About the Update 1 Book

This book includes the following chapters.

Chapter 1, "Setup," discusses issues concerning the setting up of Windows NT Workstation and Windows NT Server, and introduces utilities included in this resource kit that are designed to make it easier to set up. In particular, it discusses fine points of and enhancements to the Computer Profile Setup (CPS) utility.

Chapter 2, "Licensing," provides information on how to choose the appropriate licensing mode, a list of many common situations that use up licenses from the pool of available licenses, some of the license purchasing requirements for specific Microsoft BackOffice server products, and additional technical information, such as a Visual Basic for Applications (VBA) code example for using OLE to export user data to a spreadsheet and what files to copy to install License Manager on a computer running Windows NT Workstation.

Chapter 3, "Security," addresses security issues that face administrators of computers and computer networks. It discusses the Windows NT security features that you can implement to establish various levels of security, and criteria for choosing whether or not to use specific security options. It also introduces the C2CONFIG utility, which helps you set up a computer system that satisfies the federal requirements for C2-level security certification.

Chapter 4, "Internet Services and Security," introduces the utilities included in this resource kit, and the functionality in Windows NT Server, that make Windows NT Server an excellent platform for Internet content providers. It also provides tips on using Windows NT Workstation to connect to the Internet. And it addresses some of the security issues you should be aware of when you connect your computer to the Internet in any capacity.

Chapter 5, "SNMP," describes the Simple Network Management Protocol (SNMP), a member of the TCP/IP protocol family. It includes overview information about SNMP, instructions for installing and configuring SNMP, information on how a network administrator can use SNMP, and high-level information of interest to programmers. The chapter concludes with a list of reference material.

Chapter 6, "Troubleshooting," provides information for troubleshooting problems in addition to that included in Chapter 18, "Troubleshooting," in the Windows NT Resource Guide.

Appendix A, "Major Revisions to the Windows NT Networking Guide," includes revised versions of sections from Chapter 9 and Chapter 22 in the Windows NT Networking Guide and a totally revised Appendix B, "MIB Object Types for Windows NT." These major changes were not incorporated into the revised edition of Volume 2 that accompanies this version of the Windows NT Resource Kit.

Appendix B, "Major Revision to Windows NT Messages," includes a totally rewritten version of "The Windows NT Debugger" section of Chapter 2, "Windows NT Executive Messages," in the Windows NT Messages book. It now reflects the new debugging tools that were included with the Windows NT Server and Windows NT Workstation version 3.51 release. It provides information on how to use the new utilities that can automatically read and interpret dump files. It also provides instructions for configuring the Kernel debuggers (KDs) for local debugging. This major change was not incorporated into the revised edition of Volume 3 that accompanies this version of the Windows NT Resource Kit.

Appendix C, "Minor Revisions to Existing Resource Kit Books," includes a list (organized by book, chapter, and page number) of all the changes that have been incorporated into the revised editions of the four-volume set of resource kit books for Version 3.5.

Appendix D, "Security in a Software Development Environment," provides detailed information on protecting and auditing objects that are not normally accessed by anything other than the Windows NT operating system itself. This chapter is of use in a software development environment, or in situations where custom software shares the system with sensitive data. This appendix also describes special cases of auditing that might be of interest to administrators of high-level security installations.

Appendix E, "Domain Planning for Your Enterprise," provides in-depth information on the implementation of Microsoft Windows NT Server 3.51, with a focus on domains and domain strategies, for those networking groups who may need assistance in planning the design and implementation of domains for their network. The goal of this appendix is to provide an understanding of the various domain models, the business and technical reasons for selecting one model as opposed to the others, as well as the advantages and trade-offs associated with each of the domain models.

Index to this Windows NT Update 1 book.