Highlights | What You Will Learn | About the Instructor | Other Courses

Managing Windows 2000
(Professional and Server)

Course Outline

1.      Speed Secrets of the User Interface

  • Customizing the Task Bar
  • Learning shortcuts to the shortcuts
  • Controlling file associations
  • Preventing the most common errors users make

2.      Understanding 2000’s Architecture

  • Not your father’s OS
  • Understanding HAL, Kernel, and 2000 Executive Services
  • Following the 2000 Boot Sequence
  • Hardware and software compatibility issues

3.      Planning & Installation

  • Checking system compatibility with the new hidden tool
  • Configure and partition disk subsystems for successful NTFS installation
  • Ensure foolproof, successful installations - every time!
  • Dual-boot or Multi-boot - do it right

4.      Automating 2000 Deployment

  • Learn undocumented secrets for unattended script installations
  • Using the Uniqueness Difference Files to automate multiple installations
  • Unleash the power of SYSDIFF.EXE to distribute applications and data
  • Learn how to clone a system successfully

5.      Windows 2000 Hardware Driver Secrets

  • How Windows 2000 eliminates this problem
  • Fixing bad drivers
  • Tuning drivers for optimum performance
  • How and where to get latest releases
  • Making Plug-and-Play behave

6.      Directory Services

  • How Windows 2000 eliminates the old problems and introduces many new ones
  • Compatibility issues between Windows NT and Windows 2000
  • Discover the tools that will ease the pain in transition
  • Learn the simple way to add multiple new users
  • Manage users in the one way that will keep you from reorganizing in the future
  • Discover how to “edit” rather than “replace” permissions
  • Understand Microsoft’s “magic numbers”  - SIDs
  • Trace permissions using Resource Kit utilities
  • Leverage the difference between permissions, rights and capabilities
  • Learn when logon scripts outperform profiles
  • Script effective mappings to network resources
  • Implement resource access and logon auditing

7.      Administering Domains

  • Learn how the PDC validates user access to the domain network resources
  • See how Windows 2000 eliminates some of the domain problems and creates new ones
  • Discover the advantages and limitations of the Master Domain structure
  • Allow users to log on to multiple workgroups, servers and applications with trust relationships and pass-through validation

8.      Resource Access

  • Create user home directories automatically
  • Learn why share permissions create potential security problems
  • Create individual and group profiles
  • Make users’ desktops “indestructible” with mandatory profiles
  • Eradicate a deadly hidden permission

9.      The Windows 2000 Registry

  • Working with the Registry
  • Saving and Restoring the Registry
  • Automating Registry Updates
  • HKEY_CLASSES_ROOT
  • HKEY_USERS
  • HKEY_CURRENT_USER
  • HKEY_LOCAL_MACHINE
  • Protect the Registry from malicious or accidental reconfiguration

10.  Managing System Policies

  • Restrict user behavior with System Policy Editor
  • Where policies fit into your environment
  • Requirements to implement System Policies
  • Defining policies by User, Group and Computer
  • Managing priorities between groups and individual user policies
  • Using existing ADM templates to define policies
  • Creating your own ADM templates

11.  Server Configuration & Optimization

  • Reduce memory requirements and tweak disk cache size
  • Boost paging file (virtual memory) performance
  • Turbocharge processor-intensive applications
  • Rebuild security easily with RDISK
  • Upgrade disk capacity without losing data accessibility
  • Learn why compression increases network security and performance
  • Examine applications, handles, threads and priorities
  • Learn how Windows 2000 handles crashes and system lockups
  • Deploy additional virtual machines for enhanced WIN16 stability
  • Protect your Registry from near and long-term failures
  • Recover from Registry crashes and the dreaded “Blue Screen of Death”
  • Exploit Performance Monitor to isolate bottlenecks
  • Learn how to correctly tweak service priorities

12.  Network Configuration & Optimization

  • Determining which network protocol is best for you: TCP/IP, NWLink (IPX/SPX), NetBEUI
  • Crash course in TCP/IP Essentials
  • Troubleshoot inaccessible systems using Event Viewer and Performance Monitor
  • Shutdown problem servers or machines from remote locations
  • Start and stop services from any location
  • Learn to analyze data packet captures
  • Update all or selected nodes with hot Resource Kit and Windows 2000 tools
  • Use Network Monitor to check bandwidth utilization and capture information for analysis
  • Gather detailed information of a remote system using Diagnostics

13.  Remote Administration and Wide Area Networks

  • How to establish a RAS connection and service
  • How to use Remote Access Server (RAS, RRAS) to make a WAN connection
  • How to create Virtual Private Networks using Point-to-Point Tunneling Protocol (PPTP), L2TP and IPSec
  • Windows Proxy configurations

14.  Windows 2000 Security

  • Why Windows 2000 has been criticized
  • Workarounds for the lack of security
  • Protecting against viruses and other attacks
  • How to use the NetBIOS Auditing Tool to check for easy-to-crack user names and passwords
  • How L0phtCrack quickly and easily pulls user names and passwords from your Windows 2000 system and how to set-up your system to protect against it
  • Is BackORIFICE a virus or a utility?
  • How NTFSDOS works and how to protect against it
  • When and how to apply Microsoft’s security patches
  • Finding out about new vulnerabilities and protecting yourself proactively

15.  Service Packs, Updates and Staying Current

  • When is it safe to deploy a Service Pack?
  • Fixing what isn’t broken
  • Best strategies for success
  • Resources to help you keep current

 

Highlights | What You Will Learn | About the Instructor | Other Courses