Index P


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

P (/P) parameter (bootcfg command)  
Paging File-% Usage-% counter  
PAP (Password Authentication Protocol)  
parity, disk striping with   2nd  
partitions
       formatting   2nd  
        Windows NT to Windows Server migrations  
               mirrored volumes  
               striped sets  
               striped sets with parity  
               volume sets  
partitions (application)   2nd  
       creating   2nd  
       replicas   2nd  
       replication management   2nd  
Passport Integration  
Password Authentication Protocol (PAP)  
Password Export Server  
Password Export servers  
       encryption keys   2nd  
       permissions   2nd  
       security requirements   2nd  
passwords
       administrator passwords
               enforcing with Group Policy  
       CMAK (Connection Manager Administration Kit)  
       FTP (File Transfer Protocol)  
       synchronizing   2nd  
               LDAP   2nd  
               NIS (Network Information System)   2nd   3rd   4th  
               Unix   2nd   3rd   4th  
       Windows NT to Windows Server 2003 migration   2nd  
               encryption keys   2nd  
               Password Export servers  
               permissions   2nd  
               security requirements   2nd  
               testing  
patches  
       Web servers   2nd   3rd   4th  
PATROL  
PC emulation
       configuring   2nd   3rd  
PDC Emulator role  
Per Device mode  
Per Server mode  
PerfMan  
performance
       monitoring   2nd  
       performance alerts   2nd  
performance alerts   2nd  
Performance Console   2nd  
       % Privileged Time  
       % Processor Time  
       AXFR Request Received counter   2nd  
       AXFR Request Sent counter  
       AXFR Request Sentcounter  
       AXFR Response Received counter   2nd  
       AXFR Success Received counter   2nd  
       AXFR Success Sent counter   2nd  
       Cache % Hit  
       Cache Page Fault Stalls/sec  
       Cache Page Faults/sec  
       Cache Size  
       Current Disk Queue Length  
       DYNAMIC UPDATE RECEIVED/Sec counter  
       File Operations Pending  
       Logical Disk-% Disk Time  
       Memory-Available Bytes  
       Memory-Page Faults/sec counter  
       Memory-Pages/sec counter  
       NBT Connection[ colon ] Bytes Total/sec  
       Paging File-% Usage-%  
       Physical Disk-% Disk Time  
       RECURSIVE QUERIES/Sec counter   2nd  
       RECURSIVE QUERY FAILURE/Sec counter  
       Redirector[colon] Bytes Total/sec  
       SECURE UPDATE RECEIVED/Sec counter  
       Server[colon] Bytes Total/sec  
       TCP QUERY RECEIVED/Sec counter  
       TCP RESPONSE SENT/Sec counter  
       TOTAL QUERY RECEIVED/Sec counter  
       TOTAL RESPONSE SENT/Sec counter  
       UDP QUERY RECEIVED/Sec counter  
       UDP RESPONSE SENT/Sec counter  
       VM Largest Block Size  
       VM Total 16MB Free Blocks  
       VM Total Free Blocks  
       VM Total Large Free Block Bytes  
Performance Monitor  
Performance Monitor Provider  
performance optimization  
       Active Directory   2nd   3rd  
       baselines
               benchmarks   2nd   3rd   4th  
               policy baselines   2nd   3rd  
               workload characterization   2nd  
       capacity analysis   2nd  
       counters
               % Privileged Time  
               % Processor Time  
               AXFR Request Received   2nd  
               AXFR Request Sent   2nd  
               AXFR Response Received   2nd  
               AXFR Success Received   2nd  
               AXFR Success Sent   2nd  
               Cache % Hit  
               Cache Page Fault Stalls/sec  
               Cache Page Faults/sec  
               Cache Size  
               Current Disk Queue Length  
               DYNAMIC UPDATE RECEIVED/Sec  
               File Operations Pending  
               Logical Disk-% Disk Time  
               Memory-Available Bytes  
               Memory-Page Faults/sec  
               Memory-Pages/sec  
               NBT Connection[colon] Bytes Total/sec  
               Paging File-% Usage-%  
               Physical Disk-% Disk Time  
               RECURSIVE QUERIES/Sec   2nd  
               RECURSIVE QUERY FAILURE/Sec  
               Redirector[colon] Bytes Total/sec  
               SECURE UPDATE RECEIVED/Sec  
               Server[colon] Bytes Total/sec  
               TCP QUERY RECEIVED/Sec  
               TCP RESPONSE SENT/Sec  
               TOTAL QUERY RECEIVED/Sec  
               TOTAL RESPONSE SENT/Sec  
               UDP QUERY RECEIVED/Sec  
               UDP RESPONSE SENT/Sec  
               VM Largest Block Size  
               VM Total 16MB Free Blocks  
               VM Total Free Blocks  
               VM Total Large Free Block Bytes  
       disk subsystem  
               file systems  
               monitoring   2nd  
               RAID   2nd   3rd   4th   5th   6th   7th   8th  
       DNS (Domain Name System)   2nd   3rd   4th  
       domain controllers  
       local printing   2nd  
       memory subsystems   2nd  
       network subsystem
               monitoring   2nd   3rd  
       processors   2nd  
       replication   2nd  
       Terminal Services   2nd   3rd   4th  
               profile redirection   2nd   3rd  
       tools   2nd  
               Network Monitor   2nd   3rd  
               Performance Console   2nd   3rd  
               Task Manager   2nd   3rd  
               third-party tools   2nd  
       virtual memory   2nd   3rd  
Performance tab (Task Manager)  
permanent event consumers   2nd  
permissions
       Active Directory shared folders   2nd  
       administrators   2nd  
       Allow/Deny permissions   2nd  
       assigning with Group Policy   2nd   3rd   4th   5th   6th  
       compared to rights  
       FTP (File Transfer Protocol) logging  
       highly managed users   2nd  
       mobile users   2nd   3rd  
       NTFS (NT File System) permissions   2nd  
               setting   2nd   3rd   4th   5th  
       password migration   2nd  
       Registry permissions   2nd   3rd   4th  
       removing   2nd  
       SUS (Software Update Service)  
       Terminal Services  
       virtual directories  
               virtual directories mapped to local directories   2nd  
               virtual directories mapped to Windows shares   2nd  
       windows NT to Windows Server 2003 migration
               desktop permission configuration   2nd  
               local desktop permissions   2nd  
phone book (CMAK)   2nd  
phone lines, consolidating   2nd  
Physical Disk-% Disk Time counter  
physical security   2nd   3rd   4th  
piloting
       storage solutions  
ping command  
placeholder root domains   2nd  
planning
       disk subsystems   2nd  
       migration from Windows 2000 to Windows Server 2003   2nd  
               ACT (Application Compatibility Tool Kit)   2nd   3rd  
               Active Directory backups   2nd  
               ADMT (Active Directory Migration Tool)   2nd   3rd   4th   5th   6th  
               ADSI Editor   2nd  
               clean installations   2nd   3rd   4th  
               client support   2nd   3rd   4th   5th  
               decommissioning domain servers  
               decommissioning domains   2nd  
               DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  
               DNS (Domain Name System)   2nd  
               domain in-place upgrades  
               domain upgrades   2nd   3rd  
               functional levels   2nd   3rd   4th   5th  
               GPOs (Group Policy Objects)   2nd  
               Interim Level  
               network downtime   2nd  
               network services   2nd  
               preparation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th  
               recovery from failed upgrades   2nd   3rd  
               security and distribution groups   2nd   3rd  
               server role prioritization   2nd  
               testing  
               upgrade paths  
                user accounts   2nd   3rd  
               Windows Server 2003 Functional Level  
       migration from Windows NT to Windows Server 2003   2nd  
               ADSI Edit   2nd   3rd  
               Application Compatibility Tool Kit   2nd   3rd  
               client support   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               decommissioning domains   2nd  
               desktop migration   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               disk partitions   2nd   3rd  
               domain coexistance   2nd   3rd   4th   5th   6th   7th   8th   9th  
               domain consolidation  
               domain controller synchronization  
               downtime, minimizing   2nd   3rd   4th   5th  
               failed account migrations   2nd  
               failed hardware   2nd  
               file systems   2nd  
               flexible Active Directory forests   2nd  
               hardware inventory   2nd  
               hardware requirements  
               hardware upgrades  
               name resolution   2nd   3rd   4th   5th   6th   7th  
               password migration   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               permissions   2nd  
               processor compatibility  
               SAM database recovery   2nd  
               server role prioritization   2nd  
               service packs   2nd  
               System Compatibility Check tool   2nd  
               testing  
               third-party software support   2nd  
               upgrade paths   2nd  
               Windows Update services   2nd   3rd  
               WINS (Windows Internet Naming Services)   2nd   3rd   4th   5th   6th   7th   8th   9th  
       storage solutions   2nd  
       Windows Server 2003 installation   2nd   3rd   4th   5th  
       WSS (Windows SharePoint Services) deployment   2nd   3rd  
planning mode (RSoP)  
Pocket PCs
       smartcards   2nd  
POE (power over Ethernet)  
Point to Point Tunneling Protocol (PPTP)  
Point-to-Point Tunneling Protocol.   [See See PPTP]
Pointer (PTR) records  
policies
       Domain Controller Security Policy  
       Group Policies  
               delegating rights with   2nd  
               enforcing administrator passwords with  
               enforcing group memberships with   2nd  
               linking to containers  
       Group Policy
               assigning permissions with   2nd   3rd  
               assigning rights with   2nd   3rd  
               Group Policy Modeling   2nd  
               managing groups with   2nd  
policies.   [See See Group Policy]
PORT (/PORT) parameter (bootcfg command)  
port-level alerts  
port-level monitoring   2nd  
ports
       administrative port security  
       moving  
       port-level alerts  
       port-level monitoring   2nd  
       Terminal Services port number   2nd  
power connections
       wireless networks   2nd  
power over Ethernet (POE)  
power supply
       redundant power systems  
PPTP (Point to Point Tunneling Protocol)  
PPTP (Point-to-Point Tunneling Protocol)
       client requirements   2nd  
       in series with firewalls   2nd  
       parallel to firewalls   2nd  
       remote access policies   2nd  
       security   2nd  
Pre-Boot eXecution Environment (PXE)  
preferences
       compared to policies   2nd  
Preferred Networks tab (Wireless Network (IEEE 802.11) Policies)   2nd  
primary zones   2nd  
Print Services
       Unix systems   2nd   3rd   4th   5th   6th   7th  
printers
       Con2prt.exe tool  
       consolidating  
printing
       IPP (Internet Printing Protocol)   2nd  
               installing   2nd  
               security   2nd  
       local printing   2nd  
       Print Services
               Unix systems   2nd   3rd   4th   5th   6th   7th  
prioritizing
       server roles   2nd   3rd   4th  
privileges
       administrators   2nd  
       assigning with Group Policy   2nd   3rd  
       compared to permissions  
       granting   2nd   3rd  
       highly managed users   2nd  
       mobile users   2nd   3rd  
Processes tab (Task Manager)  
processors
       choosing  
       compatibility  
       performance optimization   2nd  
       Terminal Services  
product keys   2nd  
profiles   2nd  
       All Users profiles   2nd  
       Default User profiles   2nd  
       editing  
       folder redirection   2nd   3rd  
       local profiles   2nd  
       mandatory profiles  
       roaming profiles   2nd   3rd  
       temporary profiles  
promoting
       member servers to domain controllers   2nd   3rd  
properties
       WINS (Windows Internet Naming Services)   2nd   3rd  
Protocol Transition  
protocols
       CHAP (Challenge Handshake Authentication Protocol)  
       DAP (Directory Access Protocol)  
       DHCP (Dynamic Host Configuration Protocol)   2nd   3rd  
               administrative delegation  
               APIPA (Automatic Private IP Addressing)   2nd  
               authorization   2nd  
               client service   2nd  
               database backup and restore automation   2nd  
               DDNS (Dynamic DNS)   2nd  
               design issues  
               domain controller security   2nd  
               fault tolerance   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               installing   2nd   3rd  
               maintenance   2nd   3rd  
               migrating from Windows 2000   2nd   3rd  
               Netsh tool   2nd  
               relay agents   2nd  
               scopes   2nd   3rd   4th   5th   6th  
               Windows XP clients   2nd  
       DNS (Domain Name System)   2nd   3rd   4th  
               caching-only servers  
               configuring   2nd   3rd  
               DDNS (Dynamic DNS)   2nd   3rd   4th   5th  
               dynamic updates  
               forwarders   2nd   3rd  
               framework for  
               Hints file   2nd  
               impact on Active Directory   2nd  
               importance of   2nd  
               installing   2nd   3rd   4th   5th   6th  
               monitoring   2nd   3rd   4th   5th  
               namespaces   2nd  
               non-Microsoft DNS implementations   2nd  
               queries   2nd   3rd   4th  
               resource records   2nd   3rd   4th   5th   6th   7th   8th   9th  
               scavenging   2nd  
               secure updates   2nd  
               site authentication, controlling   2nd  
               site resolution   2nd  
               troubleshooting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
               TTL (Time to Live)   2nd   3rd  
               Unicode character support   2nd  
               Windows Server 2003 enhancements   2nd   3rd  
               WINS (Windows Internet Naming Service)   2nd   3rd   4th  
               zone transfers   2nd   3rd   4th   5th   6th   7th  
               zones   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  
       EAP (Extensible Authentication Protocol)   2nd  
       FTP (File Transfer Protocol)   2nd  
               account lockout  
               anonymous FTP  
               auditing  
               blind-put access  
               disk quotas  
               folder permissions  
               installing   2nd  
               IP address restrictions  
               logging   2nd  
               logon time restrictions  
               passwords  
               user isolation  
       IPP (Internet Printing Protocol)   2nd  
               installing   2nd  
               security   2nd  
       IPSec
               desktop security   2nd   3rd  
       L2TP (Layer 2 Tunneling Protocol)
               client requirements   2nd  
               in series with firewalls   2nd  
               parallel to firewalls   2nd  
               remote access policies   2nd  
               security   2nd   3rd  
       LDAP (Lightweight Directory Access Protocol)  
       OSI (Open Systems Interconnection) protocol  
       PAP (Password Authentication Protocol)  
       PPTP (Point to Point Tunneling Protocol)  
       PPTP (Point-to-Point Tunneling Protocol)
               client requirements   2nd  
               in series with firewalls   2nd  
               parallel to firewalls   2nd  
               remote access policies   2nd  
               security   2nd  
       SSL (Secure Socket Layer)   2nd  
       SSL (Secure Sockets Layer)
               enabling   2nd   3rd   4th   5th  
       TCP/IP   2nd  
       TKIP (Temporal Key Integrity Protocol)  
       TLS (Transport Level Security)  
protocols;  
providers
       Performance Monitor Provider  
       Registry Event Provider  
       Registry Provider  
       Shadow Copy Provider  
       SNMP Provider  
       Storage Volume Provider  
       WDM Provider  
       Win32 Provider  
       Windows NT Event Log Provider  
PTR (Pointer) records  
Public Key Management console  
public workstations
       desktop management   2nd   3rd  
pull/push partners
       configuring   2nd  
push/pull partners
       configuring   2nd  
pushing
       certificates  
pushing software to users   2nd   3rd   4th   5th  
       best practices   2nd   3rd   4th  
       verifying installation   2nd  
PXE (Pre-Boot eXecution Environment)  



Microsoft Windows Server 2003 Insider Solutions
Microsoft Windows Server 2003 Insider Solutions
ISBN: 0672326094
EAN: 2147483647
Year: 2003
Pages: 325

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net