The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".
The following errata were submitted by our customers and approved as valid errors by the author or editor.
Version |
Location |
Description |
Submitted By |
Date submitted |
Date corrected |
Printed, PDF |
Page 7
2nd paragraph |
page 7 , 2nd paragraph, about stub zones, reads :
" When done securely, zone transfers must be specifically approved and configured on the source DNS server. This means that you must be able to get administrative cooperation from the source if you hope to pull a stub zone to your DNS server."
this sentence has ambiguity because as we now, stub zones don't need zone transfer be allowed on the source DNS server.
so if additional explanation would help , please add here.
Note from the Author or Editor: Please delete the referenced NOTE completely. No additional information or alteration is required. Thank you.
David R. Miller
|
Anonymous |
Oct 02, 2011 |
Jan 20, 2012 |
Printed, PDF |
Page 205
#14 (at bottom) |
Value for 'msDS-PasswordComplexityEnabled' attribute should be FALSE in oder to change password for accout don_hall as requested in #31 (page 207 middle).
Please note that this error is also present in the first edition of this book! (page 220).
Note from the Author or Editor: In the printed version, page 205, step # 14 -
Change the word TRUE to the word FALSE.
Thank you.
David R. Miller
|
Sven Elming |
Sep 06, 2011 |
Sep 30, 2011 |
Printed, PDF |
Page 228
last column of the fourth row of Table 5-2 |
On page 228, at the last column of the fourth row of Table 5-2 , the word "protocol" should be replaced by the word "Payload".
so Change:
"Allows IPsec Encapsulating Security Protocol (ESP) traffic to the VPN server"
To:
"Allows IPsec Encapsulating Security Payload (ESP) traffic to the VPN server"
Note from the Author or Editor: Microsoft documentation uses both terms for ESP, but RFC 2406 calls it Encapsulating Security Payload.
Change:
"Allows IPsec Encapsulating Security Protocol (ESP) traffic to the VPN server"
To:
"Allows IPsec Encapsulating Security Payload (ESP) traffic to the VPN server"
|
hamed zargham |
Aug 11, 2011 |
Sep 30, 2011 |
Printed |
Page 29
Step 4 of Exercise 3 |
"Enter dnscmdglasgow /ZoneAdd 0.c.e.f.ip6.arpa /DsPrimary." Should read "Enter dnscmd glasgow /ZoneAdd 0.c.e.f.ip6.arpa /DsPrimary."
Note from the Author or Editor: Please change
Enter dnscmdglasgow /ZoneAdd 0.c.e.f.ip6.arpa /DsPrimary
to
Enter dnscmd glasgow /ZoneAdd 0.c.e.f.ip6.arpa /DsPrimary
Thank you.
David R. Miller
|
Anonymous |
Jul 19, 2011 |
Sep 30, 2011 |
Printed |
Page xvii
5th paragraph |
On the third line down on the fifth paragraph the sentence starts "The subnet mask is 225.225.225.0, and the Domain Name System (DNS) address is...". I believe the subnet mask should be "255.255.255.0".
Note from the Author or Editor: Please change the referenced subnet mask 225.225.225.0 below step # 4 to 255.255.255.0
Thank you.
David R. Miller
|
Anonymous |
Jul 11, 2011 |
Sep 30, 2011 |
PDF |
Page 435-436
pg 435 Note Section; pg 436 second bullet |
pg 435 note section: You can backup partial volumes (selected files) now with 2008 R2
pg 436, second bullet, With 2008 R2 you can perform a scheduled backup to a network share
Note from the Author or Editor: Please change the NOTE on page 435 to read:
NOTE YOU CANNOT BACK UP FILE ALLOCATION TABLE (FAT) VOLUMES, BUT CAN NOW BACK UP PARTIAL VOLUMES
Only NTFS volumes on locally attached disks can be backed up by using Windows Server Backup. New in Windows Server 2008 R2, you can use Windows Server Backup to back up selected files or
folders.
On page 436, second bullet
In Windows Server 2008 R2 Windows Server Backup, you can now perform a scheduled backup to a network share. However, each new scheduled backup to a network share location overwrites the previous backup. You can also store backups on virtual hard disks.
|
Anonymous |
Jul 02, 2011 |
Sep 30, 2011 |
PDF |
Page 424, 425
3rd paragraph |
There is a fifth mode on Windows 7/ 2008 R2:
- USB and PIN required with TPM
http://technet.microsoft.com/en-us/library/ee449438%28WS.10%29.aspx#BKMK_MultifactorSupport
Note from the Author or Editor: On page 424 under the section titled "Choosing a BitLocker Authentication Mode"
Change the first sentence to read
BitLocker supports five separate authentication modes.
On page 425, add another bullet at the end of this section, and before the section titled "BitLocker Security Design Considerations"
USB plus PIN with TPM This provides the strongest authentication method for BitLocker, encorporating multi-factor authentication (something you have (USB) and something you know (PIN)). Using both the USB drive and PIN with the TPM chip can only be configured by using the Manage-bde command-line tool, and cannot be configured using the BitLocker setup wizard.
Thank you.
David R. Miller
|
Anonymous |
Jul 02, 2011 |
Sep 30, 2011 |
PDF |
Page 286
Bullet List |
The list of server core roles is incomplete. The missing roles for 2008 R2 are:
- Active Directory Certificate Services
- BranchCache Hosted Cache
- Hyper-V
Note from the Author or Editor: Please replace the bulleted list with the following list from
http://technet.microsoft.com/en-us/library/ee441260(WS.10).aspx:
Active Directory Certificate Services
Active Directory Domain Services
Active Directory Lightweight Directory Services (AD LDS)
DHCP Server
DNS Server
File Services (including File Server Resource Manager)
Hyper-V
Streaming Media Services
Print and Document Services
Web Server (including a subset of ASP.NET)
Thank you.
David R. Miller
|
Anonymous |
Jul 01, 2011 |
Sep 30, 2011 |
PDF |
Page 10
NOTE box and bullet following |
NSLOOKUPLS -D <DOMAIN NAME>
should be
NSLOOKUP -D <DOMAIN NAME>
and in the Netsh bullet paragraph
netshinterface
should be
netsh interface
Note from the Author or Editor: In the title for the NOTE on page 10, please change
NSLOOKUPLS -D <DOMAIN NAME>
to
NSLOOKUP LS -D <DOMAIN NAME>
Please change the contents of the NOTE to read:
Within the nslookup command shell, use the ls -d <domain name> command to request a zone transfer for the specified domain name. From a CMD command shell, use the command nslookup -d <domain name> to request the zone transfer. For security purposes, by default, zone transfers are disabled. To make this command work correctly, you must allow zone transfers to the computer making the nslookup request.
And in the third sentence of the description for netsh (bottom bullet), please change
netshinterface
to
netsh interface
|
Anonymous |
Jun 11, 2011 |
Sep 30, 2011 |