Windows Server 2022 & PowerShell All-in-One For Dummies - Sara Perrott - E-Book

Windows Server 2022 & PowerShell All-in-One For Dummies E-Book

Sara Perrott

0,0
33,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

All the essentials for administering Windows Server 2022 in one book Looking for a little help installing, configuring, securing, or running a network running Windows Server 2022? Windows Server 2022 & PowerShell All-in-One For Dummies delivers a thorough guide to network administration in a single, convenient book. Whether you need to start from scratch and install a new server or want to jump right into a more advanced topiclike managing security or working in Windows PowerShellyou'll find what you need right here. In this 8-books-in-1 compilation, you'll: * Learn what you need to install and set up a brand-new Windows server installation * Configure your Windows Server and customize its settings based on your needs and preferences * Discover how to install, configure, and work with Containers The perfect book for server and system admins looking for a quick reference on Windows Server operation, this book is also a great resource for networking newcomers learning their way around the server software they'll encounter daily.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 884

Veröffentlichungsjahr: 2022

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Windows Server® 2022 & PowerShell® All-in-One For Dummies®

Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com

Copyright © 2022 by John Wiley & Sons, Inc., Hoboken, New Jersey

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHORS HAVE USED THEIR BEST EFFORTS IN PREPARING THIS WORK, THEY MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES REPRESENTATIVES, WRITTEN SALES MATERIALS OR PROMOTIONAL STATEMENTS FOR THIS WORK. THE FACT THAT AN ORGANIZATION, WEBSITE, OR PRODUCT IS REFERRED TO IN THIS WORK AS A CITATION AND/OR POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE PUBLISHER AND AUTHORS ENDORSE THE INFORMATION OR SERVICES THE ORGANIZATION, WEBSITE, OR PRODUCT MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING PROFESSIONAL SERVICES. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR YOUR SITUATION. YOU SHOULD CONSULT WITH A SPECIALIST WHERE APPROPRIATE. FURTHER, READERS SHOULD BE AWARE THAT WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. NEITHER THE PUBLISHER NOR AUTHORS SHALL BE LIABLE FOR ANY LOSS OF PROFIT OR ANY OTHER COMMERCIAL DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR OTHER DAMAGES.

For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For technical support, please visit www.wiley.com/techsupport.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2022930649

ISBN 978-1-119-86782-1 (pbk); ISBN 978-1-119-86784-5 (ebk); ISBN 978-1-119-86783-8 (ebk)

Windows Server® 2022 & PowerShell® All-in-One For Dummies®

To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Windows Server 2022 & PowerShell All-in-One For Dummies Cheat Sheet” in the Search box.

Table of Contents

Cover

Title Page

Copyright

Introduction

About This Book

Foolish Assumptions

Icons Used in This Book

Beyond the Book

Where to Go from Here

Book 1: Installing and Setting Up Windows Server 2022

Chapter 1: An Overview of Windows Server 2022

Extra! Extra! Read All About It! Seeing What’s New in Windows Server 2022

Deciding Which Windows Server 2022 Edition Is Right for You

Walking the Walk: Windows Server 2022 User Experiences

Seeing What Server Manager Has to Offer

Windows Admin Center: Your New Best Friend

Extending and Improving Your Datacenter

Chapter 2: Using Boot Diagnostics

Accessing Boot Diagnostics

Using Advanced Boot Options

Performing a Memory Test

Using the Command Prompt

Working with Third-Party Boot Utilities

Chapter 3: Performing the Basic Installation

Making Sure You Have What It Takes

Performing a Clean Install

Upgrading Windows

Performing a Network Install with Windows Deployment Services

Chapter 4: Performing Initial Configuration Tasks

Understanding Default Settings

Getting an Overview of the Configuration Process

Providing Computer Information

Updating Windows Server 2022

Customizing Windows Server 2022

Configuring Startup Options with BCDEdit

Book 2: Configuring Windows Server 2022

Chapter 1: Configuring Server Roles and Features

Using Server Manager

Understanding Server Roles

Understanding Server Features

Chapter 2: Configuring Server Hardware

Working with Device Manager

Using the Add Hardware Wizard

Performing Hard-Drive-Related Tasks

Performing Printer-Related Tasks

Performing Other Configuration Tasks

Chapter 3: Using the Settings Menu

Accessing the Settings Menu

Understanding Settings Menu Items

Chapter 4: Working with Workgroups

Knowing What a Workgroup Is

Knowing If a Workgroup Is Right for You

Comparing Centralized and Group Sharing

Configuring a Server for a Workgroup

Managing Workgroups

Examining the Peer Name Resolution Protocol

Chapter 5: Promoting Your Server to Domain Controller

Understanding Domains

Preparing to Create a Domain

Performing Domain Configuration Prerequisites

Configuring the Server as a Domain Controller

Wrapping Things Up

Chapter 6: Managing DNS and DHCP with IP Address Management

Installing IP Address Management

Configuring IP Address Management

Using IP Address Management

Book 3: Administering Windows Server 2022

Chapter 1: An Overview of the Tools Menu in Server Manager

Accessing the Server Manager Tools Menu

Working with Common Administrative Tools

Installing and Using Remote Server Administration Tools

Chapter 2: Setting Group Policy

Understanding How Group Policy Works

Starting the Group Policy Editor

Performing Computer Management

Performing User Configuration

Viewing Resultant Set of Policy

Chapter 3: Configuring the Registry

Starting Registry Editor

Importing and Exporting Registry Elements

Finding Registry Elements

Understanding Registry Data Types

Understanding the Hives

Loading and Unloading Hives

Connecting to Network Registries

Setting Registry Security

Chapter 4: Working with Active Directory

Active Directory 101

Configuring Objects in Active Directory

Chapter 5: Performing Standard Maintenance

Activating Windows

Configuring the User Interface

Understanding How User Access Control Affects Maintenance Tasks

Adding and Removing Standard Applications

Measuring Reliability and Performance

Protecting the Data on Your Server

Performing Disk Management Tasks

Automating Diagnostic Tasks with Task Scheduler

Working with Remote Desktop

Working with Remote Server Administration Tools

Working with Admin Center

Creating a Windows Recovery Drive

Chapter 6: Working at the Command Line

Opening an Administrative Command Prompt

Configuring the Command Line

Setting Environmental Variables

Getting Help at the Command Line

Understanding Command Line Symbols

Chapter 7: Working with PowerShell

Opening an Administrative PowerShell Window

Configuring PowerShell

Customizing PowerShell a Little Further

Using a Profile Script

Setting Environmental Variables

Getting Help in PowerShell

Understanding PowerShell Punctuation

Book 4: Configuring Networking in Windows Server 2022

Chapter 1: Overview of Windows Server 2022 Networking

Getting Acquainted with the Network and Sharing Center

Using the Network Connections Tools

Configuring TCP/IP

Understanding DHCP

Defining DNS

Chapter 2: Performing Basic Network Tasks

Viewing Network Properties

Connecting to Another Network

Managing Network Connections

Chapter 3: Accomplishing Advanced Network Tasks

Working with Remote Desktop Services

Working with Network Policy and Access Services

Troubleshooting at the Command Line

Chapter 4: Diagnosing and Repairing Network Connection Problems

Using Windows Network Diagnostics

Repairing Individual Connections

Network Troubleshooting at the Command Line

Working with Windows Firewall

Making Sense of Common Configuration Errors

Working with Other Troubleshooting Tools

Book 5: Managing Security with Windows Server 2022

Chapter 1: Understanding Windows Server 2022 Security

Understanding Basic Windows Server Security

Working with Files and Folders

Creating a Local Security Policy

Paying Attention to Windows Security

Chapter 2: Configuring Shared Resources

Comparing Share Security with File System Security

Sharing Resources

Configuring Access with Federated Rights Management

Working with Active Directory Rights Management Services

Chapter 3: Configuring Operating System Security

Understanding and Using User Account Control

Managing User Passwords

Understanding Credential Guard

Configuring Startup and Recovery Options

Hardening Your Server

Chapter 4: Working with the Internet

Firewall Basics

Configuring Windows Defender Firewall with Advanced Security

Chapter 5: Understanding Digital Certificates

Certificates in Windows Server 2022

Types of Certificates in Active Directory Certificate Services

Chapter 6: Installing and Configuring AD CS

Introducing Certificate Authority Architecture

Installing a Certificate Authority

Configuring Certificate Auto-Enrollment

Chapter 7: Securing Your DNS Infrastructure

Understanding DNSSEC

Understanding DANE

Protecting DNS Traffic with DNS-over-HTTPS

Book 6: Working with Windows PowerShell

Chapter 1: Introducing PowerShell

Understanding the Basics of PowerShell

Using PowerShell

Running PowerShell Remotely

Getting Help in PowerShell

Identifying Security Issues with PowerShell

Chapter 2: Understanding the .NET Framework

Introducing the Various Versions of .NET Framework

Focusing on New Features in .NET 4.8

Viewing the Global Assembly Cache

Understanding .NET Standard and .NET Core

Chapter 3: Working with Scripts and Cmdlets

Introducing Common Scripts and Cmdlets

Executing Scripts or Cmdlets

Working from Another Location

Performing Simple Administrative Tasks with PowerShell Scripts

Chapter 4: Creating Your Own Scripts and Advanced Functions

Creating a PowerShell Script

Defining a Script Policy

Signing a PowerShell Script

Creating a PowerShell Advanced Function

Chapter 5: PowerShell Desired State Configuration

Getting an Overview of PowerShell Desired State Configuration

Creating a PowerShell Desired State Configuration Script

Applying the PowerShell Desired State Configuration Script

Push and Pull: Using PowerShell Desired State Configuration at Scale

Book 7: Installing and Administering Hyper-V

Chapter 1: What Is Hyper-V?

Introduction to Virtualization

Type 1 and Type 2 Hypervisors

Installing and Configuring Hyper-V

Chapter 2: Virtual Machines

Creating a Virtual Machine

Configuring a Virtual Machine

Shielded Virtual Machines

Chapter 3: Virtual Networking

Identifying the Types of Virtual Switches

Creating a Virtual Switch

Getting into Advanced Hyper-V Networking

Chapter 4: Virtual Storage

Understanding Virtual Disk Formats

Considering Types of Disks

Adding Storage to the Host

Adding Storage to the Virtual Machine

Chapter 5: High Availability in Hyper-V

Hyper-V Replica

Live Migration

Storage Migration

Failover Clustering

Book 8: Installing, Configuring, and Using Containers

Chapter 1: Introduction to Containers in Windows Server 2022

Understanding Containers

Considering Use Cases for Containers

Deciding What Type of Containers You Want to Use

Managing Containers at Scale

Chapter 2: Docker and Docker Hub

Introduction to Docker

Introduction to Docker Hub

Chapter 3: Installing Containers on Windows Server 2022

Installing Windows Containers

Installing Hyper-V Containers

Installing Docker

Testing Your Container Installation

Chapter 4: Configuring Docker and Containers on Windows Server 2022

Working with Dockerfile

Applying Custom Metadata to Containers and Other Objects

Configuring Containers

Configuring the Docker Daemon with daemon.json

Chapter 5: Managing Container Images

Making Changes to Images and Saving the Changes You Make

Pushing Images to Docker Hub

Pulling Images from Docker Hub

Handling Image Versioning

Chapter 6: Container Networking

Considering the Different Types of Network Connections

Viewing Your Network Adapters and Virtual Switches

Configuring a Network Address Translation Network Connection

Configuring a Transparent Network Connection

Configuring an Overlay Network Connection

Configuring an l2bridge Network Connection

Configuring an l2tunnel Network Connection

Removing a Network Connection

Connecting to a Network

Chapter 7: Container Storage

Getting Acquainted with Container Storage

Creating a Volume Inside of a Container

Working with Persistent Volumes

Index

About the Author

Connect with Dummies

End User License Agreement

List of Tables

Book 1 Chapter 2

TABLE 2-1 Troubleshooting with the Command Prompt

TABLE 2-2 Third-Party Boot Utilities

Book 1 Chapter 3

TABLE 3-1 Windows Server 2022 Upgrade Compatibility Matrix

Book 1 Chapter 4

TABLE 4-1 Windows Server 2022 Default Settings

TABLE 4-2 BCDEdit Common Options

Book 2 Chapter 5

TABLE 5-1 Default Domain Groups

Book 3 Chapter 2

TABLE 2-1 Group Policy: Policies versus Preferences

Book 3 Chapter 6

TABLE 6-1 Command Line Symbols

Book 3 Chapter 7

TABLE 7-1 Windows PowerShell Punctuation

Book 4 Chapter 1

TABLE 1-1 DNS Record Types

Book 4 Chapter 2

TABLE 2-1 IPv4 Private Address Ranges

Book 4 Chapter 3

TABLE 3-1 Test-NetConnection Parameters

Book 4 Chapter 4

TABLE 4-1 Network Troubleshooting Tools

Book 5 Chapter 2

TABLE 2-1 Effective Permissions

Book 6 Chapter 1

TABLE 1-1 PowerShell Built-in Providers

TABLE 1-2 Common PowerShell Aliases

Book 6 Chapter 2

TABLE 2-1 .NET Versions with Release Values

Book 6 Chapter 5

TABLE 5-1 DSC Resources

Book 7 Chapter 5

TABLE 5-1 Quorum Types

Book 8 Chapter 2

TABLE 2-1 Common Docker Commands

Book 8 Chapter 4

TABLE 4-1 Docker Instructions

TABLE 4-2 Restart Policy Flags

TABLE 4-3 Allowed Configuration Options in the Windows Docker daemon.json File

List of Illustrations

Book 1 Chapter 1

FIGURE 1-1: Server with Desktop Experience.

FIGURE 1-2: Server Core’s sconfig utility is where you perform initial configur...

FIGURE 1-3: Server Manager is the landing page you get when you log in to Windo...

FIGURE 1-4: Managing servers with Server Manager.

FIGURE 1-5: You can see all your connected devices on the All Connections page.

FIGURE 1-6: The Overview page shows, well, an overview of the device you clicke...

Book 1 Chapter 2

FIGURE 2-1: Look for the Repair Your Computer link in the lower-left corner.

FIGURE 2-2: The Advanced Options screen.

FIGURE 2-3: Your journey into the Advanced Boot Options menu starts with the Re...

FIGURE 2-4: In the Advanced Boot Options menu, you can choose what you want Win...

FIGURE 2-5: Windows Memory Diagnostics Tool options.

Book 1 Chapter 3

FIGURE 3-1: Running the Coreinfo utility on a Windows system.

FIGURE 3-2: The first installation screen for Windows Server 2022.

FIGURE 3-3: The Windows Server 2022 Install Now button.

FIGURE 3-4: Choosing your desired edition and experience of Windows Server 2022...

FIGURE 3-5: Choose where to install Windows.

FIGURE 3-6: Choose to either keep your files and settings or start fresh.

Book 1 Chapter 4

FIGURE 4-1: The Activation screen showing that Windows Server 2022 is activated...

FIGURE 4-2: The Internet Protocol Version 4 Properties dialog box.

FIGURE 4-3: Using slmgr.vbs to activate Windows Server.

FIGURE 4-4: Setting the IP address with PowerShell.

FIGURE 4-5: Setting the DNS servers with PowerShell.

FIGURE 4-6: Using the Local Group Policy Editor to change the automatic updates...

FIGURE 4-7: Setting automatic updates in PowerShell.

FIGURE 4-8: The select Server Roles Screen with File Server selected.

FIGURE 4-9: Allowing an app through Microsoft Defender Firewall.

FIGURE 4-10: Using PowerShell to install roles and features.

FIGURE 4-11: Using

Get-

NetFirewallRule

to find rules.

FIGURE 4-12: Using PowerShell to set firewall rules and validate that they’re e...

FIGURE 4-13: Using

bcdedit /enum

to see the current settings of the boot config...

FIGURE 4-14: Using

bcdedit /set

to alter the description of the Windows Boot Lo...

Book 2 Chapter 1

FIGURE 1-1: The Server Manager Dashboard with the Quick Start tile at the top.

FIGURE 1-2: The File and Storage Services management window.

FIGURE 1-3: The Tools menu in Server Manager.

FIGURE 1-4: The Server Manager’s Local Server properties screen.

FIGURE 1-5: Working with disks in the File and Storage Services area of Server ...

Book 2 Chapter 2

FIGURE 2-1: Device Manager on Windows Server 2022 will look familiar to those w...

FIGURE 2-2: Customizing your Device Manager view.

FIGURE 2-3: Device Manager makes it simple to identify devices with problems.

FIGURE 2-4: The General tab for a VirtualBox CD-ROM drive.

FIGURE 2-5: You have two options when updating drivers in Windows Server 2022 t...

FIGURE 2-6: The Add Hardware Wizard.

FIGURE 2-7: Installing the MPIO feature in Windows Server 2022.

FIGURE 2-8: Select the Multipath I/O check box on the Select Features screen.

FIGURE 2-9: The Storage Pools screen showing available physical disks.

FIGURE 2-10: Choose a name for your storage pool and choose the primordial pool...

FIGURE 2-11: Configuration of the physical disks in the storage pool.

FIGURE 2-12: You have to name your virtual disk before you can use it.

FIGURE 2-13: Selecting the storage layout can be very important if you need it ...

FIGURE 2-14: Creating a volume that the operating system can use is simple afte...

FIGURE 2-15: Choosing a drive letter for my new volume.

FIGURE 2-16: Adding features that are needed for BitLocker Drive Encryption to ...

FIGURE 2-17: Getting to the BitLocker Management screen from the Control Panel.

FIGURE 2-18: Turning on BitLocker for Volume1.

FIGURE 2-19: Setting a password for BitLocker To Go.

FIGURE 2-20: Configuring BitLocker to work without a TPM module involves editin...

FIGURE 2-21: Enabling software-based encryption for BitLocker.

FIGURE 2-22: Allowing alternate authentication methods for the system drive.

FIGURE 2-23: Letting the operating system drive encrypt or decrypt without a TP...

FIGURE 2-24: Selecting how you’ll find your printer.

FIGURE 2-25: Configuring the IP address of your printer.

FIGURE 2-26: Advanced Options gives you more settings to work with.

FIGURE 2-27: The Printer Properties screen allows you to change configuration i...

FIGURE 2-28: Install the Print and Document Services role to set up your print ...

FIGURE 2-29: Select Print Server for the role that you want to install.

FIGURE 2-30: Adding a printer to the Print Server.

FIGURE 2-31: Naming the printer and adding a location makes it easier for your ...

FIGURE 2-32: You can adjust the keyboard settings to work better with your typi...

FIGURE 2-33: You can adjust the mouse settings to customize your experience.

FIGURE 2-34: Advanced Power Settings lets you create a granular power managemen...

FIGURE 2-35: The Language screen allows you to adjust settings for language and...

FIGURE 2-36: Samples of the installed fonts available on the server.

Book 2 Chapter 3

FIGURE 3-1: The Settings menu in all its glory.

FIGURE 3-2: The System menu contains a lot of configuration choices.

FIGURE 3-3: The Devices menu allows you to install and configure peripherals.

FIGURE 3-4: The Network & Internet menu provides options to configure server ne...

FIGURE 3-5: The Personalization menu gives you many options to make your server...

FIGURE 3-6: The Apps menu allows you to work with installed applications.

FIGURE 3-7: The Accounts menu allows you to set up various methods of authentic...

FIGURE 3-8: The Time & Language menu lets you determine how date and time shoul...

FIGURE 3-9: The Ease of Access menu allows you to configure accessibility optio...

FIGURE 3-10: The Privacy menu allows you to configure tracking and advertisemen...

FIGURE 3-11: The Update & Security menu is where you can manage the security-re...

Book 2 Chapter 4

FIGURE 4-1: Configuring the workgroup begins in the Local Server screen in Serv...

FIGURE 4-2: The System Properties dialog box allows you to set the workgroup na...

FIGURE 4-3: Setting the workgroup name.

FIGURE 4-4: Creating a group to allow access to workstation resources.

FIGURE 4-5: Creating a user account to allow access to workstation resources.

FIGURE 4-6: Selecting the group for your user account.

FIGURE 4-7: Selecting the folder you want to share in the Create a Shared Folde...

FIGURE 4-8: Customizing the shared folder permissions.

FIGURE 4-9: The new folder share is visible in the Shares section of Shared Fol...

FIGURE 4-10: The Advanced Sharing dialog box allows you to configure the share.

FIGURE 4-11: Clicking Other Users allows you to manage accounts other than your...

FIGURE 4-12: Managing the account of another user.

FIGURE 4-13: PowerShell window with user account management code line.

Book 2 Chapter 5

FIGURE 5-1: The DNS Manager screen after installation with no zones configured.

FIGURE 5-2: Naming your zone indicates which zone the DNS server is authoritati...

FIGURE 5-3: Assigning the Network ID.

FIGURE 5-4: DHCP Console allows you to configure DHCP services.

FIGURE 5-5: The IP Address Range screen allows you to specify the address range...

FIGURE 5-6: Setting the domain name and DNS servers in the DHCP Scope Options.

FIGURE 5-7: Promoting the server to a domain controller.

FIGURE 5-8: Checking the prerequisite checks passed before installing.

FIGURE 5-9: Setting the properties of your DNS zone to AD integrated.

FIGURE 5-10: Using nslookup to verify that DNS is working properly.

FIGURE 5-11: Creating a new user in Active Directory.

FIGURE 5-12: Creating my first user, John Smith.

FIGURE 5-13: Sharing a folder to a domain security group.

FIGURE 5-14: The System Properties box allows you to change the computer name a...

FIGURE 5-15: Changing the domain membership of the server.

FIGURE 5-16: The sconfig menu in Server Core is the main system configuration a...

FIGURE 5-17: Active Directory–integrated DNS zones offer improved replication a...

FIGURE 5-18: DHCP address leases for all your domain-joined systems.

Book 2 Chapter 6

FIGURE 6-1: IPAM shows up in Server Manager after it’s installed.

FIGURE 6-2: Provisioning methods for IPAM include manual or Group Policy based.

FIGURE 6-3: Configuring server discovery in IPAM.

FIGURE 6-4: Setting the manageability status of the server to Managed.

FIGURE 6-5: Some of the actions you can take against servers that are being man...

FIGURE 6-6: The Server Inventory screen gives you a list of your servers and wh...

FIGURE 6-7: IP address utilization is easy to see at a glance in IPAM.

FIGURE 6-8: The status of the DNS and DHCP servers that are being monitored and...

FIGURE 6-9: DHCP Scope configuration can be done across multiple DHCP servers a...

FIGURE 6-10: Configuring DNS zones can be done from inside of IPAM.

FIGURE 6-11: Creating a DNS Zone Administrator is easy given the granular permi...

FIGURE 6-12: The new role is created and shows up with the built-in roles.

Book 3 Chapter 1

FIGURE 1-1: The Tools menu from within Server Manager.

FIGURE 1-2: Windows Administrative Tools in the Start Menu is the same as the T...

FIGURE 1-3: Accessing the Tools menu through Control Panel.

FIGURE 1-4: The Computer Management console gives you a centralized area to use...

FIGURE 1-5: Defragmenting you hard drive is a scheduled task, but you can choos...

FIGURE 1-6: The Disk Cleanup utility in all its glory.

FIGURE 1-7: Using a filter in Event Viewer to find failed logins.

FIGURE 1-8: The local password policy set in Local Security Policy.

FIGURE 1-9: System colors are stored in the Registry.

FIGURE 1-10: The Server service Properties page allows you to set startup type ...

FIGURE 1-11: The General tab in System Configuration lets you set the type of s...

FIGURE 1-12: Creating a custom task in Task Scheduler.

FIGURE 1-13: Searching Active Directory for systems to manage.

FIGURE 1-14: Server Manager showing the roles from the system I added.

FIGURE 1-15: Managing a remote server with Server Manager on Windows 10.

Book 3 Chapter 2

FIGURE 2-1: The Default Domain Policy is set at the domain level.

FIGURE 2-2: Creating a new GPO.

FIGURE 2-3: Setting up software to be deployed via Group Policy.

FIGURE 2-4: Setting the audit policy to track both successes and failures.

FIGURE 2-5: Software deployed via the User Configuration.

FIGURE 2-6: Setting up folder redirection for the Documents folder.

FIGURE 2-7: RSoP shows which GPOs are successfully applied.

Book 3 Chapter 3

FIGURE 3-1: The Registry Editor allows you to work with the hives and keys in t...

FIGURE 3-2: Searching the Registry for a specific key.

FIGURE 3-3: Data types in the Registry with sample values.

FIGURE 3-4: HKCR keeps tracks of associations between file types and programs.

FIGURE 3-5: HKCU contains pointers to the currently logged on user's settings.

FIGURE 3-6: SIDs for each account on the system are stored in HKU.

FIGURE 3-7: Loading a hive allows you to compare settings including user settin...

FIGURE 3-8: Remote Registry is useful for comparing or making quick changes to ...

FIGURE 3-9: Setting permissions on the Windows Registry is very similar to sett...

FIGURE 3-10: Disabling the Remote Registry service ensures that nobody can conn...

FIGURE 3-11: Restricting remote administration to specific subnets is a great l...

Book 3 Chapter 4

FIGURE 4-1: Setting the trust name for the new trust.

FIGURE 4-2: Setting the type of trust.

FIGURE 4-3: Setting the direction of the trust.

FIGURE 4-4: Setting where you want to set the trust at.

FIGURE 4-5: The successful completion of the New Trust Wizard.

FIGURE 4-6: Creating a site in Active Directory.

FIGURE 4-7: Configuring a subnet for the new Active Directory site.

FIGURE 4-8: Creating a new user from within Active Directory Users & Groups.

FIGURE 4-9: The Properties screen for the user account gives you more options t...

FIGURE 4-10: Creating a new group in Active Directory Users & Groups.

FIGURE 4-11: Enable the Active Directory Recycle Bin through the Active Directo...

FIGURE 4-12: Creating a user in Active Directory Administrative Center gives yo...

Book 3 Chapter 5

FIGURE 5-1: The activation window showing that Windows Server 2022 is activated...

FIGURE 5-2: Using slmgr.vbs to activate Windows Server.

FIGURE 5-3: You can access the Folder Options dialog box through the View tab i...

FIGURE 5-4: The General tab of the Folder Options dialog box.

FIGURE 5-5: The View tab of the Folder Options dialog box.

FIGURE 5-6: The Search tab of the Folder Options dialog box.

FIGURE 5-7: The Internet Properties dialog box.

FIGURE 5-8: Viewing the available font faces for the Courier New font.

FIGURE 5-9: The troubleshooting utility can notify you of issues and possible r...

FIGURE 5-10: The Performance Options dialog box.

FIGURE 5-11: The User Account Control Settings dialog box.

FIGURE 5-12: Uninstalling a program in the Apps & Features section of the Setti...

FIGURE 5-13: Performance Monitor running on Windows Server 2022.

FIGURE 5-14: Troubleshooting resource contention is simple with Resource Monito...

FIGURE 5-15: Task Manager in Windows Server 2022.

FIGURE 5-16: Windows Server Backup allows you to create and run backups, once o...

FIGURE 5-17: Restoring some files through Windows Server Backup.

FIGURE 5-18: Managing a disk volume in File and Storage Services.

FIGURE 5-19: Disk defragmentation runs automatically once a week, but it can st...

FIGURE 5-20: Task Scheduler is the central area for managing automated/schedule...

FIGURE 5-21: Configuring one of the Windows Server preconfigured tasks.

FIGURE 5-22: Changing a preconfigured task to run every day.

FIGURE 5-23: Connecting to another system via a Remote Desktop Connection.

FIGURE 5-24: Using RSAT to manage remote servers from a Windows 10 client.

FIGURE 5-25: There are lots of options to manage a remote server using RSAT.

FIGURE 5-26: Connecting to a server with Windows Admin Center.

FIGURE 5-27: The Server Manager view in Windows Admin Center.

Book 3 Chapter 6

FIGURE 6-1: Running the Command Prompt as administrator allows you to run more ...

FIGURE 6-2: The Options tab allows you to customize how you interact with the C...

FIGURE 6-3: The Font tab allows you to change the font and how it displays in t...

FIGURE 6-4: The Layout tab configures what the window looks like.

FIGURE 6-5: The Colors tab lets you customize colors in the Command Prompt.

FIGURE 6-6: Further customizations that are available in the Command Prompt.

FIGURE 6-7: Displaying environmental variables and their current settings is po...

FIGURE 6-8: The view after appending a folder to my

PATH

environment variable.

FIGURE 6-9: Using the Command Prompt help to get more information on a command.

FIGURE 6-10: Using the help command in the Command Prompt.

Book 3 Chapter 7

FIGURE 7-1: Windows PowerShell now resides by default in the menu that you acce...

FIGURE 7-2: The Options tab allows you to customize how you interact with Windo...

FIGURE 7-3: The Font tab allows you to change the font and how it displays in P...

FIGURE 7-4: The Layout tab configures what the PowerShell window will look like...

FIGURE 7-5: The Colors tab allows you to customize screen colors in Windows Pow...

FIGURE 7-6: Further customizations that are available in the Command Prompt.

FIGURE 7-7: Displaying environmental variables and their current settings is ea...

FIGURE 7-8: The view after creating a new environment variable.

FIGURE 7-9: Using the PowerShell Help to get more information on the

Get-Comman

...

FIGURE 7-10: Using the

help

command in Windows PowerShell.

Book 4 Chapter 1

FIGURE 1-1: The Network and Sharing Center in Windows Server 2022.

FIGURE 1-2: Getting to the network adapter properties screen.

FIGURE 1-3: Troubleshooting your Internet connection with the built-in troubles...

FIGURE 1-4: The Status screen in the Network & Internet section of Settings.

FIGURE 1-5: The Ethernet screen in the Network & Internet section of Settings.

FIGURE 1-6: The Firewall & Network Protection screen in the Network & Internet ...

FIGURE 1-7: The VPN screen in the Network & Internet section of Settings.

FIGURE 1-8: The Proxy screen in the Network & Internet section of Settings.

FIGURE 1-9: Selecting which network protocol you want to work with in the adapt...

FIGURE 1-10: Statically set IP and DNS server settings are common on servers se...

FIGURE 1-11: The Advanced TCP/IP Settings dialog box lets you perform more adva...

FIGURE 1-12: Selecting the replication scope for the new zone is important; in ...

FIGURE 1-13: The legal.sometestorg.com zone provides a separate administrative ...

Book 4 Chapter 2

FIGURE 2-1: Working with the properties of a network adapter.

FIGURE 2-2: The Properties dialog box for the network adapter allows you to cha...

FIGURE 2-3: Setting up a proxy script for Internet access on a Windows server.

FIGURE 2-4: Configuring a dial-up connection in Windows Server 2022 is simple i...

FIGURE 2-5: Setting up a VPN for remote access with the built-in Windows VPN cl...

FIGURE 2-6: IPv4 properties are set through the network adapter Properties dial...

FIGURE 2-7: IPv6 properties are set through the network adapter Properties dial...

FIGURE 2-8: It’s simple to install clients, services, and protocols like the Re...

Book 4 Chapter 3

FIGURE 3-1: Selecting Remote Desktop Services is a departure from the usual ste...

FIGURE 3-2: Installing the RDS role on a single server via the Quick Start inst...

FIGURE 3-3: Setting up a user’s profile to take full advantage of the RDS funct...

FIGURE 3-4: Adding a non-Windows program to the list of RemoteApp programs avai...

FIGURE 3-5: The logon screen for RD Web Access is simple and elegant.

FIGURE 3-6: When you select an application in the RD Web Access console, a remo...

FIGURE 3-7: Click the plus sign to install the RD Licensing role.

FIGURE 3-8: The Settings tab is where the bulk of the configuration happens for...

FIGURE 3-9: A network policy allowing traffic needs to have the lower processin...

FIGURE 3-10: You can test basic connectivity with just a few parameters added t...

Book 4 Chapter 4

FIGURE 4-1: The Windows Network Diagnostics screen is a wizard that helps you d...

FIGURE 4-2: The Additional Troubleshooters link contains many troubleshooting t...

FIGURE 4-3: Windows Network Diagnostics can diagnose many issues, including dis...

FIGURE 4-4: The

ping

utility gives you a simple readout and can point out an is...

FIGURE 4-5: Event Viewer can show you when Windows Firewall has blocked an inco...

Book 5 Chapter 1

FIGURE 1-1: The CIA triad is one of the most basic concepts in information secu...

FIGURE 1-2: Discretionary access control lists can be used to determine who sho...

FIGURE 1-3: Using an SACL to audit privileged access to a folder is simple.

FIGURE 1-4: You can use Group Policy to set your SACLs so that you can apply th...

FIGURE 1-5: You can set permissions very granularly with the Security tab in th...

FIGURE 1-6: Share permissions allow you to grant Full Control, Change, or Read ...

FIGURE 1-7: Checking the effective permissions of a user account is a great way...

FIGURE 1-8: The Local Security Policy screen allows you to set local security s...

FIGURE 1-9: The Virus & Threat Protection dashboard offers a full-featured anti...

FIGURE 1-10: Changing the firewall settings from Firewall & Network Protection ...

FIGURE 1-11: App & Browser Control gives you the ability to protect yourself ag...

FIGURE 1-12: Exploit Protection provides several more advanced mechanisms to pr...

FIGURE 1-13: The Hypervisor Control Integrity feature is shown under Core Isola...

Book 5 Chapter 2

FIGURE 2-1: Share permissions are pretty open in this example. Everyone has ful...

FIGURE 2-2: Here, NTFS permissions set on the Security tab are more restrictive...

FIGURE 2-3: The Effective Access tab shows you what a user or group actually ha...

FIGURE 2-4: Sharing a storage device follows similar steps to sharing a folder.

FIGURE 2-5: Configuring the AD FS role after installation.

FIGURE 2-6: Review your AD FS settings before completing the configuration.

FIGURE 2-7: After AD RMS is installed, you need to configure it.

FIGURE 2-8: You can manage AD RMS from the console available through Server Man...

FIGURE 2-9: Creating the Rights Policy Template defines what you want to apply ...

FIGURE 2-10: Ensuring that a user can view but do nothing else is simple with A...

FIGURE 2-11: Creating the folders and the shares is simple through Windows Powe...

FIGURE 2-12: When the share is created, you need to point AD RMS to where you w...

FIGURE 2-13: The Protect Document button allows you to select an RMS template t...

Book 5 Chapter 3

FIGURE 3-1: The familiar User Account Control window protects your system from ...

FIGURE 3-2: Turning off User Account Control in User Accounts is simple, but it...

FIGURE 3-3: Choosing Never Notify disables UAC for the logged-in user.

FIGURE 3-4: The Local Security Policy allows for more granular configuration of...

FIGURE 3-5: Credential Manager allows you to manage your network passwords from...

FIGURE 3-6: Enabling Credential Guard with Group Policy is the simplest and fas...

FIGURE 3-7: With the two keys set that enable virtualization-based security, yo...

FIGURE 3-8: The Startup and Recovery dialog box allows you to set the startup a...

FIGURE 3-9: To access Startup and Recovery, you need to select Advanced System ...

FIGURE 3-10: Modifying cipher suites is relatively simple with the Local Group ...

FIGURE 3-11: Disabling TLS 1.1 in the Registry can be done with a new DWORD val...

Book 5 Chapter 4

FIGURE 4-1: Windows Defender Firewall settings are available through the Window...

FIGURE 4-2: Each Windows Defender Firewall profile can be disabled individually...

FIGURE 4-3: The Advanced Settings screen of the Windows Defender Firewall allow...

FIGURE 4-4: Profiles can be changed from the default behavior in the Properties...

FIGURE 4-5: Enabling prebuilt rules can be done from the main screen.

FIGURE 4-6: The custom rule created for MySQL will allow inbound TCP/3306 traff...

FIGURE 4-7: There are many more protocols available through this tab than there...

FIGURE 4-8: You can set primary and secondary authentication options for both c...

FIGURE 4-9: The SA between my two systems connected automatically after the con...

Book 5 Chapter 5

FIGURE 5-1: Symmetric cryptography uses one key to encrypt and decrypt data.

FIGURE 5-2: Asymmetric cryptography uses two mathematically linked keys to encr...

FIGURE 5-3: The User certificate template is good for EFS, secure email, and cl...

FIGURE 5-4: The Computer template provides client and server authentication.

Book 5 Chapter 6

FIGURE 6-1: After AD CS has been installed, it needs to be configured.

FIGURE 6-2: You can’t change this selection later, without reinstalling AD CS.

FIGURE 6-3: The Cryptography for CA screen allows you to set important security...

FIGURE 6-4: The newly created root certificate file and the CRL need to be copi...

FIGURE 6-5: Selecting the root CA, assuming the root CA is an enterprise CA, to...

FIGURE 6-6: The Microsoft Management Console (MMC) gives you lots of configurat...

FIGURE 6-7: Requesting a certificate within the MMC starts when you select the ...

FIGURE 6-8: You’re presented with the certificate templates that you have permi...

FIGURE 6-9: The Web Enrollment page for certificates is simple and easy to use.

FIGURE 6-10: The OCSP Response Signing template is needed to set up the revocat...

FIGURE 6-11: Setting the OCSP Revocation Configuration requires the OCSP Respon...

FIGURE 6-12: The last part of setting up auto-enrollment is to set Group Policy...

Book 5 Chapter 7

FIGURE 7-1: You can enable DNSSEC on a zone by selecting Sign the Zone located ...

FIGURE 7-2: Creating the KSK is simple — you can safely accept the defaults.

FIGURE 7-3: Considering that the DS record is responsible for the transfer of t...

FIGURE 7-4: After the zone is signed, the special DNSSEC record types will show...

FIGURE 7-5: Creating a Name Resolution Policy from within Group Policy is the s...

FIGURE 7-6: You need to generate the TLSA record before you can use it.

FIGURE 7-7: The page generated the TLSA record and now you can install it.

FIGURE 7-8: Verifying that the TLSA record was created properly is important.

FIGURE 7-9: You have several encryption options for DNS traffic.

FIGURE 7-10: The new DoH feature can be configured via Group Policy.

Book 6 Chapter 1

FIGURE 1-1: Each row returned in the

Get-Service

command is an object.

FIGURE 1-2: Using the pipeline allows you to send the output of one command to ...

FIGURE 1-3: Using the dollar sign tells the system you're working with a variab...

FIGURE 1-4: You can use the cmdlet

Get-Command

to find other commands even if y...

FIGURE 1-5: The PowerShell ISE is a very powerful tool for writing PowerShell s...

FIGURE 1-6: The Select Additional Tasks screen allows you to customize how and ...

FIGURE 1-7: After VS Code is installed, you can install the PowerShell extensio...

FIGURE 1-8: The PowerShell Command Explorer windows shows you PowerShell cmdlet...

FIGURE 1-9: Creating an array variable and displaying an array variable are ver...

FIGURE 1-10: Using a pipeline with

$_

to pass on the output of the first cmdlet...

FIGURE 1-11: Viewing the available modules in PowerShell gives you an idea of h...

FIGURE 1-12: If you’re trying to determine whether one object matches another, ...

FIGURE 1-13: Adding

-

NoEnumerate

tells PowerShell to treat arrays differently t...

FIGURE 1-14: The

ConvertTo

-Html

cmdlet can be used to convert the output of a p...

FIGURE 1-15: The output of

Get-Process

is normally in a table format.

FIGURE 1-16:

Get-Process

formatted into a list rather than the usual table form...

FIGURE 1-17: You can use

Format-Wide

to nicely format and present data in table...

FIGURE 1-18: Interacting with a remote server is intuitive after connecting to ...

FIGURE 1-19: Updating the help pages for your PowerShell modules.

FIGURE 1-20: Signing a script allows it to run even in a restrictive environmen...

FIGURE 1-21: A demonstration of what you see when running an unsigned script, s...

Book 6 Chapter 2

FIGURE 2-1: The .NET Framework expands the functionality of PowerShell greatly ...

FIGURE 2-2: You can view the contents of the GAC with the Developer Command Pro...

FIGURE 2-3: You need to use PowerShell to view the assembly properties in Windo...

Book 6 Chapter 3

FIGURE 3-1: The Reference page from Microsoft’s website contains hundreds of cm...

FIGURE 3-2: Checking the properties of COM objects is similar to checking the p...

FIGURE 3-3:

Get-

SmbShare

is a very powerful cmdlet that gives you the ability t...

FIGURE 3-4: Creating a user in PowerShell is quick, and the user shows up almos...

FIGURE 3-5: Running your query and having the information on the screen can be ...

Book 6 Chapter 4

FIGURE 4-1: PowerShell Gallery is an excellent resource to download or see exam...

FIGURE 4-2: Using CSV files to import data sets for scripts is a simple way to ...

FIGURE 4-3: The basic anatomy of an advanced function includes

[CmdletBinding()

...

FIGURE 4-4: Testing your function is important to do, and it’s simple from with...

FIGURE 4-5: You can run your advanced function in your PowerShell console.

Book 6 Chapter 5

FIGURE 5-1: The service name is displayed within the services.msc panel for eac...

FIGURE 5-2: Checking the current settings for LCM is simple to do in PowerShell...

FIGURE 5-3: Compiling the PS1 into an MOF file is done by running the PowerShel...

FIGURE 5-4: The DSC script has been compiled and has been run; you can see the ...

Book 7 Chapter 1

FIGURE 1-1: You must select a network adapter for the virtual switch to use. Yo...

FIGURE 1-2: To enable live migration of VMs, select the check box to allow them...

FIGURE 1-3: The menu for the host in Hyper-V Manager presents you with your con...

FIGURE 1-4: NUMA Spanning can be helpful in lab and development environments wh...

FIGURE 1-5: Live Migration allows virtual machines to move between hosts with n...

FIGURE 1-6: Configuring a Hyper-V Replica server is a great addition to your or...

FIGURE 1-7: The Virtual Switch Manager allows you to configure virtual network ...

FIGURE 1-8: Hyper-V offers support for Fibre Channel SANs, which is a huge bene...

Book 7 Chapter 2

FIGURE 2-1: Launching the New Virtual Machine Wizard.

FIGURE 2-2: Selecting a virtual switch allows your virtual machine to connect o...

FIGURE 2-3: To create the virtual hard disk, you specify the name, size, and lo...

FIGURE 2-4: Your newly created virtual machine is listed in the Virtual Machine...

FIGURE 2-5: The Firmware screen allows you to change the boot order of the devi...

FIGURE 2-6: The Memory screen allows you to adjust how memory is handled by the...

FIGURE 2-7: Each SCSI device has a configuration page that allows you to config...

Book 7 Chapter 3

FIGURE 3-1: Under Connection Type, you need to select External Network and sele...

FIGURE 3-2: Creating an external virtual switch requires finding the name of th...

FIGURE 3-3: All your virtual switches will show up in the Virtual Switch Manage...

FIGURE 3-4: To enable VLAN tagging on the virtual switch, you need to select th...

FIGURE 3-5: To enable VLAN tagging on the VM, select the check box and set the ...

FIGURE 3-6: Setting a maximum amount of bandwidth for a VM can prevent the VM f...

FIGURE 3-7: To support NIC teaming, you must create two virtual switches connec...

FIGURE 3-8: The NIC Teaming screen is where you can set up the network adapters...

FIGURE 3-9: Configuring the team can be simple, or it can be a bit more advance...

FIGURE 3-10: The configured NIC Team gives you the health status and statistics...

FIGURE 3-11: You must enable SR-IOV on the virtual switch before you can enable...

FIGURE 3-12: The option to enable SR-IOV is in the Hardware Acceleration sectio...

Book 7 Chapter 4

FIGURE 4-1: After the disks are installed, they must be brought online and init...

FIGURE 4-2: With the storage added to the server, initialized, and formatted, i...

FIGURE 4-3: The default save location for my virtual hard disks is now the

G:\

...

FIGURE 4-4: Creating a disk in a Generation 1 VM gives you the option of an IDE...

FIGURE 4-5: Expanding a disk is done by selecting Edit when the hard drive is s...

FIGURE 4-6: You need to verify that you have an available disk that is showing ...

FIGURE 4-7: When you select physical hard disk, the offline disk that was added...

FIGURE 4-8: Converting a VHD file to a VHDX file in PowerShell involves far few...

Book 7 Chapter 5

FIGURE 5-1: You must set up the replica server first, before you can replicate ...

FIGURE 5-2: Hyper-V Replica communications need to be allowed through the firew...

FIGURE 5-3: Make sure that the connection parameters match what you set on the ...

FIGURE 5-4: Setting the initial replication parameters gets the replication sta...

FIGURE 5-5: This message indicates that the initial replication was successful ...

FIGURE 5-6: You must grant permissions on the source system for the destination...

FIGURE 5-7: Live migration does not impact the uptime of the machine.

FIGURE 5-8: It’s always a good idea to run the cluster validation tools to ensu...

FIGURE 5-9: The failover cluster has been created and has been assigned the Hyp...

FIGURE 5-10: You have several options for configuring a quorum witness.

Book 8 Chapter 1

FIGURE 1-1: Container architecture on Windows Server involves several layers an...

FIGURE 1-2: The GitHub repository where Microsoft stores examples of Dockerfile...

Book 8 Chapter 2

FIGURE 2-1: The search box on Docker Hub makes it simple to find public contain...

FIGURE 2-2: You can filter for just verified publishers in Docker Hub, which en...

FIGURE 2-3: You can see how many times a container image has been pulled.

FIGURE 2-4: You can get started with Docker Hub with very minimal information —...

FIGURE 2-5: Your repository is empty when you first create it, but it contains ...

FIGURE 2-6: You can use the Docker commands to push images to your private repo...

FIGURE 2-7: My tagged container image,

ltsc2022

, shows up in Docker Hub after I...

Book 8 Chapter 3

FIGURE 3-1: To use Windows Containers, you only need to install the Containers ...

FIGURE 3-2: When setting up Hyper-V, you can provision the virtual switch at th...

FIGURE 3-3: It takes two PowerShell cmdlets to install Docker on Windows Server...

FIGURE 3-4: The simple hello world container can be used to quickly test your D...

FIGURE 3-5: Downloading the sample container from Docker Hub is simple using th...

FIGURE 3-6: You get an error if you try to run a container image that does not ...

FIGURE 3-7: The container image was used to create a container named quizzical_...

Book 8 Chapter 4

FIGURE 4-1: Creating the dockerfile with no extension in Notepad.

FIGURE 4-2: The docker build command allows you to build a container from the i...

FIGURE 4-3: The

docker inspect

command allows you to view the metadata of a con...

Book 8 Chapter 5

FIGURE 5-1: Creating the container is as simple as identifying the container im...

FIGURE 5-2: After you connect to a container, you can make changes to it like a...

FIGURE 5-3: After you stop the container, you can commit the changes you have m...

FIGURE 5-4: You can use the

docker push

command to push to your private reposit...

FIGURE 5-5: Docker Hub makes it easy to get started pulling container images be...

FIGURE 5-6: You can use tags to track version numbers on your container images.

Book 8 Chapter 6

FIGURE 6-1: When you run the Docker Engine for the first time, a NAT network co...

FIGURE 6-2: You can check to see which virtual switches are defined on your con...

FIGURE 6-3: You can create a NAT network for container hosts with the

docker ne

...

FIGURE 6-4: Creating a transparent network connection automatically creates the...

FIGURE 6-5: The creation of the l2bridge is very similar to the creating of the...

FIGURE 6-6: The

docker network create

command can be used to create the l2tunne...

FIGURE 6-7: You can specify your desired network connection at runtime with the...

Book 8 Chapter 7

FIGURE 7-1: A symbolic link maps the volume that you created on the container t...

FIGURE 7-2: Volumes created for containers reside on the container host within ...

FIGURE 7-3: You can get more information on container volumes with the

docker v

...

FIGURE 7-4: By using a custom name on my volume, I can more easily know which v...

FIGURE 7-5: I’ve created a bind mount at run time for two containers; the first...

FIGURE 7-6: You can create a container and attach it to a previously created na...

Guide

Cover

Title Page

Copyright

Table of Contents

Begin Reading

Index

About the Author

Pages

i

ii

1

2

3

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

359

360

361

362

363

364

365

366

367

368

369

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

448

449

450

451

452

453

454

455

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

531

532

533

534

535

536

537

538

539

540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

581

582

583

584

585

586

587

588

589

590

591

592

593

594

595

596

597

598

599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

631

632

633

634

635

637

638

639

640

641

642

643

644

645

646

647

648

649

651

652

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

675

676

677

678

679

680

681

682

683

684

685

686

687

688

689

690

691

692

693

695

696

697

698

699

700

701

702

703

704

705

706

707

708

709

710

711

712

713

714

715

716

717

718

719

720

721

722

723

724

725

726

727

728

729

730

731

732

733

734

735

736

737

738

739

740

741

742

743

744

745

746

747

748

749

750

751

752

753

754

755

756

757

758

759

760

761

762

763

764

765