| | Copyright |
| | Credits |
| | | About the Author |
| | | Contributors |
| | | Acknowledgments |
| | Foreword: I'm a Sci-Fi freak |
| | Preface |
| | | Why Windows Server Hacks? |
| | | Getting and Using the Scripts |
| | | How to Use This Book |
| | | How This Book Is Organized |
| | | Conventions Used in This Book |
| | | Using Code Examples |
| | | How to Contact Us |
| | | Got a Hack? |
| | Chapter 1. General Administration |
| | | Hacks #1-16 |
| | | Section 1. Use Run As to Perform Administrative Tasks |
| | | Section 2. Drag and Drop to the Run Menu |
| | | Section 3. Find and Replace Registry Keys from a Command Line |
| | | Section 4. Automatically Log On After Booting |
| | | Section 5. Wait for and Optionally Terminate a Process |
| | | Section 6. Shut Down a Remote Computer |
| | | Section 7. Rename Mapped Drives |
| | | Section 8. Execute a Command on Each Computer in a Domain |
| | | Section 9. Add, Remove, or Retrieve Environment Variables |
| | | Section 10. Extend Group Policy |
| | | Section 11. Disable EFS |
| | | Section 12. Get Event Log Information |
| | | Section 13. Shortcut to Remote Assistance |
| | | Section 14. Desktop Checker |
| | | Section 15. Top Five Tools |
| | | Section 16. myITforum.com |
| | Chapter 2. Active Directory |
| | | Hacks #17-24 |
| | | Section 17. Retrieve the List of Old Domain Computer Accounts |
| | | Section 18. Automate Creation of OU Structure |
| | | Section 19. Modify All Objects in the OU |
| | | Section 20. Delegate Control of an OU to a User |
| | | Section 21. Send OU Information in Active Directory to an HTML Page |
| | | Section 22. Display Active Directory Information |
| | | Section 23. Store and Display Contact Information in Active Directory |
| | | Section 24. Restore the Active Directory Icon in Windows XP |
| | Chapter 3. User Management |
| | | Hacks #25-35 |
| | | Section 25. Search for Domain Users |
| | | Section 26. Manage User Accounts in Active Directory |
| | | Section 27. Get a List of Disabled Accounts |
| | | Section 28. Get User Account Information |
| | | Section 29. Check for Passwords that Never Expire |
| | | Section 30. Enumerate Group Membership to a CSV File |
| | | Section 31. Modify User Properties for All Users in a Particular OU |
| | | Section 32. Check Group Membership and Map Drives in a Logon Script |
| | | Section 33. Script Creation of a User's Home Directory and Permissions |
| | | Section 34. Prevent Ordinary Users from Creating Local Accounts |
| | | Section 35. Put a Logoff Icon on the Desktop |
| | Chapter 4. Networking Services |
| | | Hacks #36-47 |
| | | Section 36. Manage Services on Remote Machines |
| | | Section 37. Simplify DNS Aging and Scavenging |
| | | Section 38. Troubleshoot DNS |
| | | Section 39. Manually Recreate a Damaged WINS Database |
| | | Section 40. Change WINS for All Enabled Adapters |
| | | Section 41. Ensure DHCP Server Availability |
| | | Section 42. Change a Network Adapter's IP Info |
| | | Section 43. Change from Static IP to DHCP |
| | | Section 44. Release and Renew IP Addresses |
| | | Section 45. Use netsh to Change Configuration Settings |
| | | Section 46. Remove Orphaned Network Cards |
| | | Section 47. Implement Windows 2000 Network Load Balancing |
| | Chapter 5. File and Print |
| | | Hacks #48-53 |
| | | Section 48. Map Network Drives |
| | | Section 49. Determine Who Has A Particular File Open on the Network |
| | | Section 50. Display a Directory Tree |
| | | Section 51. Automate Printer Management |
| | | Section 52. Set the Default Printer Based on Location |
| | | Section 53. Add Printers Based on Name of Computer |
| | Chapter 6. IIS |
| | | Hacks #54-61 |
| | | Section 54. Back Up the Metabase |
| | | Section 55. Restore the Metabase |
| | | Section 56. Map the Metabase |
| | | Section 57. Metabase Hacks |
| | | Section 58. Hide the Metabase |
| | | Section 59. IIS Administration Scripts |
| | | Section 60. Run Other Web Servers |
| | | Section 61. IISFAQ |
| | Chapter 7. Deployment |
| | | Hacks #62-68 |
| | | Section 62. Get Started with RIS |
| | | Section 63. Customize RIS |
| | | Section 64. Tune RIS |
| | | Section 65. Customize SysPrep |
| | | Section 66. Remove Windows Components from the Command Line |
| | | Section 67. Unattended Installation of Windows Components |
| | | Section 68. Easily Create a Network Boot Disk |
| | Chapter 8. Security |
| | | Hacks #69-78 |
| | | Section 69. Fundamentals of a Virus-Free Network |
| | | Section 70. Antivirus FAQ |
| | | Section 71. Rename the Administrator and Guest Accounts |
| | | Section 72. Get a List of Local Administrators |
| | | Section 73. Find All Computers that Are Running a Service |
| | | Section 74. Grant Administrative Access to a Domain Controller |
| | | Section 75. Secure Backups |
| | | Section 76. Find Computers with Automatic logon Enabled |
| | | Section 77. Security FAQ |
| | | Section 78. Microsoft Security Tools |
| | Chapter 9. Patch Management |
| | | Hacks #79-89 |
| | | Section 79. Best Practices for Patch Management |
| | | Section 80. Beginners Guide to Enterprise Patch Management |
| | | Section 81. Patch-Management FAQ |
| | | Section 82. Enumerate Installed Hotfixes |
| | | Section 83. Apply Patches in the Correct Order |
| | | Section 84. Windows Update FAQ |
| | | Section 85. Obtain Updates via the Windows Update Catalog |
| | | Section 86. Use Automatic Updates Effectively |
| | | Section 87. Use Group Policy to Configure Automatic Updates |
| | | Section 88. Automatic Updates FAQ |
| | | Section 89. Software Update Services FAQ |
| | Chapter 10. Backup and Recovery |
| | | Hacks #90-100 |
| | | Section 90. Collect Disaster Recovery Files |
| | | Section 91. Back Up Individual Files from the Command Line |
| | | Section 92. Back Up System State on Remote Machines |
| | | Section 93. Back Up and Restore a Certificate Authority |
| | | Section 94. Back Up EFS |
| | | Section 95. Work with Shadow Copies |
| | | Section 96. Back Up and Clear the Event Logs |
| | | Section 97. Back Up the DFS Namespace |
| | | Section 98. Recover with Automated System Recovery |
| | | Section 99. Recovery Roadmap |
| | | Section 100. Data Recovery of Last Resort |
| | Colophon |
| | Index |