[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] Scan for Updates link (Windows Update) Secure Server (Require Security) IPSec policy Securedc.inf Account Lockout Policy settings 2nd Audit Policy settings 2nd Security Options settings 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th User Rights settings 2nd 3rd Securedc.inf template applying 2nd Password Policy settings 2nd security [See also server security] Internet connectivity 2nd IPSec john add entries or [See ref] MBSA 2nd 3rd 4th 5th 6th 7th IIS vulnerabilities check installing local scans multiple-system scans 2nd 3rd 4th 5th operating systems supported 2nd remote scans 2nd security updates check 2nd SQL vulnerabilities check starting 2nd weak passwords check Windows vulnerabilities check Microsoft ISA Server features 2nd online information RIPv1 2nd server clusters 2nd terminal servers 2nd 3rd updating systems 2nd john add entries Windows Update 2nd 3rd 4th 5th 6th 7th Security Audit Logs IPSec- related events Security log IPSec-related events security templates 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th [See also specific templates]20th 21st baseline security configurations 2nd Basicxx.inf 2nd Defltxx.inf Setup Security.inf Server (Request Security) IPSec policy server availability clustering services john add entries high-availability servers NLB john add entries Windows NT Load Balancing Service (WLBS) server clusters [See clustering services] server reliability [See reliability] server roles configuring 2nd 3rd 4th DHCP server 2nd 3rd 4th 5th 6th 7th 8th DNS server 2nd 3rd 4th 5th domain controller. [See domain controllers] file server 2nd 3rd 4th 5th 6th IIS server 2nd 3rd 4th mail server 2nd 3rd 4th 5th print server 2nd 3rd remote access server 2nd terminal server 2nd 3rd 4th VPN server 2nd WINS server 2nd 3rd server security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th administrative access 2nd Internet Connection Firewall (ICF) 2nd 3rd 4th 5th physical security 2nd 3rd servers upgrading operating systems 2nd 3rd Service (SRV) resource records 2nd 3rd 4th 5th 6th 7th Session layer (OSI model) Setup Security.inf template shadow copies 2nd 3rd 4th shared folders shadow copies 2nd 3rd 4th shares, configuring 2nd 3rd 4th 5th Shiva Passwork Authentication Protocol. [See SPAP] short-form certification exams 2nd 3rd 4th 5th 6th single node failures active/active clusters active/passive clusters single node server clusters single points of failure causes clustering John add entries or xref Network Load Balancing. [See NLB] power supply issues single quorum device server clusters 2nd 3rd 4th SMTP service configuring 2nd SOA (Start of Authority) records 2nd software-based RAID solutions 2nd SPAP VPN connections SRV (Service) resource records 2nd 3rd 4th 5th 6th 7th Standard Primary zones 2nd 3rd 4th 5th Standard Secondary zones 2nd 3rd 4th 5th 6th Start of Authority (SOA) records 2nd startup disks ASR startup disks static routes adding 2nd deleting strong encyption VPN connections STs account lockout policy settings 2nd audit policy settings 2nd custom templates, creating 2nd password policy settings 2nd security options settings 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th user rights settings 2nd 3rd stub zones subnet masks 2nd 3rd 4th 5th SUS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th approval logs configuring client systems 2nd 3rd customizing approved updates 2nd distribution points, creating 2nd installing 2nd requirements 2nd synchronizing updates 2nd 3rd synchroniztion logs updating procedure 2nd System log IPSec-related events System Monitor 2nd system services 2nd 3rd 4th 5th 6th 7th backups 2nd 3rd System State data backups 2nd 3rd |