Microsoft Windows Server 2003 Insider Solutions

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

S (/S) parameter (bootcfg command)  

s- prefix (log files)  

s- computername field (log files  

s-ip field (log files  

s-port field (log files  

s-sitename field (log files  

SAC (Special Administration Console)   2nd  

SAM database

       recovering   2nd  

Samba

       configuring   2nd   3rd  

SAN (Storage Area Network)   2nd  

SANs (Storage Area Networks)   2nd  

       Active Directory integration   2nd  

        backups   2nd   3rd   4th  

       best practices   2nd  

       booting from   2nd  

       defined   2nd  

       deploying  

       designing  

               connectivity   2nd  

               disk drives   2nd  

               multiple spindles  

       developing   2nd  

       DFS (Distributed File System)   2nd  

       disk quotas  

       EFS (Encrypted File System)  

       fault tolerance   2nd  

       file servers   2nd  

       implementation process   2nd  

       Logical Disk Manager   2nd  

       needs analysis  

       piloting  

       planning   2nd  

       Remote Storage   2nd  

       server consolidation  

               exchange servers   2nd  

               file servers   2nd  

       SQL (Standard Query Language)   2nd   3rd  

       system recovery   2nd  

       Terminal Services   2nd  

       zero latency  

saving

       security logs  

sc- prefix (log files)  

sc-bytes field (log files  

sc-win32 status field (log files  

scaling

       Terminal Services   2nd   3rd  

scaling services  

       Active Directory  

               Active Directory Sizer tool   2nd  

               disk configuration   2nd  

               file locations   2nd   3rd  

               replication   2nd   3rd  

       common problems  

               facilities   2nd  

               multiprocessor-capable applications   2nd  

               system outages   2nd  

               wrong hardware   2nd  

       disk subsystems   2nd  

       file system  

               DFS (Distributed File System)   2nd  

               NAS (Network Attached Storage)   2nd  

               RAID   2nd   3rd   4th  

               RAM-disks   2nd   3rd  

               SAN (Storage Area Network)   2nd  

               SCSI (Small Computer System Interface)   2nd  

       memory   2nd  

       processors

               choosing  

       RAS (Remote Access System)  

               hardware cryptographic accelerators   2nd  

               hardware RAS solutions   2nd  

               modem support   2nd  

                multihomed Internet connections   2nd  

               multiplexing   2nd  

               PPTP (Point to Point Tunneling Protocol) security  

       servers

               multinode clusters   2nd  

               Server Farms   2nd  

               size of   2nd   3rd   4th  

               upgrading  

       Terminal Services  

               load balancing   2nd  

               memory  

               processors  

               Terminal Service Farms   2nd  

       unnecessary services

               removing  

       Web services  

               n- tier application model   2nd  

               server upgrades   2nd  

               SSL (Secure Socket Layer) accelerators   2nd   3rd  

               Web Farms   2nd  

Scandisk   2nd  

scanners

       vulnerability scanners   2nd  

scanning

       Web servers   2nd  

ScanState.exe file  

scavenging   2nd  

schema (AD)   2nd  

       ADSI (Active Directory Service Interfaces) Edit utility   2nd  

        deactivating   2nd   3rd  

       Schema snap-in   2nd   3rd  

Schema Master role  

scope

       groups  

               domain local groups   2nd  

               global groups   2nd  

               machine local groups   2nd  

               universal groups   2nd  

scopes

       DHCP (Dynamic Host Configuration Protocol)

               creating   2nd   3rd  

               multicast scopes  

               standby scopes  

                superscopes  

scripts

       external scripts   2nd  

       IISapp.vbs  

       IISback.vbs  

       IISconfg.vbs  

       IISext.vbs  

       IISftp.vbs  

       IISftpdr.vbs  

       IISvdir.vbs  

       IISweb.vbs  

       maintenance scripts  

               command-line interfaces   2nd  

               mail-enabled contacts, creating   2nd   3rd  

               MMC view  

               temp directory, clearing  

               users, deleting   2nd  

               WINS database, backing up  

       WMI (Windows Management Instrumentation) scripts  

               capabilities   2nd   3rd   4th   5th  

               permanent event consumers   2nd  

               sample script   2nd  

               services  

               temporary event consumers  

SCSI (Small Computer System Interface)   2nd  

searching

        group policies  

       WSS (Windows SharePoint Services)   2nd   3rd  

secondary zones   2nd   3rd   4th  

Secure Socket Layer (SSL)   2nd  

SECURE UPDATE RECEIVED/Sec counter  

secure updates   2nd  

security   2nd   3rd   4th   5th  

       .NET Passport Integration  

       authentication   2nd  

               authentication firewalls   2nd  

               biometrics   2nd  

               CHAP (Challenge Handshake Authentication Protocol)  

               dual-client authentication   2nd  

               EAP (Extensible Authentication Protocol)  

               EAP-TLS authentication   2nd   3rd  

               HTTP authentication requests   2nd  

               IAS (Internet Authentication Service)   2nd   3rd   4th   5th   6th  

               machine accounts  

               PAP (Password Authentication Protocol)  

               RADIUS (Remote Authentication Dial-in User Service)   2nd   3rd   4th  

               smartcards   2nd   3rd  

               virtual directories   2nd  

               WPA (Wi-Fi Protected Access)  

       authorization

               DHCP (Dynamic Host Configuration Protocol)   2nd  

       certificates   2nd  

               (Certificate Services)  

               administrative roles   2nd  

                autoenrollment  

               autorenewal  

               CAs (certificate authorities)   2nd   3rd   4th   5th   6th  

               certificate server integrity  

               Certificate Services installation   2nd   3rd  

               cross certification  

               delta CRLs (certificate revocation lists)  

               event auditing  

               fault tolerance   2nd  

               FCBA (Federal Bridge Certificate Authority)  

               key archival  

               key counting  

               pushing to clients  

               role-based administration  

               server roles   2nd  

               server security  

               smart card certificates   2nd  

               templates  

       CLR (Common Language Runtime)  

       company reputation  

       Constrained Delegation  

       Credential Manager  

       designing   2nd  

               best practices   2nd  

               physical security   2nd  

               simplicity  

       desktop  

               EFS (Encrypting File System)   2nd  

               Group Policy settings  

               IPSec   2nd   3rd  

               SUS (Software Update Service)   2nd  

       DFS (Distributed File System)   2nd  

       DHCP (Dynamic Host Configuration Protocol)   2nd  

               authorization   2nd  

               domain controller security   2nd  

       digital certificates

               X.509  

       digital signatures   2nd  

       Domain Controller Security Policy  

       EFS (Encrypting File System)   2nd   3rd  

               preventing users from enabling   2nd  

               standalone EFS   2nd  

       encryption  

               CSPs (Cryptographic Service Providers)   2nd  

               EFS (Encrypted File System)  

               encrypted connections  

               hardware cryptographic accelerators   2nd  

               IPSec   2nd   3rd  

               password migration   2nd  

       file system  

               auditing   2nd  

               locking down group membership   2nd  

               locking with NTFS (NT File System)   2nd  

               rights  

       firewalls

               L2TP (Layer 2 Tunneling Protocol)   2nd   3rd  

               PPTP (Point-to-Point Tunneling Protocol)   2nd   3rd   4th  

               virtual directories   2nd  

       floppy drives

               locking   2nd  

       forest trusts  

       Group Policy   2nd  

               Default Domain Group Policy settings   2nd  

               Restricted Groups   2nd  

               security templates   2nd  

       IIS (Internet Information Services)  

               locking down   2nd  

       importance of   2nd  

       improvements over Windows 2000   2nd  

       IPP (Internet Printing Protocol)   2nd  

       L2TP (Layer 2 Tunneling Protocol)   2nd   3rd  

       LM (LanMan) hashes, disabling local storage of   2nd  

       man-in-the-middle attacks  

       new technologies   2nd   3rd  

       Offline Files  

       optimization   2nd  

       password migration

               encryption keys   2nd  

               permissions   2nd  

               requirements   2nd  

       permissions

               Active Directory shared folders   2nd  

               administrators   2nd  

               Allow/Deny permissions   2nd  

               assigning with Group Policy   2nd   3rd  

               compared to rights  

               desktop permission configuration   2nd  

               highly managed users   2nd  

               local desktop permissions   2nd  

               mobile users   2nd   3rd  

               NTFS (NT File System) permissions   2nd   3rd   4th   5th   6th   7th  

               password migration   2nd  

               Registry permissions   2nd  

               Terminal Services  

               virtual directories   2nd   3rd   4th   5th  

       physical security   2nd   3rd   4th  

       PPTP (Point-to-Point Tunneling Protocol)   2nd  

       Protocol Transition  

       Registry   2nd  

       remote administration   2nd  

       rights

               administrators   2nd   3rd   4th  

               assigning with Group Policy   2nd   3rd  

               compared to permissions  

               cross-forest rights   2nd  

               granting   2nd   3rd  

               highly managed users   2nd  

               mobile users   2nd   3rd  

       sample scenario   2nd   3rd  

       security analysis   2nd  

               file system audits   2nd  

               Microsoft Baseline Security Analyzer   2nd  

               system security audits   2nd  

               vulnerability scanners   2nd  

       Security Configuration and Analysis tool   2nd  

       security groups  

       security reports

               creating   2nd   3rd  

       site authentication

               controlling with DNS (Domain Name System)   2nd  

       smartcards   2nd   3rd   4th  

               building security  

               choosing   2nd  

               email  

               enforcing   2nd  

               life expectancy   2nd  

               logins   2nd  

               management tools   2nd  

               memory requirements   2nd  

               Pocket PCs   2nd  

               roles   2nd  

               SIMs (Subscriber Identity Module) cards  

               single sign-on environments   2nd   3rd  

               Smart Phones   2nd  

                smartcard enrollment and authentication strategies  

               smartcard readers   2nd  

       SSL (Secure Sockets Layer)  

               enabling   2nd   3rd   4th   5th  

       templates  

               comparing local settings to   2nd  

               NIST (National Institute of Standards) guidelines  

               NSA (National Security Agency) guidelines  

       Terminal Services

               directory/file permissions  

               firewalls   2nd   3rd  

               terminal server design   2nd   3rd  

               terminal server lockdown   2nd  

       TSL (Transport Layer Security)   2nd   3rd  

               Handshake Protocol   2nd  

       user profiles   2nd  

               All Users profiles   2nd  

               Default User profiles   2nd  

               local profiles   2nd  

               mandatory profiles  

               roaming profiles  

               temporary profiles  

       virtual directories

               firewalls   2nd  

               HTTP authentication requests   2nd  

               server security   2nd  

               trusted networks   2nd  

       Web servers  

               patches   2nd   3rd   4th  

               scanning   2nd  

               SSL (Secure Socket Layer)   2nd  

       wireless networks   2nd  

               access point placement   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  

               Certificate Services   2nd   3rd   4th  

               channels  

               client configuration   2nd   3rd   4th   5th   6th   7th   8th  

               EAP-TLS authentication   2nd   3rd  

               Group Policy   2nd  

               IAS (Internet Authentication Services)   2nd  

               IEEE 802.11e standard  

               IEEE 802.11f standard  

               IEEE 802.11h standard  

               IEEE 802.11i standard   2nd  

               IEEE 802.1x standard   2nd  

               monitoring   2nd  

               online resources   2nd  

               protection tips   2nd  

               VPNs (Virtual Private Networks)   2nd  

               Wireless Network (IEEE 802.11) Policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               WPA (Wi-Fi Protected Access)   2nd   3rd   4th   5th   6th   7th   8th  

       WSS (Windows SharePoint Services)   2nd   3rd   4th  

               administrative port security  

               firewalls  

               Internet Explorer Enhanced Security Configuration   2nd  

               Microsoft SQL Server Connection security  

               SharePoint Administrators group  

               site groups  

               user authentication  

security administrators   2nd  

Security Configuration and Analysis tool   2nd  

security groups  

       migrating from Windows 2000   2nd   3rd  

security logs

       saving  

       sizing  

security templates   2nd  

security.   [See also groups]

seizing

       RID master role   2nd  

       RID master roles  

seizing roles  

Select Create Object dialog box  

sending

       Remote Assistance invitations   2nd   3rd   4th   5th  

serial connections

       configuring for EMS (Emergency Management Service)   2nd  

       SPCR (Serial Port Console Redirection)  

Serial Port Console Redirection (SPCR)  

Server Farms   2nd  

server images   2nd  

       deploying with RIS (Remote Installation Service)   2nd   3rd  

       Sysprep   2nd  

Server[ colon ] Bytes Total/sec counter  

servers

       caching-only servers  

       certificate servers

               integrity  

       consolidating  

               virtual servers   2nd  

               WSRM (Windows System Resource Manager)  

       exchange servers

               consolidating   2nd  

       file servers

               consolidating   2nd  

               NAS (Network Attached Storage)   2nd  

               SANs (Storage Area Networks)   2nd  

       GCs (Global Catalogs)   2nd  

               attributes   2nd   3rd  

               customizing   2nd   3rd  

               placement of   2nd  

               universal group caching   2nd  

       IIS (Internet Information Server)

               worker process isolation mode   2nd  

       locking  

       member servers

               promoting to domain controllers   2nd   3rd  

       MIIS (Microsoft Identity Integration Server 2003)  

               broad conectivity  

               identity information   2nd   3rd   4th   5th   6th  

               Management Agents   2nd  

       multinode clusters   2nd  

       Password Export Server  

       Password Export servers  

               encryption keys   2nd  

               permissions   2nd  

               security requirements   2nd  

       RADIUS (Remote Authentication Dial-in User Service)   2nd   3rd   4th  

       RAS (Remote Access Servers)   2nd  

       removing with ADSI Editor   2nd  

       roles   2nd  

       securing access to   2nd   3rd   4th  

       Server Farms   2nd  

       server hardware life expectancy   2nd  

       server images

               deploying with RIS (Remote Installation Service)   2nd   3rd  

               Sysprep   2nd  

       server role prioritization   2nd   3rd   4th  

       servery redundancy   2nd  

       SharePoint Portal Server   2nd  

       size of   2nd   3rd   4th  

       systems management servers

               SUS (Software Update Service)  

       terminal servers

               building   2nd   3rd  

               firewalls   2nd   3rd  

               locking down   2nd  

       Terminal Services

               IIS remote administration   2nd  

       Unix BIND servers  

       upgrading  

       virtual servers   2nd  

       Web servers

               security   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

service

       Windows Update

               finalizing server upgrades   2nd  

               keeping Windows server current  

Service (SRV) records   2nd   3rd   4th   5th  

service packs   2nd   3rd  

       Windows NT   2nd  

service-level alerts  

service-level monitoring   2nd  

services

       Certificate Services

               installing  

               wireless networks   2nd   3rd   4th  

       Certificate Services.   [See See Certificate Services]

       consolidating   2nd  

       DNS (Domain Name Service)   2nd  

               BIND (Berkeley Internet Name Domain) DNS  

               name resolution   2nd  

               SRV (Service) resource records  

       DNS (Domain Name Services)

               SRV (Service) resource records  

       DNS (Domain Name System)

               migrating from Windows 2000   2nd  

       EMS (Emergency Management Service)  

               enabling   2nd  

               SAC (Special Administration Console)   2nd  

               serial connection configuration   2nd  

       FloppyLocker Service  

       FPNW (File and Print Services for NetWare)   2nd  

               installing   2nd   3rd  

       GSNW (Gateway Services for NetWare)   2nd   3rd  

               installing   2nd  

       IAS (Internet Authentication Services)

               wireless networks   2nd  

       IIS (Internet Information Services)  

               ADSI utilities  

               command-line administration  

               hard disk space   2nd  

               IIS Manager  

               locking down   2nd  

               remote administration  

               remote administration;Internet Information Services Manager   2nd  

               remote administration;Remote Administration (HTML) Tool   2nd   3rd   4th  

               remote administration;Terminal Services   2nd  

               security auditing   2nd   3rd  

               Web site content auditing   2nd   3rd  

               WMI (Windows Management Instrumentation)   2nd  

       Microsoft Identity Information Services  

       migrating from Windows 2000   2nd  

       MIIS (Microsoft Identity Integration Server 2003)  

       MSCS (Microsoft Cluster Service)   2nd  

               best practices   2nd  

               configuring  

               failover   2nd  

               feedback   2nd  

               installing   2nd   3rd   4th   5th   6th   7th  

               MNS (Majority Mode Set) clusters   2nd  

                single-node clusters  

               single-quorum device clusters  

       MSDSS (Microsoft Directory Synchronization Services)   2nd  

               backing up   2nd  

               best practices   2nd  

               installing   2nd   3rd  

       notification   2nd  

       recovery   2nd  

       RRAS (Routing and Remote Access Services)

               VPNs (Virtual Private Networks)   2nd  

       scaling.   [See See scaling services]

       service-level alerts  

       service-level monitoring   2nd  

       SFNW (Services for NetWare)   2nd   3rd   4th  

               configuration   2nd  

               FMU (File Migration Utility)   2nd   3rd   4th   5th  

               FPNW (File and Print Services for NetWare)   2nd   3rd   4th   5th  

               GSNW (Gateway Services for NetWare)   2nd   3rd   4th   5th  

               MSDSS (Microsoft Directory Synchronization Services)   2nd   3rd   4th   5th   6th   7th   8th   9th  

       SUS (Software Update Service)  

               enabling with Group Policy   2nd  

               machine groups  

               NTFS permissions  

               systems management servers  

       Terminal Services   2nd  

               advantages of   2nd  

               directory/file permissions  

               firewalls   2nd   3rd  

               Group Policy   2nd   3rd   4th   5th   6th  

               IAS (Internet Authentication Service)  

               listening port number   2nd  

               load balancing   2nd  

               local drives   2nd  

               local printing   2nd  

               NAS (Network Attached Storage)   2nd  

               Novell networks   2nd   3rd  

               performance enhancements   2nd  

               performance optimization   2nd   3rd   4th   5th   6th   7th  

               redundancy   2nd  

               requirements  

               SANs (Storage Area Networks)   2nd  

               scaling   2nd   3rd   4th   5th   6th   7th  

               Session Directory   2nd   3rd   4th   5th   6th  

               terminal server design   2nd   3rd  

               terminal server lockdown   2nd  

               Windows Resource Manager   2nd   3rd  

       unnecessary services

               removing  

       VSS (Volume Shadow Copy Service)   2nd  

               best practices   2nd  

               configuring   2nd   3rd  

               data recovery   2nd  

       Web Services

               Novell networks   2nd  

       Web services

               scaling   2nd   3rd   4th   5th  

       WINS

               checking for corruption   2nd  

       WINS (Windows Internet Naming Service)   2nd   3rd   4th  

               database maintenance   2nd  

               environment design   2nd  

               installing   2nd  

               integrating with DNS   2nd  

               legacy Microsoft NetBIOS resolution   2nd  

               LMHOSTS file  

               NetBIOS client resolution   2nd  

               push/pull partners   2nd  

               replication   2nd  

               upgrading   2nd   3rd  

               Windows Server 2003 enhancements   2nd  

       WINS (Windows Internet Naming Services)  

               installing   2nd  

               mixed-mode environments  

               TCP/IP properties   2nd   3rd  

               uninstalling   2nd  

       WSS (Windows SharePoint Services)   2nd   3rd   4th  

               Active Directory Account Creation mode  

               checking in/out documents   2nd  

               compared to SharePoint Portal Server   2nd  

               deployment   2nd   3rd   4th   5th   6th   7th   8th  

               document versioning   2nd   3rd   4th  

               Document Workspaces   2nd  

               extranets   2nd  

               hierarchical storage management  

               indexing   2nd   3rd   4th  

               lists  

               MSDE (Microsoft Data Engine)  

               new features   2nd  

               searching   2nd   3rd  

               security   2nd   3rd   4th   5th   6th  

               shared attachments   2nd  

               Shared Workspace task panes   2nd  

               storage options  

               views  

               Web part support  

               Web sites   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

Services for NetWare (SFNW)   2nd   3rd   4th  

Services for NetWare.   [See See SFNW]

Session Directory   2nd  

       configuring   2nd  

       redundancy   2nd  

Sessions section (Terminal Services)  

Setup Manager   2nd   3rd  

SFNW (Services for NetWare)   2nd   3rd   4th  

       configuration   2nd  

       FMU (File Migration Utility)   2nd   3rd   4th   5th  

       FPNW (File and Print Services for NetWare)   2nd  

               installing   2nd   3rd  

       GSNW (Gateway Services for NetWare)   2nd   3rd  

               installing   2nd  

       MSDSS (Microsoft Directory Synchronization Services)   2nd  

               backing up   2nd  

               best practices   2nd  

               installing   2nd   3rd  

shadow copies   2nd  

       best practices   2nd  

       configuring   2nd   3rd  

       restoring data from   2nd  

Shadow Copy of Shared Folders   2nd  

       client setup  

       recovering corrupted files  

       recovering deleted files   2nd  

       recovering folders   2nd  

       recovering overwritten files  

Shadow Copy Provider  

shared folders

       creating   2nd  

Shared Workspace task pane (WSS)   2nd  

SharePoint Administrators group  

SharePoint Portal Server   2nd  

SharePoint Portal Services (SPS)  

SharePoint Team Services.   [See See WSS (Windows SharePoint Services)]

sharing

       folders   2nd  

sharing files.   [See See file sharing]

SID History   2nd   3rd  

SID History feature  

SID History field

       cleaning up  

       importance of   2nd  

signal coverage   2nd  

signals

       interference   2nd   3rd   4th  

       RF attenuation   2nd   3rd  

       signal coverage   2nd  

       signal levels   2nd  

signatures, digital   2nd  

       man-in-the-middle attacks  

Simple File Sharing   2nd   3rd  

       enabling/disabling   2nd  

SIMs (Subscriber Identity Module) cards  

simulation mode (RSoP)  

Single affinity type  

single domain in-place upgrade   2nd   3rd  

Single Host filtering mode  

single sign-on environments   2nd  

       application consolidation  

       directory consolidation  

       Novell networks  

               directory synchronization   2nd   3rd   4th   5th  

               dual-client authentication   2nd  

single-node clusters  

single-quorum device clusters  

site groups  

site resolution   2nd  

site-to-site VPNs (Virtual Private Networks)   2nd   3rd   4th  

sites (AD)   2nd  

       authentication

               controlling with DNS (Domain Name System)   2nd  

       defined  

       site adoption   2nd  

       summarizing   2nd  

Sizer tool (Active Directory)   2nd  

sizing

       security logs  

Slow Link Detection   2nd  

slow links  

       configuring   2nd  

       detecting  

       determining speed of   2nd  

       effect on sites   2nd  

       Slow Link Detection   2nd  

small businesses

       WSS (Windows SharePoint Services) deployment   2nd  

Small Computer System Interface (SCSI)   2nd  

smart organizations  

Smart Phones

       smartcards   2nd  

smart places  

smartcards   2nd   3rd   4th   5th   6th   7th  

       building security  

       choosing   2nd  

       email  

       enforcing   2nd  

       life expectancy   2nd  

       logins   2nd  

       management tools   2nd  

       memory requirements   2nd  

       Pocket PCs   2nd  

       roles   2nd  

       SIMs (Subscriber Identity Module) cards  

       single sign-on environments  

               application consolidation  

               directory consolidation  

       Smart Phones   2nd  

       smartcard enrollment and authentication strategies  

               best practices   2nd  

               physical security   2nd  

               simplicity  

       smartcard readers   2nd  

smbclient   2nd  

SMS

       monitoring   2nd  

snap-ins

       Active Directory Schema snap-in   2nd   3rd  

       DFS (Distributed File System) MMC snap-in  

       Disk Management MMC   2nd  

       Schema snap-in   2nd   3rd  

       Security Configuration and Analysis   2nd  

snapshotting  

SNMP Provider  

SOA (Start of Authority) records   2nd  

softmodems   2nd  

software

       automatic software installations   2nd   3rd   4th   5th  

               best practices   2nd   3rd   4th  

               verifying installation   2nd  

       patches  

       SUS (Software Update Service)   2nd   3rd  

               enabling with Group Policy   2nd  

               machine groups  

               NTFS permissions  

               systems management servers  

       third-party software support   2nd  

software RAID   2nd  

Software Update Service (SUS)   2nd  

Software Update Service.   [See See SUS]

Sonar.exe tool   2nd  

SPCR (Serial Port Console Redirection)  

Special Administration Console (SAC)   2nd  

speed

       slow link speed, determining   2nd  

spindles

       multiple spindles  

SPS (SharePoint Portal Services)  

SQL (Standard Query Language)

       NAS (Network Attached Storage)   2nd   3rd  

       SANs (Storage Area Networks)   2nd   3rd  

SRV (Service) records   2nd   3rd   4th   5th  

SRV (Service) resource records   2nd  

SSL (Secure Socket Layer)   2nd  

       accelerators   2nd   3rd  

SSL (Secure Sockets Layer)  

       enabling   2nd   3rd   4th   5th  

standalone EFS (Encrypting File System)   2nd  

Standalone Root CAs (certificate authorities)  

Standalone Subordinate CAs (certificate authorities)  

standardizing

       desktop  

standby scopes  

Start of Authority (SOA) records   2nd  

stop errors (log files)   2nd  

storage

       DAS (Direct Attached Storage)

               defined   2nd  

       NAS (Network Attached Storage)

               Active Directory integration   2nd  

               backups   2nd   3rd   4th  

               best practices   2nd  

               booting from   2nd  

               defined   2nd  

               deploying  

               designing   2nd   3rd   4th   5th   6th  

               developing   2nd  

               DFS (Distributed File System)   2nd  

               disk quotas  

               EFS (Encrypted File System)  

               fault tolerance   2nd  

               file servers   2nd  

               implementation process   2nd  

               Logical Disk Manager   2nd  

               needs analysis  

               piloting  

               planning   2nd  

               Remote Storage   2nd  

               server consolidation   2nd   3rd   4th   5th  

               single MAC address conversations  

               SQL (Standard Query Language)   2nd   3rd  

               system recovery   2nd  

               Terminal Services   2nd  

       SANs (Storage Area Networks)   2nd  

               Active Directory integration   2nd  

               backups   2nd   3rd   4th  

               best practices   2nd  

               booting from   2nd  

               defined   2nd  

               deploying  

               designing   2nd   3rd   4th   5th   6th  

               developing   2nd  

               DFS (Distributed File System)   2nd  

               disk quotas  

               EFS (Encrypted File System)  

               fault tolerance   2nd  

               file servers   2nd  

               implementation process   2nd  

               Logical Disk Manager   2nd  

               needs analysis  

               piloting  

               planning   2nd  

               Remote Storage   2nd  

               server consolidation   2nd   3rd   4th   5th  

               SQL (Standard Query Language)   2nd   3rd  

               system recovery   2nd  

               Terminal Services   2nd  

               zero latency  

Storage Area Network (SAN)   2nd  

Storage Area Networks.   [See See SANs]

Storage Volume Provider  

striped sets

       Windows NT to Windows Server migration  

striped sets with parity

       Windows NT to Windows Server migration  

striping disks   2nd  

stub zones   2nd   3rd   4th  

Subscriber Identity Module (SIM) cards  

summarizing

       Active Directory sites   2nd  

superscopes  

support phone number (CMAK)  

SUS (Software Update Service)   2nd   3rd  

       enabling with Group Policy   2nd  

       machine groups  

       NTFS permissions  

       systems management servers  

synchronization

       directories   2nd   3rd   4th   5th  

       domaim controllers  

       eDirectory/NDS synchronization   2nd   3rd  

       MSDSS (Microsoft Directory Synchronization Services)   2nd  

               backing up   2nd  

               best practices   2nd  

               installing   2nd   3rd  

synchronizing

       directories  

       forests   2nd   3rd  

       passwords   2nd  

               LDAP   2nd  

               NIS (Network Information System)   2nd   3rd   4th  

               Unix   2nd   3rd   4th  

Sysprep   2nd   3rd   4th   5th   6th   7th   8th  

       (System Preparation tool)  

       advantages   2nd  

       Audit mode  

       Factory mode  

       Reseal mode   2nd  

System Compatibility Check tool   2nd  

system maintenance.   [See See maintenance]

system monitoring.   [See See monitoring Windows Server 2003]

system outages

       protecting against   2nd  

System Preparation tool.   [See See Sysprep]

system resources, checking availability of   2nd   3rd  

system updates

       checking for   2nd   3rd  

systems management servers

       SUS (Software Update Service)  

Категории