Tải bản đầy đủ (.pdf) (848 trang)

mp windows server 2012 r2 inside out configuration storage and essentials feb 2014

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (11.49 MB, 848 trang )

spine = 1.71”

Conquer Mailbox administration—from
the inside out!
Focusing on the Mailbox server role, dive into Exchange Server
2013—and really put your enterprise messaging to work! This
supremely organized reference packs hundreds of timesaving
solutions, troubleshooting tips, and workarounds for managing
mailboxes and high availability. Discover how the experts tackle
core operations and support tasks—and challenge yourself to
new levels of mastery.

• Prepare for installation or upgrade
• Master role-based access control (RBAC) fundamentals
• Create, manage, move, and archive mailboxes
• Implement email address policies
• Configure and manage distribution groups
• Understand Store components and functionality
• Deliver high availability through database availability groups (DAG)
• Manage compliance, retention, mailbox search, and data loss

Inside OUT
For experienced Exchange
Server administrators

Foreword by Rajesh Jha

Corporate Vice President, Exchange
Server Group, Microsoft Corporation

About the Author



Tony Redmond is a Microsoft Most
Valuable Professional (MVP) and one
of the leading voices in the Exchange
Server community. He has two decades
of experience with enterprise mail,
focusing on Exchange Server since
version 4.0. As an industry consultant,
he guides customers through Exchange
Server deployment and management
issues, and he’s written 10 books.

prevention

• Use the Exchange Management Shell and cmdlets
• Administer public folder architecture

Inside
OUT

Also look for
Microsoft Exchange Server 2013 Inside Out:
Connectivity, Clients, and UM
9780735678378

ISBN: 978-0-7356-8267-2

Windows Server 2012 R2
Configuration, Storage, & Essentials


Windows Server 2012 R2
Configuration, Storage,
& Essentials

Stanek

U.S.A.$49.99
Canada $52.99

Inside OUT
The ultimate, in-depth reference
Hundreds of timesaving solutions
Supremely organized, packed
with expert advice

Windows Server 2012 R2
Configuration,
Storage, & Essentials

[Recommended]

Messaging/Microsoft Exchange Server

Celebrating 30 years!

William R. Stanek Windows technologies expert + award winning author


PUBLISHED BY
Microsoft Press

A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2014 by William R. Stanek
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by
any means without the written permission of the publisher.
Library of Congress Control Number: 2013955709
ISBN: 978-0-7356-8267-2
Printed and bound in the United States of America.
First Printing
Microsoft Press books are available through booksellers and distributors worldwide. If you need support related
to this book, email Microsoft Press Book Support at Please tell us what you think
of this book at />Microsoft and the trademarks listed at />/Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property
of their respective owners.
The example companies, organizations, products, domain names, email addresses, logos, people, places, and
events depicted herein are fictitious. No association with any real company, organization, product, domain
name, email address, logo, person, place, or event is intended or should be inferred.
This book expresses the author’s views and opinions. The information contained in this book is provided without
any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or
distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by
this book.
Acquisitions Editor: Anne Hamilton
Developmental Editor: Karen Szall
Project Editor: Rosemary Caperton
Editorial Production: nSight, Inc.
Technical Reviewer: Bob Hogan; Technical Review services provided by Content Master, a member of
CM Group, Ltd.
Copyeditor: Kerin Forsyth
Indexer: Lucie Haskins
Cover: Twist Creative • Seattle



To my readers—thank you for being there with me through many books and
many years.
To my wife—for many years, through many books, many millions of words,
and many thousands of pages she’s been there, providing support and encouragement and making every place we’ve lived a home.
To my kids—for helping me see the world in new ways, for having exceptional
patience and boundless love, and for making every day an adventure.
To Anne, Karen, Martin, Lucinda, Juliana, and many others who’ve helped out
in ways both large and small.
Special thanks to my son Will for not only installing and managing my extensive dev lab for all my books since Windows 8 Pocket Consultant but for also
performing check reads of all those books as well.
—William R. Stanek



Contents at a glance

Chapter 1
Introducing Windows Server 2012 R2. . . . . . . . . 1
Chapter 2
Deploying Windows Server 2012 R2 . . . . . . . . . 57
Chapter 3
Boot configuration . . . . . . . . . . . . . . . . . . . . . . . . 97
Chapter 4
Managing Windows Server 2012 R2 . . . . . . . 131
. .
Chapter 5
Windows Server 2012 R2 MMC
administration . . . . . . . . . . . . . . . . . . . . . . . . . . . 157

Chapter 6
Configuring roles, role services, and
features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Chapter 7
Managing and troubleshooting hardware . . 227
Chapter 8
Managing the registry . . . . . . . . . . . . . . . . . . . . 267
Chapter 9
Software and User Account Control
administration . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Chapter 10
Performance monitoring and tuning. . . . . . . . 331

Chapter 11
Comprehensive performance analysis
and logging . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
. .
Chapter 12
Storage management essentials. . . . . . . . . . . 441
Chapter 13
Configuring disks and storage . . . . . . . . . . . 477
. .
Chapter 14
TPM and BitLocker Drive Encryption. . . . . . . . 533
Chapter 15
File system essentials . . . . . . . . . . . . . . . . . . . . 581
. .
Chapter 16
Maintaining and optimizing storage. . . . . . . . 621
Chapter 17

Managing storage spaces. . . . . . . . . . . . . . . . . . 651
Chapter 18
Managing file sharing. . . . . . . . . . . . . . . . . . . . 687
Chapter 19
File security, access controls, and auditing. . . 733
Chapter 20
Managing file screening and storage
reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767

v



Table of contents

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Who is this book for? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Conventions used in this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
How to reach the author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Errata & book support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
We want to hear from you . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Stay in touch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix

Chapter 1

Introducing Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Getting to know Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Windows 8.1 and Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Planning for Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Your plan: The big picture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Identifying your organizational teams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Assessing project goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Analyzing the existing network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Defining objectives and scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Defining the new network environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Final considerations for planning and deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Thinking about server roles and Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Planning for server usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Designing the Active Directory namespace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Managing domain trusts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Identifying the domain and forest functional level . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Defining Active Directory server roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Planning for availability, scalability, and manageability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Planning for software needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Planning for hardware needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can improve our books and learning resources
for you. To participate in a brief survey, please visit:

/>
vii


viii

Table of contents

Chapter 2


Deploying Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Getting a quick start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing for a Windows Server 2012 R2 installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding installation options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining which installation type to use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preinstallation tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installation on BIOS-based systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installation on EFI-based systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Planning partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Naming computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Network and domain membership options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Performing a clean installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Performing an upgrade installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Activation sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Performing additional administration tasks during installations . . . . . . . . . . . . . . . . . . . . . .
Accessing a command prompt during installation . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Forcing disk-partition removal during installation . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Loading mass storage drivers during installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating, deleting, and extending disk partitions during installation . . . . . . . . . . . .
Troubleshooting installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Start with the potential points of failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Continue past lockups and freezes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Postinstallation tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 3

57

59
60
60
62
64
65
66
67
68
68
70
71
73
77
78
80
81
84
85
86
87
87
89
91

Boot configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Boot from hardware and firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Hardware and firmware power states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Diagnosing hardware and firmware startup problems . . . . . . . . . . . . . . . . . . . . . . . . 99
Resolving hardware and firmware startup problems . . . . . . . . . . . . . . . . . . . . . . . . . 103

Boot environment essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Managing startup and boot configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Managing startup and recovery options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Managing System Boot Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Working with BCD Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Managing the boot configuration data store and its entries . . . . . . . . . . . . . . . . . . . . . . . . 114
Viewing BCD entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Creating and identifying the BCD store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Importing and exporting the BCD store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Creating, copying, and deleting BCD entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Setting BCD entry values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Changing Data Execution Prevention and physical address extension options . . 126
Changing the operating system display order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Changing the default operating system entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Changing the default timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Changing the boot sequence temporarily . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129




Chapter 4

Table of contents

Managing Windows Server 2012 R2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Working with the administration tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Control Panel utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using graphical administrative tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using command-line utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with Server Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Getting to know Server Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding servers for management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating server groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling remote management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with Computer Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Computer Management system tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Computer Management storage tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Computer Management Services And Applications tools . . . . . . . . . . . . . . . . . . . . .

Chapter 5

131
134
135
139
144
144
149
150
151
153
154
155
155

Windows Server 2012 R2 MMC administration . . . . . . . . . . . . . . . . . . . 157
Using the MMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MMC snap-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MMC modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MMC window and startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

MMC tool availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MMC and remote computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Building custom MMCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 1: Creating the console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 2: Adding snap-ins to the console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Step 3: Saving the finished console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Designing custom taskpads for the MMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting started with taskpads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding taskpad view styles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating and managing taskpads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating and managing tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Publishing and distributing your custom tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 6

ix

157
158
160
162
164
167
168
169
170
175
179
180
182

183
186
192

Configuring roles, role services, and features . . . . . . . . . . . . . . . . . . . . 193
Using roles, role services, and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Making supplemental components available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing components with Server Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing configured roles and role services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing server roles and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing server binaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing components at the prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Going to the prompt for Server Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding component names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tracking installed roles, role services, and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing components at the prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Removing components at the prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

194
200
201
201
202
209
213
214
215
220
221
224



x

Table of contents

Chapter 7

Managing and troubleshooting hardware . . . . . . . . . . . . . . . . . . . . . . . 227
Understanding hardware installation changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Choosing internal devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Choosing external devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding device installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing new devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing device and driver details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with device drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Device driver essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding and troubleshooting driver signing . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing driver information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing Advanced, Resources, and other settings . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing and updating device drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Restricting device installation by using Group Policy . . . . . . . . . . . . . . . . . . . . . . . . .
Rolling back drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Removing device drivers for removed devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Uninstalling, reinstalling, and disabling device drivers . . . . . . . . . . . . . . . . . . . . . . . .
Managing hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding non–Plug and Play, older hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling and disabling hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Resolving resource conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 8

227
227
230
233
233
237
243
246
246
247
247
250
252
255
256
257
258
258
258
260
260
264

Managing the registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Introducing the registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding the registry structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Registry root keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
HKEY_LOCAL_MACHINE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
HKEY_USERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
HKEY_CLASSES_ROOT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
HKEY_CURRENT_CONFIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
HKEY_CURRENT_USER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Registry data: How it is stored and used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Where registry data comes from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Types of registry data available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Registry administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching the registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modifying the registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modifying the registry of a remote machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Importing and exporting registry data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Loading and unloading hive files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with the registry from the command line . . . . . . . . . . . . . . . . . . . . . . . . . .
Backing up and restoring the registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Maintaining the registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Microsoft Fix It Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Removing registry settings for active installations that have failed . . . . . . . . . . . . .

267
270
274
275
281
282
282
282
283

283
284
286
286
287
290
291
294
294
296
297
298
299




xi

Removing partial or damaged settings for individual applications . . . . . . . . . . . . .
Securing the registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preventing access to the registry utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Applying permissions to registry keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Controlling remote registry access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Auditing registry access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 9

Table of contents


299
300
300
302
305
307

Software and User Account Control administration . . . . . . . . . . . . . . . 311
Software installation essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mastering User Account Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Elevation, prompts, and the secure desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring UAC and Admin Approval Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Maintaining application integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application access tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application run levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring run levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Controlling application installation and run behavior . . . . . . . . . . . . . . . . . . . . . . . .

311
314
315
317
321
321
324
326
328

Chapter 10 Performance monitoring and tuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Tuning performance, memory usage, and data throughput . . . . . . . . . . . . . . . . . . . . . . . .

Tuning Windows operating system performance . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tuning processor scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tuning virtual memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Other important tuning, memory, and data considerations . . . . . . . . . . . . . . . . . . .
Tracking a system’s general health . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting processor and memory usage for troubleshooting . . . . . . . . . . . . . . . . . . .
Getting information on running applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring and troubleshooting processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring and troubleshooting services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting network usage information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting information on user and remote user sessions . . . . . . . . . . . . . . . . . . . . . . .
Tracking events and troubleshooting by using Event Viewer . . . . . . . . . . . . . . . . . . . . . . .
Understanding the event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accessing the event logs and viewing events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing event logs on remote systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sorting, finding, and filtering events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Archiving event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tracking events using Windows PowerShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using subscriptions and forwarded events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

331
331
332
333
338
339
339
343
350

353
359
362
363
366
367
369
374
375
379
381
383

Chapter 11 Comprehensive performance analysis and logging . . . . . . . . . . . . . . . 387
Establishing performance baselines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tracking per-process resource usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tracking the overall reliability of the server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Comprehensive performance monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Performance Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

388
389
399
402
402


xii

Table of contents


Selecting performance objects and counters to monitor . . . . . . . . . . . . . . . . . . . . .
Choosing views and controlling the display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring performance remotely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolving performance bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolving memory bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolving processor bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolving disk I/O bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolving network bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Performance logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating and managing data collector sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Viewing data collector reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring performance counter alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring performance from the command line . . . . . . . . . . . . . . . . . . . . . . . . . . .
Analyzing trace logs at the command line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

404
406
410
412
412
415
416
418
421
422
431
434
435
439


Chapter 12 Storage management essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Essential storage technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using internal and external storage devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Storage-management features and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Storage-management role services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Booting from SANs and using SANs with clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with SMB 3.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing and configuring file services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the File And Storage Services role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring multipath I/O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Meeting performance, capacity, and availability requirements . . . . . . . . . . . . . . . .
Configuring Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

441
442
445
449
453
455
458
459
462
467
469

Chapter 13 Configuring disks and storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Configuring storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Disk Management tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding new disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Using the MBR and GPT partition styles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the disk storage types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating and managing virtual hard disks for Hyper-V . . . . . . . . . . . . . . . . . . . . . . .
Converting FAT or FAT32 to NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with removable disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing MBR disk partitions on basic disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating partitions and simple volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Formatting a partition, logical drive, or volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring drive letters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring mount points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Extending partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Shrinking partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting a partition, logical drive, or volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing GPT disk partitions on basic disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ESP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

477
477
482
484
489
493
496
497
498
498
502
504
506
507

511
513
514
514




Table of contents

xiii

MSR partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Primary partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
LDM Metadata and LDM Data partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
OEM or unknown partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing volumes on dynamic disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a simple or spanned volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring RAID 0: Striping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Recovering a failed simple, spanned, or striped disk . . . . . . . . . . . . . . . . . . . . . . . . .
Moving dynamic disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring RAID 1: Disk mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mirroring boot and system volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring RAID 5: Disk striping with parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Breaking or removing a mirrored set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolving problems with mirrored sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Repairing a mirrored system volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolving problems with RAID-5 sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

515

516
517
517
517
518
520
521
521
522
524
528
529
530
531
532

Chapter 14 TPM and BitLocker Drive Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Working with trusted platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing TPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding TPM states and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing TPM owner authorization information . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing and initializing a TPM for first use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Turning an initialized TPM on or off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Clearing the TPM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the TPM owner password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Introducing BitLocker Drive Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitLocker essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitLocker modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
BitLocker changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using hardware encryption, secure boot, and Network Unlock . . . . . . . . . . . . . . . . . . . . .

Hardware-encrypted drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Optimizing encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting permitted encryption types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing BitLocker for startup authentication and secure boot . . . . . . . . . . . . . . .
Using Network Unlock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Provisioning BitLocker prior to deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deploying BitLocker Drive Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up and managing BitLocker Drive Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring and enabling BitLocker Drive Encryption . . . . . . . . . . . . . . . . . . . . . . . .
Determining whether a computer has BitLocker-encrypted volumes . . . . . . . . . . .
Enabling BitLocker on fixed data drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling BitLocker on removable data drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling BitLocker on operating-system volumes . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing and troubleshooting BitLocker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

533
535
535
538
540
543
543
545
546
547
548
550
551
551
553

554
555
556
558
558
563
564
567
568
570
572
576


xiv

Table of contents

Chapter 15 File system essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
Understanding the disk and file-system structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using FAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File allocation table structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FAT features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NTFS structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NTFS features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Analyzing the NTFS structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Advanced NTFS features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hard links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Change journals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Object identifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reparse points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sparse files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Transactional NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using ReFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ReFS features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ReFS structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ReFS advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ReFS integrity streams, data scrubbing, and salvage . . . . . . . . . . . . . . . . . . . . . . . . .
Using file-based compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NTFS compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Compressed (zipped) folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

581
585
585
586
588
589
593
594
596
597
598
600
602
603
605
606

608
608
610
612
613
615
615
618

Chapter 16 Maintaining and optimizing storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Managing NTFS disk quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How quota management works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring disk quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing quota entries for individual users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing disk quotas after configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Exporting and importing quota entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automated disk maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preventing disk-integrity problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Running Check Disk interactively . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Analyzing FAT volumes by using ChkDsk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Analyzing NTFS volumes by using ChkDsk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Repairing volumes and marking bad sectors by using ChkDsk . . . . . . . . . . . . . . . .
Automated optimization of disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preventing fragmentation of disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Fixing fragmentation by using Optimize Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding the fragmentation analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

621
621
623

625
629
631
632
632
635
638
638
639
640
640
643
646

Chapter 17 Managing storage spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Understanding storage spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Using and configuring offloaded transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653




Table of contents

xv

Understanding how offloaded transfers work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Verifying support for offloaded transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with available storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Storage Management Essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating storage pools and allocating space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Creating storage spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a virtual disk in a storage space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a standard volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Diagnosing and resolving problems with storage spaces . . . . . . . . . . . . . . . . . . . . .
Configuring data deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding data deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting data for deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Interoperability with data deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deduplicating volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

654
655
656
656
660
661
665
670
673
675
675
676
677
678
682

Chapter 18Managing file sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
File-sharing essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding file-sharing models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Enabling file sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using and finding shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Navigating SMB versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hiding and controlling share access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Special and administrative shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accessing shares for administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating and publishing shared folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating shares by using File Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating shares by using Computer Management . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating shared folders in Server Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing shared folder settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Publishing shares in Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing share permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding share permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring share permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring synced sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding Work Folders and sync shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deploying sync shares through Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating sync shares and enabling SMB access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accessing Work Folders on clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

688
688
689
691
696
697
698
700
700

701
705
709
714
715
716
716
718
722
722
725
727
731

Chapter 19 File security, access controls, and auditing . . . . . . . . . . . . . . . . . . . . . . . 733
Managing access permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File and folder ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Permission inheritance for files and folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring access permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing file shares after configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

733
734
735
738
746
748



xvi

Table of contents

Managing claims-based access controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding central access policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling dynamic controls and claims-based policy . . . . . . . . . . . . . . . . . . . . . . . . .
Defining central access policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Auditing file and folder access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling basic auditing for files and folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling advanced auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specifying files and folders to audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Extending access policies to auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring the security logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

750
751
751
753
755
757
758
760
764
766

Chapter 20 Managing file screening and storage reporting . . . . . . . . . . . . . . . . . . 767
Understanding file screening and storage reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing file screening and storage reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing global file-resource settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Managing the file groups to which screens are applied . . . . . . . . . . . . . . . . . . . . . .
Managing file-screen templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating file screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Defining file-screening exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Scheduling and generating storage reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

767
771
772
782
783
786
786
787

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791

What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our books and learning
resources for you. To participate in a brief online survey, please visit:

microsoft.com/learning/booksurvey


Introduction
Welcome to Windows Server 2012 R2 Inside Out: Configuration, Storage, & Essentials. As the
author of many popular technology books, I’ve been writing professionally about Windows
and Windows Server since 1994. Over the years, I’ve gained a unique perspective—the kind
of perspective you can gain only after working with technologies for many years. The advantage for you, the reader, is that my solid understanding of these technologies allowed me to
dig into Windows Server 2012 R2 architecture, internals, and configuration to see how things

really work under the hood and then pass this information on to you throughout this book.
Anyone transitioning to Windows Server 2012 R2 from Windows Server 2012 may be surprised
at just how much has been updated; changes both subtle and substantial have been made
throughout the operating system. For anyone transitioning to Windows Server 2012 R2 from
Windows Server 2008 R2 or an earlier release of Windows Server, I’ll let you know right up
front that Windows Server 2012 and Windows Server 2012 R2 are substantially different from
earlier versions of Window Server. Not only are there major changes throughout the operating system, but this just might be the first version of Windows Server that you manage using a
touch-based user interface. If you do end up managing it this way, mastering the touch-based
UI and the revised interface options will be essential for your success. For this reason, I discuss
both the touch UI and the traditional mouse-and-keyboard techniques throughout this book.
When you are working with touch UI–enabled computers, you can manipulate onscreen elements in ways that weren’t possible previously. You can enter text by using the onscreen keyboard and manipulate onscreen elements in the following ways:
●●

●●

●●

●●

Tap.  Tap an item by touching it with your finger. A tap or double-tap of elements on
the screen generally is the equivalent of a mouse click or double-click.
Press and hold.  Press your finger down and leave it there for a few seconds. Pressing
and holding elements on the screen generally is the equivalent of a right-click.
Swipe to select.  Slide an item a short distance in the opposite direction of how the
page scrolls. This selects the items and might bring up related commands. If pressing
and holding doesn’t display commands and options for an item, try swiping to select
instead.
Swipe from edge (slide in from edge).  Starting from the edge of the screen, swipe or
slide in. Sliding in from the right edge opens the Charms panel. Sliding in from the left
edge shows open apps, and then you can easily switch between them. Sliding in from

the top or bottom edge shows commands for the active element.

xvii


xviii Introduction

●●

●●

Pinch.  Touch an item with two or more fingers and then move those fingers toward
each other. Pinching zooms out.
Stretch.  Touch an item with two or more fingers and then move those fingers away
from each other. Stretching zooms in.

Who is this book for?
In this book, I teach you how server roles, role services, and features work; why they work the
way they do; and how to customize them to meet your needs. Regardless of your job title, if
you’re deploying, configuring, managing, or maintaining Windows Server 2012 R2, this book
is for you. To pack in as much information as possible, I had to assume that you have basic
networking skills and a basic understanding of Windows Server and that you are familiar with
Windows commands and procedures. With this in mind, I don’t devote entire chapters to basic
skills or why you want to use Windows Server. Instead, I focus on configuration, security, file
systems, storage management, performance analysis, performance tuning, troubleshooting,
and much more.

Conventions used in this book
The following conventions are used in this book:
●●


●●

●●

●●

●●

Abbreviated menu commands.  For your convenience, this book uses abbreviated
menu commands. For example, “Tap or click Tools, Track Changes, Highlight Changes”
means that you should tap or click the Tools menu, select Track Changes, and then tap
or click the Highlight Changes command.
Boldface type.  Boldface type indicates text that you enter or type.
Initial capital letters.  The first letters of the names of menus, dialog boxes, dialog box
elements, and commands are capitalized. Example: the Save As dialog box.
Italicized type.  Italicized type indicates new terms.
Plus sign (+) in text.  Keyboard shortcuts are indicated by a plus sign (+) separating
two key names. For example, Ctrl+Alt+Delete means that you press the Ctrl, Alt, and
Delete keys at the same time.

How to reach the author
Email:
Web: />



Introduction

xix


Facebook: />Twitter: />
Errata & book support
We’ve made every effort to ensure the accuracy of this book. Any errors that have been
reported since this book was published are listed:
/>If you find an error that is not already listed, you can report it to us through the same page.
If you need additional support, email Microsoft Press Book Support at

Please note that product support for Microsoft software is not offered through the
addresses above.

We want to hear from you
At Microsoft Press, your satisfaction is our top priority and your feedback our most valuable
asset. Please tell us what you think of this book at:
/>The survey is short, and we read every one of your comments and ideas. Thanks in advance for
your input!

Stay in touch
Let’s keep the conversation going! We’re on Twitter: />


C HA PT E R 1

Getting to know Windows Server 2012 R2 . . . . . . . . . . . . . 2

Thinking about server roles and Active Directory. . . . . . 35

Windows 8.1 and Windows Server 2012 R2 . . . . . . . . . . . 6
. .


Chapter 1

Introducing Windows Server
2012 R2

Planning for availability, scalability,
and manageability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Planning for Windows Server 2012 R2. . . . . . . . . . . . . . . . . 8

Windows Server 2012 R2 is the most powerful, versatile, and fully featured server operating
system from Microsoft yet. If you’ve been using Windows Server operating systems for a while,
I think you’ll be impressed. Why? For starters, Windows Server 2012 R2 includes a significantly
enhanced operating system kernel, the NT 6.3 kernel. Because Windows 8.1 uses this kernel
also, the two operating systems share a common code base and many common features,
enabling you to apply readily what you know about Windows 8.1 to Windows Server 2012 R2.
In Windows Server 2012 R2, Microsoft delivers a server operating system that is something
more than the sum of its parts. It isn’t just a server operating system or a network operating
system. It is a best-of-class operating system with the foundation technologies necessary to
provide networking, application, web, and cloud-based services that can be used anywhere
within your organization. From top to bottom, Windows Server 2012 R2 is dramatically different from earlier releases of Windows Server operating systems—so much so that it also has an
entirely new interface.
The way you approach Windows Server 2012 R2 will depend on your background and your
implementation plans. If you are moving to Windows Server 2012 R2 from an early Windows
server operating system or switching from UNIX, you’ll find that Windows Server 2012 R2 is
a significant change that requires a whole new way of thinking about the networking, application services, and interoperations between clients and servers. The learning curve will be
steep, but you will find clear transition paths to Windows Server 2012 R2. You will also find
that Windows Server 2012 R2 has an extensive command-line interface that makes it easier
to manage servers, workstations, and, indeed, the entire network, using both graphical and
command-line administration tools.

If you are moving from Windows Server 2008 or Windows Server 2008 R2 to Windows Server
2012 R2, you’ll find the changes are no less significant but are easier to understand. You are
already familiar with the core technologies and administration techniques. Your learning curve
might still be steep, but in only some areas, not all of them.
You can also adopt Windows Server 2012 R2 incrementally. For example, you might add
Windows Server 2012 R2 Print And Document Services and Windows Server 2012 R2 File And

1


2

Chapter 1  Introducing Windows Server 2012 R2

C
hapter 1

Storage Services to enable the organization to take advantage of the latest enhancements and
capabilities without implementing a full transition of existing servers. In most but not all cases,
incremental adoption has little or no impact on the network while allowing the organization
to test new technologies and roll out features incrementally to users as part of a standard continuance or upgrade process.
Regardless of your deployment plans and whether you are reading this book to prepare for
implementation of Windows Server 2012 R2 or to manage existing implementations, my mission in this book is to help you take full advantage of all the features in Windows Server 2012
R2. You will find the detailed inside information you need to get up to speed quickly with
Windows Server 2012 R2 changes and technologies; to make the right setup and configuration choices the first time; and to work around the rough edges, annoyances, and faults of this
complex operating system. If the default settings are less than optimal, I show you how to fix
them so that things work the way you want them to work. If something doesn’t function like it
should, I let you know, and I show you the fastest, surest way to work around the issue. You’ll
find plenty of hacks and secrets, too.
To pack as much information as possible into this book, I am assuming that you have basic

networking skills and some experience managing Windows-based networks and don’t need
me to explain the basic structure and architecture of an operating system. Therefore, I won’t
waste your time answering such questions as, “What’s the point of networks?” or “Why use
Windows Server 2012 R2?” or “What’s the difference between the GUI and the command
line?” Instead, I start with a discussion of what Windows Server 2012 R2 has to offer so that
you can learn about changes that will most affect you, and then I follow this discussion with a
comprehensive, informative look at Windows Server 2012 R2 planning and installation.

Getting to know Windows Server 2012 R2
A primary purpose of Windows Server 2012 R2 is to ensure that the operating system can be
optimized for use in small, medium, and large enterprises. An edition of the server operating system is available to meet your organization’s needs whether you want to deploy a basic
server for hosting applications, a network server for hosting domain services, a robust enterprise server for hosting essential applications, or a highly available data center server for hosting critical business solutions.
Windows Server 2012 R2 is available for production use only on 64-bit hardware. ­ ixty-four-bit
S
computing has changed substantially since it was first introduced for Windows operating systems. Computers running 64-bit versions of Windows not only perform better and run faster
than their 32-bit counterparts but also are more scalable because they can process more data
per clock cycle, address more memory, and perform numeric calculations faster. The primary
64-bit architecture Windows Server 2012 R2 supports is based on 64-bit extensions to the x86
instructions set, which is implemented in AMD64 processors, Intel Xeon processors with 64-bit


Getting to know Windows Server 2012 R2

3

extension technology, and other processors. This architecture offers native 32-bit processing
and 64-bit extension processing, allowing simultaneous 32-bit and 64-bit computing.

Inside OUT
Running 32-bit applications on 64-bit hardware

In most cases, 64-bit hardware is compatible with 32-bit applications; however, 32-bit
applications typically perform better on 32-bit hardware. Windows Server 2012 R2
64-bit editions support both 64-bit and 32-bit applications using the Windows on
Windows 64 (WOW64) x86 emulation layer. The WOW64 subsystem isolates 32-bit
applications from 64-bit applications. This prevents file system and registry problems.
The operating system provides interoperability across the 32-bit/64-bit boundary for
Component Object Model (COM) and basic operations such as cut, copy, and paste
from the Clipboard. However, 32-bit processes cannot load 64-bit dynamic-link libraries
(DLLs), and 64-bit processes cannot load 32-bit DLLs.

Sixty-four-bit computing is designed for performing operations that are memory-intensive
and require extensive numeric calculations. With 64-bit processing, applications can load large
data sets entirely into physical memory (that is, random access memory [RAM]), which reduces
the need to page to disk and increases performance substantially.

NOTE
In this text, I typically refer to 32-bit systems designed for x86 architecture as 32-bit
systems and 64-bit systems designed for x64 architecture as 64-bit systems. Support for
Itanium 64-bit (IA-64) processors is no longer standard in Windows operating systems.

Running instances of Windows Server 2012 R2 can be in either a physical operating system
environment or a virtual operating system environment. To support mixed environments better, Microsoft introduced a new licensing model based on the number of processors, users, and
virtual operating system environments. Thus, the four main product editions can be used as
follows:
●●

Windows Server 2012 R2 Foundation.  Has limited features and is available only from
original equipment manufacturers (OEMs). This edition supports one physical processor,
up to 15 users, and one physical environment, but it does not support virtualized environments. Although there is a specific user limit, a separate client access license (CAL) is
not required for every user or device accessing the server.


Chapter 1




4

Chapter 1  Introducing Windows Server 2012 R2

●●

C
hapter 1

●●

●●

Windows Server 2012 R2 Essentials.  Has limited features. This edition supports up to
two physical processors, up to 25 users, and one physical environment, but it does not
support virtualized environments. Although there is a specific user limit, a separate CAL
is not required for every user or device accessing the server.
Windows Server 2012 R2 Standard.  Has all the key features. It supports up to 64
physical processors, one physical environment, and up to two virtual instances. Two
incremental virtual instances and two incremental physical processors are added for
each Standard license. Thus, a server with four processors, one physical environment,
and four virtual instances would need two Standard licenses, and the same server with
eight virtual environments would need four Standard licenses. CALs are required for
every user or device accessing the server.

Windows Server 2012 R2 Datacenter.  Has all the key features. It supports up to 64
physical processors, one physical environment, and unlimited virtual instances. Two
incremental physical processors are added for each Datacenter license. Thus, a server
with two processors, one physical environment, and 32 virtual instances would need
only one Datacenter license, but the same server with four processors would need two
Datacenter licenses. CALs are required for every user or device accessing the server.

NOTE
Windows Server 2012 R2 Datacenter is not available for retail purchase. If you want to
use the Datacenter edition, you need to purchase it through Volume Licensing, an OEM,
or a Services Provider License Agreement (SPLA).

You implement virtual operating system environments by using Hyper-V, a virtual-machine
technology that enables multiple guest operating systems to run concurrently on one computer and provides separate applications and services to client computers, as shown in
Figure 1-1. As part of the Hyper-V role, which can be installed on servers with x64-based processors that implement hardware-assisted virtualization and hardware data execution protection, the Windows hypervisor acts as the virtual machine engine, providing the necessary layer
of software for installing guest operating systems. For example, you can use this technology to
run Ubuntu, Linux, and Windows Server 2012 R2 concurrently on the same computer.


Getting to know Windows Server 2012 R2

5

Chapter 1



Figure 1-1  A conceptual view of virtual machine technology.

NOTE

With Hyper-V enabled, Windows Server 2012 R2 Standard and Windows Server 2012
R2 Datacenter support up to 320 logical processors. Otherwise, these operating systems support up to 640 logical processors.

For traffic routing between virtual and physical networks, Windows Server 2012 R2 includes
Windows Server Gateway, which is integrated with Hyper-V Network Virtualization. You
can use Windows Server Gateway to route network traffic regardless of where resources are
located, enabling you to support integration of public and private cloud services with your
internal networks and integration of multitenant implementations with Network Address
Translation (NAT) and virtual private networks (VPNs).
Hyper-V also is included as a feature of Windows 8.1 Pro and Windows 8.1 Enterprise. The
number of virtual machines you can run on any individual computer depends on the computer’s hardware configuration and workload. During setup, you specify the amount of memory
available to a virtual machine. Although that memory allocation can be changed, the amount
of memory actively allocated to a virtual machine cannot be otherwise used. Virtualization can
offer performance improvements, reduce the number of servers, and reduce the total cost of
ownership (TCO).


×