[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] verifying Active Directory replication 2nd automatic software installation 2nd backups 2nd 3rd DNS (Domain Name System) 2nd Version History command (WSS) 2nd viewing GPOs (Group Policy Objects) 2nd views MMC view customizing WSS (Windows SharePoint Services) virtual directories 2nd authentication methods 2nd creating with IIS Manager 2nd creating with Windows Explorer 2nd firewalls 2nd HTTP authentication requests 2nd permissions virtual directories mapped to local directories 2nd virtual directories mapped to Windows shares 2nd server security 2nd trusted networks 2nd Virtual Directory Creation Wizard virtual memory performance optimization 2nd 3rd Virtual Private Networks. [See See VPNs] virtual servers 2nd VLANs dedicated backup VLANs 2nd VM Largest Block Size counter VM Total 16MB Free Blocks counter VM Total Free Blocks counter VM Total Large Free Block Bytes counter Volume Licensing Activation Keys volume sets Windows NT to Windows Server migration Volume Shadow Copy Service. [See See VSS] VPNs (Virtual Private Networks) 2nd 3rd Celestix CMAK (Connection Manager Administration Kit) 2nd animated dialer logon screen appending applications auto-applications connect actions connection status desktop/tray icons encrypted connections help file language support license agreement multiple service types, support for passwords phone book 2nd realm name prefix/suffix service profiles support phone number designing 2nd firewall-based VPNs 2nd Group Policy 2nd hardware-based VPNs 2nd IAS (Internet Authentication Service) installing IPSec 2nd 3rd Terminal Services L2TP (Layer 2 Tunneling Protocol) client requirements 2nd in series with firewalls 2nd parallel to firewalls 2nd remote access policies 2nd security 2nd 3rd line consolidation 2nd load balancing 2nd PPTP (Point-to-Point Tunneling Protocol) client requirements 2nd in series with firewalls 2nd parallel to firewalls 2nd remote access policies 2nd security 2nd RADIUS (Remote Authentication Dial-in User Service) 2nd 3rd 4th RRAS (Routing and Remote Access Services) 2nd site-to-site VPNs 2nd 3rd 4th softmodems 2nd wireless networks 2nd 3rd 4th VSS (Volume Shadow Copy Service) 2nd best practices 2nd configuring 2nd 3rd data recovery 2nd vulnerability scanners 2nd |