Index S

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SAC (Special Administration Console)
       EMS (Emergency Management Services)   2nd  
SAK (Server Appliance Kits)
       headless servers  
       Saprep.exe utility  
SAN (Storage Area Networks)  
       managing
               Disk Management console  
               VDS (Virtual Disk Services)  
       multipath failover  
SAN (System Area Network)  
Saprep.exe utility  
Saved Queries feature (Active Directory administrative tools)   2nd  
saving
       Security Templates snap-in changes  
       updates
               SUS (Software Update Services)  
sc command-line tool  
SCA (Security Configuration and Analysis) snap-in   2nd  
       security databases   2nd  
scheduling
       shadow copies (file sharing)  
schemas
        deactivating
               Active Directory architectural tools   2nd  
schtasks command-line tool  
screensavers  
scripts
       administrative scripts
               VBScript   2nd   3rd   4th   5th   6th   7th  
Scripts settings (Computer Configuration policy sections)   2nd  
Scripts settings (New User Configuration policy sections)  
Secedit tool
       setup security.inf security template  
secedit.exe   2nd  
Secedit.exe command-line tool
       security templates, applying  
       tutorial Web site  
securedc template  
securedc.inf security template   2nd  
securews template  
securews.inf security template   2nd  
security   2nd  
       account policies  
       auditing   2nd  
               configuring file/folder access  
               DNS logs  
               domain events  
               IIS (Internet Information System) log files  
       code access security policies, managing   2nd   3rd  
       cross-forest trusts (Active Directory)   2nd  
               IAS (Internet Authentication Service)  
       data encryption
               EFS (Encrypting File System)   2nd  
       DDNS (Dynamic DNS)  
       DHCP (Dynamic Host Configuration Protocol)  
       DNS   2nd  
       EFS (Encrypting File System)  
               implementing   2nd  
       encrypted files
               storing on remote servers   2nd  
       encryption
               2048-bit encryption  
               EFS (Encrypting File System)   2nd   3rd  
               terminal servers   2nd  
       event log policies  
       file system policies  
       firewalls
               ICF (Internet Connection Firewall)   2nd   3rd   4th  
               ICF (Internet Connection Firewall);enabling  
        hfnetchk .exe   2nd   3rd  
       IIS (Internet Information Services) console   2nd   3rd   4th  
       IIS (Internet Information System)  
               auditing log files  
        insecure password warnings  
       IPSec (Internet Protocol Security) protocol  
               dynamic addresses  
               encryption keys  
               IPSec Monitor snap-in   2nd  
               IPSec/L2TP tunnels  
       local policies  
       Local Security Policy snap-in   2nd  
       maintenance  
               hotfixes  
               security updates   2nd  
               service packs   2nd  
       Microsoft security philosophy   2nd   3rd  
       Microsoft Security Web site  
       NET Framework  
       NetMon (Network Monitor)   2nd  
               bone broadcasts  
       passwords
               terminal servers   2nd  
       registry policies  
       Remote Desktop for Administration  
       restricted group policies  
       SCA (Security Configuration and Analysis) snap-in   2nd  
               security databases   2nd  
       secedit.exe   2nd  
       Security Configuration Manager  
               hfnetchk.exe   2nd   3rd  
               Local Security Policy snap-in   2nd  
               SCA (Security Configuration and Analysis) snap-in   2nd   3rd   4th  
               secedit.exe   2nd  
               Security Settings extension (Group Policy)   2nd  
               Security Templates snap-in   2nd   3rd   4th   5th   6th  
       security databases
               SCA (Security Configuration and Analysis) snap-in   2nd  
       security holes  
               DHCP (Dynamic Host Configuration Protocol)  
               DNS   2nd  
               IIS (Internet Information System)  
               NetMon (Network Monitor)   2nd   3rd  
       Security Settings extension (Group Policy)   2nd  
       security templates   2nd  
               account policies  
               creating custom templates  
               DC security templates  
               event log policies  
               file system policies  
               local policies  
               registry policies  
               restricted group policies  
               securedc  
               securews  
               system service policies  
       Security Templates snap-in   2nd  
               configuring   2nd   3rd  
               creating custom security templates  
               definition settings   2nd  
               saving changes  
       smart cards
               terminal servers  
       system service policies  
       terminal servers  
               encryption   2nd  
               passwords   2nd  
               smart cards  
       Terminal Services
               Enable TS per NIC setting  
               Full Security Permission Compatibility setting  
               NIC for Session Directory to Use for Redirection setting  
               Relaxed Security Permission Compatibility setting  
       WebDAV (Web Distributed Authoring and Versioning)   2nd   3rd  
Security Configuration and Analysis snap-in (MMC)
       security templates, applying  
Security Configuration Manager  
       hfnetchk.exe   2nd   3rd  
       Local Security Policy snap-in   2nd  
       SCA (Security Configuration and Analysis) snap-in   2nd  
               security databases   2nd  
       secedit.exe   2nd  
       Security Settings extension (Group Policy)   2nd  
       Security Templates snap-in   2nd  
               configuring   2nd   3rd  
               creating custom security templates  
               definition settings   2nd  
               saving changes  
security databases
       analyzing   2nd  
       configuring
               manual configuration  
               specifying file permissions  
               specifying password policies  
       SCA (Security Configuration and Analysis) snap-in   2nd  
       security templates, analyzing   2nd  
       security templates, importing into   2nd  
security hotfixes.   [See security updates]
security policies  
security prinicipal policies
       browsing
               RSOP (Resultant Set of Policy)  
Security Settings extension (Group Policy)   2nd  
security templates  
       applying  
       compatws.inf  
       DC security.inf  
       hisecdc.inf  
       hisecws.inf  
       notssid.inf  
       rootsec.inf  
       securedc.inf   2nd  
       securews.inf   2nd  
       security databases
               analyzing   2nd  
               importing into   2nd  
       setup security.inf  
               group policies  
               Secedit tool  
Security Templates snap-in   2nd  
       changes, saving  
       configuring   2nd   3rd  
       custom security templates
               creating  
       definition settings   2nd  
security updates  
security updates (security maintenance)   2nd  
Security/Templates subfolder
       security templates  
Select License agreements  
Select license agreements  
Select License agreements
       LAR (Large Account Resellers)  
select program license keys (Windows Product Activation)  
Select Remote Users button (Remote Desktop for Administration)
       Administration accounts
               granting access permissions  
selecting
       multiple objects
               Active Directory administrative tools  
serial ports
       OOB (out of bandwidth) management  
       Windows requirements  
server appliances.   [See headless servers]
server management
       Group Policy Management Console  
       security templates  
               compatws.inf  
               DC security.inf  
               hisecdc.inf  
               hisecws.inf  
               notssid.inf  
               rootsec.inf  
               securedc.inf   2nd  
               securews.inf   2nd  
               setup security.inf  
       security templates, applying  
       software restriction policies
                components   2nd   3rd   4th  
server-based DFS (distributed file system)  
servers
       application servers  
       configuring
               IIS (Internet Information Services) console  
       Datacenter Server   2nd  
Servers
       Datacenter Server  
servers
       Datacenter Server
               Cluster Service  
               NLB support of IPSec/L2TP tunnels  
               Terminal Server Session Directory   2nd  
               updates  
       DNS servers
               forwarders  
               glue records   2nd  
               managing permissions  
               recursion  
       Enterprise Server
               AWE (Address Windows Extensions)  
               hot-add memory  
               MMS (Microsoft Metadirectory Services)  
               NUMA (non-uniform memory access)   2nd  
               Terminal Server Session Directory   2nd  
               Windows Clustering  
       Exchange Server
               Cluster Services  
       GC servers
               remote office logons (Active Directory)   2nd  
       headless servers   2nd   3rd  
               hardware   2nd   3rd   4th  
               software   2nd   3rd  
       licenses  
       member servers
               securews.inf security templates  
       NAS (Network Access Servers)  
       NET Enterprise Server
               NLB support of IPSec/L2TP tunnels  
       remote servers
               storing encrypted files   2nd  
       remotely administered servers.   [See headless servers]
       SAN (Storage Area Networks)  
               Disk Management console  
               multipath failover  
               VDS (Virtual Disk Services)  
       Session Directory servers  
               installing  
       SQL Servers
               Cluster Services  
       Standard Server   2nd   3rd  
               MMS (Microsoft Metadirectory Services)  
       Terminal Server SID (Security Identifiers)
               notssid.inf security templates  
       terminal servers
               access permissions  
               access permissions;passwords   2nd  
               connecting to  
               disconnected sessions  
               encryption   2nd  
               farms   2nd   3rd  
               security  
               smart cards  
       VPN servers
               RRAS (Routing and Remote Access Service)   2nd  
       Web Server  
       Web servers
               NLB (Network Load Balancing)  
       WINS (Windows Internet Naming Service) server  
               Automatic Partner Configuration  
               finding records  
               finding records, Enable Result Caching option   2nd  
               NetBIOS (network basic input/output systems)  
service packs   2nd  
service packs (security maintenance)   2nd  
Session Directory
       terminal servers
               configuring  
Session Directory Cluster Name setting (Terminal Servers Session Directory group policies)  
Session Directory Server setting (Terminal Servers Session Directory group policies)  
Session Directory servers  
       installing  
Set Client Connection Encryption Level group policy  
Set Client Connection Encryption Level group policy (Terminal Services)  
Setup Manager Wizard
       unattended installations   2nd   3rd  
               passwords  
setup security.inf security template  
       group policies  
       Secedit tool  
Setup Wizard
       operating system upgrades  
               Windows Compatibility Reports  
setx command-line tool  
shadow copies (file sharing)  
       disaster recovery  
       enabling   2nd  
       managing  
       scheduling  
       versioning  
       viewing  
Shadow Copies tab   2nd  
showing
       inheritance parents
               Active Directory administrative tools   2nd  
       permissions
               Active Directory administrative tools  
shutdown command-line tool  
single node clusters
       building  
Single property (port ranges)  
single quorum device clusters
       building  
single-host addresses.   [See unicast addresses]
site-local unicast addresses
       Ipv6 protocols  
smart cards
       terminal servers  
SMS (Systems Management Server)  
SMTP (Simple Mail Transport Protocol)
       IIS (Internet Information Services) consoles   2nd   3rd  
               SMTP relaying  
snap-ins
       IP Security Policies snap-in  
               mapping computer encryption certificates  
       IPSec Monitor snap-in   2nd  
       Local Security Policy snap-in   2nd  
       Remote Desktops MMC client (Remote Desktop fo Administration)  
       RRAS (Routing and Remote Access Service) snap-in   2nd  
               customizing IP addresses  
                demand-dial connections  
               Manage Your Server application   2nd  
               NAT/Basic Firewall interface  
               VPN servers   2nd  
               Web sites  
       SCA (Security Configuration and Analysis) snap-in   2nd  
               security databases   2nd  
       Security Templates snap-in   2nd  
               configuring   2nd   3rd  
               creating custom security templates  
               definition settings   2nd  
               saving changes  
       Terminal Services Configuration sna[-in  
       Terminal Services Manager snap-in  
SNMP settings (Computer Configuration policy sections)  
SOAP (Simple Object Access Protocol) protocol  
software
       deploying
               DFS (distributed file system)  
               IntelliMirror   2nd  
       headless server software   2nd   3rd  
       product activation  
               product ID  
       upgrades
               Software Assurance program   2nd  
software applications
       creating  
Software Assurance program   2nd  
software development
       NET Framework   2nd   3rd   4th  
       problems   2nd  
Software Installation section (Group Policy)
       64-bit operating system suppor  
       Support Information URL
               modifying   2nd  
Software Restriction group policies
       terminal servers   2nd  
Software Restriction group policy (Terminal Services)   2nd  
software restriction policies
       components   2nd   3rd   4th  
       GPO (Group Policy Objects)  
Software Restriction settings (Computer Configuration policy sections)  
sound cards
       redirecting  
specifying
       nodes (cluster resources)
               Cluster Administrator  
       resources(clusters)
               Cluster Administrator  
SQL Servers
       Cluster Services  
Standard Folders (Start menu)  
Standard server   2nd  
Standard Server  
       MMS (Microsoft Metadirectory Services)  
Start menu  
       All Programs menu  
       Control panel  
       customizing  
       Default Utilities  
       Pinned Programs   2nd  
       Recently Used Programs  
       Standard Folders  
starting
       RSOP (Resultant Set of Policy) feature (Active Directory administrative tools)  
storing
       encrypted files on remote servers   2nd  
stub zones (DNS)  
subnet masks  
       CIDR (Classless Interdomain Routing)  
superfloppies  
Support Information URL
       modifying   2nd  
supported upgrade paths (Windows Server 2003)   2nd   3rd  
SUS (Software Update Services)   2nd   3rd   4th  
       Approval Log  
       Automatic Updates  
               configuring  
       installing  
       Monitor Server page  
       synchronization schedule
               configuring   2nd  
       updates
               approving   2nd  
symmetric key encryption  
System Properties dialog box
       Remote tab
               enabling Remote Desktop for Administration   2nd  
System Restore  
System Restore settings (Computer Configuration policy sections)   2nd  
system root folders
       /Windows
               security templates  
system service policies (security)  
systeminfo command-line tool  



Microsoft Windows Server 2003 Delta Guide
Microsoft Windows Server 2003 Delta Guide (2nd Edition)
ISBN: 0672326639
EAN: 2147483647
Year: 2005
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net