|
`-=[]โจโฉ\;',./~!@#$%^&*()_+{}|:"<>? ๐๐๐๐๐๐๐โ๐๐๐๐๐๐๐๐๐๐๐ ๐ก๐ข๐ฃ๐ค๐ฅ๐ฆ๐ง
ร
โโโรโโ
โยฑโ๊๏นฆโโ โฏ ๐ธ๐นโ๐ป๐ผ๐ฝ๐พโ๐๐๐๐๐โ๐โโโ๐๐๐๐๐๐๐โค๐ด๐ต๐ถ๐ท๐ธ๐น๐บ๐ป๐ผ๐ฝ๐พ๐ฟ๐๐๐๐๐๐
๐๐๐๐๐๐๐๐
โผโฝโพโโโโโ
โโโโโโโ โก โคโฅโฆโงโจโฉโชโซ
โโโโโโ โโโโ
โโ ๐ผ๐ฝ๐พ๐ฟ๐๐๐๐๐๐
๐๐๐๐๐๐๐๐๐๐๐๐๐๐
โโโโ
โฆฐโโโโโโดโต โโโโโโโ โงโจโฉโช
โซโฌโญโฎโฏโฐโฑโฒโณ โฅโฎโฏโฐโฑ โ โฒ โณ โด โ โ สน สบ โต โถ โท
๏น ๏น ๏น ๏น ๏ธน ๏ธบ ๏ธป ๏ธผ ๏ธ ๏ธ ๏ธฟ ๏น ๏ธฝ ๏ธพ ๏น ๏น ๏ธท ๏ธธ โ โ โด โต โ โ โ โก
โโโโโคโฆโฅโงโโโโโโโฒโผโโถโบโปโฒโณ โผโฝโพโฟโโโโโโ
โโ โโโโโโโโโโโโโโโณโฅขโฅฃโฅคโฅฅโฅฆโฅงโฅจโฅฉโฅชโฅซโฅฌโฅญโฅฎโฅฏ
Draft for Information Only
Content
Windows Server 2008 โWindows Server 2008
Windows Server 2008
Sources and Links:
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd349801(v=ws.10)
Windows Server 2008
- Windows Server 2008 R2 and Windows Server 2008
- What's New in Windows Server
- Computer Hardware and Windows Server
- Install and Deploy Windows Server
- Migrate Server Roles to Windows Server 2008 R2
- Secure Windows Server
- Service Pack Information for Windows Server
- Troubleshoot Windows Server
- Troubleshoot Windows Server 2008 R2
- Resources for Top Areas of Support for Windows Server 2008 R2
- Best Practices Analyzer
- Best Practices Analyzer for Active Directory Certificate Services
- Best Practices Analyzer for Active Directory Domain Services
- Best Practices Analyzer for Active Directory Rights Management Services
- Best Practices Analyzer for Application Server
- Best Practices Analyzer for Domain Name System
- Best Practices Analyzer for Dynamic Host Configuration Protocol
- Best Practices Analyzer for File Services
- Best Practices Analyzer for Hyper-V
- Best Practices Analyzer for Internet Information Services
- Best Practices Analyzer for Network Policy and Access Services
- Best Practices Analyzer for Routing and Remote Access Services
- Best Practices Analyzer for RRAS: Prerequisites
- Best Practices Analyzer for RRAS: Configuration
- RRAS: The Routing and Remote Access server must be running
- RRAS: To support remote access connections, IPv4 or IPv6 Remote Access must be enabled on the RRAS server
- RRAS: Logging should be enabled on the RRAS server
- RRAS: At least one network interface should be enabled on the RRAS server
- RRAS: The network interface <adapter name> on the RRAS server should be enabled
- RRAS: At least one network interface on the RRAS server must be reachable
- RRAS: The network interface <adapter name> on the RRAS server should be reachable
- RRAS: To use RRAS server as an IPv4 router, IPv4 forwarding must be enabled
- RRAS: To use RRAS server as an IPv6 router, IPv6 forwarding must be enabled
- RRAS: IPv4 routing should be enabled on the RRAS server for routing protocols like DHCP Relay, RIP and IGMP to run
- RRAS: IPv6 routing should be enabled on the server for routing protocols like DHCP Relay to run
- RRAS: Number of ports for IKEv2, L2TP and SSTP should be greater than 0 and ports for PPTP should be greater than 1
- RRAS: The number of ports available for use by this tunneling protocol should be greater than 0
- RRAS: The IKE and AuthIP IPsec Keying Modules service is required to support L2TP/IPsec and IKEv2 tunnels
- RRAS: To use IKEv2 behind a NAT router, the certificate subject name must match the NAT address
- RRAS: To use IKEv2, at least one valid certificate must be present on the RRAS server
- RRAS: To use SSTP behind a NAT router, the certificate subject name must match the NAT address
- RRAS: To use SSTP, at least one valid certificate must be present on the RRAS server
- RRAS: To use a demand-dial interface on the RRAS server, 'LAN and demand-dial routing' must be enabled on the server
- RRAS: Demand dial interface <interface name> should support encryption of the data
- RRAS: The IPv4 DHCP Relay Agent should be configured with at least one DHCP server
- RRAS: The IPv6 DHCPv6 Relay Agent should be configured with at least one DHCP server
- RRAS: At least one interface in the IPv4 DHCP Relay Agent must have 'Relay DHCP packets' enabled
- RRAS: At least one interface in the IPv6 DHCPv6 Relay Agent must have 'Relay DHCP packets' enabled
- RRAS: Only one certificate for IKEv2 should have IKE_INTERMEDIATE in its EKU property
- RRAS: If there are multiple valid certificates for SSTP then the preferred certificate should be specified
- RRAS: The subject name of the certificate to be used for IKEv2 or SSTP must match the name of the RRAS server or the IP address of the external interface of the RRAS server
- RRAS: If DHCP is used to allocate addresses to remote clients then specify the network adapter to be used to obtain DHCP addresses
- RRAS: Use authentication protocols that are considered more secure than PAP, CHAP, or MS-CHAPv2
- Best Practices Analyzer for Network Policy Server
- Best Practices Analyzer for Health Registration Authority
- Best Practices Analyzer for Remote Desktop Services
- Best Practices Analyzer for Windows Server Update Services
- Events and Errors
- Knowledge Articles
- Deprecated Features for Windows 7 and Windows Server 2008 R2
- Troubleshoot Windows Server 2008
- Windows Server Commands, References, and Tools
- Windows Server Content by Category
- Browse Windows Server Technologies
- Active Directory Services
- Active Directory Certificate Services
- Active Directory Domain Services
- Active Directory Domain Services for Windows Server 2008
- Product Evaluation
- Getting Started
- Planning and Architecture
- Deployment
- Operations
- Active Directory Domain Services Operations Guide
- New in This Guide
- Administering Active Directory Domain Services
- Introduction to Administering Active Directory Domain Services
- Administering Domain and Forest Trusts
- Introduction to Administering Domain and Forest Trusts
- Best Practices for Administering Domain and Forest Trusts
- Managing Domain and Forest Trusts
- Creating Domain and Forest Trusts
- Known Issues for Creating Domain and Forest Trusts
- Creating External Trusts
- Create a One-Way, Incoming, External Trust for One Side of the Trust
- Create a One-way, Incoming, External Trust for Both Sides of the Trust
- Create a One-Way, Outgoing, External Trust for One Side of the Trust
- Create a One-Way, Outgoing, External Trust for Both Sides of the Trust
- Create a Two-Way, External Trust for One Side of the Trust
- Create a Two-Way, External Trust for Both Sides of the Trust
- Creating Shortcut Trusts
- Create a One-Way, Incoming, Shortcut Trust for One Side of the Trust
- Create a One-Way, Incoming, Shortcut Trust for Both Sides of the Trust
- Create a One-Way, Outgoing, Shortcut Trust for One Side of the Trust
- Create a One-Way, Outgoing, Shortcut Trust for Both Sides of the Trust
- Create a Two-Way, Shortcut Trust for One Side of the Trust
- Create a Two-Way, Shortcut Trust for Both Sides of the Trust
- Creating Forest Trusts
- Create a One-Way, Incoming, Forest Trust for One Side of the Trust
- Create a One-Way, Incoming, Forest Trust for Both Sides of the Trust
- Create a One-Way, Outgoing, Forest Trust for One Side of the Trust
- Create a One-Way, Outgoing, Forest Trust for Both Sides of the Trust
- Create a Two-Way, Forest Trust for One Side of the Trust
- Create a Two-Way, Forest Trust for Both Sides of the Trust
- Creating Realm Trusts
- Configuring Domain and Forest Trusts
- Securing Domain and Forest Trusts
- Appendix: New Trust Wizard Pages
- Administering the Windows Time Service
- Administering DFS-Replicated SYSVOL
- Administering the Global Catalog
- Administering Operations Master Roles
- Administering Active Directory Backup and Recovery
- Administering Intersite Replication
- Administering the Active Directory Database
- Administering Domain Controllers
- Administering Active Directory Domain Rename
- Additional Resources
- Active Directory Quotas
- Active Directory and Active Directory Domain Services Port Requirements
- Active Directory Domain Services: Last Interactive Logon
- SYSVOL Replication Migration Guide: FRS to DFS Replication
- Installing Remote Server Administration Tools
- Testing for Active Directory Schema Extension Conflicts
- Active Directory Operational Monitoring Service
- Troubleshooting
- Active Directory Domain Services for Windows Server 2008 R2
- Active Directory Federation Services
- Active Directory Lightweight Directory Services
- Active Directory Rights Management Services
- Application Server
- Backup and Recovery
- Failover Clusters
- Fax Server
- File Services
- Group Policy
- Hyper-V
- Network Load Balancing
- Networking
- Accomplish Goals with Windows Server Networking
- Foundation Network and Core Network Guides
- 802.1X Authenticated Wired Access
- 802.1X Authenticated Wireless Access
- BranchCache
- Connection Manager Administration Kit
- DirectAccess
- DHCP Server
- DNS Server
- High-Speed Networking Features
- Netware Migration
- Network and Sharing Center
- Network Diagnostics Framework (NDF) and Network Tracing
- Network Policy and Access Services
- Network Shell (Netsh)
- Quality of Service
- Simple Network Management Protocol
- TCP/IP
- Telnet
- Windows Firewall with Advanced Security and IPsec
- Product Evaluation
- Getting Started
- Planning and Architecture
- Deployment
- Windows Firewall with Advanced Security Deployment Guide
- Planning to Deploy Windows Firewall with Advanced Security
- Implementing Your Windows Firewall with Advanced Security Design Plan
- Checklist: Creating Group Policy Objects
- Checklist: Implementing a Basic Firewall Policy Design
- Checklist: Implementing a Domain Isolation Policy Design
- Checklist: Implementing a Standalone Server Isolation Policy Design
- Checklist: Implementing a Certificate-based Isolation Policy Design
- Procedures Used in This Guide
- Add Authentication Methods to an IPsec Rule on Earlier Versions of Windows
- Add Production Computers to the Membership Group for a Zone
- Add Test Computers to the Membership Group for a Zone
- Assign an IPsec Policy to a GPO for Earlier Versions of Windows
- Assign Security Group Filters to the GPO
- Change Rules from Request to Require Mode
- Configure Authentication Methods on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2
- Configure Data Protection (Quick Mode) Settings on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2
- Configure Group Policy to Autoenroll and Deploy Certificates
- Configure Key Exchange (Main Mode) Settings on Earlier Versions of Windows
- Configure Key Exchange (Main Mode) Settings on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2
- Configure Settings to Optimize IPsec Behavior on Earlier Versions of Windows
- Configure the Rules to Require Encryption on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2
- Configure the Windows Firewall Log
- Configure the Workstation Authentication Certificate Template
- Configure Windows Firewall to Suppress Notifications When a Program Is Blocked
- Confirm That Certificates Are Deployed Correctly
- Copy a GPO to Create a New GPO
- Create a Group Account in Active Directory
- Create a Group Policy Object
- Create a New IP Security Policy in a GPO for Earlier Versions of Windows
- Create an Authentication Exemption List Rule on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2
- Create an Authentication Request Rule on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2
- Create an Inbound ICMP Rule on Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2
- Create an Inbound Port Rule on Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2
- Create an Inbound Port Rule on Windows XP or Windows Server 2003
- Create an Inbound Program or Service Rule on Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2
- Create an Inbound Program Rule on Windows XP or Windows Server 2003
- Create an Outbound Port Rule on Windows 7, Windows Vista, Windows Server 2008 or Windows Server 2008 R2
- Create an Outbound Program or Service Rule on Windows 7, Windows Vista, Windows Server 2008 or Windows Server 2008 R2
- Create Filter Actions on Earlier Versions of Windows
- Create Filter Lists for Clients of Isolated Server Running Earlier Versions of Windows
- Create Filter Lists for Isolated Domain Computers and Isolated Servers Running Earlier Versions of Windows
- Create Inbound Rules to Support RPC on Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2
- Create IPsec Rules for an Isolated Domain on Earlier Versions of Windows
- Create IPsec Rules for an Isolated Server Zone on Earlier Versions of Windows
- Create IPsec Rules for Clients of an Isolated Server Zone on Earlier Versions of Windows
- Create WMI Filters for the GPO
- Enable Predefined Inbound Rules on Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2
- Enable Predefined Inbound Rules on Windows XP or Windows Server 2003
- Enable Predefined Outbound Rules on Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2
- Exempt ICMP from Authentication on Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2
- Install Active Directory Certificate Services
- Link the GPO to the Domain
- Modify GPO Filters to Apply to a Different Zone or Version of Windows
- Open the Group Policy Management Console to IP Security Policies
- Open the Group Policy Management Console to Windows Firewall
- Open the Group Policy Management Console to Windows Firewall with Advanced Security
- Open Windows Firewall with Advanced Security
- Restrict Server Access to Members of a Group Only
- Start a Command Prompt as an Administrator
- Turn on Windows Firewall and Configure Default Behavior
- Use Netsh to Configure GPOs
- Verify That Network Traffic Is Authenticated
- Additional Resources
- Operations
- Technical Reference
- Troubleshooting
- Product Help
- Windows Internet Name Service
- Performance and Reliability
- Print and Document Services
- Remote Desktop Services (Terminal Services)
- Security and Protection
- Storage
- Streaming Media Services
- Web Server (IIS)
- Windows Deployment Services
- Windows Search, Browse, and Organization
- Windows Server 2008 R2 Solutions
- Windows Server Update Services (WSUS)
- Windows Server Update Services 3.0 SP2
- Windows Server Update Services 3.0 SP1
- Windows Server Update Services 2.0
- Product Evaluation
- Getting Started
- Deployment
- Operations
ยฉsideway
ID: 090000007 Last Updated: 2/28/2099 Revision: 0
|
 |