HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Besides enabling the exam candidate to pass Exam 70-244, this book will teach network administrators to configure, maintain and troubleshoot Microsoft networks that still have Windows NT Server as the controlling operating system. Although officially replaced by Windows 2000, it is clear that it will be some years before Windows NT disappears from the network mainstream. There are currently tens of thousands of licensed seats of Windows NT 4.0 Server, and a full migration to Windows 2000 will not happen overnight.
The CD features our ExamGear, Training Guide Edition product, including:
Analyzing, Configuring, and Monitoring Windows NT 4.0 Security
Introduction.
How This Book Helps You. What the Supporting and Maintaining a Microsoft Windows NT Server 4.0. Network Exam (70-244) Covers. Hardware and Software You Need. Advice on Taking the Exam. New Riders Publishing.
I. MAINTAINING, TROUBLESHOOTING, AND OPTIMIZING SERVERS.
1. Managing and Optimizing Servers.Introduction. Service Packs and Hot Fixes. Configuring and Troubleshooting Hardware. Performing Backups and Restores. System Recovery. Case Study: New Email System for Northside High School. Chapter Summary. Apply Your Knowledge.
2. Troubleshooting Servers.Introduction. Troubleshooting Server Performance. Case Study: Slingshot Training. Case Study: Monitoring Backup. Chapter Summary. Apply Your Knowledge.
II. CONFIGURING AND TROUBLESHOOTING USERS AND GROUPS.
3. Configuring and Troubleshooting User and Group Accounts.Introduction. User Accounts. User Profiles. Logon Scripts. Configuring and Troubleshooting Groups. Case Study: Hilltop School District. Chapter Summary. Apply Your Knowledge.
III. ANALYZING, CONFIGURING, AND MONITORING SECURITY.
4. Analyzing, Configuring, and Monitoring Security.Introduction. Account Policies. System Polices and the Policy Editor. Audit Policy and Auditing Object Access. The Security Configuration Manager. Maintaining Trust Relationships. Case Study: Herb's Herbs. Chapter Summary. Apply Your Knowledge.
5. Analyzing, Configuring, and Monitoring Advanced Security.Introduction. Protecting the SAM with Syskey. Securing Communications with Server Message Block Signing. Hardening Authentication by Using NTLMv2. Implementing Common Hardening Techniques Using SCM. Case Study: Spanning the Gap; When Migration Plans Change. Chapter Summary. Apply Your Knowledge.
IV. CONFIGURING, MANAGING, AND TROUBLESHOOTING ACCESS TO RESOURCES.
6. Configuring, Managing, and Troubleshooting File, Folder, and Printer Access.Introduction. Giving and Controlling Data and Printer Access. Managing Printers and Print Devices. Case Study: Larson, Watterson, and Adams (an Accounting Firm). Chapter Summary. Apply Your Knowledge.
7. Configuring, Managing, and Troubleshooting Dfs and IIS.Introduction. Giving and Controlling Data Access using the Distributed File System. Installing and Maintaining Internet Information Server. Managing Internet Access to File and Printer Resources. Case Study: Ground Up Turf Farm. Chapter Summary. Apply Your Knowledge.
V. CONFIGURING, MANAGING, TROUBLESHOOTING, AND OPTIMIZING NETWORK SERVICES.
8. Configuring, Managing, Troubleshooting, and Optimizing Network Connectivity and Name Resolution.Introduction. Configuring Network Connectivity. Configuring Name Resolution Servers and Services. Case Study: Emma's Wolf Repopulation Project. Chapter Summary. Apply Your Knowledge.
9. Configuring, Managing, Troubleshooting, and Optimizing Remote Access and Network Perfomance.Introduction. Configuring and Troubleshooting Remote Access Service (RAS). Configuring and Troubleshooting Routing and Remote Access Service (RRAS). Network Performance Optimization. Case Study: Monitoring Network Bandwidth. Chapter Summary. Apply Your Knowledge.
VI. FINAL REVIEW.
Fast Facts.VII. APPENDICES.
Appendix A. Glossary.