T

tab-delimited text files, Monitoring performance from the command line
Take Ownership permission, Managing access permissions, Special permissions
Task Manager, Software installation essentials, Software installation essentials, Software installation essentials, Software installation essentials, Application access tokens, Tuning virtual memory, Other important tuning, memory, and data considerations, Monitoring essentials, Monitoring essentials, Monitoring essentials, Monitoring essentials, Monitoring essentials, Monitoring essentials, Monitoring essentials, Getting processor and memory usage for troubleshooting, Getting processor and memory usage for troubleshooting, Monitoring and troubleshooting processes, Monitoring and troubleshooting processes, Monitoring and troubleshooting processes, Getting network usage information, Getting information on user and remote user sessions, Tracking per-process resource usage, Tracking per-process resource usage, Getting an overview of resource utilization, Tracking per-process memory utilization
accessing, Software installation essentials
Details tab, Software installation essentials, Application access tokens, Monitoring essentials, Monitoring and troubleshooting processes, Monitoring and troubleshooting processes, Tracking per-process resource usage
monitoring system health, Other important tuning, memory, and data considerations
Overall Utilization graph, Getting processor and memory usage for troubleshooting
Performance tab, Software installation essentials, Tuning virtual memory, Monitoring essentials, Monitoring essentials, Getting network usage information, Tracking per-process memory utilization
PowerShell and, Monitoring essentials
Processes tab, Software installation essentials, Monitoring essentials, Getting processor and memory usage for troubleshooting, Tracking per-process resource usage
Resource Monitor and, Getting an overview of resource utilization
Services tab, Monitoring essentials, Monitoring and troubleshooting processes
Users tab, Monitoring essentials, Getting information on user and remote user sessions
Task Scheduler, Windows 8.1 and Windows Server 2012 R2, Using graphical administrative tools, Computer Management system tools, MMC tool availability, Tracking the overall reliability of the server, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Preventing disk-integrity problems, Repairing volumes and marking bad sectors by using ChkDsk
Application Experience task, Preventing disk-integrity problems
Chkdsk task, Preventing disk-integrity problems
Defrag task, Preventing disk-integrity problems
described, Windows 8.1 and Windows Server 2012 R2, Using graphical administrative tools, Computer Management system tools, MMC tool availability
Device Setup task, Preventing disk-integrity problems
enabling RacTask, Tracking the overall reliability of the server
PI task, Preventing disk-integrity problems
Power Efficiency Diagnostics task, Preventing disk-integrity problems
ProactiveScan task, Preventing disk-integrity problems
Registry task, Preventing disk-integrity problems
ScheduledDefrag task, Repairing volumes and marking bad sectors by using ChkDsk
Servicing task, Preventing disk-integrity problems
Shell task, Preventing disk-integrity problems
Time Synchronization task, Preventing disk-integrity problems
Windows Error Reporting task, Preventing disk-integrity problems
Taskbar And Navigation Properties dialog box, Working with the administration tools
taskpads (console), Saving the console tool, Understanding taskpad view styles, Understanding taskpad view styles, Understanding taskpad view styles, Creating and managing taskpads, Creating and managing taskpads, Creating and managing taskpads, Creating navigation tasks
creating, Understanding taskpad view styles
creating tasks, Creating and managing taskpads
described, Saving the console tool
limiting user options on, Understanding taskpad view styles
managing, Creating and managing taskpads
managing tasks, Creating and managing taskpads
Properties dialog box, Creating navigation tasks
view styles, Understanding taskpad view styles
TCG (Trusted Computing Group), Managing TPM
TCO (total cost of ownership), Meeting performance, capacity, and availability requirements
TCP/IP (Transmission Control Protocol/Internet Protocol), Naming computers, Postinstallation tasks, Using graphical administrative tools, Essential storage technologies, Using internal and external storage devices, Using internal and external storage devices
command-line utilities and, Using graphical administrative tools
described, Naming computers
Fibre Channel and, Using internal and external storage devices
iSCSI devices, Using internal and external storage devices
NAS devices, Essential storage technologies
postinstallation tasks, Postinstallation tasks
TCPv4 performance object, Using Performance Monitor
TCPv6 performance object, Using Performance Monitor
team network adapters, Resolving network bottlenecks
test baselines, Establishing performance baselines
testing process, Planning for software needs, Planning for deploying highly available servers
testing teams, Identifying your organizational teams
thin provisioning, Storage-management features and tools
Thread performance object, Using Performance Monitor
three-way mirrors, Creating storage spaces, Creating a standard volume
Time command, Accessing a command prompt during installation
time synchronization, Windows 8.1 and Windows Server 2012 R2
time zones, Getting to know Server Manager
timeout, Changing the default timeout, Installing new devices, Restricting device installation by using Group Policy
changing default, Changing the default timeout
configuring device installation, Installing new devices
forcing reboot, Restricting device installation by using Group Policy
timestamp update records, Creating a standard volume
Title command, Accessing a command prompt during installation
total commit charge, Tuning virtual memory
total cost of ownership (TCO), Meeting performance, capacity, and availability requirements
TPM (Trusted Platform Module) Services, Working with trusted platforms, Managing TPM, Managing TPM, Understanding TPM states and tools, Understanding TPM states and tools, Managing TPM owner authorization information, Managing TPM owner authorization information, Preparing and initializing a TPM for first use, Turning an initialized TPM on or off, Turning an initialized TPM on or off, Clearing the TPM, BitLocker modes, Setting permitted encryption types, Deploying BitLocker Drive Encryption, Deploying BitLocker Drive Encryption, Configuring and enabling BitLocker Drive Encryption, Enabling BitLocker on operating-system volumes
authentication and, BitLocker modes, Enabling BitLocker on operating-system volumes
clearing, Turning an initialized TPM on or off
described, Working with trusted platforms
owner authorization information, Understanding TPM states and tools
owner password, Managing TPM owner authorization information, Preparing and initializing a TPM for first use, Clearing the TPM
preparing and initializing for first use, Managing TPM, Managing TPM owner authorization information
recovery information, Deploying BitLocker Drive Encryption
states and tools, Managing TPM, Configuring and enabling BitLocker Drive Encryption
status indicators, Understanding TPM states and tools
turning initialized TPM on or off, Turning an initialized TPM on or off
unlocking computers at startup, Deploying BitLocker Drive Encryption
validation profile settings, Setting permitted encryption types
TPM and PIN mode, BitLocker modes, Deploying BitLocker Drive Encryption
TPM and Smart Card Certificate mode, BitLocker modes
TPM and Startup Key mode, BitLocker modes, Deploying BitLocker Drive Encryption
TPM-Only mode, BitLocker modes
Trace data collector set type, Creating and managing data collector sets, Collecting performance counter data
trace logs, Analyzing trace logs at the command line
Tracerpt utility, Analyzing trace logs at the command line
Tracert command, Accessing a command prompt during installation, Utilities to know
tracks (platters), File system essentials
transactional NTFS, Sparse files
Transactional Registry, Introducing the registry
transactional technology, Introducing the registry
Transmission Control Protocol/Internet Protocol (TCP/IP), Naming computers, Postinstallation tasks, Essential storage technologies, Using internal and external storage devices, Using internal and external storage devices
described, Naming computers
Fibre Channel and, Using internal and external storage devices
iSCSI devices, Using internal and external storage devices
NAS devices, Essential storage technologies
postinstallation tasks, Postinstallation tasks
Traverse Folder permission, Basic permissions, Special permissions
Tree command, Accessing a command prompt during installation
troubleshooting, Understanding installation options, Performing an upgrade installation, Creating, deleting, and extending disk partitions during installation, Creating, deleting, and extending disk partitions during installation, Setup refuses to install or start, Setup reports insufficient system resources, Setup reports insufficient system resources, Setup reports insufficient system resources, Diagnosing hardware and firmware startup problems, Managing System Boot Configuration, Using Windows PowerShell, Adding server roles and features, Managing server binaries, Managing server binaries, Installing components at the prompt, Installing components at the prompt, Understanding device installation, Understanding and troubleshooting driver signing, Adding non–Plug and Play, older hardware, Troubleshooting hardware, Maintaining the registry, Other important tuning, memory, and data considerations, Monitoring essentials, Monitoring and troubleshooting processes, Monitoring and troubleshooting processes, Getting information on user and remote user sessions, Tracking per-process CPU utilization, Tracking per-process memory utilization, Monitoring performance remotely, Resolving memory bottlenecks, Resolving network bottlenecks, Using data collector templates, Booting from SANs and using SANs with clusters, Understanding Hyper-V, Breaking or removing a mirrored set, Enabling BitLocker on operating-system volumes, Creating a standard volume, Troubleshooting permissions, Configuring email notifications, Configuring report locations
access permissions, Troubleshooting permissions
accessing binary source files, Adding server roles and features
administrator tasks at prompt, Managing server binaries
authentication failure, Installing components at the prompt
BitLocker Drive Encryption, Enabling BitLocker on operating-system volumes
blocked downloads of binaries, Managing server binaries
data collector sets for, Using data collector templates
described, Creating, deleting, and extending disk partitions during installation
driver signing, Understanding and troubleshooting driver signing
elapsed evaluation period, Performing an upgrade installation
email notifications, Configuring email notifications
events, Getting information on user and remote user sessions
firmware, Setup refuses to install or start
hardware, Adding non–Plug and Play, older hardware
Hyper-V issues, Understanding Hyper-V
installing or uninstalling programs, Maintaining the registry
IP addressing, Monitoring performance remotely
lockups and freezes, Setup reports insufficient system resources
memory issues, Setup reports insufficient system resources, Tracking per-process memory utilization
mirrored set problems, Breaking or removing a mirrored set
network activity, Resolving network bottlenecks
paging file, Other important tuning, memory, and data considerations
passthrough problems, Using Windows PowerShell
potential points of failure, Creating, deleting, and extending disk partitions during installation
processes, Monitoring and troubleshooting processes
processor affinity, Resolving memory bottlenecks
processor and memory usage for, Monitoring essentials
processor issues, Setup reports insufficient system resources, Tracking per-process CPU utilization
resource conflicts, Troubleshooting hardware
SAN configuration problems, Booting from SANs and using SANs with clusters
selective startup options, Managing System Boot Configuration
Server Core limits, Understanding installation options
services, Monitoring and troubleshooting processes
startup problems, Diagnosing hardware and firmware startup problems
storage report generation, Configuring report locations
storage spaces problems, Creating a standard volume
stored credentials, Installing components at the prompt
Windows Update, Understanding device installation
trust relationships, Designing the Active Directory namespace
Trusted Boot feature, Hardware-encrypted drives
Trusted Computing Group (TCG), Managing TPM
Trusted Platform Module (TPM) Services, Working with trusted platforms, Managing TPM, Managing TPM, Understanding TPM states and tools, Understanding TPM states and tools, Managing TPM owner authorization information, Managing TPM owner authorization information, Preparing and initializing a TPM for first use, Turning an initialized TPM on or off, Turning an initialized TPM on or off, Clearing the TPM, BitLocker modes, Setting permitted encryption types, Deploying BitLocker Drive Encryption, Deploying BitLocker Drive Encryption, Configuring and enabling BitLocker Drive Encryption
authentication and, BitLocker modes
clearing, Turning an initialized TPM on or off
described, Working with trusted platforms
owner authorization information, Understanding TPM states and tools
owner password, Managing TPM owner authorization information, Preparing and initializing a TPM for first use, Clearing the TPM
preparing and initializing for first use, Managing TPM, Managing TPM owner authorization information
recovery information, Deploying BitLocker Drive Encryption
states and tools, Managing TPM, Configuring and enabling BitLocker Drive Encryption
status indicators, Understanding TPM states and tools
turning initialized TPM on or off, Turning an initialized TPM on or off
unlocking computers at startup, Deploying BitLocker Drive Encryption
validation profile settings, Setting permitted encryption types
Trusted Platform Module Management, MMC tool availability, Managing TPM, Understanding TPM states and tools, Understanding TPM states and tools, Managing TPM owner authorization information, Turning an initialized TPM on or off, Clearing the TPM, Clearing the TPM
clearing TPM, Clearing the TPM
described, MMC tool availability, Managing TPM
Group Policy restrictions, Understanding TPM states and tools
preparing and initializing TPM for first use, Managing TPM owner authorization information
TPM owner password, Clearing the TPM
turning TPM on or off, Understanding TPM states and tools, Turning an initialized TPM on or off
TSV file extension, Monitoring performance from the command line
tuning., Performance monitoring and tuning (see performance monitoring and tuning)
two-way mirrors, Creating storage spaces, Creating a standard volume
Type command, Accessing a command prompt during installation
Typeperf utility, Configuring performance counter alerts
typical usage baselines, Establishing performance baselines
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset