Microsoft Windows Server 2003 Insider Solutions

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

verifying

       Active Directory replication   2nd  

       automatic software installation   2nd  

        backups   2nd   3rd  

       DNS (Domain Name System)   2nd  

Version History command (WSS)   2nd  

viewing

       GPOs (Group Policy Objects)   2nd  

views

       MMC view

               customizing  

       WSS (Windows SharePoint Services)  

virtual directories   2nd  

       authentication methods   2nd  

       creating with IIS Manager   2nd  

       creating with Windows Explorer   2nd  

       firewalls   2nd  

       HTTP authentication requests   2nd  

       permissions  

               virtual directories mapped to local directories   2nd  

               virtual directories mapped to Windows shares   2nd  

       server security   2nd  

       trusted networks   2nd  

Virtual Directory Creation Wizard  

virtual memory

       performance optimization   2nd   3rd  

Virtual Private Networks.   [See See VPNs]

virtual servers   2nd  

VLANs

       dedicated backup VLANs   2nd  

VM Largest Block Size counter  

VM Total 16MB Free Blocks counter  

VM Total Free Blocks counter  

VM Total Large Free Block Bytes counter  

Volume Licensing Activation Keys  

volume sets

       Windows NT to Windows Server migration  

Volume Shadow Copy Service.   [See See VSS]

VPNs (Virtual Private Networks)   2nd   3rd  

       Celestix  

       CMAK (Connection Manager Administration Kit)   2nd  

               animated dialer logon screen  

               appending applications  

               auto-applications  

               connect actions  

               connection status  

               desktop/tray icons  

               encrypted connections  

               help file  

               language support  

               license agreement  

               multiple service types, support for  

               passwords  

               phone book   2nd  

               realm name prefix/suffix  

               service profiles  

               support phone number  

       designing   2nd  

       firewall-based VPNs   2nd  

       Group Policy   2nd  

       hardware-based VPNs   2nd  

       IAS (Internet Authentication Service)  

               installing  

               IPSec   2nd   3rd  

               Terminal Services  

       L2TP (Layer 2 Tunneling Protocol)

               client requirements   2nd  

               in series with firewalls   2nd  

               parallel to firewalls   2nd  

               remote access policies   2nd  

               security   2nd   3rd  

       line consolidation   2nd  

       load balancing   2nd  

       PPTP (Point-to-Point Tunneling Protocol)

               client requirements   2nd  

               in series with firewalls   2nd  

               parallel to firewalls   2nd  

               remote access policies   2nd  

               security   2nd  

       RADIUS (Remote Authentication Dial-in User Service)   2nd   3rd   4th  

       RRAS (Routing and Remote Access Services)   2nd  

       site-to-site VPNs   2nd   3rd   4th  

       softmodems   2nd  

       wireless networks   2nd   3rd   4th  

VSS (Volume Shadow Copy Service)   2nd  

       best practices   2nd  

       configuring   2nd   3rd  

       data recovery   2nd  

vulnerability scanners   2nd  

Категории