|
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] UDDI (Universal Description, Discovery, and Integration) UDF files (uniqueness database files) unattended installations dynamic update process, privatizing system image, deploying UDF files using RIS activating RIS server Custom Setup option customization using OEM option deploying image to client slipstreaming service packs using scripts constructing setup scripts unattended setup answer files [See unattended setup scripts] unattended setup scripts constructing renaming unicast mode, NLB hosts uniqueness database files [See UDF files] Universal Description, Discovery, and Integration [See UDDI] universal groups nesting supported by Unix log processing on, UTF-8 character set up-to-date vectors 2nd breaking replication loops USNs after replication viewing with RepAdmin update sequence numbers [See USNs] updates, security scanning clients for information about updating printer driver revisions upgrading operating system default shares reasons for secondary nameservers to primary Windows 2000 Server Windows NT storage issues upgrading NT domain Windows Server 2003 interoperability issues UPN (user principal name) USENET news service user accounts [See also account lockout rule] [See also account lockout rule] information about replication topologies and security auditing updating user classes user principal name (UPN) User scope .NET Framework configuration usernames alphanumeric characters in changing replication topologies and displayed on logon screen, disabling in domains, lists of UPN and users accounts [See user accounts] administrative control over OUs, delegating to applications security 2nd certificate integrity, protecting creating configuring properties from command-line naming restrictions with LDAP deploying a GP to disk quotas, exceeding EAP authentication schemes EFS transparent operations/visible presentation files/folders ownership of filesystem-based quotas FTP site connections, viewing granting access to VPNs managing mobile [See mobile computers] network shares, modification by two users nonanonymous, IIS authentication NTFS file/folder permissions, determining print services controling access to printer location identification and quotas on creating scripts to manage recovery agent accounts for recovering encrypted objects restricting share creation shadow copies benefits of warning about shared folders Share a File wizard, setting permissions with terminated employee accounts, transferring file/folder ownership USNs (update sequence numbers) highest, viewing with RepAdmin in Active Directory in domain controllers independence from domain controllers originating breaking replication loops version numbers and, viewing originatingafter replication version numbers and USNs (update sequence numbers) in domain controllers utilities for command-line Terminal Services management |
|