A
- access control, Hiding and controlling share access, File security, access controls, and auditing, Managing file shares after configuration, Defining central access policies, Extending access policies to auditing
- claims-based, Managing file shares after configuration, Extending access policies to auditing
- file and folders, Defining central access policies
- managing permissions, Hiding and controlling share access, File security, access controls, and auditing
- access control list (ACL), Controlling remote registry access, Enabling advanced auditing
- access permissions, File-sharing essentials, File security, access controls, and auditing, Managing access permissions, Permission inheritance for files and folders, Configuring access permissions, Basic permissions, Basic permissions, Troubleshooting permissions
- configuring, Configuring access permissions
- customizing, Basic permissions
- described, File-sharing essentials, File security, access controls, and auditing
- editing, Basic permissions
- file and folder ownership, Managing access permissions
- permission inheritance, Permission inheritance for files and folders
- troubleshooting, Troubleshooting permissions
- access tokens, Configuring UAC and Admin Approval Mode
- access-based enumeration, Hiding and controlling share access, Creating shared folders in Server Manager
- access-denied assistance, Configuring classification
- Access-Denied Assistance dialog box, Enabling access-denied assistance
- ACL (access control list), Controlling remote registry access, Enabling advanced auditing
- ACPI (Advanced Configuration and Power Interface), Diagnosing hardware and firmware startup problems, Viewing Advanced, Resources, and other settings, Troubleshooting hardware, HKLMBCD00000000
- BIOS-based systems and, Viewing Advanced, Resources, and other settings, Troubleshooting hardware
- described, Diagnosing hardware and firmware startup problems
- registry subkey, HKLMBCD00000000
- Action Center, Getting to know Server Manager, Adding non–Plug and Play, older hardware, Preventing disk-integrity problems, Diagnosing and resolving problems with storage spaces
- activation, product, Product licensing, Performing a clean installation, Performing an upgrade installation, Activation sequence, Activate Windows by telephone, Activate Windows by telephone
- activating by phone, Activate Windows by telephone
- activating over Internet, Activation sequence
- activation sequence, Performing an upgrade installation
- clean installations, Performing a clean installation
- described, Product licensing
- managed activation, Activate Windows by telephone
- active cooling mode, Diagnosing hardware and firmware startup problems
- Active Directory, Identify security requirements, Final considerations for planning and deployment, Planning for server usage, Designing the Active Directory namespace, Designing the Active Directory namespace, Identifying the domain and forest functional level, Activate Windows by telephone, Adding servers for management, Introducing the registry, Storage-management role services, Using and finding shares, Navigating SMB versions, ADMIN$, Publishing shares in Active Directory, Understanding central access policies, Defining central access policies
- central access policies, Understanding central access policies, Defining central access policies
- configuration information, Introducing the registry
- creating server groups, Adding servers for management
- defining server roles, Identifying the domain and forest functional level
- described, Identify security requirements
- designing namespaces, Planning for server usage
- DFS and, Storage-management role services
- hidden shares and, Navigating SMB versions
- identifying domain and forest functional levels, Designing the Active Directory namespace
- managing domain trusts, Designing the Active Directory namespace
- planning for server usage, Final considerations for planning and deployment
- publishing shares in, Using and finding shares, Publishing shares in Active Directory
- SYSVOL share, ADMIN$
- volume activation, Activate Windows by telephone
- Active Directory Administrative Center, Using graphical administrative tools, MMC tool availability, Enabling dynamic controls and claims-based policy, Configuring classification
- Active Directory Certificate Services (AD CS), Using roles, role services, and features
- Active Directory Domain Services (AD DS), Using roles, role services, and features, Managing the registry, Understanding the event logs, Storage-management role services, Deploying BitLocker Drive Encryption
- described, Using roles, role services, and features
- DFS directory trees, Storage-management role services
- event logs and, Understanding the event logs
- recovery passwords and, Deploying BitLocker Drive Encryption
- registry settings, Managing the registry
- Active Directory Domains And Trusts, Using graphical administrative tools, MMC tool availability
- Active Directory Federation Services (AD FS), Using roles, role services, and features
- Active Directory Lightweight Directory Services (AD LDS), Using roles, role services, and features
- Active Directory Rights Management Services (AD RMS), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features
- Active Directory Sites And Services, Using graphical administrative tools, MMC tool availability
- Active Directory Users And Computers, Using graphical administrative tools, Using the MMC, MMC tool availability, Using and finding shares
- active partition/volume, Installing Windows Server 2012 R2, Deploying BitLocker Drive Encryption
- active partitions/volumes, Working with basic and dynamic disks
- active screening, Managing file screening and storage reporting
- Active/Active controller model, Configuring the File And Storage Services role
- Activity Directory Diagnostics template (Performance Monitor), Creating and managing data collector sets
- AD CS (Active Directory Certificate Services), Using roles, role services, and features
- AD DS (Active Directory Domain Services), Using roles, role services, and features, Managing the registry, Understanding the event logs, Storage-management role services, Deploying BitLocker Drive Encryption
- described, Using roles, role services, and features
- DFS directory trees, Storage-management role services
- event logs and, Understanding the event logs
- recovery passwords and, Deploying BitLocker Drive Encryption
- registry settings, Managing the registry
- AD FS (Active Directory Federation Services), Using roles, role services, and features
- AD LDS (Active Directory Lightweight Directory Services), Using roles, role services, and features
- AD RMS (Active Directory Rights Management Services), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features
- Add Counters dialog box, Using Performance Monitor, Monitoring performance remotely, Configuring performance counter alerts
- Add Drive Letter Or Path dialog box, Configuring mount points
- Add Hardware Wizard, Rolling back drivers
- Add Mirror dialog box, Adding a mirror to an existing volume, Resolving problems with mirrored sets
- Add MPIO Support dialog box, Adding and removing multipath hardware devices
- Add New Quota Entry dialog box, Customizing quota entries for individual users
- Add Or Remove Snap-Ins dialog box, Step 2: Adding snap-ins to the console
- Add Physical Disk dialog box, Creating a standard volume
- Add Roles and Features Wizard, Windows 8.1 and Windows Server 2012 R2, Windows 8.1 and Windows Server 2012 R2, Postinstallation tasks, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Using graphical administrative tools, Working with Server Manager, MMC tool availability, MMC tool availability, MMC tool availability, MMC tool availability, Managing server roles and features, Managing server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Adding server roles and features, Working with SMB 3.0, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Configuring the File And Storage Services role, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Installing Hyper-V, Setting up and managing BitLocker Drive Encryption, Setting up and managing BitLocker Drive Encryption
- Before You Begin page, Using graphical administrative tools, MMC tool availability, Managing server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
- Confirm Installation Selections page, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
- converting Minimal Server Interface installation, Postinstallation tasks
- Create Virtual Switches page, Installing Hyper-V
- Default Stores page, Installing Hyper-V
- Desktop Experiences, Windows 8.1 and Windows Server 2012 R2
- Installation Progress page, Using graphical administrative tools, Adding server roles and features, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
- installing and configuring file services, Working with SMB 3.0
- installing BitLocker, Setting up and managing BitLocker Drive Encryption
- installing Hyper-V, Installing Hyper-V
- installing management tools, Using graphical administrative tools
- installing Network Unlock, Setting up and managing BitLocker Drive Encryption
- process steps, Managing server roles and features
- Remote Assistance, Windows 8.1 and Windows Server 2012 R2
- Select Destination Server page, Using graphical administrative tools, MMC tool availability, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
- Select Features page, Using graphical administrative tools, MMC tool availability, Adding server roles and features, Configuring the File And Storage Services role
- Select Installation Type page, Using graphical administrative tools, MMC tool availability, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
- Select Server Roles page, Adding server roles and features, Configuring the File And Storage Services role, Installing Hyper-V
- starting, Working with Server Manager
- Virtual Machine Migration page, Installing Hyper-V
- Add Servers dialog box, Working with Server Manager, Getting to know Server Manager
- Add To Favorites dialog box, Creating shell command tasks
- Add-Windowsfeature cmdlet, Setting up and managing BitLocker Drive Encryption
- address space layout randomization (ASLR), Windows 8.1 and Windows Server 2012 R2
- Admin Approval Mode (UAC), Elevation, prompts, and the secure desktop
- ADMIN$ share, ADMIN$, Managing file shares after configuration
- administration tasks, Identify security requirements, Accessing a command prompt during installation, Accessing a command prompt during installation, Forcing disk-partition removal during installation, Creating, deleting, and extending disk partitions during installation, Creating, deleting, and extending disk partitions during installation, Creating, deleting, and extending disk partitions during installation, Windows Server 2012 R2 MMC administration, Managing server binaries, Introducing the registry, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens, Understanding the event logs, Accessing shares for administration
- accessing command prompt during installation, Accessing a command prompt during installation
- accessing event logs, Understanding the event logs
- accessing shares for, Accessing shares for administration
- changing administrative approach, Identify security requirements
- creating partitions during installation, Creating, deleting, and extending disk partitions during installation
- deleting partitions during installation, Creating, deleting, and extending disk partitions during installation
- elevated prompt for, Managing server binaries, Introducing the registry, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens
- extending partitions during installation, Creating, deleting, and extending disk partitions during installation
- forcing partition removal during installation, Accessing a command prompt during installation
- loading mass storage drivers during installation, Forcing disk-partition removal during installation
- MMC administration, Windows Server 2012 R2 MMC administration
- administration tools, Managing Windows Server 2012 R2, Working with the administration tools, Working with the administration tools, Working with the administration tools, Working with the administration tools, Working with the administration tools, Using graphical administrative tools, Using the Disk Management tools, Creating and managing virtual hard disks for Hyper-V
- command-line utilities, Working with the administration tools, Using graphical administrative tools
- Control Panel, Working with the administration tools, Working with the administration tools
- described, Managing Windows Server 2012 R2
- graphical, Working with the administration tools, Working with the administration tools, Using the Disk Management tools, Creating and managing virtual hard disks for Hyper-V
- administrative shares, Hiding and controlling share access
- administrative wizards., Working with the administration tools
- (see also specific wizards)
- Administrator account, Performing a clean installation, Enabling remote management, Elevation, prompts, and the secure desktop, Application run levels
- application run levels, Application run levels
- remote management, Enabling remote management
- strong passwords, Performing a clean installation
- UAC and, Elevation, prompts, and the secure desktop
- administrator applications, Application access tokens
- administrator permissions, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens
- administrator tokens, Introducing the registry
- Administrators group, Understanding TPM states and tools, How quota management works, Configuring disk quotas, Hiding and controlling share access, ADMIN$, Creating shares by using File Explorer, Creating shares by using Computer Management
- ADMIN$ shares, ADMIN$
- disk quotas, How quota management works, Configuring disk quotas
- drive shares, Hiding and controlling share access
- shared folders, Creating shares by using File Explorer, Creating shares by using Computer Management
- TPM management, Understanding TPM states and tools
- ADSI Edit, MMC tool availability
- Advanced Attributes dialog box, NTFS compression
- Advanced Configuration and Power Interface (ACPI), Diagnosing hardware and firmware startup problems, Viewing Advanced, Resources, and other settings, Troubleshooting hardware, HKLMBCD00000000
- BIOS-based systems and, Viewing Advanced, Resources, and other settings, Troubleshooting hardware
- described, Diagnosing hardware and firmware startup problems
- registry subkey, HKLMBCD00000000
- Advanced Encryption Standard (AES), Working with SMB 3.0, BitLocker changes
- advanced format hard drives, Choosing internal devices, Adding new disks
- Advanced profile (folder shares), Creating shared folders in Server Manager
- Advanced Security Settings dialog box, Applying permissions to registry keys, Auditing registry access, Creating shared folders in Server Manager, Configuring share permissions, Managing access permissions, Permission inheritance for files and folders, Resetting and replacing permissions, Basic permissions, Special permissions, Troubleshooting permissions, Specifying files and folders to audit
- applying permissions to registry keys, Applying permissions to registry keys
- auditing registry access, Auditing registry access
- auditing settings, Specifying files and folders to audit
- changing permissions, Configuring share permissions
- confirming desired permissions, Creating shared folders in Server Manager
- customizing permissions, Basic permissions
- disabling inheritance, Permission inheritance for files and folders
- effective permissions, Troubleshooting permissions
- enabling inheritance, Resetting and replacing permissions
- file and folder ownership, Managing access permissions
- setting special permissions, Special permissions
- Advanced Security Settings For Global File SACL dialog box, Specifying files and folders to audit
- Advanced Sharing dialog box, Creating shares by using File Explorer
- Advanced Subscription Settings dialog box, Using subscriptions and forwarded events
- AES (Advanced Encryption Standard), Working with SMB 3.0, BitLocker changes
- AES-CCM, Working with SMB 3.0
- AES-CMAC, Working with SMB 3.0
- aliases, Using Windows PowerShell
- Allow permissions, Configuring share permissions, Permission inheritance for files and folders, Basic permissions
- AllowedPaths key (registry), Controlling remote registry access
- ALUA controller model, Configuring the File And Storage Services role
- AMD Virtualization (AMD-V), Understanding Hyper-V
- AMD-V (AMD Virtualization), Understanding Hyper-V
- American Standard Code for Information Interchange (ASCII), Searching the registry
- analyzing existing networks, Your plan: The big picture, Predicting network change, Predicting network change, Evaluating the network infrastructure, Assessing systems, Identify network services and applications, Identifying security infrastructure, Reviewing network administration
- assessing systems, Evaluating the network infrastructure
- described, Your plan: The big picture, Predicting network change
- disaster recovery, Reviewing network administration
- evaluating network infrastructure, Predicting network change
- identifying network services and applications, Assessing systems
- identifying security infrastructure, Identify network services and applications
- reviewing network administration, Identifying security infrastructure
- anchor tags, Enabling access-denied assistance
- Anonymous Logon special identity, Accessing the event logs and viewing events
- antivirus software, Identify security requirements
- Appcmd command, Utilities to know
- Append Data permission, Special permissions
- Application Information service, Application access tokens
- Application log, Understanding the event logs, Understanding the event logs
- application objects (BCD), HKEY_LOCAL_MACHINE
- application run levels, Introducing the registry
- Application Server role, Planning for server usage, Using roles, role services, and features
- application virtualization, Introducing the registry
- Applications And Services logs, Understanding the event logs, Tracking events using Windows PowerShell
- Applications profile (folder shares), Creating shared folders in Server Manager
- applications., Configuring run levels (see software applications)
- architecture teams, Your plan: The big picture
- archiving event logs, Filtering the event logs
- Arp command, Accessing a command prompt during installation, Utilities to know
- ASCII (American Standard Code for Information Interchange), Searching the registry
- ASLR (address space layout randomization), Windows 8.1 and Windows Server 2012 R2
- ASR (Automated System Recovery), HKLMSYSTEM
- assessing project goals, Your plan: The big picture, Identifying your organizational teams, Assessing project goals, The business perspective, Examining the interaction between IT and business units, Examining the interaction between IT and business units, Predicting network change
- business perspective, Assessing project goals
- described, Your plan: The big picture, Identifying your organizational teams
- examining interactions between IT and business units, Examining the interaction between IT and business units
- identifying IT goals, The business perspective
- impact of growth on management, Predicting network change
- predicting network change, Examining the interaction between IT and business units
- ASSOC command, Accessing a command prompt during installation, MMC window and startup
- atomic permissions, Special permissions
- Attach Virtual Hard Disk dialog box, Creating and managing virtual hard disks for Hyper-V
- Attrib command, Accessing a command prompt during installation
- Audit Failure event level, Accessing the event logs and viewing events
- Audit Object Access Properties dialog box, Enabling basic auditing for files and folders
- Audit Success event level, Accessing the event logs and viewing events
- Auditing Entry For dialog box, Auditing registry access, Specifying files and folders to audit
- auditing policies, Planning for day-to-day operations, Controlling remote registry access, Accessing the event logs and viewing events, Deploying sync shares through Group Policy, Defining central access policies, Enabling advanced auditing, Configuring report locations
- establishing, Planning for day-to-day operations
- file and folder access, Defining central access policies
- file-screen, Configuring report locations
- permissions to perform tasks, Accessing the event logs and viewing events
- Properties dialog box, Enabling advanced auditing
- registry access, Controlling remote registry access
- shared folders, Deploying sync shares through Group Policy
- Authenticated Users group, Troubleshooting permissions
- authentication, Designing the Active Directory namespace, Installing components at the prompt, Installing components at the prompt, Getting information on user and remote user sessions, Installing Hyper-V, BitLocker modes, Setting permitted encryption types, Preparing BitLocker for startup authentication and secure boot, Enabling BitLocker on operating-system volumes, Enabling dynamic controls and claims-based policy
- BitLocker Drive Encryption, Setting permitted encryption types, Enabling BitLocker on operating-system volumes
- explicit trust relationships and, Designing the Active Directory namespace
- Kerberos armoring and, Enabling dynamic controls and claims-based policy
- Kerberos authentication, Installing components at the prompt, Installing Hyper-V
- Network Level Authentication, Getting information on user and remote user sessions
- Network Unlock, Preparing BitLocker for startup authentication and secure boot
- resolving failure, Installing components at the prompt
- TPM and, BitLocker modes
- authentication key, Hardware-encrypted drives
- author mode (MMC), MMC modes, Creating and managing taskpads
- authorization, Understanding TPM states and tools, Turning an initialized TPM on or off, Deploying BitLocker Drive Encryption, Managing file shares after configuration
- Automated System Recovery (ASR), HKLMSYSTEM
- Automatic Update, Windows 8.1 and Windows Server 2012 R2
- Autorun.inf file, Enabling BitLocker on removable data drives
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.