Technical Reference for Windows Server 2008

Applies To: Windows Server 2008

Use the following technical references to gain detailed knowledge of how technologies work in Windows Server® 2008.

Learn more

Find information by browsing to technology sections.

Application Server

Message Queuing Technical Reference

Learn more about the individual components and features of Message Queuing, including Message Queuing security considerations, Message Queuing tools, and various settings that can be applied to Message Queuing.

Domain Name System (DNS)

DNS Technical Reference

Explore the technical reference for DNS.

Dynamic Host Configuration Protocol (DHCP)

DHCP Technical Reference

Find technical information about DHCP in Windows Server 2008.

Group Policy

Group Policy ADMX Syntax Reference Guide

Learn about creating and editing custom ADMX files, which allow you to create a user interface in the Group Policy Management Console or the Local Group Policy Editor to display Group Policy settings.

Network and Sharing Center

Network and Sharing Center Technical Reference

Learn more about Network and Sharing Center with this technical reference.

Network Policy Server (NPS)

Network Policy Server (NPS) Technical Reference

Find out more about NPS, which is Microsoft's implementation of the Remote Authentication Dial-In User Service (RADIUS) protocol and a key NAP component.

Netsh Commands for Network Policy Server

Learn more about NPS Netsh commands with this comprehensive command reference.

Network Shell (Netsh)

Network Shell (Netsh) Technical Reference

Learn how to use Netsh with this comprehensive command reference, and learn to create scripts to automate the management of networking technologies in Windows Server 2008. This reference is also available for download in Windows Help format (*.chm) from the Microsoft Download Center.

Server Security Policy Management

Server Security Policy Management Technical Reference

Learn about server security management, tools, and settings with this technical reference.


Telnet Technical Reference

Discover reference information about Telnet, including the functions that Telnet performs, and how Telnet servers and clients interact. This reference includes conceptual information and references for the various tools, registry entries, errors and events, and the Requests for Comment (RFCs) supported by the Microsoft implementation of Telnet.

Terminal Services

Remote Desktop Services (Terminal Services) Command Reference

Learn from a list of Terminal Services command-line tools that are available in Windows Server 2008. This topic includes links to additional information about each command-line tool, such as the syntax for the command-line tool and an explanation of the parameters.

Group Policy Settings for Terminal Services in Windows Server 2008

Learn from links to information about the Group Policy settings for Terminal Services, including a link to a list of Group Policy settings that are new for Terminal Services in Windows Server 2008.

Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP/IP (v4 and v6) Technical Reference

Learn about how TCP/IP with IPv4 and IPv6 relates to other networking protocols, the functions it performs, how IP addresses are structured and assigned, and how packets are structured and routed.

Windows Deployment Services


Learn from the wdsutil tool command-line syntax reference.

Windows Deployment Services Components

Discover Windows Deployment Services components.

Windows Deployment Services Processes

Explore Windows Deployment Services processes.

Windows Deployment Services Registry Entries

Learn about Windows Deployment Services registry entries.

Windows Firewall with Advanced Security and IPsec

IPsec Algorithms and Methods Supported in Windows

Review tables that show which IPsec key exchange algorithms, integrity algorithms, encryption algorithms, and authentication methods are supported in each version of the Windows operating system.

Improving Network Performance by Using IPsec Task Offload

Discover the performance benefits of using a network adapter that contains a dedicated cryptographic processor to offload IPsec computational work from the main processor.