[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] s count parameter ping command S srcaddr parameter tracert command saving backup locations counter logs System Monitor configurations scalability OSPF scheduling backups 2nd 3rd scope backups IP addresses secedit 2nd secedit /analyze parameters 2nd secedit /configure parameters 2nd secedit.exe command secedit.exe tool secure communications custom IPSec policies secure dynamic updates 2nd Secure Hash Algorithm (SHA1) Secure Hash Algorithm. [See SHA1] secure server (require security) policy Secure Server (Require Security) policy 2nd 3rd secure server policy IPSec secure template Secure User Authentication security auditing account logon events account management Active Directory logon events object access policies privilges process tracking system events CAs child Enterprise 2nd Enterprise Root 2nd Enterprise Root, creating 2nd Enterprise Subordinate Enterprise, configuring 2nd hierarchies, planning 2nd installing 2nd 3rd names parent public/private key pair settings 2nd renewing Root Standalone 2nd 3rd Standalone Root Standalone Subordinate 2nd third-party Certificate Services auditing 2nd CA subordination delat CRLs enrollment options 2nd Enterprise CA hierarchy key recovery new features 2nd role separation Standalone CA 2nd version 2 templates certificates 2nd autoenrollment 2nd 3rd enrollment 2nd requesting 2nd 3rd 4th requests 2nd 3rd requests/renewal 2nd template management 2nd change and configuration management framework 2nd configuring servers Active Directory 2nd baseline configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th OUs roles 2nd CRLs publication 2nd default settings viewing DNS 2nd 3rd 4th Active Directory permissions 2nd DNSSEC 2nd dynamic updates 2nd 3rd 4th server properties 2nd zone transfers 2nd DNS zones ESP filter actions 2nd Group Policy policies, creating 2nd ICMP packets, blocking Internet connections IPSec 2nd 3rd 4th AH Authenticaion Header 2nd configuring custom policies, creating 2nd 3rd 4th custom policies, creating. [See customizing, IPSec policies] ESP 2nd 3rd implementation 2nd IP Security Monitor IP Security Monitor snap-in 2nd 3rd 4th 5th ISAKMP/IKE 2nd Jeff's Jeep Tours case study 2nd L2TP 2nd management console, creating 2nd monitoring new features 2nd policies 2nd 3rd 4th policies, assigning replaying RSoP snap-in 2nd Secure Server (Require Security) policy 2nd 3rd standard features 2nd stateful filtering transport mode troubleshooting 2nd 3rd tunnel mode tunnels VPN connections monitoring 2nd 3rd networks PKI. [See PKI] policies RDA 2nd remote access 2nd authentication 2nd 3rd 4th 5th 6th 7th dial-in properties 2nd Network Access Quarantine Control 2nd policies 2nd 3rd 4th profiles 2nd 3rd 4th 5th 6th 7th 8th 9th Secure User Authentication unauthorized access remote administration Remote Assistance. [See Remote Assistance] Remote Assistance 2nd RIP Rockwell Financial Services case study 2nd role-based 2nd 3rd 4th Baseline Policy Domain Policy Enterprise Client Policy High Security Policy Legacy Client Policy Role-Specific Policy Security Configuration Manager tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th security templates 2nd 3rd 4th 5th server roles 2nd settings, restoring templates 2nd 3rd 4th compatible default DC security default security highly secure no terminal server use SID system root TLS updates 2nd installing 2nd maintenance MBSA 2nd SUS 2nd 3rd 4th WLAN 2nd 3rd 4th 5th authentication Group Policy options 2nd 3rd 4th policies, configuring 2nd policies, creating 2nd Security Configuration and Analysis snap-in 2nd 3rd 4th 5th account policies event log file system local policies nodes 2nd Registry restricted groups system services Security Configuration Manager Security Configuration Manager tools security templates 2nd 3rd Group Policy security extensions 2nd 3rd 4th secedit.exe command 2nd 3rd 4th Security Configuration and Analysis snap-in 2nd 3rd 4th 5th 6th Security Templates snap-in 2nd 3rd security extensions Group Policy 2nd 3rd 4th 5th importing security templates into GPOs 2nd Security Parameters Index field. [See SPI field] Security Rule Wizard 2nd 3rd security templates role-based 2nd 3rd 4th Baseline Policy Domain Policy Enterprise Client Policy High Security Policy importing into GPOs 2nd Legacy Client Policy Role-Specific Policy Security Configuration Manager tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th server roles 2nd Windows Server 2003 2nd 3rd Setup security .inf Security Templates snap-in 2nd Select Computer dialog box Select Network Component Type dialog box Select Network Service dialog box Send a File button 2nd sending Remote Assistance requests 2nd 3rd 4th sequence number field AH ESP server (request security) policy server policy IPSec server roles security templates 2nd server-side features (SUS) 2nd servers baselining 2nd 3rd DHCP troubleshooting 2nd DNS properties 2nd proxy security Active Directory 2nd baseline configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th configuring 2nd 3rd OUs slave SMS WINS services Certificate auditing CA subordination delta CRLs enrollment options 2nd Enterprise CA hierarchy key recovery role separation Standalone CA 2nd version 2 templates system configuring session keys PFS settings Windows account lockout policies account lookout policies account policies 2nd events logs 2nd 3rd 4th Kerberos Policy 2nd local policies (audit policies) 2nd local policies (security options) 2nd 3rd 4th 5th 6th 7th 8th local policies (User Rights Assignment) 2nd 3rd 4th 5th security options (local policies) Settings button 2nd Setup security .inf security template SHA1 (Secure Hash Algorithm) SHA1 algorithm AH shadow copies volume 2nd storing Shadow Copies dialog box Shiva Password Authentication Protocol) Shiva Password Authentication Protocol. [See SPAP] Shut Down Windows dialog box silent RIP implementing 2nd 3rd single host filtering 2nd single node clusters 2nd single point of failure. [See SPOF] single quorum clusters size counter logs slave servers DNS smart card certificates 2nd 3rd smart cards certificate templates device redirection distribution requirements 2nd enrollment 2nd enrollment stations Group Policy options 2nd readers 2nd supported user education 2nd Smartcard Logon template 2nd Smartcard User template Smartcard User templated SMS (Systems Management Server) 2nd SNA SNA (Systems Network Architecture) 2nd snap-ins IP Security Monitor 2nd 3rd 4th 5th Active Policy node 2nd Main Mode node 2nd 3rd Quick Mode node 2nd 3rd RSoP 2nd 3rd 4th Security Configuration and Analysis 2nd 3rd 4th 5th 6th 7th 8th account policies event log file system local policies nodes 2nd Registry restricted groups system services Security Templates 2nd 3rd 4th 5th snaps -ins Security Configuration and Analysis Software Update Services. [See SUS]2nd [See SUS] solutions high availability 2nd SPAP remote users SPAP (Shiva Password Authentication Protocol) 2nd SPI (Security Parameters Index) field AH SPI field ESP Split Horizons service SPOF (single point of failure) Standalone CA 2nd Standalone CAs 2nd 3rd Standalone Root CAs Standalone Subordinate CAs 2nd standard primary DNS zones standard primary zones standard secondary DNS zones standard secondary zones star topology routing Start Talking button 2nd starting counter logs PrepLogic Practice Exams 2nd startup disks State protocols OSPF hop counts stateful filtering (IPSec) static routing 2nd 3rd 4th adding to existing routing tables advantages/disadvantages 2nd configuring 2nd 3rd Stop Control button stopping counter logs storage MSCS clustering Storage Services Technology Center Web site storage systems fault-tolerant 2nd 3rd storing volume shadow copies stub areas stub DNS zones stub zones study tips 2nd 3rd 4th 5th 6th 7th adaptive exams 2nd case study exams 2nd fixed-format exams 2nd learning styles 2nd pretesting 2nd study strategies 2nd 3rd subnet masks subnetting 2nd OSPF RIP Subordinate CAs Subordinate Certification Authority template SUS client-side features 2nd downloading planning 2nd 3rd 4th server-side features 2nd system requirements SUS (Software Update Services) 2nd switch port flooding switches Layer 3 secedit command System permissions system events auditing 2nd System Monitor bottlenecks 2nd baseline counter logs, creating 2nd 3rd 4th baselining servers 2nd 3rd counters 2nd configurations, saving counter logs, adding network traffic, monitoring performance monitoring 2nd 3rd System Monitor Properties dialog box system root security template system services configuring System Services node System State data 2nd 3rd SystemProcessor Queue Length counter Systems Management Server. [See SMS]2nd [See SMS] Systems Network Architecture. [See SNA]2nd [See SNA] |