Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] - نسخه متنی

Roberta Bragg

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Computer Roles


Each computer in the network plays a specific role. Computer roles are operations such as DHCP server, file and print server, database server, domain controller, and desktop. Computers themselves are authorized to perform certain functions or are restricted from doing so based on the role that they play. Domain controllers, for example, are the only computers in the domain that can host the Active Directory, while any server can be utilized as a print server by defining a logical printer, adding the correct printer driver, and sharing the service. You could alter this role by removing the printer or by disabling some services, blocking access from the network, and so on.

To create a computer role, you add a service(s) and configure the system. Three options may be used to create a computer role:

The Manage Your Server console can be used to select a computer role. A wizard will then install and configure the services required to implement the role.

You can manually add applications or additional services by using the Add/Remove Windows Applications in the Control Panel.

Some roles can be added via the command line. For example, entering the dcpromo command will promote a server to the domain controller role or demote an existing domain controller.


You must have the appropriate authority to add a computer role to a server. For example, a Windows 2003 DHCP server will shut itself down if it is not authorized in the Active Directory. Computer roles are discussed further in Chapters 11, 12, "PKI Basics" and Chapter 14, "Securing Remote Access."


/ 194