Learning Windows Server 2003

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SAM (Security Accounts Manager)

     Active Directory and     machine local groups and

SAs (security associations) saved indexes

scalability     Active Directory

scans, Indexing Service     initiating

SCAT (Security Configuration and Analysis Tool) 2nd 3rd

     enforcing security policies    system security         scanning with

     system security, correcting with

     template databases, creating/using

schema

     classesSchema Admins group

     schema masters, changing

schema master     identifying

     Windows 2000 Server, identifying onschemas

    master [See schema master]    naming

         replication topologies and

scope of indexes

scripted installation (RIS)

Scriptomatic utility

scripts

     assigning with domain GP

     automated administration of IIS

     baselining, NAQC

     GP

    logon/logoff

         NETLOGON default share

         print configuration and mapping

     Microsoft Scripting Debugger

    operating system         managing     unattended installation, using for

         constructing setup scripts

    unattended installations, using for         WINNT32 command-line switches

SCW (Security Configuration Wizard) 2nd

     auditing mode

     configuration mode

     installing

     security policy, creating

searching     enhancements to Windows Server 2003

     for GPOs SECEDIT utility

secondary nameservers     configuring

     stub zones and     upgrading to primary

     zone transfers

secure channels secure private connection, RRAS setup scenario Secure Sockets Layer, security of, Service Pack 1 and

SECUREDC.INF template

securews.inf

SECUREWS.INF template

security 2nd     Active Directory-integrated DNS

     application pool security content

     ASP.NET and     auditing 2nd

    backups [See backups]     Certificate Authority

     configuring     DNS requests, keeping outside firewalls

    EFS

         enhancements to

    encryption [See encryption]

     event logs

         Event Viewer

     false sense of, Offline Files and Folders

    firewalls

         ports on, Windows Time Service requirements and

     FrontPage Server Extensions

    FTP protocol

         inherent lack of

         new security features in IIS 6

    FTP sites

         user isolation in IIS 6     GP and 2nd     GPOs and

         managing

         refresh interval    hotfixes

         Microsoft Windows Update website, accessing for

     IIS 2nd

         deleting default directories

         enabling only if it's used

         evaluating Indexing Service

         IIS 6         ISAPI filters

         keeping updated         killing unused ports

         quering machines for update levels         using both IIS and NTFS security

     locking down Windows systems         account lockout policies 2nd

         local options

         password requirements         setting network options with GPs     .NET Framework

         code access security

         role-based security

    networks

         mobile users     NNTP newsgroup server data transmission

     NTFS and

    patches [See security patches]    policies [See security policies]

    printer settings         Manual setting for default paper source

    remote IIS administration         avoiding

     RPC-based, ensuring with Terminal Services Configuration applet

     servers

         layered approach

         Windows Internet print

         Windows NT RAS

    Share a Folder wizard

         custom permissions feature

     share permissions

         NTFS

     split DNS architecture 2nd

     SSL and, Service Pack 1

     SUS

         client side, using on

         problems/workarounds         server side, using on     Terminal Services Configuration applet settings

     user certificate integrity, protecting

     web site content, restricting availability of         authentication settings

     (see also SCA; SCW; system security

Security Accounts Manager (SAM)

     Active Directory and

security associations (SAs)

Security Configuration and Analysis MMC snap-in [See SCA]

Security Configuration and Analysis Tool (SCAT)Security Configuration Wizard [See SCW]

Security Event Log     permissions use messages

security groups     individualized, assigning print permissions to

security identifiers [See SIDs]security IDs (SIDs)

     problems with

security patches    managing [See SUS]     scanning clients for information about

security policies [See also account lockout policies] [See also account lockout policies]

     auditing

     creating/enforcing

         security templates         with MBSA

         with SCAT

     logon time restrictions     organizing

security templates 2nd     compiling into template database 2nd

     configuring     custom, creating 2nd

     importing into GPO

     restoring default

     Security Templates snap-in

Security Templates snap-in 2nd

security.config file

separator printer page

server clusters [See true server clusters]

server message block [See SMB]

Server Operators group

     shared folders

servers

     Active-Directory DNS, replication and

     applications based on, benefits of shadow copies

     authoritative         NS records, defining with     DHCP, dynamic DNS and

    DNS

         reverse lookup zones         stub zones

     file, setting up

     FTP

     global catalog, domain naming master role

     headless, support for

     installing

     Internet print, vulnerabilities of    mail

         MX records and         reverse lookups and

     maintenance periods, enabling/disabling Dfs referrals     multiple, security considerations

    nameservers [See nameservers]     2nd [See also NNTP newsgroup servers] [See also NNTP newsgroup servers]

     POP3

    print         configuring         removing

         storing drivers on, facilitating driver revisions

    RIS

         activating

    security         layered approach

         security templates

     security principles     slave

        ) [See also forwarding process (DNS] [See also forwarding process (DNS]    SMTP [See also SMTP virtual servers] [See also SMTP virtual servers]

     SUS, using on         Automated Updates client, pushing out

         synchronizing/approving content

    terminal

         installing applications on

     web

         checking status of

     Windows 2000 Terminal Services Licensing

    Windows NT 4.0

         migrating NT domains to Active Directory

    Windows NT RAS

         anonymous access to, denying

    Windows Server 2003

         printers to, adding

     WTS licensing, configuring

Service Pack 1     SCW         creating security policy

         installing

Service Pack 3     Automatic Updates feature

service packs

     deploying with GP

    levels of

         migrating NT domains to Active Directory

     Microsoft Windows Update website, accessing for

     slipstreaming after RIS installationservice records [See SRV records]

Services for NetWare (SFN)sessions

     authenticatingsetting

     NTFS file/folder permissions     quotas

         default

         default, on Windows Explorer         on volumessetting up

     Recovery Console

settings file, Machine scope

Settings XML-based configuration files

Setup ManagerSetup program

     issues with when migrating Windows NT domains to Active Directory

setup security.inf Setup security.inf template

setup security.inf template SFN (Services for NetWare)

shadow copies     associations

     creating

     deleting

     enabling

     managing from command-line

     modifying schedule

     restrictions on

     storage space, deleting

     volume, enhancements to Windows Server 2003

     volumes

     warnings about

shadow indexes

shadow merge process

Share a Folder wizard

     folders, creating manually         configuring permissionsshared folders

     creating 2nd

         default shares         manually

     root nodes

shared printers [See print sharing services]

shares

    file [See file sharing]

    folder [See folder shares]

    master         replication and

    printer [See print sharing services] Shiva LAN Rover clients, network connections

Shiva Password Authentication Protocol (SPAP) SIDs (security identifiers)

     problems with simple installation (RIS)

Simple Mail Transfer Protocol [See SMTP]

site links     based over IP, building     spanning, replication and

sites

     domain controller replication

     GPs, implementing

    links among [See site links]     managing bandwidth, replication across WAN links

     replication among, spanning trees

slave servers    ) [See also forwarding process (DNS] [See also forwarding process (DNS]

slipstreaming     RIS images

SMB (server message block) SMTP (Simple Mail Transfer Protocol) 2nd

SMTP servers

SMTP virtual servers

     creating

     individual properties

         accessing LDAP servers

         authentication

         client access

         IP address/port assignment

         message transmission options

         message type specifications

         multiple DNS domains, sending/receiving email for

SMTPSVC [See SMTP servers]

SOA records (start of authority records)

     entering/editing soft quotas SPAP (Shiva Password Authentication Protocol)

special permissions

specifying cryptography providers spoofing

2nd [See also security] [See also security]

SRV records (service records)

SSL (Secure Sockets Layer)

     security of, Service Pack 1 and

standalone root nodes

standard permissionsstart of authority records [See SOA records]

start spooler commandstarting/stopping

     printer spooler starting/stopping printer spooler from command-line

Startup section, Settings file     runtime version configuration

startup/shutdown events

     security auditing sticky referrals to Dfs clients stop spooler command

stopping printer spooler service from command-line

storage devices, cluster members

     managing

storage devices, shared by cluster Strategic Technology Protection Program

stripe sets, upgrading Windows NT and

stub zones 2nd subdomains

     creating         child domain levels and

superscopes, configuring DHCP servers with SUS (Software Update Services)

     client side, using on

         system monitoring

         update download and installation

     problems/workarounds

     requirements

     server side, using on

         Automated Updates client, pushing out

         synchronizing/approving content

synchronizing

     monitor and printer colors

Sysprep 2nd

sysprint.sep file

     separator page, choosing

system administration    installation         choosing components to

System Event log

    permissions use messages         specifying from command-line

system files

     datafiles, keeping separate from

system image

     deploying for unattended installation

system policies

    local         object access auditing, enabling

system queues (MSMQ)system root folder

     files in, EFS inability to encryptsystem security

     correcting with SCAT    scanning with SCAT

         configuring

System Volume Information folderSystem32 folder     separator page files provided in

SYSTEMROOT command (Recovery Console)

SYSVOL default share

     international operations

Категории