[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] S (/S) parameter (bootcfg command) s- prefix (log files) s- computername field (log files s-ip field (log files s-port field (log files s-sitename field (log files SAC (Special Administration Console) 2nd SAM database recovering 2nd Samba configuring 2nd 3rd SAN (Storage Area Network) 2nd SANs (Storage Area Networks) 2nd Active Directory integration 2nd backups 2nd 3rd 4th best practices 2nd booting from 2nd defined 2nd deploying designing connectivity 2nd disk drives 2nd multiple spindles developing 2nd DFS (Distributed File System) 2nd disk quotas EFS (Encrypted File System) fault tolerance 2nd file servers 2nd implementation process 2nd Logical Disk Manager 2nd needs analysis piloting planning 2nd Remote Storage 2nd server consolidation exchange servers 2nd file servers 2nd SQL (Standard Query Language) 2nd 3rd system recovery 2nd Terminal Services 2nd zero latency saving security logs sc- prefix (log files) sc-bytes field (log files sc-win32 status field (log files scaling Terminal Services 2nd 3rd scaling services Active Directory Active Directory Sizer tool 2nd disk configuration 2nd file locations 2nd 3rd replication 2nd 3rd common problems facilities 2nd multiprocessor-capable applications 2nd system outages 2nd wrong hardware 2nd disk subsystems 2nd file system DFS (Distributed File System) 2nd NAS (Network Attached Storage) 2nd RAID 2nd 3rd 4th RAM-disks 2nd 3rd SAN (Storage Area Network) 2nd SCSI (Small Computer System Interface) 2nd memory 2nd processors choosing RAS (Remote Access System) hardware cryptographic accelerators 2nd hardware RAS solutions 2nd modem support 2nd multihomed Internet connections 2nd multiplexing 2nd PPTP (Point to Point Tunneling Protocol) security servers multinode clusters 2nd Server Farms 2nd size of 2nd 3rd 4th upgrading Terminal Services load balancing 2nd memory processors Terminal Service Farms 2nd unnecessary services removing Web services n- tier application model 2nd server upgrades 2nd SSL (Secure Socket Layer) accelerators 2nd 3rd Web Farms 2nd Scandisk 2nd scanners vulnerability scanners 2nd scanning Web servers 2nd ScanState.exe file scavenging 2nd schema (AD) 2nd ADSI (Active Directory Service Interfaces) Edit utility 2nd deactivating 2nd 3rd Schema snap-in 2nd 3rd Schema Master role scope groups domain local groups 2nd global groups 2nd machine local groups 2nd universal groups 2nd scopes DHCP (Dynamic Host Configuration Protocol) creating 2nd 3rd multicast scopes standby scopes superscopes scripts external scripts 2nd IISapp.vbs IISback.vbs IISconfg.vbs IISext.vbs IISftp.vbs IISftpdr.vbs IISvdir.vbs IISweb.vbs maintenance scripts command-line interfaces 2nd mail-enabled contacts, creating 2nd 3rd MMC view temp directory, clearing users, deleting 2nd WINS database, backing up WMI (Windows Management Instrumentation) scripts capabilities 2nd 3rd 4th 5th permanent event consumers 2nd sample script 2nd services temporary event consumers SCSI (Small Computer System Interface) 2nd searching group policies WSS (Windows SharePoint Services) 2nd 3rd secondary zones 2nd 3rd 4th Secure Socket Layer (SSL) 2nd SECURE UPDATE RECEIVED/Sec counter secure updates 2nd security 2nd 3rd 4th 5th .NET Passport Integration authentication 2nd authentication firewalls 2nd biometrics 2nd CHAP (Challenge Handshake Authentication Protocol) dual-client authentication 2nd EAP (Extensible Authentication Protocol) EAP-TLS authentication 2nd 3rd HTTP authentication requests 2nd IAS (Internet Authentication Service) 2nd 3rd 4th 5th 6th machine accounts PAP (Password Authentication Protocol) RADIUS (Remote Authentication Dial-in User Service) 2nd 3rd 4th smartcards 2nd 3rd virtual directories 2nd WPA (Wi-Fi Protected Access) authorization DHCP (Dynamic Host Configuration Protocol) 2nd certificates 2nd (Certificate Services) administrative roles 2nd autoenrollment autorenewal CAs (certificate authorities) 2nd 3rd 4th 5th 6th certificate server integrity Certificate Services installation 2nd 3rd cross certification delta CRLs (certificate revocation lists) event auditing fault tolerance 2nd FCBA (Federal Bridge Certificate Authority) key archival key counting pushing to clients role-based administration server roles 2nd server security smart card certificates 2nd templates CLR (Common Language Runtime) company reputation Constrained Delegation Credential Manager designing 2nd best practices 2nd physical security 2nd simplicity desktop EFS (Encrypting File System) 2nd Group Policy settings IPSec 2nd 3rd SUS (Software Update Service) 2nd DFS (Distributed File System) 2nd DHCP (Dynamic Host Configuration Protocol) 2nd authorization 2nd domain controller security 2nd digital certificates X.509 digital signatures 2nd Domain Controller Security Policy EFS (Encrypting File System) 2nd 3rd preventing users from enabling 2nd standalone EFS 2nd encryption CSPs (Cryptographic Service Providers) 2nd EFS (Encrypted File System) encrypted connections hardware cryptographic accelerators 2nd IPSec 2nd 3rd password migration 2nd file system auditing 2nd locking down group membership 2nd locking with NTFS (NT File System) 2nd rights firewalls L2TP (Layer 2 Tunneling Protocol) 2nd 3rd PPTP (Point-to-Point Tunneling Protocol) 2nd 3rd 4th virtual directories 2nd floppy drives locking 2nd forest trusts Group Policy 2nd Default Domain Group Policy settings 2nd Restricted Groups 2nd security templates 2nd IIS (Internet Information Services) locking down 2nd importance of 2nd improvements over Windows 2000 2nd IPP (Internet Printing Protocol) 2nd L2TP (Layer 2 Tunneling Protocol) 2nd 3rd LM (LanMan) hashes, disabling local storage of 2nd man-in-the-middle attacks new technologies 2nd 3rd Offline Files optimization 2nd password migration encryption keys 2nd permissions 2nd requirements 2nd permissions Active Directory shared folders 2nd administrators 2nd Allow/Deny permissions 2nd assigning with Group Policy 2nd 3rd compared to rights desktop permission configuration 2nd highly managed users 2nd local desktop permissions 2nd mobile users 2nd 3rd NTFS (NT File System) permissions 2nd 3rd 4th 5th 6th 7th password migration 2nd Registry permissions 2nd Terminal Services virtual directories 2nd 3rd 4th 5th physical security 2nd 3rd 4th PPTP (Point-to-Point Tunneling Protocol) 2nd Protocol Transition Registry 2nd remote administration 2nd rights administrators 2nd 3rd 4th assigning with Group Policy 2nd 3rd compared to permissions cross-forest rights 2nd granting 2nd 3rd highly managed users 2nd mobile users 2nd 3rd sample scenario 2nd 3rd security analysis 2nd file system audits 2nd Microsoft Baseline Security Analyzer 2nd system security audits 2nd vulnerability scanners 2nd Security Configuration and Analysis tool 2nd security groups security reports creating 2nd 3rd site authentication controlling with DNS (Domain Name System) 2nd smartcards 2nd 3rd 4th building security choosing 2nd enforcing 2nd life expectancy 2nd logins 2nd management tools 2nd memory requirements 2nd Pocket PCs 2nd roles 2nd SIMs (Subscriber Identity Module) cards single sign-on environments 2nd 3rd Smart Phones 2nd smartcard enrollment and authentication strategies smartcard readers 2nd SSL (Secure Sockets Layer) enabling 2nd 3rd 4th 5th templates comparing local settings to 2nd NIST (National Institute of Standards) guidelines NSA (National Security Agency) guidelines Terminal Services directory/file permissions firewalls 2nd 3rd terminal server design 2nd 3rd terminal server lockdown 2nd TSL (Transport Layer Security) 2nd 3rd Handshake Protocol 2nd user profiles 2nd All Users profiles 2nd Default User profiles 2nd local profiles 2nd mandatory profiles roaming profiles temporary profiles virtual directories firewalls 2nd HTTP authentication requests 2nd server security 2nd trusted networks 2nd Web servers patches 2nd 3rd 4th scanning 2nd SSL (Secure Socket Layer) 2nd wireless networks 2nd access point placement 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th Certificate Services 2nd 3rd 4th channels client configuration 2nd 3rd 4th 5th 6th 7th 8th EAP-TLS authentication 2nd 3rd Group Policy 2nd IAS (Internet Authentication Services) 2nd IEEE 802.11e standard IEEE 802.11f standard IEEE 802.11h standard IEEE 802.11i standard 2nd IEEE 802.1x standard 2nd monitoring 2nd online resources 2nd protection tips 2nd VPNs (Virtual Private Networks) 2nd Wireless Network (IEEE 802.11) Policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th WPA (Wi-Fi Protected Access) 2nd 3rd 4th 5th 6th 7th 8th WSS (Windows SharePoint Services) 2nd 3rd 4th administrative port security firewalls Internet Explorer Enhanced Security Configuration 2nd Microsoft SQL Server Connection security SharePoint Administrators group site groups user authentication security administrators 2nd Security Configuration and Analysis tool 2nd security groups migrating from Windows 2000 2nd 3rd security logs saving sizing security templates 2nd security. [See also groups] seizing RID master role 2nd RID master roles seizing roles Select Create Object dialog box sending Remote Assistance invitations 2nd 3rd 4th 5th serial connections configuring for EMS (Emergency Management Service) 2nd SPCR (Serial Port Console Redirection) Serial Port Console Redirection (SPCR) Server Farms 2nd server images 2nd deploying with RIS (Remote Installation Service) 2nd 3rd Sysprep 2nd Server[ colon ] Bytes Total/sec counter servers caching-only servers certificate servers integrity consolidating virtual servers 2nd WSRM (Windows System Resource Manager) exchange servers consolidating 2nd file servers consolidating 2nd NAS (Network Attached Storage) 2nd SANs (Storage Area Networks) 2nd GCs (Global Catalogs) 2nd attributes 2nd 3rd customizing 2nd 3rd placement of 2nd universal group caching 2nd IIS (Internet Information Server) worker process isolation mode 2nd locking member servers promoting to domain controllers 2nd 3rd MIIS (Microsoft Identity Integration Server 2003) broad conectivity identity information 2nd 3rd 4th 5th 6th Management Agents 2nd multinode clusters 2nd Password Export Server Password Export servers encryption keys 2nd permissions 2nd security requirements 2nd RADIUS (Remote Authentication Dial-in User Service) 2nd 3rd 4th RAS (Remote Access Servers) 2nd removing with ADSI Editor 2nd roles 2nd securing access to 2nd 3rd 4th Server Farms 2nd server hardware life expectancy 2nd server images deploying with RIS (Remote Installation Service) 2nd 3rd Sysprep 2nd server role prioritization 2nd 3rd 4th servery redundancy 2nd SharePoint Portal Server 2nd size of 2nd 3rd 4th systems management servers SUS (Software Update Service) terminal servers building 2nd 3rd firewalls 2nd 3rd locking down 2nd Terminal Services IIS remote administration 2nd Unix BIND servers upgrading virtual servers 2nd Web servers security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th service Windows Update finalizing server upgrades 2nd keeping Windows server current Service (SRV) records 2nd 3rd 4th 5th service packs 2nd 3rd Windows NT 2nd service-level alerts service-level monitoring 2nd services Certificate Services installing wireless networks 2nd 3rd 4th Certificate Services. [See See Certificate Services] consolidating 2nd DNS (Domain Name Service) 2nd BIND (Berkeley Internet Name Domain) DNS name resolution 2nd SRV (Service) resource records DNS (Domain Name Services) SRV (Service) resource records DNS (Domain Name System) migrating from Windows 2000 2nd EMS (Emergency Management Service) enabling 2nd SAC (Special Administration Console) 2nd serial connection configuration 2nd FloppyLocker Service FPNW (File and Print Services for NetWare) 2nd installing 2nd 3rd GSNW (Gateway Services for NetWare) 2nd 3rd installing 2nd IAS (Internet Authentication Services) wireless networks 2nd IIS (Internet Information Services) ADSI utilities command-line administration hard disk space 2nd IIS Manager locking down 2nd remote administration remote administration;Internet Information Services Manager 2nd remote administration;Remote Administration (HTML) Tool 2nd 3rd 4th remote administration;Terminal Services 2nd security auditing 2nd 3rd Web site content auditing 2nd 3rd WMI (Windows Management Instrumentation) 2nd Microsoft Identity Information Services migrating from Windows 2000 2nd MIIS (Microsoft Identity Integration Server 2003) MSCS (Microsoft Cluster Service) 2nd best practices 2nd configuring failover 2nd feedback 2nd installing 2nd 3rd 4th 5th 6th 7th MNS (Majority Mode Set) clusters 2nd single-node clusters single-quorum device clusters MSDSS (Microsoft Directory Synchronization Services) 2nd backing up 2nd best practices 2nd installing 2nd 3rd notification 2nd recovery 2nd RRAS (Routing and Remote Access Services) VPNs (Virtual Private Networks) 2nd scaling. [See See scaling services] service-level alerts service-level monitoring 2nd SFNW (Services for NetWare) 2nd 3rd 4th configuration 2nd FMU (File Migration Utility) 2nd 3rd 4th 5th FPNW (File and Print Services for NetWare) 2nd 3rd 4th 5th GSNW (Gateway Services for NetWare) 2nd 3rd 4th 5th MSDSS (Microsoft Directory Synchronization Services) 2nd 3rd 4th 5th 6th 7th 8th 9th SUS (Software Update Service) enabling with Group Policy 2nd machine groups NTFS permissions systems management servers Terminal Services 2nd advantages of 2nd directory/file permissions firewalls 2nd 3rd Group Policy 2nd 3rd 4th 5th 6th IAS (Internet Authentication Service) listening port number 2nd load balancing 2nd local drives 2nd local printing 2nd NAS (Network Attached Storage) 2nd Novell networks 2nd 3rd performance enhancements 2nd performance optimization 2nd 3rd 4th 5th 6th 7th redundancy 2nd requirements SANs (Storage Area Networks) 2nd scaling 2nd 3rd 4th 5th 6th 7th Session Directory 2nd 3rd 4th 5th 6th terminal server design 2nd 3rd terminal server lockdown 2nd Windows Resource Manager 2nd 3rd unnecessary services removing VSS (Volume Shadow Copy Service) 2nd best practices 2nd configuring 2nd 3rd data recovery 2nd Web Services Novell networks 2nd Web services scaling 2nd 3rd 4th 5th WINS checking for corruption 2nd WINS (Windows Internet Naming Service) 2nd 3rd 4th database maintenance 2nd environment design 2nd installing 2nd integrating with DNS 2nd legacy Microsoft NetBIOS resolution 2nd LMHOSTS file NetBIOS client resolution 2nd push/pull partners 2nd replication 2nd upgrading 2nd 3rd Windows Server 2003 enhancements 2nd WINS (Windows Internet Naming Services) installing 2nd mixed-mode environments TCP/IP properties 2nd 3rd uninstalling 2nd WSS (Windows SharePoint Services) 2nd 3rd 4th Active Directory Account Creation mode checking in/out documents 2nd compared to SharePoint Portal Server 2nd deployment 2nd 3rd 4th 5th 6th 7th 8th document versioning 2nd 3rd 4th Document Workspaces 2nd extranets 2nd hierarchical storage management indexing 2nd 3rd 4th lists MSDE (Microsoft Data Engine) new features 2nd searching 2nd 3rd security 2nd 3rd 4th 5th 6th shared attachments 2nd Shared Workspace task panes 2nd storage options views Web part support Web sites 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Services for NetWare (SFNW) 2nd 3rd 4th Services for NetWare. [See See SFNW] Session Directory 2nd configuring 2nd redundancy 2nd Sessions section (Terminal Services) Setup Manager 2nd 3rd SFNW (Services for NetWare) 2nd 3rd 4th configuration 2nd FMU (File Migration Utility) 2nd 3rd 4th 5th FPNW (File and Print Services for NetWare) 2nd installing 2nd 3rd GSNW (Gateway Services for NetWare) 2nd 3rd installing 2nd MSDSS (Microsoft Directory Synchronization Services) 2nd backing up 2nd best practices 2nd installing 2nd 3rd shadow copies 2nd best practices 2nd configuring 2nd 3rd restoring data from 2nd Shadow Copy of Shared Folders 2nd client setup recovering corrupted files recovering deleted files 2nd recovering folders 2nd recovering overwritten files Shadow Copy Provider shared folders creating 2nd Shared Workspace task pane (WSS) 2nd SharePoint Administrators group SharePoint Portal Server 2nd SharePoint Portal Services (SPS) SharePoint Team Services. [See See WSS (Windows SharePoint Services)] sharing folders 2nd sharing files. [See See file sharing] SID History 2nd 3rd SID History feature SID History field cleaning up importance of 2nd signal coverage 2nd signals interference 2nd 3rd 4th RF attenuation 2nd 3rd signal coverage 2nd signal levels 2nd signatures, digital 2nd man-in-the-middle attacks Simple File Sharing 2nd 3rd enabling/disabling 2nd SIMs (Subscriber Identity Module) cards simulation mode (RSoP) Single affinity type single domain in-place upgrade 2nd 3rd Single Host filtering mode single sign-on environments 2nd application consolidation directory consolidation Novell networks directory synchronization 2nd 3rd 4th 5th dual-client authentication 2nd single-node clusters single-quorum device clusters site groups site resolution 2nd site-to-site VPNs (Virtual Private Networks) 2nd 3rd 4th sites (AD) 2nd authentication controlling with DNS (Domain Name System) 2nd defined site adoption 2nd summarizing 2nd Sizer tool (Active Directory) 2nd sizing security logs Slow Link Detection 2nd slow links configuring 2nd detecting determining speed of 2nd effect on sites 2nd Slow Link Detection 2nd small businesses WSS (Windows SharePoint Services) deployment 2nd Small Computer System Interface (SCSI) 2nd smart organizations Smart Phones smartcards 2nd smart places smartcards 2nd 3rd 4th 5th 6th 7th building security choosing 2nd enforcing 2nd life expectancy 2nd logins 2nd management tools 2nd memory requirements 2nd Pocket PCs 2nd roles 2nd SIMs (Subscriber Identity Module) cards single sign-on environments application consolidation directory consolidation Smart Phones 2nd smartcard enrollment and authentication strategies best practices 2nd physical security 2nd simplicity smartcard readers 2nd smbclient 2nd SMS monitoring 2nd snap-ins Active Directory Schema snap-in 2nd 3rd DFS (Distributed File System) MMC snap-in Disk Management MMC 2nd Schema snap-in 2nd 3rd Security Configuration and Analysis 2nd snapshotting SNMP Provider SOA (Start of Authority) records 2nd softmodems 2nd software automatic software installations 2nd 3rd 4th 5th best practices 2nd 3rd 4th verifying installation 2nd patches SUS (Software Update Service) 2nd 3rd enabling with Group Policy 2nd machine groups NTFS permissions systems management servers third-party software support 2nd software RAID 2nd Software Update Service (SUS) 2nd Software Update Service. [See See SUS] Sonar.exe tool 2nd SPCR (Serial Port Console Redirection) Special Administration Console (SAC) 2nd speed slow link speed, determining 2nd spindles multiple spindles SPS (SharePoint Portal Services) SQL (Standard Query Language) NAS (Network Attached Storage) 2nd 3rd SANs (Storage Area Networks) 2nd 3rd SRV (Service) records 2nd 3rd 4th 5th SRV (Service) resource records 2nd SSL (Secure Socket Layer) 2nd accelerators 2nd 3rd SSL (Secure Sockets Layer) enabling 2nd 3rd 4th 5th standalone EFS (Encrypting File System) 2nd Standalone Root CAs (certificate authorities) Standalone Subordinate CAs (certificate authorities) standardizing desktop standby scopes Start of Authority (SOA) records 2nd stop errors (log files) 2nd storage DAS (Direct Attached Storage) defined 2nd NAS (Network Attached Storage) Active Directory integration 2nd backups 2nd 3rd 4th best practices 2nd booting from 2nd defined 2nd deploying designing 2nd 3rd 4th 5th 6th developing 2nd DFS (Distributed File System) 2nd disk quotas EFS (Encrypted File System) fault tolerance 2nd file servers 2nd implementation process 2nd Logical Disk Manager 2nd needs analysis piloting planning 2nd Remote Storage 2nd server consolidation 2nd 3rd 4th 5th single MAC address conversations SQL (Standard Query Language) 2nd 3rd system recovery 2nd Terminal Services 2nd SANs (Storage Area Networks) 2nd Active Directory integration 2nd backups 2nd 3rd 4th best practices 2nd booting from 2nd defined 2nd deploying designing 2nd 3rd 4th 5th 6th developing 2nd DFS (Distributed File System) 2nd disk quotas EFS (Encrypted File System) fault tolerance 2nd file servers 2nd implementation process 2nd Logical Disk Manager 2nd needs analysis piloting planning 2nd Remote Storage 2nd server consolidation 2nd 3rd 4th 5th SQL (Standard Query Language) 2nd 3rd system recovery 2nd Terminal Services 2nd zero latency Storage Area Network (SAN) 2nd Storage Area Networks. [See See SANs] Storage Volume Provider striped sets Windows NT to Windows Server migration striped sets with parity Windows NT to Windows Server migration striping disks 2nd stub zones 2nd 3rd 4th Subscriber Identity Module (SIM) cards summarizing Active Directory sites 2nd superscopes support phone number (CMAK) SUS (Software Update Service) 2nd 3rd enabling with Group Policy 2nd machine groups NTFS permissions systems management servers synchronization directories 2nd 3rd 4th 5th domaim controllers eDirectory/NDS synchronization 2nd 3rd MSDSS (Microsoft Directory Synchronization Services) 2nd backing up 2nd best practices 2nd installing 2nd 3rd synchronizing directories forests 2nd 3rd passwords 2nd LDAP 2nd NIS (Network Information System) 2nd 3rd 4th Unix 2nd 3rd 4th Sysprep 2nd 3rd 4th 5th 6th 7th 8th (System Preparation tool) advantages 2nd Audit mode Factory mode Reseal mode 2nd System Compatibility Check tool 2nd system maintenance. [See See maintenance] system monitoring. [See See monitoring Windows Server 2003] system outages protecting against 2nd System Preparation tool. [See See Sysprep] system resources, checking availability of 2nd 3rd system updates checking for 2nd 3rd systems management servers SUS (Software Update Service) |