Inside Windows Server 1002003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Inside Windows Server 1002003 [Electronic resources] - نسخه متنی

Addison Wesley

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

Abstract class

LDAP

access

RIS images

controlling

security logs

controlling

access control entries (ACEs).
[See ACEs (access control entries)]

Access Control Entry (ACE).
[See ACE (Access Control Entry)]

access control inheritance
2nd
3rd
4th
5th
6th

access control lists (ACLs).
[See ACLs (access control lists)]

access lists

managing

Active Directory
2nd
3rd
4th

access masks

access permissions

Active Directory

domains

evaluation
2nd
3rd
4th
5th
6th
7th

GPCs

assigning

GPTs

assigning

access rights

Active Directory
2nd

delegation
2nd
3rd
4th
5th
6th

access tokens
2nd
3rd
4th

contents

viewing

accessing

member servers

authentication
2nd
3rd
4th
5th
6th

Accessing Advanced Server Parameters procedure (5.22)

Accessing the Remote Installation Group Policy procedure (2.10)

Accessing the WMI Filter Interface procedure (12.5)

ACCM (Asynchronous-Control-Character-Map)

account BDCs

upgrading
2nd
3rd

account lockout policies
2nd

account migrations

domains
2nd
3rd

ACE

(Access Control Entry)

ACEs

(access control entries)

canonical sorting

exceptions

evaluation
2nd
3rd

inheritance
2nd
3rd

modifying

viewing

ACL Editor
2nd
3rd

objects

ownership management
2nd

ACLs
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

(access control lists)

access permissions

evaluation
2nd
3rd
4th
5th
6th
7th

ACEs

(access control entries)

evaluation
2nd
3rd

inheritance
2nd
3rd

modifying

viewing

DACLs

(discretionary access control lists)

objects

ownership management
2nd

permissions

inheritance
2nd
3rd
4th

SACLs

(system access control lists)

ACPI

(Advanced Configuration and Power Interface)

plug-and-play
2nd
3rd
4th
5th
6th
7th
8th

power management
2nd
3rd

ACPI compatibility checks

Setup

initial hardware recognition
2nd

activation

automating

Windows Product Activation
2nd
3rd
4th
5th

Active Directory

anonymous access
2nd

backing up
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th

necessity of
2nd

restoring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

System State backups
2nd
3rd
4th

classes

derivations

clients
2nd

content rules

database

compacting
2nd
3rd

repairing
2nd
3rd
4th

DNS

dynamic updates
2nd
3rd

forwarders
2nd
3rd
4th
5th
6th
7th
8th

integrated zones

integration
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th

record scavenging
2nd

security
2nd
3rd
4th
5th
6th

zone integration
2nd
3rd
4th
5th

DNS servers

loss of
2nd
3rd
4th

domain controllers

GC-less logons
2nd
3rd

loss of
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th

metadata cleanup
2nd
3rd
4th
5th
6th
7th

domains

designing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th

domain controller placement
2nd
3rd
4th

domain naming master
2nd

FSMOs (Flexible Single Master Operations)

infrastructure master
2nd
3rd

multiple domain forest trusts
2nd

multiple domains
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

multiple groups
2nd
3rd
4th
5th

navigation

PDC Emulators
2nd
3rd
4th
5th
6th
7th

remote access
2nd
3rd
4th
5th
6th
7th
8th

replication

RIDs (Relative IDs)
2nd

role master
2nd

root domain names
2nd
3rd
4th
5th
6th

schema master
2nd

split public/private zones
2nd
3rd

third-party name servers
2nd

Windows-based zones
2nd
3rd

drag-and-drop operations

ESE (Extensible Storage Engine)

forests

in-place upgrades
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

FSMOs

loss of
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

GPOs (Group Policy Objects)

defaults

groups
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

authorization
2nd
3rd

Builtin groups
2nd
3rd
4th

classifications
2nd

Domain Local groups
2nd
3rd
4th
5th
6th
7th

Global groups
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

Machine Local groups
2nd
3rd

nesting
2nd

Universal groups
2nd
3rd
4th
5th
6th
7th
8th

GUID (Globally Unique Identifier)

IAS (Internet Authentication Service)

registering with
2nd
3rd

integrated DNS zones
2nd
3rd

integrated zones

IP subnets

creating

LDAP
2nd
3rd

maintenance
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

namespaces
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th

client compatibility
2nd

compatibility settings

domains
2nd

forests
2nd

Global Catalogs
2nd
3rd
4th
5th

naming contexts
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

service location
2nd
3rd
4th
5th
6th

trees
2nd
3rd
4th

trust relationships
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

null sessions
2nd
3rd

object

maximum number of

objects

attributes

classes

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd

protecting
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

OID (Object Identifier)
2nd

OU

(Organizational Unit)

designing

OUs

designing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

lower-level OUs
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

passwords

storage

PW2CA (Pre-Windows 2000 Compatible List)

recovery stages

replication

Application naming context

bridgehead server selection
2nd

bridgehead servers
2nd

collision handling
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

connections
2nd
3rd

deleted containers
2nd

deleted object handling
2nd
3rd

deleted objects

forcing
2nd
3rd
4th

frequency
2nd
3rd
4th
5th
6th
7th

garbage collection
2nd
3rd
4th

identical distinguished names
2nd
3rd

inter-site replication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

inter-site topologies
2nd

intervals
2nd
3rd
4th
5th

ISTGs (Inter-Site Topology Generators)
2nd
3rd
4th
5th

KCC (Knowledge Consistency Checker)

linked values

loss of components
2nd
3rd
4th
5th

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

manually controlling
2nd
3rd

methods
2nd
3rd
4th

moved objects

naming contexts
2nd
3rd

NET TIME
2nd
3rd
4th

new features
2nd

parameter control
2nd
3rd
4th
5th
6th
7th
8th

property metadata
2nd
3rd

property replication
2nd

RPCs (Remote Procedure Calls)
2nd

simultaneous modification
2nd

site objects
2nd
3rd
4th

sites
2nd
3rd

special operations
2nd
3rd
4th
5th
6th
7th
8th
9th

topology
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

transactions
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

troubleshooting
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

WIN32TM
2nd
3rd
4th

WTS (Windows Time Service)
2nd
3rd

restoring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

authoritative restores
2nd
3rd
4th
5th
6th
7th
8th

backup tape time limits
2nd
3rd
4th
5th

permissions
2nd

System State files
2nd
3rd
4th

Sysvol
2nd

schema

class derivations
2nd

defination objects
2nd

functional operations
2nd
3rd
4th

object classes
2nd

object identification
2nd
3rd
4th

rules
2nd
3rd
4th

security
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st

access control inheritance
2nd
3rd
4th
5th
6th

access list management
2nd
3rd
4th

access permissions

access rights
2nd

access rights delegation
2nd
3rd
4th
5th
6th

descriptor contents
2nd
3rd
4th

event notification
2nd
3rd

groups
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

improvements to
2nd

LSA (Local Security Authority)

managing
2nd
3rd
4th

object protection
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

primaries

security descriptors

security principals
2nd

service accounts
2nd

SLS (Secondary Logon Service)
2nd
3rd
4th
5th

SRM (Security Reference Monitor)

sercurity

RunAs
2nd
3rd
4th
5th

SMTP (Simple Mail Transport Protocol)

structure rules

support files
2nd
3rd

moving
2nd

syntax rules

tape backups

trust relationships

utilities
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th

ADSI Edit tool
2nd
3rd
4th
5th
6th
7th
8th

DCDIAG

LDAP browser
2nd
3rd
4th
5th

management consoles
2nd
3rd

Schema console
2nd
3rd
4th
5th
6th
7th

WAN links

loss of

Active Directory Migration Tool (ADMT).
[See ADMT (Active Directory Migration Tool)]2nd
[See ADMT (Active Directory Migration Tool)]

Active Directory Services Interface (ADSI).
[See Active Directory User Objects

AD Users and Computers

home directories

assigning
2nd
3rd

adapters

network adapters

configuring
2nd
3rd

installing
2nd
3rd

adding

attributes

Global Catalog

hardware
2nd

Adding a Static WINS Mapping procedure (4.5)

Adding File Types to the File Exclusion List procedure (21.1)

address mapping

NAT (Network Address Translation)
2nd
3rd

Address Windowing Extensions (AWE).
[See AWE (Address Windowing Extensions)]

addresses

determining

Network layers
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

MAC addresses

components

viewing

Adleman, Len

ADM listings

administrative template files
2nd
3rd
4th

ADM template files
2nd
3rd
4th
5th
6th

administrative access

DNS

limiting

administrative shares

CD-ROM drives

re-creating

recreating

administrative template policies
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th

ADM listings
2nd
3rd
4th

ADM template files
2nd
3rd
4th
5th
6th

creating
2nd

policies
2nd

preferences
2nd

Registry.pol files
2nd

administrator passwords

managing

Setup
2nd

adminstrative template policies

preferences
2nd

ADMT

(Active Directory Migration Tool)
2nd

improvements to

ADSI (Active Directory Services Interface)

ADSI Edit tool

Active Directory
2nd
3rd
4th
5th
6th
7th
8th

ADSM backup package

Advanced Configuration and Power Interface (ACPI).
[See ACPI (Advanced Configuration and Power Interface)]

Advanced Encryption Standard (AES).
[See 2nd
[See Advanced property (printers)
2nd
3rd

Advanced Research Project Administration (ARPA).
[See ARPA (Advanced Research Project Administration)]

Advanced RISC Computing (ARC) path.
[See ARC (Advanced RISC Computing) path]

AES

(Advanced Encryption Standard)

AES (Advanced Encryption Standard)

agent-based network backups

AIA

(Authority Information Access)
2nd
3rd

AIA (Authority Information Access) containers (Enterprise CAs)

AIPIPA (Automatic Private IP Addressing)

AKIs

(Authority Key Identifiers)

algorithms

data encryption
2nd
3rd
4th

DSA (Digital Signature Algorithm)

encryption

RC algorithms

hashing algorithms

passwords

KCC (Knowledge Consistency Checker)

allocation units.
[See Allow permissions

assigning

cumulative Allow permissions

alternative Startfrom files (RIS)

analysis snap-in

security policies
2nd
3rd
4th

Analyze option (Secedit utility)

anonymous access

Active Directory
2nd

NT4 RAS servers
2nd

anonymous logons

passwords
2nd
3rd
4th

ANSI

directory services

answer section (DNS packets)

application compatibility

domain controllers

upgrades

Windows NT4

backups

application compatibility checks

upgrades
2nd
3rd

Application layer

SMBs (Server Message Blocks)
2nd
3rd

Application layer (OSI)
2nd

Application mode (terminal services)

Application naming conctext

replication

Active Directory

Application naming context

Active Directory
2nd
3rd
4th
5th
6th

application naming contexts
2nd

application servers

CALs

application verification

applications

Drwatson.exe
2nd
3rd

Applying Inheritable Rights to an Active Directory Container procedure (13.1)

ARC

(Advanced RISC Computing) path

Boot.ini
2nd
3rd

ARC paths

Boot.ini

special paths
2nd
3rd

architecture

security
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

Windows .NET
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th

architectures

sites

designing
2nd
3rd
4th
5th
6th
7th

archived certificates

recovering
2nd
3rd

archiving

certificates

CAs
2nd
3rd
4th
5th
6th
7th

keys

PKI
2nd

ArcServe backup package

ARPA

(Advanced Research Project Administration)

ASQ (Attribute Scoped Query)

ASR

(Automated System Recovery)

ASR (Automated System Recovery)

Ntbackup
2nd
3rd
4th
5th
6th

assemblies

assigned packages

software deployment

assigning

drive letters

Setup
2nd
3rd
4th
5th
6th
7th

permission inheritance
2nd

permissions

Assigning a Home Directory Using the Command Line procedure (19.3)

Assigning a User Home Directory with AD Users and Computers procedure (19.2)

Assigning Custom UPN Suffixes procedure (8.1)

asymmetric cipher keys

asynchronous processing

CSEs (Client-Side Extensions)
2nd

Asynchronous-Control-Character-Map (ACCM).
[See Atapi.sys drivers

atomic transactions

Active Directory

Attribute Scoped Query (ASQ).
[See Boot.ini

Default Policy Domain GPC

Global Catalog

adding

deleting

NTFS
2nd
3rd

objects

Active Directory

X.500
2nd
3rd
4th

audio

redirecting
2nd

audit logs
2nd

Audit Monitor for Logon/Logoff procedure (11.13)

Audit Monitoring for Printers procedure (11.14)

auditing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

audit logs
2nd

enabling
2nd
3rd

event logs

managing
2nd
3rd
4th
5th

images

Sysprep

kernel object auditing

recommendations
2nd
3rd
4th
5th
6th
7th
8th
9th

AUDITPOL utility

event logs

managing
2nd
3rd
4th
5th

authenticated users

limitations

domain/computer joining

authentication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

classic NT authentication

limitations
2nd

domains

computer authentication

trust authentication

IAS (Internet Authentication Services)

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

Kerberos
2nd
3rd
4th
5th
6th

authenticator
2nd

cross-domain authentication
2nd
3rd
4th

member server access
2nd
3rd
4th
5th
6th

MITv5 Kerberos interoperability
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

Mixed domains

mutual authentication
2nd

PACs (Privilege Access Certificates)
2nd
3rd
4th
5th
6th

policies
2nd

preauthenticator
2nd

short-cut trusts
2nd

situations

tickets
2nd
3rd
4th
5th

transactions
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th

vocabulary
2nd
3rd
4th
5th
6th

methods

support
2nd

pass-through authentications

PPP

CHAP (Challenge Handshake Authentication Protocol)
2nd
3rd
4th

dial-up authentication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

domain authentication
2nd
3rd
4th

EAP (Extensible Authentication Protocol)
2nd
3rd
4th
5th
6th
7th
8th

Mixed domains
2nd
3rd
4th

MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)
2nd
3rd
4th

multidomain authentication
2nd
3rd

NT4 limitations
2nd
3rd
4th

PAP (Password Authentication Protocol)
2nd
3rd
4th
5th
6th
7th

RADIUS (Remote Authentication Dial-In User Services)
2nd
3rd
4th
5th
6th
7th
8th

SPAP (Shiva Password Authentication Protocol)
2nd

standard transactions
2nd
3rd
4th
5th

PPP (Point-to-Point Protocol)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th

authentication functions

Kerberos

authentication packages

LSA
2nd

authenticator

Kerberos
2nd

authoritative query responses

DNS
2nd

authoritative restores

Active Directory
2nd
3rd
4th
5th
6th
7th
8th

authoritative servers

DNS

query handling
2nd
3rd
4th
5th

Authority Information Access (AIA).
[See AIA (Authoity Information Access)]2nd
[See AIA (Authoity Information Access)]3rd
[See AIA (Authoity Information Access)]

Authority Information Access entity (certificates)

Authority Key Identifier (AKIs).
[See AKIs (Authority Key Identifiers)]

Authority Key Identifier entity (certificates)

authorization

groups

Active Directory
2nd
3rd

authorization data

Kerberos
2nd
3rd
4th
5th
6th
7th
8th
9th

authorization data field (encrypted tickets)

authorizations

DHCP servers
2nd
3rd

auto-enrollment

certificates
2nd
3rd

PKI

AUTOCHK

CHKDSK

compared
2nd

configuring

CHKNTFS
2nd

file systems

fault tolerance
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

repairs

forcing to

Automated System Recovery (ASR).
[See Automatic Private IP Addressing (APIPA)

automating

activation

deployment

Windows .NET
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th
51st
52nd
53rd
54th
55th
56th
57th
58th
59th
60th
61st
62nd
63rd
64th
65th
66th
67th
68th
69th
70th
71st
72nd
73rd
74th

product key entry

Auxiliary class

LDAP

AWE

(Address Windowing Extensions)
2nd
3rd

/ 245