• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    EAP
        (Extensible Authentication Protocol) 
    EAP (Extensible Authentication Protocol)  2nd  3rd  4th  5th  6th  7th  8th 
    EAP Smart Card Authentication Transaction procedure (20.2) 
    Edb.chk file (Active Directory) 
    Edb.log file (Active Directory) 
    Edbxxxxx.log file (Active Directory) 
    editors
        NAT (Network Address Translation)  2nd 
    Edlin 
    efficiency
        domains 
    EFI
        (Extensible Firmware Interface)  2nd 
    EFI Boot Maintenance Manager 
    EFI Shell  2nd 
        Setup
            booting 
    EFI System Partition (ESP).   [See ESP (EFI System Partition)]2nd  [See ESP (EFI System Partition)]
    EFS  2nd  3rd  4th  5th  6th  7th  8th 
        (Encrypting File System)  2nd  3rd 
        group policies
            loading DRAs into  2nd 
        group policy settings
            disabling  2nd  3rd 
        procedures  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th 
        WebDAV
            advantages  2nd 
    EFS file transactions
        file encryption  2nd  3rd  4th  5th  6th  7th  8th 
    EFS temp files
        wiping 
    EFSINFO command-line tool (encryption) 
    Emergency Management Services (EMS).   [See EMS (Emergency Management Services)]2nd  [See EMS (Emergency Management Services)]
    Emergency Repair Disk (ERD).   [See ERD (Emergency Repair Disk)]
    empty roots 
    EMS  2nd  3rd  4th  5th  6th  7th  8th 
        (Emergency Management Services)  2nd 
        bugchecks  2nd  3rd 
        SAC (Special Administarion Console) 
        SAC (Special Administration Console)  2nd 
    EMS (Emergency Management Services) 
    Enable VGA Mode 
    enabling
        auditing  2nd  3rd 
    Enabling Compression procedure (15.4) 
    Enabling Internet Connection Sharing and Internet Connection Firewall procedure (20.15) 
    Enabling the Smart Card User Template procedure (20.4) 
    Enabling Zone Transfers and Notifications procedure (5.12) 
    encrypted file recovery group policies  2nd  3rd 
    encrypted file transfers 
    encrypted files
        .  [See also file encryption]
        transporting  2nd 
    Encrypting File System (EFS).   [See EFS (Encrypting File System)]2nd  [See EFS (Encrypting File System)]
    encryption
        3DES 
        command-line administration
            improvements to 
        copy warnings 
        DES (Data Encryption Standard) 
        DESX 
        exporting
            high encryption 
        file encryption  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th 
            certificate management  2nd  3rd  4th  5th  6th  7th 
            data encryption  2nd  3rd  4th 
            data encryption;algorithms  2nd  3rd  4th 
            DRA configuration  2nd  3rd  4th 
            EFS  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th 
            EFS file transactions  2nd  3rd  4th  5th  6th  7th  8th 
            file decryption process  2nd  3rd 
            file recovery  2nd  3rd  4th  5th  6th  7th  8th  9th 
            individual files 
            process description  2nd  3rd 
            recovery  2nd  3rd  4th  5th  6th 
            server-based files  2nd  3rd  4th  5th  6th 
            transporting  2nd 
            WebDAV  2nd  3rd  4th  5th  6th  7th  8th 
        file enryption
            disabling  2nd  3rd  4th  5th  6th  7th 
        file sharing 
        folder encryption
            laptops  2nd  3rd 
        group policies 
        managing  2nd  3rd 
        Microsoft Crypto Provider 
        offline file encryption 
        PGP (Pretty Good Privacy) 
        PKI (Public Key Infrastructure)  2nd  3rd 
        shared encryption files 
        visual cues 
        WebDAV 
    encrytpion
        AES (Advanced Encryption Standard) 
    end times (Kerberos reply messages) 
    enhanced metafiles
        printer sharing  2nd 
    enrolling
        smart card users
            remote access  2nd  3rd  4th  5th  6th  7th  8th  9th 
    Enrolling a Smart Card User procedure (20.6) 
    Enrolling for a Certificate Using the Web procedure (18.2) 
    enrollment
        certificates  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
            auto-enrollment  2nd  3rd 
            Certificates snap-in  2nd  3rd 
            CMC (Certificate Management Messages over CMS)  2nd 
            Web enrollment  2nd  3rd  4th 
    enrollment services container (Enterprise CAs) 
    Enterprise CAs  2nd 
        certificate templates  2nd  3rd  4th  5th 
        subordinate CAs
            installing 
    Enterprise Server 
        clusters
            support 
        hot add memory
            support 
        IA64 support 
        metadirectories
            support 
        processors
            support 
        support 
    entries
        Boot.ini 
    Entrust Web site 
    enumeration
        plug-and-play 
    environments
        DLLs
            Side-by-Side assemblies  2nd  3rd  4th 
        folder redirection  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th 
            placement  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            policies  2nd 
        home directories  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            assigning  2nd  3rd 
            mapping downlevel clients  2nd 
        home directoriesterminal services  2nd 
        offline files
            checklist  2nd 
            configuring at server  2nd  3rd  4th  5th  6th  7th  8th 
            inappropriate uses  2nd  3rd 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
            remote desktops  2nd 
            Synchronization Manager  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        servers
            managing via remote desktops  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
        user state migration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            FSTW (Files and Settings Transfer Wizard)  2nd  3rd  4th 
            INF files  2nd  3rd  4th  5th  6th  7th  8th 
            tools 
            USMT (User State Migration Toolkit)  2nd  3rd  4th 
    Erase option (Nvrboot.efi) 
    ERD (Emergency Repair Disk)
        discontinuation of 
    error reporting tools 
    errors
        stop errors  2nd 
    ESE (Extensible Storage Engine)
        Active Directory
            ESE (Extensible Storage Engine) 
        LDAP 
    ESP
        files
            managing  2nd  3rd 
        viewing 
    ESP (EFI System Partition)  2nd 
    Event logs
        checking  2nd  3rd  4th 
    event logs
        managing
            AUDITPOL utility  2nd  3rd  4th  5th 
    event notification
        Active Directory  2nd  3rd 
    events
        online events
            tracking 
    exceptions
        canonical sorting
            ACEs 
    executable loads
        Setup  2nd 
            initial hardware recognition  2nd  3rd 
    Executive services  2nd  3rd 
    Expanding a Basic Disk Partition Using Diskpart procedure (14.3) 
    Explorer
        shares
            creating  2nd  3rd  4th  5th  6th 
    Export option (Nvrboot.efi) 
    Export option (Secedit utility) 
    exporting
        encryption
            high encryption 
        FR private keys  2nd  3rd  4th 
    Exporting and Deleting an FR Private Key procedure (17.6) 
    Exporting and Deleting the FR Public Key Certificate procedure (17.3) 
    extended partitions 
        creating  2nd  3rd 
    extended rights
        Configuration naming context
            Active Directory  2nd 
    extendible disk partitions 
    extending
        disks
            partitions  2nd  3rd 
        partitions  2nd 
    Extensible Authentication Protocol (EAP).   [See EAP (Extensible Authentication Protocol)]
    Extensible Firmware Interface (EFI).   [See EFI (Extensible Firmware Interface)]2nd  [See EFI (Extensible Firmware Interface)]
    extensions
        DNS 
        partitions  2nd  3rd 
        volumes  2nd  3rd 
    external trusts
        Active Directory 
    extinction intervals
        WINS database
            setting  2nd  3rd  4th  5th  6th