Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 74593bindex.fm Page 335 Friday, January 11, 2008 9:25 AM Index A overview of, 69–70 ABOUT_command, PowerShell, 188 policies and system management. See policies, access management, new features, 205 Active Directory ACLs (access control lists) read-only domain controllers, 81–82 Active Directory auditing, 73 restartable AD Domain Service, 87–88 iSCSI using, 64 roles, 79–84 security settings for, 218 TS Remote App deployment using, 275 system ACLs, 73, 204 Windows Deployment Services requiring, ACPI (Advanced Configuration and Power 49–51 Interface) 2.0, 11 AD CS (Active Directory Certificate Services), 80, ACT (Application Compatibility Toolkit) 5.0 82–83 deployment with, 41 AD DS (Active Directory Domain Service) overview of, 36–38 creating domain controller, 76–77 using shimming engines, 311 integrated authorization with, 79–80 actions, specifying Task Scheduler, 174–175 restartable, 87–88 Activate Server wizard, 287–288 TS Web Access with, 281 Active Directory. See AD (Active Directory) AD DS Installation wizard, 76–79 Active Directory Application Mode (ADAM), 84 AD FS (Active Directory Federation Services), 82 Active Directory Certificate Services (AD CS), 82 AD RMS (Active Directory Rights Management Active Directory Domain Services detail panel, Services), 223–224 Server Manager, 157–158 ADAM (Active Directory Application Mode), 81 Active Directory Federation Services (AD FS), 82 Add Features wizard, 241, 247–249 Active Directory Rights Management Services (AD Add Print Driver wizard, 233 RMS), 223–224 Add Printer wizard, 230 Active Directory Schema snap-in, installing, 79 Add Role Services wizard, 226–227 Active/Active standards, 66 Add Roles Wizard, 254–255, 301–302 ActiveX, 6 Administration API, IIS web services, 303 AD (Active Directory), 69–86COPYRIGHTEDAdministrative MATERIAL Template (ADMX) files, 93–94 directory auditing, 72–76 ADMX (Administrative Template) files, 93–94 distribution and replication, 71–72 Advanced Configuration and Power Interface 2.0 DLLs in Server Core installation, 311 (ACPI), 11 domain topologies, 85–87 Aero, 6 landscape, 71 aliases, PowerShell, 189–190, 197–199 objects and schema, 70–71 Allchin, Jim, 70 AMD-V (AMD-Virtualization), 16 74593bindex.fm Page 336 Friday, January 11, 2008 9:25 AM 336 AMERICAN AIRLINE SABRE RESERVATION SYSTEM • BOOT CONFIGURATION DATA (BCD) American Airline SABRE reservation system, TS Gateway connections, 282 260–261 TS Gateway Service, 283 answer files TS Session Broker, 286 defined, 23 Authorization Manager, 81–83 installing Server Core with, 315 automated system deployment overview of, 35–36 Business Desktop Deployment, 42–47 in server deployments, 23–25 Microsoft Solutions Framework, 47–49 APPCMD.EXE command, IIS, 306–307 overview of, 40 AppleTalk protocol, 224 tools for, 41 Application Compatibility team, BDD, 42 automation, Group Policy settings, 93 Application Compatibility Toolkit. See ACT Avalon, 6 (Application Compatibility Toolkit) 5.0 Application Management team, BDD, 43 Application Pool Defaults dialog box, IIS, 292 B APPLICATIONHOST.CONFIG, IIS, 293 B+ Tree system, 126 application-specific integrated circuits (ASICs), backup, with SyncToy, 126 240 backup domain controllers (BDCs), 71–72, 82 architecture bandwidth, 268 Next Generation TCP/IP Stack, 54–57 bandwidth throttling, QoS policy, 120–121 Terminal Server 2008, 266 bare metal deployment, 23–25 Windows Server 2008. See Windows Server BartPE builder, 26 2008 architecture BCD (Boot Configuration Data), 12, 27 archiving, Server Core installation, 316 BCDEDIT command, 27, 41, 150 ASICs (application-specific integrated circuits), BDCs (backup domain controllers), 71–72, 85 240 BDD (Business Desktop Deployment), 42–47 asterisk symbol (*), PowerShell, 187–188 deployment scenarios, 45–47 attributes, LDAP directory, 70 Microsoft Solutions Framework for, 47–49 Audit Policy, Security Configuration Wizard, overview of, 42–43 213–214 team resources, 43–45 auditing, Active Directory, 72–76 Windows Automated Installation Kit 3.01 authentication required by, 29 AD roles, 79–84 BDD Document Explorer, 42, 45 CHAP, 203–204 BDD Solution Accelerator, 47–49 IIS, 301–302 BDD Workbench, 41–42 network connection security, 217 BDE (BitLocker Drive Encryption), 128–129 SSTP server, 56 binding order, for protocols, 59 authorization BIOS, of thin clients, 263–264 IIS 7.0 and, 301 BitLocker, 41, 128–129 integrated, 79–81 BitLocker Drive Encryption (BDE), 128–129 MMC enhancements, 155 BizTalk Initiative, 259 security features for, 205 Boot Configuration Data (BCD), 12, 27 74593bindex.fm Page 337 Friday, January 11, 2008 9:25 AM BOOT SYSTEM • CONFIGURATION PARTITION 337 boot system CLR (Common Runtime Language), 6, 181 Delayed Auto-Start service for, 11 cluster DLLs, Server Core installation, 312 improvements to, 12 clusters performing remotely with WDS, 49–51 fail-over, 245–249 setting order for virtual machines, 258 NLB, 242–245 BOOTFIX tool, 27 Windows Server Virtualization and, 253 BOOT.INI file, 12, 27 CMD.EXE, PowerShell syntax vs., 179, 187 BOOT.SDI file, 27 cmdlets, PowerShell BOOTSECT tool, 27 built-in, 191–199 Business Desktop Deployment. See BDD (Business getting help with, 185–186 Desktop Deployment) overview of, 186–187 syntax, 188 viewing snap-ins, 184 C CNG (Crypto Next Generation) CryptoAPI, 128 caching modules, IIS, 296 Code Signing Certificates, RemoteApp, 279–280 Cairo project, 7 Collector Service, Windows Event, 171 Calendar, Windows System Resource Manager, COM (Component Object Model), 7 236–239 COM+ (Component Object Model+), 6 CardSpace, 9 command prompt management, Server Core CAs (certificate authorities), Kerberos, 79–80 enabling remote desktop connections, 318–319 case sensitivity, PowerShell commands, 183 MMC management, 325–326 certificate authority (CA), and Kerberos, 79–80 overview of, 316–318 Certificate Services, 80, 82–83 setting up print server, 324 certificates, RemoteApp, 279–280 command-line utilities CHANGE USER / INSTALL command, 275 configuring web services in IIS, 303 CHAP (Challenge-Handshake Authentication PowerShell. See PowerShell Protocol), 64–65, 203–204 Server Core Management, 326–333 CHDSK Server Manager, 147–152 journaling using, 128 Common Language Infrastructure (CLI), 6 Self-Healing NTFS using, 129 Common Runtime Language (CLR), 6, 181 volume management using, 132 compatibility Citrix, 262–265 client support. See client support ClearType, 273 down-level, 222–223 CLI (Common Language Infrastructure), 6 installing domain controllers, 77 client support, 221–233 PowerShell, 179 down-level compatibility, 222–223 using ACT. See ACT (Application Macintosh interoperability, 224–225 Compatibility Toolkit) 5.0 mobile clients, 223–224 Component Object Model (COM), 7 network printing, 229–233 Component Object Model+ (COM+), 6 Unix interoperability, 225–228 compression modules, IIS, 296 Windows Server 2008 and Vista together, Computer Imaging team, BDD, 43 221–222 Configuration partition, AD database, 72 74593bindex.fm Page 338 Friday, January 11, 2008 9:25 AM 338 CONFIGURATION STORE • DISTRIBUTED SERVICES configuration store, IIS, 293 Desktop Composition, 272 CONFIG.XML migration file, 39–40 desktop connections, remote, 318–319 Connect to Computer dialog box, WSRM, 235–236 Desktop Experience, 272–273 connections Desktop Standard, 104 configuring remote, 276 Device Installation Restrictions, 128–129 enabling remote, 318–319 device management policies, 126–128 TS Gateway, 281–283 Device Manager, 159 content modules, IIS, 295–296 device-specific modules (DSM), 66 context switching, 2 DFS (Distributed File System) Control panel Preference settings, Group Policy, creating shares with Provision a Shared Folder 108–109 wizard, 138 Core team, BDD, 42 overview of, 142–144 counters, Performance Monitor, 162–163 replicating Group Policy Templates, 97 Create a Shared Folder wizard, 249 DFSCMD command, 142 Create Cluster wizard, 247 DHCP DLLs, Server Core installation, 311 Create Windows Installer Package command, 275 DHCPv6, 61 credential caching, 85 dial-up, security settings, 217 Crypto Next Generation (CNG) CryptoAPI, 128 Differentiated Services Code Point (DSCP), QoS CSCRIPT command, 324–325 policy, 121 CSE (client-side extensions), Group Policy Digital Equipment Corporation (DEC), 1–2 Preferences, 104 digital signatures custom views new features, 11 Event Viewer, 171–172 PowerShell execution policies, 200 Server Manager, 157 RemoteApp security, 279–280 Cutler, David, 2 Direct3D, Avalon support for, 6 directories auditing in Active Directory, 72–76 D features of LDAP, 70 DAP (Directory Access Protocol), 70 metadirectories, 81 Data Execution Prevention (DEP), 155 Directory Access Protocol (DAP), 70 data protection, 205 Directory Services, 70 DCOM (Distributed Component Object Model) Directory Tree, 70 rights, 176 Disk Management utility, 126–128, 165–166 DCOMCONFIG.EXE command, 176 disk space requirements, 20 DCPROMO command, 76–77 DISKPART utility, 22–23, 27 DEC( Digital Equipment Corporation), 1–2 display data prioritization, 268–269 Delayed Auto-Start, kernel, 11 display resolutions, Terminal Server, 270–271 delegation, IIS, 306 Distributed Component Object Model (DCOM), denial-of-service (DOS) attacks, NLBS and, 244 176 DEP (Data Execution Prevention), 155 Distributed File Service. See DFS (Distributed File Deployment team, BDD, 43 System) Desired Configuration Monitoring team, BDD, 43 distributed services, PowerShell, 181–182 74593bindex.fm Page 339 Friday, January 11, 2008 9:25 AM DISTRIBUTION • FILE SERVER RESOURCE MANAGER (FSRM) 339 distribution, Active Directory, 71–72 encryption,
Recommended publications
  • Page 1 of 2 KB296944
    KB296944 - HOW TO: Use File Replication Service File and Folder Filters in Windows 2000 Page 1 of 2 Knowledge Base HOW TO: Use File Replication Service File and Folder Filters in Windows 2000 PSS ID Number: 296944 Article Last Modified on 10/28/2003 The information in this article applies to: l Microsoft Windows 2000 Server l Microsoft Windows 2000 Advanced Server This article was previously published under Q296944 IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base: 256986 Description of the Microsoft Windows Registry IN THIS TASK l SUMMARY l ¡ Overview ¡ Using Dfs File and Folder Filters ¡ Setting the File and Folder Filters on an FRS Replica in Active Directory ¡ n Setting Filters for Sysvol n Setting Filters for Dfs Replicas ¡ Using Registry Entries SUMMARY This article describes how to use file and folder filters for content that is replicated by the File Replication service (FRS). FRS is a multithreaded, multiple-master replication engine that replaces the LAN Manager Replication (LMREPL) service in Microsoft Windows NT versions 3.x and 4.0. Windows 2000-based domain controllers and servers use FRS to replicate system policies and logon scripts for Windows 2000-based and earlier clients. FRS can also replicate content between Windows 2000-based servers that host the same fault-tolerant distributed file system (Dfs) roots or child node replicas.
    [Show full text]
  • Windows Poster 20-12-2013 V3
    Microsoft® Discover the Open Specifications technical documents you need for your interoperability solutions. To obtain these technical documents, go to the Open Specifications Interactive Tiles: open specifications poster © 2012-2014 Microsoft Corporation. All rights reserved. http://msdn.microsoft.com/openspecifications/jj128107 Component Object Model (COM+) Technical Documentation Technical Documentation Presentation Layer Services Technical Documentation Component Object Model Plus (COM+) Event System Protocol Active Directory Protocols Overview Open Data Protocol (OData) Transport Layer Security (TLS) Profile Windows System Overview Component Object Model Plus (COM+) Protocol Active Directory Lightweight Directory Services Schema WCF-Based Encrypted Server Administration and Notification Protocol Session Layer Services Windows Protocols Overview Component Object Model Plus (COM+) Queued Components Protocol Active Directory Schema Attributes A-L Distributed Component Object Model (DCOM) Remote Protocol Windows Overview Application Component Object Model Plus (COM+) Remote Administration Protocol Directory Active Directory Schema Attributes M General HomeGroup Protocol Supplemental Shared Abstract Data Model Elements Component Object Model Plus (COM+) Tracker Service Protocol Active Directory Schema Attributes N-Z Peer Name Resolution Protocol (PNRP) Version 4.0 Windows Data Types Services General Application Services Services Active Directory Schema Classes Services Peer-to-Peer Graphing Protocol Documents Windows Error Codes ASP.NET
    [Show full text]
  • Windows Server 2008 and Windows Vista Ebook
    ● ● ● ● ● ● ● ● ● ● ● How to access your CD files The print edition of this book includes a CD. To access the CD files, go to http://aka.ms/625143/files, and look for the Downloads tab. Note: Use a desktop web browser, as files may not be accessible from all ereader devices. Questions? Please contact: [email protected] Microsoft Press PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2008 by Derek Melber All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2008920568 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further infor- mation about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to [email protected]. Microsoft, Microsoft Press, Active Desktop, Active Directory, ActiveX, BitLocker, Excel, FrontPage, HotStart, InfoPath, Internet Explorer, NetMeeting, OneNote, Outlook, PowerPoint, SideShow, Visio, Visual Basic, Visual Studio, Windows, Windows Live, Windows Media, Windows NT, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
    [Show full text]
  • Windows Server Firewall Configuration
    Windows Server Firewall Configuration • Windows Server Firewall, page 1 • Cisco Firewall Configuration Utility Prerequisites, page 2 • Run Cisco Firewall Configuration Utility, page 2 • Verify New Windows Firewall Settings, page 3 • Windows Server Firewall Communication with Active Directory, page 4 • CiscoICMfwConfig_exc.xml File, page 7 • Windows Firewall Troubleshooting, page 8 Windows Server Firewall Windows Server 2008 R2 includes Windows Firewall. Windows Firewall is a stateful host firewall that drops all unsolicited incoming traffic. This behavior of Windows Firewall provides some protection from malicious users and programs that use unsolicited incoming traffic to attack computers. More information can be found in the Microsoft Windows Firewall Operations Guide at http:// technet.microsoft.com/en-us/library/cc739696(WS.10).aspx. If you are using IPsec, consult the Microsoft TechNet article, Managing IPSec and Multicast Settings, at http:/ /technet.microsoft.com/en-us/library/cc779589(WS.10).aspx. Note Windows Firewall is disabled by default on systems that have been upgraded to SP1. Systems that have a new installation of Windows Server 2008 R2 have Windows Firewall enabled by default. When you enable Windows Firewall on your servers, open all ports that the Unified ICM/Unified CCE components require. Cisco provides a utility to automatically allow all traffic from Unified ICM/Unified CCE applications on a Windows Server 2008 R2. Additionally, the utility can open ports for common third-party applications used in the Unified ICM/Unified CCE environment. The script reads the list of ports in the file %SYSTEMDRIVE%\CiscoUtils\FirewallConfig\CiscoICMfwConfig_exc.xml and uses the directive contained therein to modify the firewall settings.
    [Show full text]
  • Curriculum Vitae
    CURRICULUM VITAE Amr El Sayed Abdel Latif PERSONAL DATA Address :The American University in Cairo, Social Research Center, P.O. BOX 2511, Cairo, Egypt. Phone (202) 2763-5157 (Home ) (202) 2615-1405 (Work ) (20100)373-2775 (Mob) Birth date : Nov. 17.1970 Nationality : Egyptian E-mail: [email protected] EDUCATION Oct 1996 Cairo University Oct 1997 Institute of Statistical Studies and Research. Qualifying studies for master degree Oct 1994 Cairo University May 1996 Institute of Statistical Studies and Research. Diploma in demography Sept 1988 Cairo University May 1993 Faculty of Science BS - Mathematical Statistics (Very Good) WORK EXPERIENCE Official Work May 1997 The American University In Cairo To date Social Research Center Officer, Research, Field & Training Amr el sayed 1 July 1993 Cairo Demography Center May 1997 Research Assistant June 1996 Saudi Arabia Sept 1996 Project of planning, Abha Data coordination and analysis Experience I have an intensive experience in working (as data analyst, using the SPSS) with Demographic and Health Survey (DHS) and the Maternal and Child Health Surveys (PAPCHILD) Data files of Egypt and other countries, as well to design data entry programs and worked as data analysis trainer in many workshops. Teaching classes - Teaching SPSS, Stata and Spectrum classes to the participants in the "Research Methods Workshop”, from 2000 till 2017. - Teaching SPSS Classes in the following: - The Social Fund for Development - Yemen, 2006. - Faculty of Economics and Political Sciences - Cairo University, 2010.
    [Show full text]
  • Como Entender As Denúncias De Vigilantismo Global
    PROTEÇÃO DE DADOS A BITCOIN e-SAÚDE na União Europeia pode derrubar os EUA e privacidade no Brasil o instituto nupef é uma organização sem fi ns Uma publicação do Instituto Nupef • outubro / 2013 • www.politics.org.br de lucro dedicada à refl exão, análise, produção de conhecimento e formação, principalmente centradas em questões relacionadas às tecnologias da informação e Comunicação (tiCs) e suas relações políticas com os direitos humanos, a democracia, o desenvolvimen- to sustentável e a justiça social. além de realizar cursos, eventos, desenvolver pesquisas e estudos de caso, o nupef edita a politiCs, a rets (revista do terceiro setor) e mantém o projeto tiwa – provedor de serviços internet voltado exclusivamente para instituições sem fi ns lucrativos – resultado de um trabalho iniciado há 21 anos, com a criação do alternex (o pri- meiro provedor de serviços internet aberto ao público no Brasil). o tiwa é um provedor comprometido prioritariamente com a pri- vacidade e a segurança dos dados das entidades associadas; com a garantia de sua liberdade de expressão; com o uso de software livre e de plataformas abertas não-proprietárias. Tecnologias e pessoas com defi ciência: questão política rua sorocaba 219, 501 | parte | Botafogo | CeP 22271-110 | rio de Janeiro | rJ | Brasil Como entender telefone/fax +55 (21) 3259-0370 | www.nupef.org.br as denúncias de vigilantismo global nº16 EDITOR CARLOS A. AFONSO CAPA, PROJETO GRÁFICO E DIAGRAMAÇÃO MONTE DESIGN DISTRIBUIÇÃO VIVIANE GOMES Índice TRADUÇÕES RICARDO SILVEIRA 02 >Como entender as denúncias Esta é uma publicação do Instituto Nupef. de vigilantismo global Versão digitalizada disponível em www.politics.org.br e no sítio do Nupef - www.nupef.org.br Pedro Antonio Dourado de Rezende Para enviar sugestões, críticas ou outros comentários: [email protected] >10 Rua Sorocaba, 219 | 501 - parte | Botafogo | 22271-110 Sugestões relativas às políticas públicas brasileiras sobre Rio de Janeiro RJ Brasil | telefone +55 21 2527-0294 tecnologias assistivas para pessoas com deficiência visual Apoio: Fernando H.
    [Show full text]
  • RSA Envision™ Windows Agentless Collection Troubleshooting
    RSA enVision™ Windows Agentless Collection Troubleshooting Copyright © 1996 - 2007 RSA Security Inc. enVision, Enterprise Dashboard, and Internet Protocol Database (IPDB) are trademarks of RSA Security Inc. LogSmart is a registered trademark of RSA Security Inc. All other trademarks, service marks, registered trademarks, registered service marks mentioned in this document are the property of their respective owners. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of RSA Security Inc. RSA Security Inc. 200 Lowder Brook Drive, Suite 2000 Westwood, MA 02090 U.S.A. 781.375.9000 Windows Agentless Collection Troubleshooting Overview of Windows Collection Process The NIC Windows Service allows the envision system to retrieve Windows logs from remote Windows systems without installing any third-party software (agentless Windows). You can also use third-party Windows collection applications to collect the Windows events. See Envision Help for third-party windows collection The NIC Windows Service converts these messages into syslog events and sends them via shared memory to the NIC Collector Service. The NIC Windows Service tracks which events were read by event log type and by system so that old log information is not re-polled. By default, the NIC Windows Service polls 3 NIC log files types (Application, System, Security,) (Directory Service, DNS Server, File Replication Service are available but not set as a default).
    [Show full text]
  • Offline Assessment for Active Directory Services
    Offline Assessment for Active Directory Prerequisites How to prepare for your Offline Assessment for Active Directory. The Tools machine is used to connect to each of your Domain Controllers (DCs) and retrieve information from them, communicating over Remote Procedure Call (RPC), Server Message Block (SMB), Lightweight Directory Access Protocol (LDAP) and Distributed Component Object Model (DCOM). All data collection and analysis is done locally Once the data is collected and the survey answered, the Offline Assessment tool will analyze on the tools machine. the data locally. At a high level, your steps to success are: No data is transported 1. Install prerequisites on your Tools machine and configure your environment outside your 2. Run discovery and prerequisites checks Active Directory 3. Collect data from your DCs environment to help 4. Complete the survey protect your A checklist of prerequisite actions follows. Each item links to any additional software required data. Your data is for the Tools machine, and detailed steps included later in this document. analyzed using our RAP expert system that is part of the Offline Checklist Assessment client. Please ensure the following items have been completed before starting your engagement. 1. General Use Internet connectivity is needed to: A Microsoft Account is required to activate and sign in to the portal to download the toolset. Activate your account If you don’t have one already, you can create one at http://login.live.com To learn more about Microsoft Accounts, see: http://windows.microsoft.com/en-US/ Download the windows-live/sign-in-what-is-microsoft-account toolset Ensure access to https://services.premier.microsoft.com This document was last updated October 04, 2016.
    [Show full text]
  • A Records, 244–245, 279 -A Switch in Nbtstat, 190 in Netstat, 186 AAS Deployment Package, 710 .Aas Extension, 712 Abstract
    22_InsideWin_Index 13/3/03 9:50 AM Page 1269 Index A A records, 244–245, 279 ACEs (Access Control Entries) -a switch access masks in, 568–570 in Nbtstat, 190 command-line tools for, 572–576 in Netstat, 186 for cumulative permissions, 577 AAS deployment package, 710 for deny permissions, 578 .aas extension, 712 inheritance in, 579–580, 725–728 Abstract classes, 299–300 object ownership in, 572 Accelerated Graphics Port (AGP) adapters, 164 viewing and modifying, 570–571 Access Control Entries. See ACEs (Access ACKs in DHCP, 101–102 Control Entries) ACL Editor, 570, 723 Access control lists (ACLs) Advanced view in Active Directory security, 732–734 for inheritance, 578, 581 objects in, 339 for ownership, 572 in security descriptors, 559 for special permissions, 723–724 Access Control Settings window, 728 Edit view, 725–726 Access masks for permissions inheritance, 578 in ACEs, 568–570 blocking, 579 in DSOs, 733 settings for, 581 Access requests in Kerberos, 621 viewings, 582 Access rights. See also Permissions ACLs (access control lists) in Active Directory security in Active Directory security, 732–734 delegation, 729–732 objects in, 339 types of, 724–725 in security descriptors, 559 for group policies, 682 ACPI (Advanced Configuration and Power Access tokens Interface) contents of, 560–561 compatibility of, 23–28, 148–149 local, 559 kernel version for, 135 SIDs in, 559, 561, 581 for PnP,17, 147–149 ACCM (Asynchronous-Control- ACPIEnable option, 149 Character-Map), 1124 Activation Account domain upgrades, 496–498 in IA64, 130 BDC, 494–496 in installation, 49–50 PDC, 490–493 unattended setup scripts for, 95 Account lockout policies Active Directory, 238 in domain design, 429 bulk imports and exports in, 353–356 in password security, 593–594 DNS deployment in, 242–243 Account logons, auditing, 647 DNS integration in, 238–239 Account management, auditing, 511, 648 dynamic updates, 244–245 Accounts in domain migration.
    [Show full text]
  • Microsoft Windows Common Criteria Evaluation Security Target
    Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 (Fall Creators Update) Microsoft Windows Server (Fall Creators Update) Security Target Document Information Version Number 0.04 Updated On March 23, 2018 Microsoft © 2018 Page 1 of 104 Microsoft Common Criteria Security Target Version History Version Date Summary of changes 0.01 January 27, 2018 Initial draft 0.02 February 24, 2018 Updates from security target evaluation 0.03 March 23, 2018 Updates from assurance activity evaluation 0.04 April 19, 2018 Prepared copy for publication Microsoft © 2018 Page 2 of 104 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
    [Show full text]
  • Microsoft Certification Exam 74-409: Server Virtualization with Windows Server Hyper-V and System Center
    Microsoft Certification Exam 74-409: Server Virtualization with Windows Server Hyper-V and System Center Study Guide by Orin Thomas Exam 74-409 Server Virtualization with Windows Server Hyper-V and System Center Contents Chapter 1: Virtual Machine Settings . 7 Configure dynamic memory . 7. Configure smart paging . 9. Configure resource metering . 11 Configure guest integration services . 11 Create and configure generation 1 and generation 2 virtual machines . 13 Configure and use Enhanced Session Mode . 14 Configure RemoteFX . 16 Summary . 16 Review . 17 Chapter 2: Virtual Machine Storage . 18 Creating virtual hard disks in VHD and VHDx format . 19 Configuring differencing drives . 21 Modifying virtual hard disks . 22 Configuring pass-through disks . 24 Managing checkpoints . 26 Implementing virtual Fibre Channel adapters . 27 Configuring Storage Quality of Service . 28 Configuring Hyper-V host clustered storage . 29 Configuring guest cluster storage . 30 Planning for storage optimization . 32 Deduplication . 32. Storage tiering . 34. Review . 35 2 Exam 74-409 Server Virtualization with Windows Server Hyper-V and System Center Chapter 3: Hyper-V Virtual Networks and Virtualization Networking . 36 Hyper-V virtual switches . 36 Optimizing network performance . 39 Virtual machine MAC addresses . 42 Configuring network isolation . 44 Virtual machine network adapters . 45 Virtual machine NIC teaming . 47 VMM logical networks . 49 VMM port profiles and logical switches . 50 Network Virtualization . 52 VMM virtual machine networks . 53 VMM MAC and IP address pools . 53 Windows Server Gateway . 55 Private Virtual Local Area Networks . 56 Review . 57 Chapter 4: Implementing Virtual Machines . 58 Highly available virtual machines . 58 Guest resource optimization . 61 Intelligent placement . 61. Dynamic optimization .
    [Show full text]
  • Closed Systems January 1St, 2021
    1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 Enhanced DR-DOS 7.01.07 2005 2006 2007 2008 2009 2010 2011 Enhanced DR-DOS 7.01.08 2012 2013 2014 2015 2016 2017 2018 2019 2020 FreeDOS alpha 0.05 DR-DOS/OpenDOS 7.01.01 march 6, 2005 july 21, 2011 FreeDOS FreeDOS alpha 0.1 FreeDOS alpha 0.2 FreeDOS beta 0.3 FreeDOS beta 0.4 FreeDOS beta 0.5 FreeDOS beta 0.6 FreeDOS beta 0.7 FreeDOS beta 0.8 july 2002 FreeDOS beta 0.9 FreeDOS 1.0 FreeDOS 1.1 january 12, 1998 april 21, 1999 FreeDOS 1.2 DR-DOS 3.41 june 29, 1994 march 25, 1998 october 28, 1998 april 9, 2000 august 10, 2000 march 18, 2001 september 7, 2001 april 7, 2002 september 28, 2004 september 3, 2006 january 2, 2012 december 25, 2016 DOS Plus 1.0 DOS Plus 2.01 DR-DOS 3.31 DR-DOS 5.0 DR-DOS 6.0 Novell DOS 7.0 OpenDOS 7.01 Caldera DR-OpenDOS 7.02 DR-DOS 7.04 DR-DOS 7.05 DR-DOS 8.0 DR-DOS 8.1 1985 may 28, 1988 june 1989 may 1990 december 1993 february 1997 december 1997 Caldera DR-DOS 7.02 DR-DOS 7.03 november 30, 1999 october 2005 september 1991 march 1998 january 6, 1999 august 19, 1999 march 30, 2004 Xbox Xbox Xbox Xbox 360 (announced) Xbox Xbox 360 Xbox One (beta) (announced) november 15, 2001 (announced) march 9, 2000 may 12, 2005 november 22, 2005 november 22, 2013 october 1999 january 6, 2001 Windows Embedded for Point of Service Windows Server 2008 Foundation april 1, 2009 MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 MS-DOS 3.05 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 MS-DOS 4.01 MS-DOS 5.0 MS-DOS 5.0a MS-DOS
    [Show full text]