Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 223
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

CA

(Certification Authority)

CA hierarchy checks

CA Version entity (certificates)

cache-coherent Non-Uniform Memory Allocation (ccNUMA). [See passwords

caches

L2 caches 2nd

caching

client-side caching

caching-only name server

DNS

caching-only servers

DNS

configuring 2nd 3rd

CAL

(Client Access License)

CALs

application servers

canonical sorting

ACEs

exceptions

CAPTURE command (NetWare)

CAs

(Certification Authorities) 2nd 3rd 4th 5th

AIA (Authority Information Access) 2nd 3rd

certificate storage

certificates

archiving 2nd 3rd 4th 5th 6th 7th

enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

CRLs

(Certificate Revocation Lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

obtaining via Windows Update 2nd 3rd

publication 2nd 3rd 4th

Enterprise CAs 2nd

certificate templates 2nd 3rd 4th 5th

hierarchies 2nd 3rd 4th

installing 2nd 3rd 4th

root CAs

root certificate updates

Standard Server

support

trust hierarchies

designing 2nd 3rd 4th 5th

trusts 2nd 3rd 4th 5th

cataloging

tapes 2nd

Cataloging a Tape procedure (21.6)

CCITT

(Comit Consultatif International Tlphonique et Tlgraphique)

ccNUMA (cache-coherent Non-Uniform Memory Allocation)

CD-ROM drives

administrative shares

troubleshooting

CD-ROM file system

CD-RW drives 2nd

Cdfs.sys drivers

CDP (CRL Distribution Points) container (Enterprise CAs)

CDPs entity (certificates)

cell-switched networks

cells

Registry

Certificate Management Messages over CMS (CMC). [See 2nd [See Certificate Request Wizard

Certificate Revocation Lists (CRLs). [See CRLs (Certificate Revocation Lists)]

Certificate Template entity (certificates)

certificate templates container (Enterprise CAs)

certificates

archiving 2nd 3rd 4th 5th 6th 7th

CAs

(Certification Authorities) 2nd 3rd 4th 5th

CRLs (Certificate Revocation Lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

Enterprise CAs 2nd

hierarchies 2nd 3rd 4th

installing 2nd 3rd 4th

storage

trust hierarchies 2nd 3rd 4th 5th

trusts 2nd 3rd 4th 5th

certificate snap-in

documentation 2nd

elements

enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

auto-enrollment 2nd 3rd

Certificates snap-in 2nd 3rd

CMC (Certificate Management Messages over CMS) 2nd

Web enrollment 2nd 3rd 4th

enrollment agent certificates

issuing;remote access 2nd 3rd 4th 5th 6th 7th

Enterprise CAs

certificate templates 2nd 3rd 4th 5th

Kerberos

PACs (Privilege Access Certificates) 2nd 3rd 4th 5th 6th

local certificate stores 2nd 3rd

managing 2nd 3rd 4th 5th 6th 7th

CIPHER command

OCSP (Online Certificate Status Protocol) 2nd

PKI 2nd 3rd 4th 5th 6th

templates

PKI (Public Key Infrastructure)

recovering 2nd 3rd

requests

smart cards

testing 2nd

SPCs (Software Publishing Certificates)

templates

preparing for remote access 2nd 3rd 4th

validity checks 2nd 3rd 4th 5th 6th 7th

Web Server

support

certificates snap-in

Certificates snap-in

certificates 2nd 3rd

Certification Authority (CA). [See CA (Certification Authority)]

certified hardware 2nd

Certmgr utility

CERTUTIL utitlity

Challenge Handshake Authentication Protocol (CHAP). [See CHAP (Challenge Handshake Authentication Protocol)]

Change Journal

file systems 2nd 3rd 4th 5th

USN (Update Sequence Number)

ChangePDC permission (Active Directory)

Changing a Role Master Using an MMC Console procedure (10.3)

Changing Active Directory File Locations procedure (10.13)

Changing Default RDP Port in the TSWeb Interface procedure (19.5)

Changing Drive Letters procedure (14.12)

Changing Log File Settings procedure (11.10)

Changing the Network Provider Order procedure (16.2)

CHAP

(Challenge Handshake Authentication Protocol) 2nd 3rd 4th 5th

CHAP Authentication Transaction procedure (20.1)

Character Phase Setup

installation 2nd 3rd 4th 5th

Charting Performance Monitor Logs procedure (3.8)

checking

Event logs 2nd 3rd 4th

checklist

installation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

child domains

upgrading 2nd 3rd

child trusts

Active Directory

chipsets 2nd

CHKDSK

AUTOCHK

compared 2nd

file systems

fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

switches 2nd

CHKNTFS

AUTOCHK

configuring 2nd

CIFS (Common Internet File System)

CIPHER command

certificates

managing

file encryption

folder encryption

cipher keys (PKI) 2nd

circuit-switched networks

CISVC

(Content Indexing Service)

CIW

(Client Installation Wizard) 2nd 3rd 4th 5th 6th 7th

screens

customizing 2nd 3rd 4th 5th

Clark, Jason D.

class derivations

schema

Active Directory 2nd

class drivers

Class2.sys drivers

classes

derivations

Active Directory

LDAP

information model 2nd

inheritance 2nd 3rd 4th

object instances 2nd

objects

Active Directory

X.500 2nd 3rd 4th

classic interface

reverting to

Classic NT Link Search Pattern procedure (15.1)

Classic NT storage

passwords

Classic NT4 RAS access

domains

upgrading 2nd 3rd

classic scripts

domains

upgrading 2nd

classifications

groups

Active Directory 2nd

Classpnp.sys drivers

Client Access License (CAL). [See CAL (Client Access License)]

Client Installation Wizard (CIW). [See CIW (Client Installation Wizard)]

client name resolution

WINS 2nd 3rd

client printer connections

automating 2nd 3rd

Client Services for Netware

client-side caching

client-side extensions (CSEs). [See CSEs (client-side extensions)]

Client/Server Runtime Subsystem (CSRSS). [See clientÕs name and realm field (encrypted tickets)

clients

compatibility

Active Directory 2nd

DNS

configuring 2nd 3rd 4th 5th

resolvers 2nd 3rd 4th 5th

downlevel cliens

home directory mapping 2nd

fax servers

connecting to 2nd

installing

Kerberos

Kerberos authentication

situations

print clients

troubleshooting 2nd

printing

configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th

referrals

WINS

configuring 2nd 3rd

clipboard mapping 2nd

Clonegg script

Cloneggu script

Clonelg script

Clonepr scripts

cloning

disks

deployment 2nd 3rd 4th 5th 6th 7th 8th 9th

problems

Sysprep 2nd 3rd 4th 5th 6th 7th 8th

cluster addressing

NTFS 2nd

cluster mapping

NTFS 2nd

cluster maps

FAT 2nd 3rd 4th 5th

cluster size

clusters

Enterprise Server

support

file systems 2nd 3rd 4th 5th 6th 7th

cluster size

CMC (Certificate Management Messages over CMS) 2nd

Cogswell, Bryce

collision handling

replication

Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

collisions

hashes

Comit Consultatif International Tlphonique et Tlgraphique (CCITT). [See CCITT (Comite Consultatif International Telephonique et Telegraphique)]

command line

Dfs

managing 2nd

home directories

creating 2nd 3rd 4th 5th 6th

RRAS

managing 2nd 3rd 4th 5th

shares

creating 2nd

terminal services

managing 2nd 3rd 4th 5th 6th

command lines

forced updates

CSEs (Client-Side Extensions)

command-line

disks

managing 2nd 3rd 4th 5th

file encryption

administration improvements

printing

administration 2nd 3rd 4th 5th

command-line management

DNS 2nd

command-line tools

PKI 2nd 3rd 4th 5th

security descriptors

managing 2nd 3rd 4th 5th 6th 7th

commands

DUMPFSMOS

RunAs

profiles

switches 2nd 3rd

syntax 2nd

Common Internet File System (CIFS). [See LDAP 2nd 3rd

Common.adm legacy template

compacting

Active Directory database 2nd 3rd

compatibility settings

Active Directory

components

groups

policies 2nd 3rd

LSA 2nd 3rd 4th 5th 6th 7th 8th 9th

compression

file compression 2nd 3rd 4th 5th

files

NTFS 2nd 3rd 4th 5th 6th

computer account migrations

domains 2nd 3rd

computer authentication

domains

Computer Migration Wizard

computer passwords 2nd

troubleshooting 2nd

computer policies

GPOs 2nd 3rd

computer startup

Kerberos authentication 2nd 3rd 4th 5th 6th 7th

computers

domains

joining to

conditional forwarding

DNS 2nd 3rd

name servers

configuration

AUTOCHK

CHKNTFS 2nd

client-side caching 2nd 3rd 4th 5th 6th 7th 8th

clients

printing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th

data storage 2nd 3rd 4th

demand-dial routers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

devices 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

CPUs 2nd

EFI disk utililities 2nd 3rd 4th 5th 6th

multiple displays 2nd

Windows Update 2nd 3rd 4th

DHCP

DNS support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

DNS

caching-only servers 2nd 3rd

delegation 2nd 3rd 4th 5th

hierarchical zones 2nd 3rd 4th 5th 6th 7th 8th

root hints 2nd 3rd

secondary servers 2nd 3rd 4th 5th 6th 7th 8th 9th

DNS clients 2nd 3rd 4th 5th

DNS servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

DRAs 2nd 3rd 4th

drives 2nd

Fax service 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

file sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

administrative shares 2nd

remote share creation 2nd 3rd 4th 5th

share creation 2nd 3rd 4th 5th 6th 7th 8th

share permissions 2nd 3rd

XP desktops 2nd 3rd

final configuration 2nd 3rd 4th

IA64 storage 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

IAS (Internet Authentication Services) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

ICF 2nd 3rd 4th

inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

Internet gateways

NAT 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

Lmhosts 2nd

memory dumps 2nd 3rd 4th

modems

for remote access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

multiple domains

logons 2nd 3rd

NAT 2nd 3rd 4th

in RRAS 2nd

network adapters 2nd 3rd

network bridges 2nd 3rd 4th 5th 6th 7th

paging files

post Setup configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

remote access servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

RIS server

verification

RIS servers 2nd 3rd 4th 5th

RRAS 2nd 3rd 4th 5th 6th 7th 8th

smart card acceptance 2nd 3rd 4th 5th

security policies 2nd 3rd

Setup

configuration phase 2nd 3rd 4th

graphical phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

IA64 differences 2nd 3rd 4th 5th 6th

text phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

smart cards

remote access

storage 2nd

troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

VPNs

connections 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

WINS

clients 2nd 3rd

replication 2nd 3rd 4th

WMI filters 2nd 3rd 4th

Configuration naming context

Active Directory

display specifiers 2nd 3rd

extended rights 2nd

Lost and Found

partitions

physical locations

services

sites

configuration phase

Setup 2nd 3rd 4th 5th

initial user logon

Configure option (Secedit utility)

Configure Your Server Wizard 2nd

Configuring a CA to Archive Certificates procedure (18.4)

Configuring a Caching-Only Server procedure (5.16)

Configuring a Cross-Realm Trust procedure (11.8)

Configuring a Demand-Dial Router procedure (20.12)

Configuring a DNS Server to Use a Forwarder procedure (5.17)

Configuring a Dynamic Zone procedure (5.18)

Configuring a GPO Security Descriptor to Filter Policy Recipients procedure (12.4)

Configuring a Remote Installation Services Image procedure (2.7)

Configuring a Remote Installation Services Server procedure (2.8)

Configuring a Secondary Server procedure (5.13)

Configuring a Spanned Volume procedure (14.6)

Configuring a WINS Client procedure (4.4)

Configuring an RRAS Server as an IAS Client procedure (20.18)

Configuring and Scheduling a Backup Job procedure (21.4)

Configuring Automatic Connection Pickup procedure (20.13)

Configuring Delegations procedure (5.11)

Configuring DNS Information for TCP/IP Interface Properties procedure (5.5)

Configuring DNS Information in the System Properties Window procedure (5.6)

Configuring NAT and ICF procedure (20.14)

Configuring Performance Monitor to Collect kernel Memory Statistics procedure (3.7)

Configuring Replmon procedure (7.13)

Configuring Root Hints procedure (5.10)

Configuring RRAS to Use RADIUS Authentication procedure (20.19)

Configuring Scavenging procedure (5.20)

Configuring Scope Options procedure (5.26)

Configuring the Password Migration Agent procedure (9.4)

Configuring the System to Dump Only the Contents of the Kernel Memory procedure (1.3)

Configuring WINS Replication procedure (4.6)

connections

browsers

troubleshooting 2nd 3rd

client printer connections

automating 2nd 3rd

dial-in connections

checking 2nd 3rd 4th

ICF (Internet Connection Firewall) 2nd

ICS (Internet Connection Sharing) 2nd 3rd 4th 5th

modems

testing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

replication

Active Directory 2nd 3rd

manually creating 2nd

shared folders 2nd 3rd 4th 5th 6th

browsers 2nd 3rd 4th 5th 6th 7th 8th

searching

console (WINS)

configuring 2nd

console logons

delaying

console sessions

inviting users to

consolidated permissions

viewing 2nd

contacts

exchanging

via fax

Content Indexing Service (CISVC). [See CISVC (Context Indexing Service)]

content rules

Active Directory 2nd

contiguous files

Continuing with the Graphic Mode Portion of Setup procedure (1.2)

Control Sets

Last Known Good Configuration 2nd 3rd 4th 5th 6th

Controlled Migration Suite

controller() entry

Boot.ini

convergence time

domain controllers

conversion

NTFS 2nd 3rd 4th 5th 6th 7th 8th

conversions

disks

dynamic disks 2nd

dynamic disks 2nd 3rd 4th 5th 6th 7th 8th 9th

Converting a Basic Disk to a Dynamic Disk procedure (14.4)

copy backups (Ntbackup)

Copy option (Nvrboot.efi)

copy warnings

file encryption

copying

files

troubleshooting

Correcting Lost Drive Signatures procedure (1.4)

cover pages

faxes

managing 2nd 3rd 4th

CPUs

installing 2nd

crackers

passwords

Creating a Custom Schema Management Console procedure (6.1)

Creating a Dfs Root procedure (16.6)

Creating a Fault Tolerant Boot Floppy Disk procedure (3.5)

Creating a Forward Lookup Zone procedure (5.8)

Creating a Key Recovery Agent procedure (18.3)

Creating a Mount Point Using the Disk Management Console procedure (15.5)

Creating a New Site Object procedures (7.5)

Creating a Password Reset Disk procedure (11.3)

Creating a Reverse Lookup Zone procedure (5.9)

Creating a Subnet Object procedure (7.6)

Creating an Archive Template procedure (18.5)

Creating and Configuring Site Link Objects procedure (7.7)

Creating and Sharing a Folder procedure (16.3)

Creating Dfs Links procedure (16.7)

Creating Extended Partitions and Logical Drives procedure (14.2)

Creating Mirrored Volumes procedure (14.8)

Creating Primary Partitions on Basic Disks procedure (14.1)

Creating RAID 5 Volumes procedure (14.10)

Creating Remote Shares Using the Computer Management Console procedure (16.4)

Creating Simple Volumes procedure (14.5)

Creating Striped Volumes procedure (14.7)

credentials caches

passwords 2nd 3rd 4th

CRLs

(Certificate Revocation Lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

Delta CRLs

obtaining via Windows Update 2nd 3rd

publication 2nd 3rd 4th

cross-domain authentication 2nd 3rd 4th

cross-domain GPO links

GPCs 2nd 3rd

cross-realm architecture

MITv5 Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

cross-realm trusts

MITv5 Kerberos

creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

cross-trust hierachies

CAs

Cross-Trust Lists (CTLs)

cryptographic elements (PKI) 2nd 3rd 4th 5th 6th 7th

Cryptographic Service Provider (CSP). [See CSP (Cryptographic Service Provider)]

cryptographic services

PKI 2nd 3rd 4th 5th 6th

CSEs

(client-side extensions)

asynchronous processing 2nd

background refreshes 2nd 3rd 4th

forced updates 2nd

command line

group policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

list of

script processing 2nd

synchronous processing 2nd 3rd 4th

CSP

(Cryptographic Service Provider)

CSRSS (Client/Server Runtime Subsystem)

CSVDE tool (LDAP) 2nd

CTLs

(Cross-Trust Lists)

cumulative Allow permissions

custom computer names

RIS

cutoff speeds

slow link processing

group policies