< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] tape drives OBDR tape drives 2nd tapes storage Windows 2003 target computer list (RDU) 2nd 3rd Target Machine toolbar (RDU) 2nd target servers deployment 2nd tasks (HP SIM) 2nd 3rd TCO (Total Cost of Ownership) 2nd 3rd 4th analysis TCP Management Agents installation 2nd 3rd TCP/IP assessment data gathering TCP/UDP port ownership team members assessment phase (migration planning) 2nd 3rd design team (migration planning) 2nd technical assessment migration to Exchange 2003 directory infrastructure 2nd 3rd 4th 5th 6th exisiting messaging organization 2nd mail-enabled applications 2nd messaging systems topology 2nd technical justification for migration plans 2nd technical support for HP SIM 2nd 3rd ProLiant servers 2nd 3rd TEMP.EDB file templates creating for assessment data gathering 2nd AD structure section 2nd 3rd 4th application validation section 2nd existing system environment section growth section introduction section management and administration structure section 2nd security section 2nd 3rd server systems topology section 2nd 3rd 4th 5th 6th 7th 8th 9th user environment section 2nd Windows 2003 infrastructure section 2nd Windows 2003 network services section 2nd security templates 2nd 3rd Temporary License Expired pop-up messages Termianl Server Capacity Planning tools Terminal Server infrastructure design best practices 2nd License Server requirements 2nd remote connections server requirements Terminal Server client error messages general error messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th licensing error messages 2nd 3rd 4th 5th 6th 7th Terminal Server License Manager Terminal Server Licensing 2nd CAL Token client connections 2nd External Connector License Server Security Group policy 2nd licensing modes Per Device 2nd 3rd Per User 2nd management tools 2nd Prevent License Upgrade policy Resource Kit utilities 2nd Terminal Server Licensing' upgrades Terminal Services 2nd 3rd ADSI (Active Directory Service Interface) advantages 2nd 3rd case study 2nd client features 2nd Client Creator client error messages command-line utilities console connections Remote Desktops MMC 2nd encryption enhanced features 2nd 3rd 4th 5th 6th 7th 8th eventvwr.msc Group Policy Group Policy Editor 2nd 3rd printer redirection 2nd RDC client interface 2nd connections 2nd 3rd 4th 5th 6th 7th console connection installing 2nd low bandwidth optimization 2nd redirected printer names resource redirection security SmartCards switching to remote sessions virtual channels Windows CE Remote Desktop for Administration 2nd advantages 2nd best practices 2nd 3rd configuration 2nd console connection iLO Advanced Features Pack 2nd 3rd installing RDC 2nd Remote Desktop Protocol 2nd 3rd session encryption levels 2nd sessions 2nd Remote Desktop User Group 2nd SBC (Server Based Computing) 2nd Security Policy Editor Session Directory 2nd 3rd 4th Single Session policy software restriction policies Terminal Server License Manager Terminal Server Licensing 2nd client connections 2nd External Connector License Server Security Group policy 2nd licensing modes 2nd 3rd 4th management tools 2nd Prevent License Upgrade policy Resource Kit utilities 2nd upgrades Terminal Services Manager tsadmin.exe tscc.msc unattended installations WMI (Windows Management Instrumentation) WMIC 2nd Terminal Services (TS) Client [See Remote Desktop] Terminal Services Advanced Client [See TSAC] Terminal Services Configuration tool Terminal Services Connection Configuration [See TSCC] Terminal Services Manager 2nd terminology Universal Group Membership Caching 2nd testing Disaster Recovery Plan 2nd migration planning [See pilot (migration planning)] ProLiant server memory third-party memory 2nd tier components OVOW 2nd time services policies time synchronization 2nd external time sources 2nd in authentication process 2nd 3rd 4th 5th 6th in authorization process 2nd 3rd Kerberos policy configuration new features NTP server designation 2nd reliable time source designation 2nd 3rd security against attacks 2nd troubleshooting 2nd 3rd 4th Time To Live (TTL) stamp TLS (Transparent LAN Services) TNF (Transfer Neutral Format) tombstonelifetime attribute 2nd tombstonelifetime setting 2nd tools ***combine with utilities*** calculating ROI 2nd 3rd 4th 5th 6th cluster management (MSCS) new features 2nd 3rd 4th for ProLiant servers configuration tools 2nd 3rd 4th 5th deployment tools 2nd 3rd 4th 5th systems management tools 2nd 3rd 4th 5th 6th 7th 8th 9th FRS troubleshooting 2nd 3rd 4th 5th 6th 7th Group Policy management tools 2nd 3rd 4th 5th 6th in HP SIM 2nd intra- and inter-forest migrations 2nd migration planning ADMT 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Aelita Domain Migration Wizard 2nd BindView migration tools 2nd NetIQ migration tools 2nd ProLiant migration tools Quest Fastland Migrator 2nd pilot (migration planning) troubleshooting time synchronization 2nd 3rd 4th troubleshooting tools new features 2nd Tools directory (Deployment Server directory structure) Total Cost of Ownership 2nd [See TCO] training requirements assessment phase (migration planning) transaction logs Exchange 2003 2nd Transfer Neutral Format [See TNF] transferring roles (FSMO) 2nd Transparent LAN Services [See TLS] troubleshooting [See also best practices] Active Directory Account Lockout tools action plans 2nd 3rd 4th 5th 6th 7th 8th data collection 2nd 3rd 4th 5th DCDiag 2nd DCPromo 2nd 3rd 4th 5th 6th 7th defining problems 2nd 3rd DFS DNS 2nd event logs 2nd 3rd FRS Group Policy 2nd 3rd 4th NetDiag NLTest 2nd 3rd Remote Desktop replication 2nd 3rd 4th 5th SmartCards error messages general error messages 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th licensing error messages 2nd 3rd 4th 5th 6th 7th File Replication Service (FRS) 2nd 3rd 4th 5th 6th 7th 8th new features 2nd ProLiant proactive troubleshooting 2nd servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th utilities 2nd 3rd 4th 5th 6th 7th 8th ProLiant server setup 2nd RPC troubleshooting policies time synchronization 2nd 3rd 4th with OVOW 2nd 3rd 4th with Remote Desktop 2nd trust definitions Active Directory (AD) logical design 2nd 3rd 4th 5th Trusted Certifications dialog box (VCRM) Trusted Mode dialog box (VCRM) Trusted Publishers policy (Software Restriction Policies) Trusted Servers dialog box (VCRM) TS Client [See Remote Desktop] TSAC (Terminal Services Advanced Client) tsadmin.exe TSCC (Terminal Services Connection Configuration) tscc.msc Tsdiscon TSTCST.EXE TTL (Time To Live) stamp tunnels VPNs (Virtual Private Networks) 2nd |
< Day Day Up > |