Details

Windows Command Line Administration Instant Reference


Windows Command Line Administration Instant Reference


1. Aufl.

von: John Paul Mueller

22,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 09.09.2010
ISBN/EAN: 9780470931073
Sprache: englisch
Anzahl Seiten: 576

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>The perfect companion to any book on Windows Server 2008 or Windows 7, and the quickest way to access critical information</b> <p>Focusing just on the essentials of command-line interface (CLI), <i>Windows Command-Line Administration Instant Reference</i> easily shows how to quickly perform day-to-day tasks of Windows administration without ever touching the graphical user interface (GUI). Specifically designed for busy administrators, <i>Windows Command-Line Administration Instant Reference</i> replaces many tedious GUI steps with just one command at the command-line, while concise, easy to access answers provide solutions on the spot.</p> <ul> <li>Provides practical examples, step-by-step instructions, and contextual information</li> <li>Quick-reference style delivers the commands needed for managing data and the network; working with Active Directory; performing diagnostics and maintenance; and, creating batch files and scripts</li> <li>Covers administration for Windows Server 2008 Server Core, Windows Server 2008 (including R2), and Windows 7</li> </ul> <p>Administrators can get more done in less time with CLI than they can with the standard GUI. Compact enough to keep on hand at all times, <i>Windows Command-Line Administration Instant Reference</i> provides administrators with a convenient, fast and simple way to use CLI.</p>
<p>Introduction xix</p> <p><b>Part I: Command Line Basics 1</b></p> <p><b>Chapter 1: Configuring the Local Machine 3</b></p> <p>Configure the Command Window 4</p> <p>Set the Window Options 4</p> <p>Change the Font 7</p> <p>Choose a Window Layout 8</p> <p>Define the Text Colors 9</p> <p>Set the Environment 10</p> <p>Manage Environment Variables with the Set Command 10</p> <p>Manage Environment Variables with the SetX Utility 13</p> <p>Perform Common Tasks 16</p> <p>Clear the Display 16</p> <p>Determine the Operating System Version 16</p> <p>Start an Application 16</p> <p>Work with Services 18</p> <p>Shut Down the System 19</p> <p>Obtain Command Line Help 20</p> <p><b>Chapter 2: Making Remote Connections 23</b></p> <p>Configure the Remote System 24</p> <p>Change Security and Basic Setup 25</p> <p>Setup Remote Administrator 28</p> <p>Use the Remote Desktop Connection Application 30</p> <p>Create a Connection 30</p> <p>Use a Saved Connection 35</p> <p>Set the Display 35</p> <p>Access Local Resources 36</p> <p>Run a Configuration Program 38</p> <p>Optimize Performance 38</p> <p>Terminate a Session 39</p> <p>Use the Start Menu 40</p> <p>Use the Logoff Utility 40</p> <p><b>Chapter 3: Automating Tasks 41</b></p> <p>View and Manage Tasks Using Scheduled Tasks 42</p> <p>Configure the Task Scheduler 43</p> <p>View Tasks 44</p> <p>Create New Tasks 46</p> <p>Delete Existing Tasks 50</p> <p>Manage Tasks Using the SchTasks Command 51</p> <p>Use the /Create Switch 51</p> <p>Use the /Delete Switch 53</p> <p>Use the /Query Switch 53</p> <p>Use the /Change Switch 54</p> <p>Use the /Run Switch 54</p> <p>Use the /End Switch 54</p> <p><b>Part II: Managing Data 55</b></p> <p><b>Chapter 4: Working with File and Directory Objects 57</b></p> <p>Manage Directory Objects 58</p> <p>Find Directories 58</p> <p>Find Directories Using Patterns 59</p> <p>View the Current Directory 60</p> <p>Change the Current Directory 60</p> <p>Create Directories 61</p> <p>Move Directories 61</p> <p>Rename Directories 61</p> <p>Remove a Directory 62</p> <p>Display a Directory Structure 62</p> <p>Manage File Objects 63</p> <p>Find Files 63</p> <p>Find Files in Sorted Order 64</p> <p>Find Files by Attribute 65</p> <p>Find Files Using Patterns 66</p> <p>Copy Files 68</p> <p>Perform Bulk File Transfers 69</p> <p>Remove Files 70</p> <p>Move Files 71</p> <p>Rename a File 71</p> <p>Set File Attributes 71</p> <p>Work with File Associations and Types 72</p> <p>Determine File Associations 72</p> <p>Create File Associations 73</p> <p>Determine File Types 73</p> <p>Create File Types 73</p> <p>Make Data Links 74</p> <p>Create Simple Hard Links 75</p> <p>View Simple Hard Links 75</p> <p>Delete Simple Hard Links 75</p> <p>Create Hard Links Using the New Technique 76</p> <p>Create Symbolic Links 76</p> <p>Create Junctions 77</p> <p><b>Chapter 5: Administering File and Directory Content 79</b></p> <p>Execute Applications Anywhere 80</p> <p>View Application Paths 80</p> <p>Set Application Paths 80</p> <p>Locate Information in Files 81</p> <p>Find Simple Strings 81</p> <p>Find Complex Strings 82</p> <p>Display Files Containing Strings 82</p> <p>Perform Case Insensitive Searches 83</p> <p>Monitor the File System with the FSUtil Command 83</p> <p>Control File System Behavior 83</p> <p>Manage the Volume Dirty Bit 86</p> <p>Obtain the File System Information Using FSInfo 87</p> <p>Manage Quotas 88</p> <p>Repair File System Errors 90</p> <p>Display Data Files 92</p> <p>Display a Data File on Screen 92</p> <p>Employ Data Redirection 92</p> <p>Display Data One Page at a Time 95</p> <p><b>Chapter 6: Managing the Hard Drive 99</b></p> <p>Save Hard Drive Space 101</p> <p>Compress Data 101</p> <p>Uncompress Data 102</p> <p>View Compression Status 102</p> <p>Manage the Volume 102</p> <p>Get Volume Information 103</p> <p>Manage Volume Labels 103</p> <p>Format a Disk 103</p> <p>Mount a Volume 104</p> <p>Maintain the Volume 106</p> <p>Determine File and Directory Status 106</p> <p>Locate Bad Sectors 107</p> <p>Perform Boot-Time Disk Checks 108</p> <p>Improve Disk Access Performance 109</p> <p>Manage Partitions 110</p> <p>Start DiskPart 110</p> <p>List the Objects 111</p> <p>See Object Details 112</p> <p>Select an Object 113</p> <p>Rescan a Computer for Objects 114</p> <p>Create a Partition 114</p> <p>Create a Volume 116</p> <p>Clean a Drive 117</p> <p>Mark a Partition as Active 117</p> <p>Mark a Partition as Inactive 118</p> <p>Assign a Drive Letter 118</p> <p>Remove a Drive Letter 119</p> <p>Extend a Volume 119</p> <p>Delete an Object 120</p> <p>Exit DiskPart 120</p> <p><b>Chapter 7: Securing the Data 121</b></p> <p>Protect Data 122</p> <p>Encrypt a File or Directory 122</p> <p>View Encrypted Files and Directories 123</p> <p>Encrypt Hidden Files 124</p> <p>Back Up Recovery Keys and Certificates 125</p> <p>Add a User to a File or Directory 125</p> <p>Remove a User from a File or Directory 126</p> <p>Decrypt a File or Directory 127</p> <p>Change File and Directory Access 127</p> <p>Obtain the DACL 127</p> <p>Find an SID 130</p> <p>Grant Permission 130</p> <p>Deny Permission 131</p> <p>Remove Permission 131</p> <p>Set the Owner 132</p> <p>Verify Security 132</p> <p>Detect Shared Open Files 132</p> <p>Use the Query Option 132</p> <p>Use the Disconnect Option 133</p> <p>Use the Local Option 134</p> <p>Take Ownership of Files 134</p> <p>Set Administrator Ownership 134</p> <p>Set Other User Ownership 135</p> <p><b>Part III: Managing the Network 137</b></p> <p><b>Chapter 8: Managing the Network 139</b></p> <p>Get the Media Access Control Information 140</p> <p>Interact with the Network Using the Net Utility 141</p> <p>Manage Users 141</p> <p>Manage Accounts 143</p> <p>Manage Domains and Local Groups 146</p> <p>Manage Computers 149</p> <p>View and Close Sessions 149</p> <p>Perform Server Configuration 151</p> <p>View Workstation Configuration 153</p> <p>Manage Services 153</p> <p>Manage Files 155</p> <p>Obtain Help for the Net Utility 156</p> <p>Manage Print Jobs 157</p> <p>Manage Resources 158</p> <p>Obtain Statistics 161</p> <p>Configure Time Synchronization 163</p> <p><b>Chapter 9: Working with TCP/IP 165</b></p> <p>Manage the Internet Protocol 166</p> <p>Display the IP Information 166</p> <p>Renew Addresses for an Adapter 168</p> <p>Clear the DNS Resolver Cache 168</p> <p>Renew DHCP Addresses and Register DNS Names 169</p> <p>Release a Connection 169</p> <p>Use Basic Diagnostics 170</p> <p>Check Connections 170</p> <p>Trace Transmission Paths 171</p> <p>Track the Network Path 172</p> <p>Perform Detailed Network Diagnostics 173</p> <p>Obtain a Copy of NetDiag 174</p> <p>Perform a Test 175</p> <p>Understand Diagnostics 175</p> <p>Locate and Fix Minor Problems 177</p> <p>Get Network Statistics 177</p> <p>Display All Connections and Ports 177</p> <p>Display Application Statistics 178</p> <p>Display Ethernet Statistics 179</p> <p>Display Protocol Information 179</p> <p>Set a Refresh Interval 180</p> <p>Manipulate the Network Routing Tables 180</p> <p>Print the Routing Tables 180</p> <p>Add a New Route 181</p> <p>Change a Route 182</p> <p>Delete a Route 183</p> <p><b>Chapter 10: Creating System Connections 185</b></p> <p>Perform Remote System Management 186</p> <p>Create Remote Connections 186</p> <p>Set Up a Telephony Client 190</p> <p>Perform Remote Windows Management 191</p> <p>Execute Commands on a Remote System 206</p> <p>Work with Terminal Server 206</p> <p>Obtain Process Information 206</p> <p>Get Session Information 207</p> <p>Terminate a Session 208</p> <p>Disconnect an Active Session 208</p> <p>End Processes 208</p> <p>Shut Down the Terminal Server 209</p> <p><b>Part IV: Interacting with Active Directory 211</b></p> <p><b>Chapter 11: Configuring Directory Services 213</b></p> <p>Manage Directory Services Using the WMIC NTDomain Alias 214</p> <p>List the Objects 215</p> <p>List Object Properties 215</p> <p>Get an Object Property 216</p> <p>Set an Object Property 217</p> <p>Query an Association 217</p> <p>Manage Active Directory with the DSQuery Utility 218</p> <p>Interact with Servers 218</p> <p>Interact with Users 220</p> <p>Interact with Computers 223</p> <p>Interact with Contacts 223</p> <p>Interact with Groups 223</p> <p>Interact with Organizational Units 224</p> <p>Manage the Active Directory Database 225</p> <p>Issue a Command 225</p> <p>Use a Stream 226</p> <p><b>Chapter 12: Working with Directory Objects 229</b></p> <p>Create New Objects 230</p> <p>Add a Computer 230</p> <p>Add a Contact 231</p> <p>Add a Group 233</p> <p>Add an Organizational Unit 234</p> <p>Add a User 234</p> <p>Get Objects 238</p> <p>List Computers 238</p> <p>List Contacts 239</p> <p>List Groups 240</p> <p>List Organizational Units 241</p> <p>List Servers 241</p> <p>List Users 242</p> <p>Edit Existing Objects 243</p> <p>Modify Computer Data 244</p> <p>Modify Contact Data 245</p> <p>Modify Group Data 246</p> <p>Modify Organizational Unit Data 246</p> <p>Modify User Data 246</p> <p>Move Existing Objects 248</p> <p>Delete Existing Objects 248</p> <p><b>Part V: Performing Diagnostics 251</b></p> <p><b>Chapter 13: Monitoring System Events 253</b></p> <p>Create Simple System Events 254</p> <p>Trigger System Events 257</p> <p>Create an Event 258</p> <p>Delete an Event 261</p> <p>Query an Event 261</p> <p>Manage Event Information 262</p> <p>Display a List of Publishers 262</p> <p>Get a Publisher 262</p> <p>Enumerate the Logs 263</p> <p>Query Log Events 264</p> <p>Get a Log 267</p> <p>Get Log Status Information 267</p> <p>Set a Log 267</p> <p>Export a Log 269</p> <p>Archive a Log 270</p> <p>Clear a Log 270</p> <p><b>Chapter 14: Monitoring System Performance 271</b></p> <p>Add Performance Counters 272</p> <p>Load a Performance Counter 272</p> <p>Save Performance Counter Settings 273</p> <p>Restore Performance Counter Settings 273</p> <p>Manage Performance Logs and Alerts 274</p> <p>Create a Performance Log 274</p> <p>Start Collecting Data 276</p> <p>Stop Collecting Data 276</p> <p>Query a Collection 277</p> <p>Update a Collection 277</p> <p>Delete a Collection 278</p> <p>Create New Performance Logs from Existing Logs 278</p> <p>Remove Performance Counters 281</p> <p>Convert Event Trace Logs 281</p> <p><b>Part VI: Performing Maintenance 283</b></p> <p><b>Chapter 15: Performing Basic Maintenance 285</b></p> <p>Configure the Server 286</p> <p>Understand the SQL Syntax of WMIC 287</p> <p>Use Aliases in WMIC 290</p> <p>Get Help in WMIC 302</p> <p>Format Data in WMIC 306</p> <p>Translate Data in WMIC 310</p> <p>Activate Windows 311</p> <p>Perform an Activation 311</p> <p>Display the Activation Information 312</p> <p>Change the Product Key 312</p> <p>Manage the System Time 312</p> <p>Update the Time 313</p> <p>Configure a Time Source 313</p> <p>Obtain Time Settings Information 314</p> <p>Manage the Boot Configuration 315</p> <p>Enumerate the Configurations 315</p> <p>Get BCDEdit Help 316</p> <p>Edit an Existing Boot Setting 317</p> <p>Change the Boot Sequence 318</p> <p>Set the Default Boot Item 318</p> <p><b>Chapter 16: Managing System Users 319</b></p> <p>Audit User Access 320</p> <p>List the Policies 321</p> <p>Get a Policy 322</p> <p>Set a Policy 326</p> <p>Perform a Backup 327</p> <p>Perform a Restore 327</p> <p>Clear an Audit Policy 328</p> <p>Remove an Audit Policy 328</p> <p>Work with Group Policies 328</p> <p>Obtain Group Policy Results 328</p> <p>Manage Group Policies 330</p> <p>Obtain Session Status Information 331</p> <p>Get Process Information 331</p> <p>Get Session Information 331</p> <p>Get User Information 332</p> <p>Get Terminal Server Information 332</p> <p>Get the User’s Identity 332</p> <p>Obtain User Logon Information 333</p> <p>Discover User Identity 333</p> <p><b>Chapter 17: Securing the System 335</b></p> <p>Add Virus and External Intrusion Protection 337</p> <p>Remove Viruses 337</p> <p>Detect and Remove Malicious Software 338</p> <p>Verify System Files 339</p> <p>Verify Drivers 340</p> <p>Change the Verifier Settings 342</p> <p>Configure Local Security Policies 344</p> <p>Perform an Analysis 344</p> <p>Configure Security Policies 345</p> <p>Export Policies 345</p> <p>Import Policies 346</p> <p>Validate a Policy File 346</p> <p>Work with General Applications 347</p> <p>Use TaskKill and TaskList Filters 347</p> <p>Terminate Tasks 350</p> <p>List Applications 350</p> <p>List Services 351</p> <p><b>Chapter 18: Interacting with the Registry 353</b></p> <p>Perform Basic Registry Tasks 354</p> <p>Export a Registry Key 356</p> <p>Import a Registry Key 357</p> <p>Delete a Registry Key 357</p> <p>Save the Registry 358</p> <p>Restore the Registry 358</p> <p>Use the SCRegEdit Script 358</p> <p>Set Automatic Updates 359</p> <p>Enable Terminal Services 359</p> <p>Configure the IP Security (IPSec) Monitor 360</p> <p>Manage the DNS Service Priority and Weight 361</p> <p>Use the Command Line Reference 361</p> <p>Manage the Registry 362</p> <p>Understand the Registry Settings 362</p> <p>Query a Registry Entry 363</p> <p>Add a Registry Entry 364</p> <p>Delete a Registry Entry 365</p> <p>Copy a Registry Entry 366</p> <p>Compare Registry Entries 366</p> <p>Export Registry Entries 367</p> <p>Import Registry Entries 367</p> <p>Restore Registry Entries 368</p> <p><b>Part VII: Creating Batch Files 369</b></p> <p><b>Chapter 19: Changing the Batch File Environment 371</b></p> <p>Use the CMD Switches 372</p> <p>Configure the Command Interpreter in the Registry 375</p> <p>Use Command Extensions 377</p> <p>Modify Config.NT 380</p> <p>Use ANSI.SYS to Control the Environment 382</p> <p>Set the Command Interpreter Location 382</p> <p>Run Character Mode Applications Only 383</p> <p>Display the Config.NT Commands 383</p> <p>Control the Expanded Memory EMM Entry 383</p> <p>Set the Number of Accessible Files 384</p> <p>Control Extended Memory with HIMEM.SYS 385</p> <p>Modify AutoExec.NT 387</p> <p>Set the Code Page Number with the CHCP Utility 387</p> <p>Add DPMI Support Using the DosX Utility 388</p> <p>Enable Graphics Character Support with the GrafTabl Utility 389</p> <p>Save Memory Using the LH Command 389</p> <p>Install the Network Redirector Using the ReDir Utility 389</p> <p><b>Chapter 20: Working at the Command Prompt 391</b></p> <p>Redirect Command Line Output to the Clipboard 392</p> <p>Manage Usernames and Passwords 393</p> <p>Display Usernames 393</p> <p>Create Users 394</p> <p>Delete Users 394</p> <p>Change Screen Colors 395</p> <p>Configure the System Date 396</p> <p>Configure the System Time 396</p> <p>Change the Command Window Title 397</p> <p><b>Chapter 21: Creating and Testing Batch Files 399</b></p> <p>Use Batch File Commands 400</p> <p>Employ the Call Command 401</p> <p>Employ the Choice Command 403</p> <p>Employ the Echo Command 406</p> <p>Employ the Exit Command 406</p> <p>Employ the ForFiles Utility 407</p> <p>Employ the For Command 409</p> <p>Employ the GoTo Command 414</p> <p>Employ the If Command 414</p> <p>Employ the Pause Command 418</p> <p>Employ the Prompt Command 418</p> <p>Employ the Rem Command 419</p> <p>Employ the TimeOut Utility 420</p> <p>Test Batch Files 420</p> <p>Add Debug Information to Batch Files 421</p> <p>Identify Batch Files and Their Actions 425</p> <p>Use a Centralized Data Store 428</p> <p>Store and Retrieve Directories with the PushD and PopD Commands 430</p> <p><b>Part VIII: Creating Scripts 433</b></p> <p><b>Chapter 22: Discovering Scripting Basics 435</b></p> <p>Use Scripting Languages 436</p> <p>Learn the Basics of JavaScript 436</p> <p>Learn the Basics of VBScript 438</p> <p>Use the Windows Scripting File 439</p> <p>Execute Scripts 442</p> <p>Run Scripts with the CScript and WScript Utilities 442</p> <p>Configure the Host and Property Page Options 444</p> <p><b>Chapter 23: Using the Scripting Objects 447</b></p> <p>Use the WScript Object 449</p> <p>Use the WScript Properties 449</p> <p>Use the WScript Methods 451</p> <p>Use the WScript.WshArguments Object 454</p> <p>Use the WScript.WshShell Object 455</p> <p>Use the WScript.WshNetwork Object 457</p> <p>Use the WScript.WshNetwork Properties 457</p> <p>Use the WScript.WshNetwork Methods 458</p> <p>Create a Basic Script 462</p> <p>Script the Command Line and System Environment 463</p> <p>Script the Registry 466</p> <p>Create .LNK Files 468</p> <p><b>Chapter 24: Creating Advanced Scripting Examples 471</b></p> <p>Script Registry Entries 472</p> <p>Script Networking Solutions 473</p> <p>Discover the NetSH Helper List 473</p> <p>Get NetSH Help 474</p> <p>Execute NetSH Commands 476</p> <p>Understand the Basic NetSH Contexts 476</p> <p>Use the Root Context Commands 478</p> <p>Impersonate a User 480</p> <p>Change the Environment 481</p> <p>Change Logons, Ports, and Users 481</p> <p>Enable or Disable Session Logons Directly 482</p> <p>List COM Port Mappings 482</p> <p>Modify the Install Mode 482</p> <p>Map a Network Drive 483</p> <p>Create a .CSV File 487</p> <p>Appendix A: Alphabetical Command List 493</p> <p>Appendix B: Topical Command List 505</p> <p>Appendix C: Listing of Best Practices 521</p> <p>Always Verify the Data 522</p> <p>Real Administrators Use Help 523</p> <p>Test Your Theories on a Test System 524</p> <p>Use Batch Files, Scripts, and Written Procedures 525</p> <p>Make Backups 526</p> <p>Perform User-Specific Changes during Downtime 526<br /><br /> Index 529</p>
<p><b>ABOUT THE AUTHOR</br>John Paul Mueller,</b> consultant, application developer, writer, and technical editor, has written over 300 articles and 86 books, including <i>Professional IronPython</i>. His topics range from programming and operating systems to home security and accessibility. He has contributed articles to such magazines as <i>DevSource, asp.netPro, InformIT, SQL Server Professional,</i> and <i>Visual C++ Developer</i>, among others. His website is www.mwt.net/~jmueller/.
<ul> <li>Quick & Easy Lookup</li> <li>Real-World Solutions</li> <li>Answers on the Spot</li> </ul> <p> <b>All your common Windows command-line questions answered</b></br> <i>—ON THE SPOT!</i> <p>If you need quick answers as you are working on the command line, keep this indispensable guide on hand. Designed for busy IT professionals, it,s the perfect go-to resource. You,ll find easy-to-read lists, quick-reference tables, helpful thumb tabs, and much more in a handy, compact format that puts the information you need at your fingertips. <p><b>TOPICS INCLUDE:</b> <ul> <li>Using the command line in Windows Server<sup><small>®</small></sup> 2008 Server Core, Server 2008 (including R2), and Windows<sup><small>®</small></sup> 7</li> <li>The most common commands and utilities–149 in all</li> <li>Using Remote Desktop to perform command-line tasks</li> <li>Working with Active Directory<sup><small>®</small></sup> and configuring Directory Services with command line</li> <li>Managing, maintaining, and securing systems</li> <li>Creating batch files and scripts</li> </ul>

Diese Produkte könnten Sie auch interessieren:

From Grids To Service and Pervasive Computing
From Grids To Service and Pervasive Computing
von: Thierry Priol, Marco Vanneschi
PDF ebook
96,29 €
Grid Computing
Grid Computing
von: Sergei Gorlatch, Paraskevi Fragopoulou, Thierry Priol
PDF ebook
149,79 €
Autonomic Communication
Autonomic Communication
von: Athanasios V. Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz
PDF ebook
149,79 €