Index A


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

A (host) records   2nd  
AAAA records  
accelerators
       hardware cryptographic accelerators   2nd  
       SSL (Secure Socket Layer) accelerators   2nd   3rd  
access points, placement of  
       distance   2nd  
       interference   2nd  
       power connections   2nd  
       RF attenuation   2nd   3rd  
       signal coverage   2nd  
       signal levels   2nd  
       wireless bridges   2nd  
       WLAN conflicts  
account forests  
account management events
       auditing   2nd  
ACLs (Access Control Lists)
       adding groups to   2nd  
ACT (Application Compatibility Tool Kit)   2nd   3rd   4th   5th   6th  
activating Windows Server 2003  
       activation process   2nd  
       licensing modes   2nd  
       product keys   2nd  
Active Directory   2nd   3rd   4th   5th   6th  
       Active Directory Client extensions   2nd  
       ADMT (Active Directory Migration Tool)   2nd   3rd  
               ADMT version 2.0  
                Group Account Migration Wizard   2nd  
               migrating resources   2nd  
               SID History field   2nd   3rd  
               User Migration Wizard   2nd  
       application partitions   2nd  
               creating   2nd  
               replicas   2nd  
               replication management   2nd  
       backing up   2nd  
       checking integrity of  
       checking size of  
       determining health of   2nd  
               DNS verification   2nd  
               Netdiag tool   2nd  
               Ntds.dit defragmentation   2nd   3rd  
               Replmon tool   2nd  
       domain controllers   2nd   3rd   4th  
               authentication traffic   2nd  
               compared to WAN connections   2nd  
               creating from backups   2nd  
               demoting to members servers   2nd   3rd  
               promoting member servers to   2nd   3rd  
               replicas   2nd   3rd  
               replication traffic   2nd  
       domains
               consolidating   2nd  
               moving objects between   2nd   3rd  
               multiple child domains   2nd  
               multiple discontinuous domains   2nd  
               placeholder root domains   2nd  
               single domain in-place upgrade   2nd   3rd  
       domains, renaming   2nd   3rd  
               cleanup tasks   2nd  
               current forest description  
               domain controller preparation  
               limitations   2nd  
               prerequisites   2nd  
               XML file modification   2nd  
       file sharing   2nd  
       forest trusts   2nd  
               authentication firewalls   2nd  
               configuring   2nd   3rd  
               cross-forest rights   2nd  
               one-way forest trusts  
               two-way forest trusts  
       forests
               account forests  
               cross-forest trusts   2nd   3rd   4th   5th   6th   7th   8th   9th  
               flexible forests   2nd  
               interforest synchronization   2nd   3rd  
               multiple forests   2nd  
               resource forests  
       FSMO (Flexible Single Master Operation) roles   2nd  
               Domain Naming Master  
               Infrastructure Master  
               moving   2nd   3rd   4th  
               PDC Emulator  
               placement of   2nd  
               RID Master  
               Schema Master  
       Functional Levels   2nd   3rd   4th  
       functional levels   2nd  
               Windows 2000 Mixed Domain Functional Level   2nd  
               Windows 2000 Native Functional Level   2nd  
               Windows 2003 Functional Level   2nd  
               Windows 2003 Interim Functional Level  
       GCs (Global Catalogs)   2nd  
       GCs (global catalogs)   2nd   3rd  
       GCs (Global Catalogs)
               attributes   2nd   3rd  
               customizing   2nd   3rd  
               placement of   2nd  
       GCs (global catalogs)
               placement of   2nd  
       GCs (Global Catalogs)
               universal group caching   2nd  
       Global Catalogs  
               defined  
               failure of   2nd   3rd  
               replication traffic  
       hardware requirements   2nd  
       integrating LDAP directories with   2nd  
               ADSI Edit snap-in   2nd  
                metadirectories   2nd  
               referrals   2nd   3rd  
       MIIS (Microsoft Identity Integration Server 2003)  
               broad conectivity  
               identity information   2nd   3rd   4th   5th   6th  
               Management Agents   2nd  
       monitoring   2nd   3rd  
       multi-master replication   2nd  
       NAS (Network Attached Storage)   2nd  
       OUs (Organizational Units)
               moving objects between   2nd  
       referrals
               creating   2nd   3rd  
       replication
               verifying   2nd  
       SANs (Storage Area Networks)   2nd  
       scaling  
               Active Directory Sizer tool   2nd  
               disk configuration   2nd  
               file locations   2nd   3rd  
               replication   2nd   3rd  
       schema   2nd  
               ADSI (Active Directory Service Interfaces) Edit utility   2nd  
                deactivating   2nd   3rd  
               Schema snap-in   2nd   3rd  
       shared folders
               creating   2nd  
       site resolution   2nd  
       sites   2nd  
               authentication   2nd  
               defined  
               site adoption   2nd  
               summarizing   2nd  
       small versus large implementations   2nd  
       standards   2nd  
       zones
               AD-integrated zones   2nd  
               secondary zones   2nd  
Active Directory Client extensions   2nd   3rd   4th  
Active Directory Installation Wizard  
Active Directory Management console  
Active Directory Migration Tool.   [See See ADMT]
Active Directory Schema snap-in   2nd   3rd  
Active Directory.   [See also DNS (Domain Name System)]
AD.   [See See Active Directory]2nd   [See See Active Directory]
Add Nodes Wizard  
Add/Remove Snap-in command (File menu)  
Add/Remove Snap-in dialog box  
addressing   2nd  
       DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  
               administrative delegation  
               APIPA (Automatic Private IP Addressing)   2nd  
               authorization   2nd  
               client service   2nd  
               database backup and restore automation   2nd  
               DDNS (Dynamic DNS)   2nd  
               design issues  
               domain controller security   2nd  
               fault tolerance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               installing   2nd   3rd  
               maintenance   2nd   3rd  
               Netsh tool   2nd  
               relay agents   2nd  
               scopes   2nd   3rd   4th   5th   6th  
               Windows XP clients   2nd  
       TCP/IP   2nd  
administration   2nd   3rd  
       ASR (Automated System Recovery)   2nd  
               bootstrap portion  
        audits  
               account management events   2nd  
               domain controller audit settings   2nd  
               security logs   2nd  
       backups  
               backup agents   2nd  
               dedicated backup VLANs   2nd  
               disk-to-tape backups   2nd  
               GFS (Grandfather, Father, Son) strategies   2nd  
               NTFS-level flagging  
               what to include/exclude   2nd  
       best practices   2nd  
       centralized administration   2nd  
       choosing   2nd  
       delegating  
               best practices   2nd  
               custom tasks   2nd   3rd  
               Delegation of Control Wizard   2nd   3rd   4th   5th  
               OUs (Organizational Units)   2nd  
               simple tasks   2nd  
       desktops.   [See See desktop management]
       DHCP (Dynamic Host Configuration Protocol) administrative delegation  
       distributed administration   2nd  
       Domain Admins Group   2nd   3rd  
       Enterprise Admins Group   2nd  
       functional levels   2nd  
               domain administrative functionality   2nd   3rd  
               forest administrative functionality   2nd  
               Windows 2000 mixed domain functional level  
               Windows 2000 native functional level  
               Windows Server 2003 functional level   2nd  
               Windows Server 2003 interim functional level  
       Group Policies  
               delegating rights with   2nd  
               enforcing administrator passwords with  
               enforcing group memberships with   2nd  
               linking to containers  
       mixed administration  
       remote.   [See See remote administration]
       role-based administration   2nd   3rd  
               best practices  
               directory service administrators   2nd  
               network administrators   2nd  
               Operations Managers  
               security administrators   2nd  
       security logs
               saving  
               sizing  
       Shadow Copy of Shared Folders   2nd  
               client setup  
               recovering corrupted files  
               recovering deleted files   2nd  
               recovering folders   2nd  
               recovering overwritten files  
       system maintenance   2nd   3rd  
               Active Directory database size  
               Active Directory integrity check  
               Active Directory replication   2nd  
               ASR (Automated System Recovery)   2nd   3rd  
               backups   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               backups, verifying   2nd   3rd  
               checklists   2nd  
               clustering  
               delegating tasks to IT staff  
               DHCP scopes  
               event logs   2nd  
               Five-9s   2nd  
               group audits   2nd  
               high-availability environments   2nd  
               maintenance windows   2nd  
               Scandisk   2nd  
               scripts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               server consolidation   2nd   3rd   4th  
               SUS (Software Update Service)   2nd   3rd   4th   5th   6th  
               system defragmentation   2nd  
               system reboot  
               system resources, checking availability of   2nd   3rd  
               system updates   2nd   3rd  
               test restores   2nd  
               WINS   2nd  
       testing  
               documentation   2nd  
               Group Policy Modeling   2nd  
               lab environments   2nd   3rd  
               RSoP (Resultant Set of Policy)   2nd  
Administration Tools Pack  
       Convenience Consoles   2nd  
       custom consoles   2nd  
       installing   2nd   3rd  
administration.   [See also monitoring Windows Server 2003]
administrative port security  
administrative templates   2nd  
       customizing   2nd  
       Microsoft add-on templates  
       preferences   2nd  
administrator workstations
       desktop management   2nd   3rd   4th   5th  
administrators
       administrator workstations
               desktop management   2nd   3rd   4th   5th  
       rights   2nd   3rd   4th  
       roles   2nd  
Adminpak.msi.   [See See Administration Tools Pack]
ADMT (Active Directory Migration Tool)   2nd   3rd  
       ADMT version 2.0  
       Group Account Migration Wizard   2nd  
       migrating resources   2nd  
       SID History field
               cleaning up  
               importance of   2nd  
       User Migration Wizard   2nd  
adoption (sites)   2nd  
ADSI (Active Directory Service Interfaces) Edit tool   2nd  
ADSI Edit   2nd   3rd  
ADSI Edit snap-in   2nd  
ADSI Editor
       removing servers with   2nd  
ADSI utilities  
Advanced Encryption Standard (AES)  
Advanced Encryption Standard (AES-256)  
AES (Advanced Encryption Standard)  
AES-256 (Advanced Encryption Standard)  
affinity types  
agents (backup)   2nd  
alerts  
       application-level alerts   2nd  
       hardware alerts  
       performance alerts   2nd  
       port-level alerts  
       potential problems   2nd  
       service-level alerts  
All Users profiles   2nd  
allocating
       Remote Storage media   2nd   3rd  
Allow permissions   2nd  
analyzing
       storage needs  
analyzing performance
       baselines
               benchmarks   2nd   3rd   4th  
               policy baselines   2nd   3rd  
               workload characterization   2nd  
       capacity analysis   2nd  
       counters
               % Privileged Time  
               % Processor Time  
               AXFR Request Received   2nd  
               AXFR Request Sent   2nd  
               AXFR Response Received   2nd  
               AXFR Success Received   2nd  
               AXFR Success Sent   2nd  
               Cache % Hit  
               Cache Page Fault Stalls/sec  
               Cache Page Faults/sec  
               Cache Size  
               Current Disk Queue Length  
               DYNAMIC UPDATE RECEIVED/Sec  
               File Operations Pending  
               Logical Disk-% Disk Time  
               Memory-Available Bytes  
               Memory-Page Faults/sec  
               Memory-Pages/sec  
               NBT Connection[ colon ] Bytes Total/sec  
               Paging File-% Usage-%  
               Physical Disk-% Disk Time  
               RECURSIVE QUERIES/Sec   2nd  
               RECURSIVE QUERY FAILURE/Sec  
               Redirector[colon] Bytes Total/sec  
               SECURE UPDATE RECEIVED/Sec  
               Server[colon] Bytes Total/sec  
               TCP QUERY RECEIVED/Sec  
               TCP RESPONSE SENT/Sec  
               TOTAL QUERY RECEIVED/Sec  
               TOTAL RESPONSE SENT/Sec  
               UDP QUERY RECEIVED/Sec  
               UDP RESPONSE SENT/Sec  
               VM Largest Block Size  
               VM Total 16MB Free Blocks  
               VM Total Free Blocks  
               VM Total Large Free Block Bytes  
       tools   2nd  
               Network Monitor   2nd   3rd  
               Performance Console   2nd   3rd  
               Task Manager   2nd   3rd  
               third-party tools   2nd  
animated dialer logon screens  
anonymous FTP (File Transfer Protocol)  
APIPA (Automatic Private IP Addressing)   2nd  
appending
       applications  
Application Compatibility Analyzer   2nd  
Application Compatibility Tool Kit   2nd   3rd  
Application Compatibility Tool Kit (ACT)   2nd   3rd  
Application Verifier  
application-level alerts   2nd  
application-level monitoring   2nd   3rd  
applications
       appending  
       application partitions   2nd  
               creating   2nd  
               replicas   2nd  
               replication management   2nd  
       application-level alerts   2nd  
       application-level monitoring   2nd   3rd  
       consolidating  
       multiprocessor-capable applications   2nd  
       n- tier application model   2nd  
       running
               Run As commnad  
Applications tab (Task Manager)  
applying
       administrative models   2nd   3rd   4th  
AppManager Suite  
archiving
       keys  
ASR (Automated System Recovery)   2nd   3rd   4th   5th   6th   7th  
       bootstrap portion  
       cluster service recovery   2nd   3rd  
       requirements   2nd  
assigning
       permissions
               with Group Policy   2nd   3rd  
       rights
               with Group Policy   2nd   3rd  
attachments
       sharing   2nd  
attenuation (RF)   2nd   3rd  
attributes
       GC (Global Catalog) attributes
               adding   2nd   3rd  
Audit mode (Sysprep)  
auditing
       events  
       file system   2nd  
       FTP (File Transfer Protocol)  
       group membership   2nd  
       Registry  
       remote administration   2nd  
       system security   2nd  
audits  
       account management events   2nd  
       domain controller audit settings   2nd  
       security auditing   2nd   3rd  
       security logs
               saving  
               sizing  
       Web site content auditing   2nd   3rd  
authentication   2nd  
       authentication firewalls   2nd  
       biometrics   2nd  
       CHAP (Challenge Handshake Authentication Protocol)  
       dual-client authentication   2nd  
       EAP (Extensible Authentication Protocol)  
       EAP-TLS authentication   2nd   3rd  
       HTTP authentication requests   2nd  
       IAS (Internet Authentication Service)  
               installing  
               IPSec   2nd   3rd  
               Terminal Services  
       IAS (Internet Authentication Services)
               wireless networks   2nd  
       machine accounts  
       PAP (Password Authentication Protocol)  
       RADIUS (Remote Authentication Dial-in User Service)   2nd   3rd   4th  
       site authentication
               controlling with DNS (Domain Name System)   2nd  
       smartcards   2nd   3rd   4th   5th   6th   7th  
               building security  
               choosing   2nd  
               email  
               enforcing   2nd  
               life expectancy   2nd  
               logins   2nd  
               management tools   2nd  
               memory requirements   2nd  
               Pocket PCs   2nd  
               roles   2nd  
               SIMs (Subscriber Identity Module) cards  
               single sign-on environments   2nd   3rd  
               Smart Phones   2nd  
                smartcard enrollment and authentication strategies  
               smartcard enrollment and authentication strategies;best practices   2nd  
               smartcard enrollment and authentication strategies;physical security   2nd  
               smartcard enrollment and authentication strategies;simplicity  
               smartcard readers   2nd  
       virtual directories   2nd  
       WPA (Wi-Fi Protected Access)  
authentication firewalls   2nd  
Authentication Methods dialog box  
authentication traffic   2nd  
authorization
       DHCP (Dynamic Host Configuration Protocol)   2nd  
auto-applications (CMAK)  
autoenrollment (certificate)  
Automated System Recovery.   [See See ASR]2nd   [See See ASR]
automated updates.   [See See SUS (Software Update Service)]
automated Windows Server 2003 installation   2nd   3rd   4th   5th  
       from CD-ROM   2nd  
       with MS-DOS startup disk  
Automatic Private IP Addressing (APIPA)   2nd  
Automatic Reconnection (Terminal Services)  
automatic software installations   2nd   3rd   4th   5th  
       best practices   2nd   3rd   4th  
       verifying installation   2nd  
automatically responding to problems  
       external scripts   2nd  
       services recovery and notification   2nd  
autorenewal (certificate)  
AXFR Request Received counter   2nd  
AXFR Request Sent counter   2nd  
AXFR Response Received counter   2nd  
AXFR Success Received counter   2nd  
AXFR Success Sent counter   2nd  



Microsoft Windows Server 2003 Insider Solutions
Microsoft Windows Server 2003 Insider Solutions
ISBN: 0672326094
EAN: 2147483647
Year: 2003
Pages: 325

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net