[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] A (host) records 2nd AAAA records accelerators hardware cryptographic accelerators 2nd SSL (Secure Socket Layer) accelerators 2nd 3rd access points, placement of distance 2nd interference 2nd power connections 2nd RF attenuation 2nd 3rd signal coverage 2nd signal levels 2nd wireless bridges 2nd WLAN conflicts account forests account management events auditing 2nd ACLs (Access Control Lists) adding groups to 2nd ACT (Application Compatibility Tool Kit) 2nd 3rd 4th 5th 6th activating Windows Server 2003 activation process 2nd licensing modes 2nd product keys 2nd Active Directory 2nd 3rd 4th 5th 6th Active Directory Client extensions 2nd ADMT (Active Directory Migration Tool) 2nd 3rd ADMT version 2.0 Group Account Migration Wizard 2nd migrating resources 2nd SID History field 2nd 3rd User Migration Wizard 2nd application partitions 2nd creating 2nd replicas 2nd replication management 2nd backing up 2nd checking integrity of checking size of determining health of 2nd DNS verification 2nd Netdiag tool 2nd Ntds.dit defragmentation 2nd 3rd Replmon tool 2nd domain controllers 2nd 3rd 4th authentication traffic 2nd compared to WAN connections 2nd creating from backups 2nd demoting to members servers 2nd 3rd promoting member servers to 2nd 3rd replicas 2nd 3rd replication traffic 2nd domains consolidating 2nd moving objects between 2nd 3rd multiple child domains 2nd multiple discontinuous domains 2nd placeholder root domains 2nd single domain in-place upgrade 2nd 3rd domains, renaming 2nd 3rd cleanup tasks 2nd current forest description domain controller preparation limitations 2nd prerequisites 2nd XML file modification 2nd file sharing 2nd forest trusts 2nd authentication firewalls 2nd configuring 2nd 3rd cross-forest rights 2nd one-way forest trusts two-way forest trusts forests account forests cross-forest trusts 2nd 3rd 4th 5th 6th 7th 8th 9th flexible forests 2nd interforest synchronization 2nd 3rd multiple forests 2nd resource forests FSMO (Flexible Single Master Operation) roles 2nd Domain Naming Master Infrastructure Master moving 2nd 3rd 4th PDC Emulator placement of 2nd RID Master Schema Master Functional Levels 2nd 3rd 4th functional levels 2nd Windows 2000 Mixed Domain Functional Level 2nd Windows 2000 Native Functional Level 2nd Windows 2003 Functional Level 2nd Windows 2003 Interim Functional Level GCs (Global Catalogs) 2nd GCs (global catalogs) 2nd 3rd GCs (Global Catalogs) attributes 2nd 3rd customizing 2nd 3rd placement of 2nd GCs (global catalogs) placement of 2nd GCs (Global Catalogs) universal group caching 2nd Global Catalogs defined failure of 2nd 3rd replication traffic hardware requirements 2nd integrating LDAP directories with 2nd ADSI Edit snap-in 2nd metadirectories 2nd referrals 2nd 3rd MIIS (Microsoft Identity Integration Server 2003) broad conectivity identity information 2nd 3rd 4th 5th 6th Management Agents 2nd monitoring 2nd 3rd multi-master replication 2nd NAS (Network Attached Storage) 2nd OUs (Organizational Units) moving objects between 2nd referrals creating 2nd 3rd replication verifying 2nd SANs (Storage Area Networks) 2nd scaling Active Directory Sizer tool 2nd disk configuration 2nd file locations 2nd 3rd replication 2nd 3rd schema 2nd ADSI (Active Directory Service Interfaces) Edit utility 2nd deactivating 2nd 3rd Schema snap-in 2nd 3rd shared folders creating 2nd site resolution 2nd sites 2nd authentication 2nd defined site adoption 2nd summarizing 2nd small versus large implementations 2nd standards 2nd zones AD-integrated zones 2nd secondary zones 2nd Active Directory Client extensions 2nd 3rd 4th Active Directory Installation Wizard Active Directory Management console Active Directory Migration Tool. [See See ADMT] Active Directory Schema snap-in 2nd 3rd Active Directory. [See also DNS (Domain Name System)] AD. [See See Active Directory]2nd [See See Active Directory] Add Nodes Wizard Add/Remove Snap-in command (File menu) Add/Remove Snap-in dialog box addressing 2nd DHCP (Dynamic Host Configuration Protocol) 2nd 3rd administrative delegation APIPA (Automatic Private IP Addressing) 2nd authorization 2nd client service 2nd database backup and restore automation 2nd DDNS (Dynamic DNS) 2nd design issues domain controller security 2nd fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th installing 2nd 3rd maintenance 2nd 3rd Netsh tool 2nd relay agents 2nd scopes 2nd 3rd 4th 5th 6th Windows XP clients 2nd TCP/IP 2nd administration 2nd 3rd ASR (Automated System Recovery) 2nd bootstrap portion audits account management events 2nd domain controller audit settings 2nd security logs 2nd backups backup agents 2nd dedicated backup VLANs 2nd disk-to-tape backups 2nd GFS (Grandfather, Father, Son) strategies 2nd NTFS-level flagging what to include/exclude 2nd best practices 2nd centralized administration 2nd choosing 2nd delegating best practices 2nd custom tasks 2nd 3rd Delegation of Control Wizard 2nd 3rd 4th 5th OUs (Organizational Units) 2nd simple tasks 2nd desktops. [See See desktop management] DHCP (Dynamic Host Configuration Protocol) administrative delegation distributed administration 2nd Domain Admins Group 2nd 3rd Enterprise Admins Group 2nd functional levels 2nd domain administrative functionality 2nd 3rd forest administrative functionality 2nd Windows 2000 mixed domain functional level Windows 2000 native functional level Windows Server 2003 functional level 2nd Windows Server 2003 interim functional level Group Policies delegating rights with 2nd enforcing administrator passwords with enforcing group memberships with 2nd linking to containers mixed administration remote. [See See remote administration] role-based administration 2nd 3rd best practices directory service administrators 2nd network administrators 2nd Operations Managers security administrators 2nd security logs saving sizing Shadow Copy of Shared Folders 2nd client setup recovering corrupted files recovering deleted files 2nd recovering folders 2nd recovering overwritten files system maintenance 2nd 3rd Active Directory database size Active Directory integrity check Active Directory replication 2nd ASR (Automated System Recovery) 2nd 3rd backups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th backups, verifying 2nd 3rd checklists 2nd clustering delegating tasks to IT staff DHCP scopes event logs 2nd Five-9s 2nd group audits 2nd high-availability environments 2nd maintenance windows 2nd Scandisk 2nd scripts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th server consolidation 2nd 3rd 4th SUS (Software Update Service) 2nd 3rd 4th 5th 6th system defragmentation 2nd system reboot system resources, checking availability of 2nd 3rd system updates 2nd 3rd test restores 2nd WINS 2nd testing documentation 2nd Group Policy Modeling 2nd lab environments 2nd 3rd RSoP (Resultant Set of Policy) 2nd Administration Tools Pack Convenience Consoles 2nd custom consoles 2nd installing 2nd 3rd administration. [See also monitoring Windows Server 2003] administrative port security administrative templates 2nd customizing 2nd Microsoft add-on templates preferences 2nd administrator workstations desktop management 2nd 3rd 4th 5th administrators administrator workstations desktop management 2nd 3rd 4th 5th rights 2nd 3rd 4th roles 2nd Adminpak.msi. [See See Administration Tools Pack] ADMT (Active Directory Migration Tool) 2nd 3rd ADMT version 2.0 Group Account Migration Wizard 2nd migrating resources 2nd SID History field cleaning up importance of 2nd User Migration Wizard 2nd adoption (sites) 2nd ADSI (Active Directory Service Interfaces) Edit tool 2nd ADSI Edit 2nd 3rd ADSI Edit snap-in 2nd ADSI Editor removing servers with 2nd ADSI utilities Advanced Encryption Standard (AES) Advanced Encryption Standard (AES-256) AES (Advanced Encryption Standard) AES-256 (Advanced Encryption Standard) affinity types agents (backup) 2nd alerts application-level alerts 2nd hardware alerts performance alerts 2nd port-level alerts potential problems 2nd service-level alerts All Users profiles 2nd allocating Remote Storage media 2nd 3rd Allow permissions 2nd analyzing storage needs analyzing performance baselines benchmarks 2nd 3rd 4th policy baselines 2nd 3rd workload characterization 2nd capacity analysis 2nd counters % Privileged Time % Processor Time AXFR Request Received 2nd AXFR Request Sent 2nd AXFR Response Received 2nd AXFR Success Received 2nd AXFR Success Sent 2nd Cache % Hit Cache Page Fault Stalls/sec Cache Page Faults/sec Cache Size Current Disk Queue Length DYNAMIC UPDATE RECEIVED/Sec File Operations Pending Logical Disk-% Disk Time Memory-Available Bytes Memory-Page Faults/sec Memory-Pages/sec NBT Connection[ colon ] Bytes Total/sec Paging File-% Usage-% Physical Disk-% Disk Time RECURSIVE QUERIES/Sec 2nd RECURSIVE QUERY FAILURE/Sec Redirector[colon] Bytes Total/sec SECURE UPDATE RECEIVED/Sec Server[colon] Bytes Total/sec TCP QUERY RECEIVED/Sec TCP RESPONSE SENT/Sec TOTAL QUERY RECEIVED/Sec TOTAL RESPONSE SENT/Sec UDP QUERY RECEIVED/Sec UDP RESPONSE SENT/Sec VM Largest Block Size VM Total 16MB Free Blocks VM Total Free Blocks VM Total Large Free Block Bytes tools 2nd Network Monitor 2nd 3rd Performance Console 2nd 3rd Task Manager 2nd 3rd third-party tools 2nd animated dialer logon screens anonymous FTP (File Transfer Protocol) APIPA (Automatic Private IP Addressing) 2nd appending applications Application Compatibility Analyzer 2nd Application Compatibility Tool Kit 2nd 3rd Application Compatibility Tool Kit (ACT) 2nd 3rd Application Verifier application-level alerts 2nd application-level monitoring 2nd 3rd applications appending application partitions 2nd creating 2nd replicas 2nd replication management 2nd application-level alerts 2nd application-level monitoring 2nd 3rd consolidating multiprocessor-capable applications 2nd n- tier application model 2nd running Run As commnad Applications tab (Task Manager) applying administrative models 2nd 3rd 4th AppManager Suite archiving keys ASR (Automated System Recovery) 2nd 3rd 4th 5th 6th 7th bootstrap portion cluster service recovery 2nd 3rd requirements 2nd assigning permissions with Group Policy 2nd 3rd rights with Group Policy 2nd 3rd attachments sharing 2nd attenuation (RF) 2nd 3rd attributes GC (Global Catalog) attributes adding 2nd 3rd Audit mode (Sysprep) auditing events file system 2nd FTP (File Transfer Protocol) group membership 2nd Registry remote administration 2nd system security 2nd audits account management events 2nd domain controller audit settings 2nd security auditing 2nd 3rd security logs saving sizing Web site content auditing 2nd 3rd authentication 2nd authentication firewalls 2nd biometrics 2nd CHAP (Challenge Handshake Authentication Protocol) dual-client authentication 2nd EAP (Extensible Authentication Protocol) EAP-TLS authentication 2nd 3rd HTTP authentication requests 2nd IAS (Internet Authentication Service) installing IPSec 2nd 3rd Terminal Services IAS (Internet Authentication Services) wireless networks 2nd machine accounts PAP (Password Authentication Protocol) RADIUS (Remote Authentication Dial-in User Service) 2nd 3rd 4th site authentication controlling with DNS (Domain Name System) 2nd smartcards 2nd 3rd 4th 5th 6th 7th building security choosing 2nd enforcing 2nd life expectancy 2nd logins 2nd management tools 2nd memory requirements 2nd Pocket PCs 2nd roles 2nd SIMs (Subscriber Identity Module) cards single sign-on environments 2nd 3rd Smart Phones 2nd smartcard enrollment and authentication strategies smartcard enrollment and authentication strategies;best practices 2nd smartcard enrollment and authentication strategies;physical security 2nd smartcard enrollment and authentication strategies;simplicity smartcard readers 2nd virtual directories 2nd WPA (Wi-Fi Protected Access) authentication firewalls 2nd Authentication Methods dialog box authentication traffic 2nd authorization DHCP (Dynamic Host Configuration Protocol) 2nd auto-applications (CMAK) autoenrollment (certificate) Automated System Recovery. [See See ASR]2nd [See See ASR] automated updates. [See See SUS (Software Update Service)] automated Windows Server 2003 installation 2nd 3rd 4th 5th from CD-ROM 2nd with MS-DOS startup disk Automatic Private IP Addressing (APIPA) 2nd Automatic Reconnection (Terminal Services) automatic software installations 2nd 3rd 4th 5th best practices 2nd 3rd 4th verifying installation 2nd automatically responding to problems external scripts 2nd services recovery and notification 2nd autorenewal (certificate) AXFR Request Received counter 2nd AXFR Request Sent counter 2nd AXFR Response Received counter 2nd AXFR Success Received counter 2nd AXFR Success Sent counter 2nd |