|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Spealman J., Hudson K., Craft M. — MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure |
|
|
Предметный указатель |
schema master role
schema master role, defined 2nd
schema master role, failure
schema master role, forest and domain structure 2nd 3rd
schema master role, placing
schema master role, seizing
schema master role, transferring assignment
schema master role, viewing assignment
schema objects 2nd 3rd
schema partitions 2nd 3rd
Schema snap-in 2nd
schema, Active Directory objects
schema, corruption 2nd
schema, extensions
schema, multiple forests and
scope, group [See group scope changing.]
Scripts extension, Windows Settings node
SCW (Security Configuration Wizard)
SDCheck utility
SDPs (software distribution points) 2nd 3rd
Search capabilities, Windows Server 2003
second-level OUs
Securedc.inf template
Securews.inf template
Security
Security Accounts Manager (SAM) 2nd
security administration
security administration, Active Directory security [See Active Directory security Account
security administration, audit policies [See audit policies.]
security administration, case scenario 2nd
security administration, exam highlights
security administration, Security Configuration and Analysis [See Security Configuration and Analysis.]
security administration, security logs [See security logs.]
security administration, software deployment [See software deployment.]
security administration, software restriction policies [See software restriction policies.]
security administration, templates [See templates creating
security administration, troubleshooting lab
security administration, troubleshooting security settings 2nd
security analysis log file, viewing
Security Configuration and Analysis
Security Configuration and Analysis, accessing
Security Configuration and Analysis, analyzing system security
Security Configuration and Analysis, best practices
Security Configuration and Analysis, configuring system security
Security Configuration and Analysis, defined
Security Configuration and Analysis, editing database
Security Configuration and Analysis, exporting security templates
Security Configuration and Analysis, importing additional security templates into database
Security Configuration and Analysis, practice exercise
Security Configuration and Analysis, Questions and Answers, answers
Security Configuration and Analysis, Questions and Answers, questions
Security Configuration and Analysis, resolving security discrepancies
Security Configuration and Analysis, setting database
Security Configuration and Analysis, summary
Security Configuration and Analysis, troubleshooting
Security Configuration and Analysis, understanding
Security Configuration and Analysis, viewing security analysis log file
Security Configuration and Analysis, viewing security analysis results
Security Configuration Wizard (SCW)
security descriptor reference domain 2nd
security groups
security groups, Domain Admins
security groups, filtering GPO scope with 2nd
security groups, forest and domain structure and
security groups, forests
security groups, further reading
security groups, local groups
security groups, overview of 2nd
security groups, Questions and Answers, answers
security groups, Questions and Answers, questions
security groups, redirecting special folders according to
security groups, RSoP Planning mode options
security groups, troubleshooting Group Policy settings
security groups, universal groups
security groups, user, computer, and group strategies
security identifiers [See SIDs (security identifiers) defined.]
security logs
security logs, archiving
security logs, clearing
security logs, configuring
security logs, configuring size of 2nd
security logs, defined 2nd
security logs, enabling
security logs, filtering events in
security logs, finding events in
security logs, practice exercise
security logs, Questions and Answers, answers
security logs, Questions and Answers, questions
security logs, summary
security logs, understanding
security logs, viewing
security options, in Local Policies
security principals
security principals, Active Directory quotas for
security principals, defined
security principals, how group membership affects access control
security principals, removing existing
Security Properties dialog box
Security Settings node, Windows Settings node
security settings, Group Policy
security settings, Group Policy, further reading
security settings, Group Policy, overview of 2nd
security settings, Group Policy, Questions and Answers, answers
security settings, Group Policy, Questions and Answers, questions
security settings, Group Policy, replication
security settings, Group Policy, skills and suggested practices
security templates
Security Templates console 2nd
security templates, accessing Security Templates console
security templates, best practices
security templates, Compatible (Compatws.inf)
security templates, customizing predefined
security templates, default
security templates, Default Security settings updated for domain controllers (DCsecurity.inf)
security templates, defining new
security templates, highly secure (Hisecws.inf and Hisecdc.inf)
security templates, importing into database
security templates, importing to GPO
security templates, overview of
security templates, practice exercises
security templates, predefined
security templates, Questions and Answers, answers
security templates, Questions and Answers, questions
security templates, secure (Seceuredc.inf and Securews.inf)
security templates, summary
security templates, system root security (Rootsec.inf)
security, computer environment deployment 2nd
security, costs of creating multiple domains
security, creating domains to meet requirements of
security, creating multiple domains for
security, creating multiple forests
security, Group Policy settings 2nd
security, Group Policy standard policy 2nd
security, integration with Active Directory
security, LDAP and
Security, password
security, Software Restriction Policies
security, troubleshooting failures 2nd
security, user environment configuration 2nd 3rd
seized operations master roles 2nd
selective authentication
selective authentication, between forests joined by forest trusts
selective authentication, between two domains joined by external trust
selective authentication, defined 2nd 3rd
selective authentication, overview of
selective authentication, setting
sequential trace log file
Server Operators group
Servers
Servers container
| servers, configuring Offline Files for
servers, stand-alone server
service (SRV) resource record 2nd
Service OUs
Settings tab, folder redirection 2nd
Setup security.inf template
Shared location settings 2nd
shared system volume
shared system volume (sysvol)
shared system volume (sysvol), Adprep.exe tool and
shared system volume (sysvol), operations master role failures
shared system volume (sysvol), replication monitoring
shared system volume, configuring Active Directory installation
shared system volume, determining location for folder
shared system volume, verifying Active Directory installation
SharePoint 2nd
shortcut trusts
shortcut trusts, accessing resources across domains joined by
shortcut trusts, Active Directory supported trust relationships
shortcut trusts, creating
shortcut trusts, in implementation of domain structure 2nd 3rd
shortcut trusts, in management of domain structure 2nd
shortcut trusts, one-way
shortcut trusts, requirements
shortcut trusts, two-way
shortcut trusts, when to create
shutdown scripts
SIDs (Security Identifiers)
SIDs (security identifiers), defined
SIDs (security identifiers), deleting groups and
SIDs (security identifiers), forest and domain structure and
SIDs (security identifiers), user authentication and
Simple Mail Transfer Protocol [See SMTP (Simple Mail Transfer Protocol) creating
single setting GPO
single sign-on authentication
Site and Services Console, replication failure 2nd
site GPOs
site GPOs, applying Group Policy settings to
site GPOs, creating
site GPOs, linking
site GPOs, planning
site license servers
site link bridges
site link bridges, overview
site link bridges, replication and
site link bridges, site management and
site link objects 2nd
site links
site links, adding site to existing
site links, assigning to sites
site links, attributes
site links, availability
site links, bridges 2nd
site links, configuring
site links, creating
site links, intersite replication using
site links, managing
site links, renaming
site links, transitivity
site management
site management, availability 2nd 3rd
site management, cost of links
site management, forest installation
site management, further reading
site management, IP subnets
site management, logons 2nd
site management, overview
site management, Questions and Answers, answers
site management, Questions and Answers, questions
site management, replication frequency
site management, site links
site topology
site topology, overview
site topology, planning
site topology, Questions and Answers, answers
site topology, Questions and Answers, questions
site topology, subnets
sites
Sites and Services console
Sites and Services console, forest and domain structure
Sites and Services console, replication monitoring
Sites and Services console, site topology
Sites container
sites, configuring
sites, configuring, Active Directory Sites and Services console
sites, configuring, adding site to existing site link
sites, configuring, application directory partitions [See application directory partitions.]
sites, configuring, case scenario 2nd
sites, configuring, creating
sites, configuring, creating subnets
sites, configuring, creating, moving, and removing domain controller objects
sites, configuring, designating site license server
sites, configuring, exam highlights
sites, configuring, global catalog servers
sites, configuring, intersite replication [See intersite replication configuring.]
sites, configuring, overview of
sites, configuring, practice exercises
sites, configuring, Questions and Answers, answers
sites, configuring, Questions and Answers, questions
sites, configuring, replication and
sites, configuring, summary
sites, configuring, troubleshooting lab
sites, defined 2nd
sites, functions of
sites, RSoP Planning mode options
sites, specifying event categories to be audited
slow-network connection, RSoP Planning mode
smart card authentication
smart card authentication, defined
smart card authentication, deployment
smart card authentication, implementing
smart card authentication, multiple forests and
smart card authentication, overview of
smart card authentication, setting hours for
smart card authentication, setting up user for
smart card authentication, user environment configuration 2nd
smart card authentication, user strategies
SMS (Systems Management Server) 2nd
SMTP (Simple Mail Transfer Protocol)
SMTP (Simple Mail Transfer Protocol), creating domains to optimize traffic and
SMTP (Simple Mail Transfer Protocol), intersite replication using
SMTP (Simple Mail Transfer Protocol), site management and
snap-ins
snap-ins, console tree
snap-ins, creating
snap-ins, custom
snap-ins, defined
snap-ins, for remote administration
snap-ins, modifying
snap-ins, overview of
snap-ins, preconfigured
Software
software deployment
software deployment, Add or Remove Programs
software deployment, application deployment 2nd
software deployment, approaches to
software deployment, best practices
software deployment, case scenario
software deployment, defined
software deployment, defined default settings in dialog box
software deployment, exam highlights
software deployment, GPO and GPO console, creating
software deployment, GPO properties, specifying
software deployment, IntelliMirror
software deployment, overview of
software deployment, package deployment method, selecting
software deployment, planning and preparation
software deployment, practice exercise
software deployment, processes
software deployment, pull model
|
|
|
Реклама |
|
|
|
|
|
|