Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] g parameter Arp Pathping command GANTT charts gateway parameter, Route command Gateway Services for NetWare (GSNW) GC/DCs (Global Catalog Domain Controllers) GCs (global catalog servers) generic cluster resources geographic-based configuration groups (MOM) geographical depth and breadth, Windows Server 2003 migration geographical diversity of users, migration testing geographical-based designs GetObject method, users, creating GETTYPE.exe utility ghost domain controllers, retiring GLBA (Gramm Leach Bliley Act) 2nd global catalog Active Directory 2nd information, caching media, creating schema modifications servers 2nd synchronization Global Catalog Domain Controllers (GC/DCs) global catalog restores global catalog servers (GCs) global groups 2nd 3rd 4th goals business, identifying migration processes projects, design documents technical, identifying deployment team participants, defining design team participants, defining scope of work, defining timeframes (implementation or migration), determining GPMC (Group Policy Management Console) 2nd 3rd 4th backups copying downloading forests Group Policies, searching HTML reports importing restoring RSoP 2nd tables, migrating WMI Filters, linking GPmonitor.exe GPOs (Group Policy Objects) [See also Group Policies; Group Policy Object Editor.] creating deleting disabling editing Local Group Policy Object, editing namespaces naming conventions Registry, auditing unlinking GPOTool.exe GPresult.exe GPupdate.exe Gramm Leach Bliley Act (GLBA) 2nd granular session control grooming intervals, MOM databases Group Account Migration Wizard 2nd group designs, OUs group management, MIIS Group Policies administrative templates add-on baseline Outlook preferences customizing 2nd delegates managing Outlook 2nd Polices vs preferences rights, assigning automatic client configurations backing up Block Policy Inheritance 2nd computer policies configuration settings, disabling configuring copying creating cross-domain assignments default domain policy desktop application management Enforcement feature GPMC Group Policy snap-in, configuring importing inheritance 2nd 3rd installing Link Enabled option linking loopback managing minimum names network clients real-life scenarios administrator workstations mobile users power user support remote users security workstation lock downs network clients, managing No Override option ordering orphaned, deleting refresh intervals restoring rights RSoP 2nd searching searching for orphaned script 2nd security slow links 2nd snap-in namespaces snap-ins, opening software installations system event auditing Terminal Servers Terminal Services security tools troubleshooting user policies viewing 2nd Windows Server 2003 installations WMI Group Policy Management Console [See GPMC (Group Policy Management Console).] Group Policy Object [See GPOs (Group Policy Objects).] Group Policy Object Editor 2nd Folder Redirection folders, redirecting opening policies, viewing Scripts (Logon/Logoff) extension Scripts (Startup/Shutdown) extension Group Policy snap-in, configuring Group table window groups Active Directory 2nd creating distribution domain functionality levels domain local 2nd forest user administration global 2nd machine local managing OUs (organizational units), comparing populating scopes security single domain user administration types of universal 2nd cluster resource clusters creating moving configuration (MOM) geographic-based multiple political security-based designs best practices business function-based distribution groups geographical-based group naming standards group nesting model samples universal distribution groups universal groups universal security groups distribution groups distribution, designs domain local 2nd global 2nd 3rd local machine local 2nd mail-enabled groups migrating ADMT v2.0 domain migration naming standards nesting permissions, assigning resource sharing policies, OU designs restricted Group Policies security scopes security SID (Security ID) structure designs types of universal 2nd 3rd BDCs caching 2nd distribution incremental membership replication memberships, replicating security GSNW (Gateway Services for NetWare) |