Microsoft Windows Server 2003 Insider Solutions

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

c- prefix (log files)  

c-ip field (log files  

cache

       client-side cache

               flushing  

       universal group caching   2nd  

Cache % Hit counter  

Cache Page Fault Stalls/sec counter  

Cache Page Faults/sec counter  

Cache Size counter  

caching

       universal group caching   2nd  

               benefits of  

               enabling   2nd  

caching-only servers  

CALs (client access licenses)  

Canonical Name (CNAME) records   2nd  

capacity analysis   2nd  

       counters

               % Privileged Time  

               % Processor Time  

               AXFR Request Received   2nd  

               AXFR Request Sent   2nd  

               AXFR Response Received   2nd  

               AXFR Success Received   2nd  

               AXFR Success Sent   2nd  

               Cache % Hit  

               Cache Page Fault Stalls/sec  

               Cache Page Faults/sec  

               Cache Size  

               Current Disk Queue Length  

               DYNAMIC UPDATE RECEIVED/Sec  

               File Operations Pending  

               Logical Disk-% Disk Time  

               Memory-Available Bytes  

               Memory-Page Faults/sec  

               Memory-Pages/sec  

               NBT Connection[ colon ] Bytes Total/sec  

               Paging File-% Usage-%  

               Physical Disk-% Disk Time  

               RECURSIVE QUERIES/Sec   2nd  

               RECURSIVE QUERY FAILURE/Sec  

               Redirector[colon] Bytes Total/sec  

               SECURE UPDATE RECEIVED/Sec  

               Server[colon] Bytes Total/sec  

               TCP QUERY RECEIVED/Sec  

               TCP RESPONSE SENT/Sec  

               TOTAL QUERY RECEIVED/Sec  

               TOTAL RESPONSE SENT/Sec  

               UDP QUERY RECEIVED/Sec  

               UDP RESPONSE SENT/Sec  

               VM Largest Block Size  

               VM Total 16MB Free Blocks  

               VM Total Free Blocks  

               VM Total Large Free Block Bytes  

       tools   2nd  

               Network Monitor   2nd   3rd  

               Performance Console   2nd   3rd  

               Task Manager   2nd   3rd  

               third-party tools   2nd  

CAs (certificate authorities)   2nd   3rd  

       backing up   2nd  

       Enterprise Root CAs   2nd   3rd  

       Enterprise Subordinate CAs  

       fault tolerance  

       Standalone Root CAs  

       Standalone Subordinate CAs  

catalog (global)   2nd   3rd  

       placement of   2nd  

catalogs

       GCs (Global Catalogs)   2nd  

               attributes   2nd   3rd  

               customizing   2nd   3rd  

               placement of   2nd  

               universal group caching   2nd  

       Global Catalogs (AD)  

               defined  

               failure of   2nd   3rd  

               replication traffic  

catalogs (global)

       redundant global catalogs   2nd  

CD-ROMs

       installing Windows Server 2003 from   2nd  

CDs

       custom install CDs   2nd  

               third-party tools   2nd  

Celestix  

centralization of identity information   2nd  

centralized administration   2nd  

certificate authorities.   [See See CAs]

certificate revocation lists (CRLs)  

Certificate Services   2nd   3rd  

       administrative roles   2nd  

       CAs (certificate authorities)   2nd   3rd  

               backing up   2nd  

               Enterprise Root CAs   2nd   3rd  

               Enterprise Subordinate CAs  

               fault tolerance  

               Standalone Root CAs  

               Standalone Subordinate CAs  

       certificate autoenrollment  

       certificate autorenewal  

       certificate server integrity  

       certificate templates

               flexibility of  

       certificates

               pushing to clients  

       cross certification  

       delta CRLs (certificate revocation lists)  

       event auditing  

       fault tolerance   2nd  

       FCBA (Federal Bridge Certificate Authority)  

       installing   2nd   3rd  

       key archival  

       key counting  

       role-based administration  

       server roles   2nd  

       server security  

       smart card certificates   2nd  

       wireless networks   2nd   3rd   4th  

certificates   2nd  

       (Certificate Services)  

       administrative roles   2nd  

       autoenrollment  

       autorenewal  

       CAs (certificate authorities)   2nd   3rd  

               backing up   2nd  

               Enterprise Root CAs   2nd   3rd  

               Enterprise Subordinate CAs  

               fault tolerance  

               Standalone Root CAs  

               Standalone Subordinate CAs  

       certificate server integrity  

       Certificate Services installation   2nd   3rd  

       cross certification  

       delta CRLs (certificate revocation lists)  

       event auditing  

       fault tolerance   2nd  

       FCBA (Federal Bridge Certificate Authority)  

       key archival  

       key counting  

       pushing to clients  

       role-based administration  

       server roles   2nd  

       server security  

       smart card certificates   2nd  

       templates

               flexibility of  

       X.509  

Challenge Handshake Authentication Protocol (CHAP)  

channels

       choosing  

CHAP (Challenge Handshake Authentication Protocol)  

checking

       Active Directory database integrity  

       Active Directory database size  

       availability of system resources   2nd   3rd  

       DHCP scopes  

       system updates   2nd   3rd  

       WINS for corruption   2nd  

checking in/out documents   2nd  

checklists   2nd  

choosing

       administrative models   2nd   3rd  

               best practices   2nd  

               centralized administration   2nd  

               distributed administration   2nd  

               mixed administration  

       file systems  

       group type  

       memory   2nd  

       monitoring packages   2nd  

       processors  

       smartcards   2nd  

       wireless channels  

Class C affinity type  

Clean mode (Sysprep)  

clean Windows Server 2003 installations   2nd   3rd   4th  

client access licenses (CALs)  

client-side cache

       flushing  

Client/Server data redirection section (Terminal Services)  

clients

       DHCP (Dynamic Host Configuration Protocol)   2nd  

       duel-client approach (Novell networks)   2nd  

       L2TP (Layer 2 Tunneling Protocol)   2nd  

       NFS Client   2nd  

       PPTP (Point-to-Point Tunneling Protocol)   2nd  

       pushing certificates to  

       shadow copies clients  

       smbclient   2nd  

       supporting during Windows 2000 to Windows Server migration  

               Active Directory Client extensions   2nd  

               legacy client support   2nd  

       supporting during Windows NT to Windows Server migration   2nd  

               Active Directory Client extensions   2nd  

               load balancing domain authentication   2nd  

               local domain controller policy   2nd  

               PC emulation   2nd   3rd  

       Windows XP clients

               DHCP (Dynamic Host Configuration Protocol)   2nd  

       wireless clients   2nd   3rd   4th  

               WEP client support  

               WPA (Wi-Fi Protected Access)   2nd   3rd  

Closest Site Selection   2nd  

CLR (Common Language Runtime)  

clustering   2nd  

clusters

       DHCP (Dynamic Host Configuration Protocol)  

       MSCS (Microsoft Cluster Service)   2nd  

               best practices   2nd  

               configuring  

               failover   2nd  

               feedback   2nd  

               installing   2nd   3rd   4th   5th   6th   7th  

               MNS (Majority Mode Set) clusters   2nd  

                single-node clusters  

               single-quorum device clusters  

       multinode clusters   2nd  

       NLB (Network Load Balancing) clusters

               adding nodes to   2nd  

               creating   2nd   3rd  

       recovering   2nd   3rd  

CMAK (Connection Manager Administration Kit)   2nd  

       animated dialer logon screen  

       appending applications  

       auto-applications  

       connect actions  

       connection status  

       desktop/tray icons  

       encrypted connections  

       help file  

       language support  

       license agreement  

       multiple service types, support for  

       passwords  

       phone book   2nd  

       realm name prefix/suffix  

       service profiles  

       support phone number  

CN Attributes dialog box  

CNAME (Canonical Name) records   2nd  

code listings

       /etc/printcap file  

coexisting domains   2nd  

       network services consolidation   2nd  

       SID History   2nd   3rd  

       third-party tools   2nd  

Collector.exe  

command-line interfaces   2nd  

commands

       bootcfg  

               /BAUD parameter  

               /EMS parameter  

               /ID parameter  

               /P parameter  

               /PORT parameter  

               /S parameter  

               /U parameter  

       dcpromo  

       DNSCMD  

       File menu commands

               Add/Remove Snap-in  

       ipconfig   2nd  

       Net Add User  

       nslookup  

       ntbackup  

       ping  

       quit  

       regsvr32  

commans

       NTDSUTIL  

Common Language Runtime.   [See See CLR]

company acquisition   2nd  

company reputation, security and  

CompanyABC security scenario   2nd   3rd  

Compatibility Administrator   2nd  

Compatibility Check Tool   2nd  

compatibility of hardware   2nd  

compatibility of processors  

Computer Associates Web site  

Computer Measurement Group  

computer policies   2nd  

Con2prt.exe tool   2nd  

conditional forwarding  

configuration

       SFNW (Services for NetWare)   2nd  

Configure Your Server Wizard   2nd   3rd  

       DNS (Domain Name System) installation   2nd   3rd   4th   5th   6th  

configuring

       ADSI Edit snap-in   2nd  

       backup devices   2nd  

       desktop migration accounts   2nd  

       DFS (Distributed File System)   2nd  

       disconnect timeouts  

       DNS (Domain Name System)   2nd   3rd  

       forest trusts   2nd   3rd  

       Group Policy

               Wireless Network (IEEE 802.11) Policies  

       hard disks   2nd  

       Keepalive   2nd  

       MSCS (Microsoft Cluster Service)  

       PC emulation   2nd   3rd  

       push/pull partners   2nd  

       Remote Storage   2nd   3rd   4th  

       reset timeouts  

       Samba   2nd   3rd  

       server roles   2nd   3rd  

       Session Directory   2nd  

       slow links   2nd  

       volume shadow copies   2nd   3rd  

       wireless clients   2nd   3rd   4th  

               WEP client support  

               WPA (Wi-Fi Protected Access)   2nd   3rd  

conflicts

       WLAN conflicts  

connect actions (CMAK)  

Connection Manager Administration Kit.   [See See CMAK]

Connection Settings dialog box  

connection status (CMAK)  

connections

       in- band connections  

       out-of-band connections  

       serial connections

               configuring for EMS (Emergency Management Service)   2nd  

               SPCR (Serial Port Console Redirection)  

console mode (Remote Desktop for Administration)  

consoles

       Convenience Consoles   2nd  

       custom administration consoles   2nd  

       Recovery Console

               installing   2nd  

       SAC (Special Administration Console)   2nd  

consolidating

       applications  

       directories  

       domains   2nd   3rd  

       file shares  

       log files   2nd  

       phone lines   2nd  

       printers  

       services   2nd  

consolidating servers   2nd  

       exchange servers   2nd  

       file servers   2nd  

       virtual servers   2nd  

       WSRM (Windows System Resource Manager)  

Constrained Delegation  

consumers

       permanent event consumers   2nd  

       temporary event consumers  

contacts

       mail-enabled contacts, creating   2nd   3rd  

containers

       linking Group Policies to  

controllers

       domain controllers   2nd   3rd   4th  

               Audit Policy setting   2nd  

               authentication traffic   2nd  

               compared to WAN connections   2nd  

               creating from backups   2nd  

               demoting to members servers   2nd   3rd  

               performance optimization  

               promoting member servers to   2nd   3rd  

               replicas   2nd   3rd  

               replication traffic   2nd  

               selecting   2nd  

controllers.   [See See domain controllers]

Convenience Consoles   2nd  

converting

       distribution groups to security groups   2nd  

       groups  

Converting Groups feature  

copying

       GPOs (Group Policy Objects)  

corrupted files

       recovering  

counters

       % Privileged Time  

       % Processor Time  

       AXFR Request Received   2nd  

       AXFR Request Sent   2nd  

       AXFR Response Received   2nd  

       AXFR Success Received   2nd  

       AXFR Success Sent   2nd  

       Cache % Hit  

       Cache Page Fault Stalls/sec  

       Cache Page Faults/sec  

       Cache Size  

       Current Disk Queue Length  

       DYNAMIC UPDATE RECEIVED/Sec  

       File Operations Pending  

       Logical Disk-% Disk Time  

       Memory-Available Bytes  

       Memory-Page Faults/sec  

       Memory-Pages/sec  

       NBT Connection[colon] Bytes Total/sec  

       Paging File-% Usage-%  

       Physical Disk-% Disk Time  

       RECURSIVE QUERIES/Sec   2nd  

       RECURSIVE QUERY FAILURE/Sec  

       Redirector[colon] Bytes Total/sec  

       SECURE UPDATE RECEIVED/Sec  

       Server[colon] Bytes Total/sec  

       TCP QUERY RECEIVED/Sec  

       TCP RESPONSE SENT/Sec  

       TOTAL QUERY RECEIVED/Sec  

       TOTAL RESPONSE SENT/Sec  

       UDP QUERY RECEIVED/Sec  

       UDP RESPONSE SENT/Sec  

       VM Largest Block Size  

       VM Total 16MB Free Blocks  

       VM Total Free Blocks  

       VM Total Large Free Block Bytes  

counting

       keys  

Credential Manager  

CRLs (certificate revocation lists)  

cross certification  

cross-domain policy assignments  

cross-forest rights   2nd  

cross-forest trusts   2nd   3rd   4th  

       account/resource forests  

       company acquisition   2nd  

       creating   2nd   3rd  

Cryptographic Service Providers (CSPs)   2nd  

cs (cookie) field (log files  

cs (referrer) field (log files  

cs (user agent) field (log files  

cs- prefix (log files)  

cs-bytes status field (log files  

cs-host field (log files  

cs-method field (log files  

cs-status field (log files  

cs-uri-query field (log files  

cs-uri-stem field (log files  

cs-username field (log files  

cs-version field (log files  

CScript.exe  

CSPs (Cryptographic Service Providers)   2nd  

Current Disk Queue Length counter  

custom install CDs   2nd  

       third-party tools   2nd  

       WinPE (Windows Preinstallation Environment)   2nd  

customizing

       administration consoles   2nd  

       administrative templates   2nd  

       GCs (Global Catalogs)   2nd   3rd  

       MMC view  

       servers

               Configure Your Server Wizard   2nd   3rd  

               Manage Your Server utility   2nd  

Категории