups 451

        Sharing or Publishing Replicated Folders 451

        Configuring Failover Cluster Support 452

        Generating Replication Health Reports 454

    Review All the Key Topics 456

    Complete the Tables and Lists from Memory 457

    Definition of Key Terms 457

Chapter 11 Configuring Backup and Restore 459

    “Do I Know This Already?” Quiz 459

    Protecting Data with Windows Backup 464

        Backup Permissions 466

        Installing Windows Server Backup 466

        Backing Up Your File Server 467

        Performing a Bare Metal Backup 472

        Scheduling a Backup 472

        Using the wbadmin Command 474

        Restoring the Backup Catalog 475

        Managing Backups Remotely 476

    Volume Shadow Copies 477

        Using Windows Explorer to Manage Shadow Copies 478

        Using the Command Line to Manage Shadow Copies 480

        Using Volume Shadow Copies to Recover a File or Folder 480

    Restoring Data from Backup 482

        Using Windows Backup to Recover Data 482

        Restoring User Profiles 485

        Recovering System State 486

        Performing a Full Server or Bare Metal Recovery of a Windows Server 2008 R2 Computer 488

        Using the wbadmin Command to Recover Your Server 491

    Review All the Key Topics 492

    Complete the Tables and Lists from Memory 493

    Definition of Key Terms 493

Chapter 12 Managing File Server Resources 495

    “Do I Know This Already?” Quiz 495

    File Server Resource Manager 500

        Installing FSRM 501

        Managing File Screening 501

        Using File Groups 502

        Creating File Screens and Templates 503

        Creating File Screen Exceptions 506

        Monitoring File Screening 506

        Managing Storage Reports 506

        Specifying Report Parameters 507

        Additional FSRM Options 508

        Scheduling Report Generation 509

        Managing File Classification 511

        Configuring File-Management Tasks 514

    Configuring Disk and Volume Quotas 516

        Using Windows Explorer to Enable Disk Quotas 516

        Using FSRM to Enable Quotas 519

        Using FSRM to Create Quota Templates 520

        Some Guidelines for Using Quotas 522

    Storage Manager for SANs 523

    Review All the Key Topics 527

    Complete the Tables and Lists from Memory 528

    Definition of Key Terms 528

Chapter 13 Configuring and Monitoring Print Services 531

    “Do I Know This Already?” Quiz 531

    Printing Terminology in Windows Server 2008 R2 537

        Printing Process 538

    Installing, Sharing, and Publishing Printers 539

        Installing the Print and Document Services Role 540

        Installing Printers 541

        Using Control Panel to Install a Printer 542

        Using the Print Management Console to Install a Printer 544

        Sharing Printers 545

        Publishing Printers in Active Directory 546

        Using Group Policy to Deploy Printer Connections 548

    Managing and Troubleshooting Printers 549

        Using the Printer Properties Dialog box 549

        General Tab 549

        Ports Tab and Printer Pooling 549

        Advanced Tab 551

        Security Tab and Printer Permissions 553

        Migrating Print Queues and Printer Settings 556

        Isolating Printer Drivers 557

        Configuring Location-Aware Printer Settings 558

        Delegating Print Management 559

        Troubleshooting Printer Problems 561

        Some Common Problems 561

        Printer Port Problems 562

        Enabling Notifications 562

    Review All the Key Topics 564

    Complete the Tables and Lists from Memory 565

    Definition of Key Terms 565

Chapter 14 Configuring Remote Access 567

    “Do I Know This Already?” Quiz 567

    Remote Access Protocols 573

        Remote Access Authentication Protocols 574

        New Features of RRAS in Windows Server 2008 576

    Configuring Dial-Up Connections 577

        Configuring a RAS Server for Dial-Up 577

        Configuring Dial-Up RAS Server Properties 579

        Enabling Modems used by the Dial-Up RAS Server 581

        Configuring Windows Server 2008 as a RAS Client 583

    Network Address Translation 584

        Enabling the NAT Server for DHCP 586

        Enabling Addresses, Services, and Ports on the NAT Server 588

        Configuring Internet Connection Sharing 589

    Virtual Private Networking 590

        How VPNs Function 591

        VPN Encapsulation 591

        Authentication 591

        Data Encryption 592

        Configuring a RRAS Server for VPN 592

        Creating and Authenticating VPN Connections 594

        Configuring VPN Connection Security 596

        Enabling VPN Reconnect 598

        Configuring Advanced Security Auditing 599

        Using Remote Access Policies 601

        Configuring VPN Packet Filters 601

    Connection Manager 603

        Installing the Connection Manager Administration Kit 605

        Using Connection Manager Administration Kit to Create a Profile 605

        Using the Connection Manager Client Interface 610

    Review All the Key Topics 612

    Complete the Tables and Lists from Memory 613

    Definition of Key Terms 613

Chapter 15 Configuring Network Policy Server (NPS) 615

    “Do I Know This Already?” Quiz 615

    Wireless Networking Protocols and Standards 619

        Wireless Networking Standards 620

        Planning the Authentication Methods for a Wireless Network 621

        Planning the Encryption Methods for a Wireless Network 622

        Wired Equivalent Privacy 622

        802.1X 622

        Use of IPSec with Wireless Networks 623

        The IEEE 802.3 Wired Standard 623

        Planning and Configuring Wireless Access Policies 623

        Creating a Wireless Access Policy for Windows Vista/7 Clients 624

        Creating a Wireless Access Policy for Windows XP Clients 628

        Configuring IEEE 802.3 Wired Access Policies 630

    RADIUS in Windows Server 2008 R2 633

        Installing NPS on a Windows Server 2008 RRAS Server 634

        Configuring the NPS Server for Wireless Access 635

        Configuring New RADIUS Clients 638

        Creating RADIUS Proxies and Proxy Groups 639

        Creating Connection Request Policies 641

        Configuring RADIUS Accounting 644

        Configuring NPS Templates 647

    Review All the Key Topics 649

    Complete the Tables and Lists from Memory 650

    Definition of Key Terms 650

Chapter 16 Configuring Network Access Protection (NAP) 653

    “Do I Know This Already?” Quiz 653

    Concepts of NAP 658

        Components of a Typical NAP Deployment 660

        What’s New with NAP in Windows Server 2008 R2 662

    NAP Enforcement 663

        DHCP Enforcement 663

        Enabling NAP on the DHCP Server’s Scopes 667

        VPN Enforcement 668

        IPSec Enforcement 670

        Installing and Configuring an HRA Server 671

        Configuring NAP for IPSec Enforcement 674

        Configuring the HRA for Health Certificates 674

        Using Group Policy to Specify IPSec Enforcement 675

        802.1X Enforcement 676

        RDS Enforcement 678

    System Health Validation 680

        Configuring the Windows Security Health Validator 681

        Configuring Error Codes 683

        Using Multi-Configuration SHV 683

        Configuring NAP Policies 684

    Review All the Key Topics 689

    Definition of Key Terms 690

Chapter 17 Configuring DirectAccess 693

    “Do I Know This Already?” Quiz 693

    Concepts of DirectAccess 698

        DirectAccess Server Requirements 700

        Using IPv6 with DirectAccess 701

        Using Network Access Protection 701

        DirectAccess Client Requirements 702

        DirectAccess Connection Process 702

    Configuring the DirectAccess Server 703

        Installing and Configuring the DirectAccess Server Feature 703

        DirectAccess and the Perimeter Network 707

        Configuring Authentication 708

    Group Policy and DirectAccess 708

        Using Group Policy to Configure DirectAccess Clients 708

        Name Resolution Policy Table 710

    Using NRPT Exemptions 714

    Review All the Key Topics 716

    Complete the Tables and Lists from Memory 716

    Definitions of Key Terms 716

Chapter 18 Windows Server Update Services (WSUS) Server Settings 719

    “Do I Know This Already?” Quiz 719

    Concepts of WSUS 724

        Purposes of Windows Update and WSUS 724

        New Features of WSUS 3.0 725

    Installing and Configuring a WSUS Server 727

        Installing WSUS on a Windows Server 2008 R2 Computer 728

        Installing Microsoft Report Viewer Redistributable 2008 731

        Getting Started with WSUS 731

        Configuring WSUS Options 733

        Testing Updates 738

        Using Computer Groups 738

        Configuring Client-Side Targeting 741

        Approving Updates 742

        Declining Updates 744

        Viewing Reports 745

        Using WSUS on a Disconnected Network 747

    Configuring Client Computers for WSUS 748

    Review All the Key Topics 754

    Complete the Tables and Lists from Memory 755

    Definition of Key Terms 755

Chapter 19 Configuring Performance Monitoring 757

    “Do I Know This Already?” Quiz 757

    Performance Monitor 762

        Using Performance Monitor to Collect Real-Time Data 764

        Customizing Performance Monitor 766

        Permissions Required to Run Performance Monitor 767

    Data Collector Sets 768

        System-Defined Data Collector Sets 768

        Using System-Defined Data Collector Sets 769

        Viewing Logged Performance Data 771

        User-Defined Data Collector Sets 771

        Creating a Custom Data Collector Set 774

        Using Performance Monitor to Create a Data Collector Set 776

        A Few Best Practices for Logging Server Performance 777

        Command-Line Utilities 779

        Monitoring Print Servers 779

    Analyzing Performance Data 780

        Optimizing and Troubleshooting Memory Performance 781

        Optimizing and Troubleshooting Processor Utilization 783

        Optimizing and Troubleshooting Disk Performance 784

        Optimizing and Troubleshooting Network Performance 786

    Reliability Monitor 787

        Resource Monitor 789

    Review All the Key Topics 792

    Complete the Tables and Lists from Memory 793

    Definition of Key Terms 793

Chapter 20 Configuring Event Logs 795

    “Do I Know This Already?” Quiz 795

    Event Viewer 799

        Viewing Logs in Event Viewer 800

        Event Log Properties 802

        Applications and Services Logs 804

    Customizing Event Logs 805

        Creating and Using Custom Views 807

        Exporting and Importing Custom Views 808

    Configuring Event Log Subscriptions 809

        Configuring the Source Computers to Forward Events 810

        Configuring the Collector Computer to Forward Receive Events 810

        Configuring Event Log Subscriptions 811

    Configuring Tasks from Events 814

    Review All the Key Topics 816

    Complete the Tables and Lists from Memory 817

    Definitions of Key Terms 817

Chapter 21 Collecting Network Data 819

    “Do I Know This Already?” Quiz 819

    Simple Network Management Protocol 824

        How SNMP Functions 824

        Management Information Base 824

        SNMP Messages 825

        SNMP Communities 826

        How SNMP Functions 827

        Installing and Configuring SNMP 828

    Network Monitor 833

        Concepts of Protocol Analyzers 833

        Placement of Protocol Analyzers 834

        Installing and Running Microsoft Network Monitor 835

        Using Network Monitor to Capture Network Data 837

        Filtering Captured Network Data 839

        Using a Capture Filter 841

        Configuring Network Monitor Options 842

        Using Aliases 844

        Performing a Capture from the Command Prompt 845

    Connection Security Rules Monitoring 846

        Configuring Authentication Properties 848

    Review All the Key Topics 850

    Complete the Tables and Lists from Memory 851

    Definitions of Key Terms 851

Practice Exam 853

Answers to Practice Exam 921

APPENDIX A Answers to the “Do I Know This Already?” Quizzes 961

CD-only Elements:

APPENDIX B Memory Tables 2

APPENDIX C Memory Tables Answer Key 2

Glossary 2

TOC, 9780789748300, 1/17/2012