Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 221
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Abstract class

LDAP

access

RIS images

controlling

security logs

controlling

access control entries (ACEs). [See ACEs (access control entries)]

Access Control Entry (ACE). [See ACE (Access Control Entry)]

access control inheritance 2nd 3rd 4th 5th 6th

access control lists (ACLs). [See ACLs (access control lists)]

access lists

managing

Active Directory 2nd 3rd 4th

access masks

access permissions

Active Directory

domains

evaluation 2nd 3rd 4th 5th 6th 7th

GPCs

assigning

GPTs

assigning

access rights

Active Directory 2nd

delegation 2nd 3rd 4th 5th 6th

access tokens 2nd 3rd 4th

contents

viewing

accessing

member servers

authentication 2nd 3rd 4th 5th 6th

Accessing Advanced Server Parameters procedure (5.22)

Accessing the Remote Installation Group Policy procedure (2.10)

Accessing the WMI Filter Interface procedure (12.5)

ACCM (Asynchronous-Control-Character-Map)

account BDCs

upgrading 2nd 3rd

account lockout policies 2nd

account migrations

domains 2nd 3rd

ACE

(Access Control Entry)

ACEs

(access control entries)

canonical sorting

exceptions

evaluation 2nd 3rd

inheritance 2nd 3rd

modifying

viewing

ACL Editor 2nd 3rd

objects

ownership management 2nd

ACLs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

(access control lists)

access permissions

evaluation 2nd 3rd 4th 5th 6th 7th

ACEs

(access control entries)

evaluation 2nd 3rd

inheritance 2nd 3rd

modifying

viewing

DACLs

(discretionary access control lists)

objects

ownership management 2nd

permissions

inheritance 2nd 3rd 4th

SACLs

(system access control lists)

ACPI

(Advanced Configuration and Power Interface)

plug-and-play 2nd 3rd 4th 5th 6th 7th 8th

power management 2nd 3rd

ACPI compatibility checks

Setup

initial hardware recognition 2nd

activation

automating

Windows Product Activation 2nd 3rd 4th 5th

Active Directory

anonymous access 2nd

backing up 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

necessity of 2nd

restoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

System State backups 2nd 3rd 4th

classes

derivations

clients 2nd

content rules

database

compacting 2nd 3rd

repairing 2nd 3rd 4th

DNS

dynamic updates 2nd 3rd

forwarders 2nd 3rd 4th 5th 6th 7th 8th

integrated zones

integration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th

record scavenging 2nd

security 2nd 3rd 4th 5th 6th

zone integration 2nd 3rd 4th 5th

DNS servers

loss of 2nd 3rd 4th

domain controllers

GC-less logons 2nd 3rd

loss of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

metadata cleanup 2nd 3rd 4th 5th 6th 7th

domains

designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th

domain controller placement 2nd 3rd 4th

domain naming master 2nd

FSMOs (Flexible Single Master Operations)

infrastructure master 2nd 3rd

multiple domain forest trusts 2nd

multiple domains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

multiple groups 2nd 3rd 4th 5th

navigation

PDC Emulators 2nd 3rd 4th 5th 6th 7th

remote access 2nd 3rd 4th 5th 6th 7th 8th

replication

RIDs (Relative IDs) 2nd

role master 2nd

root domain names 2nd 3rd 4th 5th 6th

schema master 2nd

split public/private zones 2nd 3rd

third-party name servers 2nd

Windows-based zones 2nd 3rd

drag-and-drop operations

ESE (Extensible Storage Engine)

forests

in-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

FSMOs

loss of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

GPOs (Group Policy Objects)

defaults

groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

authorization 2nd 3rd

Builtin groups 2nd 3rd 4th

classifications 2nd

Domain Local groups 2nd 3rd 4th 5th 6th 7th

Global groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

Machine Local groups 2nd 3rd

nesting 2nd

Universal groups 2nd 3rd 4th 5th 6th 7th 8th

GUID (Globally Unique Identifier)

IAS (Internet Authentication Service)

registering with 2nd 3rd

integrated DNS zones 2nd 3rd

integrated zones

IP subnets

creating

LDAP 2nd 3rd

maintenance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

namespaces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th

client compatibility 2nd

compatibility settings

domains 2nd

forests 2nd

Global Catalogs 2nd 3rd 4th 5th

naming contexts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

service location 2nd 3rd 4th 5th 6th

trees 2nd 3rd 4th

trust relationships 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

null sessions 2nd 3rd

object

maximum number of

objects

attributes

classes

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

protecting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

OID (Object Identifier) 2nd

OU

(Organizational Unit)

designing

OUs

designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

lower-level OUs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

passwords

storage

PW2CA (Pre-Windows 2000 Compatible List)

recovery stages

replication

Application naming context

bridgehead server selection 2nd

bridgehead servers 2nd

collision handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

connections 2nd 3rd

deleted containers 2nd

deleted object handling 2nd 3rd

deleted objects

forcing 2nd 3rd 4th

frequency 2nd 3rd 4th 5th 6th 7th

garbage collection 2nd 3rd 4th

identical distinguished names 2nd 3rd

inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

inter-site topologies 2nd

intervals 2nd 3rd 4th 5th

ISTGs (Inter-Site Topology Generators) 2nd 3rd 4th 5th

KCC (Knowledge Consistency Checker)

linked values

loss of components 2nd 3rd 4th 5th

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

manually controlling 2nd 3rd

methods 2nd 3rd 4th

moved objects

naming contexts 2nd 3rd

NET TIME 2nd 3rd 4th

new features 2nd

parameter control 2nd 3rd 4th 5th 6th 7th 8th

property metadata 2nd 3rd

property replication 2nd

RPCs (Remote Procedure Calls) 2nd

simultaneous modification 2nd

site objects 2nd 3rd 4th

sites 2nd 3rd

special operations 2nd 3rd 4th 5th 6th 7th 8th 9th

topology 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

WIN32TM 2nd 3rd 4th

WTS (Windows Time Service) 2nd 3rd

restoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

authoritative restores 2nd 3rd 4th 5th 6th 7th 8th

backup tape time limits 2nd 3rd 4th 5th

permissions 2nd

System State files 2nd 3rd 4th

Sysvol 2nd

schema

class derivations 2nd

defination objects 2nd

functional operations 2nd 3rd 4th

object classes 2nd

object identification 2nd 3rd 4th

rules 2nd 3rd 4th

security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

access control inheritance 2nd 3rd 4th 5th 6th

access list management 2nd 3rd 4th

access permissions

access rights 2nd

access rights delegation 2nd 3rd 4th 5th 6th

descriptor contents 2nd 3rd 4th

event notification 2nd 3rd

groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

improvements to 2nd

LSA (Local Security Authority)

managing 2nd 3rd 4th

object protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

primaries

security descriptors

security principals 2nd

service accounts 2nd

SLS (Secondary Logon Service) 2nd 3rd 4th 5th

SRM (Security Reference Monitor)

sercurity

RunAs 2nd 3rd 4th 5th

SMTP (Simple Mail Transport Protocol)

structure rules

support files 2nd 3rd

moving 2nd

syntax rules

tape backups

trust relationships

utilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th

ADSI Edit tool 2nd 3rd 4th 5th 6th 7th 8th

DCDIAG

LDAP browser 2nd 3rd 4th 5th

management consoles 2nd 3rd

Schema console 2nd 3rd 4th 5th 6th 7th

WAN links

loss of

Active Directory Migration Tool (ADMT). [See ADMT (Active Directory Migration Tool)]2nd [See ADMT (Active Directory Migration Tool)]

Active Directory Services Interface (ADSI). [See Active Directory User Objects

AD Users and Computers

home directories

assigning 2nd 3rd

adapters

network adapters

configuring 2nd 3rd

installing 2nd 3rd

adding

attributes

Global Catalog

hardware 2nd

Adding a Static WINS Mapping procedure (4.5)

Adding File Types to the File Exclusion List procedure (21.1)

address mapping

NAT (Network Address Translation) 2nd 3rd

Address Windowing Extensions (AWE). [See AWE (Address Windowing Extensions)]

addresses

determining

Network layers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

MAC addresses

components

viewing

Adleman, Len

ADM listings

administrative template files 2nd 3rd 4th

ADM template files 2nd 3rd 4th 5th 6th

administrative access

DNS

limiting

administrative shares

CD-ROM drives

re-creating

recreating

administrative template policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

ADM listings 2nd 3rd 4th

ADM template files 2nd 3rd 4th 5th 6th

creating 2nd

policies 2nd

preferences 2nd

Registry.pol files 2nd

administrator passwords

managing

Setup 2nd

adminstrative template policies

preferences 2nd

ADMT

(Active Directory Migration Tool) 2nd

improvements to

ADSI (Active Directory Services Interface)

ADSI Edit tool

Active Directory 2nd 3rd 4th 5th 6th 7th 8th

ADSM backup package

Advanced Configuration and Power Interface (ACPI). [See ACPI (Advanced Configuration and Power Interface)]

Advanced Encryption Standard (AES). [See 2nd [See Advanced property (printers) 2nd 3rd

Advanced Research Project Administration (ARPA). [See ARPA (Advanced Research Project Administration)]

Advanced RISC Computing (ARC) path. [See ARC (Advanced RISC Computing) path]

AES

(Advanced Encryption Standard)

AES (Advanced Encryption Standard)

agent-based network backups

AIA

(Authority Information Access) 2nd 3rd

AIA (Authority Information Access) containers (Enterprise CAs)

AIPIPA (Automatic Private IP Addressing)

AKIs

(Authority Key Identifiers)

algorithms

data encryption 2nd 3rd 4th

DSA (Digital Signature Algorithm)

encryption

RC algorithms

hashing algorithms

passwords

KCC (Knowledge Consistency Checker)

allocation units. [See Allow permissions

assigning

cumulative Allow permissions

alternative Startfrom files (RIS)

analysis snap-in

security policies 2nd 3rd 4th

Analyze option (Secedit utility)

anonymous access

Active Directory 2nd

NT4 RAS servers 2nd

anonymous logons

passwords 2nd 3rd 4th

ANSI

directory services

answer section (DNS packets)

application compatibility

domain controllers

upgrades

Windows NT4

backups

application compatibility checks

upgrades 2nd 3rd

Application layer

SMBs (Server Message Blocks) 2nd 3rd

Application layer (OSI) 2nd

Application mode (terminal services)

Application naming conctext

replication

Active Directory

Application naming context

Active Directory 2nd 3rd 4th 5th 6th

application naming contexts 2nd

application servers

CALs

application verification

applications

Drwatson.exe 2nd 3rd

Applying Inheritable Rights to an Active Directory Container procedure (13.1)

ARC

(Advanced RISC Computing) path

Boot.ini 2nd 3rd

ARC paths

Boot.ini

special paths 2nd 3rd

architecture

security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

Windows .NET 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th

architectures

sites

designing 2nd 3rd 4th 5th 6th 7th

archived certificates

recovering 2nd 3rd

archiving

certificates

CAs 2nd 3rd 4th 5th 6th 7th

keys

PKI 2nd

ArcServe backup package

ARPA

(Advanced Research Project Administration)

ASQ (Attribute Scoped Query)

ASR

(Automated System Recovery)

ASR (Automated System Recovery)

Ntbackup 2nd 3rd 4th 5th 6th

assemblies

assigned packages

software deployment

assigning

drive letters

Setup 2nd 3rd 4th 5th 6th 7th

permission inheritance 2nd

permissions

Assigning a Home Directory Using the Command Line procedure (19.3)

Assigning a User Home Directory with AD Users and Computers procedure (19.2)

Assigning Custom UPN Suffixes procedure (8.1)

asymmetric cipher keys

asynchronous processing

CSEs (Client-Side Extensions) 2nd

Asynchronous-Control-Character-Map (ACCM). [See Atapi.sys drivers

atomic transactions

Active Directory

Attribute Scoped Query (ASQ). [See Boot.ini

Default Policy Domain GPC

Global Catalog

adding

deleting

NTFS 2nd 3rd

objects

Active Directory

X.500 2nd 3rd 4th

audio

redirecting 2nd

audit logs 2nd

Audit Monitor for Logon/Logoff procedure (11.13)

Audit Monitoring for Printers procedure (11.14)

auditing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

audit logs 2nd

enabling 2nd 3rd

event logs

managing 2nd 3rd 4th 5th

images

Sysprep

kernel object auditing

recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th

AUDITPOL utility

event logs

managing 2nd 3rd 4th 5th

authenticated users

limitations

domain/computer joining

authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

classic NT authentication

limitations 2nd

domains

computer authentication

trust authentication

IAS (Internet Authentication Services)

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

Kerberos 2nd 3rd 4th 5th 6th

authenticator 2nd

cross-domain authentication 2nd 3rd 4th

member server access 2nd 3rd 4th 5th 6th

MITv5 Kerberos interoperability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

Mixed domains

mutual authentication 2nd

PACs (Privilege Access Certificates) 2nd 3rd 4th 5th 6th

policies 2nd

preauthenticator 2nd

short-cut trusts 2nd

situations

tickets 2nd 3rd 4th 5th

transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

vocabulary 2nd 3rd 4th 5th 6th

methods

support 2nd

pass-through authentications

PPP

CHAP (Challenge Handshake Authentication Protocol) 2nd 3rd 4th

dial-up authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

domain authentication 2nd 3rd 4th

EAP (Extensible Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th

Mixed domains 2nd 3rd 4th

MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 2nd 3rd 4th

multidomain authentication 2nd 3rd

NT4 limitations 2nd 3rd 4th

PAP (Password Authentication Protocol) 2nd 3rd 4th 5th 6th 7th

RADIUS (Remote Authentication Dial-In User Services) 2nd 3rd 4th 5th 6th 7th 8th

SPAP (Shiva Password Authentication Protocol) 2nd

standard transactions 2nd 3rd 4th 5th

PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th

authentication functions

Kerberos

authentication packages

LSA 2nd

authenticator

Kerberos 2nd

authoritative query responses

DNS 2nd

authoritative restores

Active Directory 2nd 3rd 4th 5th 6th 7th 8th

authoritative servers

DNS

query handling 2nd 3rd 4th 5th

Authority Information Access (AIA). [See AIA (Authoity Information Access)]2nd [See AIA (Authoity Information Access)]3rd [See AIA (Authoity Information Access)]

Authority Information Access entity (certificates)

Authority Key Identifier (AKIs). [See AKIs (Authority Key Identifiers)]

Authority Key Identifier entity (certificates)

authorization

groups

Active Directory 2nd 3rd

authorization data

Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th

authorization data field (encrypted tickets)

authorizations

DHCP servers 2nd 3rd

auto-enrollment

certificates 2nd 3rd

PKI

AUTOCHK

CHKDSK

compared 2nd

configuring

CHKNTFS 2nd

file systems

fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

repairs

forcing to

Automated System Recovery (ASR). [See Automatic Private IP Addressing (APIPA)

automating

activation

deployment

Windows .NET 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th

product key entry

Auxiliary class

LDAP

AWE

(Address Windowing Extensions) 2nd 3rd