N

Name Not Found dialog box, Auditing registry access, Configuring share permissions
name resolution services (location services), Planning for server usage
named data streams, Hard links
named pipes (NPs), Enabling remote management, ADMIN$
naming schemes for computers, Planning partitions
NAND flash memory, Understanding the disk and file-system structure
NAP Client Configuration, MMC tool availability
NAS (network-attached storage), Essential storage technologies, Storage-management role services
NAT (Network Address Translation), Getting to know Windows Server 2012 R2, Using roles, role services, and features
navigation commands, Getting started with taskpads, Creating shell command tasks
Nbtstat command, Accessing a command prompt during installation, Utilities to know
nested page tables (NPTs), Understanding Hyper-V
Net Accounts command, Accessing a command prompt during installation
Net commands, Accessing a command prompt during installation, Utilities to know
Net Computer command, Accessing a command prompt during installation
Net Config Server command, Accessing a command prompt during installation
Net Config Workstation command, Accessing a command prompt during installation
Net Continue command, Accessing a command prompt during installation
Net File command, Accessing a command prompt during installation
Net Group command, Accessing a command prompt during installation
Net Localgroup command, Accessing a command prompt during installation
Net Pause command, Accessing a command prompt during installation
Net Print command, Accessing a command prompt during installation
Net Session command, Accessing a command prompt during installation
Net Share command, Accessing a command prompt during installation, Using and finding shares, Creating and publishing shared folders, Managing file shares after configuration
Net Start command, Accessing a command prompt during installation, Utilities to know
Net Statistics command, Accessing a command prompt during installation
Net Stop command, Accessing a command prompt during installation, Utilities to know
Net Time command, Accessing a command prompt during installation, Utilities to know
Net Use command, Accessing a command prompt during installation, Utilities to know
Net User command, Accessing a command prompt during installation
Net View command, Accessing a command prompt during installation, Utilities to know
NetBIOS (Network Basic Input/Output System), Assessing systems, Naming computers
NETLOGON share, ADMIN$
Netsh command, Accessing a command prompt during installation, Utilities to know
Netstat command, Accessing a command prompt during installation, Utilities to know
Network Access warning box, Enabling access-denied assistance
Network Address Translation (NAT), Getting to know Windows Server 2012 R2, Using roles, role services, and features
network administration, Identifying security infrastructure
Network And Sharing Center, Getting to know Server Manager
network applications, Identify network services and applications
Network Basic Input/Output System (NetBIOS), Assessing systems, Naming computers
Network Connections console, Getting to know Server Manager
network environment, Your plan: The big picture, Your plan: The big picture, Examining the interaction between IT and business units, Predicting network change, Predicting network change, Evaluating the network infrastructure, Defining the new network environment, Defining the new network environment, Defining the new network environment, Identify security requirements, Changing the administrative approach, Select and implement standards
analyzing existing, Your plan: The big picture, Predicting network change
assessing impact on operations, Defining the new network environment
change management, Select and implement standards
changing administrative approach, Identify security requirements
defining new, Your plan: The big picture, Defining the new network environment
evaluating infrastructure, Predicting network change
identifying security requirements, Defining the new network environment
inventorying systems, Evaluating the network infrastructure
predicting change in, Examining the interaction between IT and business units
selecting and implementing standards, Changing the administrative approach
Network Explorer, Using and finding shares, Using and finding shares, Creating shares by using Computer Management
Network File System (NFS), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features, Essential storage technologies, Using internal and external storage devices, Storage-management role services, Creating shared folders in Server Manager
described, Using graphical administrative tools, MMC tool availability, Using internal and external storage devices
enabling, Storage-management role services
File And Storage Services, Using roles, role services, and features
server-storage communications, Essential storage technologies
shared folders, Creating shared folders in Server Manager
network interface card (NIC), Tracking per-process network utilization
Network Interface performance object, Using Performance Monitor
Network InterfaceBytes Received/Sec counter, Resolving network bottlenecks
Network InterfaceBytes Sent/Sec counter, Resolving network bottlenecks
Network InterfaceBytes Total/Sec counter, Resolving network bottlenecks
Network InterfaceCurrent Bandwidth counter, Resolving network bottlenecks
Network Level Authentication, Getting information on user and remote user sessions
Network Load Balancing (NLB), Using roles, role services, and features
Network Load Balancing Manager, Using graphical administrative tools
network management, Examining the interaction between IT and business units, Predicting network change, Evaluating the network infrastructure, Assessing systems, Identify network services and applications, Identifying security infrastructure, Identifying security infrastructure, Reviewing network administration, Reviewing network administration, Getting network usage information, Getting an overview of resource utilization, Tracking per-process network utilization, Using Performance Monitor, Resolving disk I/O bottlenecks, Resolving network bottlenecks, Using and finding shares
assessing systems, Evaluating the network infrastructure
disaster recovery, Reviewing network administration
evaluating network infrastructure, Predicting network change
identifying network services and applications, Assessing systems
identifying security infrastructure, Identify network services and applications
mapping network drives, Using and finding shares
monitoring performance, Using Performance Monitor
network administration, Identifying security infrastructure
network usage information, Getting network usage information
predicting network change, Examining the interaction between IT and business units
resolving network bottlenecks, Resolving disk I/O bottlenecks
reviewing network administration, Identifying security infrastructure
tools for, Reviewing network administration
tracking resource usage, Getting an overview of resource utilization, Tracking per-process network utilization
troubleshooting network activity, Resolving network bottlenecks
network maps, Evaluating the network infrastructure
Network Policy And Access Services (NPAS), Planning for server usage, Using roles, role services, and features
Network Policy Server, Using graphical administrative tools, MMC tool availability
Network Service special identity, Accessing the event logs and viewing events
Network Unlock (BitLocker), Using roles, role services, and features, Installing components at the prompt, BitLocker modes, Preparing BitLocker for startup authentication and secure boot, Provisioning BitLocker prior to deployment, Deploying BitLocker Drive Encryption, Setting up and managing BitLocker Drive Encryption, Enabling BitLocker on operating-system volumes
configuring, Provisioning BitLocker prior to deployment
described, Using roles, role services, and features, BitLocker modes, Preparing BitLocker for startup authentication and secure boot
installing, Installing components at the prompt
installing by default, Setting up and managing BitLocker Drive Encryption
system volumes, Enabling BitLocker on operating-system volumes
unlocking computer at startup, Deploying BitLocker Drive Encryption
network-attached storage (NAS), Essential storage technologies, Storage-management role services
networking components, Protocols
networking protocols, Naming computers
Never eXecute (NX) bit (DEP), Windows 8.1 and Windows Server 2012 R2
New RAID-5 Volume Wizard, Configuring RAID 5: Disk striping with parity
New Share Wizard, Creating shared folders in Server Manager
New Simple Volume Wizard, Creating partitions and simple volumes
New Spanned Volume dialog box, Managing volumes on dynamic disks
New Storage Pool Wizard, Creating storage spaces
New Striped Volume Wizard, Configuring RAID 0: Striping
New Sync Share Wizard, Creating sync shares and enabling SMB access
New Task Wizard, Creating and managing taskpads
New Taskpad View Wizard, Creating and managing taskpads
New Virtual Disk Wizard, Creating a virtual disk in a storage space
New Virtual Machine Wizard, Creating virtual machines
New Volume Wizard, Creating a standard volume, Deduplicating volumes
New- cmdlets, Using Windows PowerShell
New-Item cmdlet, Using Windows PowerShell
New-MSDSMSupportedHw cmdlet, Adding and removing multipath hardware devices
New-SmbShare cmdlet, Working with SMB 3.0, Creating and publishing shared folders
NFS (Network File System), Using graphical administrative tools, MMC tool availability, Using roles, role services, and features, Essential storage technologies, Using internal and external storage devices, Storage-management role services, Creating shared folders in Server Manager
described, Using graphical administrative tools, MMC tool availability, Using internal and external storage devices
enabling, Storage-management role services
File And Storage Services, Using roles, role services, and features
server-storage communications, Essential storage technologies
shared folders, Creating shared folders in Server Manager
NIC (network interface card), Tracking per-process network utilization
NIC teaming, Getting to know Server Manager, Tracking per-process network utilization, Resolving network bottlenecks, Working with SMB 3.0
NLB (Network Load Balancing), Using roles, role services, and features
No eXecute (NX) bit (AMD), Windows 8.1 and Windows Server 2012 R2
No Execute (NX) policy (Windows Boot Loader), Viewing BCD entries, Setting BCD entry values
noncompliant applications, Software installation essentials, Configuring UAC and Admin Approval Mode, Application access tokens
None authorization level, Understanding TPM states and tools
nonpaged pool, Resolving performance bottlenecks
nonresident attributes, NTFS structure
Notify permission, Applying permissions to registry keys
NPAS (Network Policy And Access Services), Planning for server usage, Using roles, role services, and features
NPs (named pipes), Enabling remote management, ADMIN$
NPTs (nested page tables), Understanding Hyper-V
Nslookup command, Utilities to know
NTFS file system, Performing a clean installation, Introducing the registry, Managing and maintaining MPIO, Understanding legacy and protective MBRs, Converting FAT or FAT32 to NTFS, Converting FAT or FAT32 to NTFS, Creating partitions and simple volumes, Creating partitions and simple volumes, Configuring mount points, Extending partitions, BitLocker modes, Enabling BitLocker on fixed data drives, Enabling BitLocker on fixed data drives, Understanding the disk and file-system structure, Understanding the disk and file-system structure, FAT features, NTFS structure, NTFS structure, NTFS structure, NTFS structure, NTFS structure, NTFS structure, NTFS features, Analyzing the NTFS structure, Analyzing the NTFS structure, Advanced NTFS features, Hard links, Change journals, Change journals, Object identifiers, Sparse files, Sparse files, Sparse files, Transactional NTFS, Transactional NTFS, ReFS integrity streams, data scrubbing, and salvage, Maintaining and optimizing storage, How quota management works, How quota management works, Preventing disk-integrity problems, Analyzing FAT volumes by using ChkDsk, Preventing fragmentation of disks, Preventing fragmentation of disks, Creating a standard volume, Managing file sharing, File-sharing essentials, File security, access controls, and auditing, Managing access permissions, Enabling advanced auditing, Understanding file screening and storage reporting
access permissions, File security, access controls, and auditing
advantages, FAT features
analyzing structure, NTFS features
auditing support, Enabling advanced auditing
BitLocker Driver Encryption and, BitLocker modes
boot sector, NTFS structure
change journals, NTFS structure, Change journals
Check Disk tool, Preventing disk-integrity problems
Chkdsk command, Analyzing FAT volumes by using ChkDsk
choosing partition format, Creating partitions and simple volumes
compression, ReFS integrity streams, data scrubbing, and salvage, How quota management works
configuring mount points, Configuring mount points
converting MBR and GPT disks, Understanding legacy and protective MBRs
converting to, Performing a clean installation, Converting FAT or FAT32 to NTFS, Creating partitions and simple volumes
data streams, Hard links
default cluster sizes, Understanding the disk and file-system structure
enabling BitLocker, Enabling BitLocker on fixed data drives, Enabling BitLocker on fixed data drives
extending partitions, Extending partitions
features, NTFS structure, Analyzing the NTFS structure
file screening., Understanding file screening and storage reporting (see file screening)
fixed sector size, Understanding the disk and file-system structure
formatting removable disks, Converting FAT or FAT32 to NTFS
hard links, Advanced NTFS features
managing disk quotas, Maintaining and optimizing storage
metadata, NTFS structure, Analyzing the NTFS structure, Transactional NTFS
object identifiers, Change journals
Optimize Drives utility, Preventing fragmentation of disks, Preventing fragmentation of disks
Read-Only attribute, Managing access permissions
ReFS comparison, Transactional NTFS
reparse points, Object identifiers
Self-Healing NTFS, Sparse files
shadow copies and, Managing file sharing
sparse files, Sparse files, How quota management works
standard file sharing, File-sharing essentials
structural overview, NTFS structure
timestamp updates, Creating a standard volume
transactional NTFS, Sparse files
Transactional Registry and, Introducing the registry
version numbers, NTFS structure
volume size, Managing and maintaining MPIO
NTFS permissions, Basic permissions
NTFS.SYS store engine, ReFS features
NtfsDisableLastAccessUpdate registry value, Creating a standard volume
Ntldr boot loader, Resolving hardware and firmware startup problems, Changing the operating system display order
Nvrboot command, Resolving hardware and firmware startup problems
NX (never execute) bit (DEP), Windows 8.1 and Windows Server 2012 R2
NX (no execute) bit (AMD), Meeting performance, capacity, and availability requirements
NX (No Execute) policy (Windows Boot Loader), Viewing BCD entries, Setting BCD entry values
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset