[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] L2TP (Layer 2 Tunneling Protocol) client requirements 2nd in series with firewalls 2nd parallel to firewalls 2nd remote access policies 2nd security 2nd 3rd lab environments, testing administrative access in 2nd 3rd language support (CMAK) LanMan (LM) hashes, disabling local storage of 2nd large businesses WSS (Windows SharePoint Services) deployment 2nd latency zero latency Layer 2 Tunneling Protocol. [See See L2TP] LDAP (Lightweight Directory Access Protocol) LDAP directories integrating with Active Directory 2nd ADSI Edit snap-in 2nd metadirectories 2nd referrals 2nd 3rd LDAP-based systems 2nd 3rd 4th 5th 6th Active Directory standards 2nd directory services 2nd DNS (Domain Name Service) 2nd BIND (Berkeley Internet Name Domain) DNS name resolution 2nd SRV (Service) resource records DNS (Domain Name Services) SRV (Service) resource records file sharing NFS Client 2nd Samba 2nd 3rd smbclient 2nd Telnet 2nd integration/migration plans 2nd LDAP directory integration 2nd ADSI Edit snap-in 2nd metadirectories 2nd referrals 2nd 3rd management Active Directory Schema snap-in 2nd 3rd MMC (Microsoft Management Console) 2nd Telnet migrating to Windows Server 2003 directory services file share consolidation printer consolidation password synchronization 2nd 3rd 4th Print Services 2nd 3rd 4th 5th 6th 7th legacy clients , supporting 2nd legacy Microsoft NetBIOS resolution 2nd levels functional levels 2nd Windows 2000 Mixed Domain Functional Level 2nd Windows 2000 Native Functional Level 2nd Windows 2003 Functional Level 2nd Windows 2003 Interim Functional Level license agreement (CMAK) licensing CALs (client access licenses) Per Device mode Per Server mode product keys 2nd Retail Media Activation Keys Volume Licensing Activation Keys licensing modes 2nd Licensing section (Terminal Services) life expectancy of servers 2nd Lightweight Directory Access Protocol (LDAP) lines, consolidating 2nd Link Enabled setting setting ( Group Policy) linking GPOs (Group Policy Objects) 2nd Group Policies to containers WMI filters 2nd links slow links configuring 2nd detecting determining speed of 2nd effect on sites 2nd Slow Link Detection 2nd lists CRLs (certificate revocation lists) LM (LanMan) hashes, disabling local storage of 2nd LMHOSTS file load balancing 2nd Terminal Service 2nd Terminal Services 2nd load balanding domain authentication 2nd loading balancing. [See See NLB (Network Load Balancing)] LoadState.exe file local drives Terminal Services 2nd local printing 2nd local profiles 2nd local resources 2nd local drives 2nd local printing 2nd locking file system group membership 2nd NTFS (NT File System) 2nd rights floppy drives 2nd FTP (File Transfer Protocol) account lockout IIS (Internet Information Services) 2nd servers terminal servers 2nd log files consolidating 2nd querying for stop errors 2nd security logs saving sizing W3C Extended Logging fields 2nd 3rd prefixes writing to log shipping logging FTP (File Transfer Protocol) logging 2nd logging mode (RSoP) Logical Disk Manager 2nd Logical Disk-% Disk Time counter login process single sign-on environments 2nd application consolidation directory consolidation smartcards 2nd logon process FTP logon time restrictions single sign-on environments Novell networks 2nd 3rd 4th 5th logs event log 2nd reading 2nd 3rd 4th 5th loopback (Group Policy) 2nd loopback processing Terminal Services 2nd |