[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] daily maintenance tasks backups , verifying 2nd 3rd event logs, reading 2nd system resources, checking availability of 2nd 3rd DAP (Directory Access Protocol) DAS (Direct Attached Storage) defined 2nd databases DHCP (Dynamic Host Configuration Protocol) databases backing up and restoring 2nd SAM database recovering 2nd date field (log files DCHP Administrators group dcpromo command DDNS (Dynamic DNS) 2nd 3rd 4th 5th deactivating schemas 2nd 3rd decommissioning domains 2nd Windows 2000 2nd 3rd dedicated backup VLANs 2nd default domain policy Default User profiles 2nd defragmentation 2nd Ntds.dit file 2nd 3rd delegating remote administration 2nd rights Group Policy 2nd delegating administration best practices 2nd custom tasks 2nd 3rd Delegation of Control Wizard 2nd 3rd 4th 5th OUs (Organizational Units) 2nd simple tasks 2nd delegating maintenance tasks to IT staff delegation Constrained Delegation Delegation of Control Wizard best practices 2nd delegating custom tasks 2nd 3rd delegating simple tasks 2nd deleted files recovering 2nd deleting GPOs (Group Policy Objects) 2nd SID history users scripts 2nd delta CRLs (certificate revocation lists) demoting domain controllers 2nd 3rd Deny permissions 2nd deploying storage solutions WSS (Windows SharePoint Services) large organization deployment 2nd preparing for deployment 2nd 3rd small organization deployment 2nd deploying Windows Server 2003 2nd activation process 2nd automated installs 2nd 3rd 4th 5th from CD-ROM 2nd with MS-DOS startup disk Configure Your Server Wizard 2nd 3rd custom install CDs 2nd third-party tools 2nd WinPE (Windows Preinstallation Environment) 2nd installation plans 2nd 3rd 4th 5th licensing modes 2nd Manage Your Server utility 2nd optimization memory settings 2nd performance settings 2nd 3rd 4th security settings 2nd partitions 2nd product keys 2nd Recovery Console 2nd Registry auditing backing up maintenance 2nd Registry Editor remote access security 2nd size of RIS (Remote Installation Service) 2nd 3rd 4th advantages benefits of 2nd best practices 2nd RIPrep images 2nd 3rd server images 2nd system requirements 2nd 3rd Setup Manager 2nd 3rd Sysprep 2nd 3rd 4th 5th 6th 7th 8th advantages 2nd Audit mode Clean mode Factory mode Reseal mode system requirements testing installation 2nd unattend.txt files 2nd 3rd 4th 5th 6th 7th deployment Group Policy administrator rights 2nd cross-domain policy assignments default domain policy inheritance less is more naming conventions 2nd RSoP (Resultant Set of Policies) slow link detection design WINS (Windows Internet Naming Service) environments 2nd designing security best practices 2nd security systems physical security 2nd simplicity storage solutions connectivity 2nd disk drives 2nd multiple spindles VPNs (Virtual Private Networks) 2nd desktop icons desktop management 2nd administrator workstations 2nd 3rd 4th 5th Con2prt.exe tool 2nd desktop images 2nd 3rd desktop software installing 2nd desktop standardization Floplock.exe tool 2nd folder redirection 2nd 3rd benefits of 2nd guidelines 2nd mobile computers 2nd 3rd multiuser desktops 2nd Netdom.exe tool 2nd public/kiosk workstations 2nd 3rd remote administration 2nd security EFS (Encrypting File System) 2nd Group Policy settings IPSec 2nd 3rd SUS (Software Update Service) 2nd Shadow Copy of Shared Folders 2nd client setup recovering corrupted files recovering deleted files 2nd recovering folders 2nd recovering overwritten files USMT (User State Migration Tool) 2nd desktop software installing 2nd desktops Windows NT to Windows Server 2003 migration 2nd desktop migration accounts 2nd domain administrators group local desktop permissions 2nd Net Add User command permission configuration 2nd requirements detecting slow links 2nd detecting slow links developing storage solutions 2nd DFS (Distributed File System) 2nd 3rd 4th Closest Site Selection 2nd configuring 2nd DFS MMC snap-in multiple roots per server 2nd NAS (Network Attached Storage) 2nd replication 2nd SANs (Storage Area Networks) 2nd security 2nd DHCP scopes maintenance DHCP (Dynamic Host Configuration Protocol) 2nd 3rd administrative delegation APIPA (Automatic Private IP Addressing) 2nd authorization 2nd client service 2nd database backup and restore automation 2nd DDNS (Dynamic DNS) 2nd design issues domain controller security 2nd fault tolerance 2nd 100/100 failover approach 2nd 3rd 50/50 failover approach 2nd 3rd 80/20 failover approach 2nd server clusters standby scopes installing 2nd 3rd maintenance 2nd 3rd migrating from Windows 2000 2nd 3rd Netsh tool 2nd relay agents 2nd scopes creating 2nd 3rd multicast scopes standby scopes superscopes Windows XP clients 2nd DHCPEXIM Export to File dialog box DHCPExim.exe 2nd 3rd dial-up connections CMAK (Connection Manager Administration Kit) 2nd animated dialer logon screen appending applications auto-applications connect actions connection status desktop/tray icons encrypted connections help file language support license agreement multiple service types, support for passwords phone book 2nd realm name prefix/suffix service profiles support phone number Group Policy 2nd IAS (Internet Authentication Service) 2nd installing IPSec 2nd 3rd Terminal Services line consolidation 2nd RADIUS (Remote Authentication Dial-in User Service) 2nd 3rd 4th softmodems 2nd dialog boxes Add/Remove Snap-in Authentication Methods CN Attributes Connection Settings DHCPEXIM Export to File dnsRoot Attribute Enable Certificate Template Grant Access On Run As Run As Other User dialog box Select Create Object This Operation Has Completed Successfully Digest authentication digital certificates X.509 digital signatures 2nd man-in-the-middle attacks Direct Attached Storage. [See See DAS] directories consolidating eDirectory synchronizing with NDS (Novell Directory Service) 2nd 3rd LDAP directories integrating with Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th metadirectories 2nd NDS (Novell Directory Service) synchronizing with eDirectory 2nd 3rd permissions Terminal Services Session Directory 2nd configuring 2nd redundancy 2nd synchronizing 2nd 3rd 4th 5th 6th temp directory, clearing virtual directories 2nd authentication methods 2nd creating with IIS Manager 2nd creating with Windows Explorer 2nd firewalls 2nd HTTP authentication requests 2nd permissions 2nd 3rd 4th 5th server security 2nd trusted networks 2nd Directory Access Protocol (DAP) directory service administrators 2nd directory services 2nd directory services. [See See Active Directory] Disable Port Range filtering mode disabling GPOs (Group Policy Objects) Group Policy configuration settings 2nd LM (LanMan) hashes 2nd Simple File Sharing 2nd disconnect timeouts configuring Disk Management MMC snap-in 2nd disk mirroring 2nd disk quotas enforcing NAS (Network Attached Storage) SANs (Storage Area Networks) disk striping with parity 2nd disk subsystems planning for 2nd disk-to-tape backups 2nd Diskpart.exe 2nd displaydns (/displaydns) option (ipconfig command) distibution groups migrating from Windows 2000 2nd 3rd distributed administration 2nd Distributed File System (DFS) 2nd Distributed File System. [See See DFS] distribution groups converting to security groups 2nd DNS (Domain Name Service) 2nd BIND (Berkeley Internet Name Domain) DNS name resolution 2nd SRV (Service) resource records DNS (Domain Name Services) SRV (Service) resource records DNS (Domain Name System) 2nd 3rd 4th caching-only servers configuring 2nd 3rd DDNS (Dynamic DNS) 2nd 3rd 4th 5th dynamic updates forwarders 2nd 3rd framework for Hints file 2nd impact on Active Directory 2nd importance of 2nd installing 2nd 3rd 4th 5th 6th migrating from Windows 2000 2nd monitoring 2nd 3rd 4th 5th namespaces 2nd non-Microsoft DNS implementations 2nd queries iterative queries 2nd recursive queries resource records 2nd A (host) 2nd AAAA CNAME (Canonical Name) 2nd ISDN KEY MB (mailbox) NS (Name Server) 2nd PTR (Pointer) RP (Responsible Person) SOA (Start of Authority) 2nd SRV (Service) 2nd 3rd 4th 5th WKS (Well Known Service) scavenging 2nd secure updates 2nd site authentication, controlling 2nd site resolution 2nd troubleshooting client-side cache DNSCMD tool 2nd Event Viewer 2nd HOSTS resolution problems IPCONFIG tool 2nd NSLOOKUP tool 2nd Performance Monitor TRACERT tool 2nd TTL (Time to Live) 2nd 3rd Unicode character support 2nd verifying 2nd Windows Server 2003 enhancements 2nd 3rd WINS (Windows Internet Naming Service) 2nd 3rd 4th zone transfers defined enabling 2nd full zone transfers IXFR (incremental zone transfers) 2nd zones 2nd AD-integrated zones 2nd defined forward lookup zones primary zones 2nd replication reverse lookup zones secondary zones 2nd 3rd 4th stub zones 2nd 3rd 4th DNSAdmins group DNSCMD command DNSCMD tool 2nd dnsRoot Attribute dialog box doamins default domain policy document versioning 2nd 3rd 4th Document Workspaces 2nd documentation test processes and results 2nd documents checking in/out 2nd versioning 2nd 3rd domain administrative functionality 2nd 3rd domain administrators group Domain Admins Group 2nd 3rd domain controllers 2nd 3rd 4th Audit Policy setting 2nd authentication traffic 2nd compared to WAN connections 2nd creating from backups 2nd demoting to members servers 2nd 3rd Domain Controller Security Policy performance optimization placement of 2nd promoting member servers to 2nd 3rd replicas 2nd 3rd replication traffic 2nd selecting 2nd synchronization domain functional levels domain administrative functionality 2nd 3rd Windows 2000 mixed domain functional level domain in-place upgrades domain local groups 2nd Domain Name Service. [See See DNS] domain name system. [See See DNS] Domain Naming Master role domain servers decommissioning Windows 2000 domains consolidating 2nd 3rd cross-domain policy assignments decommissioning 2nd Windows 2000 2nd DNS (Domain Name Service) 2nd BIND (Berkeley Internet Name Domain) DNS name resolution 2nd SRV (Service) resource records DNS (Domain Name Services) SRV (Service) resource records domain coexistance 2nd network services consolidation 2nd SID History 2nd 3rd third-party tools 2nd domain controllers 2nd 3rd 4th Audit Policy setting 2nd authentication traffic 2nd compared to WAN connections 2nd creating from backups 2nd demoting to members servers 2nd 3rd performance optimization placement of 2nd promoting member servers to 2nd 3rd replicas 2nd 3rd replication traffic 2nd selecting 2nd functional levels raising moving objects between 2nd 3rd multiple domains advantages/disadvantages 2nd multiple child domains 2nd multiple discontinuous domains 2nd placeholder root domains 2nd renaming 2nd 3rd cleanup tasks 2nd current forest description domain controller preparation limitations 2nd prerequisites 2nd XML file modification 2nd single domain in-place upgrade 2nd 3rd Windows 2000 domains, upgrading 2nd 3rd downloading GPMC (Group Policy Management Console) downtime, minimizing Windows NT migrations redundant Global Catalogs 2nd servery redundancy 2nd drives floppy drives locking 2nd duel-client approach (Novell networks) 2nd durability of smartcards 2nd dynamic disk RAID configuration 2nd Dynamic Host Configuration Protocol. [See See DHCP]2nd [See See DHCP] DYNAMIC UPDATE RECEIVED/Sec counter dynamic updates |