Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Allen R. — Active Directory Cookbook
Allen R. — Active Directory Cookbook



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Active Directory Cookbook

Автор: Allen R.

Аннотация:

This book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory — including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. Author Robbie Allen, a Senior Systems Architect at Cisco Systems and co-author of our Active Directory tutorial, based this collection of troubleshooting recipes on his own experience, along with input from Windows administrators throughout the industry. Each recipe includes a discussion to explain how and why the solution works, so you can adapt the problem-solving techniques to similar situations.


Язык: en

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 622

Добавлена в каталог: 02.08.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
redefining      
redefining, attributes      
redefining, classes      
Redirect Default Computers Command (redircmp.exe)      
Redirect Default Users Command (redirusr.exe)      
references, application partitions      
refreshing      
refreshing, GPOs      
refreshing, objects      
Reg Command (reg.exe)      
Registration      
registration, resource records      
registration, schema      
Registry Editor (regedit.exe)      
Relative Distinguished Name (RDN)      
reloading schema caches      
Rename Domain Command (rendom.exe)      
renaming      
renaming, computer objects      
renaming, domain controllers      
renaming, domains      
renaming, objects      
renaming, user objects      
replaceable text      
replacing NIS      
Replication      
Replication Diagnostics Command (repadmin.exe)      
Replication Monitor (replmon.exe)      
replication, application partitions      
replication, attributes      
replication, domain controllers      
replication, domain controllers, disabling compression      
replication, domain controllers, enabling consistency      
replication, domain controllers, enabling logging      
replication, domain controllers, forcing      
replication, domain controllers, modifying intervals      
replication, domain controllers, scheduling      
replication, domain controllers, searching conflict objects      
replication, domain controllers, searching unreplicated changes      
replication, domain controllers, synchronizing      
replication, domain controllers, troubleshooting      
replication, domain controllers, viewing metadata      
replication, domain controllers, viewing synchronization status      
replication, site objects, controlling      
resetting      
resetting, ACLs      
resetting, application partitions      
resetting, computer objects      
resetting, DS Restore Mode      
resetting, trusts      
resource records      
resource records, deregistering      
resource records, managing      
resource records, querying      
resource records, registering      
resource records, scavenging      
Resources      
resources, books      
Resources, magazines      
resources, mailing lists      
resources, newsgroups      
resources, web sites      
restarting domain controllers      
restoring      
restoring, authoritative restores      
restoring, deleted objects      
restoring, GPOs      2nd
restoring, nonauthoritative restores      
restricting LDAP queries      
Resultant Set of Policy Snap-in (rsop.msc)      
reverse lookup zones, creating      
RootDSE, viewing      
RSoP      
RSoP, simulating      
RSoP, viewing      
Samba      
saving GPOs      
scavenging resource records      
scheduling replication      
schemas      
schemas, ACLs      
schemas, ACLs, comparing      
schemas, ACLs, resetting      
schemas, attributes      
schemas, attributes, adding      2nd 3rd
schemas, attributes, deactivating      
schemas, attributes, deleting      
schemas, attributes, extending      
schemas, attributes, indexing      
schemas, attributes, modifying      
schemas, attributes, modifying ANR      
schemas, attributes, redefining      
schemas, attributes, searching      
schemas, attributes, viewing      
schemas, caches, reloading      
schemas, classes      
schemas, classes, adding      
schemas, classes, deactivating      
schemas, classes, modifying security      
schemas, classes, redefining      
schemas, classes, searching      
schemas, classes, viewing      
schemas, enabling      
schemas, extensions, documenting      
schemas, overview of      
schemas, registering      
scope, modifying      
Scripts      
scripts, error checking      
scripts, executing      
scripts, GPOs      
Searching      
searching, application partitions      
searching, application partitions, replicas      
searching, application partitions, servers      
searching, attribute-scoped queries      
searching, attributes, schemas      
searching, classes      
searching, computer objects      2nd
searching, conflict objects      
searching, deleted objects      
searching, domain controllers      
searching, domain controllers, unreplicated changes      
searching, domains      
searching, domains, forests      
searching, domains, NetBIOS names      
searching, FSMO role holders      
searching, global catalog      2nd
searching, GPOs      
searching, groups      
searching, logon attempts      
searching, objects      
searching, objects, large numbers of      
searching, quota object      
searching, security      
searching, services      
searching, site objects      
searching, site objects, bridgehead servers      
searching, site objects, subnets      
searching, user objects      2nd
searching, with bitwise filters      
Secure Sockets Layer      [See SSL]
Security      
Security Identifier      [See SID]
security, classes      
security, computer objects      
security, computer objects, resetting      
security, GPOs      
security, quota objects      
security, quota objects, searching      
seizing FSMO role holders      
serverless binds      
Servers      
servers, application partitions      
servers, bridgehead      
servers, bridgehead, configuring      
servers, bridgehead, searching      
servers, DHCP, authorizing      
servers, DNS object, modifying      
servers, domain controllers      
servers, listing      
services, searching      
shortcut trusts      
SID (Security Identifier)      
SID, duplicates      
SID, filtering      
simulating RSoP      
site objects      
site objects, bridgehead servers      
site objects, bridging      
site objects, completing KCC      
site objects, connection objects      
site objects, connection objects, load-balancing      2nd
site objects, connection objects, viewing      
site objects, creating      
site objects, deleting      
site objects, disabling      
site objects, disabling KCC      
site objects, domain controllers      
site objects, domain controllers, configuring multiple sites      
site objects, domain controllers, disabling      
site objects, domain controllers, viewing      
site objects, forcing hosts      
site objects, linking      
site objects, listing      
site objects, listing, servers      
site objects, modifying      
site objects, modifying KCC      
site objects, moving      
site objects, searching      
site objects, searching, bridgehead servers      
site objects, subnets      
site objects, subnets, creating      
site objects, subnets, listing      
site objects, subnets, searching      
site objects, transferring      
site objects, triggering KCC      
site objects, troubleshooting      
sites      
sites, domain controllers      
sites, domain controllers, moving      
sites, domain controllers, searching      
sites, global catalogs, searching      
sizing databases      
SSL (Secure Sockets Layer)      
SSL, enabling      
SSL, encrypting      
strict consistency      
structural classes, searching      
Subnets      
subnets, creating      
subnets, listing      
subnets, searching      
suffixes      
suffixes, allowing      
suffixes, UPN      
Synchronization      
synchronization, domain controllers      
synchronization, status, viewing      
targeting domain controllers      
Testing      
testing, computer objects      
testing, queries      
testing, VMWare      
text, replaceable      
Time Service (w32tm.exe)      
time-to-live (TTL), modifying      
timestamps, viewing      
TLS (Transport Layer Security)      
TLS, enabling      
TLS, encrypting      
tombstone objects      
tombstone objects, logging      
tombstone objects, modifying      2nd
Tools      
tools, ADPrep      
tools, ADPrep, promoting domain controllers      
tools, command-line      
tools, ldifde utility      
Traffic      
traffic, forcing      
traffic, modifying      
transferring      
transferring, FSMO role holders      
transferring, site objects      
transferring, user objects      
transitive trusts, creating      
transitivity, disabling site links      
Transport Layer Security      [See TLS]
Trees      
trees, creating      
trees, deleting      
trees, deleting orphans      
triggering KCC      
troubleshooting      [See also quota object]
troubleshooting, DIT files      
troubleshooting, domain controller promotion/demotion      
troubleshooting, error checking      
troubleshooting, offline defrag, reclaiming whitespace      
troubleshooting, online defrag, repairing manually      
troubleshooting, replication      
troubleshooting, site objects      
troubleshooting, user objects      
trustedDomain objects      
trusts      
trusts, deleting      
trusts, Kerberos realm      
trusts, overview of      
trusts, resetting      
trusts, shortcuts      
trusts, SID filtering      
trusts, transitive      
trusts, verifying      
trusts, viewing      
trusts, Windows NT      
TTL (time-to-live), modifying      
types of groups      
Unlock (unlock.exe)      
unlocking user objects      
unused computer objects, searching      
Updating      
updating, schemas      
updating, user accounts      
upgrading domain controllers      2nd
UPN (User Principal Name)      
User objects      
user objects, accounts      
user objects, accounts, configuring expiration      
user objects, accounts, updating      
user objects, computer objects      
user objects, copying      
user objects, creating      
user objects, creating, inetOrgPerson      
user objects, creating, large number of      
user objects, creating, modifying      
user objects, Delegation of Control Wizard      
user objects, Delegation of Control Wizard, customizing      
user objects, duplicating      
user objects, effective permissions      
user objects, enabling      
1 2 3 4 5 6
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте