Inside Windows Server 1002003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Inside Windows Server 1002003 [Electronic resources] - نسخه متنی

Addison Wesley

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

D-H (Diffie-Hellman) public key technology
2nd

DACLs

(discretionary access control lists)

(Discretionary Access Control Lists)

daily backups (Ntbackup)
2nd

data chunking

Data Decryption Field (DDF).
[See DDF (Data Decryption Field)]

data encryption
2nd
3rd
4th

algorithms
2nd
3rd
4th

Data Encryption Standard (DES).
[See DES (Data Encryption Standard)]2nd
[See DES (Data Encryption Standard)]3rd
[See DES (Data Encryption Standard)]

Data Link Control (DLC).
[See DLC (Data Link Control)]

data link layer

(OSI)

addresses

determining
2nd

ports

determining
2nd

data partitions

Data Recovery Agent (DRA).
[See DRA (Data Recovery Agent)]

Data Recovery Agents (DRAs). DRAs (Data Recovery Agents)

Data Recovery Field (DRF).
[See DRF (Data Recovery Field)]

data storage

configuring
2nd
3rd
4th

dynamic disks

GPT disks

IA32 systems

disk operations
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

LDM (Logical Disk Manager) colume configurations

LDM (Logical Disk Manager) volume configurations
2nd
3rd
4th
5th
6th
7th

MBR (Master Boot Record) disks

data stream encryption

RDP
2nd

database engines

database size restictions

multiple domains
2nd

databases

Active Directory

compacting
2nd
3rd

maintenance
2nd
3rd
4th
5th
6th
7th
8th

repairing
2nd
3rd
4th

forests

in-place upgrades
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

Kerberos

LSA

LSA databases

SAM databases

schemas
2nd

WINS

managing
2nd
3rd
4th
5th
6th
7th
8th
9th

Datacenter Server

IA64 support

memory

support

processors

support

dates

configuring

Setup
2nd
3rd

DCDIAG

Active Directory

DCFIRST.INF template (security)

Dcpromo utility

DCUP5.INF template (security)

DDF

(Data Decryption Field)

Debian documentation Web site

Debugging Mode

debugging tools

improvements to

dedicated networks

Default Domain Controller GPOs (Active Directory)

Default Domain GPOs (Active Directory)

Default Policy Domain GPC

attributes

default security templates

security policies
2nd
3rd

Default-First-Site-Name Object

renaming

definition objects

schema

Active Directory
2nd

DEFLTDC.INF template (security)

DEFLTSV.INF template (security)

DEFRAG

defragmentation

file systems
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

improvements to

NTFS
2nd
3rd
4th
5th
6th

Dekker, Edward
2nd

delays

console logons

delegating

group policies

management
2nd

Delegating Access Rights procedure (13.2)

delegation
2nd

access rights

Active Directory
2nd
3rd
4th
5th
6th

DNS

configuring
2nd
3rd
4th
5th

Delegation of Control Wizard

delegations

DNS

lame delegations

deleted containers

replication

Active Directory
2nd

deleted object handling

replication

Active Directory
2nd
3rd

deleted objects

replication

Active Directory

deleting

attributes

Global Catalog

FR private keys
2nd
3rd
4th

records

WINS

volumes
2nd

Deleting a Volume procedure (14.11)

Delta CRLs

PKI

Delta CRLs (Certificate Revocation Lists)

demand-dial interfaces

installing
2nd
3rd

demand-dial routers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

demoting

domain controllers
2nd
3rd

Deny permissions

assigning

evaluation of

deploying

domains
2nd
3rd
4th
5th
6th
7th

scripts
2nd
3rd

Windows .NET

automating
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th
51st
52nd
53rd
54th
55th
56th
57th
58th
59th
60th
61st
62nd
63rd
64th
65th
66th
67th
68th
69th
70th
71st
72nd
73rd

deployment

disk cloning
2nd
3rd
4th
5th
6th
7th
8th
9th

scripted installations
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

unattended setup batch files

unattended setup scripts

creating
2nd
3rd
4th
5th
6th
7th
8th
9th

derivations

classes

Active Directory

DES

(Data Encryption Standard)
2nd
3rd

descriptor contents

Active Directory

security
2nd
3rd
4th

designating

bridgehead servers
2nd
3rd
4th

Designating a Bridgehead Server procedure (7.8)

Designating Additional Dfs Link Targets procedure (16.8)

designing

Active Directory

OU (Organizational Unit)

OUs (Organizational Unit)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

OUs (Organizational Units)

CA trust hierarchies
2nd
3rd
4th
5th

DNS domains
2nd
3rd
4th
5th
6th
7th

domains

Active Directory
2nd
3rd
4th
5th
6th
7th
8th

sites

srachitectures
2nd
3rd
4th
5th
6th
7th

desktop-oriented features

DESX algorithm

DESX encryption

detachable storage

Developing Windows NT Device Drivers (i)

Developing Windows NT Device Drivers\

A ProgrammerÕs Handbook (i)

Device Driver Rollback procedure (3.4)

Device Driver Update procedure (3.3)

device drivers

rollbacks
2nd
3rd

updates

Device Manager

plug-and-play
2nd
3rd
4th
5th
6th

devices

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

CPUs
2nd

EFI disk utilities
2nd
3rd
4th
5th
6th

multiple displays
2nd

Windows Update
2nd
3rd
4th

installing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

CPUs
2nd

EFI disk utililities
2nd
3rd
4th
5th
6th

IDE hard drives
2nd

multiple displays
2nd

network adapters
2nd
3rd

removable media drives
2nd
3rd
4th

SCSI adapters
2nd
3rd

Windows Update
2nd
3rd
4th

redirecting
2nd

removing

troubleshooting
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th

Dfs

(Distributed File Sharing)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th

(Distributed File System)

console

deployment
2nd
3rd

links

creating
2nd
3rd

target assignments
2nd
3rd

managing

command line
2nd

MUP polling
2nd

namespaces

designing
2nd

PKT (Partition Knowledge Table)

referrals
2nd

replication topologies

changing
2nd
3rd

root directories

creating
2nd
3rd

roots
2nd
3rd

limitations

links
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

PKT (Partition Knowledge Table)
2nd
3rd
4th

removing
2nd
3rd
4th

structure
2nd
3rd
4th
5th

targets
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th

FRS (File Replication Service)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

DHCP

configuring

DNS support
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

installing
2nd

RIS

(Remote Installation Services)
2nd

scope options

configuring
2nd
3rd
4th
5th

servers

authorizing
2nd
3rd

DHCPINFORM

diagnostic logging

FRS (File Replication Service)

dial-in connections

checking

RAS logs
2nd
3rd
4th

dial-in IP settings

NT4 RRAS servers

configuring
2nd
3rd
4th

dial-in verifications

domains

dial-up authentication
2nd
3rd
4th

PPP (Point-to-Point Protocol)
2nd
3rd
4th
5th
6th
7th
8th
9th

dial-up connections

name resolution

dial-up sessions

modems

monitoring
2nd
3rd
4th
5th

DIB (Directory Information Base)

differential backups (Ntbackup)
2nd

Diffie, Whitfield

digest authentication

domains

Digest security package

Digital Signature Algorithm (DSA).
[See DSA (Digital Signature Algorithm)]

Digital Signature Security Standard (DSS).
[See DSS (Digital Signature Standard)]

Digital Signature Trust Web site

digital signatures

DSA (Digital Signature Algorithm)

DSS (Digital Signature Security Standard)

hashing technology

Direct Mmeory Access (DMA).
[See backing up
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th

maintenance
2nd
3rd
4th
5th
6th
7th
8th

FAT
2nd
3rd

home directories

creating
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

terminal services
2nd

sharing

Directory Information Base (DIB).
[See LDAP
2nd
3rd
4th

directory records

NTFS
2nd
3rd
4th
5th
6th
7th
8th

directory records (MFT)

Directory Replication Agent (DRA).
[See Directory Replication Agents (DRAs)

Directory Service Agents (DSAs).
[See Directory Service Restore Mode

Directory Service Restore Mode (Windows)

directory services

Active Directory

LDAP
2nd
3rd

namesapces
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th
51st
52nd
53rd

ANSI

components
2nd
3rd

history of
2nd
3rd
4th
5th
6th
7th

IEC (International Electrotechnical Commission)
2nd

IETF (Internet Engineering Task Force)

ISO

(International Organization for Standardization)
2nd
3rd
4th

ITU-T
2nd

LDAP

namespaces
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

RFCs (Request for Comments)
2nd

X.500

components
2nd
3rd
4th
5th

LDAP
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

LDAP;compared
2nd

dirty flags

NTFS
2nd

disabling

file encryption
2nd
3rd
4th
5th
6th
7th

Disabling DNS on an Interface procedure (5.19)

Disabling EFS Using Windows .NET Group Policies procedure (17.2)

Disabling NetBIOS-over-TCP/IP Name Resolution procedure (4.7)

Disabling Remote Desktop on .NET Server procedure (19.7)

Disabling Remote Desktop procedure (19.4)

discretionary access control lists (DACLs).
[See DACLs (discretionary access control lists)]

Discretionary Access Control Lists (DACLs).
[See DACLs (Discretionary Access Control Lists)]

disk access

standard disk access

using

disk caching

disabling

disk cloning

deployment
2nd
3rd
4th
5th
6th
7th
8th
9th

problems

Sysprep
2nd
3rd
4th
5th
6th
7th
8th

Disk Management console

disk opeartions

IA32 systems
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

disk partitions

extendible disk partitions

disk() entry

Boot.ini

Disk.sys drivers

Diskpart utility
2nd
3rd

Diskpart.efi utility
2nd
3rd

Diskpart.efi utility (3.2)

disks

dynamic disks
2nd
3rd

converting to
2nd

reverting

extended partitions

creating
2nd
3rd

formats

choosing
2nd
3rd

GPTs

(GUID Partition Tables)
2nd

improvements to
2nd

managing

command-line
2nd
3rd
4th
5th

paging files

moving to
2nd

partitions

creating
2nd

extending
2nd
3rd
4th
5th

primary partitions

creating
2nd

Display option (Nvrboot.efi)

display specifiers

Configuration naming context

Active Directory
2nd
3rd

displays

devices

installing
2nd

distinguished names

namespaces

LDAP
2nd

Distributed File System (Dfs).
[See Dfs (Distributes File System)]

DLC

(Data Link Control)

DLLs

(Dynamic Link Libraries)
2nd

multiple-version DLL workaround

Side-by-Side aseemblies
2nd
3rd
4th

Side-by-Side assemblies

DMA
2nd
3rd
4th

DMA (Direct Memory Access)

Dmboot.sys drivers

Dmio.sys drivers

Dmload.sys drivers

DNS

(Domain Name System)
2nd

Active Directory

forwarders
2nd
3rd
4th
5th
6th
7th
8th

integrated zones

integration
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th

zone integration
2nd
3rd
4th
5th

administrative access

limiting

application naming contexts

BIND boot files

starting

boot information

caching-only servers

configuring
2nd
3rd

clients

configuring
2nd
3rd
4th
5th

resolvers
2nd
3rd
4th
5th

conditional forwarding

delegation

configuring
2nd
3rd
4th
5th

delegations

lame delegations

deploying

checklist
2nd

non-Windows infrastructure
2nd
3rd

DHCP

configuring support
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

domains
2nd
3rd
4th
5th
6th

designing
2nd
3rd
4th
5th
6th
7th

root domains

TLDs (top-level domains)

drivers

installing
2nd

Dynamic DNS

disabling on interfaces
2nd

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

scavenging configuration
2nd
3rd
4th
5th

security
2nd
3rd

zone configuration
2nd

dynamic updates
2nd
3rd

securing
2nd

extensions

forward lookup zones

creating
2nd
3rd
4th
5th

hierarchical zones

configuring
2nd
3rd
4th
5th
6th
7th
8th

host files
2nd

incremental zone transfers
2nd
3rd

integrated DNS zones

Active Directory
2nd
3rd

IPv6 host records

managing

command-line management
2nd

multiple servers

using

name servers
2nd
3rd

caching-only name server

primary name servers
2nd
3rd

secondary name servers
2nd
3rd

namespaces
2nd
3rd

private

negative query caching

notification-driven zone transfers

packets

queries

authoritative query responses
2nd

non-authoritative query responses
2nd
3rd

query handling
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

authoritative servers
2nd
3rd
4th
5th

non-authoritative servers
2nd
3rd
4th

reverse lookup queries
2nd
3rd
4th
5th
6th
7th
8th

record verifications

records

scavenging
2nd

resource records
2nd

reverse lookup zones

creating
2nd
3rd
4th

root hints
2nd
3rd
4th

configuring
2nd
3rd

secondaries
2nd

secondary servers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th

security
2nd
3rd
4th
5th
6th

servers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

forwarders
2nd
3rd

installing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

secondary servers
2nd
3rd
4th
5th
6th

service locator records

stub zones
2nd
3rd
4th

trace names

unauthorized zone transfers

preventing

update notifications
2nd
3rd
4th

enabling
2nd
3rd

updates

secure

upgrading
2nd

WINS forwarding
2nd

zone transfers

enabling
2nd
3rd

zones

examining
2nd
3rd
4th
5th
6th
7th

DNS resolver cache tool (Tcpip.sys)

DNS servers

loss of

remedying
2nd
3rd
4th

DNS tool (Tcpip.sys)

documentation

certificates
2nd

PACs (Privilege Access Certificates)

Domain Controller

promotion utility

Domain Controllers

Active Controllers
2nd
3rd

domain controllers

Active Directory

GC-less logons
2nd
3rd

metadata cleanup
2nd
3rd
4th
5th
6th
7th

convergence time

demoting
2nd
3rd

installing
2nd
3rd

loss of

correcting
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th

null sessions

overload prevention

placement
2nd
3rd
4th

promoting

local SAM

promotion

backup tapes

pull updates

renaming
2nd
3rd

roles

setting
2nd
3rd

upgrades

application compatibility

leapfrog upgrades
2nd
3rd

requirements
2nd
3rd
4th
5th
6th
7th

Domain Local groups (Active Directory)
2nd
3rd
4th

Domain Master Browser

domain master browsers

Domain Migration Administrator

domain name master

Active Directory
2nd

Domain Name System (DNS)

Domain Name System (DNS).
[See DNS (Domain Name System)]

Domain naming context

domain naming contexts

Active Directory
2nd
3rd

Domain Naming Master (FSMOs)

domain roots

DomainPassword permission (Active Directory)

domains

access permissions

Active Directory
2nd

designing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st

domain controller placement
2nd
3rd
4th

domain name master
2nd

FSMOs (Flexible Single Master Operations)

infrastructure master
2nd
3rd

multiple domain forest trusts
2nd

multiple domains
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

multiple groups
2nd
3rd
4th
5th

navigation

PDC Emulators
2nd
3rd
4th
5th
6th
7th

replication

RIDs (Relative IDs)
2nd

role master
2nd

root domain names
2nd
3rd
4th
5th
6th

schema master
2nd

split public/private zones
2nd
3rd

third-party name servers
2nd

Windows-based zones
2nd
3rd

application verification

authentication
2nd
3rd
4th

child domains

upgrading
2nd
3rd

computer authentication

computers

joining

configuring

Setup
2nd
3rd
4th

cross-domain authentication
2nd
3rd
4th

deploying
2nd
3rd
4th
5th
6th
7th

designing

Active Directory
2nd
3rd
4th
5th
6th
7th
8th

dial-in verifications

digest authentication

DNS
2nd
3rd
4th
5th
6th

designing
2nd
3rd
4th
5th
6th
7th

root domains

secondaries
2nd

TLDs (top-level domains)

upgrading
2nd

efficiency

Forest Trusts

functional levels

shift root domain to Windows .NEt functional level

shift root domain to Windows .NET functional level

group policies

integrated DNS zones
2nd
3rd

interoperability

joining

automated setup

logon scripts

managability

master account domains

upgrading
2nd
3rd
4th
5th

migrating

account migrations
2nd
3rd

computer account migrations
2nd
3rd

group account migrations

group accounts
2nd
3rd
4th
5th

password migrations
2nd
3rd
4th
5th
6th

SID history
2nd
3rd
4th
5th

user accounts
2nd
3rd
4th
5th

migrating from
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

mixed domains

multidomain authentication
2nd
3rd

multiple domains

logon configuration
2nd
3rd

namespaces
2nd
3rd

objects

maximum number

operations

new

PDCs

upgrading
2nd
3rd
4th
5th

placeholder domains

installing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

profile settings

promoting

troubleshooting
2nd
3rd

recoverability

reliability

renaming
2nd

resource domains

upgrading
2nd
3rd

root domains

upgrading
2nd
3rd

security

share point verification

stability

system policy verification

trust authentication

upgrading

account BDCs
2nd
3rd

allotted time for

browsing

child domains
2nd
3rd

Classic NT4 RAS access
2nd
3rd

classic scripts
2nd

DNS
2nd

domain controller requirements
2nd
3rd
4th
5th
6th
7th

forests
2nd

FSMO (Flexible Single Master Operations) servers

functional levels
2nd
3rd
4th
5th
6th

group policies
2nd

in-place upgrades
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th

master account domains
2nd
3rd
4th
5th

mixed domains
2nd

PDCs
2nd
3rd
4th
5th

policies
2nd

post-upgrade verifications
2nd
3rd

preparations
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th

priveleges

root domains
2nd
3rd

SAM
2nd
3rd

storage

unsupported operations
2nd

user authentication

DOS

printing from
2nd
3rd

DOS-derived Windows hashing

passwords

DOS-derived Windows storage

passwords

downlevel clients

home directories

mapping
2nd

DRA

(Data Recovery Agent)

files

opening as
2nd
3rd

DRA (Directory Replication Agent)

DRAs

(Data Recovery Agents)

configuring
2nd
3rd
4th

EFS group policies

loading into
2nd

DRAs (Directory Replication Agents)

DRF

(Data Recovery Field)

drive controllers

drive letters

assigning

Setup
2nd
3rd
4th
5th
6th
7th

changing
2nd
3rd
4th

Driver Rollback

drivers

class drivers

device drivers

rollbacks
2nd
3rd

updates

DNS

installing
2nd

Driver Rollback

file system drivers
2nd
3rd
4th
5th

file systems

filter drivers

large

support

minidrivers

printer drivers

printer sharing
2nd
3rd
4th
5th
6th
7th
8th
9th

protection

SCSI drivers

alternative

service drivers

drives

.
[See also hard drives]

configurations
2nd

drive letters

changing
2nd
3rd
4th

formats
2nd

redirecting
2nd
3rd

removable drives

removable media
2nd

removable media drives

installing
2nd
3rd
4th

sizes
2nd
3rd

types
2nd
3rd
4th
5th
6th
7th
8th
9th

Drwatson.exe
2nd
3rd

DSA

(Digital Signature Algorithm)

DSACLS

access lists

managing
2nd
3rd
4th

DSAs (Directory Service Agents)

DSS

(Digital Signature Security Standard)

(Digital Signature Standard)
2nd

Dssenh CSP provider

DSSTORE utility

DSUP.INF template (security)

DSUPT.INF template (security)

dual monitors

preparing

installation

dual-boots

installation

considerations
2nd
3rd

DUMPFSMOS command script

dumps

memory dumps
2nd

duplexed volumes

DVD-RAM drives
2nd

dynamic client icons

dynamic disks
2nd
3rd

booting
2nd
3rd

conversions
2nd
3rd
4th
5th
6th
7th
8th
9th

converting to
2nd

hardware RAID

moving between computers
2nd

reverting

setup
2nd
3rd
4th

volume extensions (spanning)
2nd

volumes

creating for
2nd
3rd

extending between
2nd

Dynamic DNS

advanced DNS servers

configuring
2nd
3rd

interfaces

disabling
2nd

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

scavenging

configuring
2nd
3rd
4th
5th

security

managing
2nd
3rd

WINS forwarding
2nd
3rd

zones

configuring
2nd

Dynamic Link Libraries (DLLs).
[See DLLs (Dynamic Link Libraries)]2nd
[See DLLs (Dynamic Link Libraries)]

dynamic updates

DNS
2nd
3rd

securing
2nd

dynamic volumes

creating

command-line

Recovery Console

restrictions
2nd
3rd
4th

/ 245