|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Spealman J., Hudson K., Craft M. — MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure |
|
|
Предметный указатель |
application directory partitions, replication and 2nd
application directory partitions, replication failure
application directory partitions, security descriptor reference domain
application directory partitions, setting reference domain
application directory partitions, setting replication notification delays
application directory partitions, summary
application directory partitions, Windows Server 2003
application log
applications
applications, assigning
applications, deploying
applications, deploying, Gpresult command-line tool 2nd
applications, deploying, overview
applications, deploying, Questions and Answers, answers
applications, deploying, Questions and Answers, questions
applications, deploying, Resultant Set of Policy (RSoP)
applications, deploying, user logon and 2nd
applications, installing 2nd
applications, publishing
Apply Group Policy permission
archiving, security log
assign, defined
assigned applications
assigned applications, overview of
assigned applications, published vs.
assigned applications, software deployment best practices
assigned applications, software deployment process
ASSIGNMENT
assignment, applications
assignment, software
assignment, user rights
Attributes
attributes, hiding Active Directory
attributes, site link
audit policies
audit policies, auditing and
audit policies, best practices
audit policies, Directory Service objects
audit policies, files, folders and printers
audit policies, guidelines
audit policies, Local Policies security settings
audit policies, passwords
audit policies, practice exercises
audit policies, Questions and Answers, answers
audit policies, Questions and Answers, questions
audit policies, specifying event categories
audit policies, summary
audit policies, understanding
Audit Policy extensions
Auditing 2nd
Authentication
authentication, Active Directory features
authentication, between two domains joined by external trust
authentication, defined 2nd
authentication, forests and 2nd
authentication, further reading
authentication, overview
authentication, password management
authentication, Questions and Answers, answers
authentication, Questions and Answers, questions
authentication, role of sites in
authentication, traffic 2nd
authentication, user, computer, and group strategies
author mode, MMC in
authoritative restore 2nd
Authorization
Autoenrollment settings, security certificates
automatic installation
automating user account creation
availability, sites
availability, sites, monitoring replication failure
availability, sites, monitoring replication monitoring
availability, sites, site management and 2nd 3rd
available bandwidth
available bandwidth, defined 2nd
Backup
backup domain controllers (BDCs) 2nd
Backup Operators Group 2nd
Backup Or Restore Wizard
Backup Or Restore Wizard, backup with
Backup Or Restore Wizard, deleting scheduled backups
Backup Or Restore Wizard, scheduling backups
backup, Active Directory data
backup, Active Directory data, case scenario exercise 2nd
backup, Active Directory data, creating
backup, Active Directory data, deleting scheduled operations
backup, Active Directory data, exam highlights
backup, Active Directory data, practice exercises
backup, Active Directory data, preliminary tasks
backup, Active Directory data, Questions and Answers, answers
backup, Active Directory data, Questions and Answers, questions
backup, Active Directory data, scheduling operations
backup, Active Directory data, summary
backup, Active Directory data, troubleshooting lab
backup, Active Directory installation and
backup, domain controller installation and
bandwidth, available 2nd 3rd
baseline establishment
BDCs (backup domain controllers) 2nd
Berkeley Internet Name Domain (BIND)
BIND (Berkeley Internet Name Domain)
biometric authentication
Block Policy Inheritance
Block Policy Inheritance, Group Policy setting
Block Policy Inheritance, specifying
Block Policy Inheritance, using sparingly
Bottlenecks
bridgehead servers
bridgehead servers, designating preferred
bridgehead servers, overview of
bridgehead servers, site management and
bridgehead servers, site topology and
bridges, site link
bridges, site link, creating
bridges, site link, overview of
bridges, site link, site management and
built-in local accounts
built-in user accounts
Builtin folder, for default groups
business and technical analyses, AD infrastructure design
business function, in OU structure
CA (certification authority)
CA (certification authority), Public Key Policies security settings
CA (certification authority), replication transport protocols and
CA (certification authority), user authentication and
Caching [See universal group membership caching defined.]
catalog services [See global catalogs.]
centralized administrative control design
centralized GPO design
certificate rules
certificate rules, creating
certificate rules, designating file types
certificate rules, rule precedence
certificate rules, software restriction policies
certificate trust lists (CTLs)
certificates
certificates, autoenrolling 2nd
certificates, managing
certificates, Public Key Policies security settings
certificates, user authentication and
Certification Authority [See CA (certification authority) Public
change management, Active Directory
child domains
child domains, computer environment deployment 2nd
child domains, creating 2nd
child domains, determining domain name
child domains, forest and domain structures
child domains, GPOs and
Chkgrps.vbs
CIMOM (Common Information Management Object Model) database
| circular trace log file
client configuration, Active Directory
combination OU structure
Command Line Arguments
command-line tools
command-line tools, Gpresult 2nd
command-line tools, monitoring performance
command-line tools, NETDOM
command-line tools, Windows Server 2003 2nd
Common Information Management Object Model (CIMOM) database
Compatws.inf (Compatible template)
Computer Configuration node
Computer Configuration node, Administrative Templates node in
Computer Configuration node, computer environment deployment in
Computer Configuration node, defining
Computer Configuration node, disabling unused GPO parts in
Computer Configuration node, disabling unused Group Policy settings in
Computer Configuration node, Group Policy planning in
Computer Configuration node, overview of
Computer Configuration node, Software Settings node in
Computer Configuration node, Window Settings node in
computer environment, deploying
computer environment, deploying, application access 2nd
computer environment, deploying, application installation 2nd
computer environment, deploying, autoenrolling certificates 2nd
computer environment, deploying, child domains 2nd
computer environment, deploying, Computer Configuration node
computer environment, deploying, Folder redirection 2nd
computer environment, deploying, further reading
computer environment, deploying, GPO implementation 2nd
computer environment, deploying, kiosks 2nd
computer environment, deploying, overview
computer environment, deploying, password management 2nd
computer environment, deploying, Questions and Answers, answers
computer environment, deploying, Questions and Answers, questions
computer environment, deploying, restricted access desktop 2nd 3rd 4th
computer environment, deploying, security 2nd
computer environment, deploying, software assignment
computer environment, deploying, software installation 2nd 3rd 4th
computer strategies
computer strategies, further reading
computer strategies, OU implementation
computer strategies, OU planning 2nd
computer strategies, overview
computer strategies, security groups 2nd
computer strategies, skills and suggested practices
computer strategies, user authentication 2nd
Computers
computers, configuring Offline Files for
computers, IntelliMirror settings
computers, managing
computers, RSoP options 2nd 3rd
configuration containers
Configuration Management
Configuration Options page, Configure Your Server Wizard
configuration partitions
configuration partitions, defined
configuration partitions, replication and
configuration partitions, replication failure and
Configure Your Server Wizard
connection objects
connection objects, creating and configuring
connection objects, defined
console modes
console options, MMCs
console tree, of MMCs
container objects
container objects, containing other objects
container objects, defined
container objects, delegation of administration and 2nd
container objects, OUs and
container objects, troubleshooting Group Policy settings
Coordinated Universal Time (UTC)
counter logs
counter logs, creating 2nd
counter logs, logging options
counter logs, logging requirements
counter logs, overview of
credentials, Run As program
cross-reference object
CTLs (certificate trust lists)
custom administrative templates
custom MMCs
custom MMCs for remote administration
custom MMCs, creating
custom MMCs, defining
custom MMCs, modifying
custom MMCs, practice exercises
data stores, centralized
database, Active Directory installation 2nd
Dcdiag.exe (Domain Controller Diagnostic tool)
Dcdiag.exe (Domain Controller Diagnostic tool), defined
Dcdiag.exe (Domain Controller Diagnostic tool), monitoring replication and security with
Dcdiag.exe (Domain Controller Diagnostic tool), overview of 2nd
Dcdiag.exe (Domain Controller Diagnostic tool), troubleshooting Active Directory installation
Dcpromo log files
dcpromo.exe
dcpromo.exe, creating additional domains
dcpromo.exe, creating additional forests
dcpromo.exe, creating additional trees
dcpromo.exe, forest and domain structure 2nd
dcpromo.exe, removing Active Directory
dcpromo.exe, site topology
DCsecurity.inf (Default Security settings updated for domain controllers) template
decentralized administrative control design
decentralized GPO design
dedicated forest root domain
dedicated setting GPO
default administrative templates
default domain controllers policy
default domain policy
default groups
default groups, built-in local
default groups, special identity
default security (Setup security.inf) template
default security levels
default security levels, overview of
default security levels, setting
Default Security settings updated for domain controllers (DCsecurity.inf) template
Default-First-Site-Name
DEFAULTIPSITELINK 2nd
delegation of administration, for OUs
delegation of administration, for OUs, defined
delegation of administration, for OUs, hierarchy models for
delegation of administration, for OUs, overview of
delegation of administration, for OUs, types of responsibility
delegation of control
Delegation of Control Wizard 2nd
delegation of control, container objects
delegation of control, GPOs 2nd
delegation of control, password management
delegation of control, planning
delegation of control, Questions and Answers, answers
delegation of control, Questions and Answers, questions
delegation of control, RSoP
delegation of control, Windows NT 2nd
deleting
deleting, application directory partition replica
deleting, application directory partitions
deleting, delegated permissions
deleting, GPOs
deleting, groups
deleting, OUs
deleting, trusts
Deny permissions
design team, AD infrastructure design
details pane, MMCs 2nd
details pane, RSoP query results
DFS (Distributed File System)
diagnostic test, DNS
|
|
|
Реклама |
|
|
|
|
|
|