Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] s command-line parameter S parameter PING command Tracert utility s parameter Arp DCDIAG 2nd Netstat Safe mode Safe Mode with Command Prompt Safe mode with networking SAM subkey (HKEY_LOCAL_MACHINE hive) SamAccountName attribute sample scripts, local group membership, checking SANs (Storage Area Networks) SAP for IPX routing protocol SAP parameters window saving captured frames log files Registry keys scalability IIS 6 MOM single quorum cluster Terminal Services scavenging RRs schedules replication default replication, selecting scheduling storage reports in FSRM schema master (OM role) Schema MMC Snap-in schema objects, deleting Active Directory schemas AD customizing extending modifying with ADSI (Active Directory Service Interfaces) objects upgrading attributes, deactivating modifications scope of projects scope of work, defining scopes AD groups DHCP groups in Active Directory Multicast standby failover approach SuperScope (DHCP) screen content, capturing screen savers, password protection screens, Performance Console startup scripting AD AD searches ADuser.vbs script advantages ASP creating users from CSV files directory administration scripts documented instruction scripts domain printer, example Exchange 2000 overview Quarantine Policy Check post-connection execution script sample scripts creating users from CSV files domain printer installed software components, searching 2nd orphaned Group Polices, searching 2nd volume free space server management scripts Subsystem for Unix-based Applications system user configuration scripts user management users attributes, populating creating users from file data Csvde.exe flat file connections flat file data source connections Ldifde.exe VBScript volume free space WMI workstation management scripts WSH scripts assigning computer startup, assigning Group Policy Logarchive.vbs startup, logon.bat files, adding as unattended installations example launching Scripts (Logon/Logoff) extension Scripts (Startup/Shutdown) extension SCW (Security Configuration Wizard) searching AD Group Policies installed software script orphaned Group Policies, sample script Registry WINS secondary subsystems secondary zones 2nd secure channels, .NET Passport Secure Socket Layer [See SSL (Secure Sockets Layer).] secure templates Secure Update Received/Sec (DNS performance counter) Secure Update Received/Sec/Sec (DNS performance counter) secure updates, DNS securing FTP security .NET Passport access, restricting account policies Active Directory 2nd administrative access anonymous authentication antivirus programs authentication authorization backup basic authentication Certificate Services 2nd certificates Client Authentication certificate purpose CLR DHCP digest authentication Directory Services Restore Mode EFS encryption event logs file systems file-level firewalls 2nd fix consistency FTP GPOs (Group Policy Objects) namespaces Group Policies IDS (intrusion detection system) IETF (Internet Engineering Task Force) standards IIS 6 2nd auditing authentication FTP authentication, securing FTP security FTP security options, configuring FTP transfers, securing SSL certificates Web service extensions, locking down Windows .NET Server 2003 improvements integrated Windows authentication internal audits 2nd Internet Explorer, Enhanced Security Configuration 2nd IPSec 2nd 3rd 4th layers local policies logins, restricting logs migration MOM .NET Passport network access network clients non-Microsoft Kerberos realms Passport improvements physical PKI policies administrative controls application-level desktop education enforcing enterprise 2nd issue-specific network infrastructure 2nd organizing procedures and checklists system-level technical controls policies toolbox CAs MBSA monitoring tools RMS SCW Security Configuration and Analysis tools stress-testing tools private keys public keys 2nd Read and Apply Group Policy properties Registry restricted groups risks Server Authentication certificate purpose servers services, turning off share-level, NTFS, compared smartcards 2nd software restriction policies SUS system services templates Terminal Services transport-level Trustworthy Computing initiative updating VPNs administration L2TP/IPSec RRAS Tunneling protocol tunnels Windows .NET Server wire wireless improvements wireless network policies WSUS Automatic Updates client configuration customizing history installing requirements synchronizing updates, approving updates, deploying Security Accounts tab (FTP Sites folder properties page) Security Configuration and Analysis tool Security Configuration Wizard (SCW) security documentation security framework security groups 2nd permission sharing SID (Security ID) universal Security ID (SID) Security Log 2nd Security Monitor (IPSec) security permissions, setting Security Settings (Computer Configuration and User Configuration) SECURITY subkey (HKEY_LOCAL_MACHINE hive) security templates, Group Policies security-based configuration groups (MOM) segmenting resources selecting authentication protocols Cluster Service applications clustering technologies DFS types licensing modes migration paths unattended installations VPN protocols Server Authentication certificate purpose server failures hard drive failures recovering from ASR restore boot loader file manual restoring vs rebuilding system state restore software corruption server farms server management domain controllers file servers print servers server roles terminal servers Web servers server management scripts Server parameter, Nslookup Server Performance Analyzer (SPA 2.0) server roles for performance optimization server management server settings, Terminal Services Configuration MMC snap-in Server Status Monitor (SSM) servers [See also Windows Server 2003; Windows .NET Server.] application ASR (Automatic Server Recovery) build documents caching-only cluster components, registering configuration documentation CYS (Configure Your Server) Wizard D-DCAM, MOM DAS databases MOM monitoring DC (domain controller) DCAM, MOM DFS (Distributed File Systems) DHCP (Dynamic Host Configuration Protocol) 2nd 3rd DNS (domain name service) domain member, migrating domains, volume free space script file 2nd 3rd forwarders functionality, testing global catalogs 2nd 3rd IIS 6 requirements, determining Internet Information Server and Site Server IP addresses IPSec policies licensing maintenance 2nd management scripts managing media messaging, monitoring migration documentation NT4 migration requirements pilot phase, Windows Server 2003 migration print 2nd 3rd remote access remote management RIS for Servers RRAS security Session Directory 2nd SharePoint Portal single server upgrade standalone server upgrade storage Telnet, SFU remote administration temporary, promoting terminal 2nd application installations fault tolerance hosted applications networking requirements placement upgrades TS License types, Windows Server 2003 virtual, clustering VPN Web 2nd 3rd Web application server settings Windows Software Update Server WSS, updates/patches service accounts migrating into AD MOM 2nd service agreements, .NET Passport service packs (SPs) command-line parameters consistency deploying SUS Terminal Services Windows Server 2003 updates Windows Update service providers, application (Terminal Services) Service records (SRV) Service tab (Default Web Site Properties page) service updates/patches, compatibility Service-Level Agreements (SLAs) 2nd Services 2nd [See also Web Services.] Active Directory applications, compared backing up 2nd Certificate Services DFS DHCP databases disk configuration DNS IIS metabase Remote Storage Service Removable Storage Service WINS dependencies DHCP client DHCP server FTP, installing and configuring IIS 6 Admin Indexing Service, IIS 6 Media configuring installing load testing performance playlist broadcasting, configuring playlists, starting real-time live broadcasts single video broadcasts system requirements video directories network, new features NLB clusters NNTP Service, IIS 6 recovering Certificate Services DHCP data DNS zones WINS data redundant domain SharePoint access alerts customizations discussions document libraries document management 2nd file uploads FrontPage 2003 integration full SQL Server 2000 instances installing interface lists 2nd meeting workspaces Office 2003 integration personal sites personalizing picture libraries Portal Server presence menus requirements site customizations Site Directory site templates surveys 2nd team collaboration Team Services technologies templates Word Shared Workspaces workspace WSS server updates/patches SMTP Service systems, security Terminal [See Terminal Services.] turning off users Web, configuring X.500 directory Services agreement (.NET Passport) Services for NetWare [See SFNW (Services for NetWare).] Services for UNIX [See SFU (Services for UNIX).] Services test Session Directory 2nd Session Directory server 2nd Session pane, Netmon sessions, capturing media set audit-logging command set loglevel command set machine command set mode command setclassid parameter, Ipconfig utility Setup Manager unattended installations Windows XP deployment setup wizards SETX.exe utility Sfc.exe (System File Checker) SFNW (Services for NetWare) 2nd FMU FPNW installing MSDSS SFU (Services for UNIX) administration components development installing NFS prerequisites Subsystem for Unix-based Applications user synchronization shadow copies best practices configuring 2nd data recovery deleting 2nd managing Shadow.exe share-level security, NTFS, compared shared disks, backing up clusters Shared Document page, actions shared nothing architecture shared printers, adding shared storage devices, Cluster Services Shared Workspaces, Word SharePoint 2nd access alerts customizations discussions document libraries document management 2nd file uploads full SQL Server 2000 instances installing interface lists advantages editing listing of viewing meeting workspaces Office 2003 integration personal sites personalizing picture libraries Portal server pre-installation steps presence menus requirements servers, updates/patches Site Directory sites customizing FrontPage 2003 integration templates surveys 2nd team collaboration Team Services technologies templates Word Shared Workspaces workspace WSS server updates/patches SharePoint Portal Server [See SPs.] shares (files) client-side caching data recovery DFS root managing permissions sharing security group permissions shortcut trusts 2nd show alias command show audit-logging command show helper command show loglevel command show machine command show mode command show netdlls command show version command showclassid parameter, Ipconfig utility shuffling videos SID (Security ID) 2nd signature-based detection signing drivers File Signature Verification Sigverif.exe (File Signature Verification) Simple Mail Transport Protocol (SMTP) Simple Network Management Protocol (SNMP) simple volumes single domain model single forest model single host mode (port filtering) single node cluster, Cluster Service configuration single nodes, restoring server failure service failure single quorum cluster, scalability single quorum device cluster, Cluster Service configuration single server MOM configuration single server upgrade, Windows 2000 to Windows Server 2003 migration single sign-in [See SSI (single sign-in).] single sign-on single video broadcasts single-site designs Site Directory, SharePoint site failures client connectivity creating failing back failing over between sites failover sites planning redundant sites Site Group Policies, AD sites site link bridgeheads, Active Directory replication site links, Active Directory replication site-to-site connections sites [See also AD (Active Directory), sites, structure; FTP (File Transfer Protocol), sites, creating.] Active Directory replication SharePoint customizing FrontPage 2003 integration structure six states (compatibility) size MOM databases Registry, managing skip parameter DCDIAG 2nd NetDiag SLAs (service-level agreements) 2nd slipstreaming Service Packs slow links, group policies smartcards 2nd SMS (Systems Management Server) 2nd SMTP (Simple Mail Transport Protocol) encrypting replication SMTP replication, selecting SMTP Service snap-in namespaces (Group Policy) Computer Configuration Computer Configuration/Administrative Templates Computer Configuration/Security Settings Computer Configuration/Software Settings Computer Configuration/Windows Settings Scripts Software Installation Service User Configuration User Configuration/Administrative Templates User Configuration/Security Settings User Configuration/Software Settings User Configuration/Windows Settings snap-ins, Group Policy configuring IIS, configuring IIS 6 opening SNMP (Simple Network Management Protocol) SNMP agent, RRAS SOA (Start of Authority) records soft faults (memory) software clients, installations compatibility list Web site corruption desktop, installing error reporting installed components, searching for script installing group policies MOM requirements multicast imaging NT4 migration compatibility Sharepoint requirements third-party application packaging third-party imaging Windows Software Update Server Software Installation Service (Group Policy) software restriction policies, security Software Settings (Computer Configuration and User Configuration) SOFTWARE subkey (HKEY_LOCAL_MACHINE hive) Software Update Services [See SUS (Software Update Services).] solutions to problems, implementation approach (design documents) SONAR, FRS, monitoring Sonar.exe source property, logs SPA 2.0 (Server Performance Analyzer) spaghetti domain structure (Windows NT4) spanned volumes special paths, redirecting folders special-purpose domains speed and risk, comparing speed, slow links spreadsheet data, SharePoint list of SPs [See Terminal Services, service packs.] SPS (SharePoint Portal Server) SQL Server 2000 instances, SharePoint SQL Server databases, MIIS SRV (Service) records 2nd SSI (single sign-in) SSL (Secure Sockets Layer) 2nd .NET Passport certificates applying CAs, requesting IIS 6 security requesting for Web sites SSM (Server Status Monitor) staging folder standalone root CA 2nd standalone server upgrade, Windows 2000 to Windows Server 2003 migration standalone subordinate CA 2nd standard and AD-integrated DNS zones, comparing Standard edition of Windows Server 2003 standards group naming Internet, Microsoft adoption Windows Server 2003 standby scopes failover approach Start Menu, limiting Start of Authority records (SOA) Start Windows Normally starting playlists real-time live broadcasts startup troubleshooting startup screens, Performance Console startup scripts, logon.bat files state, backing up systems Statement of Policy (Microsoft) static IP addresses Station Statistics pane, Netmon status, monitoring DFS steps of migration projects, defining storage data, MOM DNS zones file systems Registry Remote Storage backing up best practices configuring installing Removable Storage Service, backing up servers shared storage devices, Cluster Services Storage Area Networks (SANs) storage limits, checking storage management, FSRM configuring user storage limits creating file screen templates file screens quota templates storage reports installing storage reports, creating in FSRM stress-testing tools string values striped sets with parity, NT4 migration striped sets, NT4 migration striped volumes structured design documents structures Active Directory 2nd authentication modes domain trees domain trees and subdomains domains forests functional levels Kerberos mixed domain functional level NTLM (NT LAN Manager) placeholder domains sites Windows .NET Interim mode (interim domain functional level) Windows 2000 Native mode (native domain functional level) Windows Server 2003 domain functional level domains, choosing groups, designs OUs (organizational units) designs nesting text hierarchy spaghetti domains (Windows NT4) Windows NT4 domains stub zones SubCommand parameter, Nslookup subdomains in Active Directory DNS msdcs, DNS multiple domain model shortcut trust subkeys HARDWARE/ACPI subkey (HARDWARE subkey) HARDWARE/DESCRIPTION subkey (HARDWARE subkey) HARDWARE/DEVICEMAP subkey (HARDWARE subkey) HARDWARE/RESOURCEMAP subkey (HARDWARE subkey) HKEY_CURRENT_USER hive HKEY_LOCAL_MACHINE hive HKEY_USERS hive Registry subnets AD sites AD sites association creating site associations Subsystem for Unix-based Applications subsystems disk, evaluating network, monitoring secondary Superscope (DHCP) support Terminal Services command-line tools disabling disaster recovery remote management service packs Terminal Server Manager updating users WMI Unicode characters, DNS Surveys, SharePoint 2nd SUS (Software Update Services) 2nd 3rd [See also history, WSUS.] Automatic Updates Client download hotfixes SPs Windows Update switch flooding, NLB clusters switches, documenting configurations Synchronization dialog box synchronization interface, Producer synchronizing global catalog passwords, SFU WSUS syntax, DCDIAG sysprep system compatibility, server upgrades system events auditing monitoring System File Checker system files, File Protection system logs system memory, monitoring System Monitor counters displays FRS, monitoring multiple configurations performance remote monitoring system performance disk subsystems, evaluating monitoring NBT Connection: Bytes Total/sec (network traffic counter) NBT Redirector: Bytes Total/sec (network traffic counter) NBT Server: Bytes Total/sec (network traffic counter) network subsystems, monitoring processor usage, analyzing system memory, monitoring thrashing System Preparation Tool, Windows XP deployment system root security templates system services, security System Startup and Recovery utility system state, restoring SYSTEM subkey (HKEY_LOCAL_MACHINE hive) system usage policies system volumes backing up disk failures system, scripting system-level security policies systemlog test systems disk subsystems, evaluating fault-tolerant application reliability creating network hardware server storage UPSs file DFS [See file systems, DFS.] FRS remote storage security VSS managing MOM monitoring CLFS Performance Logs and Alerts utility performance monitoring tools System Monitor utility tools trace logs network subsystems, monitoring networks, inventory processes running recovering state, backing up Systems Management Server (SMS) 2nd SYSVOL folders, restoring |