|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Hassell J. — Learning Windows Server 2003 |
|
|
Предметный указатель |
automatic mode (Security Configuration wizard)
Automatic Private IP Addressing (APIPA)
Automatic Update software
Automatic Update software, event log messages
Automatic Updates utility
AXFRs [See zone transfers]
Background Intelligent Transfer Service (BITS)
backup domain controllers [See BDCs]
Backup utility
Backup utility, GUI, using from
Backup utility, Removable Storage/Remote Storage options, warning about
Backups 2nd [See also Backup utility; NTBACKUP program]
backups, DNS
backups, IIS configuration
backups, of GPOs, using GPMC
backups, shadow copies, benefits of
backups, system state data on remote computers
backups, types of, NTBACKUP program
Bandwidth
bandwidth, replication across WAN links
baseline machine
baselining script, NAQC
baselining script, NAQC, requirements
baselining script, NAQC, writing
batch files
batch files, scripts, assigning
BDCs (backup domain controllers)
BDCs, decentralization of
BDCs, migrating Windows NT domains to Active Directory
BITS (Background Intelligent Transfer Service)
boot.ini file
boot.ini file, modifications to during installation
brute force attacks
brute force attacks, avoiding with password requirements 2nd
C#, implemented into .NET as development language
C$ default shares
CALs (client access licenses)
CALs, installing Windows Server 2003 and
canonical name records [See CNAME records]
caspol.exe file
Certificate authority
certificate trust list (CTL)
Change Permissions special permission
changing
changing, Active Directory database
changing, Active Directory database, avoiding collisions
changing, domain naming master role
changing, extended file attributes
changing, file attributes
changing, operations master roles
changing, permissions
changing, permissions, NTFS file/folder
changing, schema masters
changing, schema masters, avoiding collisions
child domains
child domains, adding to domains
child domains, GPO inheritance
child domains, parent domains, linking to
child nodes, Dfs
child nodes, Dfs, removing
CIA (confidentiality\\, integrity\\, availability) security principle
cipher command
cipher command, decrypting files/folders from command-line
CIPHER utility
CIPHER utility, command-line switches
CIPHER utility, encrypting files/folders from command-line
Citrix
client access licenses [See CALs]
client-side extensions (CSEs)
client-side extensions (CSEs), GUIDs of, identifying when troubleshooting GP
Clients [See also local computers] [See also local computers]
clients, Dfs [See Dfs clients]
clients, security templates
clients, Shiva LAN Rover, network connections
clients, SUS, using on
clients, SUS, using on, system monitoring
clients, SUS, using on, update download and installation
clients, thin [See WTS]
CLR (Common Language Runtime)
CLS (Common Language Specification)
Cluster Application wizard
cluster configurations
cluster configurations, not on quorum disk
cluster nodes
cluster nodes, adding to NLB cluster
cluster nodes, removing from NLB cluster
cluster resource database
cluster services
Clustering
clustering technologies
clustering technologies, NLB clusters (network load-balancing clusters)
clustering technologies, NLB clusters, adding other nodes to
clustering technologies, NLB clusters, creating
clustering technologies, NLB clusters, operation styles and modes
clustering technologies, NLB clusters, performance optimization
clustering technologies, NLB clusters, port rules
clustering technologies, NLB clusters, removing nodes from
clustering technologies, true server clusters
clustering technologies, true server clusters, adding nodes to
clustering technologies, true server clusters, Cluster Application wizard
clustering technologies, true server clusters, configuring failover/failback policies
clustering technologies, true server clusters, creating
clustering technologies, true server clusters, creating cluster group
clustering technologies, true server clusters, planning setup of
clustering technologies, true server clusters, resources, types of
clustering, types of
Clusters
clusters, DNS or NetBIOS name of
CMAK (Connection Manager Administration Kit)
CNAME records (canonical name records)
CNAME records, creating/editing
Code Access Security Policy Tool (caspol.exe)
code access security, .NET Framework
Colors
colors, monitor and printer, synchronizing
colors, printers, associating profiles with
COM (Component Object Model)
COM+ 2nd
COM+, alignment with .NET
comma-separated values (CSVs)
command scripts
command-line
command-line, administering .NET Framework from
command-line, application installation on terminal server
command-line, automated IIS administration
command-line, creating
command-line, creating, FTP directories
command-line, creating, FTP sites
command-line, creating, users in Active Directory
command-line, creating, virtual web directories
command-line, creating, web sites
command-line, disk quotas, managing
command-line, dynamic DNS registration, preventing
command-line, files/folders
command-line, files/folders, creating shared folders manually
command-line, files/folders, decrypting with cipher command
command-line, files/folders, EFS encryption of using CIPHER
command-line, files/folders, functions for Offline Files and Folders
command-line, GPO logging
command-line, GPOs, refreshing
command-line, integration in Windows Server 2003
command-line, KCC, triggering with RepAdmin
command-line, NTBACKUP, using from
command-line, NTBACKUP, using from, automatic backup scenarios
command-line, NTBACKUP, using from, limitations
command-line, operations master roles, changing
command-line, print sharing services
command-line, print sharing services, features of
command-line, print sharing services, starting/stopping spooler
command-line, querying IIS machines for update levels
| command-line, RepAdmin
command-line, RepAdmin, viewing highest USNs
command-line, RepAdmin, viewing replication partners
command-line, shadow copies, managing from
command-line, shares
command-line, shares, using from
command-line, Terminal Services management
command-line, users, creating
Common Language Specification (CLS)
Common Type Specification (CTS)
compatws.inf template
compiling
compiling, security templates into database 2nd
component applications
component applications, COM+
Component Object Model [See COM]
compressed files/folders
compressed files/folders, EFS inability to encrypt
Computer Management tool (Administrative Tools applet)
Computer Management tool (Administrative Tools applet), default folder shares, examining
Computers
computers, GPs, implementing
computers, local [See local computers]
computers, mobile [See mobile computers]
conditional DNS forwarding
conditional forwarding (DNS)
conditional forwarding (DNS), stub zones
confidentiality\\, integrity\\, availability (CIA) security principle
Configuration files
configuration files, DNS, restoring
Configuration Sections, Settings file
configure option (domain GP)
Configure Replication wizard
Configure Replication wizard, master share, choosing
Configure Your Server Wizard
Configure Your Server wizard, Terminal Server role, adding
Configuring
configuring, 2nd [See also SCW] [See also SCW]
configuring, .NET Framework
configuring, .NET Framework, configuration scopes
configuring, .NET Framework, XML configuration files, types of
configuring, assemblies
configuring, debugging levels/output
configuring, DHCP servers
configuring, DHCP servers, with superscopes
configuring, domain GP
configuring, domain GP, security settings
configuring, error handling
configuring, failover/failback policies on true server clusters
configuring, FTP sites
configuring, FTP sites, content location
configuring, FTP sites, individual properties
configuring, FTP sites, master properties
configuring, garbage collection
configuring, GPOs with administrative templates
configuring, IIS services with IIS Manager
configuring, importing/exporting configurations
configuring, Indexing Service catalogs
configuring, network access
configuring, network access, with .NET Framework Settings file
configuring, performance
configuring, performance, with Indexing Services
configuring, permissions
configuring, permissions, on filesystems
configuring, permissions, on registry keys
configuring, permissions, shared folders, Share a Folder wizard
configuring, print services
configuring, print services, with logon/logoff scripts
configuring, printer settings
configuring, printer settings, customization
configuring, printer settings, default
configuring, printer settings, multiple physical printers
configuring, printer settings, print servers
configuring, printer settings, separator page, choosing
configuring, quarantine policy, NAQC deployment
configuring, queries
configuring, quotas
configuring, quotas, individual entries
configuring, routing links
configuring, RRAS
configuring, RRAS, granting VPN access to users
configuring, RRAS, setup scenarios
configuring, runtime versions
configuring, secondary nameservers
configuring, security templates
configuring, tracing levels/output
configuring, user properties
configuring, web sites
configuring, web sites, content configuration options
configuring, web sites, location for site content
configuring, Windows XP/Windows 2000 to work with SUS
configuring, with administrative templates
configuring, WTS licensing server
configuring, WTS licensing server, types of
configuring, WTS user environment
connecting
connecting, to Dfs roots
Connection Manager Administration Kit (CMAK)
Connections
connections, to SMTP servers, limiting number of simultaneous
connectoids
console applications
containers
containers, GPOs applied to, determining
controlling
controlling, access to
controlling, access to, print services
controlling, merges
controlling, print spooler service
controlling, zone transfer process
copy backup (NTBACKUP)
copying
copying, GPOs, using GPMC for
CPU requirements, WTS
CPU resources
CPU resources, Indexing Services
Create Files special permission
Create Folders special permission
Create New Dfs Root wizard
Create Shadow command
Creating
creating, application pools
creating, cluster group
creating, CNAME records
creating, DHCP scopes
creating, domains
creating, exception security group with Active Directory, NAQC deployment
creating, exceptions to quarantine policy, NAQC deployment
creating, file shares 2nd
creating, file shares, default offline access
creating, file shares, hidden shares
creating, folder shares
creating, folder shares, default
creating, folder shares, default offline access
creating, folder shares, hidden shares
creating, folder shares, manually
creating, foreign sites
creating, forests
creating, forward lookup zones
creating, FTP directories
creating, FTP directories, from command-line
creating, FTP sites
creating, FTP sites, from command-line
creating, FTP sites, virtual directories for
creating, FTP sites, with IIS Manager
creating, GPOs
creating, GPOs, administrative templates
creating, GPOs, disabling portions of policies
creating, GPOs, refreshing GPOs
creating, Indexing Service catalogs
|
|
|
Реклама |
|
|
|
|
|
|