Microsoft Windows Server 2003 Insider Solutions

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

P (/P) parameter (bootcfg command)  

Paging File-% Usage-% counter  

PAP (Password Authentication Protocol)  

parity, disk striping with   2nd  

partitions

       formatting   2nd  

        Windows NT to Windows Server migrations  

               mirrored volumes  

               striped sets  

               striped sets with parity  

               volume sets  

partitions (application)   2nd  

       creating   2nd  

       replicas   2nd  

       replication management   2nd  

Passport Integration  

Password Authentication Protocol (PAP)  

Password Export Server  

Password Export servers  

       encryption keys   2nd  

       permissions   2nd  

       security requirements   2nd  

passwords

       administrator passwords

               enforcing with Group Policy  

       CMAK (Connection Manager Administration Kit)  

       FTP (File Transfer Protocol)  

       synchronizing   2nd  

               LDAP   2nd  

               NIS (Network Information System)   2nd   3rd   4th  

               Unix   2nd   3rd   4th  

       Windows NT to Windows Server 2003 migration   2nd  

               encryption keys   2nd  

               Password Export servers  

               permissions   2nd  

               security requirements   2nd  

               testing  

patches  

       Web servers   2nd   3rd   4th  

PATROL  

PC emulation

       configuring   2nd   3rd  

PDC Emulator role  

Per Device mode  

Per Server mode  

PerfMan  

performance

       monitoring   2nd  

       performance alerts   2nd  

performance alerts   2nd  

Performance Console   2nd  

       % Privileged Time  

       % Processor Time  

       AXFR Request Received counter   2nd  

       AXFR Request Sent counter  

       AXFR Request Sentcounter  

       AXFR Response Received counter   2nd  

       AXFR Success Received counter   2nd  

       AXFR Success Sent counter   2nd  

       Cache % Hit  

       Cache Page Fault Stalls/sec  

       Cache Page Faults/sec  

       Cache Size  

       Current Disk Queue Length  

       DYNAMIC UPDATE RECEIVED/Sec counter  

       File Operations Pending  

       Logical Disk-% Disk Time  

       Memory-Available Bytes  

       Memory-Page Faults/sec counter  

       Memory-Pages/sec counter  

       NBT Connection[ colon ] Bytes Total/sec  

       Paging File-% Usage-%  

       Physical Disk-% Disk Time  

       RECURSIVE QUERIES/Sec counter   2nd  

       RECURSIVE QUERY FAILURE/Sec counter  

       Redirector[colon] Bytes Total/sec  

       SECURE UPDATE RECEIVED/Sec counter  

       Server[colon] Bytes Total/sec  

       TCP QUERY RECEIVED/Sec counter  

       TCP RESPONSE SENT/Sec counter  

       TOTAL QUERY RECEIVED/Sec counter  

       TOTAL RESPONSE SENT/Sec counter  

       UDP QUERY RECEIVED/Sec counter  

       UDP RESPONSE SENT/Sec counter  

       VM Largest Block Size  

       VM Total 16MB Free Blocks  

       VM Total Free Blocks  

       VM Total Large Free Block Bytes  

Performance Monitor  

Performance Monitor Provider  

performance optimization  

       Active Directory   2nd   3rd  

       baselines

               benchmarks   2nd   3rd   4th  

               policy baselines   2nd   3rd  

               workload characterization   2nd  

       capacity analysis   2nd  

       counters

               % Privileged Time  

               % Processor Time  

               AXFR Request Received   2nd  

               AXFR Request Sent   2nd  

               AXFR Response Received   2nd  

               AXFR Success Received   2nd  

               AXFR Success Sent   2nd  

               Cache % Hit  

               Cache Page Fault Stalls/sec  

               Cache Page Faults/sec  

               Cache Size  

               Current Disk Queue Length  

               DYNAMIC UPDATE RECEIVED/Sec  

               File Operations Pending  

               Logical Disk-% Disk Time  

               Memory-Available Bytes  

               Memory-Page Faults/sec  

               Memory-Pages/sec  

               NBT Connection[colon] Bytes Total/sec  

               Paging File-% Usage-%  

               Physical Disk-% Disk Time  

               RECURSIVE QUERIES/Sec   2nd  

               RECURSIVE QUERY FAILURE/Sec  

               Redirector[colon] Bytes Total/sec  

               SECURE UPDATE RECEIVED/Sec  

               Server[colon] Bytes Total/sec  

               TCP QUERY RECEIVED/Sec  

               TCP RESPONSE SENT/Sec  

               TOTAL QUERY RECEIVED/Sec  

               TOTAL RESPONSE SENT/Sec  

               UDP QUERY RECEIVED/Sec  

               UDP RESPONSE SENT/Sec  

               VM Largest Block Size  

               VM Total 16MB Free Blocks  

               VM Total Free Blocks  

               VM Total Large Free Block Bytes  

       disk subsystem  

               file systems  

               monitoring   2nd  

               RAID   2nd   3rd   4th   5th   6th   7th   8th  

       DNS (Domain Name System)   2nd   3rd   4th  

       domain controllers  

       local printing   2nd  

       memory subsystems   2nd  

       network subsystem

               monitoring   2nd   3rd  

       processors   2nd  

       replication   2nd  

       Terminal Services   2nd   3rd   4th  

               profile redirection   2nd   3rd  

       tools   2nd  

               Network Monitor   2nd   3rd  

               Performance Console   2nd   3rd  

               Task Manager   2nd   3rd  

               third-party tools   2nd  

       virtual memory   2nd   3rd  

Performance tab (Task Manager)  

permanent event consumers   2nd  

permissions

       Active Directory shared folders   2nd  

       administrators   2nd  

       Allow/Deny permissions   2nd  

       assigning with Group Policy   2nd   3rd   4th   5th   6th  

       compared to rights  

       FTP (File Transfer Protocol) logging  

       highly managed users   2nd  

       mobile users   2nd   3rd  

       NTFS (NT File System) permissions   2nd  

               setting   2nd   3rd   4th   5th  

       password migration   2nd  

       Registry permissions   2nd   3rd   4th  

       removing   2nd  

       SUS (Software Update Service)  

       Terminal Services  

       virtual directories  

               virtual directories mapped to local directories   2nd  

               virtual directories mapped to Windows shares   2nd  

       windows NT to Windows Server 2003 migration

               desktop permission configuration   2nd  

               local desktop permissions   2nd  

phone book (CMAK)   2nd  

phone lines, consolidating   2nd  

Physical Disk-% Disk Time counter  

physical security   2nd   3rd   4th  

piloting

       storage solutions  

ping command  

placeholder root domains   2nd  

planning

       disk subsystems   2nd  

       migration from Windows 2000 to Windows Server 2003   2nd  

               ACT (Application Compatibility Tool Kit)   2nd   3rd  

               Active Directory backups   2nd  

               ADMT (Active Directory Migration Tool)   2nd   3rd   4th   5th   6th  

               ADSI Editor   2nd  

               clean installations   2nd   3rd   4th  

               client support   2nd   3rd   4th   5th  

               decommissioning domain servers  

               decommissioning domains   2nd  

               DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  

               DNS (Domain Name System)   2nd  

               domain in-place upgrades  

               domain upgrades   2nd   3rd  

               functional levels   2nd   3rd   4th   5th  

               GPOs (Group Policy Objects)   2nd  

               Interim Level  

               network downtime   2nd  

               network services   2nd  

               preparation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th  

               recovery from failed upgrades   2nd   3rd  

               security and distribution groups   2nd   3rd  

               server role prioritization   2nd  

               testing  

               upgrade paths  

                user accounts   2nd   3rd  

               Windows Server 2003 Functional Level  

       migration from Windows NT to Windows Server 2003   2nd  

               ADSI Edit   2nd   3rd  

               Application Compatibility Tool Kit   2nd   3rd  

               client support   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               decommissioning domains   2nd  

               desktop migration   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               disk partitions   2nd   3rd  

               domain coexistance   2nd   3rd   4th   5th   6th   7th   8th   9th  

               domain consolidation  

               domain controller synchronization  

               downtime, minimizing   2nd   3rd   4th   5th  

               failed account migrations   2nd  

               failed hardware   2nd  

               file systems   2nd  

               flexible Active Directory forests   2nd  

               hardware inventory   2nd  

               hardware requirements  

               hardware upgrades  

               name resolution   2nd   3rd   4th   5th   6th   7th  

               password migration   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               permissions   2nd  

               processor compatibility  

               SAM database recovery   2nd  

               server role prioritization   2nd  

               service packs   2nd  

               System Compatibility Check tool   2nd  

               testing  

               third-party software support   2nd  

               upgrade paths   2nd  

               Windows Update services   2nd   3rd  

               WINS (Windows Internet Naming Services)   2nd   3rd   4th   5th   6th   7th   8th   9th  

       storage solutions   2nd  

       Windows Server 2003 installation   2nd   3rd   4th   5th  

       WSS (Windows SharePoint Services) deployment   2nd   3rd  

planning mode (RSoP)  

Pocket PCs

       smartcards   2nd  

POE (power over Ethernet)  

Point to Point Tunneling Protocol (PPTP)  

Point-to-Point Tunneling Protocol.   [See See PPTP]

Pointer (PTR) records  

policies

       Domain Controller Security Policy  

       Group Policies  

               delegating rights with   2nd  

               enforcing administrator passwords with  

               enforcing group memberships with   2nd  

               linking to containers  

       Group Policy

               assigning permissions with   2nd   3rd  

               assigning rights with   2nd   3rd  

               Group Policy Modeling   2nd  

               managing groups with   2nd  

policies.   [See See Group Policy]

PORT (/PORT) parameter (bootcfg command)  

port-level alerts  

port-level monitoring   2nd  

ports

       administrative port security  

       moving  

       port-level alerts  

       port-level monitoring   2nd  

       Terminal Services port number   2nd  

power connections

       wireless networks   2nd  

power over Ethernet (POE)  

power supply

       redundant power systems  

PPTP (Point to Point Tunneling Protocol)  

PPTP (Point-to-Point Tunneling Protocol)

       client requirements   2nd  

       in series with firewalls   2nd  

       parallel to firewalls   2nd  

       remote access policies   2nd  

       security   2nd  

Pre-Boot eXecution Environment (PXE)  

preferences

       compared to policies   2nd  

Preferred Networks tab (Wireless Network (IEEE 802.11) Policies)   2nd  

primary zones   2nd  

Print Services

       Unix systems   2nd   3rd   4th   5th   6th   7th  

printers

       Con2prt.exe tool  

       consolidating  

printing

       IPP (Internet Printing Protocol)   2nd  

               installing   2nd  

               security   2nd  

       local printing   2nd  

       Print Services

               Unix systems   2nd   3rd   4th   5th   6th   7th  

prioritizing

       server roles   2nd   3rd   4th  

privileges

       administrators   2nd  

       assigning with Group Policy   2nd   3rd  

       compared to permissions  

       granting   2nd   3rd  

       highly managed users   2nd  

       mobile users   2nd   3rd  

Processes tab (Task Manager)  

processors

       choosing  

       compatibility  

       performance optimization   2nd  

       Terminal Services  

product keys   2nd  

profiles   2nd  

       All Users profiles   2nd  

       Default User profiles   2nd  

       editing  

       folder redirection   2nd   3rd  

       local profiles   2nd  

       mandatory profiles  

       roaming profiles   2nd   3rd  

       temporary profiles  

promoting

       member servers to domain controllers   2nd   3rd  

properties

       WINS (Windows Internet Naming Services)   2nd   3rd  

Protocol Transition  

protocols

       CHAP (Challenge Handshake Authentication Protocol)  

       DAP (Directory Access Protocol)  

       DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  

               administrative delegation  

               APIPA (Automatic Private IP Addressing)   2nd  

               authorization   2nd  

               client service   2nd  

               database backup and restore automation   2nd  

               DDNS (Dynamic DNS)   2nd  

               design issues  

               domain controller security   2nd  

               fault tolerance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               installing   2nd   3rd  

               maintenance   2nd   3rd  

               migrating from Windows 2000   2nd   3rd  

               Netsh tool   2nd  

               relay agents   2nd  

               scopes   2nd   3rd   4th   5th   6th  

               Windows XP clients   2nd  

       DNS (Domain Name System)   2nd   3rd   4th  

               caching-only servers  

               configuring   2nd   3rd  

               DDNS (Dynamic DNS)   2nd   3rd   4th   5th  

               dynamic updates  

               forwarders   2nd   3rd  

               framework for  

               Hints file   2nd  

               impact on Active Directory   2nd  

               importance of   2nd  

               installing   2nd   3rd   4th   5th   6th  

               monitoring   2nd   3rd   4th   5th  

               namespaces   2nd  

               non-Microsoft DNS implementations   2nd  

               queries   2nd   3rd   4th  

               resource records   2nd   3rd   4th   5th   6th   7th   8th   9th  

               scavenging   2nd  

               secure updates   2nd  

               site authentication, controlling   2nd  

               site resolution   2nd  

               troubleshooting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

               TTL (Time to Live)   2nd   3rd  

               Unicode character support   2nd  

               Windows Server 2003 enhancements   2nd   3rd  

               WINS (Windows Internet Naming Service)   2nd   3rd   4th  

               zone transfers   2nd   3rd   4th   5th   6th   7th  

               zones   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  

       EAP (Extensible Authentication Protocol)   2nd  

       FTP (File Transfer Protocol)   2nd  

               account lockout  

               anonymous FTP  

               auditing  

               blind-put access  

               disk quotas  

               folder permissions  

               installing   2nd  

               IP address restrictions  

               logging   2nd  

               logon time restrictions  

               passwords  

               user isolation  

       IPP (Internet Printing Protocol)   2nd  

               installing   2nd  

               security   2nd  

       IPSec

               desktop security   2nd   3rd  

       L2TP (Layer 2 Tunneling Protocol)

               client requirements   2nd  

               in series with firewalls   2nd  

               parallel to firewalls   2nd  

               remote access policies   2nd  

               security   2nd   3rd  

       LDAP (Lightweight Directory Access Protocol)  

       OSI (Open Systems Interconnection) protocol  

       PAP (Password Authentication Protocol)  

       PPTP (Point to Point Tunneling Protocol)  

       PPTP (Point-to-Point Tunneling Protocol)

               client requirements   2nd  

               in series with firewalls   2nd  

               parallel to firewalls   2nd  

               remote access policies   2nd  

               security   2nd  

       SSL (Secure Socket Layer)   2nd  

       SSL (Secure Sockets Layer)

               enabling   2nd   3rd   4th   5th  

       TCP/IP   2nd  

       TKIP (Temporal Key Integrity Protocol)  

       TLS (Transport Level Security)  

protocols;  

providers

       Performance Monitor Provider  

       Registry Event Provider  

       Registry Provider  

       Shadow Copy Provider  

       SNMP Provider  

       Storage Volume Provider  

       WDM Provider  

       Win32 Provider  

       Windows NT Event Log Provider  

PTR (Pointer) records  

Public Key Management console  

public workstations

       desktop management   2nd   3rd  

pull/push partners

       configuring   2nd  

push/pull partners

       configuring   2nd  

pushing

       certificates  

pushing software to users   2nd   3rd   4th   5th  

       best practices   2nd   3rd   4th  

       verifying installation   2nd  

PXE (Pre-Boot eXecution Environment)  

Категории