Tải bản đầy đủ (.pdf) (3 trang)

The Best Damn Windows Server 2003 Book Period- P103 pot

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (376.94 KB, 3 trang )

996 Index
W
warnings and log files, 261
WBEM (Web-Based Enterprise
Management), 35
Web, accessing your server over, 33
Web-Based Enterprise Management
(WBEM), 35
Web Distributed Authoring and
Versioning (WebDAV), 3, 78
Web Edition, Windows Server 2003,
12–13
Web servers
configuring, 59–60
securing, 78
and server roles, 58–59
Web Service Extensions, enabling (IIS),
914–915
Web Site Creation Wizard, 907
Web sites
hosting multiple (IIS), 917
restricting access by permission, 909
setting up in IIS Manager, 905–920
TechNet, 106
Windows Update, 71–72
WebDAV (Web Distributed Authoring
and Versioning), 3, 5
whoami tool, 362–363, 404
Windows 2000
DNS and BIND compatibility
comparison (table), 691–692


domain functional levels, 458
domain rename limitations in forest,
486–487
domains, upgrading, 17
forest functional levels, 462–463
and universal groups, 405–406
Windows 2000 Server, minimum system
requirements for (table), 67
Windows 98, software updates for, 103
Windows Backup
described, using, 268–275
and new system state backup method,
472–476
Windows Client Access License (CAL),
14–15
Windows Components Wizard, 61–63,
169, 293
Windows Explorer, encrypted files in, 8
Windows Installer packages
creating, 609–610
described, 602, 606
logging, enabling, 624
Windows Load Balancing Service
(WLBS), 225
Windows Management Instrumentation
(WMI), 35, 569, 575
Windows NT 4.0
DNS and BIND compatibility
comparison (table), 691–692
upgrading to Windows Server 2003,

17
Windows NT directory services
(NTDS), 322
Windows NT Server 4, minimum
system requirements for (table),
67
Windows operating system,
housekeeping tasks, 244
Windows Resource Kit, 32
Windows script, 31
Windows Server 2003
Active Directory. See Active Directory
administrative tools, 490
Administrative Tools Pack, 34
Certificate Services overview, 829–830
default protocol, 246
developing test network environment,
21–25
disk management generally, 107–115
DNS and BIND compatibility
comparison (table), 691–692
domain and forest functional levels
(table), 456–457
editions of, 12–14
Emergency Management Services,
37–38
enhanced clustering technology, 6–7
features overview, 1–12
forest functional levels, 460–462
licensing issues, 14–15

log files, 260–261
logging on with smart cards, 844–845
minimum system requirements for,
66–68
new domainwide features, 454–456
new networking and communication
features, 7–8
planning tools, documentation, 17–21
power-saving features, 209
product activation, 15
replication service, 345–347
resources, standard types, 191–192
revised IIS architecture, 6
system state data, 273
using as router, 777–781
WINS improvements, 712
Windows Support Tools Setup Wizard,
428
Windows Terminal Services. See
Terminal Services
Windows Update, 95
Windows XP
printing from, 57
Service Pack 1, 101
and Windows Server 2003, 1–2
WinINSTALL LE 2003, 609
Winlogon service, 812
WINS
clients’ configuration, 724–726
database compaction, 728

interoperability with, 696–699
new to Windows Server 2003, 712
planning for database backup,
restoration, 731–732
proxy agent, 725
referral zones, 698
replication, 714
reverse lookup records, 697
WINS servers
backups, 273–274
enabling consistency checking,
729–730
multihomed, 723, 738
performance issues, 726–730
planning deployment of, 713
replication intervals, and performance,
758
replication partnership configuration,
715–719
scavenging records, 727
securing, 77
security issues, 730–731
and server roles, 57–58
split registration prevention, 726
troubleshooting problems, 737
wireless 802.11 standards, 851, 862
wireless remote access, 851
wireless access points (WAPs), 862–864
wireless local area networks WLANs), 9
wireless networking, configuring,

870–872
301_BD_W2k3_Ind.qxd 5/14/04 12:09 PM Page 996
Index 997
wireless security protocols, configuring,
867–873
wizards
activation, 15
Active Directory Installation, 55, 466,
470–471
ASR (Automated System Recovery),
285
Backup or Restore, 275
Certificate Request, 841
Configure Your Server, 53–54, 59
configuring and managing servers
with, 50
Delegation of Control, 504
generally, accessing, 31–32
Group Policy, 577
IP Security Policy, 808
New Delegation, 665
New Partition, 121
New RADIUS Client, 871
New Server Cluster, 218
New SMTP Virtual Server, 912–913
New Trust, 486, 496
New Volume, 136–139, 142, 146
Remote Storage Setup, 171
Restore, 473
Resultant Set of Policy, 568

System Compatibility, 16
Virtual Directory Creation, 916
Web Site Creation, 907
Windows Components, 61–63, 169
Windows Support Tools Setup, 428
WLANs and IEEE 802.1X protocols, 9
WMI (Windows Management
Instrumentation), 35
WMI Query Language (WQL), 581
Worker Process
configuring identity, 901
Model described, 902–903, 924
Worldwide Microsoft Licensing Web
site, 14
WUAU22.msi, 101
WUAU.adm, 102
X
X.500 naming structure, 329–330
X.509 certificate authentication,
368–369
XML metabase (IIS), 905
XML Web Services, 11–12
Z
.zap setup files, publishing applications
using, 610–611
zone replication, 678–683
zone transfers
with BIND, 693
troubleshooting DNS, 735–736
301_BD_W2k3_Ind.qxd 5/14/04 12:09 PM Page 997


Stealing the Network: How to Own a Continent
Ryan Russell, FX, Dan "Effugas" Kaminsky, Joe Grand, Tim Mullen, Jay Beale,
Russ Rogers, Ken Pfeil, Paul Craig
The first book in the "Stealing the Network" series was called a "blockbuster" by Wired magazine, a
"refreshing change from more traditional computer books" by Slashdot.org, and "an entertaining and
informative look at the weapons and tactics employed by those who attack and defend digital systems"
by Amazon.com. This follow-on book once again combines a set of fictional stories with real tech-
nology to show readers the danger that lurks in the shadows of the information security industry
Could hackers take over a continent?
ISBN: 1-931836-05-1
Price: $49.95 US $69.95 CAN
AVAILABLE NOW!
ORDER at
www.syngress.com
Stealing the Network:
How to
"
Own the Box"
Ryan Russell, FX, Joe Grand, and Ken Pfiel
Stealing the Network: How to Own the Box is NOT intended to be an “install, configure, update,
troubleshoot, and defend book.” It is also NOT another one of the countless Hacker books out
there now by our competition. So, what IS it? Stealing the Network: How to Own the Box is an
edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style.
World-renowned network security personalities present a series of chapters written from the point
of an attacker gaining access to a system. This book portrays the street fighting tactics used to
attack networks.
ISBN: 1-931836-87-6
Price: $49.95 USA $69.95 CAN
Special Ops: Host and Network

Security for Microsoft, UNIX, and Oracle
Erik Pace Birkholz
“Strap on the night vision goggles, apply the camo pain, then lock and load. Special Ops is
an adrenaline-pumping tour of the most critical security weaknesses present on most any
corporate network today, with some of the world’s best drill sergeants leading the way.”
—Joel Scambray, Senior Director, Microsoft’s MSN
ISBN: 1-928994-74-1
Price: $69.95 USA $108.95 CAN
AVAILABLE
APRIL, 2004
www.syngress.com
Syn•gress (sin-gres): noun, sing. Freedom
from risk or danger; safety. See security.
Syngress: The Definition of a
Serious Security Library
AVAILABLE NOW!
ORDER at
www.syngress.com
301_BD_W2k3_Ind.qxd 5/14/04 12:09 PM Page 998

×