[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] P (/P) parameter (bootcfg command) Paging File-% Usage-% counter PAP (Password Authentication Protocol) parity, disk striping with 2nd partitions formatting 2nd Windows NT to Windows Server migrations mirrored volumes striped sets striped sets with parity volume sets partitions (application) 2nd creating 2nd replicas 2nd replication management 2nd Passport Integration Password Authentication Protocol (PAP) Password Export Server Password Export servers encryption keys 2nd permissions 2nd security requirements 2nd passwords administrator passwords enforcing with Group Policy CMAK (Connection Manager Administration Kit) FTP (File Transfer Protocol) synchronizing 2nd LDAP 2nd NIS (Network Information System) 2nd 3rd 4th Unix 2nd 3rd 4th Windows NT to Windows Server 2003 migration 2nd encryption keys 2nd Password Export servers permissions 2nd security requirements 2nd testing patches Web servers 2nd 3rd 4th PATROL PC emulation configuring 2nd 3rd PDC Emulator role Per Device mode Per Server mode PerfMan performance monitoring 2nd performance alerts 2nd performance alerts 2nd Performance Console 2nd % Privileged Time % Processor Time AXFR Request Received counter 2nd AXFR Request Sent counter AXFR Request Sentcounter AXFR Response Received counter 2nd AXFR Success Received counter 2nd AXFR Success Sent counter 2nd Cache % Hit Cache Page Fault Stalls/sec Cache Page Faults/sec Cache Size Current Disk Queue Length DYNAMIC UPDATE RECEIVED/Sec counter File Operations Pending Logical Disk-% Disk Time Memory-Available Bytes Memory-Page Faults/sec counter Memory-Pages/sec counter NBT Connection[ colon ] Bytes Total/sec Paging File-% Usage-% Physical Disk-% Disk Time RECURSIVE QUERIES/Sec counter 2nd RECURSIVE QUERY FAILURE/Sec counter Redirector[colon] Bytes Total/sec SECURE UPDATE RECEIVED/Sec counter Server[colon] Bytes Total/sec TCP QUERY RECEIVED/Sec counter TCP RESPONSE SENT/Sec counter TOTAL QUERY RECEIVED/Sec counter TOTAL RESPONSE SENT/Sec counter UDP QUERY RECEIVED/Sec counter UDP RESPONSE SENT/Sec counter VM Largest Block Size VM Total 16MB Free Blocks VM Total Free Blocks VM Total Large Free Block Bytes Performance Monitor Performance Monitor Provider performance optimization Active Directory 2nd 3rd baselines benchmarks 2nd 3rd 4th policy baselines 2nd 3rd workload characterization 2nd capacity analysis 2nd counters % Privileged Time % Processor Time AXFR Request Received 2nd AXFR Request Sent 2nd AXFR Response Received 2nd AXFR Success Received 2nd AXFR Success Sent 2nd Cache % Hit Cache Page Fault Stalls/sec Cache Page Faults/sec Cache Size Current Disk Queue Length DYNAMIC UPDATE RECEIVED/Sec File Operations Pending Logical Disk-% Disk Time Memory-Available Bytes Memory-Page Faults/sec Memory-Pages/sec NBT Connection[colon] Bytes Total/sec Paging File-% Usage-% Physical Disk-% Disk Time RECURSIVE QUERIES/Sec 2nd RECURSIVE QUERY FAILURE/Sec Redirector[colon] Bytes Total/sec SECURE UPDATE RECEIVED/Sec Server[colon] Bytes Total/sec TCP QUERY RECEIVED/Sec TCP RESPONSE SENT/Sec TOTAL QUERY RECEIVED/Sec TOTAL RESPONSE SENT/Sec UDP QUERY RECEIVED/Sec UDP RESPONSE SENT/Sec VM Largest Block Size VM Total 16MB Free Blocks VM Total Free Blocks VM Total Large Free Block Bytes disk subsystem file systems monitoring 2nd RAID 2nd 3rd 4th 5th 6th 7th 8th DNS (Domain Name System) 2nd 3rd 4th domain controllers local printing 2nd memory subsystems 2nd network subsystem monitoring 2nd 3rd processors 2nd replication 2nd Terminal Services 2nd 3rd 4th profile redirection 2nd 3rd tools 2nd Network Monitor 2nd 3rd Performance Console 2nd 3rd Task Manager 2nd 3rd third-party tools 2nd virtual memory 2nd 3rd Performance tab (Task Manager) permanent event consumers 2nd permissions Active Directory shared folders 2nd administrators 2nd Allow/Deny permissions 2nd assigning with Group Policy 2nd 3rd 4th 5th 6th compared to rights FTP (File Transfer Protocol) logging highly managed users 2nd mobile users 2nd 3rd NTFS (NT File System) permissions 2nd setting 2nd 3rd 4th 5th password migration 2nd Registry permissions 2nd 3rd 4th removing 2nd SUS (Software Update Service) Terminal Services virtual directories virtual directories mapped to local directories 2nd virtual directories mapped to Windows shares 2nd windows NT to Windows Server 2003 migration desktop permission configuration 2nd local desktop permissions 2nd phone book (CMAK) 2nd phone lines, consolidating 2nd Physical Disk-% Disk Time counter physical security 2nd 3rd 4th piloting storage solutions ping command placeholder root domains 2nd planning disk subsystems 2nd migration from Windows 2000 to Windows Server 2003 2nd ACT (Application Compatibility Tool Kit) 2nd 3rd Active Directory backups 2nd ADMT (Active Directory Migration Tool) 2nd 3rd 4th 5th 6th ADSI Editor 2nd clean installations 2nd 3rd 4th client support 2nd 3rd 4th 5th decommissioning domain servers decommissioning domains 2nd DHCP (Dynamic Host Configuration Protocol) 2nd 3rd DNS (Domain Name System) 2nd domain in-place upgrades domain upgrades 2nd 3rd functional levels 2nd 3rd 4th 5th GPOs (Group Policy Objects) 2nd Interim Level network downtime 2nd network services 2nd preparation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th recovery from failed upgrades 2nd 3rd security and distribution groups 2nd 3rd server role prioritization 2nd testing upgrade paths user accounts 2nd 3rd Windows Server 2003 Functional Level migration from Windows NT to Windows Server 2003 2nd ADSI Edit 2nd 3rd Application Compatibility Tool Kit 2nd 3rd client support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th decommissioning domains 2nd desktop migration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th disk partitions 2nd 3rd domain coexistance 2nd 3rd 4th 5th 6th 7th 8th 9th domain consolidation domain controller synchronization downtime, minimizing 2nd 3rd 4th 5th failed account migrations 2nd failed hardware 2nd file systems 2nd flexible Active Directory forests 2nd hardware inventory 2nd hardware requirements hardware upgrades name resolution 2nd 3rd 4th 5th 6th 7th password migration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th permissions 2nd processor compatibility SAM database recovery 2nd server role prioritization 2nd service packs 2nd System Compatibility Check tool 2nd testing third-party software support 2nd upgrade paths 2nd Windows Update services 2nd 3rd WINS (Windows Internet Naming Services) 2nd 3rd 4th 5th 6th 7th 8th 9th storage solutions 2nd Windows Server 2003 installation 2nd 3rd 4th 5th WSS (Windows SharePoint Services) deployment 2nd 3rd planning mode (RSoP) Pocket PCs smartcards 2nd POE (power over Ethernet) Point to Point Tunneling Protocol (PPTP) Point-to-Point Tunneling Protocol. [See See PPTP] Pointer (PTR) records policies Domain Controller Security Policy Group Policies delegating rights with 2nd enforcing administrator passwords with enforcing group memberships with 2nd linking to containers Group Policy assigning permissions with 2nd 3rd assigning rights with 2nd 3rd Group Policy Modeling 2nd managing groups with 2nd policies. [See See Group Policy] PORT (/PORT) parameter (bootcfg command) port-level alerts port-level monitoring 2nd ports administrative port security moving port-level alerts port-level monitoring 2nd Terminal Services port number 2nd power connections wireless networks 2nd power over Ethernet (POE) power supply redundant power systems PPTP (Point to Point Tunneling Protocol) PPTP (Point-to-Point Tunneling Protocol) client requirements 2nd in series with firewalls 2nd parallel to firewalls 2nd remote access policies 2nd security 2nd Pre-Boot eXecution Environment (PXE) preferences compared to policies 2nd Preferred Networks tab (Wireless Network (IEEE 802.11) Policies) 2nd primary zones 2nd Print Services Unix systems 2nd 3rd 4th 5th 6th 7th printers Con2prt.exe tool consolidating printing IPP (Internet Printing Protocol) 2nd installing 2nd security 2nd local printing 2nd Print Services Unix systems 2nd 3rd 4th 5th 6th 7th prioritizing server roles 2nd 3rd 4th privileges administrators 2nd assigning with Group Policy 2nd 3rd compared to permissions granting 2nd 3rd highly managed users 2nd mobile users 2nd 3rd Processes tab (Task Manager) processors choosing compatibility performance optimization 2nd Terminal Services product keys 2nd profiles 2nd All Users profiles 2nd Default User profiles 2nd editing folder redirection 2nd 3rd local profiles 2nd mandatory profiles roaming profiles 2nd 3rd temporary profiles promoting member servers to domain controllers 2nd 3rd properties WINS (Windows Internet Naming Services) 2nd 3rd Protocol Transition protocols CHAP (Challenge Handshake Authentication Protocol) DAP (Directory Access Protocol) DHCP (Dynamic Host Configuration Protocol) 2nd 3rd administrative delegation APIPA (Automatic Private IP Addressing) 2nd authorization 2nd client service 2nd database backup and restore automation 2nd DDNS (Dynamic DNS) 2nd design issues domain controller security 2nd fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th installing 2nd 3rd maintenance 2nd 3rd migrating from Windows 2000 2nd 3rd Netsh tool 2nd relay agents 2nd scopes 2nd 3rd 4th 5th 6th Windows XP clients 2nd DNS (Domain Name System) 2nd 3rd 4th caching-only servers configuring 2nd 3rd DDNS (Dynamic DNS) 2nd 3rd 4th 5th dynamic updates forwarders 2nd 3rd framework for Hints file 2nd impact on Active Directory 2nd importance of 2nd installing 2nd 3rd 4th 5th 6th monitoring 2nd 3rd 4th 5th namespaces 2nd non-Microsoft DNS implementations 2nd queries 2nd 3rd 4th resource records 2nd 3rd 4th 5th 6th 7th 8th 9th scavenging 2nd secure updates 2nd site authentication, controlling 2nd site resolution 2nd troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th TTL (Time to Live) 2nd 3rd Unicode character support 2nd Windows Server 2003 enhancements 2nd 3rd WINS (Windows Internet Naming Service) 2nd 3rd 4th zone transfers 2nd 3rd 4th 5th 6th 7th zones 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th EAP (Extensible Authentication Protocol) 2nd FTP (File Transfer Protocol) 2nd account lockout anonymous FTP auditing blind-put access disk quotas folder permissions installing 2nd IP address restrictions logging 2nd logon time restrictions passwords user isolation IPP (Internet Printing Protocol) 2nd installing 2nd security 2nd IPSec desktop security 2nd 3rd L2TP (Layer 2 Tunneling Protocol) client requirements 2nd in series with firewalls 2nd parallel to firewalls 2nd remote access policies 2nd security 2nd 3rd LDAP (Lightweight Directory Access Protocol) OSI (Open Systems Interconnection) protocol PAP (Password Authentication Protocol) PPTP (Point to Point Tunneling Protocol) PPTP (Point-to-Point Tunneling Protocol) client requirements 2nd in series with firewalls 2nd parallel to firewalls 2nd remote access policies 2nd security 2nd SSL (Secure Socket Layer) 2nd SSL (Secure Sockets Layer) enabling 2nd 3rd 4th 5th TCP/IP 2nd TKIP (Temporal Key Integrity Protocol) TLS (Transport Level Security) protocols; providers Performance Monitor Provider Registry Event Provider Registry Provider Shadow Copy Provider SNMP Provider Storage Volume Provider WDM Provider Win32 Provider Windows NT Event Log Provider PTR (Pointer) records Public Key Management console public workstations desktop management 2nd 3rd pull/push partners configuring 2nd push/pull partners configuring 2nd pushing certificates pushing software to users 2nd 3rd 4th 5th best practices 2nd 3rd 4th verifying installation 2nd PXE (Pre-Boot eXecution Environment) |