Index S


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

S (/S) parameter (bootcfg command)  
s- prefix (log files)  
s- computername field (log files  
s-ip field (log files  
s-port field (log files  
s-sitename field (log files  
SAC (Special Administration Console)   2nd  
SAM database
       recovering   2nd  
Samba
       configuring   2nd   3rd  
SAN (Storage Area Network)   2nd  
SANs (Storage Area Networks)   2nd  
       Active Directory integration   2nd  
        backups   2nd   3rd   4th  
       best practices   2nd  
       booting from   2nd  
       defined   2nd  
       deploying  
       designing  
               connectivity   2nd  
               disk drives   2nd  
               multiple spindles  
       developing   2nd  
       DFS (Distributed File System)   2nd  
       disk quotas  
       EFS (Encrypted File System)  
       fault tolerance   2nd  
       file servers   2nd  
       implementation process   2nd  
       Logical Disk Manager   2nd  
       needs analysis  
       piloting  
       planning   2nd  
       Remote Storage   2nd  
       server consolidation  
               exchange servers   2nd  
               file servers   2nd  
       SQL (Standard Query Language)   2nd   3rd  
       system recovery   2nd  
       Terminal Services   2nd  
       zero latency  
saving
       security logs  
sc- prefix (log files)  
sc-bytes field (log files  
sc-win32 status field (log files  
scaling
       Terminal Services   2nd   3rd  
scaling services  
       Active Directory  
               Active Directory Sizer tool   2nd  
               disk configuration   2nd  
               file locations   2nd   3rd  
               replication   2nd   3rd  
       common problems  
               facilities   2nd  
               multiprocessor-capable applications   2nd  
               system outages   2nd  
               wrong hardware   2nd  
       disk subsystems   2nd  
       file system  
               DFS (Distributed File System)   2nd  
               NAS (Network Attached Storage)   2nd  
               RAID   2nd   3rd   4th  
               RAM-disks   2nd   3rd  
               SAN (Storage Area Network)   2nd  
               SCSI (Small Computer System Interface)   2nd  
       memory   2nd  
       processors
               choosing  
       RAS (Remote Access System)  
               hardware cryptographic accelerators   2nd  
               hardware RAS solutions   2nd  
               modem support   2nd  
                multihomed Internet connections   2nd  
               multiplexing   2nd  
               PPTP (Point to Point Tunneling Protocol) security  
       servers
               multinode clusters   2nd  
               Server Farms   2nd  
               size of   2nd   3rd   4th  
               upgrading  
       Terminal Services  
               load balancing   2nd  
               memory  
               processors  
               Terminal Service Farms   2nd  
       unnecessary services
               removing  
       Web services  
               n- tier application model   2nd  
               server upgrades   2nd  
               SSL (Secure Socket Layer) accelerators   2nd   3rd  
               Web Farms   2nd  
Scandisk   2nd  
scanners
       vulnerability scanners   2nd  
scanning
       Web servers   2nd  
ScanState.exe file  
scavenging   2nd  
schema (AD)   2nd  
       ADSI (Active Directory Service Interfaces) Edit utility   2nd  
        deactivating   2nd   3rd  
       Schema snap-in   2nd   3rd  
Schema Master role  
scope
       groups  
               domain local groups   2nd  
               global groups   2nd  
               machine local groups   2nd  
               universal groups   2nd  
scopes
       DHCP (Dynamic Host Configuration Protocol)
               creating   2nd   3rd  
               multicast scopes  
               standby scopes  
                superscopes  
scripts
       external scripts   2nd  
       IISapp.vbs  
       IISback.vbs  
       IISconfg.vbs  
       IISext.vbs  
       IISftp.vbs  
       IISftpdr.vbs  
       IISvdir.vbs  
       IISweb.vbs  
       maintenance scripts  
               command-line interfaces   2nd  
               mail-enabled contacts, creating   2nd   3rd  
               MMC view  
               temp directory, clearing  
               users, deleting   2nd  
               WINS database, backing up  
       WMI (Windows Management Instrumentation) scripts  
               capabilities   2nd   3rd   4th   5th  
               permanent event consumers   2nd  
               sample script   2nd  
               services  
               temporary event consumers  
SCSI (Small Computer System Interface)   2nd  
searching
        group policies  
       WSS (Windows SharePoint Services)   2nd   3rd  
secondary zones   2nd   3rd   4th  
Secure Socket Layer (SSL)   2nd  
SECURE UPDATE RECEIVED/Sec counter  
secure updates   2nd  
security   2nd   3rd   4th   5th  
       .NET Passport Integration  
       authentication   2nd  
               authentication firewalls   2nd  
               biometrics   2nd  
               CHAP (Challenge Handshake Authentication Protocol)  
               dual-client authentication   2nd  
               EAP (Extensible Authentication Protocol)  
               EAP-TLS authentication   2nd   3rd  
               HTTP authentication requests   2nd  
               IAS (Internet Authentication Service)   2nd   3rd   4th   5th   6th  
               machine accounts  
               PAP (Password Authentication Protocol)  
               RADIUS (Remote Authentication Dial-in User Service)   2nd   3rd   4th  
               smartcards   2nd   3rd  
               virtual directories   2nd  
               WPA (Wi-Fi Protected Access)  
       authorization
               DHCP (Dynamic Host Configuration Protocol)   2nd  
       certificates   2nd  
               (Certificate Services)  
               administrative roles   2nd  
                autoenrollment  
               autorenewal  
               CAs (certificate authorities)   2nd   3rd   4th   5th   6th  
               certificate server integrity  
               Certificate Services installation   2nd   3rd  
               cross certification  
               delta CRLs (certificate revocation lists)  
               event auditing  
               fault tolerance   2nd  
               FCBA (Federal Bridge Certificate Authority)  
               key archival  
               key counting  
               pushing to clients  
               role-based administration  
               server roles   2nd  
               server security  
               smart card certificates   2nd  
               templates  
       CLR (Common Language Runtime)  
       company reputation  
       Constrained Delegation  
       Credential Manager  
       designing   2nd  
               best practices   2nd  
               physical security   2nd  
               simplicity  
       desktop  
               EFS (Encrypting File System)   2nd  
               Group Policy settings  
               IPSec   2nd   3rd  
               SUS (Software Update Service)   2nd  
       DFS (Distributed File System)   2nd  
       DHCP (Dynamic Host Configuration Protocol)   2nd  
               authorization   2nd  
               domain controller security   2nd  
       digital certificates
               X.509  
       digital signatures   2nd  
       Domain Controller Security Policy  
       EFS (Encrypting File System)   2nd   3rd  
               preventing users from enabling   2nd  
               standalone EFS   2nd  
       encryption  
               CSPs (Cryptographic Service Providers)   2nd  
               EFS (Encrypted File System)  
               encrypted connections  
               hardware cryptographic accelerators   2nd  
               IPSec   2nd   3rd  
               password migration   2nd  
       file system  
               auditing   2nd  
               locking down group membership   2nd  
               locking with NTFS (NT File System)   2nd  
               rights  
       firewalls
               L2TP (Layer 2 Tunneling Protocol)   2nd   3rd  
               PPTP (Point-to-Point Tunneling Protocol)   2nd   3rd   4th  
               virtual directories   2nd  
       floppy drives
               locking   2nd  
       forest trusts  
       Group Policy   2nd  
               Default Domain Group Policy settings   2nd  
               Restricted Groups   2nd  
               security templates   2nd  
       IIS (Internet Information Services)  
               locking down   2nd  
       importance of   2nd  
       improvements over Windows 2000   2nd  
       IPP (Internet Printing Protocol)   2nd  
       L2TP (Layer 2 Tunneling Protocol)   2nd   3rd  
       LM (LanMan) hashes, disabling local storage of   2nd  
       man-in-the-middle attacks  
       new technologies   2nd   3rd  
       Offline Files  
       optimization   2nd  
       password migration
               encryption keys   2nd  
               permissions   2nd  
               requirements   2nd  
       permissions
               Active Directory shared folders   2nd  
               administrators   2nd  
               Allow/Deny permissions   2nd  
               assigning with Group Policy   2nd   3rd  
               compared to rights  
               desktop permission configuration   2nd  
               highly managed users   2nd  
               local desktop permissions   2nd  
               mobile users   2nd   3rd  
               NTFS (NT File System) permissions   2nd   3rd   4th   5th   6th   7th  
               password migration   2nd  
               Registry permissions   2nd  
               Terminal Services  
               virtual directories   2nd   3rd   4th   5th  
       physical security   2nd   3rd   4th  
       PPTP (Point-to-Point Tunneling Protocol)   2nd  
       Protocol Transition  
       Registry   2nd  
       remote administration   2nd  
       rights
               administrators   2nd   3rd   4th  
               assigning with Group Policy   2nd   3rd  
               compared to permissions  
               cross-forest rights   2nd  
               granting   2nd   3rd  
               highly managed users   2nd  
               mobile users   2nd   3rd  
       sample scenario   2nd   3rd  
       security analysis   2nd  
               file system audits   2nd  
               Microsoft Baseline Security Analyzer   2nd  
               system security audits   2nd  
               vulnerability scanners   2nd  
       Security Configuration and Analysis tool   2nd  
       security groups  
       security reports
               creating   2nd   3rd  
       site authentication
               controlling with DNS (Domain Name System)   2nd  
       smartcards   2nd   3rd   4th  
               building security  
               choosing   2nd  
               email  
               enforcing   2nd  
               life expectancy   2nd  
               logins   2nd  
               management tools   2nd  
               memory requirements   2nd  
               Pocket PCs   2nd  
               roles   2nd  
               SIMs (Subscriber Identity Module) cards  
               single sign-on environments   2nd   3rd  
               Smart Phones   2nd  
                smartcard enrollment and authentication strategies  
               smartcard readers   2nd  
       SSL (Secure Sockets Layer)  
               enabling   2nd   3rd   4th   5th  
       templates  
               comparing local settings to   2nd  
               NIST (National Institute of Standards) guidelines  
               NSA (National Security Agency) guidelines  
       Terminal Services
               directory/file permissions  
               firewalls   2nd   3rd  
               terminal server design   2nd   3rd  
               terminal server lockdown   2nd  
       TSL (Transport Layer Security)   2nd   3rd  
               Handshake Protocol   2nd  
       user profiles   2nd  
               All Users profiles   2nd  
               Default User profiles   2nd  
               local profiles   2nd  
               mandatory profiles  
               roaming profiles  
               temporary profiles  
       virtual directories
               firewalls   2nd  
               HTTP authentication requests   2nd  
               server security   2nd  
               trusted networks   2nd  
       Web servers  
               patches   2nd   3rd   4th  
               scanning   2nd  
               SSL (Secure Socket Layer)   2nd  
       wireless networks   2nd  
               access point placement   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
               Certificate Services   2nd   3rd   4th  
               channels  
               client configuration   2nd   3rd   4th   5th   6th   7th   8th  
               EAP-TLS authentication   2nd   3rd  
               Group Policy   2nd  
               IAS (Internet Authentication Services)   2nd  
               IEEE 802.11e standard  
               IEEE 802.11f standard  
               IEEE 802.11h standard  
               IEEE 802.11i standard   2nd  
               IEEE 802.1x standard   2nd  
               monitoring   2nd  
               online resources   2nd  
               protection tips   2nd  
               VPNs (Virtual Private Networks)   2nd  
               Wireless Network (IEEE 802.11) Policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               WPA (Wi-Fi Protected Access)   2nd   3rd   4th   5th   6th   7th   8th  
       WSS (Windows SharePoint Services)   2nd   3rd   4th  
               administrative port security  
               firewalls  
               Internet Explorer Enhanced Security Configuration   2nd  
               Microsoft SQL Server Connection security  
               SharePoint Administrators group  
               site groups  
               user authentication  
security administrators   2nd  
Security Configuration and Analysis tool   2nd  
security groups  
       migrating from Windows 2000   2nd   3rd  
security logs
       saving  
       sizing  
security templates   2nd  
security.   [See also groups]
seizing
       RID master role   2nd  
       RID master roles  
seizing roles  
Select Create Object dialog box  
sending
       Remote Assistance invitations   2nd   3rd   4th   5th  
serial connections
       configuring for EMS (Emergency Management Service)   2nd  
       SPCR (Serial Port Console Redirection)  
Serial Port Console Redirection (SPCR)  
Server Farms   2nd  
server images   2nd  
       deploying with RIS (Remote Installation Service)   2nd   3rd  
       Sysprep   2nd  
Server[ colon ] Bytes Total/sec counter  
servers
       caching-only servers  
       certificate servers
               integrity  
       consolidating  
               virtual servers   2nd  
               WSRM (Windows System Resource Manager)  
       exchange servers
               consolidating   2nd  
       file servers
               consolidating   2nd  
               NAS (Network Attached Storage)   2nd  
               SANs (Storage Area Networks)   2nd  
       GCs (Global Catalogs)   2nd  
               attributes   2nd   3rd  
               customizing   2nd   3rd  
               placement of   2nd  
               universal group caching   2nd  
       IIS (Internet Information Server)
               worker process isolation mode   2nd  
       locking  
       member servers
               promoting to domain controllers   2nd   3rd  
       MIIS (Microsoft Identity Integration Server 2003)  
               broad conectivity  
               identity information   2nd   3rd   4th   5th   6th  
               Management Agents   2nd  
       multinode clusters   2nd  
       Password Export Server  
       Password Export servers  
               encryption keys   2nd  
               permissions   2nd  
               security requirements   2nd  
       RADIUS (Remote Authentication Dial-in User Service)   2nd   3rd   4th  
       RAS (Remote Access Servers)   2nd  
       removing with ADSI Editor   2nd  
       roles   2nd  
       securing access to   2nd   3rd   4th  
       Server Farms   2nd  
       server hardware life expectancy   2nd  
       server images
               deploying with RIS (Remote Installation Service)   2nd   3rd  
               Sysprep   2nd  
       server role prioritization   2nd   3rd   4th  
       servery redundancy   2nd  
       SharePoint Portal Server   2nd  
       size of   2nd   3rd   4th  
       systems management servers
               SUS (Software Update Service)  
       terminal servers
               building   2nd   3rd  
               firewalls   2nd   3rd  
               locking down   2nd  
       Terminal Services
               IIS remote administration   2nd  
       Unix BIND servers  
       upgrading  
       virtual servers   2nd  
       Web servers
               security   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
service
       Windows Update
               finalizing server upgrades   2nd  
               keeping Windows server current  
Service (SRV) records   2nd   3rd   4th   5th  
service packs   2nd   3rd  
       Windows NT   2nd  
service-level alerts  
service-level monitoring   2nd  
services
       Certificate Services
               installing  
               wireless networks   2nd   3rd   4th  
       Certificate Services.   [See See Certificate Services]
       consolidating   2nd  
       DNS (Domain Name Service)   2nd  
               BIND (Berkeley Internet Name Domain) DNS  
               name resolution   2nd  
               SRV (Service) resource records  
       DNS (Domain Name Services)
               SRV (Service) resource records  
       DNS (Domain Name System)
               migrating from Windows 2000   2nd  
       EMS (Emergency Management Service)  
               enabling   2nd  
               SAC (Special Administration Console)   2nd  
               serial connection configuration   2nd  
       FloppyLocker Service  
       FPNW (File and Print Services for NetWare)   2nd  
               installing   2nd   3rd  
       GSNW (Gateway Services for NetWare)   2nd   3rd  
               installing   2nd  
       IAS (Internet Authentication Services)
               wireless networks   2nd  
       IIS (Internet Information Services)  
               ADSI utilities  
               command-line administration  
               hard disk space   2nd  
               IIS Manager  
               locking down   2nd  
               remote administration  
               remote administration;Internet Information Services Manager   2nd  
               remote administration;Remote Administration (HTML) Tool   2nd   3rd   4th  
               remote administration;Terminal Services   2nd  
               security auditing   2nd   3rd  
               Web site content auditing   2nd   3rd  
               WMI (Windows Management Instrumentation)   2nd  
       Microsoft Identity Information Services  
       migrating from Windows 2000   2nd  
       MIIS (Microsoft Identity Integration Server 2003)  
       MSCS (Microsoft Cluster Service)   2nd  
               best practices   2nd  
               configuring  
               failover   2nd  
               feedback   2nd  
               installing   2nd   3rd   4th   5th   6th   7th  
               MNS (Majority Mode Set) clusters   2nd  
                single-node clusters  
               single-quorum device clusters  
       MSDSS (Microsoft Directory Synchronization Services)   2nd  
               backing up   2nd  
               best practices   2nd  
               installing   2nd   3rd  
       notification   2nd  
       recovery   2nd  
       RRAS (Routing and Remote Access Services)
               VPNs (Virtual Private Networks)   2nd  
       scaling.   [See See scaling services]
       service-level alerts  
       service-level monitoring   2nd  
       SFNW (Services for NetWare)   2nd   3rd   4th  
               configuration   2nd  
               FMU (File Migration Utility)   2nd   3rd   4th   5th  
               FPNW (File and Print Services for NetWare)   2nd   3rd   4th   5th  
               GSNW (Gateway Services for NetWare)   2nd   3rd   4th   5th  
               MSDSS (Microsoft Directory Synchronization Services)   2nd   3rd   4th   5th   6th   7th   8th   9th  
       SUS (Software Update Service)  
               enabling with Group Policy   2nd  
               machine groups  
               NTFS permissions  
               systems management servers  
       Terminal Services   2nd  
               advantages of   2nd  
               directory/file permissions  
               firewalls   2nd   3rd  
               Group Policy   2nd   3rd   4th   5th   6th  
               IAS (Internet Authentication Service)  
               listening port number   2nd  
               load balancing   2nd  
               local drives   2nd  
               local printing   2nd  
               NAS (Network Attached Storage)   2nd  
               Novell networks   2nd   3rd  
               performance enhancements   2nd  
               performance optimization   2nd   3rd   4th   5th   6th   7th  
               redundancy   2nd  
               requirements  
               SANs (Storage Area Networks)   2nd  
               scaling   2nd   3rd   4th   5th   6th   7th  
               Session Directory   2nd   3rd   4th   5th   6th  
               terminal server design   2nd   3rd  
               terminal server lockdown   2nd  
               Windows Resource Manager   2nd   3rd  
       unnecessary services
               removing  
       VSS (Volume Shadow Copy Service)   2nd  
               best practices   2nd  
               configuring   2nd   3rd  
               data recovery   2nd  
       Web Services
               Novell networks   2nd  
       Web services
               scaling   2nd   3rd   4th   5th  
       WINS
               checking for corruption   2nd  
       WINS (Windows Internet Naming Service)   2nd   3rd   4th  
               database maintenance   2nd  
               environment design   2nd  
               installing   2nd  
               integrating with DNS   2nd  
               legacy Microsoft NetBIOS resolution   2nd  
               LMHOSTS file  
               NetBIOS client resolution   2nd  
               push/pull partners   2nd  
               replication   2nd  
               upgrading   2nd   3rd  
               Windows Server 2003 enhancements   2nd  
       WINS (Windows Internet Naming Services)  
               installing   2nd  
               mixed-mode environments  
               TCP/IP properties   2nd   3rd  
               uninstalling   2nd  
       WSS (Windows SharePoint Services)   2nd   3rd   4th  
               Active Directory Account Creation mode  
               checking in/out documents   2nd  
               compared to SharePoint Portal Server   2nd  
               deployment   2nd   3rd   4th   5th   6th   7th   8th  
               document versioning   2nd   3rd   4th  
               Document Workspaces   2nd  
               extranets   2nd  
               hierarchical storage management  
               indexing   2nd   3rd   4th  
               lists  
               MSDE (Microsoft Data Engine)  
               new features   2nd  
               searching   2nd   3rd  
               security   2nd   3rd   4th   5th   6th  
               shared attachments   2nd  
               Shared Workspace task panes   2nd  
               storage options  
               views  
               Web part support  
               Web sites   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
Services for NetWare (SFNW)   2nd   3rd   4th  
Services for NetWare.   [See See SFNW]
Session Directory   2nd  
       configuring   2nd  
       redundancy   2nd  
Sessions section (Terminal Services)  
Setup Manager   2nd   3rd  
SFNW (Services for NetWare)   2nd   3rd   4th  
       configuration   2nd  
       FMU (File Migration Utility)   2nd   3rd   4th   5th  
       FPNW (File and Print Services for NetWare)   2nd  
               installing   2nd   3rd  
       GSNW (Gateway Services for NetWare)   2nd   3rd  
               installing   2nd  
       MSDSS (Microsoft Directory Synchronization Services)   2nd  
               backing up   2nd  
               best practices   2nd  
               installing   2nd   3rd  
shadow copies   2nd  
       best practices   2nd  
       configuring   2nd   3rd  
       restoring data from   2nd  
Shadow Copy of Shared Folders   2nd  
       client setup  
       recovering corrupted files  
       recovering deleted files   2nd  
       recovering folders   2nd  
       recovering overwritten files  
Shadow Copy Provider  
shared folders
       creating   2nd  
Shared Workspace task pane (WSS)   2nd  
SharePoint Administrators group  
SharePoint Portal Server   2nd  
SharePoint Portal Services (SPS)  
SharePoint Team Services.   [See See WSS (Windows SharePoint Services)]
sharing
       folders   2nd  
sharing files.   [See See file sharing]
SID History   2nd   3rd  
SID History feature  
SID History field
       cleaning up  
       importance of   2nd  
signal coverage   2nd  
signals
       interference   2nd   3rd   4th  
       RF attenuation   2nd   3rd  
       signal coverage   2nd  
       signal levels   2nd  
signatures, digital   2nd  
       man-in-the-middle attacks  
Simple File Sharing   2nd   3rd  
       enabling/disabling   2nd  
SIMs (Subscriber Identity Module) cards  
simulation mode (RSoP)  
Single affinity type  
single domain in-place upgrade   2nd   3rd  
Single Host filtering mode  
single sign-on environments   2nd  
       application consolidation  
       directory consolidation  
       Novell networks  
               directory synchronization   2nd   3rd   4th   5th  
               dual-client authentication   2nd  
single-node clusters  
single-quorum device clusters  
site groups  
site resolution   2nd  
site-to-site VPNs (Virtual Private Networks)   2nd   3rd   4th  
sites (AD)   2nd  
       authentication
               controlling with DNS (Domain Name System)   2nd  
       defined  
       site adoption   2nd  
       summarizing   2nd  
Sizer tool (Active Directory)   2nd  
sizing
       security logs  
Slow Link Detection   2nd  
slow links  
       configuring   2nd  
       detecting  
       determining speed of   2nd  
       effect on sites   2nd  
       Slow Link Detection   2nd  
small businesses
       WSS (Windows SharePoint Services) deployment   2nd  
Small Computer System Interface (SCSI)   2nd  
smart organizations  
Smart Phones
       smartcards   2nd  
smart places  
smartcards   2nd   3rd   4th   5th   6th   7th  
       building security  
       choosing   2nd  
       email  
       enforcing   2nd  
       life expectancy   2nd  
       logins   2nd  
       management tools   2nd  
       memory requirements   2nd  
       Pocket PCs   2nd  
       roles   2nd  
       SIMs (Subscriber Identity Module) cards  
       single sign-on environments  
               application consolidation  
               directory consolidation  
       Smart Phones   2nd  
       smartcard enrollment and authentication strategies  
               best practices   2nd  
               physical security   2nd  
               simplicity  
       smartcard readers   2nd  
smbclient   2nd  
SMS
       monitoring   2nd  
snap-ins
       Active Directory Schema snap-in   2nd   3rd  
       DFS (Distributed File System) MMC snap-in  
       Disk Management MMC   2nd  
       Schema snap-in   2nd   3rd  
       Security Configuration and Analysis   2nd  
snapshotting  
SNMP Provider  
SOA (Start of Authority) records   2nd  
softmodems   2nd  
software
       automatic software installations   2nd   3rd   4th   5th  
               best practices   2nd   3rd   4th  
               verifying installation   2nd  
       patches  
       SUS (Software Update Service)   2nd   3rd  
               enabling with Group Policy   2nd  
               machine groups  
               NTFS permissions  
               systems management servers  
       third-party software support   2nd  
software RAID   2nd  
Software Update Service (SUS)   2nd  
Software Update Service.   [See See SUS]
Sonar.exe tool   2nd  
SPCR (Serial Port Console Redirection)  
Special Administration Console (SAC)   2nd  
speed
       slow link speed, determining   2nd  
spindles
       multiple spindles  
SPS (SharePoint Portal Services)  
SQL (Standard Query Language)
       NAS (Network Attached Storage)   2nd   3rd  
       SANs (Storage Area Networks)   2nd   3rd  
SRV (Service) records   2nd   3rd   4th   5th  
SRV (Service) resource records   2nd  
SSL (Secure Socket Layer)   2nd  
       accelerators   2nd   3rd  
SSL (Secure Sockets Layer)  
       enabling   2nd   3rd   4th   5th  
standalone EFS (Encrypting File System)   2nd  
Standalone Root CAs (certificate authorities)  
Standalone Subordinate CAs (certificate authorities)  
standardizing
       desktop  
standby scopes  
Start of Authority (SOA) records   2nd  
stop errors (log files)   2nd  
storage
       DAS (Direct Attached Storage)
               defined   2nd  
       NAS (Network Attached Storage)
               Active Directory integration   2nd  
               backups   2nd   3rd   4th  
               best practices   2nd  
               booting from   2nd  
               defined   2nd  
               deploying  
               designing   2nd   3rd   4th   5th   6th  
               developing   2nd  
               DFS (Distributed File System)   2nd  
               disk quotas  
               EFS (Encrypted File System)  
               fault tolerance   2nd  
               file servers   2nd  
               implementation process   2nd  
               Logical Disk Manager   2nd  
               needs analysis  
               piloting  
               planning   2nd  
               Remote Storage   2nd  
               server consolidation   2nd   3rd   4th   5th  
               single MAC address conversations  
               SQL (Standard Query Language)   2nd   3rd  
               system recovery   2nd  
               Terminal Services   2nd  
       SANs (Storage Area Networks)   2nd  
               Active Directory integration   2nd  
               backups   2nd   3rd   4th  
               best practices   2nd  
               booting from   2nd  
               defined   2nd  
               deploying  
               designing   2nd   3rd   4th   5th   6th  
               developing   2nd  
               DFS (Distributed File System)   2nd  
               disk quotas  
               EFS (Encrypted File System)  
               fault tolerance   2nd  
               file servers   2nd  
               implementation process   2nd  
               Logical Disk Manager   2nd  
               needs analysis  
               piloting  
               planning   2nd  
               Remote Storage   2nd  
               server consolidation   2nd   3rd   4th   5th  
               SQL (Standard Query Language)   2nd   3rd  
               system recovery   2nd  
               Terminal Services   2nd  
               zero latency  
Storage Area Network (SAN)   2nd  
Storage Area Networks.   [See See SANs]
Storage Volume Provider  
striped sets
       Windows NT to Windows Server migration  
striped sets with parity
       Windows NT to Windows Server migration  
striping disks   2nd  
stub zones   2nd   3rd   4th  
Subscriber Identity Module (SIM) cards  
summarizing
       Active Directory sites   2nd  
superscopes  
support phone number (CMAK)  
SUS (Software Update Service)   2nd   3rd  
       enabling with Group Policy   2nd  
       machine groups  
       NTFS permissions  
       systems management servers  
synchronization
       directories   2nd   3rd   4th   5th  
       domaim controllers  
       eDirectory/NDS synchronization   2nd   3rd  
       MSDSS (Microsoft Directory Synchronization Services)   2nd  
               backing up   2nd  
               best practices   2nd  
               installing   2nd   3rd  
synchronizing
       directories  
       forests   2nd   3rd  
       passwords   2nd  
               LDAP   2nd  
               NIS (Network Information System)   2nd   3rd   4th  
               Unix   2nd   3rd   4th  
Sysprep   2nd   3rd   4th   5th   6th   7th   8th  
       (System Preparation tool)  
       advantages   2nd  
       Audit mode  
       Factory mode  
       Reseal mode   2nd  
System Compatibility Check tool   2nd  
system maintenance.   [See See maintenance]
system monitoring.   [See See monitoring Windows Server 2003]
system outages
       protecting against   2nd  
System Preparation tool.   [See See Sysprep]
system resources, checking availability of   2nd   3rd  
system updates
       checking for   2nd   3rd  
systems management servers
       SUS (Software Update Service)  



Microsoft Windows Server 2003 Insider Solutions
Microsoft Windows Server 2003 Insider Solutions
ISBN: 0672326094
EAN: 2147483647
Year: 2003
Pages: 325

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net