[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] n- tier application model 2nd name resolution 2nd DNS (Domain Name Service) 2nd DNS (Domain Name System) 2nd 3rd 4th caching-only servers configuring 2nd 3rd DDNS (Dynamic DNS) 2nd 3rd 4th 5th dynamic updates forwarders 2nd 3rd framework for Hints file 2nd impact on Active Directory 2nd importance of 2nd installing 2nd 3rd 4th 5th 6th monitoring namespaces 2nd non-Microsoft DNS implementations 2nd queries 2nd 3rd 4th resource records 2nd 3rd 4th 5th 6th 7th 8th 9th scavenging 2nd secure updates 2nd site resolution 2nd troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th TTL (Time to Live) 2nd 3rd Unicode character support 2nd Windows Server 2003 enhancements 2nd 3rd WINS (Windows Internet Naming Service) 2nd 3rd 4th zone transfers 2nd 3rd 4th 5th 6th 7th zones 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th Windows NT to Windows Server migrations 2nd 3rd 4th 5th 6th 7th WINS (Windows Internet Naming Service) 2nd 3rd 4th database maintenance 2nd environment design 2nd installing 2nd integrating with DNS 2nd legacy Microsoft NetBIOS resolution 2nd LMHOSTS file NetBIOS client resolution 2nd push/pull partners 2nd replication 2nd upgrading 2nd 3rd Windows Server 2003 enhancements 2nd WINS (Windows Internet Naming Services) installing 2nd mixed-mode environments TCP/IP properties 2nd 3rd uninstalling 2nd Name Server (NS) records 2nd names realm names namespaces 2nd naming conventions Group Policy 2nd NAS (Network Attached Storage) 2nd Active Directory integration 2nd backups 2nd 3rd 4th best practices 2nd booting from 2nd defined 2nd deploying designing connectivity 2nd disk drives 2nd multiple spindles developing 2nd DFS (Distributed File System) 2nd disk quotas EFS (Encrypted File System) fault tolerance 2nd file servers 2nd implementation process 2nd Logical Disk Manager 2nd needs analysis piloting planning 2nd Remote Storage 2nd server consolidation exchange servers 2nd file servers 2nd single MAC address conversations SQL (Standard Query Language) 2nd 3rd system recovery 2nd Terminal Services 2nd National Institute of Standards (NIST) template guidelines National Security Agency (NSA) template guidelines native functional level (Windows 2000) NBT Connection[ colon ] Bytes Total/sec counter NDS (Novell Directory Service) synchronizing with eDirectory 2nd 3rd nesting groups Nesting Groups feature NET (.NET) Passport Integration Net Add User command NetBIOS client resolution Netdiag tool 2nd Netdom.exe tool 2nd NetIQ Web site Netsh tool 2nd NetWare. [See See Novell networks] network addressing. [See See addressing] network administrators 2nd Network Attached Storage (NAS) 2nd Network Attached Storage. [See See NAS] Network Configuration Operators group network downtime, avoiding 2nd Network Information System (NIS) password synchronization 2nd 3rd 4th Network Load Balancing. [See See NLB] Network Monitor 2nd 3rd installing 2nd network operating system (NOS) Network Properties tab (Wireless Network (IEEE 802.11) Policies) 2nd Network Stumbler Web site Networking tab (Task Manager) networks addressing 2nd DHCP (Dynamic Host Configuration Protocol) TCP/IP 2nd addressing. [See also DHCP (Dynamic Host Configuration Protocol)]2nd [See also DHCP (Dynamic Host Configuration Protocol)] DAS (Direct Attached Storage) defined 2nd monitoring 2nd 3rd NAS (Network Attached Storage) Active Directory integration 2nd backups 2nd 3rd 4th best practices 2nd booting from 2nd defined 2nd deploying designing 2nd 3rd 4th 5th 6th developing 2nd DFS (Distributed File System) 2nd disk quotas EFS (Encrypted File System) fault tolerance 2nd file servers 2nd implementation process 2nd Logical Disk Manager 2nd needs analysis piloting planning 2nd Remote Storage 2nd server consolidation 2nd 3rd 4th 5th single MAC address conversations SQL (Standard Query Language) 2nd 3rd system recovery 2nd Terminal Services 2nd NOS (network operating system) Novell. [See See Novell networks] out-of- band networks SANs (Storage Area Networks) 2nd Active Directory integration 2nd backups 2nd 3rd 4th best practices 2nd booting from 2nd defined 2nd deploying designing 2nd 3rd 4th 5th 6th developing 2nd DFS (Distributed File System) 2nd disk quotas EFS (Encrypted File System) fault tolerance 2nd file servers 2nd implementation process 2nd Logical Disk Manager 2nd needs analysis piloting planning 2nd Remote Storage 2nd server consolidation 2nd 3rd 4th 5th SQL (Standard Query Language) 2nd 3rd system recovery 2nd Terminal Services 2nd zero latency trusted networks 2nd VPNs (Virtual Private Networks) 2nd 3rd Celestix CMAK (Connection Manager Administration Kit) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th designing 2nd firewall-based VPNs 2nd Group Policy 2nd hardware-based VPNs 2nd IAS (Internet Authentication Service) 2nd 3rd 4th 5th 6th L2TP (Layer 2 Tunneling Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th line consolidation 2nd load balancing 2nd PPTP (Point-to-Point Tunneling Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th RADIUS (Remote Authentication Dial-in User Service) 2nd 3rd 4th RRAS (Routing and Remote Access Services) 2nd site-to-site VPNs 2nd 3rd 4th softmodems 2nd wireless networks 2nd 3rd 4th WANs (wide area networks) compared to domain controllers 2nd wireless networks 2nd access point placement 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th Certificate Services 2nd 3rd 4th channels client configuration 2nd 3rd 4th 5th 6th 7th 8th EAP-TLS authentication 2nd 3rd Group Policy 2nd IAS (Internet Authentication Services) 2nd IEEE 802.11e standard IEEE 802.11f standard IEEE 802.11h standard IEEE 802.11i standard 2nd IEEE 802.1x standard 2nd interference 2nd 3rd 4th monitoring 2nd online resources 2nd security tips 2nd VPNs (Virtual Private Networks) 2nd 3rd 4th Wireless Network (IEEE 802.11) Policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th WPA (Wi-Fi Protected Access) 2nd 3rd 4th 5th 6th 7th 8th networks. [See also security]2nd [See also name resolution] New Server Cluster Wizard NFS Client 2nd NIS (Network Information System) password synchronization 2nd 3rd 4th NIST (National Institute of Standards) template guidelines NLB (Network Load Balancing) 2nd 3rd 4th best practices 2nd clusters adding nodes to 2nd creating 2nd 3rd Disable Port Range filtering mode Multiple Host Range filtering mode Single Host filtering mode non-Microsoft DNS implementations 2nd None affinity type NOS (network operating system) Novell networks directory synchronization 2nd 3rd duel-client approach 2nd FMU (File Migration Utility) 2nd 3rd 4th 5th FPNW (File and Print Services for NetWare) 2nd installing 2nd 3rd GSNW (Gateway Services for NetWare) 2nd 3rd installing 2nd MSDSS (Microsoft Directory Synchronization Services) 2nd backing up 2nd best practices 2nd installing 2nd 3rd servers, replacing with Windows servers 2nd SFNW (Services for NetWare) 2nd 3rd 4th single sign-on environments directory synchronization 2nd dual-client authentication 2nd eDirectory/NDS synchronization 2nd 3rd Terminal Services 2nd 3rd Web Services 2nd Windows servers 2nd NS (Name Server) records 2nd NSA (National Security Agency) template guidelines nslookup command NSLOOKUP tool 2nd ntbackup command Ntds.dit file defragmentation 2nd 3rd NTDSUTIL command NTFS (NT File System) locking file system 2nd permissions 2nd setting 2nd 3rd 4th 5th NTFS-level flagging |