P
packaged software, identifying current requirements, 55
partners , resource access by, 325
passwords
account policy to manage, 236 “238
change
PDC emulator as clearinghouse for, 284
requiring, 116
user authentication before, 194
policies for, 116
strong, 193 “194, 236
enforcement, 237
peak usage times, in hardware monitoring, 57
Performance Logs and Alerts, 57, 66
perimeter network, 320
DNS servers on, 378 , 378
real world scenario, 323
permissions
assignment from parent to child, 170 “172
for GPOs, identifying required, 210
groups to organize, 233
managing, task vs. object level, 168
for users, 309
group creation and, 248
Personal Identification Number (PIN), 240
planned obsolescence, 47 “48
Point-to-Point Tunneling Protocol (PPTP), 60, 315
political boundaries, restrictions on information crossing , 50
ports, for replication with IPSec, 324
PPTP (Point-to-Point Tunneling Protocol), 60, 315
Primary domain controller (PDC), 64
primary domain controller (PDC) emulator, 284
primary zones in DNS, 361 “362
printers, groups to administer, 246
processing priority for Group Policy Objects, 203
processors for domain controllers, 278
product/service-based business model, 6 , 7
organization-based forest for, 95
OU tree for, 160
project-based business model, 4 “6 , 5
OU tree for, 160
projects in progress, and system design, 46
protocols
determining software requirements, 55 “56
for replication, 273 “274
pull replication in WINS, 370
push/pull replication in WINS, 370
push replication in WINS, 370