N
- Name Not Found dialog box, Auditing registry access, Configuring share permissions
- name resolution services (location services), Planning for server usage
- named data streams, Hard links
- named pipes (NPs), Enabling remote management, ADMIN$
- naming schemes for computers, Planning partitions
- NAND flash memory, Understanding the disk and file-system structure
- NAP Client Configuration, MMC tool availability
- NAS (network-attached storage), Essential storage technologies, Storage-management role services
- NAT (Network Address Translation), Getting to know Windows Server 2012 R2, Using roles, role services, and features
- navigation commands, Getting started with taskpads, Creating shell command tasks
- Nbtstat command, Accessing a command prompt during installation, Utilities to know
- nested page tables (NPTs), Understanding Hyper-V
- Net Accounts command, Accessing a command prompt during installation
- Net commands, Accessing a command prompt during installation, Utilities to know
- Net Computer command, Accessing a command prompt during installation
- Net Config Server command, Accessing a command prompt during installation
- Net Config Workstation command, Accessing a command prompt during installation
- Net Continue command, Accessing a command prompt during installation
- Net File command, Accessing a command prompt during installation
- Net Group command, Accessing a command prompt during installation
- Net Localgroup command, Accessing a command prompt during installation
- Net Pause command, Accessing a command prompt during installation
- Net Print command, Accessing a command prompt during installation
- Net Session command, Accessing a command prompt during installation
- Net Share command, Accessing a command prompt during installation, Using and finding shares, Creating and publishing shared folders, Managing file shares after configuration
- Net Start command, Accessing a command prompt during installation, Utilities to know
- Net Statistics command, Accessing a command prompt during installation
- Net Stop command, Accessing a command prompt during installation, Utilities to know
- Net Time command, Accessing a command prompt during installation, Utilities to know
- Net Use command, Accessing a command prompt during installation, Utilities to know
- Net User command, Accessing a command prompt during installation
- Net View command, Accessing a command prompt during installation, Utilities to know
- NetBIOS (Network Basic Input/Output System), Assessing systems, Naming computers
- NETLOGON share, ADMIN$
- Netsh command, Accessing a command prompt during installation, Utilities to know
- Netstat command, Accessing a command prompt during installation, Utilities to know
- Network Access warning box, Enabling access-denied assistance
- Network Address Translation (NAT), Getting to know Windows Server 2012 R2, Using roles, role services, and features
- network administration, Identifying security infrastructure
- Network And Sharing Center, Getting to know Server Manager
- network applications, Identify network services and applications
- Network Basic Input/Output System (NetBIOS), Assessing systems, Naming computers
- Network Connections console, Getting to know Server Manager
- network environment, Your plan: The big picture, Your plan: The big picture, Examining the interaction between IT and business units, Predicting network change, Predicting network change, Evaluating the network infrastructure, Defining the new network environment, Defining the new network environment, Defining the new network environment, Identify security requirements, Changing the administrative approach, Select and implement standards
- analyzing existing, Your plan: The big picture, Predicting network change
- assessing impact on operations, Defining the new network environment
- change management, Select and implement standards
- changing administrative approach, Identify security requirements
- defining new, Your plan: The big picture, Defining the new network environment
- evaluating infrastructure, Predicting network change
- identifying security requirements, Defining the new network environment
- inventorying systems, Evaluating the network infrastructure
- predicting change in, Examining the interaction between IT and business units
- selecting and implementing standards, Changing the administrative approach
- Network Explorer, Using and finding shares, Using and finding shares, Creating shares by using Computer Management
- Network File System (NFS), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features, Essential storage technologies, Using internal and external storage devices, Storage-management role services, Creating shared folders in Server Manager
- described, Using graphical administrative tools, MMC tool availability, Using internal and external storage devices
- enabling, Storage-management role services
- File And Storage Services, Using roles, role services, and features
- server-storage communications, Essential storage technologies
- shared folders, Creating shared folders in Server Manager
- network interface card (NIC), Tracking per-process network utilization
- Network Interface performance object, Using Performance Monitor
- Network InterfaceBytes Received/Sec counter, Resolving network bottlenecks
- Network InterfaceBytes Sent/Sec counter, Resolving network bottlenecks
- Network InterfaceBytes Total/Sec counter, Resolving network bottlenecks
- Network InterfaceCurrent Bandwidth counter, Resolving network bottlenecks
- Network Level Authentication, Getting information on user and remote user sessions
- Network Load Balancing (NLB), Using roles, role services, and features
- Network Load Balancing Manager, Using graphical administrative tools
- network management, Examining the interaction between IT and business units, Predicting network change, Evaluating the network infrastructure, Assessing systems, Identify network services and applications, Identifying security infrastructure, Identifying security infrastructure, Reviewing network administration, Reviewing network administration, Getting network usage information, Getting an overview of resource utilization, Tracking per-process network utilization, Using Performance Monitor, Resolving disk I/O bottlenecks, Resolving network bottlenecks, Using and finding shares
- assessing systems, Evaluating the network infrastructure
- disaster recovery, Reviewing network administration
- evaluating network infrastructure, Predicting network change
- identifying network services and applications, Assessing systems
- identifying security infrastructure, Identify network services and applications
- mapping network drives, Using and finding shares
- monitoring performance, Using Performance Monitor
- network administration, Identifying security infrastructure
- network usage information, Getting network usage information
- predicting network change, Examining the interaction between IT and business units
- resolving network bottlenecks, Resolving disk I/O bottlenecks
- reviewing network administration, Identifying security infrastructure
- tools for, Reviewing network administration
- tracking resource usage, Getting an overview of resource utilization, Tracking per-process network utilization
- troubleshooting network activity, Resolving network bottlenecks
- network maps, Evaluating the network infrastructure
- Network Policy And Access Services (NPAS), Planning for server usage, Using roles, role services, and features
- Network Policy Server, Using graphical administrative tools, MMC tool availability
- Network Service special identity, Accessing the event logs and viewing events
- Network Unlock (BitLocker), Using roles, role services, and features, Installing components at the prompt, BitLocker modes, Preparing BitLocker for startup authentication and secure boot, Provisioning BitLocker prior to deployment, Deploying BitLocker Drive Encryption, Setting up and managing BitLocker Drive Encryption, Enabling BitLocker on operating-system volumes
- configuring, Provisioning BitLocker prior to deployment
- described, Using roles, role services, and features, BitLocker modes, Preparing BitLocker for startup authentication and secure boot
- installing, Installing components at the prompt
- installing by default, Setting up and managing BitLocker Drive Encryption
- system volumes, Enabling BitLocker on operating-system volumes
- unlocking computer at startup, Deploying BitLocker Drive Encryption
- network-attached storage (NAS), Essential storage technologies, Storage-management role services
- networking components, Protocols
- networking protocols, Naming computers
- Never eXecute (NX) bit (DEP), Windows 8.1 and Windows Server 2012 R2
- New RAID-5 Volume Wizard, Configuring RAID 5: Disk striping with parity
- New Share Wizard, Creating shared folders in Server Manager
- New Simple Volume Wizard, Creating partitions and simple volumes
- New Spanned Volume dialog box, Managing volumes on dynamic disks
- New Storage Pool Wizard, Creating storage spaces
- New Striped Volume Wizard, Configuring RAID 0: Striping
- New Sync Share Wizard, Creating sync shares and enabling SMB access
- New Task Wizard, Creating and managing taskpads
- New Taskpad View Wizard, Creating and managing taskpads
- New Virtual Disk Wizard, Creating a virtual disk in a storage space
- New Virtual Machine Wizard, Creating virtual machines
- New Volume Wizard, Creating a standard volume, Deduplicating volumes
- New- cmdlets, Using Windows PowerShell
- New-Item cmdlet, Using Windows PowerShell
- New-MSDSMSupportedHw cmdlet, Adding and removing multipath hardware devices
- New-SmbShare cmdlet, Working with SMB 3.0, Creating and publishing shared folders
- NFS (Network File System), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features, Essential storage technologies, Using internal and external storage devices, Storage-management role services, Creating shared folders in Server Manager
- described, Using graphical administrative tools, MMC tool availability, Using internal and external storage devices
- enabling, Storage-management role services
- File And Storage Services, Using roles, role services, and features
- server-storage communications, Essential storage technologies
- shared folders, Creating shared folders in Server Manager
- NIC (network interface card), Tracking per-process network utilization
- NIC teaming, Getting to know Server Manager, Tracking per-process network utilization, Resolving network bottlenecks, Working with SMB 3.0
- NLB (Network Load Balancing), Using roles, role services, and features
- No eXecute (NX) bit (AMD), Windows 8.1 and Windows Server 2012 R2
- No Execute (NX) policy (Windows Boot Loader), Viewing BCD entries, Setting BCD entry values
- noncompliant applications, Software installation essentials, Configuring UAC and Admin Approval Mode, Application access tokens
- None authorization level, Understanding TPM states and tools
- nonpaged pool, Resolving performance bottlenecks
- nonresident attributes, NTFS structure
- Notify permission, Applying permissions to registry keys
- NPAS (Network Policy And Access Services), Planning for server usage, Using roles, role services, and features
- NPs (named pipes), Enabling remote management, ADMIN$
- NPTs (nested page tables), Understanding Hyper-V
- Nslookup command, Utilities to know
- NTFS file system, Performing a clean installation, Introducing the registry, Managing and maintaining MPIO, Understanding legacy and protective MBRs, Converting FAT or FAT32 to NTFS, Converting FAT or FAT32 to NTFS, Creating partitions and simple volumes, Creating partitions and simple volumes, Configuring mount points, Extending partitions, BitLocker modes, Enabling BitLocker on fixed data drives, Enabling BitLocker on fixed data drives, Understanding the disk and file-system structure, Understanding the disk and file-system structure, FAT features, NTFS structure, NTFS structure, NTFS structure, NTFS structure, NTFS structure, NTFS structure, NTFS features, Analyzing the NTFS structure, Analyzing the NTFS structure, Advanced NTFS features, Hard links, Change journals, Change journals, Object identifiers, Sparse files, Sparse files, Sparse files, Transactional NTFS, Transactional NTFS, ReFS integrity streams, data scrubbing, and salvage, Maintaining and optimizing storage, How quota management works, How quota management works, Preventing disk-integrity problems, Analyzing FAT volumes by using ChkDsk, Preventing fragmentation of disks, Preventing fragmentation of disks, Creating a standard volume, Managing file sharing, File-sharing essentials, File security, access controls, and auditing, Managing access permissions, Enabling advanced auditing, Understanding file screening and storage reporting
- access permissions, File security, access controls, and auditing
- advantages, FAT features
- analyzing structure, NTFS features
- auditing support, Enabling advanced auditing
- BitLocker Driver Encryption and, BitLocker modes
- boot sector, NTFS structure
- change journals, NTFS structure, Change journals
- Check Disk tool, Preventing disk-integrity problems
- Chkdsk command, Analyzing FAT volumes by using ChkDsk
- choosing partition format, Creating partitions and simple volumes
- compression, ReFS integrity streams, data scrubbing, and salvage, How quota management works
- configuring mount points, Configuring mount points
- converting MBR and GPT disks, Understanding legacy and protective MBRs
- converting to, Performing a clean installation, Converting FAT or FAT32 to NTFS, Creating partitions and simple volumes
- data streams, Hard links
- default cluster sizes, Understanding the disk and file-system structure
- enabling BitLocker, Enabling BitLocker on fixed data drives, Enabling BitLocker on fixed data drives
- extending partitions, Extending partitions
- features, NTFS structure, Analyzing the NTFS structure
- file screening., Understanding file screening and storage reporting (see file screening)
- fixed sector size, Understanding the disk and file-system structure
- formatting removable disks, Converting FAT or FAT32 to NTFS
- hard links, Advanced NTFS features
- managing disk quotas, Maintaining and optimizing storage
- metadata, NTFS structure, Analyzing the NTFS structure, Transactional NTFS
- object identifiers, Change journals
- Optimize Drives utility, Preventing fragmentation of disks, Preventing fragmentation of disks
- Read-Only attribute, Managing access permissions
- ReFS comparison, Transactional NTFS
- reparse points, Object identifiers
- Self-Healing NTFS, Sparse files
- shadow copies and, Managing file sharing
- sparse files, Sparse files, How quota management works
- standard file sharing, File-sharing essentials
- structural overview, NTFS structure
- timestamp updates, Creating a standard volume
- transactional NTFS, Sparse files
- Transactional Registry and, Introducing the registry
- version numbers, NTFS structure
- volume size, Managing and maintaining MPIO
- NTFS permissions, Basic permissions
- NTFS.SYS store engine, ReFS features
- NtfsDisableLastAccessUpdate registry value, Creating a standard volume
- Ntldr boot loader, Resolving hardware and firmware startup problems, Changing the operating system display order
- Nvrboot command, Resolving hardware and firmware startup problems
- NX (never execute) bit (DEP), Windows 8.1 and Windows Server 2012 R2
- NX (no execute) bit (AMD), Meeting performance, capacity, and availability requirements
- NX (No Execute) policy (Windows Boot Loader), Viewing BCD entries, Setting BCD entry values
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.