Book Image

Mastering Windows Server 2019 - Second Edition

By : Jordan Krause
Book Image

Mastering Windows Server 2019 - Second Edition

By: Jordan Krause

Overview of this book

Mastering Windows Server 2019 – Second Edition covers all of the essential information needed to implement and utilize this latest-and-greatest platform as the core of your data center computing needs. You will begin by installing and managing Windows Server 2019, and by clearing up common points of confusion surrounding the versions and licensing of this new product. Centralized management, monitoring, and configuration of servers is key to an efficient IT department, and you will discover multiple methods for quickly managing all of your servers from a single pane of glass. To this end, you will spend time inside Server Manager, PowerShell, and even the new Windows Admin Center, formerly known as Project Honolulu. Even though this book is focused on Windows Server 2019 LTSC, we will still discuss containers and Nano Server, which are more commonly related to the SAC channel of the server platform, for a well-rounded exposition of all aspects of using Windows Server in your environment. We also discuss the various remote access technologies available in this operating system, as well as guidelines for virtualizing your data center with Hyper-V. By the end of this book, you will have all the ammunition required to start planning for, implementing, and managing Windows.
Table of Contents (15 chapters)

Questions

  1. What is the name of the anti-malware product built into Windows Server 2019?
  2. When a domain-joined computer is sitting inside the corporate LAN, which Windows Defender Firewall profile should be active?
  3. Other than the Domain profile, what are the other two possible firewall profiles inside Windows Defender Firewall?
  4. When creating a firewall rule to allow IPv4 ping replies, what protocol type must you specify inside your inbound rule?
  5. What is the easiest way to push standardized Windows Defender Firewall rules to your entire workforce?
  6. A virtual machine whose virtual hard disk file is encrypted is called a...?
  7. What is the name of the Microsoft technology that parses domain controller information in order to identify pass-the-hash and pass-the-ticket attacks?