Microsoft Windows Server 2003 Insider Solutions

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

A (host) records   2nd  

AAAA records  

accelerators

       hardware cryptographic accelerators   2nd  

       SSL (Secure Socket Layer) accelerators   2nd   3rd  

access points, placement of  

       distance   2nd  

       interference   2nd  

       power connections   2nd  

       RF attenuation   2nd   3rd  

       signal coverage   2nd  

       signal levels   2nd  

       wireless bridges   2nd  

       WLAN conflicts  

account forests  

account management events

       auditing   2nd  

ACLs (Access Control Lists)

       adding groups to   2nd  

ACT (Application Compatibility Tool Kit)   2nd   3rd   4th   5th   6th  

activating Windows Server 2003  

       activation process   2nd  

       licensing modes   2nd  

       product keys   2nd  

Active Directory   2nd   3rd   4th   5th   6th  

       Active Directory Client extensions   2nd  

       ADMT (Active Directory Migration Tool)   2nd   3rd  

               ADMT version 2.0  

                Group Account Migration Wizard   2nd  

               migrating resources   2nd  

               SID History field   2nd   3rd  

               User Migration Wizard   2nd  

       application partitions   2nd  

               creating   2nd  

               replicas   2nd  

               replication management   2nd  

       backing up   2nd  

       checking integrity of  

       checking size of  

       determining health of   2nd  

               DNS verification   2nd  

               Netdiag tool   2nd  

               Ntds.dit defragmentation   2nd   3rd  

               Replmon tool   2nd  

       domain controllers   2nd   3rd   4th  

               authentication traffic   2nd  

               compared to WAN connections   2nd  

               creating from backups   2nd  

               demoting to members servers   2nd   3rd  

               promoting member servers to   2nd   3rd  

               replicas   2nd   3rd  

               replication traffic   2nd  

       domains

               consolidating   2nd  

               moving objects between   2nd   3rd  

               multiple child domains   2nd  

               multiple discontinuous domains   2nd  

               placeholder root domains   2nd  

               single domain in-place upgrade   2nd   3rd  

       domains, renaming   2nd   3rd  

               cleanup tasks   2nd  

               current forest description  

               domain controller preparation  

               limitations   2nd  

               prerequisites   2nd  

               XML file modification   2nd  

       file sharing   2nd  

       forest trusts   2nd  

               authentication firewalls   2nd  

               configuring   2nd   3rd  

               cross-forest rights   2nd  

               one-way forest trusts  

               two-way forest trusts  

       forests

               account forests  

               cross-forest trusts   2nd   3rd   4th   5th   6th   7th   8th   9th  

               flexible forests   2nd  

               interforest synchronization   2nd   3rd  

               multiple forests   2nd  

               resource forests  

       FSMO (Flexible Single Master Operation) roles   2nd  

               Domain Naming Master  

               Infrastructure Master  

               moving   2nd   3rd   4th  

               PDC Emulator  

               placement of   2nd  

               RID Master  

               Schema Master  

       Functional Levels   2nd   3rd   4th  

       functional levels   2nd  

               Windows 2000 Mixed Domain Functional Level   2nd  

               Windows 2000 Native Functional Level   2nd  

               Windows 2003 Functional Level   2nd  

               Windows 2003 Interim Functional Level  

       GCs (Global Catalogs)   2nd  

       GCs (global catalogs)   2nd   3rd  

       GCs (Global Catalogs)

               attributes   2nd   3rd  

               customizing   2nd   3rd  

               placement of   2nd  

       GCs (global catalogs)

               placement of   2nd  

       GCs (Global Catalogs)

               universal group caching   2nd  

       Global Catalogs  

               defined  

               failure of   2nd   3rd  

               replication traffic  

       hardware requirements   2nd  

       integrating LDAP directories with   2nd  

               ADSI Edit snap-in   2nd  

                metadirectories   2nd  

               referrals   2nd   3rd  

       MIIS (Microsoft Identity Integration Server 2003)  

               broad conectivity  

               identity information   2nd   3rd   4th   5th   6th  

               Management Agents   2nd  

       monitoring   2nd   3rd  

       multi-master replication   2nd  

       NAS (Network Attached Storage)   2nd  

       OUs (Organizational Units)

               moving objects between   2nd  

       referrals

               creating   2nd   3rd  

       replication

               verifying   2nd  

       SANs (Storage Area Networks)   2nd  

       scaling  

               Active Directory Sizer tool   2nd  

               disk configuration   2nd  

               file locations   2nd   3rd  

               replication   2nd   3rd  

       schema   2nd  

               ADSI (Active Directory Service Interfaces) Edit utility   2nd  

                deactivating   2nd   3rd  

               Schema snap-in   2nd   3rd  

       shared folders

               creating   2nd  

       site resolution   2nd  

       sites   2nd  

               authentication   2nd  

               defined  

               site adoption   2nd  

               summarizing   2nd  

       small versus large implementations   2nd  

       standards   2nd  

       zones

               AD-integrated zones   2nd  

               secondary zones   2nd  

Active Directory Client extensions   2nd   3rd   4th  

Active Directory Installation Wizard  

Active Directory Management console  

Active Directory Migration Tool.   [See See ADMT]

Active Directory Schema snap-in   2nd   3rd  

Active Directory.   [See also DNS (Domain Name System)]

AD.   [See See Active Directory]2nd   [See See Active Directory]

Add Nodes Wizard  

Add/Remove Snap-in command (File menu)  

Add/Remove Snap-in dialog box  

addressing   2nd  

       DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  

               administrative delegation  

               APIPA (Automatic Private IP Addressing)   2nd  

               authorization   2nd  

               client service   2nd  

               database backup and restore automation   2nd  

               DDNS (Dynamic DNS)   2nd  

               design issues  

               domain controller security   2nd  

               fault tolerance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               installing   2nd   3rd  

               maintenance   2nd   3rd  

               Netsh tool   2nd  

               relay agents   2nd  

               scopes   2nd   3rd   4th   5th   6th  

               Windows XP clients   2nd  

       TCP/IP   2nd  

administration   2nd   3rd  

       ASR (Automated System Recovery)   2nd  

               bootstrap portion  

        audits  

               account management events   2nd  

               domain controller audit settings   2nd  

               security logs   2nd  

       backups  

               backup agents   2nd  

               dedicated backup VLANs   2nd  

               disk-to-tape backups   2nd  

               GFS (Grandfather, Father, Son) strategies   2nd  

               NTFS-level flagging  

               what to include/exclude   2nd  

       best practices   2nd  

       centralized administration   2nd  

       choosing   2nd  

       delegating  

               best practices   2nd  

               custom tasks   2nd   3rd  

               Delegation of Control Wizard   2nd   3rd   4th   5th  

               OUs (Organizational Units)   2nd  

               simple tasks   2nd  

       desktops.   [See See desktop management]

       DHCP (Dynamic Host Configuration Protocol) administrative delegation  

       distributed administration   2nd  

       Domain Admins Group   2nd   3rd  

       Enterprise Admins Group   2nd  

       functional levels   2nd  

               domain administrative functionality   2nd   3rd  

               forest administrative functionality   2nd  

               Windows 2000 mixed domain functional level  

               Windows 2000 native functional level  

               Windows Server 2003 functional level   2nd  

               Windows Server 2003 interim functional level  

       Group Policies  

               delegating rights with   2nd  

               enforcing administrator passwords with  

               enforcing group memberships with   2nd  

               linking to containers  

       mixed administration  

       remote.   [See See remote administration]

       role-based administration   2nd   3rd  

               best practices  

               directory service administrators   2nd  

               network administrators   2nd  

               Operations Managers  

               security administrators   2nd  

       security logs

               saving  

               sizing  

       Shadow Copy of Shared Folders   2nd  

               client setup  

               recovering corrupted files  

               recovering deleted files   2nd  

               recovering folders   2nd  

               recovering overwritten files  

       system maintenance   2nd   3rd  

               Active Directory database size  

               Active Directory integrity check  

               Active Directory replication   2nd  

               ASR (Automated System Recovery)   2nd   3rd  

               backups   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               backups, verifying   2nd   3rd  

               checklists   2nd  

               clustering  

               delegating tasks to IT staff  

               DHCP scopes  

               event logs   2nd  

               Five-9s   2nd  

               group audits   2nd  

               high-availability environments   2nd  

               maintenance windows   2nd  

               Scandisk   2nd  

               scripts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               server consolidation   2nd   3rd   4th  

               SUS (Software Update Service)   2nd   3rd   4th   5th   6th  

               system defragmentation   2nd  

               system reboot  

               system resources, checking availability of   2nd   3rd  

               system updates   2nd   3rd  

               test restores   2nd  

               WINS   2nd  

       testing  

               documentation   2nd  

               Group Policy Modeling   2nd  

               lab environments   2nd   3rd  

               RSoP (Resultant Set of Policy)   2nd  

Administration Tools Pack  

       Convenience Consoles   2nd  

       custom consoles   2nd  

       installing   2nd   3rd  

administration.   [See also monitoring Windows Server 2003]

administrative port security  

administrative templates   2nd  

       customizing   2nd  

       Microsoft add-on templates  

       preferences   2nd  

administrator workstations

       desktop management   2nd   3rd   4th   5th  

administrators

       administrator workstations

               desktop management   2nd   3rd   4th   5th  

       rights   2nd   3rd   4th  

       roles   2nd  

Adminpak.msi.   [See See Administration Tools Pack]

ADMT (Active Directory Migration Tool)   2nd   3rd  

       ADMT version 2.0  

       Group Account Migration Wizard   2nd  

       migrating resources   2nd  

       SID History field

               cleaning up  

               importance of   2nd  

       User Migration Wizard   2nd  

adoption (sites)   2nd  

ADSI (Active Directory Service Interfaces) Edit tool   2nd  

ADSI Edit   2nd   3rd  

ADSI Edit snap-in   2nd  

ADSI Editor

       removing servers with   2nd  

ADSI utilities  

Advanced Encryption Standard (AES)  

Advanced Encryption Standard (AES-256)  

AES (Advanced Encryption Standard)  

AES-256 (Advanced Encryption Standard)  

affinity types  

agents (backup)   2nd  

alerts  

       application-level alerts   2nd  

       hardware alerts  

       performance alerts   2nd  

       port-level alerts  

       potential problems   2nd  

       service-level alerts  

All Users profiles   2nd  

allocating

       Remote Storage media   2nd   3rd  

Allow permissions   2nd  

analyzing

       storage needs  

analyzing performance

       baselines

               benchmarks   2nd   3rd   4th  

               policy baselines   2nd   3rd  

               workload characterization   2nd  

       capacity analysis   2nd  

       counters

               % Privileged Time  

               % Processor Time  

               AXFR Request Received   2nd  

               AXFR Request Sent   2nd  

               AXFR Response Received   2nd  

               AXFR Success Received   2nd  

               AXFR Success Sent   2nd  

               Cache % Hit  

               Cache Page Fault Stalls/sec  

               Cache Page Faults/sec  

               Cache Size  

               Current Disk Queue Length  

               DYNAMIC UPDATE RECEIVED/Sec  

               File Operations Pending  

               Logical Disk-% Disk Time  

               Memory-Available Bytes  

               Memory-Page Faults/sec  

               Memory-Pages/sec  

               NBT Connection[ colon ] Bytes Total/sec  

               Paging File-% Usage-%  

               Physical Disk-% Disk Time  

               RECURSIVE QUERIES/Sec   2nd  

               RECURSIVE QUERY FAILURE/Sec  

               Redirector[colon] Bytes Total/sec  

               SECURE UPDATE RECEIVED/Sec  

               Server[colon] Bytes Total/sec  

               TCP QUERY RECEIVED/Sec  

               TCP RESPONSE SENT/Sec  

               TOTAL QUERY RECEIVED/Sec  

               TOTAL RESPONSE SENT/Sec  

               UDP QUERY RECEIVED/Sec  

               UDP RESPONSE SENT/Sec  

               VM Largest Block Size  

               VM Total 16MB Free Blocks  

               VM Total Free Blocks  

               VM Total Large Free Block Bytes  

       tools   2nd  

               Network Monitor   2nd   3rd  

               Performance Console   2nd   3rd  

               Task Manager   2nd   3rd  

               third-party tools   2nd  

animated dialer logon screens  

anonymous FTP (File Transfer Protocol)  

APIPA (Automatic Private IP Addressing)   2nd  

appending

       applications  

Application Compatibility Analyzer   2nd  

Application Compatibility Tool Kit   2nd   3rd  

Application Compatibility Tool Kit (ACT)   2nd   3rd  

Application Verifier  

application-level alerts   2nd  

application-level monitoring   2nd   3rd  

applications

       appending  

       application partitions   2nd  

               creating   2nd  

               replicas   2nd  

               replication management   2nd  

       application-level alerts   2nd  

       application-level monitoring   2nd   3rd  

       consolidating  

       multiprocessor-capable applications   2nd  

       n- tier application model   2nd  

       running

               Run As commnad  

Applications tab (Task Manager)  

applying

       administrative models   2nd   3rd   4th  

AppManager Suite  

archiving

       keys  

ASR (Automated System Recovery)   2nd   3rd   4th   5th   6th   7th  

       bootstrap portion  

       cluster service recovery   2nd   3rd  

       requirements   2nd  

assigning

       permissions

               with Group Policy   2nd   3rd  

       rights

               with Group Policy   2nd   3rd  

attachments

       sharing   2nd  

attenuation (RF)   2nd   3rd  

attributes

       GC (Global Catalog) attributes

               adding   2nd   3rd  

Audit mode (Sysprep)  

auditing

       events  

       file system   2nd  

       FTP (File Transfer Protocol)  

       group membership   2nd  

       Registry  

       remote administration   2nd  

       system security   2nd  

audits  

       account management events   2nd  

       domain controller audit settings   2nd  

       security auditing   2nd   3rd  

       security logs

               saving  

               sizing  

       Web site content auditing   2nd   3rd  

authentication   2nd  

       authentication firewalls   2nd  

       biometrics   2nd  

       CHAP (Challenge Handshake Authentication Protocol)  

       dual-client authentication   2nd  

       EAP (Extensible Authentication Protocol)  

       EAP-TLS authentication   2nd   3rd  

       HTTP authentication requests   2nd  

       IAS (Internet Authentication Service)  

               installing  

               IPSec   2nd   3rd  

               Terminal Services  

       IAS (Internet Authentication Services)

               wireless networks   2nd  

       machine accounts  

       PAP (Password Authentication Protocol)  

       RADIUS (Remote Authentication Dial-in User Service)   2nd   3rd   4th  

       site authentication

               controlling with DNS (Domain Name System)   2nd  

       smartcards   2nd   3rd   4th   5th   6th   7th  

               building security  

               choosing   2nd  

               email  

               enforcing   2nd  

               life expectancy   2nd  

               logins   2nd  

               management tools   2nd  

               memory requirements   2nd  

               Pocket PCs   2nd  

               roles   2nd  

               SIMs (Subscriber Identity Module) cards  

               single sign-on environments   2nd   3rd  

               Smart Phones   2nd  

                smartcard enrollment and authentication strategies  

               smartcard enrollment and authentication strategies;best practices   2nd  

               smartcard enrollment and authentication strategies;physical security   2nd  

               smartcard enrollment and authentication strategies;simplicity  

               smartcard readers   2nd  

       virtual directories   2nd  

       WPA (Wi-Fi Protected Access)  

authentication firewalls   2nd  

Authentication Methods dialog box  

authentication traffic   2nd  

authorization

       DHCP (Dynamic Host Configuration Protocol)   2nd  

auto-applications (CMAK)  

autoenrollment (certificate)  

Automated System Recovery.   [See See ASR]2nd   [See See ASR]

automated updates.   [See See SUS (Software Update Service)]

automated Windows Server 2003 installation   2nd   3rd   4th   5th  

       from CD-ROM   2nd  

       with MS-DOS startup disk  

Automatic Private IP Addressing (APIPA)   2nd  

Automatic Reconnection (Terminal Services)  

automatic software installations   2nd   3rd   4th   5th  

       best practices   2nd   3rd   4th  

       verifying installation   2nd  

automatically responding to problems  

       external scripts   2nd  

       services recovery and notification   2nd  

autorenewal (certificate)  

AXFR Request Received counter   2nd  

AXFR Request Sent counter   2nd  

AXFR Response Received counter   2nd  

AXFR Success Received counter   2nd  

AXFR Success Sent counter   2nd  

Категории