|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Allen R. — Active Directory Cookbook |
|
|
Предметный указатель |
redefining
redefining, attributes
redefining, classes
Redirect Default Computers Command (redircmp.exe)
Redirect Default Users Command (redirusr.exe)
references, application partitions
refreshing
refreshing, GPOs
refreshing, objects
Reg Command (reg.exe)
Registration
registration, resource records
registration, schema
Registry Editor (regedit.exe)
Relative Distinguished Name (RDN)
reloading schema caches
Rename Domain Command (rendom.exe)
renaming
renaming, computer objects
renaming, domain controllers
renaming, domains
renaming, objects
renaming, user objects
replaceable text
replacing NIS
Replication
Replication Diagnostics Command (repadmin.exe)
Replication Monitor (replmon.exe)
replication, application partitions
replication, attributes
replication, domain controllers
replication, domain controllers, disabling compression
replication, domain controllers, enabling consistency
replication, domain controllers, enabling logging
replication, domain controllers, forcing
replication, domain controllers, modifying intervals
replication, domain controllers, scheduling
replication, domain controllers, searching conflict objects
replication, domain controllers, searching unreplicated changes
replication, domain controllers, synchronizing
replication, domain controllers, troubleshooting
replication, domain controllers, viewing metadata
replication, domain controllers, viewing synchronization status
replication, site objects, controlling
resetting
resetting, ACLs
resetting, application partitions
resetting, computer objects
resetting, DS Restore Mode
resetting, trusts
resource records
resource records, deregistering
resource records, managing
resource records, querying
resource records, registering
resource records, scavenging
Resources
resources, books
Resources, magazines
resources, mailing lists
resources, newsgroups
resources, web sites
restarting domain controllers
restoring
restoring, authoritative restores
restoring, deleted objects
restoring, GPOs 2nd
restoring, nonauthoritative restores
restricting LDAP queries
Resultant Set of Policy Snap-in (rsop.msc)
reverse lookup zones, creating
RootDSE, viewing
RSoP
RSoP, simulating
RSoP, viewing
Samba
saving GPOs
scavenging resource records
scheduling replication
schemas
schemas, ACLs
schemas, ACLs, comparing
schemas, ACLs, resetting
schemas, attributes
schemas, attributes, adding 2nd 3rd
schemas, attributes, deactivating
schemas, attributes, deleting
schemas, attributes, extending
schemas, attributes, indexing
schemas, attributes, modifying
schemas, attributes, modifying ANR
schemas, attributes, redefining
schemas, attributes, searching
schemas, attributes, viewing
schemas, caches, reloading
schemas, classes
schemas, classes, adding
schemas, classes, deactivating
schemas, classes, modifying security
schemas, classes, redefining
schemas, classes, searching
schemas, classes, viewing
schemas, enabling
schemas, extensions, documenting
schemas, overview of
schemas, registering
scope, modifying
Scripts
scripts, error checking
scripts, executing
scripts, GPOs
Searching
searching, application partitions
searching, application partitions, replicas
searching, application partitions, servers
searching, attribute-scoped queries
searching, attributes, schemas
searching, classes
searching, computer objects 2nd
searching, conflict objects
searching, deleted objects
searching, domain controllers
searching, domain controllers, unreplicated changes
searching, domains
searching, domains, forests
searching, domains, NetBIOS names
searching, FSMO role holders
searching, global catalog 2nd
searching, GPOs
searching, groups
searching, logon attempts
searching, objects
searching, objects, large numbers of
searching, quota object
searching, security
searching, services
searching, site objects
searching, site objects, bridgehead servers
searching, site objects, subnets
searching, user objects 2nd
searching, with bitwise filters
Secure Sockets Layer [See SSL]
Security
Security Identifier [See SID]
security, classes
security, computer objects
security, computer objects, resetting
security, GPOs
security, quota objects
security, quota objects, searching
| seizing FSMO role holders
serverless binds
Servers
servers, application partitions
servers, bridgehead
servers, bridgehead, configuring
servers, bridgehead, searching
servers, DHCP, authorizing
servers, DNS object, modifying
servers, domain controllers
servers, listing
services, searching
shortcut trusts
SID (Security Identifier)
SID, duplicates
SID, filtering
simulating RSoP
site objects
site objects, bridgehead servers
site objects, bridging
site objects, completing KCC
site objects, connection objects
site objects, connection objects, load-balancing 2nd
site objects, connection objects, viewing
site objects, creating
site objects, deleting
site objects, disabling
site objects, disabling KCC
site objects, domain controllers
site objects, domain controllers, configuring multiple sites
site objects, domain controllers, disabling
site objects, domain controllers, viewing
site objects, forcing hosts
site objects, linking
site objects, listing
site objects, listing, servers
site objects, modifying
site objects, modifying KCC
site objects, moving
site objects, searching
site objects, searching, bridgehead servers
site objects, subnets
site objects, subnets, creating
site objects, subnets, listing
site objects, subnets, searching
site objects, transferring
site objects, triggering KCC
site objects, troubleshooting
sites
sites, domain controllers
sites, domain controllers, moving
sites, domain controllers, searching
sites, global catalogs, searching
sizing databases
SSL (Secure Sockets Layer)
SSL, enabling
SSL, encrypting
strict consistency
structural classes, searching
Subnets
subnets, creating
subnets, listing
subnets, searching
suffixes
suffixes, allowing
suffixes, UPN
Synchronization
synchronization, domain controllers
synchronization, status, viewing
targeting domain controllers
Testing
testing, computer objects
testing, queries
testing, VMWare
text, replaceable
Time Service (w32tm.exe)
time-to-live (TTL), modifying
timestamps, viewing
TLS (Transport Layer Security)
TLS, enabling
TLS, encrypting
tombstone objects
tombstone objects, logging
tombstone objects, modifying 2nd
Tools
tools, ADPrep
tools, ADPrep, promoting domain controllers
tools, command-line
tools, ldifde utility
Traffic
traffic, forcing
traffic, modifying
transferring
transferring, FSMO role holders
transferring, site objects
transferring, user objects
transitive trusts, creating
transitivity, disabling site links
Transport Layer Security [See TLS]
Trees
trees, creating
trees, deleting
trees, deleting orphans
triggering KCC
troubleshooting [See also quota object]
troubleshooting, DIT files
troubleshooting, domain controller promotion/demotion
troubleshooting, error checking
troubleshooting, offline defrag, reclaiming whitespace
troubleshooting, online defrag, repairing manually
troubleshooting, replication
troubleshooting, site objects
troubleshooting, user objects
trustedDomain objects
trusts
trusts, deleting
trusts, Kerberos realm
trusts, overview of
trusts, resetting
trusts, shortcuts
trusts, SID filtering
trusts, transitive
trusts, verifying
trusts, viewing
trusts, Windows NT
TTL (time-to-live), modifying
types of groups
Unlock (unlock.exe)
unlocking user objects
unused computer objects, searching
Updating
updating, schemas
updating, user accounts
upgrading domain controllers 2nd
UPN (User Principal Name)
User objects
user objects, accounts
user objects, accounts, configuring expiration
user objects, accounts, updating
user objects, computer objects
user objects, copying
user objects, creating
user objects, creating, inetOrgPerson
user objects, creating, large number of
user objects, creating, modifying
user objects, Delegation of Control Wizard
user objects, Delegation of Control Wizard, customizing
user objects, duplicating
user objects, effective permissions
user objects, enabling
|
|
|
Реклама |
|
|
|