| 
    
	    
	    | 
		        
			        |  |  
			        |  |  
					| Авторизация |  
					|  |  
			        |  |  
			        | Поиск по указателям |  
			        | 
 |  
			        |  |  
			        |  |  
			        |  |  
                    |  |  
			        |  |  
			        |  |  |  | 
		|  |  
                    | Zacker C., Steven A. — MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure |  
                    |  |  
			        |  |  
                    | Предметный указатель |  
                    | | SCSI, case scenario      2nd SCSI, Questions and Answers
 SCSI, server clusters using      2nd
 SCSI, servers and
 SCW (Security Configuration Wizard)
 SCW, components of
 SCW, converting SCW security policies into GPOs
 SCW, creating security policies
 SCW, deploying
 SCW, deploying security templates      2nd
 SCW, planning secure baseline installation
 SCW, practice exercise deploying SCW security policies
 SCW, Questions and Answers
 SCW, review
 secedit.exe      2nd
 secondary zones, DNS      2nd
 Secret key encryption
 secure baseline installation      [See baseline planning
 secure dynamic updates, DNS servers
 Secure Hash Algorithm 1 (SHA1)      2nd
 Secure Server (Require Security) IPSec policy
 Secure Server (Require Security) IPSec policy, defined
 Secure Server (Require Security) IPSec policy, overview of
 Secure Server (Require Security) IPSec policy, Questions and Answers      2nd 3rd 4th 5th 6th 7th
 Secure Sockets Layer (SSL)
 Securedc.inf security template
 Securews.inf security template
 Securing Windows 2000 Server (Microsoft Corporation)
 Security
 security association (SA)      2nd
 Security Configuration and Analysis snap-in
 Security Configuration and Analysis snap-in, changing security settings
 Security Configuration and Analysis snap-in, deploying security templates
 Security Configuration and Analysis snap-in, overview of
 Security Configuration and Analysis snap-in, practice exercise using
 Security Configuration and Analysis snap-in, Questions and Answers      2nd
 Security Configuration and Analysis snap-in, system analysis      2nd
 Security Configuration Wizard      [See SCW (Security Configuration Wizard)]
 security configurations
 security configurations, administration methods      [See administration network]
 security configurations, deploying
 security configurations, deploying, case scenario      2nd
 security configurations, deploying, exam highlights
 security configurations, deploying, overview of
 security configurations, deploying, Questions and Answers
 security configurations, deploying, review
 security configurations, deploying, security template deployment      [See security templates deploying]
 security configurations, deploying, security templates      [See security templates]
 security configurations, deploying, testing      [See testing configuration settings]
 security configurations, deploying, troubleshooting lab      2nd
 security configurations, further reading
 security configurations, tested skills/suggested practices
 security infrastructure design
 security infrastructure design, case scenario      2nd
 security infrastructure design, certificate publication
 security infrastructure design, exam highlights
 security infrastructure design, framework      2nd
 security infrastructure design, further reading
 security infrastructure design, network administration      [See network administration]
 security infrastructure design, overview of
 security infrastructure design, PKI
 security infrastructure design, Questions and Answers
 security infrastructure design, review
 security infrastructure design, secure baseline installation and
 security infrastructure design, tested skills/suggested practices
 security infrastructure design, troubleshooting lab      2nd
 security infrastructure design, update infrastructure      [See security update infrastructure]
 security infrastructure design, wireless networks      [See wireless networks securing]
 Security logs, Event Viewer      2nd
 security planning
 security planning, high-level
 security planning, infrastructure design
 security planning, review      2nd
 security planning, security design team
 security planning, security life cycles
 security policies
 security policies, converting SCW security policies into GPOs
 security policies, creating SCW security policies
 security policies, practice exercise deploying SCW security policies
 security settings
 security settings, account policies
 security settings, Active Directory permissions
 security settings, audit policies
 security settings, file system permissions
 security settings, practice exercise creating share permissions
 security settings, practice exercise modifying account policies
 security settings, practice exercise modifying file permissions
 security settings, registry permissions
 security settings, review      2nd
 security settings, Security Configuration Wizard
 security settings, share permissions
 Security Template snap-in
 Security Template snap-in, practice exercise using
 Security Template snap-in, working with security templates
 security templates
 security templates, console for
 security templates, defined      2nd
 security templates, deploying
 security templates, deploying, group policies for
 security templates, deploying, overview of
 security templates, deploying, practice exercise using Security Analysis snap-in
 security templates, deploying, review
 security templates, deploying, secedit.exe for deploying
 security templates, deploying, Security Configuration and Analysis snap-in
 security templates, deploying, Security Configuration Wizard (SCW) for
 security templates, functions of
 security templates, modifying existing template
 security templates, overview of
 security templates, practice exercise using Security Template snap-in
 security templates, predefined
 security templates, review
 security update infrastructure
 security update infrastructure, downloading and installing MBSA
 security update infrastructure, Microsoft Baseline Security Analyzer and
 security update infrastructure, network update
 security update infrastructure, review      2nd
 security update infrastructure, security analysis with MBSA
 security update infrastructure, software update and
 security update infrastructure, Software Update Services
 security update infrastructure, testing updates
 security update infrastructure, Windows Server Update Services
 security update infrastructure, Windows Update
 Security, certificates
 security, configuring for member servers
 security, design team
 security, DNS      [See DNS security]
 security, higher-level CAs
 security, implementation
 security, Internet connectivity      [See Internet access security]
 security, IPSec      [See IPSec (IP Security)]
 security, life cycles      2nd
 security, NAT/proxy servers and
 security, network infrastructure and
 security, Network Monitor and
 security, ongoing management
 security, operating systems and      2nd
 security, registered addresses and
 security, remote access requirements
 security, remote access users
 security, server      [See servers role-based]
 security, wireless networks and
 sequence numbers      2nd
 Sequenced Packet Exchange (SPX)
 Server (Request Security) IPSec policy
 Server (Request Security) IPSec policy, defined
 Server (Request Security) IPSec policy, overview of
 Server (Request Security) IPSec policy, Questions and Answers      2nd 3rd
 server clusters
 server clusters, application deployment
 server clusters, backup and recovery strategy
 
 | server clusters, bottlenecks server clusters, case scenario      2nd
 server clusters, creating
 server clusters, deployment design
 server clusters, exam highlights
 server clusters, failover policies
 server clusters, further reading
 server clusters, geographically dispersed
 server clusters, hardware configuration      2nd
 server clusters, implementing
 server clusters, lesson review
 server clusters, overview of
 server clusters, planning
 server clusters, practice exercise
 server clusters, properties
 server clusters, Questions and Answers      2nd 3rd
 server clusters, quorum model selection
 server clusters, tested skills/suggested practices
 server maintenance
 server maintenance, backups      [See backups]
 server maintenance, case scenario      2nd
 server maintenance, exam highlights
 server maintenance, monitoring network servers      [See servers monitoring]
 server maintenance, monitoring network traffic      [See network traffic monitoring]
 server maintenance, Questions and Answers
 server maintenance, troubleshooting lab      2nd
 Servers
 servers, baseline for member servers      [See baseline member
 Servers, DNS      [See DNS servers]
 servers, hardening      [See hardening servers]
 servers, hardware specifications
 servers, locating network resources
 servers, monitoring
 servers, monitoring, DHCP
 servers, monitoring, DNS
 servers, monitoring, exam highlights
 servers, monitoring, keeping services running
 servers, monitoring, lesson review
 servers, monitoring, locating system bottlenecks
 servers, monitoring, practice exercise
 servers, monitoring, Questions and Answers
 servers, monitoring, RRAS
 servers, monitoring, WINS
 servers, operating systems
 servers, role-based
 servers, role-based, application servers
 servers, role-based, configuring security for
 servers, role-based, domain controllers
 servers, role-based, file and print servers
 servers, role-based, infrastructure servers
 servers, role-based, planning security for
 servers, role-based, practice exercise modifying GPO for Domain Controller container
 servers, role-based, Questions and Answers      2nd 3rd
 servers, role-based, review
 servers, roles      2nd
 servers, troubleshooting lab      2nd
 servers, WINS      [See WINS servers]
 Service Location (SRV)
 service packs
 service packs, software update and
 service packs, Windows Server 2003 SP1
 service-dependent filtering
 Services
 Services console
 Services file
 services, configuring for member servers
 services, domain controllers
 services, planning secure baseline installation
 services, Windows Server 2003
 session layer, OSI reference model
 Setup Security.inf
 SHA1 (Secure Hash Algorithm 1)      2nd
 share permissions
 share permissions, practice exercise creating
 Shared key authentication
 Shared Key authentication, defined
 Shared Key authentication, Questions and Answers      2nd
 Shared Key authentication, wireless networks
 Shiva Password Authentication Protocol (SPAP)      2nd
 shutdown
 shutdown, security options for member servers
 shutdown, user rights and
 signatures, digital      2nd
 single-instance applications      2nd
 single-node clusters      2nd
 single-quorum device clusters
 sites, multiple GPOs and
 Small Computer System Interface      [See SCSI (Small Computer System Interface)]
 smart cards
 smart cards, designing PKI for
 smart cards, enterprise CAs required by
 smart cards, overview of
 smart cards, Questions and Answers      2nd 3rd
 SMS (Systems Management Server)
 Software
 Software Update Services      [See SUS (Software Update Services)]
 software, backup      2nd
 software, certificates encountered when downloading
 software, clustering and
 software, configuration testing
 software, digital signatures and
 software, IP address and subnet calculation
 software, routers
 software, update practices
 Source Port field, TCP/UDP headers      2nd 3rd
 SPAP (Shiva Password Authentication Protocol)      2nd
 special identities      2nd
 Spoofing      2nd 3rd
 SPX (Sequenced Packet Exchange)
 SRV (Service Location)
 SSL (Secure Sockets Layer)
 stand-alone CAs
 stand-alone CAs, enterprise CAs compared to
 stand-alone CAs, manual certificate enrollment
 stand-alone CAs, overview of      2nd
 stand-alone CAs, Questions and Answers      2nd 3rd 4th 5th
 standards, wireless
 star topology
 star topology, UTP and
 star topology, WAN topologies
 stateful applications      2nd [See also server clusters]
 stateful packet inspection      2nd
 stateless applications      2nd
 static NAT      2nd
 Static routing
 static routing, compared with dynamic routing
 static routing, defined
 static routing, overview of
 static routing, troubleshooting
 storage area networks (SANs)      2nd
 storage subsystem
 storage subsystem, bottlenecks
 storage subsystem, monitoring performance
 storage subsystem, Questions and Answers
 stub zones, DNS
 subdomains      [See also domains DNS]
 subdomains, combining internal/external domains
 subdomains, creating
 subdomains, DNS
 subdomains, planning name resolution strategy
 subnet masks
 subnet masks, calculating
 subnet masks, case scenario      2nd
 subnet masks, exam highlights
 subnet masks, IP address classes
 subnet masks, lesson review
 subnet masks, obtaining
 subnet masks, overview of
 subnet masks, practice exercise      2nd
 subnet masks, Questions and Answers
 
 | 
 |  |  |  | Реклама |  |  |  |  |  |  
    |  |  |  |  |