Microsoft Windows Server 2003 Delta Guide (2nd Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SAC (Special Administration Console)

       EMS (Emergency Management Services)   2nd  

SAK (Server Appliance Kits)

       headless servers  

       Saprep.exe utility  

SAN (Storage Area Networks)  

       managing

               Disk Management console  

               VDS (Virtual Disk Services)  

       multipath failover  

SAN (System Area Network)  

Saprep.exe utility  

Saved Queries feature (Active Directory administrative tools)   2nd  

saving

       Security Templates snap-in changes  

       updates

               SUS (Software Update Services)  

sc command-line tool  

SCA (Security Configuration and Analysis) snap-in   2nd  

       security databases   2nd  

scheduling

       shadow copies (file sharing)  

schemas

        deactivating

               Active Directory architectural tools   2nd  

schtasks command-line tool  

screensavers  

scripts

       administrative scripts

               VBScript   2nd   3rd   4th   5th   6th   7th  

Scripts settings (Computer Configuration policy sections)   2nd  

Scripts settings (New User Configuration policy sections)  

Secedit tool

       setup security.inf security template  

secedit.exe   2nd  

Secedit.exe command-line tool

       security templates, applying  

       tutorial Web site  

securedc template  

securedc.inf security template   2nd  

securews template  

securews.inf security template   2nd  

security   2nd  

       account policies  

       auditing   2nd  

               configuring file/folder access  

               DNS logs  

               domain events  

               IIS (Internet Information System) log files  

       code access security policies, managing   2nd   3rd  

       cross-forest trusts (Active Directory)   2nd  

               IAS (Internet Authentication Service)  

       data encryption

               EFS (Encrypting File System)   2nd  

       DDNS (Dynamic DNS)  

       DHCP (Dynamic Host Configuration Protocol)  

       DNS   2nd  

       EFS (Encrypting File System)  

               implementing   2nd  

       encrypted files

               storing on remote servers   2nd  

       encryption

               2048-bit encryption  

               EFS (Encrypting File System)   2nd   3rd  

               terminal servers   2nd  

       event log policies  

       file system policies  

       firewalls

               ICF (Internet Connection Firewall)   2nd   3rd   4th  

               ICF (Internet Connection Firewall);enabling  

        hfnetchk .exe   2nd   3rd  

       IIS (Internet Information Services) console   2nd   3rd   4th  

       IIS (Internet Information System)  

               auditing log files  

        insecure password warnings  

       IPSec (Internet Protocol Security) protocol  

               dynamic addresses  

               encryption keys  

               IPSec Monitor snap-in   2nd  

               IPSec/L2TP tunnels  

       local policies  

       Local Security Policy snap-in   2nd  

       maintenance  

               hotfixes  

               security updates   2nd  

               service packs   2nd  

       Microsoft security philosophy   2nd   3rd  

       Microsoft Security Web site  

       NET Framework  

       NetMon (Network Monitor)   2nd  

               bone broadcasts  

       passwords

               terminal servers   2nd  

       registry policies  

       Remote Desktop for Administration  

       restricted group policies  

       SCA (Security Configuration and Analysis) snap-in   2nd  

               security databases   2nd  

       secedit.exe   2nd  

       Security Configuration Manager  

               hfnetchk.exe   2nd   3rd  

               Local Security Policy snap-in   2nd  

               SCA (Security Configuration and Analysis) snap-in   2nd   3rd   4th  

               secedit.exe   2nd  

               Security Settings extension (Group Policy)   2nd  

               Security Templates snap-in   2nd   3rd   4th   5th   6th  

       security databases

               SCA (Security Configuration and Analysis) snap-in   2nd  

       security holes  

               DHCP (Dynamic Host Configuration Protocol)  

               DNS   2nd  

               IIS (Internet Information System)  

               NetMon (Network Monitor)   2nd   3rd  

       Security Settings extension (Group Policy)   2nd  

       security templates   2nd  

               account policies  

               creating custom templates  

               DC security templates  

               event log policies  

               file system policies  

               local policies  

               registry policies  

               restricted group policies  

               securedc  

               securews  

               system service policies  

       Security Templates snap-in   2nd  

               configuring   2nd   3rd  

               creating custom security templates  

               definition settings   2nd  

               saving changes  

       smart cards

               terminal servers  

       system service policies  

       terminal servers  

               encryption   2nd  

               passwords   2nd  

               smart cards  

       Terminal Services

               Enable TS per NIC setting  

               Full Security Permission Compatibility setting  

               NIC for Session Directory to Use for Redirection setting  

               Relaxed Security Permission Compatibility setting  

       WebDAV (Web Distributed Authoring and Versioning)   2nd   3rd  

Security Configuration and Analysis snap-in (MMC)

       security templates, applying  

Security Configuration Manager  

       hfnetchk.exe   2nd   3rd  

       Local Security Policy snap-in   2nd  

       SCA (Security Configuration and Analysis) snap-in   2nd  

               security databases   2nd  

       secedit.exe   2nd  

       Security Settings extension (Group Policy)   2nd  

       Security Templates snap-in   2nd  

               configuring   2nd   3rd  

               creating custom security templates  

               definition settings   2nd  

               saving changes  

security databases

       analyzing   2nd  

       configuring

               manual configuration  

               specifying file permissions  

               specifying password policies  

       SCA (Security Configuration and Analysis) snap-in   2nd  

       security templates, analyzing   2nd  

       security templates, importing into   2nd  

security hotfixes.   [See security updates]

security policies  

security prinicipal policies

       browsing

               RSOP (Resultant Set of Policy)  

Security Settings extension (Group Policy)   2nd  

security templates  

       applying  

       compatws.inf  

       DC security.inf  

       hisecdc.inf  

       hisecws.inf  

       notssid.inf  

       rootsec.inf  

       securedc.inf   2nd  

       securews.inf   2nd  

       security databases

               analyzing   2nd  

               importing into   2nd  

       setup security.inf  

               group policies  

               Secedit tool  

Security Templates snap-in   2nd  

       changes, saving  

       configuring   2nd   3rd  

       custom security templates

               creating  

       definition settings   2nd  

security updates  

security updates (security maintenance)   2nd  

Security/Templates subfolder

       security templates  

Select License agreements  

Select license agreements  

Select License agreements

       LAR (Large Account Resellers)  

select program license keys (Windows Product Activation)  

Select Remote Users button (Remote Desktop for Administration)

       Administration accounts

               granting access permissions  

selecting

       multiple objects

               Active Directory administrative tools  

serial ports

       OOB (out of bandwidth) management  

       Windows requirements  

server appliances.   [See headless servers]

server management

       Group Policy Management Console  

       security templates  

               compatws.inf  

               DC security.inf  

               hisecdc.inf  

               hisecws.inf  

               notssid.inf  

               rootsec.inf  

               securedc.inf   2nd  

               securews.inf   2nd  

               setup security.inf  

       security templates, applying  

       software restriction policies

                components   2nd   3rd   4th  

server-based DFS (distributed file system)  

servers

       application servers  

       configuring

               IIS (Internet Information Services) console  

       Datacenter Server   2nd  

Servers

       Datacenter Server  

servers

       Datacenter Server

               Cluster Service  

               NLB support of IPSec/L2TP tunnels  

               Terminal Server Session Directory   2nd  

               updates  

       DNS servers

               forwarders  

               glue records   2nd  

               managing permissions  

               recursion  

       Enterprise Server

               AWE (Address Windows Extensions)  

               hot-add memory  

               MMS (Microsoft Metadirectory Services)  

               NUMA (non-uniform memory access)   2nd  

               Terminal Server Session Directory   2nd  

               Windows Clustering  

       Exchange Server

               Cluster Services  

       GC servers

               remote office logons (Active Directory)   2nd  

       headless servers   2nd   3rd  

               hardware   2nd   3rd   4th  

               software   2nd   3rd  

       licenses  

       member servers

               securews.inf security templates  

       NAS (Network Access Servers)  

       NET Enterprise Server

               NLB support of IPSec/L2TP tunnels  

       remote servers

               storing encrypted files   2nd  

       remotely administered servers.   [See headless servers]

       SAN (Storage Area Networks)  

               Disk Management console  

               multipath failover  

               VDS (Virtual Disk Services)  

       Session Directory servers  

               installing  

       SQL Servers

               Cluster Services  

       Standard Server   2nd   3rd  

               MMS (Microsoft Metadirectory Services)  

       Terminal Server SID (Security Identifiers)

               notssid.inf security templates  

       terminal servers

               access permissions  

               access permissions;passwords   2nd  

               connecting to  

               disconnected sessions  

               encryption   2nd  

               farms   2nd   3rd  

               security  

               smart cards  

       VPN servers

               RRAS (Routing and Remote Access Service)   2nd  

       Web Server  

       Web servers

               NLB (Network Load Balancing)  

       WINS (Windows Internet Naming Service) server  

               Automatic Partner Configuration  

               finding records  

               finding records, Enable Result Caching option   2nd  

               NetBIOS (network basic input/output systems)  

service packs   2nd  

service packs (security maintenance)   2nd  

Session Directory

       terminal servers

               configuring  

Session Directory Cluster Name setting (Terminal Servers Session Directory group policies)  

Session Directory Server setting (Terminal Servers Session Directory group policies)  

Session Directory servers  

       installing  

Set Client Connection Encryption Level group policy  

Set Client Connection Encryption Level group policy (Terminal Services)  

Setup Manager Wizard

       unattended installations   2nd   3rd  

               passwords  

setup security.inf security template  

       group policies  

       Secedit tool  

Setup Wizard

       operating system upgrades  

               Windows Compatibility Reports  

setx command-line tool  

shadow copies (file sharing)  

       disaster recovery  

       enabling   2nd  

       managing  

       scheduling  

       versioning  

       viewing  

Shadow Copies tab   2nd  

showing

       inheritance parents

               Active Directory administrative tools   2nd  

       permissions

               Active Directory administrative tools  

shutdown command-line tool  

single node clusters

       building  

Single property (port ranges)  

single quorum device clusters

       building  

single-host addresses.   [See unicast addresses]

site-local unicast addresses

       Ipv6 protocols  

smart cards

       terminal servers  

SMS (Systems Management Server)  

SMTP (Simple Mail Transport Protocol)

       IIS (Internet Information Services) consoles   2nd   3rd  

               SMTP relaying  

snap-ins

       IP Security Policies snap-in  

               mapping computer encryption certificates  

       IPSec Monitor snap-in   2nd  

       Local Security Policy snap-in   2nd  

       Remote Desktops MMC client (Remote Desktop fo Administration)  

       RRAS (Routing and Remote Access Service) snap-in   2nd  

               customizing IP addresses  

                demand-dial connections  

               Manage Your Server application   2nd  

               NAT/Basic Firewall interface  

               VPN servers   2nd  

               Web sites  

       SCA (Security Configuration and Analysis) snap-in   2nd  

               security databases   2nd  

       Security Templates snap-in   2nd  

               configuring   2nd   3rd  

               creating custom security templates  

               definition settings   2nd  

               saving changes  

       Terminal Services Configuration sna[-in  

       Terminal Services Manager snap-in  

SNMP settings (Computer Configuration policy sections)  

SOAP (Simple Object Access Protocol) protocol  

software

       deploying

               DFS (distributed file system)  

               IntelliMirror   2nd  

       headless server software   2nd   3rd  

       product activation  

               product ID  

       upgrades

               Software Assurance program   2nd  

software applications

       creating  

Software Assurance program   2nd  

software development

       NET Framework   2nd   3rd   4th  

       problems   2nd  

Software Installation section (Group Policy)

       64-bit operating system suppor  

       Support Information URL

               modifying   2nd  

Software Restriction group policies

       terminal servers   2nd  

Software Restriction group policy (Terminal Services)   2nd  

software restriction policies

       components   2nd   3rd   4th  

       GPO (Group Policy Objects)  

Software Restriction settings (Computer Configuration policy sections)  

sound cards

       redirecting  

specifying

       nodes (cluster resources)

               Cluster Administrator  

       resources(clusters)

               Cluster Administrator  

SQL Servers

       Cluster Services  

Standard Folders (Start menu)  

Standard server   2nd  

Standard Server  

       MMS (Microsoft Metadirectory Services)  

Start menu  

       All Programs menu  

       Control panel  

       customizing  

       Default Utilities  

       Pinned Programs   2nd  

       Recently Used Programs  

       Standard Folders  

starting

       RSOP (Resultant Set of Policy) feature (Active Directory administrative tools)  

storing

       encrypted files on remote servers   2nd  

stub zones (DNS)  

subnet masks  

       CIDR (Classless Interdomain Routing)  

superfloppies  

Support Information URL

       modifying   2nd  

supported upgrade paths (Windows Server 2003)   2nd   3rd  

SUS (Software Update Services)   2nd   3rd   4th  

       Approval Log  

       Automatic Updates  

               configuring  

       installing  

       Monitor Server page  

       synchronization schedule

               configuring   2nd  

       updates

               approving   2nd  

symmetric key encryption  

System Properties dialog box

       Remote tab

               enabling Remote Desktop for Administration   2nd  

System Restore  

System Restore settings (Computer Configuration policy sections)   2nd  

system root folders

       /Windows

               security templates  

system service policies (security)  

systeminfo command-line tool  

Категории