Inside Windows Server 1002003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Inside Windows Server 1002003 [Electronic resources] - نسخه متنی

Addison Wesley

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

RA (Registration Authority)

RADIUS

(Remote Authentication Dial-In User Services)
2nd
3rd
4th
5th
6th
7th
8th

IAS

support
2nd
3rd
4th
5th
6th

RRAS

support
2nd
3rd
4th
5th
6th

RAID 5 volumes
2nd
3rd

failed disks

replcaing in
2nd
3rd
4th
5th

RAS servers

anonymous access
2nd

remote access
2nd
3rd
4th
5th
6th
7th
8th

RBFG (Remote Boot Floppy Generator)

RC algorithms

rdisk() entry

Boot.ini

RDP

(Remote Desktop Protocol)
2nd

clients

connections
2nd
3rd
4th

data stream encryption
2nd

improvements to

remote assistance

Remote Desktop

disabling

Remote Desktop client
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

servers

managing
2nd
3rd
4th
5th
6th

RDP Redirector

realm names (Kerberos reply messages)

realms

Kerberos

record verifications

DNS

records

DNS

resource records
2nd

scavenging
2nd

MFT

MFT records

reparse points
2nd
3rd
4th
5th
6th
7th

NTFS
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

$Data
2nd
3rd
4th

$File_Name
2nd
3rd

$Standard_Information
2nd
3rd

header information
2nd

short name generation
2nd
3rd
4th

WINS

deleting

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

recoverability

domains

recovering

certificates
2nd
3rd

failed fault tolerant disks
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

keys

PKI
2nd
3rd
4th
5th

Recovery Console
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

Recovering a Lost Key procedure (18.6)

Recovering from Failed Jet Database Conversion procedure (4.2)

recovery

file encryption
2nd
3rd
4th
5th
6th

file systems
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

Windows File Protection
2nd
3rd
4th
5th
6th
7th
8th
9th

keys

PKI

Recovery Console
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

dynamic volumes

installing
2nd
3rd
4th
5th

limitations
2nd
3rd

loading

RIS (Remote Installation Services)
2nd

options
2nd
3rd
4th

recovery stages

Active Directory

recursive search type flags

DNS

Red Hat v7.1 Reference Guide Web site

redirection

folders

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

redirectors

default share points
2nd
3rd
4th

NetWare Redirector

network services
2nd
3rd
4th
5th
6th
7th
8th
9th

RDP Redirector

Registry keys

server file systems

TDI (Transport Driver Interface)

WebDAV Redirector

Windows Redirector

references

MITv5 Kerberos
2nd

referrals

clients

Dfs (Distributed File Sharing)
2nd

refresh intervals

record scavenging

registering

names

WINS

Windows .NET
2nd
3rd
4th
5th

Registering an IAS Server with Active Directory procedure (20.17)

Registering File Types for Backup Exclusions procedure (21.2)

Registration Authority (RA)

Registry

cells

keys

policies
2nd
3rd

redirectors

LDP entries

modems

entries

mount point information

policy tracking

printer entries

shared folders

size

improvements to

structure

Synchronization Manager

settings

Registry size limit (RSL)

Registry size limit (RSL).
[See administrative template files
2nd

relationships

trusts

relative distinguished names

namespaces

LDAP

Relative IDs (RIDs).
[See domains

Relocating the Default Spool Directory procedure (16.11)

RemInstall shares

remote access

Active Directory domains
2nd
3rd
4th
5th
6th
7th
8th

broadband

cell-switched networks

circuit-switched networks

dedicated networks

demand-dial routers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

IAS (Internet Authentication Services)

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

Internet gateways

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

managing
2nd
3rd
4th
5th
6th

modems

installing and configuring for
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd

network bridges

configuring
2nd
3rd
4th
5th
6th
7th

NT4 RAS servers
2nd
3rd
4th
5th
6th
7th
8th

NT4 RRAS servers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th

packet-switched networks

PPP (Point-to-Point Protocol)

authentication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th

servers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th

smart cards

certificate templates preaparation
2nd
3rd
4th

certificate testing
2nd

configuring for

deploying for
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th

enrollment agent certificates
2nd
3rd
4th
5th
6th
7th

form factors
2nd

PKI preparations
2nd
3rd

remote logon testing
2nd
3rd

RRAS configuration
2nd
3rd
4th
5th

selecting
2nd
3rd

user enrollment
2nd
3rd
4th
5th
6th
7th
8th
9th

VPNs

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th

WAN device support
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st

remote access permissions

controlling
2nd
3rd

Remote Administration mode (terminal services)

Remote Assistance

remote assistance

RDP

Remote Assistance

terminal services
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

Remote Authentication Dial-In User Services (RADIUS).
[See RADIUS (Remote Authentication Dial-In User Services)]

Remote Boot Floppy Generator (RBFG).
[See terminal services
2nd
3rd
4th

Remote Desktop

disabling

PocketPCs

Remote Desktop (RDP)
2nd
3rd
4th
5th
6th
7th
8th

Remote Desktop client (Mstsc.exe)
2nd
3rd
4th
5th
6th
7th
8th

Remote Desktop Protocol (RDP).
[See RDP (Remote Desktop Protocol)]2nd
[See RDP (Remote Desktop Protocol)]

Remote Desktop providers

Remote Installation Services (RIS).
[See RIS (Remote Installation Services)]2nd
[See RIS (Remote Installation Services)]

remote logon testing

smart cards
2nd
3rd

remote management

servers
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th

Remote Procedure Calls (RPCs).
[See creating
2nd
3rd
4th
5th

Remote Storage File Analysis utility

Remote Storage Services (RSS).
[See RSS (Remote Storage Services)]2nd
[See RSS (Remote Storage Services)]

removable drives

NTFS
2nd
3rd

removable media drives
2nd
3rd

installing
2nd
3rd
4th

removable storage

Removable Storage Management (RSM) service.
[See RSM (Removable Storage Management) service]

Removable Storage Management (RSM).
[See Removable Storage Manager (RSM)

Removing a Dfs Root procedure (16.9)

renaming

Default-First-Site-Name Object

domain controllers
2nd
3rd

domains
2nd

Renaming a Domain Controller Using NETDOM COMPUTERNAME procedure (9.6)

Renaming the Default-First-Site-Name Object procedure (7.4)

renewal intervals

WINS database

setting
2nd
3rd
4th
5th
6th

repairs

forcing

AUTOCHK

reparse points

file systems
2nd
3rd
4th
5th
6th
7th

identifying

MFT records
2nd
3rd
4th
5th
6th
7th

mount points

Replacing a Failed Disk in a Mirrored Volume procedure (14.15)

Replacing a Failed Disk in a RAID 5 Volume procedure (14.13)

replica ring formations

replica ring repairs
2nd

replication

account replication

BDCs

Active Directory

Application naming context

bridgehead server selection
2nd

bridgehead servers
2nd

collision handling
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

connections
2nd
3rd

deleted containers
2nd

deleted object handling
2nd
3rd

deleted objects

frequency
2nd
3rd
4th
5th
6th
7th

garbage collection
2nd
3rd
4th

identical distinguished names
2nd
3rd

inter-site replication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

inter-site topologies
2nd

ISTGs (Inter-Site Topology Generators)
2nd
3rd
4th
5th

KCC (Knowledge Consistency Checker)

linked values

loss of components
2nd
3rd
4th
5th

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

methods
2nd
3rd
4th

moved objects

naming contexts
2nd
3rd

NET TIME
2nd
3rd
4th

new features
2nd

parameter control
2nd
3rd
4th
5th
6th
7th
8th

property metadata
2nd
3rd

property replication
2nd

simultaneous modification
2nd

site objects
2nd
3rd
4th

sites
2nd
3rd

special operations
2nd
3rd
4th
5th
6th
7th
8th
9th

topology
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

transactions
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

troubleshooting
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

WIN32TM
2nd
3rd
4th

WTS (Windows Time Service)
2nd
3rd

bridging

connections

manually creating
2nd

forcing
2nd
3rd
4th

FRS (File Replication Service)

diagnostic logging

intervals

setting
2nd
3rd
4th
5th

loosely coupled replication mechanisms

manually controlling
2nd
3rd

members

groups

RPCs (Remote Procedure Calls)
2nd

scripts

security descriptors

SMTP (Simple Mail Transport Protocol)

Windows NT

WINS
2nd
3rd
4th
5th

configuring
2nd
3rd
4th

replication topologies

Dfs

changing
2nd
3rd

replication topology

FRS (File Replication Service)
2nd
3rd
4th

Replication Trace Showing USN Operation procedure (7.2)

Replication Trace Showing UTD Vector Operation procedure (7.3)

Request for Comments (RFCs).
[See certificates

Res1.log file (Active Directory)

Res2.log file (Active Directory)

reserved variables

OSCML

resets

passwords

handling for local accounts
2nd

reset disks
2nd
3rd
4th
5th
6th

resetting

UPNs

scripts

resolvers

DNS clients
2nd
3rd
4th
5th

resource domains

upgrading
2nd
3rd

Resource Kit

GPRESULT (Standard Utility) tool
2nd

GPRESULT tool

SHOWPRIVS tool

WHOAMI tool
2nd

resource records

DNS
2nd

resource sharing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd

administrative shares

CD-ROM drives

clients

printing configuration
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th
51st
52nd
53rd
54th

fax sharing

file sharing

administrative shares
2nd

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

Dfs (Distributed File Sharing)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th

remote share creation
2nd
3rd
4th
5th

share creation
2nd
3rd
4th
5th
6th
7th
8th

share permissions
2nd
3rd

XP desktops
2nd
3rd

FxsSrvCp$

IPC$ shares

Netlogin shares

network applications
2nd
3rd
4th

print services

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

Print$

printer sharing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

enhanced metafiles
2nd

initial job rendering
2nd
3rd

network printing
2nd
3rd
4th

port monitors
2nd
3rd
4th

print job delivery
2nd

printer drivers
2nd
3rd
4th
5th
6th
7th
8th
9th

spoolers
2nd
3rd
4th
5th
6th
7th
8th
9th

providers
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

installing
2nd
3rd
4th

MPRs (Multiple Provider Routers)
2nd
3rd

MUPs (Multiple UNC Providers)
2nd

order changing
2nd
3rd

print providers

redirectors
2nd
3rd
4th
5th
6th
7th
8th
9th

default share points
2nd
3rd
4th

server file systems

RemInstall shares

shared folders

connecting to
2nd
3rd
4th
5th
6th

Sysvol shares

resources

network services
2nd
3rd
4th
5th

PKI

responses

ICMP (Internet Control Message Protocol)

controlling

restore points

Ntbackup

restores

monitoring

restoring

Active Directory
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

authoritative restores
2nd
3rd
4th
5th
6th
7th
8th

backup tape time limits
2nd
3rd
4th
5th

permissions
2nd

System State files
2nd
3rd
4th

Sysvol
2nd

files
2nd
3rd
4th
5th
6th
7th

Last Known Good Configuration
2nd

Control Sets
2nd
3rd
4th
5th
6th

systems

Restoring a File Manually Using Ntbackup procedure (21.5)

Restoring Deleted Administrative Shares with Poledit procedure (16.5)

restrictions

database size restrictions

multiple domains
2nd

dynamic volumes
2nd
3rd
4th

NetBIOS name resolution
2nd
3rd

password policy restrictions

multiple domains
2nd

performance restrictions

multiple domains
2nd

political restrictions

multiple domains
2nd
3rd
4th

SMTP replication restrictions

multiple domains

Resultant Set of Policies (RSoP).
[See RSoP (Resultant Set of Policies)]

reverse lookup queries

DNS
2nd
3rd
4th
5th
6th
7th
8th

reverse lookup zones

DNS

creating
2nd
3rd
4th

reversible passwords
2nd

enabling
2nd
3rd
4th
5th

reverting

dynamic disks

revision levels

version numbers

GPOs

revocation checks

certificates

RFCs (Request for Comments)
2nd

Richter, Jeffrey

RID Master

FSMOs

RIDs

well-known RIDs
2nd
3rd

RIDs (Relative IDs)

Active Directory
2nd

Rijmen, Vincent

RIP

(Routing Information Protocol)

Riprep

requirements

RIS images

creating
2nd
3rd
4th
5th
6th
7th

scripts

RIS

(Remote Installation Services)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th

BINL (Boot Information Negotiation Layer)
2nd
3rd
4th
5th

CIW

screen customization
2nd
3rd
4th
5th

CIW (Client Installation Wizard)
2nd
3rd
4th
5th
6th
7th

configuring
2nd
3rd
4th
5th

verification

custom computer names

DHCP
2nd

functional overview
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th

group policies

controlling
2nd
3rd

headless server installations
2nd
3rd
4th
5th
6th

images

access control

creating
2nd
3rd
4th
5th
6th
7th

installing
2nd
3rd
4th

PXE (Pre-boot Execution Environment
2nd

PXE boot disks

creating
2nd

setup scripts
2nd
3rd

volume requirements
2nd

Rivest, Ron

Rivest, Ronald

role master

Active Directory
2nd

role masters

FSMOs

roles

domain controllers

setting
2nd
3rd

rollbacks

device drivers
2nd
3rd

root CAs

root certificate updates

CAs

root command (Nslookup)

root directories

Dfs

creating
2nd
3rd

root domain names

Active Directory domains
2nd
3rd
4th
5th
6th

root domains

upgrading
2nd
3rd

root hints

DNS
2nd
3rd
4th

configuring
2nd
3rd

updating
2nd

Root System Description Table (RSDT)

root zones

DNS

Windows 2000

RootDSE

LDAP
2nd

roots

Dfs
2nd
3rd

limitations

removing
2nd
3rd
4th

routers

demand-dial routers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

routing

Active Directory domains
2nd
3rd
4th
5th
6th
7th
8th

demand-dial routers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

Internet routing
2nd
3rd
4th
5th
6th

NT4 RAS servers
2nd
3rd
4th
5th
6th
7th
8th

NT4 RRAS servers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th

PPP (Point-to-Point Protocol)

authentication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th

routing protocols

WAN device support
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st

Routing and Remote Access Services (RRAS).
[See RRAS (Routing and Remote Access Services)]2nd
[See RRAS (Routing and Remote Access Services)]

Routing Information Protocol (RIP).
[See RIP (Routing Information Protocol)]

routing protocols

RPCs (Remote Procedure Calls)

RRAS

(Routing and Remote Access Services)
2nd

.
[See also NT4 RRAS servers]

configuring
2nd
3rd
4th
5th
6th
7th
8th

RADIUS authentication
2nd
3rd
4th
5th
6th

smart card acceptance
2nd
3rd
4th
5th

initializing
2nd
3rd

Internet gateways

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

managing

command line
2nd
3rd
4th
5th

NAT

configuring in
2nd

RSA Labs Web site

RSA public key technology

RSAenh CSP provider

RSDT (Root System Description Table)

RSL

(Registry size limit)

RSL (Registry size limit)

RSM

(Removable Storage Management) service

RSM (Removable Storage Management)

Ntbackup
2nd
3rd
4th
5th

RSM (Removable Storage Manager)

RSoP

(Resultant Set of Policies)

GPOs (Group Policy Objects)
2nd
3rd
4th
5th
6th
7th

GPRESULT

logging
2nd

RSoP Wizard

RSS

(Remote Storage Services)
2nd

rules

schema

Active Directory
2nd
3rd
4th

RunAs

Active Directory
2nd
3rd
4th
5th

RunAs command

profiles

switches
2nd
3rd

syntax
2nd

running

scripts

unattended setup

Running the RSoP Wizard in Logging Mode procedure (12.3)

Running the RSoP Wizard in Planning Mode procedure (12.2)

Russinovich, Mark
2nd

/ 245