[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] SAC (Special Administration Console) EMS (Emergency Management Services) 2nd SAK (Server Appliance Kits) headless servers Saprep.exe utility SAN (Storage Area Networks) managing Disk Management console VDS (Virtual Disk Services) multipath failover SAN (System Area Network) Saprep.exe utility Saved Queries feature (Active Directory administrative tools) 2nd saving Security Templates snap-in changes updates SUS (Software Update Services) sc command-line tool SCA (Security Configuration and Analysis) snap-in 2nd security databases 2nd scheduling shadow copies (file sharing) schemas deactivating Active Directory architectural tools 2nd schtasks command-line tool screensavers scripts administrative scripts VBScript 2nd 3rd 4th 5th 6th 7th Scripts settings (Computer Configuration policy sections) 2nd Scripts settings (New User Configuration policy sections) Secedit tool setup security.inf security template secedit.exe 2nd Secedit.exe command-line tool security templates, applying tutorial Web site securedc template securedc.inf security template 2nd securews template securews.inf security template 2nd security 2nd account policies auditing 2nd configuring file/folder access DNS logs domain events IIS (Internet Information System) log files code access security policies, managing 2nd 3rd cross-forest trusts (Active Directory) 2nd IAS (Internet Authentication Service) data encryption EFS (Encrypting File System) 2nd DDNS (Dynamic DNS) DHCP (Dynamic Host Configuration Protocol) DNS 2nd EFS (Encrypting File System) implementing 2nd encrypted files storing on remote servers 2nd encryption 2048-bit encryption EFS (Encrypting File System) 2nd 3rd terminal servers 2nd event log policies file system policies firewalls ICF (Internet Connection Firewall) 2nd 3rd 4th ICF (Internet Connection Firewall);enabling hfnetchk .exe 2nd 3rd IIS (Internet Information Services) console 2nd 3rd 4th IIS (Internet Information System) auditing log files insecure password warnings IPSec (Internet Protocol Security) protocol dynamic addresses encryption keys IPSec Monitor snap-in 2nd IPSec/L2TP tunnels local policies Local Security Policy snap-in 2nd maintenance hotfixes security updates 2nd service packs 2nd Microsoft security philosophy 2nd 3rd Microsoft Security Web site NET Framework NetMon (Network Monitor) 2nd bone broadcasts passwords terminal servers 2nd registry policies Remote Desktop for Administration restricted group policies SCA (Security Configuration and Analysis) snap-in 2nd security databases 2nd secedit.exe 2nd Security Configuration Manager hfnetchk.exe 2nd 3rd Local Security Policy snap-in 2nd SCA (Security Configuration and Analysis) snap-in 2nd 3rd 4th secedit.exe 2nd Security Settings extension (Group Policy) 2nd Security Templates snap-in 2nd 3rd 4th 5th 6th security databases SCA (Security Configuration and Analysis) snap-in 2nd security holes DHCP (Dynamic Host Configuration Protocol) DNS 2nd IIS (Internet Information System) NetMon (Network Monitor) 2nd 3rd Security Settings extension (Group Policy) 2nd security templates 2nd account policies creating custom templates DC security templates event log policies file system policies local policies registry policies restricted group policies securedc securews system service policies Security Templates snap-in 2nd configuring 2nd 3rd creating custom security templates definition settings 2nd saving changes smart cards terminal servers system service policies terminal servers encryption 2nd passwords 2nd smart cards Terminal Services Enable TS per NIC setting Full Security Permission Compatibility setting NIC for Session Directory to Use for Redirection setting Relaxed Security Permission Compatibility setting WebDAV (Web Distributed Authoring and Versioning) 2nd 3rd Security Configuration and Analysis snap-in (MMC) security templates, applying Security Configuration Manager hfnetchk.exe 2nd 3rd Local Security Policy snap-in 2nd SCA (Security Configuration and Analysis) snap-in 2nd security databases 2nd secedit.exe 2nd Security Settings extension (Group Policy) 2nd Security Templates snap-in 2nd configuring 2nd 3rd creating custom security templates definition settings 2nd saving changes security databases analyzing 2nd configuring manual configuration specifying file permissions specifying password policies SCA (Security Configuration and Analysis) snap-in 2nd security templates, analyzing 2nd security templates, importing into 2nd security hotfixes. [See security updates] security policies security prinicipal policies browsing RSOP (Resultant Set of Policy) Security Settings extension (Group Policy) 2nd security templates applying compatws.inf DC security.inf hisecdc.inf hisecws.inf notssid.inf rootsec.inf securedc.inf 2nd securews.inf 2nd security databases analyzing 2nd importing into 2nd setup security.inf group policies Secedit tool Security Templates snap-in 2nd changes, saving configuring 2nd 3rd custom security templates creating definition settings 2nd security updates security updates (security maintenance) 2nd Security/Templates subfolder security templates Select License agreements Select license agreements Select License agreements LAR (Large Account Resellers) select program license keys (Windows Product Activation) Select Remote Users button (Remote Desktop for Administration) Administration accounts granting access permissions selecting multiple objects Active Directory administrative tools serial ports OOB (out of bandwidth) management Windows requirements server appliances. [See headless servers] server management Group Policy Management Console security templates compatws.inf DC security.inf hisecdc.inf hisecws.inf notssid.inf rootsec.inf securedc.inf 2nd securews.inf 2nd setup security.inf security templates, applying software restriction policies components 2nd 3rd 4th server-based DFS (distributed file system) servers application servers configuring IIS (Internet Information Services) console Datacenter Server 2nd Servers Datacenter Server servers Datacenter Server Cluster Service NLB support of IPSec/L2TP tunnels Terminal Server Session Directory 2nd updates DNS servers forwarders glue records 2nd managing permissions recursion Enterprise Server AWE (Address Windows Extensions) hot-add memory MMS (Microsoft Metadirectory Services) NUMA (non-uniform memory access) 2nd Terminal Server Session Directory 2nd Windows Clustering Exchange Server Cluster Services GC servers remote office logons (Active Directory) 2nd headless servers 2nd 3rd hardware 2nd 3rd 4th software 2nd 3rd licenses member servers securews.inf security templates NAS (Network Access Servers) NET Enterprise Server NLB support of IPSec/L2TP tunnels remote servers storing encrypted files 2nd remotely administered servers. [See headless servers] SAN (Storage Area Networks) Disk Management console multipath failover VDS (Virtual Disk Services) Session Directory servers installing SQL Servers Cluster Services Standard Server 2nd 3rd MMS (Microsoft Metadirectory Services) Terminal Server SID (Security Identifiers) notssid.inf security templates terminal servers access permissions access permissions;passwords 2nd connecting to disconnected sessions encryption 2nd farms 2nd 3rd security smart cards VPN servers RRAS (Routing and Remote Access Service) 2nd Web Server Web servers NLB (Network Load Balancing) WINS (Windows Internet Naming Service) server Automatic Partner Configuration finding records finding records, Enable Result Caching option 2nd NetBIOS (network basic input/output systems) service packs 2nd service packs (security maintenance) 2nd Session Directory terminal servers configuring Session Directory Cluster Name setting (Terminal Servers Session Directory group policies) Session Directory Server setting (Terminal Servers Session Directory group policies) Session Directory servers installing Set Client Connection Encryption Level group policy Set Client Connection Encryption Level group policy (Terminal Services) Setup Manager Wizard unattended installations 2nd 3rd passwords setup security.inf security template group policies Secedit tool Setup Wizard operating system upgrades Windows Compatibility Reports setx command-line tool shadow copies (file sharing) disaster recovery enabling 2nd managing scheduling versioning viewing Shadow Copies tab 2nd showing inheritance parents Active Directory administrative tools 2nd permissions Active Directory administrative tools shutdown command-line tool single node clusters building Single property (port ranges) single quorum device clusters building single-host addresses. [See unicast addresses] site-local unicast addresses Ipv6 protocols smart cards terminal servers SMS (Systems Management Server) SMTP (Simple Mail Transport Protocol) IIS (Internet Information Services) consoles 2nd 3rd SMTP relaying snap-ins IP Security Policies snap-in mapping computer encryption certificates IPSec Monitor snap-in 2nd Local Security Policy snap-in 2nd Remote Desktops MMC client (Remote Desktop fo Administration) RRAS (Routing and Remote Access Service) snap-in 2nd customizing IP addresses demand-dial connections Manage Your Server application 2nd NAT/Basic Firewall interface VPN servers 2nd Web sites SCA (Security Configuration and Analysis) snap-in 2nd security databases 2nd Security Templates snap-in 2nd configuring 2nd 3rd creating custom security templates definition settings 2nd saving changes Terminal Services Configuration sna[-in Terminal Services Manager snap-in SNMP settings (Computer Configuration policy sections) SOAP (Simple Object Access Protocol) protocol software deploying DFS (distributed file system) IntelliMirror 2nd headless server software 2nd 3rd product activation product ID upgrades Software Assurance program 2nd software applications creating Software Assurance program 2nd software development NET Framework 2nd 3rd 4th problems 2nd Software Installation section (Group Policy) 64-bit operating system suppor Support Information URL modifying 2nd Software Restriction group policies terminal servers 2nd Software Restriction group policy (Terminal Services) 2nd software restriction policies components 2nd 3rd 4th GPO (Group Policy Objects) Software Restriction settings (Computer Configuration policy sections) sound cards redirecting specifying nodes (cluster resources) Cluster Administrator resources(clusters) Cluster Administrator SQL Servers Cluster Services Standard Folders (Start menu) Standard server 2nd Standard Server MMS (Microsoft Metadirectory Services) Start menu All Programs menu Control panel customizing Default Utilities Pinned Programs 2nd Recently Used Programs Standard Folders starting RSOP (Resultant Set of Policy) feature (Active Directory administrative tools) storing encrypted files on remote servers 2nd stub zones (DNS) subnet masks CIDR (Classless Interdomain Routing) superfloppies Support Information URL modifying 2nd supported upgrade paths (Windows Server 2003) 2nd 3rd SUS (Software Update Services) 2nd 3rd 4th Approval Log Automatic Updates configuring installing Monitor Server page synchronization schedule configuring 2nd updates approving 2nd symmetric key encryption System Properties dialog box Remote tab enabling Remote Desktop for Administration 2nd System Restore System Restore settings (Computer Configuration policy sections) 2nd system root folders /Windows security templates system service policies (security) systeminfo command-line tool |