Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Networking -- Chapter 1 Let's Network! -- Defining a Network -- Why Bother with a Network? -- Sharing files -- Sharing resources -- Sharing programs -- Sharing messages -- Servers and Clients -- Dedicated Servers and Peers -- What Makes a Network Tick? -- It's Not a Personal Computer Anymore! -- The Network Administrator -- What Have They Got That You Don't Got? -- Chapter 2 Configuring Windows and Mac Clients -- Configuring Windows Network Connections -- Joining a Windows Computer to a Domain -- Configuring Mac Network Settings -- Joining a Mac Computer to a Domain -- Chapter 3 Life on the Network -- Distinguishing between Local Resources and Network Resources -- What's in a Name? -- Logging on to the Network -- Understanding Shared Folders -- Four Good Uses for a Shared Folder -- Store files that everybody needs -- Store your own files -- Make a temporary resting place for files on their way to other users -- Back up your local hard drive -- Oh, the Network Places You'll Go -- Mapping Network Drives -- Using a Network Printer -- Adding a network printer -- Printing to a network printer -- Playing with the print queue -- Logging off the Network -- Chapter 4 More Ways to Use Your Network -- Sharing Your Stuff -- Enabling File and Printer Sharing -- Sharing a Folder -- Using the Public Folder -- Sharing a Printer -- Using Microsoft Office on a Network -- Accessing network files -- Using workgroup templates -- Networking an Access database -- Working with Offline Files -- Part 2 Designing Your Network -- Chapter 5 Planning a Network -- Making a Network Plan -- Being Purposeful -- Taking Stock -- What you need to know
Programs that gather information for you -- To Dedicate or Not to Dedicate: That Is the Question -- File servers -- Print servers -- Web servers -- Mail servers -- Database servers -- Application servers -- License servers -- Choosing a Server Operating System -- Planning the Infrastructure -- Drawing Diagrams -- Chapter 6 Dealing with TCP/IP -- Understanding Binary -- Counting by ones -- Doing the logic thing -- Introducing IP Addresses -- Networks and hosts -- The dotted-decimal dance -- Classifying IP Addresses -- Class A addresses -- Class B addresses -- Class C addresses -- Subnetting -- Subnets -- Subnet masks -- The great subnet roundup -- Private and public addresses -- Understanding Network Address Translation -- Configuring Your Network for DHCP -- Understanding DHCP -- DHCP servers -- Understanding scopes -- Feeling excluded? -- Reservations suggested -- How long to lease? -- Managing a Windows Server 2019 DHCP Server -- Configuring a Windows DHCP Client -- Using DNS -- Domains and domain names -- Fully qualified domain names -- Working with the Windows DNS Server -- Configuring a Windows DNS Client -- Chapter 7 Oh, What a Tangled Web We Weave: Cables and Switches -- What Is Ethernet? -- All about Cable -- Cable categories -- What's with the pairs? -- To shield or not to shield -- When to use plenum cable -- Sometimes solid, sometimes stranded -- Installation guidelines -- The tools you need -- Pinouts for twisted-pair cables -- RJ-45 connectors -- Crossover cables -- Wall jacks and patch panels -- Understanding Switches -- Comparing managed and unmanaged switches -- Daisy-chaining switches -- Stacking switches -- Looking at distribution switches and access switches -- Powering Up with Power over Ethernet -- Looking at Three Types of Network Rooms -- Chapter 8 Setting Up a Wireless Network -- Diving into Wireless Networking
A Little High School Electronics -- Waves and frequencies -- Wavelength and antennas -- Spectrums and the FCC -- Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards -- Home on the Range -- Using Wireless Network Adapters -- Setting Wireless Access Points -- Infrastructure mode -- Multifunction WAPs -- Roaming Capabilities -- Wireless bridging -- Ad-hoc networks -- Configuring a Wireless Access Point -- Basic configuration options -- DHCP configuration -- Connecting to a Wireless Network -- Paying Attention to Wireless Network Security -- Chapter 9 Connecting to the Internet -- Connecting to the Internet -- Connecting with cable or DSL -- Connecting with high-speed private lines -- Sharing an Internet connection -- Securing Your Connection with a Firewall -- Using a firewall -- Comparing residential gateways to firewall routers -- Looking at the built-in Windows firewall -- Providing a Backup Internet Connection -- Part 3 Working with Servers -- Chapter 10 Virtualizing Your Network -- Understanding Virtualization -- Understanding Hypervisors -- Understanding Virtual Disks -- Understanding Network Virtualization -- Looking at the Benefits of Virtualization -- Choosing Virtualization Hosts -- Understanding Windows Server 2019 Licensing -- Introducing Hyper-V -- Understanding the Hyper-V hypervisor -- Understanding virtual disks -- Enabling Hyper-V -- Getting Familiar with Hyper-V -- Creating a Virtual Switch -- Creating a Virtual Disk -- Creating a Virtual Machine -- Installing an Operating System -- Chapter 11 Setting Up a Windows Server -- Planning a Windows Server Installation -- Checking system requirements -- Reading the release notes -- Considering your licensing options -- Deciding your TCP/IP configuration -- Choosing workgroups or domains -- Running Setup -- Adding Server Roles and Features -- Creating a New Domain
Chapter 12 Managing Windows User Accounts -- Understanding How Active Directory Is Organized -- Objects -- Domains -- Organizational units -- Trees -- Forests -- Understanding Windows User Accounts -- Local accounts versus domain accounts -- User account properties -- Creating a New User -- Setting User Properties -- Changing the user's contact information -- Setting account options -- Specifying logon hours -- Restricting access to certain computers -- Setting the user's profile information -- Resetting User Passwords -- Disabling and Enabling User Accounts -- Deleting a User -- Working with Groups -- Creating a group -- Adding a member to a group -- Creating a Logon Script -- Chapter 13 Managing Network Storage -- Understanding Disk Storage -- Hard disk drives -- Solid state drives to the rescue! -- It's a RAID! -- Three ways to attach disks to your servers -- Focusing on File Servers -- Understanding permissions -- Understanding shares -- Managing Your File Server -- Using the New Share Wizard -- Sharing a folder without the wizard -- Granting permissions -- Part 4 Managing Your Network -- Chapter 14 Welcome to Network Management -- What a Network Administrator Does -- Choosing the Part-Time Administrator -- The Three "Ups" of Network Management -- Managing Network Users -- Acquiring Software Tools for Network Administrators -- Building a Library -- Pursuing Certification -- Helpful Bluffs and Excuses -- Chapter 15 Supporting Your Users -- Establishing the Help Desk's Charter -- Tracking Support Tickets -- Deciding How to Communicate with Users -- Using Remote Assistance -- Enabling Remote Assistance -- Inviting someone to help you via a Remote Assistance session -- Responding to a Remote Assistance invitation -- Creating a Knowledge Base -- Creating a Self-Service Help Portal -- Using Satisfaction Surveys -- Tracking Help Desk Performance
Using Help Desk Management Software -- Chapter 16 Using Group Policy -- Understanding Group Policy -- Enabling Group Policy Management on Windows Server 2019 -- Creating Group Policy Objects -- Filtering Group Policy Objects -- Forcing Group Policy Updates -- Chapter 17 Managing Software Deployment -- Understanding Software Licenses -- Using a License Server -- Deploying Network Software -- Deploying software manually -- Running Setup from a network share -- Installing silently -- Creating an administrative installation image -- Pushing out software with Group Policy -- Keeping Software Up to Date -- Chapter 18 Managing Mobile Devices -- The Many Types of Mobile Devices -- Considering Security for Mobile Devices -- Managing iOS Devices -- Understanding the iPhone -- Understanding the iPad -- Integrating iOS devices with Exchange -- Configuring an iOS device for Exchange email -- Managing Android Devices -- Looking at the Android OS -- Perusing Android's core applications -- Integrating Android with Exchange -- Part 5 Securing Your Network -- Chapter 19 Welcome to Cybersecurity Network -- Do You Need Security? -- The Three Pillars of Cybersecurity -- Two Approaches to Security -- Physical Security: Locking Your Doors -- Securing User Accounts -- Obfuscating your usernames -- Using passwords wisely -- Generating passwords For Dummies -- Secure the Administrator account -- Managing User Security -- User accounts -- Built-in accounts -- User rights -- Permissions (who gets what) -- Group therapy -- User profiles -- Logon scripts -- Securing the Human Firewall -- Chapter 20 Hardening Your Network -- Firewalls -- The Many Types of Firewalls -- Packet filtering -- Stateful packet inspection (SPI) -- Circuit-level gateway -- Application gateway -- Next-generation firewall -- Virus Protection -- What is a virus? -- Antivirus programs -- Safe computing