Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 238
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

RA (Registration Authority)

RADIUS

(Remote Authentication Dial-In User Services) 2nd 3rd 4th 5th 6th 7th 8th

IAS

support 2nd 3rd 4th 5th 6th

RRAS

support 2nd 3rd 4th 5th 6th

RAID 5 volumes 2nd 3rd

failed disks

replcaing in 2nd 3rd 4th 5th

RAS servers

anonymous access 2nd

remote access 2nd 3rd 4th 5th 6th 7th 8th

RBFG (Remote Boot Floppy Generator)

RC algorithms

rdisk() entry

Boot.ini

RDP

(Remote Desktop Protocol) 2nd

clients

connections 2nd 3rd 4th

data stream encryption 2nd

improvements to

remote assistance

Remote Desktop

disabling

Remote Desktop client 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

servers

managing 2nd 3rd 4th 5th 6th

RDP Redirector

realm names (Kerberos reply messages)

realms

Kerberos

record verifications

DNS

records

DNS

resource records 2nd

scavenging 2nd

MFT

MFT records

reparse points 2nd 3rd 4th 5th 6th 7th

NTFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

$Data 2nd 3rd 4th

$File_Name 2nd 3rd

$Standard_Information 2nd 3rd

header information 2nd

short name generation 2nd 3rd 4th

WINS

deleting

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

recoverability

domains

recovering

certificates 2nd 3rd

failed fault tolerant disks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

keys

PKI 2nd 3rd 4th 5th

Recovery Console 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

Recovering a Lost Key procedure (18.6)

Recovering from Failed Jet Database Conversion procedure (4.2)

recovery

file encryption 2nd 3rd 4th 5th 6th

file systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

Windows File Protection 2nd 3rd 4th 5th 6th 7th 8th 9th

keys

PKI

Recovery Console 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

dynamic volumes

installing 2nd 3rd 4th 5th

limitations 2nd 3rd

loading

RIS (Remote Installation Services) 2nd

options 2nd 3rd 4th

recovery stages

Active Directory

recursive search type flags

DNS

Red Hat v7.1 Reference Guide Web site

redirection

folders

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

redirectors

default share points 2nd 3rd 4th

NetWare Redirector

network services 2nd 3rd 4th 5th 6th 7th 8th 9th

RDP Redirector

Registry keys

server file systems

TDI (Transport Driver Interface)

WebDAV Redirector

Windows Redirector

references

MITv5 Kerberos 2nd

referrals

clients

Dfs (Distributed File Sharing) 2nd

refresh intervals

record scavenging

registering

names

WINS

Windows .NET 2nd 3rd 4th 5th

Registering an IAS Server with Active Directory procedure (20.17)

Registering File Types for Backup Exclusions procedure (21.2)

Registration Authority (RA)

Registry

cells

keys

policies 2nd 3rd

redirectors

LDP entries

modems

entries

mount point information

policy tracking

printer entries

shared folders

size

improvements to

structure

Synchronization Manager

settings

Registry size limit (RSL)

Registry size limit (RSL). [See administrative template files 2nd

relationships

trusts

relative distinguished names

namespaces

LDAP

Relative IDs (RIDs). [See domains

Relocating the Default Spool Directory procedure (16.11)

RemInstall shares

remote access

Active Directory domains 2nd 3rd 4th 5th 6th 7th 8th

broadband

cell-switched networks

circuit-switched networks

dedicated networks

demand-dial routers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

IAS (Internet Authentication Services)

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

Internet gateways

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

managing 2nd 3rd 4th 5th 6th

modems

installing and configuring for 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

network bridges

configuring 2nd 3rd 4th 5th 6th 7th

NT4 RAS servers 2nd 3rd 4th 5th 6th 7th 8th

NT4 RRAS servers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

packet-switched networks

PPP (Point-to-Point Protocol)

authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th

servers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

smart cards

certificate templates preaparation 2nd 3rd 4th

certificate testing 2nd

configuring for

deploying for 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th

enrollment agent certificates 2nd 3rd 4th 5th 6th 7th

form factors 2nd

PKI preparations 2nd 3rd

remote logon testing 2nd 3rd

RRAS configuration 2nd 3rd 4th 5th

selecting 2nd 3rd

user enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th

VPNs

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

WAN device support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

remote access permissions

controlling 2nd 3rd

Remote Administration mode (terminal services)

Remote Assistance

remote assistance

RDP

Remote Assistance

terminal services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

Remote Authentication Dial-In User Services (RADIUS). [See RADIUS (Remote Authentication Dial-In User Services)]

Remote Boot Floppy Generator (RBFG). [See terminal services 2nd 3rd 4th

Remote Desktop

disabling

PocketPCs

Remote Desktop (RDP) 2nd 3rd 4th 5th 6th 7th 8th

Remote Desktop client (Mstsc.exe) 2nd 3rd 4th 5th 6th 7th 8th

Remote Desktop Protocol (RDP). [See RDP (Remote Desktop Protocol)]2nd [See RDP (Remote Desktop Protocol)]

Remote Desktop providers

Remote Installation Services (RIS). [See RIS (Remote Installation Services)]2nd [See RIS (Remote Installation Services)]

remote logon testing

smart cards 2nd 3rd

remote management

servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

Remote Procedure Calls (RPCs). [See creating 2nd 3rd 4th 5th

Remote Storage File Analysis utility

Remote Storage Services (RSS). [See RSS (Remote Storage Services)]2nd [See RSS (Remote Storage Services)]

removable drives

NTFS 2nd 3rd

removable media drives 2nd 3rd

installing 2nd 3rd 4th

removable storage

Removable Storage Management (RSM) service. [See RSM (Removable Storage Management) service]

Removable Storage Management (RSM). [See Removable Storage Manager (RSM)

Removing a Dfs Root procedure (16.9)

renaming

Default-First-Site-Name Object

domain controllers 2nd 3rd

domains 2nd

Renaming a Domain Controller Using NETDOM COMPUTERNAME procedure (9.6)

Renaming the Default-First-Site-Name Object procedure (7.4)

renewal intervals

WINS database

setting 2nd 3rd 4th 5th 6th

repairs

forcing

AUTOCHK

reparse points

file systems 2nd 3rd 4th 5th 6th 7th

identifying

MFT records 2nd 3rd 4th 5th 6th 7th

mount points

Replacing a Failed Disk in a Mirrored Volume procedure (14.15)

Replacing a Failed Disk in a RAID 5 Volume procedure (14.13)

replica ring formations

replica ring repairs 2nd

replication

account replication

BDCs

Active Directory

Application naming context

bridgehead server selection 2nd

bridgehead servers 2nd

collision handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

connections 2nd 3rd

deleted containers 2nd

deleted object handling 2nd 3rd

deleted objects

frequency 2nd 3rd 4th 5th 6th 7th

garbage collection 2nd 3rd 4th

identical distinguished names 2nd 3rd

inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

inter-site topologies 2nd

ISTGs (Inter-Site Topology Generators) 2nd 3rd 4th 5th

KCC (Knowledge Consistency Checker)

linked values

loss of components 2nd 3rd 4th 5th

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

methods 2nd 3rd 4th

moved objects

naming contexts 2nd 3rd

NET TIME 2nd 3rd 4th

new features 2nd

parameter control 2nd 3rd 4th 5th 6th 7th 8th

property metadata 2nd 3rd

property replication 2nd

simultaneous modification 2nd

site objects 2nd 3rd 4th

sites 2nd 3rd

special operations 2nd 3rd 4th 5th 6th 7th 8th 9th

topology 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

WIN32TM 2nd 3rd 4th

WTS (Windows Time Service) 2nd 3rd

bridging

connections

manually creating 2nd

forcing 2nd 3rd 4th

FRS (File Replication Service)

diagnostic logging

intervals

setting 2nd 3rd 4th 5th

loosely coupled replication mechanisms

manually controlling 2nd 3rd

members

groups

RPCs (Remote Procedure Calls) 2nd

scripts

security descriptors

SMTP (Simple Mail Transport Protocol)

Windows NT

WINS 2nd 3rd 4th 5th

configuring 2nd 3rd 4th

replication topologies

Dfs

changing 2nd 3rd

replication topology

FRS (File Replication Service) 2nd 3rd 4th

Replication Trace Showing USN Operation procedure (7.2)

Replication Trace Showing UTD Vector Operation procedure (7.3)

Request for Comments (RFCs). [See certificates

Res1.log file (Active Directory)

Res2.log file (Active Directory)

reserved variables

OSCML

resets

passwords

handling for local accounts 2nd

reset disks 2nd 3rd 4th 5th 6th

resetting

UPNs

scripts

resolvers

DNS clients 2nd 3rd 4th 5th

resource domains

upgrading 2nd 3rd

Resource Kit

GPRESULT (Standard Utility) tool 2nd

GPRESULT tool

SHOWPRIVS tool

WHOAMI tool 2nd

resource records

DNS 2nd

resource sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

administrative shares

CD-ROM drives

clients

printing configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th

fax sharing

file sharing

administrative shares 2nd

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

Dfs (Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th

remote share creation 2nd 3rd 4th 5th

share creation 2nd 3rd 4th 5th 6th 7th 8th

share permissions 2nd 3rd

XP desktops 2nd 3rd

FxsSrvCp$

IPC$ shares

Netlogin shares

network applications 2nd 3rd 4th

print services

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

Print$

printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

enhanced metafiles 2nd

initial job rendering 2nd 3rd

network printing 2nd 3rd 4th

port monitors 2nd 3rd 4th

print job delivery 2nd

printer drivers 2nd 3rd 4th 5th 6th 7th 8th 9th

spoolers 2nd 3rd 4th 5th 6th 7th 8th 9th

providers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

installing 2nd 3rd 4th

MPRs (Multiple Provider Routers) 2nd 3rd

MUPs (Multiple UNC Providers) 2nd

order changing 2nd 3rd

print providers

redirectors 2nd 3rd 4th 5th 6th 7th 8th 9th

default share points 2nd 3rd 4th

server file systems

RemInstall shares

shared folders

connecting to 2nd 3rd 4th 5th 6th

Sysvol shares

resources

network services 2nd 3rd 4th 5th

PKI

responses

ICMP (Internet Control Message Protocol)

controlling

restore points

Ntbackup

restores

monitoring

restoring

Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

authoritative restores 2nd 3rd 4th 5th 6th 7th 8th

backup tape time limits 2nd 3rd 4th 5th

permissions 2nd

System State files 2nd 3rd 4th

Sysvol 2nd

files 2nd 3rd 4th 5th 6th 7th

Last Known Good Configuration 2nd

Control Sets 2nd 3rd 4th 5th 6th

systems

Restoring a File Manually Using Ntbackup procedure (21.5)

Restoring Deleted Administrative Shares with Poledit procedure (16.5)

restrictions

database size restrictions

multiple domains 2nd

dynamic volumes 2nd 3rd 4th

NetBIOS name resolution 2nd 3rd

password policy restrictions

multiple domains 2nd

performance restrictions

multiple domains 2nd

political restrictions

multiple domains 2nd 3rd 4th

SMTP replication restrictions

multiple domains

Resultant Set of Policies (RSoP). [See RSoP (Resultant Set of Policies)]

reverse lookup queries

DNS 2nd 3rd 4th 5th 6th 7th 8th

reverse lookup zones

DNS

creating 2nd 3rd 4th

reversible passwords 2nd

enabling 2nd 3rd 4th 5th

reverting

dynamic disks

revision levels

version numbers

GPOs

revocation checks

certificates

RFCs (Request for Comments) 2nd

Richter, Jeffrey

RID Master

FSMOs

RIDs

well-known RIDs 2nd 3rd

RIDs (Relative IDs)

Active Directory 2nd

Rijmen, Vincent

RIP

(Routing Information Protocol)

Riprep

requirements

RIS images

creating 2nd 3rd 4th 5th 6th 7th

scripts

RIS

(Remote Installation Services) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th

BINL (Boot Information Negotiation Layer) 2nd 3rd 4th 5th

CIW

screen customization 2nd 3rd 4th 5th

CIW (Client Installation Wizard) 2nd 3rd 4th 5th 6th 7th

configuring 2nd 3rd 4th 5th

verification

custom computer names

DHCP 2nd

functional overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

group policies

controlling 2nd 3rd

headless server installations 2nd 3rd 4th 5th 6th

images

access control

creating 2nd 3rd 4th 5th 6th 7th

installing 2nd 3rd 4th

PXE (Pre-boot Execution Environment 2nd

PXE boot disks

creating 2nd

setup scripts 2nd 3rd

volume requirements 2nd

Rivest, Ron

Rivest, Ronald

role master

Active Directory 2nd

role masters

FSMOs

roles

domain controllers

setting 2nd 3rd

rollbacks

device drivers 2nd 3rd

root CAs

root certificate updates

CAs

root command (Nslookup)

root directories

Dfs

creating 2nd 3rd

root domain names

Active Directory domains 2nd 3rd 4th 5th 6th

root domains

upgrading 2nd 3rd

root hints

DNS 2nd 3rd 4th

configuring 2nd 3rd

updating 2nd

Root System Description Table (RSDT)

root zones

DNS

Windows 2000

RootDSE

LDAP 2nd

roots

Dfs 2nd 3rd

limitations

removing 2nd 3rd 4th

routers

demand-dial routers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

routing

Active Directory domains 2nd 3rd 4th 5th 6th 7th 8th

demand-dial routers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

Internet routing 2nd 3rd 4th 5th 6th

NT4 RAS servers 2nd 3rd 4th 5th 6th 7th 8th

NT4 RRAS servers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

PPP (Point-to-Point Protocol)

authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th

routing protocols

WAN device support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

Routing and Remote Access Services (RRAS). [See RRAS (Routing and Remote Access Services)]2nd [See RRAS (Routing and Remote Access Services)]

Routing Information Protocol (RIP). [See RIP (Routing Information Protocol)]

routing protocols

RPCs (Remote Procedure Calls)

RRAS

(Routing and Remote Access Services) 2nd

. [See also NT4 RRAS servers]

configuring 2nd 3rd 4th 5th 6th 7th 8th

RADIUS authentication 2nd 3rd 4th 5th 6th

smart card acceptance 2nd 3rd 4th 5th

initializing 2nd 3rd

Internet gateways

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

managing

command line 2nd 3rd 4th 5th

NAT

configuring in 2nd

RSA Labs Web site

RSA public key technology

RSAenh CSP provider

RSDT (Root System Description Table)

RSL

(Registry size limit)

RSL (Registry size limit)

RSM

(Removable Storage Management) service

RSM (Removable Storage Management)

Ntbackup 2nd 3rd 4th 5th

RSM (Removable Storage Manager)

RSoP

(Resultant Set of Policies)

GPOs (Group Policy Objects) 2nd 3rd 4th 5th 6th 7th

GPRESULT

logging 2nd

RSoP Wizard

RSS

(Remote Storage Services) 2nd

rules

schema

Active Directory 2nd 3rd 4th

RunAs

Active Directory 2nd 3rd 4th 5th

RunAs command

profiles

switches 2nd 3rd

syntax 2nd

running

scripts

unattended setup

Running the RSoP Wizard in Logging Mode procedure (12.3)

Running the RSoP Wizard in Planning Mode procedure (12.2)

Russinovich, Mark 2nd