Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 224
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

D-H (Diffie-Hellman) public key technology 2nd

DACLs

(discretionary access control lists)

(Discretionary Access Control Lists)

daily backups (Ntbackup) 2nd

data chunking

Data Decryption Field (DDF). [See DDF (Data Decryption Field)]

data encryption 2nd 3rd 4th

algorithms 2nd 3rd 4th

Data Encryption Standard (DES). [See DES (Data Encryption Standard)]2nd [See DES (Data Encryption Standard)]3rd [See DES (Data Encryption Standard)]

Data Link Control (DLC). [See DLC (Data Link Control)]

data link layer

(OSI)

addresses

determining 2nd

ports

determining 2nd

data partitions

Data Recovery Agent (DRA). [See DRA (Data Recovery Agent)]

Data Recovery Agents (DRAs). DRAs (Data Recovery Agents)

Data Recovery Field (DRF). [See DRF (Data Recovery Field)]

data storage

configuring 2nd 3rd 4th

dynamic disks

GPT disks

IA32 systems

disk operations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

LDM (Logical Disk Manager) colume configurations

LDM (Logical Disk Manager) volume configurations 2nd 3rd 4th 5th 6th 7th

MBR (Master Boot Record) disks

data stream encryption

RDP 2nd

database engines

database size restictions

multiple domains 2nd

databases

Active Directory

compacting 2nd 3rd

maintenance 2nd 3rd 4th 5th 6th 7th 8th

repairing 2nd 3rd 4th

forests

in-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

Kerberos

LSA

LSA databases

SAM databases

schemas 2nd

WINS

managing 2nd 3rd 4th 5th 6th 7th 8th 9th

Datacenter Server

IA64 support

memory

support

processors

support

dates

configuring

Setup 2nd 3rd

DCDIAG

Active Directory

DCFIRST.INF template (security)

Dcpromo utility

DCUP5.INF template (security)

DDF

(Data Decryption Field)

Debian documentation Web site

Debugging Mode

debugging tools

improvements to

dedicated networks

Default Domain Controller GPOs (Active Directory)

Default Domain GPOs (Active Directory)

Default Policy Domain GPC

attributes

default security templates

security policies 2nd 3rd

Default-First-Site-Name Object

renaming

definition objects

schema

Active Directory 2nd

DEFLTDC.INF template (security)

DEFLTSV.INF template (security)

DEFRAG

defragmentation

file systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

improvements to

NTFS 2nd 3rd 4th 5th 6th

Dekker, Edward 2nd

delays

console logons

delegating

group policies

management 2nd

Delegating Access Rights procedure (13.2)

delegation 2nd

access rights

Active Directory 2nd 3rd 4th 5th 6th

DNS

configuring 2nd 3rd 4th 5th

Delegation of Control Wizard

delegations

DNS

lame delegations

deleted containers

replication

Active Directory 2nd

deleted object handling

replication

Active Directory 2nd 3rd

deleted objects

replication

Active Directory

deleting

attributes

Global Catalog

FR private keys 2nd 3rd 4th

records

WINS

volumes 2nd

Deleting a Volume procedure (14.11)

Delta CRLs

PKI

Delta CRLs (Certificate Revocation Lists)

demand-dial interfaces

installing 2nd 3rd

demand-dial routers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

demoting

domain controllers 2nd 3rd

Deny permissions

assigning

evaluation of

deploying

domains 2nd 3rd 4th 5th 6th 7th

scripts 2nd 3rd

Windows .NET

automating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd

deployment

disk cloning 2nd 3rd 4th 5th 6th 7th 8th 9th

scripted installations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

unattended setup batch files

unattended setup scripts

creating 2nd 3rd 4th 5th 6th 7th 8th 9th

derivations

classes

Active Directory

DES

(Data Encryption Standard) 2nd 3rd

descriptor contents

Active Directory

security 2nd 3rd 4th

designating

bridgehead servers 2nd 3rd 4th

Designating a Bridgehead Server procedure (7.8)

Designating Additional Dfs Link Targets procedure (16.8)

designing

Active Directory

OU (Organizational Unit)

OUs (Organizational Unit) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

OUs (Organizational Units)

CA trust hierarchies 2nd 3rd 4th 5th

DNS domains 2nd 3rd 4th 5th 6th 7th

domains

Active Directory 2nd 3rd 4th 5th 6th 7th 8th

sites

srachitectures 2nd 3rd 4th 5th 6th 7th

desktop-oriented features

DESX algorithm

DESX encryption

detachable storage

Developing Windows NT Device Drivers (i)

Developing Windows NT Device Drivers\

A ProgrammerÕs Handbook (i)

Device Driver Rollback procedure (3.4)

Device Driver Update procedure (3.3)

device drivers

rollbacks 2nd 3rd

updates

Device Manager

plug-and-play 2nd 3rd 4th 5th 6th

devices

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

CPUs 2nd

EFI disk utilities 2nd 3rd 4th 5th 6th

multiple displays 2nd

Windows Update 2nd 3rd 4th

installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

CPUs 2nd

EFI disk utililities 2nd 3rd 4th 5th 6th

IDE hard drives 2nd

multiple displays 2nd

network adapters 2nd 3rd

removable media drives 2nd 3rd 4th

SCSI adapters 2nd 3rd

Windows Update 2nd 3rd 4th

redirecting 2nd

removing

troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

Dfs

(Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th

(Distributed File System)

console

deployment 2nd 3rd

links

creating 2nd 3rd

target assignments 2nd 3rd

managing

command line 2nd

MUP polling 2nd

namespaces

designing 2nd

PKT (Partition Knowledge Table)

referrals 2nd

replication topologies

changing 2nd 3rd

root directories

creating 2nd 3rd

roots 2nd 3rd

limitations

links 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

PKT (Partition Knowledge Table) 2nd 3rd 4th

removing 2nd 3rd 4th

structure 2nd 3rd 4th 5th

targets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

FRS (File Replication Service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

DHCP

configuring

DNS support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

installing 2nd

RIS

(Remote Installation Services) 2nd

scope options

configuring 2nd 3rd 4th 5th

servers

authorizing 2nd 3rd

DHCPINFORM

diagnostic logging

FRS (File Replication Service)

dial-in connections

checking

RAS logs 2nd 3rd 4th

dial-in IP settings

NT4 RRAS servers

configuring 2nd 3rd 4th

dial-in verifications

domains

dial-up authentication 2nd 3rd 4th

PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th

dial-up connections

name resolution

dial-up sessions

modems

monitoring 2nd 3rd 4th 5th

DIB (Directory Information Base)

differential backups (Ntbackup) 2nd

Diffie, Whitfield

digest authentication

domains

Digest security package

Digital Signature Algorithm (DSA). [See DSA (Digital Signature Algorithm)]

Digital Signature Security Standard (DSS). [See DSS (Digital Signature Standard)]

Digital Signature Trust Web site

digital signatures

DSA (Digital Signature Algorithm)

DSS (Digital Signature Security Standard)

hashing technology

Direct Mmeory Access (DMA). [See backing up 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

maintenance 2nd 3rd 4th 5th 6th 7th 8th

FAT 2nd 3rd

home directories

creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

terminal services 2nd

sharing

Directory Information Base (DIB). [See LDAP 2nd 3rd 4th

directory records

NTFS 2nd 3rd 4th 5th 6th 7th 8th

directory records (MFT)

Directory Replication Agent (DRA). [See Directory Replication Agents (DRAs)

Directory Service Agents (DSAs). [See Directory Service Restore Mode

Directory Service Restore Mode (Windows)

directory services

Active Directory

LDAP 2nd 3rd

namesapces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd

ANSI

components 2nd 3rd

history of 2nd 3rd 4th 5th 6th 7th

IEC (International Electrotechnical Commission) 2nd

IETF (Internet Engineering Task Force)

ISO

(International Organization for Standardization) 2nd 3rd 4th

ITU-T 2nd

LDAP

namespaces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

RFCs (Request for Comments) 2nd

X.500

components 2nd 3rd 4th 5th

LDAP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

LDAP;compared 2nd

dirty flags

NTFS 2nd

disabling

file encryption 2nd 3rd 4th 5th 6th 7th

Disabling DNS on an Interface procedure (5.19)

Disabling EFS Using Windows .NET Group Policies procedure (17.2)

Disabling NetBIOS-over-TCP/IP Name Resolution procedure (4.7)

Disabling Remote Desktop on .NET Server procedure (19.7)

Disabling Remote Desktop procedure (19.4)

discretionary access control lists (DACLs). [See DACLs (discretionary access control lists)]

Discretionary Access Control Lists (DACLs). [See DACLs (Discretionary Access Control Lists)]

disk access

standard disk access

using

disk caching

disabling

disk cloning

deployment 2nd 3rd 4th 5th 6th 7th 8th 9th

problems

Sysprep 2nd 3rd 4th 5th 6th 7th 8th

Disk Management console

disk opeartions

IA32 systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

disk partitions

extendible disk partitions

disk() entry

Boot.ini

Disk.sys drivers

Diskpart utility 2nd 3rd

Diskpart.efi utility 2nd 3rd

Diskpart.efi utility (3.2)

disks

dynamic disks 2nd 3rd

converting to 2nd

reverting

extended partitions

creating 2nd 3rd

formats

choosing 2nd 3rd

GPTs

(GUID Partition Tables) 2nd

improvements to 2nd

managing

command-line 2nd 3rd 4th 5th

paging files

moving to 2nd

partitions

creating 2nd

extending 2nd 3rd 4th 5th

primary partitions

creating 2nd

Display option (Nvrboot.efi)

display specifiers

Configuration naming context

Active Directory 2nd 3rd

displays

devices

installing 2nd

distinguished names

namespaces

LDAP 2nd

Distributed File System (Dfs). [See Dfs (Distributes File System)]

DLC

(Data Link Control)

DLLs

(Dynamic Link Libraries) 2nd

multiple-version DLL workaround

Side-by-Side aseemblies 2nd 3rd 4th

Side-by-Side assemblies

DMA 2nd 3rd 4th

DMA (Direct Memory Access)

Dmboot.sys drivers

Dmio.sys drivers

Dmload.sys drivers

DNS

(Domain Name System) 2nd

Active Directory

forwarders 2nd 3rd 4th 5th 6th 7th 8th

integrated zones

integration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th

zone integration 2nd 3rd 4th 5th

administrative access

limiting

application naming contexts

BIND boot files

starting

boot information

caching-only servers

configuring 2nd 3rd

clients

configuring 2nd 3rd 4th 5th

resolvers 2nd 3rd 4th 5th

conditional forwarding

delegation

configuring 2nd 3rd 4th 5th

delegations

lame delegations

deploying

checklist 2nd

non-Windows infrastructure 2nd 3rd

DHCP

configuring support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

domains 2nd 3rd 4th 5th 6th

designing 2nd 3rd 4th 5th 6th 7th

root domains

TLDs (top-level domains)

drivers

installing 2nd

Dynamic DNS

disabling on interfaces 2nd

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

scavenging configuration 2nd 3rd 4th 5th

security 2nd 3rd

zone configuration 2nd

dynamic updates 2nd 3rd

securing 2nd

extensions

forward lookup zones

creating 2nd 3rd 4th 5th

hierarchical zones

configuring 2nd 3rd 4th 5th 6th 7th 8th

host files 2nd

incremental zone transfers 2nd 3rd

integrated DNS zones

Active Directory 2nd 3rd

IPv6 host records

managing

command-line management 2nd

multiple servers

using

name servers 2nd 3rd

caching-only name server

primary name servers 2nd 3rd

secondary name servers 2nd 3rd

namespaces 2nd 3rd

private

negative query caching

notification-driven zone transfers

packets

queries

authoritative query responses 2nd

non-authoritative query responses 2nd 3rd

query handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

authoritative servers 2nd 3rd 4th 5th

non-authoritative servers 2nd 3rd 4th

reverse lookup queries 2nd 3rd 4th 5th 6th 7th 8th

record verifications

records

scavenging 2nd

resource records 2nd

reverse lookup zones

creating 2nd 3rd 4th

root hints 2nd 3rd 4th

configuring 2nd 3rd

secondaries 2nd

secondary servers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th

security 2nd 3rd 4th 5th 6th

servers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

forwarders 2nd 3rd

installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

secondary servers 2nd 3rd 4th 5th 6th

service locator records

stub zones 2nd 3rd 4th

trace names

unauthorized zone transfers

preventing

update notifications 2nd 3rd 4th

enabling 2nd 3rd

updates

secure

upgrading 2nd

WINS forwarding 2nd

zone transfers

enabling 2nd 3rd

zones

examining 2nd 3rd 4th 5th 6th 7th

DNS resolver cache tool (Tcpip.sys)

DNS servers

loss of

remedying 2nd 3rd 4th

DNS tool (Tcpip.sys)

documentation

certificates 2nd

PACs (Privilege Access Certificates)

Domain Controller

promotion utility

Domain Controllers

Active Controllers 2nd 3rd

domain controllers

Active Directory

GC-less logons 2nd 3rd

metadata cleanup 2nd 3rd 4th 5th 6th 7th

convergence time

demoting 2nd 3rd

installing 2nd 3rd

loss of

correcting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

null sessions

overload prevention

placement 2nd 3rd 4th

promoting

local SAM

promotion

backup tapes

pull updates

renaming 2nd 3rd

roles

setting 2nd 3rd

upgrades

application compatibility

leapfrog upgrades 2nd 3rd

requirements 2nd 3rd 4th 5th 6th 7th

Domain Local groups (Active Directory) 2nd 3rd 4th

Domain Master Browser

domain master browsers

Domain Migration Administrator

domain name master

Active Directory 2nd

Domain Name System (DNS)

Domain Name System (DNS). [See DNS (Domain Name System)]

Domain naming context

domain naming contexts

Active Directory 2nd 3rd

Domain Naming Master (FSMOs)

domain roots

DomainPassword permission (Active Directory)

domains

access permissions

Active Directory 2nd

designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

domain controller placement 2nd 3rd 4th

domain name master 2nd

FSMOs (Flexible Single Master Operations)

infrastructure master 2nd 3rd

multiple domain forest trusts 2nd

multiple domains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

multiple groups 2nd 3rd 4th 5th

navigation

PDC Emulators 2nd 3rd 4th 5th 6th 7th

replication

RIDs (Relative IDs) 2nd

role master 2nd

root domain names 2nd 3rd 4th 5th 6th

schema master 2nd

split public/private zones 2nd 3rd

third-party name servers 2nd

Windows-based zones 2nd 3rd

application verification

authentication 2nd 3rd 4th

child domains

upgrading 2nd 3rd

computer authentication

computers

joining

configuring

Setup 2nd 3rd 4th

cross-domain authentication 2nd 3rd 4th

deploying 2nd 3rd 4th 5th 6th 7th

designing

Active Directory 2nd 3rd 4th 5th 6th 7th 8th

dial-in verifications

digest authentication

DNS 2nd 3rd 4th 5th 6th

designing 2nd 3rd 4th 5th 6th 7th

root domains

secondaries 2nd

TLDs (top-level domains)

upgrading 2nd

efficiency

Forest Trusts

functional levels

shift root domain to Windows .NEt functional level

shift root domain to Windows .NET functional level

group policies

integrated DNS zones 2nd 3rd

interoperability

joining

automated setup

logon scripts

managability

master account domains

upgrading 2nd 3rd 4th 5th

migrating

account migrations 2nd 3rd

computer account migrations 2nd 3rd

group account migrations

group accounts 2nd 3rd 4th 5th

password migrations 2nd 3rd 4th 5th 6th

SID history 2nd 3rd 4th 5th

user accounts 2nd 3rd 4th 5th

migrating from 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

mixed domains

multidomain authentication 2nd 3rd

multiple domains

logon configuration 2nd 3rd

namespaces 2nd 3rd

objects

maximum number

operations

new

PDCs

upgrading 2nd 3rd 4th 5th

placeholder domains

installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

profile settings

promoting

troubleshooting 2nd 3rd

recoverability

reliability

renaming 2nd

resource domains

upgrading 2nd 3rd

root domains

upgrading 2nd 3rd

security

share point verification

stability

system policy verification

trust authentication

upgrading

account BDCs 2nd 3rd

allotted time for

browsing

child domains 2nd 3rd

Classic NT4 RAS access 2nd 3rd

classic scripts 2nd

DNS 2nd

domain controller requirements 2nd 3rd 4th 5th 6th 7th

forests 2nd

FSMO (Flexible Single Master Operations) servers

functional levels 2nd 3rd 4th 5th 6th

group policies 2nd

in-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th

master account domains 2nd 3rd 4th 5th

mixed domains 2nd

PDCs 2nd 3rd 4th 5th

policies 2nd

post-upgrade verifications 2nd 3rd

preparations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th

priveleges

root domains 2nd 3rd

SAM 2nd 3rd

storage

unsupported operations 2nd

user authentication

DOS

printing from 2nd 3rd

DOS-derived Windows hashing

passwords

DOS-derived Windows storage

passwords

downlevel clients

home directories

mapping 2nd

DRA

(Data Recovery Agent)

files

opening as 2nd 3rd

DRA (Directory Replication Agent)

DRAs

(Data Recovery Agents)

configuring 2nd 3rd 4th

EFS group policies

loading into 2nd

DRAs (Directory Replication Agents)

DRF

(Data Recovery Field)

drive controllers

drive letters

assigning

Setup 2nd 3rd 4th 5th 6th 7th

changing 2nd 3rd 4th

Driver Rollback

drivers

class drivers

device drivers

rollbacks 2nd 3rd

updates

DNS

installing 2nd

Driver Rollback

file system drivers 2nd 3rd 4th 5th

file systems

filter drivers

large

support

minidrivers

printer drivers

printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th

protection

SCSI drivers

alternative

service drivers

drives

. [See also hard drives]

configurations 2nd

drive letters

changing 2nd 3rd 4th

formats 2nd

redirecting 2nd 3rd

removable drives

removable media 2nd

removable media drives

installing 2nd 3rd 4th

sizes 2nd 3rd

types 2nd 3rd 4th 5th 6th 7th 8th 9th

Drwatson.exe 2nd 3rd

DSA

(Digital Signature Algorithm)

DSACLS

access lists

managing 2nd 3rd 4th

DSAs (Directory Service Agents)

DSS

(Digital Signature Security Standard)

(Digital Signature Standard) 2nd

Dssenh CSP provider

DSSTORE utility

DSUP.INF template (security)

DSUPT.INF template (security)

dual monitors

preparing

installation

dual-boots

installation

considerations 2nd 3rd

DUMPFSMOS command script

dumps

memory dumps 2nd

duplexed volumes

DVD-RAM drives 2nd

dynamic client icons

dynamic disks 2nd 3rd

booting 2nd 3rd

conversions 2nd 3rd 4th 5th 6th 7th 8th 9th

converting to 2nd

hardware RAID

moving between computers 2nd

reverting

setup 2nd 3rd 4th

volume extensions (spanning) 2nd

volumes

creating for 2nd 3rd

extending between 2nd

Dynamic DNS

advanced DNS servers

configuring 2nd 3rd

interfaces

disabling 2nd

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

scavenging

configuring 2nd 3rd 4th 5th

security

managing 2nd 3rd

WINS forwarding 2nd 3rd

zones

configuring 2nd

Dynamic Link Libraries (DLLs). [See DLLs (Dynamic Link Libraries)]2nd [See DLLs (Dynamic Link Libraries)]

dynamic updates

DNS 2nd 3rd

securing 2nd

dynamic volumes

creating

command-line

Recovery Console

restrictions 2nd 3rd 4th