< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] L2F (Layer 2 Forwarding) L2TP (Layer 2 Transport Protocol) L2TP over NAT tunnels 2nd Lag DCs lag sites 2nd LAN on Motherboard (LOM) feature latency FRS 2nd Layer 2 Forwarding [See L2F] Layer 2 Transport Protocol [See L2TP] LDAP (Lightweight Directory Access Protocol) LDIFDE Ldifde export filters 2nd 3rd 4th 5th 6th Ldifde utility LDP accidental object deletions least-cost path defined legacy protocols removal of support for License Server requirements Terminal Server infrastructure design 2nd License Server Security Group policy Terminal Server 2nd licensing PMP (Performance Management Pack) ProLiant Essentials software RDP 2nd Lights-Out DOS Utility (CPQLODOS) Lights-Out Management [See iLO, RILOE] Lights-Out technology iLO (integrated Lights-Out) 2nd 3rd Lightweight Directory Access Protocol [See LDAP] lingering objects 2nd AD replication 2nd Link Value Replication (LVR) Linked Value Replication (LVR) 2nd links objects ADLRM 2nd 3rd 4th 5th anomalies group membership 2nd 3rd nonrestored 2nd links (site) defined Linux imaging jobs load balancing BHS (Bridgehead Server) 2nd replication 2nd 3rd 4th 5th 6th Local Quorum (MSCS) quorum scheme 2nd Local Resources tab (RDC remote connections) lockout [See account lockout] log files appending (example 8.2) creating (example 8.1) MSCS 2nd 3rd 4th logbooks verson control logging and PMP workload logical design of Active Directory (AD) 2nd 3rd 4th design team members 2nd domain structure 2nd 3rd 4th 5th 6th 7th 8th 9th 10th File Replication Service (FRS) 2nd 3rd best practices 2nd 3rd latency 2nd replica set structure 2nd SYSVOL file structure 2nd troubleshooting 2nd 3rd 4th 5th 6th 7th 8th forest structure 2nd 3rd Group Policy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th naming standards 2nd 3rd 4th 5th 6th OU structure 2nd 3rd 4th 5th replication topology best practices 2nd 3rd 4th 5th 6th case studies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th GC servers 2nd improvements 2nd 3rd 4th limitations 2nd 3rd 4th 5th 6th replication dampening single-master model versus multimaster model 2nd 3rd security planning and design account security 2nd 3rd 4th 5th 6th 7th 8th NTFS and share permissions role-based security 2nd security groups 2nd security templates 2nd 3rd Software Update Service (SUS) 2nd 3rd Windows Update Service (WUS) 2nd trust definitions 2nd 3rd 4th 5th Login Accounts dialog box (VCRM) logon authentication [See authentication] Logon Locally right 2nd LOM (LAN on Motherboard) feature Loven, Cliff LSREPORT.EXE LSVIEW.EXE LVR (Link Value Replication) LVR (Linked Value Replication) 2nd |
< Day Day Up > |