|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Hassell J. — Learning Windows Server 2003 |
|
|
Предметный указатель |
Read Data special permission
Read Extended Attributes special permission
Read Permissions special permission
Read standard permission (R)
read-only access
read-only access, to shared folders
recovery agent accounts, encrypted objects
Recovery Console
Recovery Console, commands for
Recovery Console, setting up
Recreational Software Advisory Council (RSAC)
redundant array of intersomething disks [See RAID]
refresh interval (SOA records) 2nd
refresh interval (SOA records), no-refresh interval with dynamically registered records
Registry [See also registry keys] [See also registry keys]
registry keys
registry keys, permissions on, configuring
registry keys, SUS-related
registry, DNS cache timeout value
registry, GP reversal feature
registry, securews.inf template
registry, trees of, GPs written to
Release Two (R2), Windows Server 2003
remote access endpoint, RRAS setup scenarios
remote access server [See RAS]
Remote Administration web site
Remote Administration web site (IIS administration)
Remote Administration web site, security considerations
Remote Assistance 2nd
Remote computers
remote computers, backing up
remote computers, backing up, system state data on
Remote Control add-on for Active Directory users/computers
Remote Desktop Protocol [See RDP]
remote installation services
Remote Management
remote management, tools
remote management, tools, default shares
remote shares
remote shares, NTBACKUP, backing up with
Remote Storage
remote users
remote users, distributing quarantined connection profile to, NAQC deployment
Remoting section, Settings configuration file
Removing
removing, nodes from NLB cluster
removing, print servers
renaming domains
RepAdmin (Replication Administrator)
RepAdmin, options
replay attacks
replay attacks, IPSec prevention of
replicating [See also replication] [See also replication]
replicating, Dfs root nodes
replicating, DNS information
replicating, DNS information, among domain controllers
Replication 2nd
Replication Administrator [See RepAdmin]
replication partners
replication partners, viewing with RepAdmin
replication, across WAN links, managing bandwidth for
replication, decentralized approach, problems with
replication, GPOs and
replication, loops
replication, multimaster [See multimaster replication]
replication, network updates
replication, network updates, conflicts
replication, network updates, USNs
replication, partners [See replication partners]
replication, PDC emulator role
replication, strategies, Configure Replication wizard
replication, time synchronization
replication, to domain controllers
replication, to domain controllers, in branch offices 2nd
replication, topologies
replication, trees/site links, spanning
replication, within sites
report messages (MSMQ)
report queues (MSMQ)
reservations
reservations, creating on DHCP servers
Resize ShadowStorage command
resource groups
resource groups, adding resource to
resource records
resource records, CNAME records
resource records, creating/modifying
resource records, dynamically registered, scavenging outdated
resource records, host records
resource records, MX records
resource records, NS records
resource records, pointer records
resource records, service records
resource records, SOA records
Resources
resources, cluster services
resources, cluster services, types of
resources, sharing
response messages (MSMQ)
response queues (MSMQ)
restricted groups option (domain GP)
restricting
restricting, access to shared printers
Resultant Set of Policy Wizard
retry interval (SOA records) 2nd
reverse lookup zones
reverse lookup zones, controlling your own, advantages of
reverse lookup zones, creating
RFC 1995
RID Master
Rights Management Services (RMS)
ring replication strategy
RIPrep
RIPrep, limitations
RIS (Remote Installation Services)
RIS servers
RIS servers, activating
RIS, activating RIS server
RIS, Custom Setup option
RIS, customization using OEM option
RIS, deploying image to client
RIS, hardware limitations of
RIS, limitations
RIS, limitations, PXE
RIS, slipstreaming service packs
RIS, types of installations with
RIS, using
RMS (Rights Management Services)
RoboCopy
RoboCopy, enhancements to Dfs and
root nodes
root nodes, Dfs
Rootsec.inf template
round-robin balancing 2nd
Routing and Remote Access Server Setup Wizard
Routing and Remote Access Service [See RRAS]
routing links
routing links, configuring
routing links, creating
RPC calls
RPC calls, creating site links based over IP
rqc.exe
rqs
rqs, exe
RRAS (Routing and Remote Access Service)
RRAS, configuring
RRAS, configuring NAQC quarantine policy in
RRAS, configuring, granting VPN access to users
RRAS, configuring, set up scenarios
RSAC (Recreational Software Advisory Council)
| RSoP tool
RSoP tool, GPO logging
RSoP tool, logging mode
RSoP tool, logging mode, using GPMC with
RSoP tool, planning mode
RSoP tool, planning mode, using GPMC with
RSoP tools
RSoP tools, NTFS file/folder permissions, determining
Runtime section, Settings file
runtime versions
runtime versions, required and supported, specifying
RX permissions
SAM (Security Accounts Manager)
SAM, Active Directory and
SAM, machine local groups and
SAs (security associations)
saved indexes
Scalability
scalability, Active Directory
scans, Indexing Service
scans, Indexing Service, initiating
SCAT (Security Configuration and Analysis Tool) 2nd 3rd
SCAT, enforcing security policies
SCAT, system security
SCAT, system security, correcting with
SCAT, system security, scanning with
SCAT, template databases, creating/using
Schema
Schema Admins group
Schema Admins group, schema masters, changing
schema master
schema master, identifying
schema master, Windows 2000 Server, identifying on
schema, classes
schemas
schemas, master [See schema master]
schemas, naming
schemas, naming, replication topologies and
scope of indexes
scripted installation (RIS)
Scriptomatic utility
Scripts
scripts, assigning with domain GP
scripts, automated administration of IIS
scripts, baselining, NAQC
scripts, GP
scripts, logon/logoff
scripts, logon/logoff, NETLOGON default share
scripts, logon/logoff, print configuration and mapping
scripts, Microsoft Scripting Debugger
scripts, operating system
scripts, operating system, managing
scripts, unattended installation, using for
scripts, unattended installation, using for, constructing setup scripts
scripts, unattended installations, using for
scripts, unattended installations, using for, WINNT32 command-line switches
SCW (Security Configuration Wizard) 2nd
SCW, auditing mode
SCW, configuration mode
SCW, installing
SCW, security policy, creating
Searching
searching, enhancements to Windows Server 2003
searching, for GPOs
SECEDIT utility
secondary nameservers
secondary nameservers, configuring
secondary nameservers, stub zones and
secondary nameservers, upgrading to primary
secondary nameservers, zone transfers
secure channels
secure private connection, RRAS setup scenario
Secure Sockets Layer, security of, Service Pack 1 and
Securedc.inf template
securews.inf
Securews.inf template
Security 2nd
security (see also SCA; SCW; system security
Security Accounts Manager (SAM)
Security Accounts Manager (SAM), Active Directory and
security associations (SAs)
Security Configuration and Analysis MMC snap-in [See SCA]
Security Configuration and Analysis Tool (SCAT)
Security Configuration Wizard [See SCW]
Security event log
Security Event Log, permissions use messages
security groups
security groups, individualized, assigning print permissions to
security identifiers [See SIDs]
security IDs (SIDs)
security IDs (SIDs), problems with
security patches
security patches, managing [See SUS]
security patches, scanning clients for information about
security policies [See also account lockout policies] [See also account lockout policies]
security policies, auditing
security policies, creating/enforcing
security policies, creating/enforcing, security templates
security policies, creating/enforcing, with MBSA
security policies, creating/enforcing, with SCAT
security policies, logon time restrictions
security policies, organizing
security templates 2nd
Security Templates snap-in 2nd
security templates, compiling into template database 2nd
security templates, configuring
security templates, custom, creating 2nd
security templates, importing into GPO
security templates, restoring default
security templates, Security Templates snap-in
security, .NET Framework
security, .NET Framework, code access security
security, .NET Framework, role-based security
security, Active Directory-integrated DNS
security, application pool security content
security, ASP.NET and
security, auditing 2nd
security, backups [See backups]
security, Certificate Authority
Security, configuring
security, DNS requests, keeping outside firewalls
security, EFS
security, EFS, enhancements to
Security, encryption [See encryption]
security, event logs
security, event logs, Event Viewer
security, false sense of, Offline Files and Folders
security, firewalls
security, firewalls, ports on, Windows Time Service requirements and
security, FrontPage Server Extensions
security, FTP protocol
security, FTP protocol, inherent lack of
security, FTP protocol, new security features in IIS 6
security, FTP sites
security, FTP sites, user isolation in IIS 6
security, GP and 2nd
security, GPOs and
security, GPOs and, managing
security, GPOs and, refresh interval
security, hotfixes
security, hotfixes, Microsoft Windows Update website, accessing for
security, IIS 2nd
security, IIS, deleting default directories
security, IIS, enabling only if it's used
security, IIS, evaluating Indexing Service
security, IIS, IIS 6
security, IIS, ISAPI filters
security, IIS, keeping updated
security, IIS, killing unused ports
security, IIS, quering machines for update levels
|
|
|
Реклама |
|
|
|
|
|
|