Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Allen R. — Active Directory Cookbook
Allen R. — Active Directory Cookbook



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Active Directory Cookbook

Автор: Allen R.

Аннотация:

This book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory — including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. Author Robbie Allen, a Senior Systems Architect at Cisco Systems and co-author of our Active Directory tutorial, based this collection of troubleshooting recipes on his own experience, along with input from Windows administrators throughout the industry. Each recipe includes a discussion to explain how and why the solution works, so you can adapt the problem-solving techniques to similar situations.


Язык: en

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 622

Добавлена в каталог: 02.08.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
redefining      
redefining, attributes      
redefining, classes      
Redirect Default Computers Command (redircmp.exe)      
Redirect Default Users Command (redirusr.exe)      
references, application partitions      
refreshing      
refreshing, GPOs      
refreshing, objects      
Reg Command (reg.exe)      
Registration      
registration, resource records      
registration, schema      
Registry Editor (regedit.exe)      
Relative Distinguished Name (RDN)      
reloading schema caches      
Rename Domain Command (rendom.exe)      
renaming      
renaming, computer objects      
renaming, domain controllers      
renaming, domains      
renaming, objects      
renaming, user objects      
replaceable text      
replacing NIS      
Replication      
Replication Diagnostics Command (repadmin.exe)      
Replication Monitor (replmon.exe)      
replication, application partitions      
replication, attributes      
replication, domain controllers      
replication, domain controllers, disabling compression      
replication, domain controllers, enabling consistency      
replication, domain controllers, enabling logging      
replication, domain controllers, forcing      
replication, domain controllers, modifying intervals      
replication, domain controllers, scheduling      
replication, domain controllers, searching conflict objects      
replication, domain controllers, searching unreplicated changes      
replication, domain controllers, synchronizing      
replication, domain controllers, troubleshooting      
replication, domain controllers, viewing metadata      
replication, domain controllers, viewing synchronization status      
replication, site objects, controlling      
resetting      
resetting, ACLs      
resetting, application partitions      
resetting, computer objects      
resetting, DS Restore Mode      
resetting, trusts      
resource records      
resource records, deregistering      
resource records, managing      
resource records, querying      
resource records, registering      
resource records, scavenging      
Resources      
resources, books      
Resources, magazines      
resources, mailing lists      
resources, newsgroups      
resources, web sites      
restarting domain controllers      
restoring      
restoring, authoritative restores      
restoring, deleted objects      
restoring, GPOs      2nd
restoring, nonauthoritative restores      
restricting LDAP queries      
Resultant Set of Policy Snap-in (rsop.msc)      
reverse lookup zones, creating      
RootDSE, viewing      
RSoP      
RSoP, simulating      
RSoP, viewing      
Samba      
saving GPOs      
scavenging resource records      
scheduling replication      
schemas      
schemas, ACLs      
schemas, ACLs, comparing      
schemas, ACLs, resetting      
schemas, attributes      
schemas, attributes, adding      2nd 3rd
schemas, attributes, deactivating      
schemas, attributes, deleting      
schemas, attributes, extending      
schemas, attributes, indexing      
schemas, attributes, modifying      
schemas, attributes, modifying ANR      
schemas, attributes, redefining      
schemas, attributes, searching      
schemas, attributes, viewing      
schemas, caches, reloading      
schemas, classes      
schemas, classes, adding      
schemas, classes, deactivating      
schemas, classes, modifying security      
schemas, classes, redefining      
schemas, classes, searching      
schemas, classes, viewing      
schemas, enabling      
schemas, extensions, documenting      
schemas, overview of      
schemas, registering      
scope, modifying      
Scripts      
scripts, error checking      
scripts, executing      
scripts, GPOs      
Searching      
searching, application partitions      
searching, application partitions, replicas      
searching, application partitions, servers      
searching, attribute-scoped queries      
searching, attributes, schemas      
searching, classes      
searching, computer objects      2nd
searching, conflict objects
searching, deleted objects      
searching, domain controllers
searching, domain controllers, unreplicated changes      
searching, domains      
searching, domains, forests      
searching, domains, NetBIOS names      
searching, FSMO role holders      
searching, global catalog      2nd
searching, GPOs      
searching, groups
searching, logon attempts      
searching, objects
searching, objects, large numbers of      
searching, quota object      
searching, security
searching, services
searching, site objects
searching, site objects, bridgehead servers      
searching, site objects, subnets      
searching, user objects      2nd
searching, with bitwise filters      
Secure Sockets Layer      [See SSL]
Security
Security Identifier      [See SID]
security, classes
security, computer objects
security, computer objects, resetting
security, GPOs
security, quota objects
security, quota objects, searching      
seizing FSMO role holders
serverless binds
Servers
servers, application partitions      
servers, bridgehead      
servers, bridgehead, configuring
servers, bridgehead, searching      
servers, DHCP, authorizing      
servers, DNS object, modifying      
servers, domain controllers      
servers, listing      
services, searching
shortcut trusts      
SID (Security Identifier)      
SID, duplicates      
SID, filtering
simulating RSoP      
site objects      
site objects, bridgehead servers      
site objects, bridging      
site objects, completing KCC
site objects, connection objects
site objects, connection objects, load-balancing      2nd
site objects, connection objects, viewing      
site objects, creating
site objects, deleting
site objects, disabling
site objects, disabling KCC
site objects, domain controllers
site objects, domain controllers, configuring multiple sites      
site objects, domain controllers, disabling
site objects, domain controllers, viewing
site objects, forcing hosts      
site objects, linking      
site objects, listing      
site objects, listing, servers      
site objects, modifying
site objects, modifying KCC      
site objects, moving
site objects, searching
site objects, searching, bridgehead servers
site objects, subnets      
site objects, subnets, creating      
site objects, subnets, listing
site objects, subnets, searching
site objects, transferring      
site objects, triggering KCC      
site objects, troubleshooting      
sites
sites, domain controllers
sites, domain controllers, moving
sites, domain controllers, searching      
sites, global catalogs, searching      
sizing databases
SSL (Secure Sockets Layer)
SSL, enabling
SSL, encrypting
strict consistency
structural classes, searching      
Subnets
subnets, creating      
subnets, listing      
subnets, searching
suffixes
suffixes, allowing
suffixes, UPN
Synchronization      
synchronization, domain controllers
synchronization, status, viewing
targeting domain controllers
Testing
testing, computer objects
testing, queries      
testing, VMWare      
text, replaceable      
Time Service (w32tm.exe)      
time-to-live (TTL), modifying      
timestamps, viewing
TLS (Transport Layer Security)      
TLS, enabling      
TLS, encrypting      
tombstone objects      
tombstone objects, logging      
tombstone objects, modifying      2nd
Tools
tools, ADPrep      
tools, ADPrep, promoting domain controllers      
tools, command-line
tools, ldifde utility
Traffic      
traffic, forcing
traffic, modifying      
transferring      
transferring, FSMO role holders
transferring, site objects
transferring, user objects
transitive trusts, creating      
transitivity, disabling site links
Transport Layer Security      [See TLS]
Trees      
trees, creating
trees, deleting      
trees, deleting orphans
triggering KCC
troubleshooting      [See also quota object]
troubleshooting, DIT files      
troubleshooting, domain controller promotion/demotion      
troubleshooting, error checking      
troubleshooting, offline defrag, reclaiming whitespace      
troubleshooting, online defrag, repairing manually      
troubleshooting, replication      
troubleshooting, site objects
troubleshooting, user objects
trustedDomain objects
trusts      
trusts, deleting      
trusts, Kerberos realm      
trusts, overview of      
trusts, resetting      
trusts, shortcuts
trusts, SID filtering      
trusts, transitive      
trusts, verifying      
trusts, viewing      
trusts, Windows NT      
TTL (time-to-live), modifying      
types of groups      
Unlock (unlock.exe)      
unlocking user objects      
unused computer objects, searching      
Updating      
updating, schemas      
updating, user accounts      
upgrading domain controllers      2nd
UPN (User Principal Name)      
User objects      
user objects, accounts      
user objects, accounts, configuring expiration      
user objects, accounts, updating      
user objects, computer objects      
user objects, copying      
user objects, creating      
user objects, creating, inetOrgPerson      
user objects, creating, large number of      
user objects, creating, modifying      
user objects, Delegation of Control Wizard      
user objects, Delegation of Control Wizard, customizing      
user objects, duplicating      
user objects, effective permissions      
user objects, enabling      
1 2 3 4 5 6
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2025
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте