Index C


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

c- prefix (log files)  
c-ip field (log files  
cache
       client-side cache
               flushing  
       universal group caching   2nd  
Cache % Hit counter  
Cache Page Fault Stalls/sec counter  
Cache Page Faults/sec counter  
Cache Size counter  
caching
       universal group caching   2nd  
               benefits of  
               enabling   2nd  
caching-only servers  
CALs (client access licenses)  
Canonical Name (CNAME) records   2nd  
capacity analysis   2nd  
       counters
               % Privileged Time  
               % Processor Time  
               AXFR Request Received   2nd  
               AXFR Request Sent   2nd  
               AXFR Response Received   2nd  
               AXFR Success Received   2nd  
               AXFR Success Sent   2nd  
               Cache % Hit  
               Cache Page Fault Stalls/sec  
               Cache Page Faults/sec  
               Cache Size  
               Current Disk Queue Length  
               DYNAMIC UPDATE RECEIVED/Sec  
               File Operations Pending  
               Logical Disk-% Disk Time  
               Memory-Available Bytes  
               Memory-Page Faults/sec  
               Memory-Pages/sec  
               NBT Connection[ colon ] Bytes Total/sec  
               Paging File-% Usage-%  
               Physical Disk-% Disk Time  
               RECURSIVE QUERIES/Sec   2nd  
               RECURSIVE QUERY FAILURE/Sec  
               Redirector[colon] Bytes Total/sec  
               SECURE UPDATE RECEIVED/Sec  
               Server[colon] Bytes Total/sec  
               TCP QUERY RECEIVED/Sec  
               TCP RESPONSE SENT/Sec  
               TOTAL QUERY RECEIVED/Sec  
               TOTAL RESPONSE SENT/Sec  
               UDP QUERY RECEIVED/Sec  
               UDP RESPONSE SENT/Sec  
               VM Largest Block Size  
               VM Total 16MB Free Blocks  
               VM Total Free Blocks  
               VM Total Large Free Block Bytes  
       tools   2nd  
               Network Monitor   2nd   3rd  
               Performance Console   2nd   3rd  
               Task Manager   2nd   3rd  
               third-party tools   2nd  
CAs (certificate authorities)   2nd   3rd  
       backing up   2nd  
       Enterprise Root CAs   2nd   3rd  
       Enterprise Subordinate CAs  
       fault tolerance  
       Standalone Root CAs  
       Standalone Subordinate CAs  
catalog (global)   2nd   3rd  
       placement of   2nd  
catalogs
       GCs (Global Catalogs)   2nd  
               attributes   2nd   3rd  
               customizing   2nd   3rd  
               placement of   2nd  
               universal group caching   2nd  
       Global Catalogs (AD)  
               defined  
               failure of   2nd   3rd  
               replication traffic  
catalogs (global)
       redundant global catalogs   2nd  
CD-ROMs
       installing Windows Server 2003 from   2nd  
CDs
       custom install CDs   2nd  
               third-party tools   2nd  
Celestix  
centralization of identity information   2nd  
centralized administration   2nd  
certificate authorities.   [See See CAs]
certificate revocation lists (CRLs)  
Certificate Services   2nd   3rd  
       administrative roles   2nd  
       CAs (certificate authorities)   2nd   3rd  
               backing up   2nd  
               Enterprise Root CAs   2nd   3rd  
               Enterprise Subordinate CAs  
               fault tolerance  
               Standalone Root CAs  
               Standalone Subordinate CAs  
       certificate autoenrollment  
       certificate autorenewal  
       certificate server integrity  
       certificate templates
               flexibility of  
       certificates
               pushing to clients  
       cross certification  
       delta CRLs (certificate revocation lists)  
       event auditing  
       fault tolerance   2nd  
       FCBA (Federal Bridge Certificate Authority)  
       installing   2nd   3rd  
       key archival  
       key counting  
       role-based administration  
       server roles   2nd  
       server security  
       smart card certificates   2nd  
       wireless networks   2nd   3rd   4th  
certificates   2nd  
       (Certificate Services)  
       administrative roles   2nd  
       autoenrollment  
       autorenewal  
       CAs (certificate authorities)   2nd   3rd  
               backing up   2nd  
               Enterprise Root CAs   2nd   3rd  
               Enterprise Subordinate CAs  
               fault tolerance  
               Standalone Root CAs  
               Standalone Subordinate CAs  
       certificate server integrity  
       Certificate Services installation   2nd   3rd  
       cross certification  
       delta CRLs (certificate revocation lists)  
       event auditing  
       fault tolerance   2nd  
       FCBA (Federal Bridge Certificate Authority)  
       key archival  
       key counting  
       pushing to clients  
       role-based administration  
       server roles   2nd  
       server security  
       smart card certificates   2nd  
       templates
               flexibility of  
       X.509  
Challenge Handshake Authentication Protocol (CHAP)  
channels
       choosing  
CHAP (Challenge Handshake Authentication Protocol)  
checking
       Active Directory database integrity  
       Active Directory database size  
       availability of system resources   2nd   3rd  
       DHCP scopes  
       system updates   2nd   3rd  
       WINS for corruption   2nd  
checking in/out documents   2nd  
checklists   2nd  
choosing
       administrative models   2nd   3rd  
               best practices   2nd  
               centralized administration   2nd  
               distributed administration   2nd  
               mixed administration  
       file systems  
       group type  
       memory   2nd  
       monitoring packages   2nd  
       processors  
       smartcards   2nd  
       wireless channels  
Class C affinity type  
Clean mode (Sysprep)  
clean Windows Server 2003 installations   2nd   3rd   4th  
client access licenses (CALs)  
client-side cache
       flushing  
Client/Server data redirection section (Terminal Services)  
clients
       DHCP (Dynamic Host Configuration Protocol)   2nd  
       duel-client approach (Novell networks)   2nd  
       L2TP (Layer 2 Tunneling Protocol)   2nd  
       NFS Client   2nd  
       PPTP (Point-to-Point Tunneling Protocol)   2nd  
       pushing certificates to  
       shadow copies clients  
       smbclient   2nd  
       supporting during Windows 2000 to Windows Server migration  
               Active Directory Client extensions   2nd  
               legacy client support   2nd  
       supporting during Windows NT to Windows Server migration   2nd  
               Active Directory Client extensions   2nd  
               load balancing domain authentication   2nd  
               local domain controller policy   2nd  
               PC emulation   2nd   3rd  
       Windows XP clients
               DHCP (Dynamic Host Configuration Protocol)   2nd  
       wireless clients   2nd   3rd   4th  
               WEP client support  
               WPA (Wi-Fi Protected Access)   2nd   3rd  
Closest Site Selection   2nd  
CLR (Common Language Runtime)  
clustering   2nd  
clusters
       DHCP (Dynamic Host Configuration Protocol)  
       MSCS (Microsoft Cluster Service)   2nd  
               best practices   2nd  
               configuring  
               failover   2nd  
               feedback   2nd  
               installing   2nd   3rd   4th   5th   6th   7th  
               MNS (Majority Mode Set) clusters   2nd  
                single-node clusters  
               single-quorum device clusters  
       multinode clusters   2nd  
       NLB (Network Load Balancing) clusters
               adding nodes to   2nd  
               creating   2nd   3rd  
       recovering   2nd   3rd  
CMAK (Connection Manager Administration Kit)   2nd  
       animated dialer logon screen  
       appending applications  
       auto-applications  
       connect actions  
       connection status  
       desktop/tray icons  
       encrypted connections  
       help file  
       language support  
       license agreement  
       multiple service types, support for  
       passwords  
       phone book   2nd  
       realm name prefix/suffix  
       service profiles  
       support phone number  
CN Attributes dialog box  
CNAME (Canonical Name) records   2nd  
code listings
       /etc/printcap file  
coexisting domains   2nd  
       network services consolidation   2nd  
       SID History   2nd   3rd  
       third-party tools   2nd  
Collector.exe  
command-line interfaces   2nd  
commands
       bootcfg  
               /BAUD parameter  
               /EMS parameter  
               /ID parameter  
               /P parameter  
               /PORT parameter  
               /S parameter  
               /U parameter  
       dcpromo  
       DNSCMD  
       File menu commands
               Add/Remove Snap-in  
       ipconfig   2nd  
       Net Add User  
       nslookup  
       ntbackup  
       ping  
       quit  
       regsvr32  
commans
       NTDSUTIL  
Common Language Runtime.   [See See CLR]
company acquisition   2nd  
company reputation, security and  
CompanyABC security scenario   2nd   3rd  
Compatibility Administrator   2nd  
Compatibility Check Tool   2nd  
compatibility of hardware   2nd  
compatibility of processors  
Computer Associates Web site  
Computer Measurement Group  
computer policies   2nd  
Con2prt.exe tool   2nd  
conditional forwarding  
configuration
       SFNW (Services for NetWare)   2nd  
Configure Your Server Wizard   2nd   3rd  
       DNS (Domain Name System) installation   2nd   3rd   4th   5th   6th  
configuring
       ADSI Edit snap-in   2nd  
       backup devices   2nd  
       desktop migration accounts   2nd  
       DFS (Distributed File System)   2nd  
       disconnect timeouts  
       DNS (Domain Name System)   2nd   3rd  
       forest trusts   2nd   3rd  
       Group Policy
               Wireless Network (IEEE 802.11) Policies  
       hard disks   2nd  
       Keepalive   2nd  
       MSCS (Microsoft Cluster Service)  
       PC emulation   2nd   3rd  
       push/pull partners   2nd  
       Remote Storage   2nd   3rd   4th  
       reset timeouts  
       Samba   2nd   3rd  
       server roles   2nd   3rd  
       Session Directory   2nd  
       slow links   2nd  
       volume shadow copies   2nd   3rd  
       wireless clients   2nd   3rd   4th  
               WEP client support  
               WPA (Wi-Fi Protected Access)   2nd   3rd  
conflicts
       WLAN conflicts  
connect actions (CMAK)  
Connection Manager Administration Kit.   [See See CMAK]
Connection Settings dialog box  
connection status (CMAK)  
connections
       in- band connections  
       out-of-band connections  
       serial connections
               configuring for EMS (Emergency Management Service)   2nd  
               SPCR (Serial Port Console Redirection)  
console mode (Remote Desktop for Administration)  
consoles
       Convenience Consoles   2nd  
       custom administration consoles   2nd  
       Recovery Console
               installing   2nd  
       SAC (Special Administration Console)   2nd  
consolidating
       applications  
       directories  
       domains   2nd   3rd  
       file shares  
       log files   2nd  
       phone lines   2nd  
       printers  
       services   2nd  
consolidating servers   2nd  
       exchange servers   2nd  
       file servers   2nd  
       virtual servers   2nd  
       WSRM (Windows System Resource Manager)  
Constrained Delegation  
consumers
       permanent event consumers   2nd  
       temporary event consumers  
contacts
       mail-enabled contacts, creating   2nd   3rd  
containers
       linking Group Policies to  
controllers
       domain controllers   2nd   3rd   4th  
               Audit Policy setting   2nd  
               authentication traffic   2nd  
               compared to WAN connections   2nd  
               creating from backups   2nd  
               demoting to members servers   2nd   3rd  
               performance optimization  
               promoting member servers to   2nd   3rd  
               replicas   2nd   3rd  
               replication traffic   2nd  
               selecting   2nd  
controllers.   [See See domain controllers]
Convenience Consoles   2nd  
converting
       distribution groups to security groups   2nd  
       groups  
Converting Groups feature  
copying
       GPOs (Group Policy Objects)  
corrupted files
       recovering  
counters
       % Privileged Time  
       % Processor Time  
       AXFR Request Received   2nd  
       AXFR Request Sent   2nd  
       AXFR Response Received   2nd  
       AXFR Success Received   2nd  
       AXFR Success Sent   2nd  
       Cache % Hit  
       Cache Page Fault Stalls/sec  
       Cache Page Faults/sec  
       Cache Size  
       Current Disk Queue Length  
       DYNAMIC UPDATE RECEIVED/Sec  
       File Operations Pending  
       Logical Disk-% Disk Time  
       Memory-Available Bytes  
       Memory-Page Faults/sec  
       Memory-Pages/sec  
       NBT Connection[colon] Bytes Total/sec  
       Paging File-% Usage-%  
       Physical Disk-% Disk Time  
       RECURSIVE QUERIES/Sec   2nd  
       RECURSIVE QUERY FAILURE/Sec  
       Redirector[colon] Bytes Total/sec  
       SECURE UPDATE RECEIVED/Sec  
       Server[colon] Bytes Total/sec  
       TCP QUERY RECEIVED/Sec  
       TCP RESPONSE SENT/Sec  
       TOTAL QUERY RECEIVED/Sec  
       TOTAL RESPONSE SENT/Sec  
       UDP QUERY RECEIVED/Sec  
       UDP RESPONSE SENT/Sec  
       VM Largest Block Size  
       VM Total 16MB Free Blocks  
       VM Total Free Blocks  
       VM Total Large Free Block Bytes  
counting
       keys  
Credential Manager  
CRLs (certificate revocation lists)  
cross certification  
cross-domain policy assignments  
cross-forest rights   2nd  
cross-forest trusts   2nd   3rd   4th  
       account/resource forests  
       company acquisition   2nd  
       creating   2nd   3rd  
Cryptographic Service Providers (CSPs)   2nd  
cs (cookie) field (log files  
cs (referrer) field (log files  
cs (user agent) field (log files  
cs- prefix (log files)  
cs-bytes status field (log files  
cs-host field (log files  
cs-method field (log files  
cs-status field (log files  
cs-uri-query field (log files  
cs-uri-stem field (log files  
cs-username field (log files  
cs-version field (log files  
CScript.exe  
CSPs (Cryptographic Service Providers)   2nd  
Current Disk Queue Length counter  
custom install CDs   2nd  
       third-party tools   2nd  
       WinPE (Windows Preinstallation Environment)   2nd  
customizing
       administration consoles   2nd  
       administrative templates   2nd  
       GCs (Global Catalogs)   2nd   3rd  
       MMC view  
       servers
               Configure Your Server Wizard   2nd   3rd  
               Manage Your Server utility   2nd  



Microsoft Windows Server 2003 Insider Solutions
Microsoft Windows Server 2003 Insider Solutions
ISBN: 0672326094
EAN: 2147483647
Year: 2003
Pages: 325

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net