A

access control, Hiding and controlling share access, File security, access controls, and auditing, Managing file shares after configuration, Defining central access policies, Extending access policies to auditing
claims-based, Managing file shares after configuration, Extending access policies to auditing
file and folders, Defining central access policies
managing permissions, Hiding and controlling share access, File security, access controls, and auditing
access control list (ACL), Controlling remote registry access, Enabling advanced auditing
access permissions, File-sharing essentials, File security, access controls, and auditing, Managing access permissions, Permission inheritance for files and folders, Configuring access permissions, Basic permissions, Basic permissions, Troubleshooting permissions
configuring, Configuring access permissions
customizing, Basic permissions
described, File-sharing essentials, File security, access controls, and auditing
editing, Basic permissions
file and folder ownership, Managing access permissions
permission inheritance, Permission inheritance for files and folders
troubleshooting, Troubleshooting permissions
access tokens, Configuring UAC and Admin Approval Mode
access-based enumeration, Hiding and controlling share access, Creating shared folders in Server Manager
access-denied assistance, Configuring classification
Access-Denied Assistance dialog box, Enabling access-denied assistance
ACL (access control list), Controlling remote registry access, Enabling advanced auditing
ACPI (Advanced Configuration and Power Interface), Diagnosing hardware and firmware startup problems, Viewing Advanced, Resources, and other settings, Troubleshooting hardware, HKLMBCD00000000
BIOS-based systems and, Viewing Advanced, Resources, and other settings, Troubleshooting hardware
described, Diagnosing hardware and firmware startup problems
registry subkey, HKLMBCD00000000
Action Center, Getting to know Server Manager, Adding non–Plug and Play, older hardware, Preventing disk-integrity problems, Diagnosing and resolving problems with storage spaces
activation, product, Product licensing, Performing a clean installation, Performing an upgrade installation, Activation sequence, Activate Windows by telephone, Activate Windows by telephone
activating by phone, Activate Windows by telephone
activating over Internet, Activation sequence
activation sequence, Performing an upgrade installation
clean installations, Performing a clean installation
described, Product licensing
managed activation, Activate Windows by telephone
active cooling mode, Diagnosing hardware and firmware startup problems
Active Directory, Identify security requirements, Final considerations for planning and deployment, Planning for server usage, Designing the Active Directory namespace, Designing the Active Directory namespace, Identifying the domain and forest functional level, Activate Windows by telephone, Adding servers for management, Introducing the registry, Storage-management role services, Using and finding shares, Navigating SMB versions, ADMIN$, Publishing shares in Active Directory, Understanding central access policies, Defining central access policies
central access policies, Understanding central access policies, Defining central access policies
configuration information, Introducing the registry
creating server groups, Adding servers for management
defining server roles, Identifying the domain and forest functional level
described, Identify security requirements
designing namespaces, Planning for server usage
DFS and, Storage-management role services
hidden shares and, Navigating SMB versions
identifying domain and forest functional levels, Designing the Active Directory namespace
managing domain trusts, Designing the Active Directory namespace
planning for server usage, Final considerations for planning and deployment
publishing shares in, Using and finding shares, Publishing shares in Active Directory
SYSVOL share, ADMIN$
volume activation, Activate Windows by telephone
Active Directory Administrative Center, Using graphical administrative tools, MMC tool availability, Enabling dynamic controls and claims-based policy, Configuring classification
Active Directory Certificate Services (AD CS), Using roles, role services, and features
Active Directory Domain Services (AD DS), Using roles, role services, and features, Managing the registry, Understanding the event logs, Storage-management role services, Deploying BitLocker Drive Encryption
described, Using roles, role services, and features
DFS directory trees, Storage-management role services
event logs and, Understanding the event logs
recovery passwords and, Deploying BitLocker Drive Encryption
registry settings, Managing the registry
Active Directory Domains And Trusts, Using graphical administrative tools, MMC tool availability
Active Directory Federation Services (AD FS), Using roles, role services, and features
Active Directory Lightweight Directory Services (AD LDS), Using roles, role services, and features
Active Directory Rights Management Services (AD RMS), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features
Active Directory Sites And Services, Using graphical administrative tools, MMC tool availability
Active Directory Users And Computers, Using graphical administrative tools, Using the MMC, MMC tool availability, Using and finding shares
active partition/volume, Installing Windows Server 2012 R2, Deploying BitLocker Drive Encryption
active partitions/volumes, Working with basic and dynamic disks
active screening, Managing file screening and storage reporting
Active/Active controller model, Configuring the File And Storage Services role
Activity Directory Diagnostics template (Performance Monitor), Creating and managing data collector sets
AD CS (Active Directory Certificate Services), Using roles, role services, and features
AD DS (Active Directory Domain Services), Using roles, role services, and features, Managing the registry, Understanding the event logs, Storage-management role services, Deploying BitLocker Drive Encryption
described, Using roles, role services, and features
DFS directory trees, Storage-management role services
event logs and, Understanding the event logs
recovery passwords and, Deploying BitLocker Drive Encryption
registry settings, Managing the registry
AD FS (Active Directory Federation Services), Using roles, role services, and features
AD LDS (Active Directory Lightweight Directory Services), Using roles, role services, and features
AD RMS (Active Directory Rights Management Services), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features
Add Counters dialog box, Using Performance Monitor, Monitoring performance remotely, Configuring performance counter alerts
Add Drive Letter Or Path dialog box, Configuring mount points
Add Hardware Wizard, Rolling back drivers
Add Mirror dialog box, Adding a mirror to an existing volume, Resolving problems with mirrored sets
Add MPIO Support dialog box, Adding and removing multipath hardware devices
Add New Quota Entry dialog box, Customizing quota entries for individual users
Add Or Remove Snap-Ins dialog box, Step 2: Adding snap-ins to the console
Add Physical Disk dialog box, Creating a standard volume
Add Roles and Features Wizard, Windows 8.1 and Windows Server 2012 R2, Windows 8.1 and Windows Server 2012 R2, Postinstallation tasks, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Working with Server Manager, MMC tool availability, MMC tool availability, MMC tool availability, MMC tool availability, Managing server roles and features, Managing server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Working with SMB 3.0, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Setting up and managing BitLocker Drive Encryption, Setting up and managing BitLocker Drive Encryption
Before You Begin page, Using graphical administrative tools, MMC tool availability, Managing server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
Confirm Installation Selections page, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
converting Minimal Server Interface installation, Postinstallation tasks
Create Virtual Switches page, Installing Hyper-V
Default Stores page, Installing Hyper-V
Desktop Experiences, Windows 8.1 and Windows Server 2012 R2
Installation Progress page, Using graphical administrative tools, Adding server roles and features, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
installing and configuring file services, Working with SMB 3.0
installing BitLocker, Setting up and managing BitLocker Drive Encryption
installing Hyper-V, Installing Hyper-V
installing management tools, Using graphical administrative tools
installing Network Unlock, Setting up and managing BitLocker Drive Encryption
process steps, Managing server roles and features
Remote Assistance, Windows 8.1 and Windows Server 2012 R2
Select Destination Server page, Using graphical administrative tools, MMC tool availability, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
Select Features page, Using graphical administrative tools, MMC tool availability, Adding server roles and features, Configuring the File And Storage Services role
Select Installation Type page, Using graphical administrative tools, MMC tool availability, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
Select Server Roles page, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
starting, Working with Server Manager
Virtual Machine Migration page, Installing Hyper-V
Add Servers dialog box, Working with Server Manager, Getting to know Server Manager
Add To Favorites dialog box, Creating shell command tasks
Add-Windowsfeature cmdlet, Setting up and managing BitLocker Drive Encryption
address space layout randomization (ASLR), Windows 8.1 and Windows Server 2012 R2
Admin Approval Mode (UAC), Elevation, prompts, and the secure desktop
ADMIN$ share, ADMIN$, Managing file shares after configuration
administration tasks, Identify security requirements, Accessing a command prompt during installation, Accessing a command prompt during installation, Forcing disk-partition removal during installation, Creating, deleting, and extending disk partitions during installation, Creating, deleting, and extending disk partitions during installation, Creating, deleting, and extending disk partitions during installation, Windows Server 2012 R2 MMC administration, Managing server binaries, Introducing the registry, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens, Understanding the event logs, Accessing shares for administration
accessing command prompt during installation, Accessing a command prompt during installation
accessing event logs, Understanding the event logs
accessing shares for, Accessing shares for administration
changing administrative approach, Identify security requirements
creating partitions during installation, Creating, deleting, and extending disk partitions during installation
deleting partitions during installation, Creating, deleting, and extending disk partitions during installation
elevated prompt for, Managing server binaries, Introducing the registry, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens
extending partitions during installation, Creating, deleting, and extending disk partitions during installation
forcing partition removal during installation, Accessing a command prompt during installation
loading mass storage drivers during installation, Forcing disk-partition removal during installation
MMC administration, Windows Server 2012 R2 MMC administration
administration tools, Managing Windows Server 2012 R2, Working with the administration tools, Working with the administration tools, Working with the administration tools, Working with the administration tools, Working with the administration tools, Using graphical administrative tools, Using the Disk Management tools, Creating and managing virtual hard disks for Hyper-V
command-line utilities, Working with the administration tools, Using graphical administrative tools
Control Panel, Working with the administration tools, Working with the administration tools
described, Managing Windows Server 2012 R2
graphical, Working with the administration tools, Working with the administration tools, Using the Disk Management tools, Creating and managing virtual hard disks for Hyper-V
administrative shares, Hiding and controlling share access
administrative wizards., Working with the administration tools
(see also specific wizards)
Administrator account, Performing a clean installation, Enabling remote management, Elevation, prompts, and the secure desktop, Application run levels
application run levels, Application run levels
remote management, Enabling remote management
strong passwords, Performing a clean installation
UAC and, Elevation, prompts, and the secure desktop
administrator applications, Application access tokens
administrator permissions, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens
administrator tokens, Introducing the registry
Administrators group, Understanding TPM states and tools, How quota management works, Configuring disk quotas, Hiding and controlling share access, ADMIN$, Creating shares by using File Explorer, Creating shares by using Computer Management
ADMIN$ shares, ADMIN$
disk quotas, How quota management works, Configuring disk quotas
drive shares, Hiding and controlling share access
shared folders, Creating shares by using File Explorer, Creating shares by using Computer Management
TPM management, Understanding TPM states and tools
ADSI Edit, MMC tool availability
Advanced Attributes dialog box, NTFS compression
Advanced Configuration and Power Interface (ACPI), Diagnosing hardware and firmware startup problems, Viewing Advanced, Resources, and other settings, Troubleshooting hardware, HKLMBCD00000000
BIOS-based systems and, Viewing Advanced, Resources, and other settings, Troubleshooting hardware
described, Diagnosing hardware and firmware startup problems
registry subkey, HKLMBCD00000000
Advanced Encryption Standard (AES), Working with SMB 3.0, BitLocker changes
advanced format hard drives, Choosing internal devices, Adding new disks
Advanced profile (folder shares), Creating shared folders in Server Manager
Advanced Security Settings dialog box, Applying permissions to registry keys, Auditing registry access, Creating shared folders in Server Manager, Configuring share permissions, Managing access permissions, Permission inheritance for files and folders, Resetting and replacing permissions, Basic permissions, Special permissions, Troubleshooting permissions, Specifying files and folders to audit
applying permissions to registry keys, Applying permissions to registry keys
auditing registry access, Auditing registry access
auditing settings, Specifying files and folders to audit
changing permissions, Configuring share permissions
confirming desired permissions, Creating shared folders in Server Manager
customizing permissions, Basic permissions
disabling inheritance, Permission inheritance for files and folders
effective permissions, Troubleshooting permissions
enabling inheritance, Resetting and replacing permissions
file and folder ownership, Managing access permissions
setting special permissions, Special permissions
Advanced Security Settings For Global File SACL dialog box, Specifying files and folders to audit
Advanced Sharing dialog box, Creating shares by using File Explorer
Advanced Subscription Settings dialog box, Using subscriptions and forwarded events
AES (Advanced Encryption Standard), Working with SMB 3.0, BitLocker changes
AES-CCM, Working with SMB 3.0
AES-CMAC, Working with SMB 3.0
aliases, Using Windows PowerShell
Allow permissions, Configuring share permissions, Permission inheritance for files and folders, Basic permissions
AllowedPaths key (registry), Controlling remote registry access
ALUA controller model, Configuring the File And Storage Services role
AMD Virtualization (AMD-V), Understanding Hyper-V
AMD-V (AMD Virtualization), Understanding Hyper-V
American Standard Code for Information Interchange (ASCII), Searching the registry
analyzing existing networks, Your plan: The big picture, Predicting network change, Predicting network change, Evaluating the network infrastructure, Assessing systems, Identify network services and applications, Identifying security infrastructure, Reviewing network administration
assessing systems, Evaluating the network infrastructure
described, Your plan: The big picture, Predicting network change
disaster recovery, Reviewing network administration
evaluating network infrastructure, Predicting network change
identifying network services and applications, Assessing systems
identifying security infrastructure, Identify network services and applications
reviewing network administration, Identifying security infrastructure
anchor tags, Enabling access-denied assistance
Anonymous Logon special identity, Accessing the event logs and viewing events
antivirus software, Identify security requirements
Appcmd command, Utilities to know
Append Data permission, Special permissions
Application Information service, Application access tokens
Application log, Understanding the event logs, Understanding the event logs
application objects (BCD), HKEY_LOCAL_MACHINE
application run levels, Introducing the registry
Application Server role, Planning for server usage, Using roles, role services, and features
application virtualization, Introducing the registry
Applications And Services logs, Understanding the event logs, Tracking events using Windows PowerShell
Applications profile (folder shares), Creating shared folders in Server Manager
applications., Configuring run levels (see software applications)
architecture teams, Your plan: The big picture
archiving event logs, Filtering the event logs
Arp command, Accessing a command prompt during installation, Utilities to know
ASCII (American Standard Code for Information Interchange), Searching the registry
ASLR (address space layout randomization), Windows 8.1 and Windows Server 2012 R2
ASR (Automated System Recovery), HKLMSYSTEM
assessing project goals, Your plan: The big picture, Identifying your organizational teams, Assessing project goals, The business perspective, Examining the interaction between IT and business units, Examining the interaction between IT and business units, Predicting network change
business perspective, Assessing project goals
described, Your plan: The big picture, Identifying your organizational teams
examining interactions between IT and business units, Examining the interaction between IT and business units
identifying IT goals, The business perspective
impact of growth on management, Predicting network change
predicting network change, Examining the interaction between IT and business units
ASSOC command, Accessing a command prompt during installation, MMC window and startup
atomic permissions, Special permissions
Attach Virtual Hard Disk dialog box, Creating and managing virtual hard disks for Hyper-V
Attrib command, Accessing a command prompt during installation
Audit Failure event level, Accessing the event logs and viewing events
Audit Object Access Properties dialog box, Enabling basic auditing for files and folders
Audit Success event level, Accessing the event logs and viewing events
Auditing Entry For dialog box, Auditing registry access, Specifying files and folders to audit
auditing policies, Planning for day-to-day operations, Controlling remote registry access, Accessing the event logs and viewing events, Deploying sync shares through Group Policy, Defining central access policies, Enabling advanced auditing, Configuring report locations
establishing, Planning for day-to-day operations
file and folder access, Defining central access policies
file-screen, Configuring report locations
permissions to perform tasks, Accessing the event logs and viewing events
Properties dialog box, Enabling advanced auditing
registry access, Controlling remote registry access
shared folders, Deploying sync shares through Group Policy
Authenticated Users group, Troubleshooting permissions
authentication, Designing the Active Directory namespace, Installing components at the prompt, Installing components at the prompt, Getting information on user and remote user sessions, Installing Hyper-V, BitLocker modes, Setting permitted encryption types, Preparing BitLocker for startup authentication and secure boot, Enabling BitLocker on operating-system volumes, Enabling dynamic controls and claims-based policy
BitLocker Drive Encryption, Setting permitted encryption types, Enabling BitLocker on operating-system volumes
explicit trust relationships and, Designing the Active Directory namespace
Kerberos armoring and, Enabling dynamic controls and claims-based policy
Kerberos authentication, Installing components at the prompt, Installing Hyper-V
Network Level Authentication, Getting information on user and remote user sessions
Network Unlock, Preparing BitLocker for startup authentication and secure boot
resolving failure, Installing components at the prompt
TPM and, BitLocker modes
authentication key, Hardware-encrypted drives
author mode (MMC), MMC modes, Creating and managing taskpads
authorization, Understanding TPM states and tools, Turning an initialized TPM on or off, Deploying BitLocker Drive Encryption, Managing file shares after configuration
Automated System Recovery (ASR), HKLMSYSTEM
Automatic Update, Windows 8.1 and Windows Server 2012 R2
Autorun.inf file, Enabling BitLocker on removable data drives
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset