Symbols and Numbers A

Total Page:16

File Type:pdf, Size:1020Kb

Symbols and Numbers A Wolf.Index.qxd 5/28/03 7:24 PM Page 673 Index Symbols and Numbers alcdiag command, 453–455 backup and recovery, 494 #DIV?0!, Excel error codes, 191 dcdiag tool, 460–463 #N/A, Excel error codes, 191 Directory Services Restore Mode, 152 #NAME, Excel error codes, 191 Domain and Trusts snap-in, 457–458 #NULL!, Excel error codes, 191 domain controllers, 480–484 #NUM!, Excel error codes, 191 GPOs, 487–491 #REF!, Excel error codes, 191 gpresult command, 463–464 #VALUE!, Excel error codes, 191 gpupdate command, 464–465 [ ] (optional parameter), 51 nltest command, 465–466 | (pipe symbol), 51 ntdsutil tool. see ntdsutil tool < > (required parameter), 51 RAS servers, 428 1394 port, 219–220, 503 replication, 484–487 “4-5 Rule”, 214 Replmon, 476 Resultant Set of Policy, 476–480 A Schema snap-in, 458–460, 492–493 Sites and Services snap-in, 458 ABRs (area border routers), 436 trusts, 493 Access control lists (ACLs), 453, 497–498 Users and Computers snap-in, 456–457 Access errors, 183–188 Windows Server 2003 enhancements, Compact and Repair tool, 184–185 452–453 database tables, 187–188 Active Directory, architecture, 443–453 macros or modules, 187 domain controllers, 447–448 manual repairs, 185–187 domains, 444–446 overview of, 183–184 forests, 444–446 reports, 186–187 functional levels, 449–452 ACK (acknowledgement), 68 GPOs, 449 ACLs (access control lists), 453, 497–498 organizational units, 446 acldiag tool, 453–455, 497–498 sites, 446–447 ACPI (advanced configuration and power Active Directory Domains and Trusts, interface), 625 457–458, 493 Active Directory, 453–480 673 Wolf.Index.qxd 5/28/03 7:24 PM Page 674 674 Index Active Directory Schema, 458–460, Analysis, defragmentation vs., 638 492–493 Analysis Report, Diskeeper, 639, 641 Active Directory Sites and Services, 458 Antivirus software, 35–36 Active Directory Users and Computers APIPA (Automatic Private IP Addressing) overview of, 456–457 NAT servers, 432 RIS server management, 389 overview, 26–27 troubleshooting DFS roots, 387 Windows 2000 DHCP, 324 troubleshooting Terminal Services, Application Failure Rating (AFR), 383–386 TechTracker ITX, 663 Active Network Monitor Application Recovery tool, 173–174 collecting diagnostic information, 654 Applications. see also Network services installing, 653–654 analyzing current environment, 36–37 overview of, 652–653 compatibility, 169–171 Active Ports, SmartLine, 654–655 disabling during startup, 132–133 Active Registrations folder, WINS snap-in, logs, 111 303 overview, 5–6 Active Server Watcher, SmartLine, printing, 380–381 656–657 process-oriented corrective action for, Add Driver (prndrvr.vbs-a) command, 43 366–367, 590–591 shutdown, 158 Add or Remove Program Licenses Wizard, terminal server sessions, 386 645–647 uninstalling with msicuu, 133–134 Address Resolution Protocol (ARP), uninstalling with System Restore, 59–60, 498–499 145–149 addsw command, bootcfg, 218–219, ARC (Advanced RISC Computing), 501–502 213–216 Administrators Architecture application compatibility and, 169 Active Directory. see Active Directory, device model numbers, 163 architecture Network Monitor and, 75–78 DHCP. see DHCP (Dynamic Host printer configuration, 379 Configuration Protocol), architecture RIS server authorization, 352 disk subsystems. see Disk Subsystems, takeown (taking file ownership), 98–99, architecture 602 DNS. see DNS (Domain Name Service), terminal server session problems, 386 architecture uptime command, 90 RRAS. see RRAS (Routing and Remote Advanced configuration and power inter- Access Service), architecture face (ACPI), 625 WINS, 297–302 Advanced RISC Computing (ARC), Area border routers (ABRs), 436 213–216 ARP (Address Resolution Protocol), Advanced tab, DNS server properties, 59–60, 498–499 260–262 arp command, 59–60, 498–499 Advanced TCP/IP Settings, WINS, ASBR (autonomous system boundary 313–315 router), 436 AFR (Application Failure Rating), ASR (Automated System Recovery), TechTracker ITX, 663 127–129 Alerts, 104–107, 526–529 Asynchronous backups, 343 Wolf.Index.qxd 5/28/03 7:24 PM Page 675 Index 675 ATM (asynchronous transfer mode), firmware problems, 37–38 399–402, 499–501 shutdown failures, 158 atmadm command, 399–402, 499–501 viewing version with MSinfo32, 112 Audit logging, 330–337 viewing version with systeminfo, 107 authoritative restore command, 468–469, Block inheritance, 489–490 494 blue-screen of death. see Stop errors (blue Authorization failure, 332–333, 337 screens) AutoCorrect Backup utility, 204–208 Boot devices Automated System Recovery (ASR), inaccessible, 625–626 127–129 Stop 0x0000007B error, 249–250 Automatic Private IP Addressing. see Unmountable Boot Volume (Stop APIPA (Automatic Private IP 0x000000ED), 631 Addressing) boot information negotiation layer (BINL), Automatic Recovery, 174–175 390 Autonomous system boundary router Boot logging (ASBR), 436 enabling, 151 Recovery Console and, 155–156 shutdown failure and, 158–159 B Boot sector, 213, 241–242 B-node (Broadcast node), 23 Boot-Time Defragmentation, Diskeeper, Backups 640–641 Active Directory, 494 bootcfg commands, 217–225 Automated System Recovery, 128 addsw, 218–219, 501–502 DHCP, 324 copy, 219, 502 recovering Access database from, 183 dbg1394, 219–220, 503 recovering DHCP database from, debug, 220–221, 503–504 343–346 default, 221, 504 recovering WINS database from, delete, 222, 504–505 319–322 editing boot.ini after failure with, 216 shadow copies vs., 143 ems, 222–223, 505 WINS, 309 overview of, 217–218 BACP (Bandwidth Allocation Control query, 223, 506 Protocol), 395 raw, 223–224, 506 BAP (Bandwidth Allocation Protocol), 395 reference guide, 501 Bare metal restores, 128 rmsw, 224–225, 506–507 Basic disks, 212, 239–240, 538 timeout, 225, 507 Basic Input Output System. see BIOS boot.ini file, 213–217 (Basic Input Output System) BOOTP forwarding behavior command, fsutil, 216, 226–229, DHCP discover packets and, 26 529–530 DHCP relay agents vs., 342 Best compression, TightVNC Viewer, 123 DHCP server not responding, 337 Binary conversion, 13–14 BOOTP.Microsoft user class, 328 BIND servers, 262, 292–293 Broadcast node (B-node), 23 BINL (boot information negotiation layer), Broadcasts 390 DHCP, 26, 342 BIOS (Basic Input Output System) DNS, 19, 22 analyzing settings, 32 Browse function, WINS, 313 Wolf.Index.qxd 5/28/03 7:24 PM Page 676 676 Index BSOD (blue-screen of death). see Stop Client and Gateway Services for NetWare, errors (blue screens) 353–356 Client-servers, 127–149 application compatibility, 169–171 C Automated System Recovery, 127–129 Caching devices, 159–164 caching-only servers, 254 displays, 166–167 clearcache DNS command, 268–269 driverquery command, 129–131 cacls command, 95–97, 507–509 faxes, 164–166 Canonical Name (CNAME) records, 254 Internet Connection Sharing, 167–169 Capture Buffer, Network Monitor, 77–78 msconfig command, 131–133 Capture Filter, Network Monitor, 78 msicuu command, 133–134 Capture, Network Monitor, 77 Online Crash Analysis, 134–135 Capture Trigger, Network Monitor, 78 OS installation, 156–157 Case sensitivity, command switches, 62 Recovery Console, 152–156 Cell error codes, Excel, 191 Remote Assistance, 139–140 Challenge Handshake Authentication Remote Desktop, 135–139 Protocol (CHAP), 394 Shadow Copy, 141–145 change command, pagefileconfig, 80–81, System Restore, 145–149 581–582 system shutdown, 157–159 Change Journal, 236–239, 536–537 system startup, 149–152 Chaos class, DNS records, 277 WINS, 299 CHAP (Challenge Handshake Client Services for NetWare. see CSNW Authentication Protocol), 394 (Client Services for NetWare) check command, netsh wins server, Clients 307–308, 567–568 DNS, 252, 262, 287–288 check database command, 307–308, 567 NAT, 431 check version command, 308, 567 RIS, 352–353 chkdsk command WINS, 313–315 chkntfs disabling, 52, 510 Clients, DHCP Data Bus Error (Stop 0x0000002E), 622 alternate configuration feature, 324 overview of, 51–53 leases, 337 reference guide, 509 overview of, 334–336 Stop 0x00000023/Stop 0x00000024 RAS server and, 340–341 errors, 246, 621 Clients, RAS chkntfs command connections, 426 overview of, 52–53 RAS server, 428 reference guide, 510 RAS server network, 429 Circular troubleshooting, 41 route command, 422–424 Classes, AD schema, 492 RRAS snap-in, 424 Classes, DHCP CM (Connection Manager) tracing features of, 324 enabling/disabling, 406 user, 328 generating RAS Diagnostic Report, vendor, 327 408–409 Classful addressing, 15 showing status of, 406 clean command, dfsutil, 356–357, 515 CNAME (Canonical Name) records, 254 clearcache command, 268–269 Wolf.Index.qxd 5/28/03 7:24 PM Page 677 Index 677 Codes, error. see Device Manager, error ctrl key, 452 codes Custom.dic files, 207 COM add-ins, 203 Command Prompt, Safe Mode with, 151 compact command, init, 309, 319, 321, 569 D Compaction DACL (discretionary access control), Compact and Repair tool, 184–185 95–97, 507–509 recovering WINS databases, 309, Data Registry key, 201 319–322 dbg1394 command, bootcfg, 219–220, 503 Compression dcdiag tool Ghost vs. RIS, 352 overview of, 460–463 TightVNC Viewer, 123 reference guide, 510–513 Computer Management snap-in troubleshooting domain controllers, 480 Disk Management access, 56–57 DCPromo, 481 File Replication Service status, 484 debug command, bootcfg, 220–221, overview of, 110 481–482, 503–504 Computers, comparing settings on, 38 Debugging Configurations tab, TechTracker ITX, 663 dbg1394 command, 219–220, 503 Configure Database Wizard, Sitekeeper, debug command, 220–221, 481–482, 644 503–504 Conflict detection, 328–329, 343 debug logging, 263, 264–265 Connection Manager. see CM (Connection
Recommended publications
  • Restoration Onto Different Hardware (PDF)
    Restoration onto different Hardware Quick and easy system restore with O&O DiskImage Table of contents System restoration using boot media ...................................................................................... 1 Restoration onto different hardware ....................................................................................... 2 Limitations when restoring onto different hardware ................................................................................................................. 3 Automatic update............................................................................................................................... ............................................. 3 Manual adaptation .......................................................................................................................................................................... 4 Enable automatic adaptation on changed hardware (M.I.R.) .................................................................................................... 4 Assistance when error messages occur during booting .......................................................... 7 I System restoration using boot media Disks where you save your private and business data can be quickly imaged and restored in the event of a crash or hardware damage. Creating an image of your entire computer or the system partition is also very easy. To restore an image of a Windows system, you’ll need to start O&O DiskImage directly from a bootable medium *. *Note You’ll need to
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Copyrighted Material
    2986IDX.qxd 9/6/01 12:12 AM Page 425 Index Note to the reader: Throughout this index boldfaced page numbers indicate pri- mary discussions of a topic. Italicized page numbers indicate illustrations. A for Local Users and Groups, 171 in Shared Folders, 333 abstracts, from Indexing Service, 140 Active Directory, 7–8 Accessibility, 2–6 for adding programs, 12 Internet Explorer options, 157 ActiveX controls, security settings for, 158 Magnifier, 176–177 Add Counters dialog, 257, 257–258 Narrator, 195–196 Add Excluded Files dialog On-Screen Keyboard, 234, 234–235 (Backup), 35 Options window, 2, 2–3 Add Hardware Wizard, 8–10, 350–351 Utility Manager, 385–386, 386 Add or Remove Programs, 10–13 Accessibility Options dialog, Keyboard address bar tab, 3, 3–4 in Explorer, 101–102, 102 Accessories, 6 in Internet Explorer, 149 Calculator, 37–38 Address Book, 13–25 Command Prompt, 46, 46–47 contact template, 20 Communications, 47 creating contacts, 16–17 Entertainment program group, 92 folders, 22–23 Program Compatibility Wizard, 288, 288–289 groups, 20–22 System Tools, 366. See also Backup identities for, 24–25 Character Map, 40 menus, 15–16 Disk Cleanup, 69–71, 71 retrieving e-mail addresses from, 241 Disk Defragmenter, 71–75 searching for people in, 325–326 File and Settings Transfer toolbar, 14, 15 Wizard, 112 window, 14 Scheduled Tasks, 316, 316–322 Address toolbar, 367 System Information, 361–363COPYRIGHTEDAdministrative Tools, MATERIAL 25–26. See also System Restore, 364, 364–365 Microsoft Management Console (MMC) snap-ins Windows Explorer, 97, 97–106 Active Directory, 7–8 Windows Movie Maker, 406–414, 407 for adding programs, 12 Action menu COM+ (Component Services), 45 for Device Manager, 59–63 Data Sources (ODBC), 51–55 425 2986IDX.qxd 9/6/01 12:12 AM Page 426 ADMINISTRATOR ACCOUNT Event Viewer, 93, 93–96, 94 attrib command, 291 Local Security Policy, 168, 168–170, AU files, 396 168–170 audio.
    [Show full text]
  • The Recovery Console Content
    The Recovery Console Content 1. Common .....................................................................................................................3 2. Invoke the Recovery Console......................................................................................3 2.1. Start from Media...................................................................................................3 2.2. Start using RIS .....................................................................................................4 2.3. Installation ............................................................................................................5 2.3.1. Attended ........................................................................................................5 2.3.2. Un-attended...................................................................................................6 2.4. Un-installation.......................................................................................................6 2.5. Windows NT 4.0 ...................................................................................................6 2.6. 64-bits ..................................................................................................................7 3. Commands..................................................................................................................7 3.1. Commands In-depth ...........................................................................................10 3.1.1. BOOTCFG...................................................................................................10
    [Show full text]
  • Enabling Serial Over LAN for a Remote Windows Text Console Using OSA Smbridge Planning / Implementation (Withdrawn Product)
    Enabling Serial Over LAN for a Remote Windows Text Console using OSA SMBridge Planning / Implementation (withdrawn product) Main Enabling Serial Over LAN for a Remote Windows Text Console using OSA SMBridge (withdrawn product) 1 SMBridge is supported on Windows and Red Hat Linux® and can be downloaded from the following URLs: http://www.ibm.com/support/docview.wss?uid=psg1MIGR-57729 -- for x236, x336, and x346 http://www.ibm.com/support/docview.wss?uid=psg1MIGR-64636 -- for other systems The OSA SMBridge User’s Guide is available from the following URL: http://www.ibm.com/support/docview.wss?uid=psg1MIGR-57816 There are two ways to use the SMBridge utility: as telnet server and as a direct command-line interface to the BMC. Only the telnet server function offers the remote text control feature. As a telnet server, SMBridge is started as a background service (for Windows) or daemon (for Linux) on a system on your network. This is typically not the server with the BMC. You initially connect to the telnet server, then from there you connect to the BMC via the server Ethernet port. This is shown in the figure below. Figure: Using SMBridge to connect remotely to a server Configuring BIOS to enable Serial Over LAN Before SMBridge can be used to manage a remote server via SOL, the BMC and BIOS of the remote server must have the following settings configured. Note: This procedure disables PXE boot on Gigabit port 1 on the server. If you plan to use PXE, you will need to connect Gigabit port 2 to your network and ensure that your remote install procedure is configured to use that port.
    [Show full text]
  • Technology in India Useful Commands on Your Computer
    Technology in India Useful Commands on your Computer Run Commands ------------------------------------------------------------------- compmgmt.msc - Computer management devmgmt.msc - Device manager diskmgmt.msc - Disk management dfrg.msc - Disk defrag eventvwr.msc - Event viewer fsmgmt.msc - Shared folders gpedit.msc - Group policies lusrmgr.msc - Local users and groups perfmon.msc - Performance monitor rsop.msc - Resultant set of policies secpol.msc - Local security settings services.msc - Various Services msconfig - System Configuration Utility regedit - Registry Editor msinfo32 - System Information sysedit - System Edit win.ini - windows loading information(also system.ini) winver - Shows current version of windows mailto: - Opens default email client command - Opens command prompt Run Commands to access the control panel ------------------------------------------------------------------- appwiz.cpl - Add/Remove Programs control admintools - Adminastrative Tools control color - The Display with the appearance tab open control date/time - Date and Time properties control folders - Folder Options control fonts - Fonts Folder control infrared - Infrared folder if available control netconnections - Network and Dial-up Connections window control netware - Netware window if installed and available control panel - Control Panle control printers - Printers Folder control printers control schedtasks - Schedule tasks window ccontrol telephony - Location information window control userpasswords - User Accounts desk.cpl - Display Properties findfast.cpl
    [Show full text]
  • Bitlocker Group Policy Settings
    BitLocker Group Policy Settings Updated: September 13, 2013 Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 This reference topic for the IT professional describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption. Overview To control what drive encryption tasks the user can perform from the Windows Control Panel or to modify other configuration options, you can use Group Policy administrative templates or local computer policy settings. How you configure these policy settings depends on how you implement BitLocker and what level of user interaction will be allowed. Note A separate set of Group Policy settings supports the use of the Trusted Platform Module (TPM). For details about those settings, see Trusted Platform Module Services Group Policy Settings. BitLocker Group Policy settings can be accessed using the Local Group Policy Editor and the Group Policy Management Console (GPMC) under Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption. Most of the BitLocker Group Policy settings are applied when BitLocker is initially turned on for a drive. If a computer is not compliant with existing Group Policy settings, BitLocker may not be turned on or modified until the computer is in a compliant state. When a drive is out of compliance with Group Policy settings (for example, if a Group Policy setting was changed after the initial BitLocker deployment in your organization, and then the setting was applied to previously encrypted drives), no change can be made to the BitLocker configuration of that drive except a change that will bring it into compliance.
    [Show full text]
  • Rapid Recovery 6.2 Commands and Scripting Reference Guide 2 Forcescheduledarchive
    Rapid Recovery 6.2 Commands and Scripting Reference Guide Table of Contents Introduction to Rapid Recovery.........................................................................................................10 Command Line Management utility...................................................................................................11 Commands..................................................................................................................................... 12 ApplyLicense.......................................................................................................................... 12 Archive....................................................................................................................................13 CancelActiveJobs...................................................................................................................16 CheckRepository.................................................................................................................... 17 CheckTieredRepository..........................................................................................................18 ConfigureAgentMigration........................................................................................................19 CreateArchiveRepository........................................................................................................20 CreateBootCD.......................................................................................................................
    [Show full text]
  • Zz-Cryptoprevent-Do
    REPLAY 4 ADMINISTRATOR’S GUIDE Copyright 2009/2010 by AppAssure Software , Inc. ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means — graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage and retrieval systems — without the written permission of the publisher. For permission to use material from this publication, contact AppAssure Software, Inc. 1925 Isaac Newton Square, Suite 440 Reston, VA 20190 +1 703-547-8686 [email protected] Replay 4 Administrator’s Guide ii Contents Chapter One: Introduction ............................................................. 1 REPLAY 4 .......................................................................................................................................................... 1 Chapter One: Introduction ........................................................................................................................ 1 What Is In This Guide ......................................................... 1 About Replay 4 ................................................................... 1 What you get with Replay 4 .............................................. 2 What's New in Replay 4? ................................................... 2 Replication for Off-site Backup and Disaster Recovery .............................................. 2 New Enterprise Console ...........................................................................................................
    [Show full text]
  • An A-Z Index of the Windows CMD Command Line
    An A-Z Index of the Windows CMD command line aaADDUSERSADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ARP Address Resolution Protocol ASSOC Change file extension associations• ASSOCIAT One step file association AT Schedule a command to run at a specific time ATTRIB Change file attributes bb BCDBOOT Create or repair a system partition BCDEDIT Manage Boot Configuration Data BITSADMIN Background Intelligent Transfer Service BOOTCFG Edit Windows boot settings BROWSTAT Get domain, browser and PDC info cc CACLS Change file permissions CALL Call one batch program from another• CERTREQ Request certificate from a certification authority CERTUTIL Utility for certification authority (CA) files and services CD Change Directory - move to a specific Folder• CHANGE Change Terminal Server Session properties CHKDSK Check Disk - check and repair disk problems CHKNTFS Check the NTFS file system CHOICE Accept keyboard input to a batch file CIPHER Encrypt or Decrypt files/folders CleanMgr Automated cleanup of Temp files, recycle bin CLEARMEM Clear memory leaks CLIP Copy STDIN to the Windows clipboard CLS Clear the screen• CLUSTER Windows Clustering CMD Start a new CMD shell CMDKEY Manage stored usernames/passwords COLOR Change colors of the CMD window• COMP Compare the contents of two files or sets of files COMPACT Compress files or folders on an NTFS partition COMPRESS Compress individual files on an NTFS partition CON2PRT Connect or disconnect a Printer CONVERT Convert a FAT drive to NTFS COPY Copy one or more files
    [Show full text]
  • Microsoft Bitlocker Administration and Monitoring Evaluation Guide
    Microsoft BitLocker Administration and Monitoring Evaluation Guide Technical White Paper Published: August 2011 By Anthony Smith and Jeff Gilbert CONTENTS Executive Summary ............................................................................................................ 3 Introduction ......................................................................................................................... 4 MBAM Components ............................................................................................................ 6 Administration and Monitoring Server 6 Policy Templates 7 Management Workstations 7 MBAM Clients 7 MBAM Deployment and Configuration .............................................................................. 8 Choosing a Server Topology 8 Configuring MBAM Administrator Roles 10 Securing Recovery Data 11 Deploying the MBAM Client to Existing Computers 11 Deploying the MBAM Client With New Operating Systems 13 Configuring the MBAM Client 13 Configuring Group Policy Settings 13 Using Administrative Templates 15 Interacting with the MBAM Client 16 Managing User and PC Exemptions 18 Managing Hardware Compatibility 18 Displaying MBAM Reports 19 Evaluate MBAM ................................................................................................................... 26 For More Information .......................................................................................................... 27 Situation EXECUTIVE SUMMARY MBAM can help any organization Microsoft BitLocker Administration and
    [Show full text]