[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] back-planes backing up CAs (certificate authorities) 2nd GPOs (Group Policy Objects) MSDSS (Microsoft Directory Synchronization Services) 2nd Registry backup agents 2nd Backup Wizard backups Active Directory 2nd backup agents 2nd backup devices configuring 2nd creating domain controllers from 2nd dedicated backup VLANs 2nd DHCP (Dynamic Host Configuration Protocol) databases 2nd disk-to-tape backups 2nd GFS (Grandfather, Father, Son) strategies 2nd NAS (Network Attached Storage) 2nd 3rd 4th NTFS-level flagging SANs (Storage Area Networks) 2nd 3rd 4th verifying 2nd 3rd Web sites what to include/exclude 2nd WINS database balancing. [See See load balancing] baselines benchmarks 2nd 3rd 4th policy baselines 2nd 3rd workload characterization 2nd Basic authentication BAUD (/BAUD) parameter (bootcfg command) benchmarks 2nd 3rd 4th Berkeley Internet Name Domain (BIND) DNS BIND (Berkeley Internet Name Domain) DNS BIND servers Bindery option (Novell) 2nd biometrics 2nd BIOS updating 2nd 3rd blind-put access Block Policy Inheritance setting (Group Policy) BMC Software Web site boot disks creating boot process NAS (Network Attached Storage) 2nd SANs (Storage Area Networks) 2nd bootcfg command /BAUD parameter /EMS parameter /ID parameter /P parameter /PORT parameter /S parameter /U parameter bridges wireless bridges 2nd buildings securing with smartcards buying tips disk subsystems 2nd hardware 2nd memory 2nd processors |