Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Safe Mode, starting computer in 2nd SAM (Security Accounts Manager) database user account information scavenging (DNS resource records) configuring configuring options manually scavenging a zone Schema Admins group schema container 2nd domain controllers in a forest schema master role 2nd placement of viewing and transferring schema partition scopes DHCP 2nd creating and configuring 2nd 3rd initial scope on server managing options troubleshooting option settings groups changing 2nd 3rd domain functional level and 2nd secedit utility, creating rollback template secondary DNS servers 2nd 3rd secondary zone files secondary zones 2nd storage in Active Directory Secure only option (DNS updates) Secure Server (Require Security) policy Secure Sockets Layer (SSL) security accessing security tools backup operations 2nd DNS 2nd dynamic record updates by DHCP preventing attacks zones enterprise-wide policies IIS (Internet Information Services) 2nd network 2nd 3rd Exam 70-293 remote access 2nd 3rd 4th 5th user authentication users RIP version 2 servers for servers assigned specific roles practice exercises secure baseline installation Terminal Services, diagnosing issues related to Security Accounts Manager (SAM) database user account information Security Configuration And Analysis accesing and working with standard templates applying rollback template applying security template applying templates and analyzing security 2nd comparing current computer security settings to particular security template custom security template based on server role database storing security template settings Security Configuration Wizard security groups 2nd creating planning security infrastructure 2nd Security log 2nd security options policy security templates 2nd 3rd applying 2nd comparing current computer settings to a particular template configuring computer security settings creating 2nd rollback template principle of least privilege recovering from improper application of Security Templates snap-in accessing and working with standard templates creating custom security template based on server role creating security templates select and place questions Exam 70-291 Server (Request Security) policy server availability 2nd 3rd 4th availability goals 2nd high-availability goals identifying system bottlenecks meeting moderate and high-availability goals network traffic monitoring planning high-availability services using clustering services using NLB planning services for high availability 2nd backup and recovery 2nd using clustering services using network load balancing (NLB) planning, practice exercise server environment, managing 2nd 3rd events 2nd accessing and reviewing 2nd event logs 2nd logging options monitoring system performance performance for server environment choosing objects to monitor disk performance objects 2nd file and print servers 2nd memory performance objects 2nd network performance objects 2nd processor performance objects 2nd software site licensing 2nd software update infrastructure 2nd system performance monitoring with Performance console monitoring with Task Manager web servers configuring IIS IIS management tools IIS security installing IIS server hardware installing and configuring devices monitoring (Windows Server 2003) server licensing server options (TCP/IP) server roles and server security 2nd 3rd 4th enforcing system default security settings Group Policy hardening servers identifying operating system default security settings Kerberos policies, default security local policies NTFS permissions operating system selection client operating system for enterprise computers server operating system operating sytem selection client operating system password policies, default security planning and implementing roles 2nd adding/removing roles domain controller standalone server Windows Server 2003 roles, listed planning secure baseline installation operating system default security settings system default security settings, enforcing role-specific security configuration secure baseline installation security enhancements security for account policies security for computers assigned specific roles security for servers assigned specific roles configuring security custom server templates for server roles deploying security configurations security plans security policies, enterprise-wide security policy, developing security settings security teams security templates security, areas of server configurations server roles server templates (custom), based on server roles servers changing server name configuring TCP/IP addressing on DHCP migrating stopping unauthorized DNS Active Directory-integrated primary configuration options configuring multiple licensing performance monitoring, configuring support of fault-tolerant RAID service identity service locator (SRV) records alteration by clients on newtwork service pack, applying to deployed software services configuring dependencies determining dependencies high availability backup and recovery planning for high availability recovery startup types states Services utility managing DHCP Server service session settings (Remote Desktop Connection) Shadow Copy client Shadow Copy volumes configuring 2nd restoring data from 2nd practice exercise share permissions 2nd 3rd 4th default security for levels granted to user or group shared folders accesing using a network drive access to 2nd configuring access 2nd creating creating using Computer Management creating using Windows Explorer managing properties and permissions web shares Shared key authentication Shiva Password Authentication Protocol (SPAP) 2nd 3rd shortcut trusts 2nd Shortest Path First (SPF) algorithm SIDs (security identifiers) user accounts signed device drivers signed drivers simple volume (dynamic disk) single quorum device server clusters 2nd single-node clustering 2nd site links 2nd configuring site link bridges 2nd creating creating and configuring creating for intersite replication between two or more sites changing sites associated with site links configuring properties transport protocols determining ISTG determining site bridgehead servers transitivity sites 2nd 3rd configuring and maintaining associating domain controllers with sites creating sites creating subnets site license server, specifying tasks for site configuration creating and configuring GPOs, creating and managing intersite replication configuring site link bridges creating required site links determining ISTG site bridgehead servers overview designing site topology reasons to create multiple sites at a physical location policy settings replication comparing intrasite and intersite replication universal group caching Smart Card Is Required For Interactive Logon (Account tab, user properties) smart cards authentication strategy that uses EAP used with planning for user authentication with using for authentication 2nd SMTP (Simple Mail Transfer Protocol) snap-ins (MMC) SOA (Start of Authority) 2nd 3rd configuring 2nd 3rd Software Installation policy updating applications deployed through software RAID software routers 2nd software settings software site licensing 2nd 3rd configuring server licensing managing software update infrastructure 2nd 3rd 4th Automatic Updates configuring configuring, Exam 70-293 installing and configuring Automatic Client Update 2nd maintaining system security Windows Server Update Services (WSUS) configuring installing Windows Update WSUS (Windows Server Update Services) Software Update Services (SUS) software, distributing using Group Policy 2nd spanned volumes 2nd SPAP (Shiva Password Authentication Protocol) 2nd 3rd special characters not allowed in user, computer, and group names special identities types of special or default shares special permissions NTFS filesystem 2nd Terminal Services special volumes SRV (service locator) records alteration by clients on network SSL (Secure Sockets Layer) stand-alone CAs stand-alone root CA stand-alone subordinate CAs 2nd standalone servers star topology (WAN connections) state flags (nodes in server clusters) static address pool option (RRAS) static IP addresses 2nd 3rd 4th 5th static routes 2nd 3rd configuring using command line configuring with RRAS static routing 2nd 3rd storage media, backups 2nd Store Password Using Reversible Encryption (Account tab, user properties) striped volumes 2nd 3rd striped with parity volumes (RAID-5) 2nd 3rd failure and repair of stub zone files 2nd stub zones 2nd 3rd study resources subnet masks 2nd 3rd 4th invalid invalid, preventing Internet connectivity IP addresses network bit lengths and standard, overview of subnets 2nd configuring DHCP relay agents on creating and associating with a site creating for sites creating IP subnet scheme 2nd calculating number of nodes on subnet calculating number of subnets Class C networks, overview of subnetting in multinets IP routing and sites and using to divide a network success audit events 2nd suffixes, DNS practice exercises with superscopes (DHCP) 2nd creating and using 2nd Support Tools Netdiag SUS (Software Update Services) switches system bottlenecks, identifying system environment, managing performance for server environment choosing objects to monitor System event log conflicts in IP addresses, warning events DHCP troubleshooting password/trust problem for computer account system identity System log 2nd System Monitor 2nd managing/maintaining server environment monitoring DNS monitoring performance of local and remote systems network traffic, monitoring performance monitoring for system bottlenecks report formats system performance, monitoring in server environment 2nd four key areas with Performance console with Task Manager System services policy System State data 2nd 3rd backing up on domain controllers backing up to media 2nd restoring System utility Remote tab system volume 2nd Sysvol folder checking permissions with Gpotool performing primary restore on 2nd replication dependencies replication of files in 2nd |