Inside Windows Server 1002003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Inside Windows Server 1002003 [Electronic resources] - نسخه متنی

Addison Wesley

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

CA

(Certification Authority)

CA hierarchy checks

CA Version entity (certificates)

cache-coherent Non-Uniform Memory Allocation (ccNUMA).
[See passwords

caches

L2 caches
2nd

caching

client-side caching

caching-only name server

DNS

caching-only servers

DNS

configuring
2nd
3rd

CAL

(Client Access License)

CALs

application servers

canonical sorting

ACEs

exceptions

CAPTURE command (NetWare)

CAs

(Certification Authorities)
2nd
3rd
4th
5th

AIA (Authority Information Access)
2nd
3rd

certificate storage

certificates

archiving
2nd
3rd
4th
5th
6th
7th

enrollment
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

CRLs

(Certificate Revocation Lists)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

obtaining via Windows Update
2nd
3rd

publication
2nd
3rd
4th

Enterprise CAs
2nd

certificate templates
2nd
3rd
4th
5th

hierarchies
2nd
3rd
4th

installing
2nd
3rd
4th

root CAs

root certificate updates

Standard Server

support

trust hierarchies

designing
2nd
3rd
4th
5th

trusts
2nd
3rd
4th
5th

cataloging

tapes
2nd

Cataloging a Tape procedure (21.6)

CCITT

(Comit Consultatif International Tlphonique et Tlgraphique)

ccNUMA (cache-coherent Non-Uniform Memory Allocation)

CD-ROM drives

administrative shares

troubleshooting

CD-ROM file system

CD-RW drives
2nd

Cdfs.sys drivers

CDP (CRL Distribution Points) container (Enterprise CAs)

CDPs entity (certificates)

cell-switched networks

cells

Registry

Certificate Management Messages over CMS (CMC).
[See 2nd
[See Certificate Request Wizard

Certificate Revocation Lists (CRLs).
[See CRLs (Certificate Revocation Lists)]

Certificate Template entity (certificates)

certificate templates container (Enterprise CAs)

certificates

archiving
2nd
3rd
4th
5th
6th
7th

CAs

(Certification Authorities)
2nd
3rd
4th
5th

CRLs (Certificate Revocation Lists)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

Enterprise CAs
2nd

hierarchies
2nd
3rd
4th

installing
2nd
3rd
4th

storage

trust hierarchies
2nd
3rd
4th
5th

trusts
2nd
3rd
4th
5th

certificate snap-in

documentation
2nd

elements

enrollment
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

auto-enrollment
2nd
3rd

Certificates snap-in
2nd
3rd

CMC (Certificate Management Messages over CMS)
2nd

Web enrollment
2nd
3rd
4th

enrollment agent certificates

issuing;remote access
2nd
3rd
4th
5th
6th
7th

Enterprise CAs

certificate templates
2nd
3rd
4th
5th

Kerberos

PACs (Privilege Access Certificates)
2nd
3rd
4th
5th
6th

local certificate stores
2nd
3rd

managing
2nd
3rd
4th
5th
6th
7th

CIPHER command

OCSP (Online Certificate Status Protocol)
2nd

PKI
2nd
3rd
4th
5th
6th

templates

PKI (Public Key Infrastructure)

recovering
2nd
3rd

requests

smart cards

testing
2nd

SPCs (Software Publishing Certificates)

templates

preparing for remote access
2nd
3rd
4th

validity checks
2nd
3rd
4th
5th
6th
7th

Web Server

support

certificates snap-in

Certificates snap-in

certificates
2nd
3rd

Certification Authority (CA).
[See CA (Certification Authority)]

certified hardware
2nd

Certmgr utility

CERTUTIL utitlity

Challenge Handshake Authentication Protocol (CHAP).
[See CHAP (Challenge Handshake Authentication Protocol)]

Change Journal

file systems
2nd
3rd
4th
5th

USN (Update Sequence Number)

ChangePDC permission (Active Directory)

Changing a Role Master Using an MMC Console procedure (10.3)

Changing Active Directory File Locations procedure (10.13)

Changing Default RDP Port in the TSWeb Interface procedure (19.5)

Changing Drive Letters procedure (14.12)

Changing Log File Settings procedure (11.10)

Changing the Network Provider Order procedure (16.2)

CHAP

(Challenge Handshake Authentication Protocol)
2nd
3rd
4th
5th

CHAP Authentication Transaction procedure (20.1)

Character Phase Setup

installation
2nd
3rd
4th
5th

Charting Performance Monitor Logs procedure (3.8)

checking

Event logs
2nd
3rd
4th

checklist

installation
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

child domains

upgrading
2nd
3rd

child trusts

Active Directory

chipsets
2nd

CHKDSK

AUTOCHK

compared
2nd

file systems

fault tolerance
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

switches
2nd

CHKNTFS

AUTOCHK

configuring
2nd

CIFS (Common Internet File System)

CIPHER command

certificates

managing

file encryption

folder encryption

cipher keys (PKI)
2nd

circuit-switched networks

CISVC

(Content Indexing Service)

CIW

(Client Installation Wizard)
2nd
3rd
4th
5th
6th
7th

screens

customizing
2nd
3rd
4th
5th

Clark, Jason D.

class derivations

schema

Active Directory
2nd

class drivers

Class2.sys drivers

classes

derivations

Active Directory

LDAP

information model
2nd

inheritance
2nd
3rd
4th

object instances
2nd

objects

Active Directory

X.500
2nd
3rd
4th

classic interface

reverting to

Classic NT Link Search Pattern procedure (15.1)

Classic NT storage

passwords

Classic NT4 RAS access

domains

upgrading
2nd
3rd

classic scripts

domains

upgrading
2nd

classifications

groups

Active Directory
2nd

Classpnp.sys drivers

Client Access License (CAL).
[See CAL (Client Access License)]

Client Installation Wizard (CIW).
[See CIW (Client Installation Wizard)]

client name resolution

WINS
2nd
3rd

client printer connections

automating
2nd
3rd

Client Services for Netware

client-side caching

client-side extensions (CSEs).
[See CSEs (client-side extensions)]

Client/Server Runtime Subsystem (CSRSS).
[See clientÕs name and realm field (encrypted tickets)

clients

compatibility

Active Directory
2nd

DNS

configuring
2nd
3rd
4th
5th

resolvers
2nd
3rd
4th
5th

downlevel cliens

home directory mapping
2nd

fax servers

connecting to
2nd

installing

Kerberos

Kerberos authentication

situations

print clients

troubleshooting
2nd

printing

configuration
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th
51st
52nd
53rd
54th

referrals

WINS

configuring
2nd
3rd

clipboard mapping
2nd

Clonegg script

Cloneggu script

Clonelg script

Clonepr scripts

cloning

disks

deployment
2nd
3rd
4th
5th
6th
7th
8th
9th

problems

Sysprep
2nd
3rd
4th
5th
6th
7th
8th

cluster addressing

NTFS
2nd

cluster mapping

NTFS
2nd

cluster maps

FAT
2nd
3rd
4th
5th

cluster size

clusters

Enterprise Server

support

file systems
2nd
3rd
4th
5th
6th
7th

cluster size

CMC (Certificate Management Messages over CMS)
2nd

Cogswell, Bryce

collision handling

replication

Active Directory
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

collisions

hashes

Comit Consultatif International Tlphonique et Tlgraphique (CCITT).
[See CCITT (Comite Consultatif International Telephonique et Telegraphique)]

command line

Dfs

managing
2nd

home directories

creating
2nd
3rd
4th
5th
6th

RRAS

managing
2nd
3rd
4th
5th

shares

creating
2nd

terminal services

managing
2nd
3rd
4th
5th
6th

command lines

forced updates

CSEs (Client-Side Extensions)

command-line

disks

managing
2nd
3rd
4th
5th

file encryption

administration improvements

printing

administration
2nd
3rd
4th
5th

command-line management

DNS
2nd

command-line tools

PKI
2nd
3rd
4th
5th

security descriptors

managing
2nd
3rd
4th
5th
6th
7th

commands

DUMPFSMOS

RunAs

profiles

switches
2nd
3rd

syntax
2nd

Common Internet File System (CIFS).
[See LDAP
2nd
3rd

Common.adm legacy template

compacting

Active Directory database
2nd
3rd

compatibility settings

Active Directory

components

groups

policies
2nd
3rd

LSA
2nd
3rd
4th
5th
6th
7th
8th
9th

compression

file compression
2nd
3rd
4th
5th

files

NTFS
2nd
3rd
4th
5th
6th

computer account migrations

domains
2nd
3rd

computer authentication

domains

Computer Migration Wizard

computer passwords
2nd

troubleshooting
2nd

computer policies

GPOs
2nd
3rd

computer startup

Kerberos authentication
2nd
3rd
4th
5th
6th
7th

computers

domains

joining to

conditional forwarding

DNS
2nd
3rd

name servers

configuration

AUTOCHK

CHKNTFS
2nd

client-side caching
2nd
3rd
4th
5th
6th
7th
8th

clients

printing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th
51st
52nd
53rd
54th

data storage
2nd
3rd
4th

demand-dial routers
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

devices
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

CPUs
2nd

EFI disk utililities
2nd
3rd
4th
5th
6th

multiple displays
2nd

Windows Update
2nd
3rd
4th

DHCP

DNS support
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

DNS

caching-only servers
2nd
3rd

delegation
2nd
3rd
4th
5th

hierarchical zones
2nd
3rd
4th
5th
6th
7th
8th

root hints
2nd
3rd

secondary servers
2nd
3rd
4th
5th
6th
7th
8th
9th

DNS clients
2nd
3rd
4th
5th

DNS servers
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

DRAs
2nd
3rd
4th

drives
2nd

Fax service
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

file sharing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

administrative shares
2nd

remote share creation
2nd
3rd
4th
5th

share creation
2nd
3rd
4th
5th
6th
7th
8th

share permissions
2nd
3rd

XP desktops
2nd
3rd

final configuration
2nd
3rd
4th

IA64 storage
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

IAS (Internet Authentication Services)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

ICF
2nd
3rd
4th

inter-site replication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

Internet gateways

NAT
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

Lmhosts
2nd

memory dumps
2nd
3rd
4th

modems

for remote access
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

multiple domains

logons
2nd
3rd

NAT
2nd
3rd
4th

in RRAS
2nd

network adapters
2nd
3rd

network bridges
2nd
3rd
4th
5th
6th
7th

paging files

post Setup configuration
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

remote access servers
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th

RIS server

verification

RIS servers
2nd
3rd
4th
5th

RRAS
2nd
3rd
4th
5th
6th
7th
8th

smart card acceptance
2nd
3rd
4th
5th

security policies
2nd
3rd

Setup

configuration phase
2nd
3rd
4th

graphical phase
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

IA64 differences
2nd
3rd
4th
5th
6th

text phase
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

smart cards

remote access

storage
2nd

troubleshooting
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

VPNs

connections
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th

WINS

clients
2nd
3rd

replication
2nd
3rd
4th

WMI filters
2nd
3rd
4th

Configuration naming context

Active Directory

display specifiers
2nd
3rd

extended rights
2nd

Lost and Found

partitions

physical locations

services

sites

configuration phase

Setup
2nd
3rd
4th
5th

initial user logon

Configure option (Secedit utility)

Configure Your Server Wizard
2nd

Configuring a CA to Archive Certificates procedure (18.4)

Configuring a Caching-Only Server procedure (5.16)

Configuring a Cross-Realm Trust procedure (11.8)

Configuring a Demand-Dial Router procedure (20.12)

Configuring a DNS Server to Use a Forwarder procedure (5.17)

Configuring a Dynamic Zone procedure (5.18)

Configuring a GPO Security Descriptor to Filter Policy Recipients procedure (12.4)

Configuring a Remote Installation Services Image procedure (2.7)

Configuring a Remote Installation Services Server procedure (2.8)

Configuring a Secondary Server procedure (5.13)

Configuring a Spanned Volume procedure (14.6)

Configuring a WINS Client procedure (4.4)

Configuring an RRAS Server as an IAS Client procedure (20.18)

Configuring and Scheduling a Backup Job procedure (21.4)

Configuring Automatic Connection Pickup procedure (20.13)

Configuring Delegations procedure (5.11)

Configuring DNS Information for TCP/IP Interface Properties procedure (5.5)

Configuring DNS Information in the System Properties Window procedure (5.6)

Configuring NAT and ICF procedure (20.14)

Configuring Performance Monitor to Collect kernel Memory Statistics procedure (3.7)

Configuring Replmon procedure (7.13)

Configuring Root Hints procedure (5.10)

Configuring RRAS to Use RADIUS Authentication procedure (20.19)

Configuring Scavenging procedure (5.20)

Configuring Scope Options procedure (5.26)

Configuring the Password Migration Agent procedure (9.4)

Configuring the System to Dump Only the Contents of the Kernel Memory procedure (1.3)

Configuring WINS Replication procedure (4.6)

connections

browsers

troubleshooting
2nd
3rd

client printer connections

automating
2nd
3rd

dial-in connections

checking
2nd
3rd
4th

ICF (Internet Connection Firewall)
2nd

ICS (Internet Connection Sharing)
2nd
3rd
4th
5th

modems

testing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

troubleshooting
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

replication

Active Directory
2nd
3rd

manually creating
2nd

shared folders
2nd
3rd
4th
5th
6th

browsers
2nd
3rd
4th
5th
6th
7th
8th

searching

console (WINS)

configuring
2nd

console logons

delaying

console sessions

inviting users to

consolidated permissions

viewing
2nd

contacts

exchanging

via fax

Content Indexing Service (CISVC).
[See CISVC (Context Indexing Service)]

content rules

Active Directory
2nd

contiguous files

Continuing with the Graphic Mode Portion of Setup procedure (1.2)

Control Sets

Last Known Good Configuration
2nd
3rd
4th
5th
6th

Controlled Migration Suite

controller() entry

Boot.ini

convergence time

domain controllers

conversion

NTFS
2nd
3rd
4th
5th
6th
7th
8th

conversions

disks

dynamic disks
2nd

dynamic disks
2nd
3rd
4th
5th
6th
7th
8th
9th

Converting a Basic Disk to a Dynamic Disk procedure (14.4)

copy backups (Ntbackup)

Copy option (Nvrboot.efi)

copy warnings

file encryption

copying

files

troubleshooting

Correcting Lost Drive Signatures procedure (1.4)

cover pages

faxes

managing
2nd
3rd
4th

CPUs

installing
2nd

crackers

passwords

Creating a Custom Schema Management Console procedure (6.1)

Creating a Dfs Root procedure (16.6)

Creating a Fault Tolerant Boot Floppy Disk procedure (3.5)

Creating a Forward Lookup Zone procedure (5.8)

Creating a Key Recovery Agent procedure (18.3)

Creating a Mount Point Using the Disk Management Console procedure (15.5)

Creating a New Site Object procedures (7.5)

Creating a Password Reset Disk procedure (11.3)

Creating a Reverse Lookup Zone procedure (5.9)

Creating a Subnet Object procedure (7.6)

Creating an Archive Template procedure (18.5)

Creating and Configuring Site Link Objects procedure (7.7)

Creating and Sharing a Folder procedure (16.3)

Creating Dfs Links procedure (16.7)

Creating Extended Partitions and Logical Drives procedure (14.2)

Creating Mirrored Volumes procedure (14.8)

Creating Primary Partitions on Basic Disks procedure (14.1)

Creating RAID 5 Volumes procedure (14.10)

Creating Remote Shares Using the Computer Management Console procedure (16.4)

Creating Simple Volumes procedure (14.5)

Creating Striped Volumes procedure (14.7)

credentials caches

passwords
2nd
3rd
4th

CRLs

(Certificate Revocation Lists)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

Delta CRLs

obtaining via Windows Update
2nd
3rd

publication
2nd
3rd
4th

cross-domain authentication
2nd
3rd
4th

cross-domain GPO links

GPCs
2nd
3rd

cross-realm architecture

MITv5 Kerberos
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

cross-realm trusts

MITv5 Kerberos

creating
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

cross-trust hierachies

CAs

Cross-Trust Lists (CTLs)

cryptographic elements (PKI)
2nd
3rd
4th
5th
6th
7th

Cryptographic Service Provider (CSP).
[See CSP (Cryptographic Service Provider)]

cryptographic services

PKI
2nd
3rd
4th
5th
6th

CSEs

(client-side extensions)

asynchronous processing
2nd

background refreshes
2nd
3rd
4th

forced updates
2nd

command line

group policies
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

list of

script processing
2nd

synchronous processing
2nd
3rd
4th

CSP

(Cryptographic Service Provider)

CSRSS (Client/Server Runtime Subsystem)

CSVDE tool (LDAP)
2nd

CTLs

(Cross-Trust Lists)

cumulative Allow permissions

custom computer names

RIS

cutoff speeds

slow link processing

group policies

/ 245