Tuesday, 11 February 2014

Windows Server 2003 Long List of Technical Links

Windows Server 2003
Windows Server 2003 R2 Technical Library
Windows Server 2003 Service Pack 1 Technical Library
Windows Server 2003 Service Pack 2 Technical Library
Comparison of Windows Server 2003 Editions
Product Evaluation
Getting Started
Planning and Architecture
Deployment
Windows Server 2003 Deployment Guide
Automating and Customizing Installations
Designing a Managed Environment
Deploying Network Services
Designing and Deploying Directory and Security Services
Planning, Testing, and Piloting Deployment Projects
Planning Server Deployments
Windows Server 2003 Performance Counters Reference
Windows Server 2003 Resource Kit Registry Reference
Glossary of Registry Terms
About the Registry Reference
How to Use the Registry Reference
Registry Reference Document Conventions
About the Windows Registry
Overview of the Windows Registry
Editing the Registry
Data Types in the Registry
Backing Up and Restoring the Registry
HKEY_CURRENT_CONFIG
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
Console
ColorTable#
CursorSize
FaceName
FontFamily
FontSize
FontWeight
FullScreen
HistoryBufferSize
InsertMode
LoadConIme
NumberOfHistoryBuffers
PopupColors
QuickEdit
ScreenBufferSize
ScreenColors
WindowPosition
WindowSize
console-window-name
element-name Entry
Control Panel Key
Accessibility Subkey
Accessibility-option
Appearance
Current Entry
CustomColors
Schemes
Colors Subkey
Colors\element-name
Control Panel\Current
Color Schemes
Custom Colors
Color Entry
Control Panel\Desktop Subkey
ActiveWndTrkTimeout
AutoEndTasks
CoolSwitch
CoolSwitchColumns
CoolSwitchRows
CursorBlinkRate
DragFullWindows
DragHeight
DragWidth
FontSmoothing
ForegroundFlashCount
ForegroundLockTimeout
GridGranularity
HungAppTimeout
MenuShowDelay
PaintDesktopVersion
Pattern Entry
ScreenSaveActive Entry
ScreenSaveTimeOut Entry
SCRNSAVE.EXE
TileWallpaper
WaitToKillAppTimeout
WindowMetrics
International Subkey
AddHijriDate
iCalendarType
iCountry
iCurrDigits
iCurrency
iDate
iDigits
iFirstDayOfWeek
iFirstWeekOfYear
iLZero
iMeasure
iNegCurr
iNegNumber
iTime
iTimePrefix
iTLZero
International\Locale
NumShape
s1159
s2359
sCountry
sCurrency
sDate
sDecimal
sGrouping
sList
sLongDate
sMonDecimalSep
sMonGrouping
sMonThousandSep
sNativeDigits
sNegativeSign
sPositiveSign
sShortDate
sThousand
sTime
sTimeFormat
Patterns
Patterns\Pattern
Screen Saver.Screensaver-name
Screen Saver.Screensaver-name\element-name
Environment Key
TEMP Entry
TMP Entry
Network Key
Drive letter
ConnectionType
ProviderName
ProviderType
SOFTWARE Subtree
Microsoft Subkey
Command Processor Subkey
AutoRun Entry
CompletionChar Entry
DefaultColor Entry
DelayedExpansion Entry
EnableExtensions Entry
PathCompletionChar Entry
Driver Signing Subkey
Policy Entry
Microsoft\Fax Subkey
fxsclnt
FaxConsoleView
Archive
SortAscending
SortColumn
Columns
Order Entry
MessagesPerCall
Confirm
ItemDeletion
MainFrame
Maximized
NormalPosBottom
NormalPosLeft
NormalPosRight
NormalPosTop
SplitterPos
Fax\Setup
CfgWzdrUserInfo
WereCpesConverted
UserInfo
FaxNumber
File Manager
FxsCover
Ntbackup Subkey
Backup Engine
Use fast file restore
User Interface
RAS Phonebook
Microsoft\Windows
CurrentVersion Subkey
CurrentVersion\Explorer Subkey
Shutdown Setting
Advanced Subkey
Intellimenus Entry
Shell Folders Subkey
User Shell Folders Subkey
User Shell Folders\Desktop
Favorites
NetHood
User Shell Folders\Personal Entry
PrintHood
User Shell Folders\Programs
SendTo
Start Menu
Startup
Recent
CurrentVersion\Policies Subkey
Policies\ActiveDesktop
AdminComponent Subkey
Policies\Explorer
Explorer\NoFileAssociate
Windows Help
Microsoft\Windows NT
Windows NT\CurrentVersion
Devices Subkey
Extensions
Network Subkey
Server Manager
User Manager
User Manager for Domains
Program Manager
Program Manager\Restrictions
NoClose Entry
NoFileMenu Entry
NoRun Entry
NoSaveSettings Entry
Program Manager\Restrictions Subkey
ShowCommonGroups
EditLevel
Program Manager\Settings
AutoArrange
display.drv
MinOnRun
SaveSettings
UNICODE Groups
TaskManager
TrueType
TTEnable
TTonly
CurrentVersion\Windows
Device Entry
Documents
fPrintError
fPrintFileLine
fPrintVerbose
fPrintWarning
fPromptOnError
fPromptOnVerbose
fPromptOnWarning
load
NetMessage
NullPort
Windows\Programs
run Entry
Winlogon Subkey
ReportDC
Winlogon\RunLogonScriptSync
Microsoft\Windows Script
Windows Script\Settings
Settings\Enabled
Software\Policies
Policies\Microsoft
Microsoft\Control Panel
Control Panel\International
Calendars
Microsoft\MMC Subkey
Class-ID
Policies\Microsoft\Windows Subkey
Installer Subkey
UNICODE Program Groups
HKEY_LOCAL_MACHINE
Hardware Key
HARDWARE\DESCRIPTION
System Subkey
DEVICEMAP
SAM Key
Security Key
HKLM\SOFTWARE
SOFTWARE\Microsoft
Microsoft\Command Processor
Command Processor\AutoRun
Command Processor\CompletionChar
Command Processor\DefaultColor
Command Processor\DelayedExpansion
Command ProcessorEnableExtensions
Command Processor\PathCompletionChar
Microsoft\Driver Signing
Driver Signing\Policy
DrWatson
AppendToLogFile
CrashDumpFile
CreateCrashDump
DumpAllThreads
DumpSymbols
Instructions
LogFilePath Entry
MaximumCrashes
NumberOfCrashes
SoundNotification
VisualNotification
WaveFile
Fax Subkey
LastUniqueLineId
CfgWzdrDevice
DisableRoutingExtensionConfiguration
Inbound Profile
ManualAnswerDevice
MaxLineCloseTime
NextJobNumber
RecipientsLimit
QueueDirectory
QueueState
Branding
ActivityLogging
Device Providers
Fax\Devices
Devices Cache
Inbox
Logging Subkey
Outbound Routing
Receipts
Routing Extensions
Fax\Security
SentItems
Fax\Setup Subkey
TAPIDevices
Internet Explorer Subkey
Media
Autoplay
MSMQ
Parameters
MSSQLServer
Client Subkey
ConnectTo
BlockExeAttachments
Outlook Express_DepKit
Microsoft\PCHealth
ErrorReporting Subkey
ErrorReporting\DW Subkey
PswdSync
Domains Subkey
UNIX-system-name
LoginAccount
SystemMonitor
DisplaySingleLogSampleValue
DisplayThousandsSeparator
Microsoft\Windows Subkey
Windows\CurrentVersion
CurrentVersion\Explorer
Explorer\Shell Folders
Explorer\User Shell Folders
Common Desktop
Common Documents
Common Favorites
Common Programs
Common Start Menu
User Shell Folders\Personal
Common Startup
CurrentVersion\Policies
CurrentVersion\Run
RunOnce
Telephony Subkey
Microsoft\Windows NT Subkey
CurrentVersion Entry
AeDebug
DNS Server_DepKit
Font Drivers
FontDPI
Fonts Subkey
FontSubstitutes
GRE_Initialize
CurrentVersion\Network Subkey
PDH
Perflib
Print Subkey
Type 1 Installer
CurrentVersion\Windows Subkey
CurrentVersion\Winlogon
WOW
Microsoft\Windows Script Subkey
Policies Subkey
Program Groups Subkey
SYSTEM
Deployment Kit Compact Disc
Deployment Guide Document Conventions
Support Policy
Deployment Guide for the Security Configuration Wizard
Planning the SCW Deployment
Deploying SCW to multiple servers
Creating SCW security policy files
Deploying SCW security policy files
Converting of SCW security policy files into Group Policy objects (GPOs)
Using Group Policy and Active Directory with SCW
Deploying SCW security policy as Group Policy objects
Rollback considerations
Windows Server 2003: Deployment Whitepapers
Network Load Balancing: Security Best Practices for Windows 2000 and Windows Server 2003
Deployment and Operational Management
Summary of Security Attributes
Windows Cluster Technologies: Remote Setup, Unattended Installations and Image-based Installations of Network Load Balancing
Unattended Installation of NLB Clusters
Image-based Installations of NLB Clusters
Generating and Distributing a Virtual Hard Disk
Appendix A - Windows Cluster Technologies: Remote Setup, Unattended Installations and Image-based Installations of Network Load Balancing
Print Server Upgrade, Migration, and Interoperability
Windows 2000 and Windows Server 2003 Printing Architecture
Changes to Printer Drivers in Windows 2000
Upgrading to Windows 2000 Server or the Windows Server 2003 Family
Migrating to Windows 2000
Point and Print for Windows 2000
Customer Actions Moving Forward
Summary (Print Server Upgrade, Migration, and Interoperability)
Related Links (Print Server Upgrade, Migration, and Interoperability)
Windows Print Server Scalability and Sizing Technical Overview
Introduction (Windows Print Server Scalability and Sizing Technical Overview)
Factors Influencing Print Server Performance
Performance Monitoring and Baseline Measurement
Reference Systems
Resources (Windows Print Server Scalability and Sizing Technical Overview)
Best Practices for Deploying Printer Location with Active Directory
Introduction (Best Practices for Deploying Printer Location with Active Directory)
Creating the Location Schema
Configuring Printer Location and Setting Location Policies
Setting Standards When Printer Location Tracking is Disabled
Summary (Best Practices for Deploying Printer Location with Active Directory)
Related Links (Best Practices for Deploying Printer Location with Active Directory)
Certificate Autoenrollment in Windows Server 2003
Introduction (Certificate Autoenrollment in Windows Server 2003)
How Autoenrollment Works
Configuring an Enterprise CA
Configuring Group Policy
User Autoenrollment
Certificate Renewal
Autoenrollment Functions
Updating Group Policy
Advanced Features
Supported Hardware (Certificate Autoenrollment in Windows Server 2003)
Troubleshooting (Certificate Autoenrollment in Windows Server 2003)
Summary (Certificate Autoenrollment in Windows Server 2003)
Related Links (Certificate Autoenrollment in Windows Server 2003)
Account Passwords and Policies in Windows Server 2003
Account Lockout and Password Concepts
Configuring Account Lockout Settings
Configuring Account Lockout
Details of Account Lockout Settings and Processes
Maintaining and Monitoring Account Lockout
Troubleshooting Account Lockout
Account Lockout Tools
Appendix One: Additional References for Account Lockout
Appendix Two: Gathering Information to Troubleshoot Account Lockout Issues
Guide to Creating and Configuring a Server Cluster under Windows Server 2003 White Paper
Introduction (Guide to Creating and Configuring a Server Cluster under Windows Server 2003 White Paper)
Checklists for Server Cluster Configuration
Cluster Installation
Configuring the Cluster Service
Post-Installation Configuration
Test Installation
Appendix (Guide to Creating and Configuring a Server Cluster under Windows Server 2003 White Paper)
Related Links (Guide to Creating and Configuring a Server Cluster under Windows Server 2003 White Paper)
Deploying SQL Server Logging with Windows Server 2003 Internet Authentication Service (IAS)
Introduction (Deploying SQL Server Logging with Windows Server 2003 Internet Authentication Service (IAS))
Key concepts for IAS SQL Server logging
Local IAS SQL Server logging
IAS SQL Server logging with a central database
IAS SQL Server logging using MSDE 2000
Related Links (Deploying SQL Server Logging with Windows Server 2003 Internet Authentication Service (IAS))
Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)
Introduction (Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs))
Configuring Active Directory
Configuring IAS
Summary (Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs))
Related Links (Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs))
Kerberos authentication for load balanced web sites
Introduction (Kerberos authentication for load balanced web sites)
Setting up Kerberos Authentication against the cluster name Service Principal Name
Server Clusters: Remote Setup, Unattended Installations and Image-based Installations
Overview (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Command Line Setup
Unattended Installation of Server Clusters
Image-based Installations of Server Clusters
Configuring Your Server Clusters
Image-based Installation of the Operating System and the Cluster Service Using Automated Deployment Services (ADS)
Appendix A (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Appendix B (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Appendix C (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Appendix D (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Appendix E (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Appendix F (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Appendix G (Server Clusters: Remote Setup, Unattended Installations and Image-based Installations)
Server Clusters: Rolling Upgrades. Upgrading to Windows Server 2003
Introduction (Server Clusters: Rolling Upgrades. Upgrading to Windows Server 2003)
Benefits
Requirements (Server Clusters: Rolling Upgrades. Upgrading to Windows Server 2003)
Limitations
How Rolling Upgrades Work (Server Clusters: Rolling Upgrades. Upgrading to Windows Server 2003)
Rolling Upgrade Walkthrough
Known Issues
Troubleshooting (Server Clusters: Rolling Upgrades. Upgrading to Windows Server 2003)
Conclusion (Server Clusters: Rolling Upgrades. Upgrading to Windows Server 2003)
Server Clusters: Majority Node Set Quorum
Motivation (Server Clusters: Majority Node Set Quorum)
What Is a Majority Node Set? (Server Clusters: Majority Node Set Quorum)
How to Set Up a Majority Node Set (Server Clusters: Majority Node Set Quorum)
Using the Cluster Command to Setup a Majority Node Set (Server Clusters: Majority Node Set Quorum)
Sizing a Majority Node Set Cluster (Server Clusters: Majority Node Set Quorum)
What to Do If You Lose Quorum (Server Clusters: Majority Node Set Quorum)
Other Considerations (Server Clusters: Majority Node Set Quorum)
Using Windows Server 2003 in a Managed Environment: Controlling Communication with the Internet
Introduction to Controlling Communication with the Internet (Windows Server 2003)
Activation, Registration, and Internet Communication (Windows Server 2003)
Application Help and Internet Communication (Windows Server 2003)
Certificate Support and Internet Communication (Windows Server 2003)
Device Manager and Internet Communication (Windows Server 2003)
Driver Protection and Internet Communication (Windows Server 2003)
Dynamic Update and Internet Communication (Windows Server 2003)
Event Viewer and Internet Communication (Windows Server 2003)
File Association Web Service and Internet Communication (Windows Server 2003)
Help and Support Center: Internet Communication (Windows Server 2003)
HyperTerminal and Internet Communication (Windows Server 2003)
Internet Explorer 6.0 and Internet Communication (Windows Server 2003)
Internet Information Services and Internet Communication (Windows Server 2003)
Internet Protocol Version 6 (IPv6) and Internet Communication (Windows Server 2003)
NetMeeting and Internet Communication (Windows Server 2003)
Online Device Help and Internet Communication (Windows Server 2003)
Outlook Express 6.0 and Internet Communication (Windows Server 2003)
Plug and Play and Internet Communication (Windows Server 2003)
Program Compatibility Wizard and Internet Communication (Windows Server 2003)
Remote Assistance and Internet Communication (Windows Server 2003)
Search Companion and Internet Communication (Windows Server 2003)
Terminal Server Licensing and Internet Communication (Windows Server 2003)
Windows Error Reporting and Internet Communication (Windows Server 2003)
Windows Media Player and Internet Communication (Windows Server 2003)
Windows Media Services and Internet Communication (Windows Server 2003)
Windows Time Service and Internet Communication (Windows Server 2003)
Windows Update, Automatic Updates, and Internet Communication (Windows Server 2003)
Appendix A: Resources for Learning About Automated Installation and Deployment (Windows Server 2003)
Appendix B: Resources for Learning About Group Policy (Windows Server 2003)
Appendix C: Message Queuing and Internet Communication (Windows Server 2003)
Appendix D: Connection Manager and Internet Communication (Windows Server 2003)
Appendix E: Passport Manager Administration (Windows Server 2003)
Appendix F: Internet Connection Sharing and Related Networking Features (Windows Server 2003)
Appendix G: Add Network Place Wizard (Windows Server 2003)
Appendix H: New Connection Wizard (Windows Server 2003)
Related Links for Controlling Communication with the Internet (Windows Server 2003)
Network Load Balancing: Configuration Best Practices for Windows 2000 and Windows Server 2003
General Considerations
Security and Manageability
High Availability
Troubleshooting Network Load Balancing
Deploying Wireless Provisioning Services (WPS) Technology
Introduction (Deploying Wireless Provisioning Services (WPS) Technology)
Configuring IAS for WPS Technology
WPS Technology for a WISP with VLANs
WPS Technology for the Enterprise
WISP Roaming Agreement Deployments
Server Certificate Requirements
Active Directory Replication
XML Schemas
How to Use IAS with a Third-Party User Accounts Database
PEAP-MS-CHAP v2
How to Create an IAS Extension DLL and a URL PEAP-TLV
Beta Documentation Note
WPS Technology for a WISP with IP Filters
WPS Technology for an HSP with IP Filters
Summary (Deploying Wireless Provisioning Services (WPS) Technology)
Related Links (Deploying Wireless Provisioning Services (WPS) Technology)
Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure
About This Document (Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure)
Overview of the PKI Design Process (Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure)
Integration Into Existing Environments (Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure)
Windows Server 2003 PKI and Dependencies (Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure)
Deployment Planning (Best Practices for Implementing a Microsoft Windows Server 2003 Public Key Infrastructure)
Creating Certificate Policies and Certificate Practice Statements
Example Scenario for Contoso
Stand-alone Offline Intermediate CA (IntermediateCA1)
Stand-alone Offline Intermediate CA (CorporateSub2CA)
Online Enterprise Issuing CAs (CorporateEnt1CA)
Certification Authority Maintenance
Appendix A: Directory Objects
Contents of \\Localhost\CertConfig and \\Localhost\CertEnroll
Relationship of the Configuration Container and Certificate Store
Default CA Certificate and CRL Storage
Mapping Custom Object Identifiers to Friendly Names
CAPolicy.inf Syntax
CRL Distribution Point Replacement Token
CRL Publishing Properties
AIA Publishing Properties
Sample Script to Configure CorporateRootCA
Sample Script to Configure IntermediateCA
Sample Script to Configure the EnterpriseSubCA
Appendix B: Parameters for a Three-Tier CA Topology
Appendix C: Additional Information
Server Clusters: Network Configuration Best Practices for Windows 2000 and Windows Server 2003
Cluster Networking Requirements
Cluster Networking Best Practices
Procedures for Implementing Cluster Networking Best Practices
IPSec in Cluster Networking
NetBIOS in Cluster Networking
Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs
Introduction to Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs
Components of Windows Remote Access VPNs
Deploying PPTP-based Remote Access
Deploying L2TP/IPSec-based Remote Access
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
Appendix B: Alternate Configurations
Appendix C: Setting up a VPN Test Lab
Appendix D: Troubleshooting
Appendix E: Deploying a Certificate Infrastructure
Summary and Related Links
Virtual Private Networking with Windows Server 2003: Deploying Site-to-Site VPNs
Introduction (Virtual Private Networking with Windows Server 2003: Deploying Site-to-Site VPNs)
Components of Windows Server 2003 Site-to-Site VPNs
Deploying a PPTP-based Site-to-Site VPN Connection
Deploying an L2TP/IPSec-based Site-to-Site VPN Connection
Appendix A: Configuring Firewalls for a VPN Router Running Windows Server 2003
Appendix B: Alternate Configurations -- Virtual Private Networking
Appendix C: Troubleshooting
Summary -- Virtual Private Networking
Virtual Private Networking with Windows Server 2003: An Example Deployment
Introduction to Virtual Private Networking with Windows Server 2003: An Example Deployment
Common Configuration for the VPN Server (VPN with Windows Server 2003)
VPN Remote Access for Employees (VPN with Windows Server 2003)
On-Demand Branch Office (VPN with Windows Server 2003)
Persistent Branch Office (VPN with Windows Server 2003)
Extranet for Business Partners (VPN with Windows Server 2003)
Dial-up and VPNs with RADIUS Authentication (VPN with Windows Server 2003)
Summary (VPN with Windows Server 2003)
Related Links for Virtual Private Networking with Windows Server 2003: An Example Deployment
Using Hotpatching Technology to Reduce Servicing Reboots
Introduction to Hotpatching
Hotpatch Package Structure
Deployment Strategy
Limitations and Compatibility Issues
Package Installation
Best Practice Guide for Securing Active Directory Installations
Scope of This Guide
General Guidelines
Audience
How to Use This Guide
Chapter 1: Planning In-Depth Active Directory Security
Overview of the Role of Active Directory in Secure Access
Planning for Active Directory Security-in-Depth
Deployment Scenarios for Domain Controllers in a Secure Network Operating System
Security Planning Through Threat Analysis
Chapter 2: Establishing Secure Active Directory Boundaries
Specifying Security and Administrative Boundaries
Selecting an Active Directory Structure Based on Delegation Requirements
Establishing Secure Collaboration with Other Forests
Recommendations: Establishing Secure Active Directory Boundaries
Chapter 3: Deploying Secure Domain Controllers
Securing the Domain Controller Build Environment
Establishing Secure Domain Controller Build Practices
Maintaining Physical Security
Recommendations: Deploying Secure Domain Controllers
Chapter 4: Strengthening Domain and Domain Controller Policy Settings
Strengthening Domain Policy Settings
Strengthening Domain Controller Policy Settings
Applying Selected Domain and Domain Controller Policy Settings
Reviewing Audit Settings on Important Active Directory Objects
Recommendations: Strengthening Domain and Domain Controller Policy Settings
Chapter 5: Establishing Secure Administrative Practices
Establishing Secure Service Administration Practices
Establishing Secure Data Administration Practices
Recommendations: Establishing Secure Administrative Practices
Chapter 6: Securing DNS
Deploying Secure DNS
Non–Active Directory–Integrated DNS Security
Appendix: Procedures
Enabling SID Filtering
Enabling Auditing on Important Active Directory Objects
Securing Scripts with Script Signing
Updating the Default Domain Policy GPO and the Default Domain Controllers Policy GPO
Creating a New GPO on the Domain Controllers OU and Changing Its Precedence
Creating a .reg File
Creating a Reserve File
Enabling Monitoring for Anonymous Active Directory Access
Monitoring for Anonymous Active Directory Access
Renaming the Default Administrator Account
Creating a Decoy Administrator Account
Changing the Security Descriptor on AdminSDHolder
Denying Logon Access to the Domain
Allowing Logon Access to Administrative Workstations
Appendix: Setting User Account Control Policy for Delegated Administrators
Best Practices for Delegating Active Directory Administration
Chapter 1: Delegation of Administration Overview
Business Case for Delegating Administration
Benefits of Delegation
Delegation at Work
Active Directory Management
Creating a Successful Active Directory Delegation Model
Chapter 2: How Delegation Works in Active Directory
Overview
Active Directory Administrative Tasks
Active Directory Logical Structure and Data Storage
Delegation and Access Control
Chapter 3: Delegating Service Management
Level-of-Privilege Considerations in Delegating Service Management
Recommended Approach to Service Management
Service Management Overview
Creating a Service Management Delegation Model
Implementing the Service Management Delegation Model
Maintaining the Service Management Delegation Model
Chapter 4: Delegating Data Management
Recommended Approach to Data Management
Understanding Data Management
Determining Data Management Stakeholder Needs
Creating the Data Management Delegation Model
Implementing Your Data Management Delegation Model
Maintaining Your Data Management Delegation Model
Case Study: A Delegation Scenario
Company Overview
Active Directory Infrastructure
Managing Contoso’s Active Directory Environment
Step 1 — Create the Contoso Service Management Administrative Delegation Model
Step 2 — Implement the Administrative Delegation Model for Contoso Service Management
Step 3 — Hand Off Data Management to Contoso Data Administrators
Step 4 — Create the Contoso Data Management Administrative Delegation Model
Step 5 – Implement the Contoso Data Management Administrative Delegation Model
Best Practices for Delegating Active Directory Administration: Appendices
Appendix A: Active Directory Administrative Tasks
Appendix B: Default Active Directory Security Groups
Appendix C: Active Directory Standard Permissions
Appendix D: Active Directory Extended Rights
Appendix E: Active Directory Property Sets
Appendix F: Logon Rights and Privileges
Appendix G: Active Directory Delegation Tools
Appendix H: Active Directory Display Name Mappings
Appendix I: Default Container Hierarchy for Active Directory Partitions
Appendix J: Default Owners of Active Directory Objects
Appendix K: Default Settings in the Master Security Descriptor of the AdminSDHolder Object
Appendix L: Implementing Service Management Delegation Roles
Appendix M: Service Management Delegation Role Definitions
Appendix N: Default Active Directory Service Administrator Groups
Appendix O: Active Directory Delegation Wizard File
R2: Deployment (R2 only)
Installing Windows Server 2003 R2
Before You Install
Installing or Upgrading to Windows Server 2003 R2
Performing a Clean Installation of Windows Server 2003 R2
Upgrading to Windows Server 2003 R2
Upgrading to Windows Server 2003 R2
Command-line options for installing Windows Server 2003 R2
Installing Optional Components and Server Roles
Add or upgrade server roles by using Manage Your Server
Install an optional component by using Add/Remove Windows Components
Find a component in Add/Remove Windows Components
Administering components from a computer running Windows XP
Troubleshooting installation issues with Windows Server 2003 R2
Windows Server 2003 R2 Volume License Product Key Encryption
ADFS Step-by-Step Guide
ADFS Deployment Guide
Planning to Deploy ADFS
Implementing Your ADFS Design Plan
Checklist: Implementing a Web SSO Design
Checklist: Implementing a Federated Web SSO Design
Checklist: Implementing a Federated Web SSO with Forest Trust Design
Deploying Partner Organizations
Checklist: Configuring the account partner organization
Checklist: Configuring the resource partner organization
Checklist: Implementing a resource account mapping method
Add a new account partner by manually configuring the trust policy
Add a new account partner by importing an existing policy file
Add a new resource partner by manually configuring the trust policy
Add a new resource partner by importing an existing policy file
Create an organization group or custom claim
Create an incoming group claim mapping
Create an incoming custom claim mapping
Create an outgoing group or custom claim mapping
Add an Active Directory account store
Add an ADAM account store
Map an organization group claim to an Active Directory group (group claim extraction)
Map an organization custom claim to an Active Directory or ADAM user attribute (custom claim extraction)
Map an organization group claim to an ADAM attribute and value (group claim extraction)
Map an organization group claim to a resource group
Create a resource account in the resource partner forest
Configure resource account options
Enable enhanced identity privacy
Configure a claims transform module
Configure an account partner to use Windows trust
Configure a resource partner to use Windows trust
Distribute certificates to client computers using Group Policy
Configure client computers to trust the account federation server
Deploying Federated Applications
Checklist: Installing a claims-aware application
Checklist: Installing a Windows NT token-based application
Configure IIS to support a federated application
Configure web.config to use the claims-aware Web Agent
Configure the Windows NT token-based Web Agent
Add a new claims-aware application to the Federation Service
Add a new Windows NT token-based application to the Federation Service
Enable an organization claim for a federated application in the Federation Service
Configure authentication methods for a federated application
Configure the security token protection method for a federated application
Configure event logging for a claims-aware application
Configure event logging for a Windows NT token-based application
Deploying ADFS-Enabled Web Servers
Checklist: Installing an ADFS-enabled Web server
Join a computer to a domain
Add a host (A) record to perimeter DNS for an ADFS-enabled Web server
Export the private key portion of a server authentication certificate
Import a server authentication certificate to the default Web site
Install prerequisite applications
Install the ADFS Web Agent component of ADFS
Verify that an ADFS-enabled Web server is operational
Deploying Federation Servers
Checklist: Installing a federation server
Checklist: Configuring certificates for a federation server
Join a computer to a domain
Add a host (A) record to corporate DNS for a federation server
Export the private key portion of a server authentication certificate
Import a server authentication certificate to the default Web site
Create a self-signed, token-signing certificate
Install prerequisite applications
Install the Federation Service component of ADFS
Configure event logging on a federation server
Verify that a federation server is operational
Deploying Federation Server Proxies
Checklist: Installing a federation server proxy
Join a computer to a domain
Configure name resolution for a federation server proxy in a DNS zone serving only the perimeter network
Configure name resolution for a federation server proxy in a DNS zone serving both the perimeter network and Internet clients
Import a server authentication certificate to the default Web site
Install prerequisite applications
Install the Federation Service Proxy component of ADFS
Export the public key portion of a client authentication certificate
Add a Federation Service Proxy certificate to the trust policy
Configure event logging on a federation server proxy
Verify that a federation server proxy is operational
Finding Additional ADFS Resources
Hardware Management Introduction
Enabling Hardware Management
Configuration and Security
Integration with WMI
Windows Remote Management Command-Line Tool (Winrm.cmd)
Event Collector
Hardware Management Architecture
How to Bundle ADAM with Your Application
ADAM Install Components
Creating a Windows Installer Package
Bundling ADAM
Identifying ADAM Install Errors
Managing Dependencies on the ADAM Service
Uninstalling ADAM
Step-by-Step Guide for Print Management
Step-by-Step Guide to Deploying ADAM
Requirements for ADAM
Installing ADAM
Using ADAM Administration Tools
Setting Up Application Data
Using an Application with ADAM
Managing OUs, Groups, and Users in ADAM
Managing Directory Partitions in ADAM
Managing Authorization in ADAM
Managing Authentication in ADAM
Backing Up and Restoring Active Directory Application Mode (ADAM)
Managing Configuration Sets
Administering ADAM Programmatically
Step-by-Step Guide for Storage Manager for SANs
Introduction to Storage Manager for SANs
Storage Manager for SANs Requirements
Installing Storage Manager for SANs and Other Required Software
Using Storage Manager for SANs
Overview of LUN Management in Storage Manager for SANs
Support for Multipath I/O
Deploying LUNs Using Storage Manager for SANs
Task 1: Configure Server Connections
Task 2: (iSCSI Only) Configure Targets and Enable Portals
Task 3: (iSCSI Only) Configure Security
Task 4: (iSCSI Only) Establish Logon Sessions Between the Initiator and Targets
Task 5: Create LUNs
Providing LUN Access to a Server Cluster
Step-by-Step Guide for File Server Resource Manager
Introduction to File Server Resource Manager
Installing File Server Resource Manager
Using the File Server Resource Manager Component
Configuring E-mail Notifications
Working with Quotas
Working with File Groups
Screening Files
Generating Storage Reports
Test Scenarios for File Server Resource Manager
Step-by-Step Guide to Setting Up Server for NIS
Task 1: Install Server for NIS on a Domain Controller
Task 2: Migrate NIS Maps to Active Directory
Task 3: Set the Frequency of Map Propagation
Task 4: Set the Encryption Method for NIS Domains
Step-by-Step Guide to Deploying Password Synchronization
Task 1: Install Password Synchronization on a Domain Controller
Task 2: Install the Password Synchronization Daemon on UNIX-based Computers
Task 3: Install the Pluggable Authentication Module on UNIX-based Computers
Task 4: Configure Password Synchronization
Task 5: Start Password Synchronization
Services for Network File System in Microsoft Windows Server 2003 R2
Introduction
What Is New in Windows Server 2003 R2?
NFS Components in Windows Server 2003 R2 and Past Releases
Concepts
Windows and UNIX User and Group Identities
Integrated Identity Management in Active Directory Domain Services
Identity Matching in User Name Mapping Service
Configuration
Installing Services for Network File System
Installing Identity Management for UNIX
Extending the Active Directory Domain Services Schema
Importing UNIX Identities into Active Directory by Using IDMU
Mapping UNIX Users to Windows Users
Configuring Services for Network File System to Use Active Directory Domain Lookup
Configuring Services for Network File System to Use User Name Mapping Service
Open Ports on Firewalls
Creating a Network File System Shared Network Resource
Conclusion
For More Information
Network File System in Microsoft Unified Data Storage Server 2003
Introduction
What Is New in Windows Server 2003 R2?
NFS Components in Windows Server 2003 R2 and Past Releases
Concepts
Windows and UNIX User and Group Identities
Integrated Identity Management in Active Directory Domain Services
Identity Matching in User Name Mapping Service
Windows Unified Data Storage Server 2003 Configuration
Windows Server 2003 R2 Configuration
Installing Services for Network File System
Installing Identity Management for UNIX
Extending the Active Directory Domain Services Schema
Importing UNIX Identities into Active Directory by Using IDMU
Mapping UNIX Users to Windows Users
Configuring Services for Network File System to Use Active Directory Domain Lookup
Configuring Services for Network File System to Use User Name Mapping Service
Open Ports on Firewalls
Creating a Network File System Shared Network Resource
Conclusion
For More Information
Preserving OEM Preactivation When Reinstalling Windows Server 2003 R2
IIS 6.0 Deployment Guide
Overview of Deploying IIS 6.0
Overview of Deploying an IIS 6.0 Web Server
Process for Deploying an IIS 6.0 Web Server
Deploying a New IIS 6.0 Web Server
Upgrading and Migrating a Server to IIS 6.0
Overview of IIS 6.0
IIS 6.0 Benefits and Features
Internet and Intranet Applications on IIS 6.0
Determining Application Compatibility with IIS 6.0
Moving from IIS 5.0 Isolation Mode to Worker Process Isolation Mode
Reviewing Application Isolation Modes
Benefits of Moving to Worker Process Isolation Mode
Security Enhancements
Performance and Scaling Enhancements
Availability Enhancements
Deploying ASP.NET Applications in IIS 6.0
Overview of Deploying ASP.NET Applications in IIS 6.0
Process for Deploying ASP.NET Applications in IIS 6.0
Deploying the Web Server
Installing Windows Server 2003_IIS_SP1_Dep
Installing and Configuring IIS 6.0
Enabling ASP.NET in the Web Service Extensions List
Installing ASP.NET Applications
Creating Web Sites and Virtual Directories for each ASP.NET Application
Creating Web Sites and Home Directories
Creating Virtual Directories
Copying ASP.NET Application Content
Enabling Common Storage for ASP.NET Session State
Selecting the Method for Maintaining and Storing ASP.NET Session State
Configuring Out-of-Process Session State with the ASP.NET State Service
Configuring Out-of-Process Session State with SQL Server
Configuring Encryption and Validation Keys
Configuring ASP.NET Applications to Use the Appropriate Session State
Securing the ASP.NET Session-State Connection String
Completing the ASP.NET Application Deployment
Verifying That the ASP.NET Applications Were Deployed Successfully
Ensuring the Security and Availability of ASP.NET Applications
Backing Up the Web Server
Enabling Client Access
Securing Web Sites and Applications
Overview of the Securing Web Sites and Applications Process
Process for Securing Web Sites and Applications
Reducing the Attack Surface of the Web Server
Enabling Only Essential Windows Server 2003 Components and Services
Enabling Only Essential IIS Components and Services
Enabling Only Essential Web Service Extensions
Configuring Windows Server 2003 Security Settings
Preventing Unauthorized Access to Web Sites and Applications
Storing Content on a Dedicated Disk Volume
Setting IIS Web Site Permissions
Setting IP Address and Domain Name Restrictions
Setting NTFS Permissions
Isolating Web Sites and Applications
Evaluating the Effects of Impersonation on Application Compatibility
Identifying the Impersonation Behavior for ASP Applications
Selecting the Impersonation Behavior for ASP.NET Applications
Configuring Web Sites and Applications for Isolation
Adding Web Sites to an IIS 6.0 Server
Configuring User Authentication
Configuring Web Site Authentication
Selecting a Web Site Authentication Method
Configuring the Web Site Authentication Method
Configuring FTP Site Authentication
Encrypting Confidential Data Exchanged with Clients
Using SSL to Encrypt Confidential Data
Using IPsec or VPN with Remote Administration
Maintaining Web Site and Application Security
Obtaining and Applying Current Security Patches
Enabling Windows Server 2003 Security Logs
Enabling File Access Auditing for Web Site Content
Configuring IIS Logs
Reviewing Security Policies, Processes, and Procedures
Additional Resources About Security in IIS 6.0
Ensuring Application Availability
Overview of the Ensuring Application Availability Process
Process for Ensuring Application Availability
Establishing Application Availability Goals
Setting Service Availability Goals
Setting Request-Handling Goals
Configuring IIS 6.0 for Optimum Availability
Isolating Applications
Determining the Application Isolation Needs of Your Server
Creating Application Pools and Assigning Applications to Them
Recycling Worker Processes
Recycling by Elapsed Time
Recycling by Number of Requests
Recycling at Scheduled Times
Recycling on a Virtual-Memory Threshold
Recycling on a Used-Memory Threshold
Tuning Performance
Configuring Idle Time-out for Worker Processes
Configuring a Request Queue Limit
Enabling HTTP Compression IIS 6.0
Configuring Web Gardens
Setting Processor Affinity on Servers with Multiple CPUs
Managing Application Pool Health
Configuring Worker Process Pinging
Configuring Rapid-Fail Protection for Worker Processes
Configuring the Startup Time Limit for Worker Processes
Configuring the Shutdown Time Limit for Worker Processes
Enabling Debugging for Application Pool Failures
Configuring Application Pool Identity
Testing Applications for Compatibility
Testing Applications for Compatibility with IIS 6.0
Testing Applications for Functional Compatibility with IIS 6.0
Additional Resources About Application Availability in IIS 6.0
Upgrading an IIS Server to IIS 6.0
Overview of Upgrading an IIS Server to IIS 6.0
Process for Upgrading an IIS Server to IIS 6.0
Preparing to Upgrade
Determining Compatibility with Windows Server 2003
Identifying and Compensating for Changes to IIS 6.0
Ensuring That the WWW Service is Enabled After Upgrade
Compensating for Changes to IIS Components
Determining Application Compatibility with Worker Process Isolation Mode
Evaluating the Benefits of Worker Process Isolation Mode
Evaluating Application Changes Required for Worker Process Isolation Mode
Evaluating Management and Provisioning Script Changes Required for Worker Process Isolation Mode
Verifying Application Compatibility with Worker Process Isolation Mode in a Lab
Determining Application Compatibility with the .NET Framework
Performing the Upgrade
Backing Up the Server_IIS_SP1_Dep
Verifying That Clients Are Not Accessing Web Sites
Preventing the WWW Service from Being Disabled
Modifying the Registry or Unattended Setup Script
Running the IIS Lockdown Tool
Upgrading the Server to IIS 6.0
Verifying That the Operating System Upgrade Was Successful
Backing Up the IIS 6.0 Metabase
Converting to Worker Process Isolation Mode
Documenting the Current Application Isolation Settings
Configuring IIS 6.0 to Run in Worker Process Isolation Mode
Configuring Application Isolation Settings in Worker Process Isolation Mode
Example: Converting to Worker Process Isolation Mode
Configuring IIS 6.0 Properties
Enabling the WWW Service
Configuring Web Service Extensions
Configuring MIME Types
Modifying References to IIS 6.0 Metabase Properties
Upgrading FrontPage Extended Web Sites
Determining Whether to Run the IIS Lockdown Tool and UrlScan
Making Security-Related Configuration Changes
Enabling Essential IIS Components and Services
Removing Unnecessary IIS Virtual Directories
Configuring the Anonymous User Identity
Configuring IIS 6.0 to Host ASP.NET Applications
Configuring IIS 6.0 to Use the Correct Version of the .NET Framework
Configuring the .NET Framework
Reviewing How ASP.NET Applications Run In Each Application Isolation Mode
Migrating Machine.config Attributes to IIS 6.0 Metabase Property Settings
Migrating Recycling-Related Attributes
Migrating Performance-Related Attributes
Migrating Health-Related Attributes
Migrating Identity-Related Attributes
Completing the Upgrade_IIS_SP1_Dep
Verifying That the Web Sites and Applications Run Properly
Backing Up the IIS 6.0 Server before Enabling Client Access
Enabling Client Access to the IIS 6.0 Server
Additional Resources About Upgrading to IIS 6.0
Migrating IIS Web Sites to IIS 6.0
Migrating Apache Web Sites to IIS 6.0
Appendix A: IIS Deployment Procedures
Appendix B: Changes to Metabase Properties in IIS 6.0
Appendix C: Choosing a Cluster Technology for IIS 6.0
Appendix D: Running 32-bit Applications on 64-bit Windows
Appendix E: Unattended Setup
Additional Resources_IIS_SP1_Dep
Operations
Windows Server 2003 Operations
Active Directory Operations Guide
Troubleshooting Active Directory
Configuring a Computer for Troubleshooting
Troubleshooting Active Directory Replication Problems
Fixing Replication Lingering Object Problems (Event IDs 1388, 1988, 2042)
Event ID 1388 or 1988: A lingering object is detected
A deleted account remains in the Address Book, e-mail is not received, or a duplicate account exists
Event ID 2042: It has been too long since this machine replicated
Fixing Replication Security Problems
An "Access denied" or other security error has caused replication problems
Fixing Replication DNS Lookup Problems (Event IDs 1925, 2087, 2088)
Event ID 1925: Attempt to establish a replication link failed due to DNS lookup problem
Event ID 2087: DNS lookup failure caused replication to fail
Event ID 2088: DNS lookup failure occurred with replication success
Fixing Replication Connectivity Problems (Event ID 1925)
Event ID 1925: Attempt to establish a replication link failed due to connectivity problem
Fixing Replication Topology Problems (Event ID 1311)
Event ID 1311: Replication configuration does not reflect the physical network
Additional Resources
Monitoring and Troubleshooting Active Directory Replication Using Repadmin
Repadmin Introduction and Technology Overview
Repadmin Requirements, Syntax, and Parameter Descriptions
Repadmin Usage Scenarios
Monitor Forest-Wide Replication
Display Replication Partners and Status of a Domain Controller
Replication Latency
View Replication Metadata of an Object
Display the Attributes of a Specific Object
How Up to Date Are My Domain Controllers?
Can I Look at My Connection Objects and Schedule Details?
Fine-Tuning Change Notification Values
Forcing Replication
Keeping Track of Changes That Have Occurred Over a Period of Time
Usage of Repadmin When Troubleshooting Event ID 1311
Subcommands Not Covered Under the Previous Scenarios
Oldhelp
Administer PRP for RODC with Repadmin.exe
Repadmin for Experts
Administering Active Directory
Introduction
New in This Guide
Administering Domain and Forest Trusts
Introduction
Best Practices
Managing Domain and Forest Trusts
Creating Domain and Forest Trusts
DNS and NetBIOS Name Resolution to Create External, Realm and Forest Trusts
Known Issues for Creating Domain and Forest Trusts
Creating External Trusts
Create a one-way, incoming, external trust for one side of the trust
Create a one-way, incoming, external trust for both sides of the trust
Create a one-way, outgoing, external trust for one side of the trust
Create a one-way, outgoing, external trust for both sides of the trust
Create a two-way, external trust for one side of the trust
Create a two-way, external trust for both sides of the trust
Creating Shortcut Trusts
Create a one-way, incoming, shortcut trust for one side of the trust
Create a one-way, incoming, shortcut trust for both sides of the trust
Create a one-way, outgoing, shortcut trust for one side of the trust
Create a one-way, outgoing, shortcut trust for both sides of the trust
Create a two-way, shortcut trust for one side of the trust
Create a two-way, shortcut trust for both sides of the trust
Creating Forest Trusts
Create a one-way, incoming, forest trust for one side of the trust
Create a one-way, incoming, forest trust for both sides of the trust
Create a one-way, outgoing, forest trust for one side of the trust
Create a one-way, outgoing, forest trust for both sides of the trust
Create a two-way, forest trust for one side of the trust
Create a two-way, forest trust for both sides of the trust
Creating Realm Trusts
Create a one-way, incoming, realm trust
Create a one-way, outgoing, realm trust
Create a two-way, realm trust
Configuring Domain and Forest Trusts
Validating and removing trusts
Validate a trust
Remove a manually created trust
Modifying Name Suffix Routing Settings
Modify the routing status of a name suffix
Enable or disable an existing name suffix for routing
Exclude name suffixes from routing to local forests
Securing Domain and Forest Trusts
Configuring SID Filtering Settings
Verify SID filter quarantining
Disable SID filter quarantining
Reapply SID filter quarantining
Configuring Selective Authentication Settings
Enable selective authentication over an external trust
Enable selective authentication over a forest trust
Enable domain-wide authentication over an external trust
Enable forest-wide authentication over a forest trust
Grant the Allowed to Authenticate permission on computers in the trusting domain or forest
Appendix
Administering the Windows Time Service
Introduction
Managing the Windows Time Service
Configuring a time source for the forest
Configure the Windows Time service on the PDC emulator in the Forest Root Domain
Change the Windows Time service configuration on the previous PDC emulator
Configure a domain controller in the parent domain as a reliable time source
Configure the PDC emulator to synchronize from its internal hardware clock
Disable the Windows Time service
Configuring Windows-based clients to synchronize time
Configure a manual time source for a selected client computer
Configure a client computer for automatic domain time synchronization
Restoring Windows Time service to default settings
Restore Windows Time service on local computer to default settings
Administering SYSVOL
Introduction
Managing SYSVOL
Changing the Space Allocated to the Staging Area
Stop the File Replication service
Change the space allocated to the Staging Area folder
Start the File Replication service
Relocating the Staging Area
Identify replication partners
Check the status of the shared SYSVOL
Verify replication with other domain controllers
Gather the SYSVOL path information
Reset the File Replication service staging folder to a different logical drive
Relocating SYSVOL Manually
Identify replication partners
Check the status of the shared SYSVOL
Verify replication with other domain controllers
Gather the SYSVOL path information
Stop the File Replication service
Create the SYSVOL folder structure
Set the SYSVOL path
Set the staging area path
Prepare a domain controller for nonauthoritative SYSVOL restart
Update security on the new SYSVOL
Start the File Replication service
Updating the System Volume Path
Gather the SYSVOL path information
Stop the File Replication service
Set the SYSVOL path
Set the staging area path
Start the File Replication service
Restoring and Rebuilding SYSVOL
Identify replication partners
Check the status of the shared SYSVOL
Verify replication with other domain controllers
Restart the domain controller in Directory Services Restore Mode locally
Gather the SYSVOL path information
Stop the File Replication service
Prepare a domain controller for nonauthoritative SYSVOL restart
Import the SYSVOL folder structure
Start the File Replication service
Administering the Global Catalog
Introduction
Managing the Global Catalog
Configuring a Global Catalog Server
Determine whether a domain controller is a global catalog server
Designate a domain controller to be a global catalog server
Monitor global catalog replication progress
Determining Global Catalog Readiness
Verify global catalog readiness
Verify global catalog DNS registrations
Removing the Global Catalog
Clear the global catalog setting
Monitor global catalog removal in Event Viewer
Administering Operations Master Roles
Introduction
Managing Operations Master Roles
Designating a standby operations master
Determine whether a domain controller is a global catalog server
Create a connection object on the current operations master
Create a connection object on the standby operations master
Verify successful replication to a domain controller
Transferring an operations master role
Verify successful replication to a domain controller
Determine whether a domain controller is a global catalog server
Install the Schema snap-in
Transfer the schema master
Transfer the domain naming master
Transfer the domain-level operations master roles
View the current operations master role holders
Seizing an operations master role
Verify successful replication to a domain controller
Seize the operations master role
View the current operations master role holders
Reducing the workload on the PDC emulator master
Change the weight for DNS SRV records in the registry
Change the priority for DNS SRV records in the registry
Administering Active Directory Backup and Restore
Introduction
Managing Active Directory Backup and Restore
Backing Up Active Directory Components
Back up system state
Back up system state and the system disk
Performing a Nonauthoritative Restore of a Domain Controller
Restart the domain controller in Directory Services Restore Mode locally
Restart the domain controller in Directory Services Restore Mode remotely
Restore Active Directory from backup
Verify Active Directory restore
Performing an Authoritative Restore of Active Directory Objects
Restore Active Directory from backup
Mark the object or objects authoritative
Synchronize replication with all partners
Run an LDIF file to recover back-links
Restart the domain controller in Directory Services Restore Mode locally
Create an LDIF file for recovering back-links for authoritatively restored objects
Turn off inbound replication
Turn on inbound replication
Performing an Authoritative Restore of an Application Directory Partition
Restore Active Directory from backup
Mark the application directory partition as authoritative
Performing an Authoritative Restore of a Group Policy Object
Restore a Group Policy Object
Restoring a Domain Controller Through Reinstallation and Subsequent Restore from Backup
Restore Active Directory from backup
Verify Active Directory restore
Restoring a Domain Controller Through Reinstallation
Clean up server metadata
Delete a Server object from a site
Delete a Computer object from the Domain Controllers OU
Verify DNS registration and functionality
Verify communication with other domain controllers
Verify the availability of the operations masters
Install Active Directory
Administering Intersite Replication
Introduction
Managing Intersite Replication
Adding a New Site
Create a site object and add it to an existing site link
Create a subnet object or objects and associate them with the new site
Associate an existing subnet object with the new site
Create a site link object and add the appropriate sites
Remove the site from the site link
Linking Sites for Replication
Create a site link object and add the appropriate sites
Determine the ISTG role owner for a site
Generate the replication topology on the ISTG
Changing Site Link Properties
Configure the site link schedule to identify times during which intersite replication can occur
Configure the site link interval to identify how often replication polling can occur during the schedule window
Configure the site link cost to establish a priority for replication routing
Determine the ISTG role owner for a site
Generate the replication topology on the ISTG
Moving a Domain Controller to a Different Site
Change the static IP address of a domain controller
Create a delegation for a domain controller
Verify that an IP address maps to a subnet and determine the site association
Determine whether the server is a preferred bridgehead server
Configure the server to not be a preferred bridgehead server
Move the Server object to the new site
Removing a Site
Determine whether a Server object has child objects
Delete a Server object from a site
Delete the Site Link object
Associate the subnet or subnets with the appropriate site
Delete the Site object
Determine the ISTG role owner for a site
Generate the replication topology on the ISTG
Administering the Active Directory Database
Introduction
Managing the Active Directory Database
Relocating Active Directory Database Files
Determine the database size and location online
Determine the database size and location offline
Compare the size of the directory database files to the volume size
Back up system state
Restart the domain controller in Directory Services Restore Mode locally
Restart the domain controller in Directory Services Restore Mode remotely
Move the directory database and log files to a local drive
Copy the directory database and log files to a remote share
Returning Unused Disk Space from the Active Directory Database to the File System
Change the garbage collection logging level to 1
Back up system state
Restart the domain controller in Directory Services Restore Mode locally
Restart the domain controller in Directory Services Restore Mode remotely
Compact the directory database file (offline defragmentation)
If database integrity check fails, perform semantic database analysis with fixup
Guarding Against Accidental Bulk Deletions in Active Directory
Protect an Organizational Unit from Accidental Deletion
Remove Protection Against Accidental Organizational Unit Deletion
Administering Domain Controllers
Introduction
Managing Domain Controllers
Preparing for Active Directory Installation
Install the DNS Server service
Verify DNS registration and functionality
Verify that an IP address maps to a subnet and determine the site association
Verify communication with other domain controllers
Verify the availability of the operations masters
Installing a Domain Controller in an Existing Domain
Install Active Directory
Installing a Domain Controller in an Existing Domain Using Restored Backup Media
Back up system state
Restore system state to an alternate location
Install Active Directory from restored backup media
Include application directory partitions in an Active Directory installation from backup media
Adding Domain Controllers in Remote Sites
Known Issues
Best Practices
Preparing a Server Computer for Shipping and Installation from Backup Media
Back up system state
Restore system state to an alternate location
Enable Remote Desktop
Create an answer file for domain controller installation
Create a Remote Desktop Connection
Install Active Directory from restored backup media
Include application directory partitions in an Active Directory installation from backup media
Preparing an Existing Domain Controller for Shipping and Long-Term Disconnection
Determine the tombstone lifetime for the forest
View the current operations master role holders
Transfer the domain-level operations master roles
Transfer the schema master
Transfer the domain naming master
Prepare a domain controller for nonauthoritative SYSVOL restart
Enable strict replication consistency
Synchronize replication with all partners
Verify successful replication to a domain controller
Reconnecting a Domain Controller After a Long-Term Disconnection
Determine when intersite replication is scheduled to begin
Use Repadmin to remove lingering objects
Verify successful replication to a domain controller
Performing an Unattended Installation of Active Directory
Create an answer file for domain controller installation
Install Active Directory using an answer file
Verifying Active Directory Installation
Determine whether a Server object has child objects
Verify that an IP address maps to a subnet and determine the site association
Move the Server object to the new site
Configure DNS server forwarders
Verifying DNS configuration
Create a delegation for a domain controller
Create a secondary zone
Configure the DNS client settings
Check the status of the shared SYSVOL
Verify DNS registration and functionality
Verify communication with other domain controllers
Verify replication with other domain controllers
Verify the availability of the operations masters
Verify domain membership for a new domain controller
Renaming a Domain Controller
Rename a domain controller using System Properties
Rename a domain controller using Netdom
Update the FRS member object
Decommissioning a Domain Controller
View the current operations master role holders
Transfer the schema master
Transfer the domain naming master
Transfer the domain-level operations master roles
Determine whether a domain controller is a global catalog server
Verify DNS registration and functionality
Verify communication with other domain controllers
Verify the availability of the operations masters
Uninstall Active Directory
Determine whether a Server object has child objects
Delete a Server object from a site
Forcing the Removal of a Domain Controller
Identify replication partners
Force domain controller removal
Clean up server metadata
Additional Resources
DNS Operations Guide
Administering DNS
Introduction
Managing DNS
Managing DNS Servers
Adding a Primary DNS Server to an Existing Zone
Install a new DNS server
Configure a DNS server
Adding a Secondary DNS Server
Add a secondary server to a zone
Modifying an Existing DNS Server
Start, stop, pause, or restart a DNS server
Manually update DNS server data files
Clear the DNS server names cache
Change the boot method of a DNS server
Change the name-checking method of a DNS server
Restore DNS server default preferences
Using Forwarders
Configure forwarders for a DNS server
Removing a DNS Server from the Network
Delete a resource record
Modify an existing resource record
Modify the SOA record for a zone
Verify a zone delegation
Using DNS Aging and Scavenging
Set aging and scavenging properties for a DNS server
Set aging and scavenging properties for a zone
Configure automatic scavenging of stale resource records
Start scavenging of stale resource records
Reset aging and scavenging properties for a specific resource record
Managing DNS Clients
Configuring DNS Client Settings
Configure DNS settings in Network Connections
Managing the DNS Client Resolver Cache
Preload the DNS client resolver cache
View a DNS client resolver cache
Flush and reset a client resolver cache
Renewing DNS Client Registration
Managing DNS Zones
Adding and Removing a Zone
Delete a DNS zone
Add a new zone
Start or pause a zone
Start a zone transfer at a secondary server
Modifying Zone Properties
Change the DNS zone type
Change a DNS zone file name
Change the zone replication scope
Modify the SOA record for a zone
Modify DNS zone transfer settings
Specify DNS servers as authoritative for a zone
Change the master server for a secondary zone
Create a notify list for a zone
Adjust the refresh, retry, or expire intervals for a zone
Configuring Dynamic Updates
Enable dynamic updates
Enable secure dynamic updates
Delegating a Zone
Create a new zone delegation
Verify a zone delegation
Using Stub Zones
Reload or transfer stub zones
Configure a stub zone to use local master servers
Using WINS Lookup in DNS Zones
Allow DNS to use WINS resolution
Verify that WINS is answering a DNS query
Managing DNS Resource Records
Adding, Changing, and Deleting Resource Records
Add an A resource record to a zone
Add an MX resource record to a zone
Add a CNAME resource record to a zone
Add a PTR resource record to a reverse zone
Add a resource record to a DNS zone
Add a domain to a zone
Modify an existing resource record
Delete a resource record
View unsupported resource records
Disable NS resource record registration
Allow NS resource record creation for domain controllers
Restrict the DNS resource records that are updated by Netlogon
Monitoring DNS
Check DNS event log
Verify DNS server responsiveness with Nslookup
Verify dynamic DNS record updates
Verify zone transfers
Check the DNS server debug log file
Test a query on the DNS server
Optimizing DNS
Enable or disable fast DNS zone transfers
Prevent loading of a zone with bad data
Disable DNS round robin
Restore DNS server default preferences
Disable recursion
Disable local subnet prioritization
Update root hints
Secure the server cache against names pollution
Clear server names cache
Configure DNSSEC
Configure EDNS0
Change UDP message size
Securing DNS
Securing DNS Zones
Enable secure dynamic updates
Modify DNS zone transfer settings
Delegating a Zone
Create a new zone delegation
Verify a zone delegation
Securing the DNS Server Service
Restrict the DNS server to listen on selected IP addresses
Secure the server cache against names pollution
Disable recursion
Update root hints
Securing DNS Clients
Configure DNS settings in Network Connections
Restrict the DNS server to listen on selected IP addresses
Troubleshooting DNS
Introduction
Verifying Computer Settings
Configuring a Computer for Troubleshooting
Troubleshooting DNS Problems
Secure dynamic updates fail
DNS server resolves some Internet names incorrectly
DNS client fails to resolve name
Zone transfers from a secondary DNS server fail
Dynamic updates for host records fail
Additional Resources
Group Policy Operations Guide
Group Policy Troubleshooting
Introduction
Verifying Administrative Workstation Settings
Quick Fixes
Configuring Administrative Workstation for Troubleshooting
Enable Logging for Group Policy Management Console
Enabling Logging for Group Policy Editor
Enable Logging for Group Policy Object Editor Client Side Extensions
Enable Logging for Core Group Policy
Enable Logging for Security Settings
Enable Logging for Folder Redirection Client Side Extension
Enable Logging for Software Installation Client Side Extension
Enable Logging for Internet Explorer Client Side Extension
Troubleshooting Group Policy Problems
Fixing Core Group Policy problems
Fixing Group Policy networking issues
Group Policy does not apply when connecting remotely over a slow link
Unable to access domain controller
Group Policy does not replicate
Fixing Group Policy processing issues
Policy setting is not supported
GPO provides unexpected value
Group Policy does not refresh
Policy settings do not apply for software installation, scripts, or folder redirection
Group Policy is not applied due to cached credentials
Machine required resources are not available
Loopback processing does not work
Loopback Replace does not work in cross forest environment
Fixing Group Policy scoping issues
Policy settings incorrectly applied or denied due to security filtering
Policy settings incorrectly applied or denied due to WMI filtering
Fixing Group Policy structural issues
GPO does not apply to a specific user or computer
Critical files on domain controllers or client computers are missing or corrupted
Trust relationships are not working
Group Policy does not apply after migration
Fixing Administrative Template policy setting problems
Administrative Templates CSE is processed with errors
Group Policy Object Editor loads with "[strings] section is too long and has been truncated" message
Some policy settings do not show in GPMC reports
Custom ADM settings do not display in the Group Policy Editor
Fixing Security Settings Problems
Replication of Group Policy settings between domain controllers fails
Password Policy settings changes do not take effect
Account Policy templates are applied incorrectly
Security Settings policies are propagated with warnings
Scecli.dll errors occur when opening Account Policies or Local Policies
Default Group Policy objects become corrupted: disaster recovery
Windows Security Settings remain in effect after removal
Fixing Scripts policy settings problems
Startup scripts do not run as expected on a computer running Windows XP SP1 or Windows XP SP2
Scripts deployed to computer do not run (Userinit events 1000 and 1001)
Fixing Software Installation policy setting problems
Software Installation changes do not apply after logon
Failure to access software share points
User uninstalls a deployed application on a computer and application is unavailable to the user on every computer
Software is not listed in Add or Remove Programs
Install on demand fails
Software Installation operation fails
Fixing Folder Redirection policy settings problems
Folder Redirection encounters errors and redirection fails
Folder Redirection CSE processing is delayed
Fixing Disk Quota extension problems
Disk Quota CSE processed with errors
Fixing Group Policy problems by using log files
Interpreting Userenv log files
Interpreting Security Settings log files
Additional Resources
Security Technologies Operations Guide
Troubleshooting Kerberos
Introduction
Verifying Computer Settings
Configuring a Computer for Troubleshooting
Troubleshooting Kerberos Problems
Service Logons Fail Due to Incorrectly Set SPNs
Authentication Uses NTLM instead of Kerberos
Authentication Fails in a Mixed Windows and UNIX Environment
Authentication Fails Due to User PAC
Authentication Using UDP Causes Errors
Authentication Errors are Caused by Unsynchronized Clocks
Additional Resources
Troubleshooting Access Control
Introduction
Verifying Computer Settings
Quick Fixes
Configuring a Computer for Troubleshooting
Troubleshooting Access Control Problems
Anonymous user cannot access a shared folder
Unknown user is attempting to access a file or folder he or she should not have access to
Unknown user is changing ACLs on files or folders
User cannot access a file or folder but should have permission
Users cannot write to a shared folder after migration to Windows Server 2003
Additional Resources
Server Cluster Operations Guide
Troubleshooting the Quorum Resource in a Server Cluster
Verifying Permissions, Hardware, and Software Before Troubleshooting the Quorum Resource
Configuring a Computer for Troubleshooting the Quorum Resource in a Server Cluster
Troubleshooting Quorum Resource Problems
Files on the Cluster Quorum Might be Missing, Inaccessible, or Corrupt
The Quorum Resource is on an Inaccessible or Nonfunctioning Disk
The Cluster Configuration File on a Node is Corrupt
Additional Resources
Terminal Server Licensing Operations Guide
Troubleshooting Terminal Server Licensing
Introduction
Verifying Computer Settings
Quick Fixes
Configuring a Computer for Troubleshooting
Troubleshooting Terminal Server Licensing Problems
Understanding Windows Server 2003 updates for Terminal Server Licensing
Understanding Troubleshooting Considerations for Specific Terminal Server Licensing Environments
Fixing Client Connectivity Problems
The terminal server cannot locate the license server
The remote computer disconnected the session because of an error in the licensing protocol
The remote session was disconnected because there were network problems during the license protocol
A licensing error occurred while the client was attempting to connect. (Licensing timed out)
The remote session was disconnected because there are no Terminal Server license servers available to provide a license
The remote session was disconnected because there are no Terminal Server client access licenses available for this computer
The remote session was disconnected because the local computer's client access license could not be upgraded or renewed
Because of a security error, the client could not connect to the terminal server
Event ID 26: Your terminal services temporary client license will expire in N days
Event ID 1011: The terminal services client has been disconnected because its temporary license has expired
Event ID 1026: The terminal server could not locate a license server in the domain
Event ID 1028: The terminal server client has been disconnected because its license could not be renewed
Fixing CAL Issuance and Upgrade Problems
The terminal server cannot locate the license server
The remote session was disconnected because there are no Terminal Server license servers available to provide a license
The remote session was disconnected because there are no Terminal Server client access licenses available for this computer
The remote session was disconnected because the local computer's client access license could not be upgraded or renewed
No licenses are being issued from the available pool of licenses
Event ID 26: Your terminal services temporary client license will expire in N days
Event ID 1011: The terminal services client has been disconnected because its temporary license has expired
Event ID 1026: The terminal server could not locate a license server in the domain
Event ID 1028: The terminal server client has been disconnected because its license could not be renewed
Fixing License Server Activation Problems and Other Licensing Problems
The product ID generated by the Terminal Server License Server Activation Wizard doesn't work
Event ID 43: Work Manager error can't startup work scheduler, Error code -1072167891
Additional Resources
Step-by-Step Guide for Configuring Group Policy for Terminal Services
Loopback Technology Review
Requirements for Configuring Group Policy for Terminal Services
Group Policy Terminal Services Scenarios
Scenario 1: Administering Group Policy to Provide a Consistent Terminal Services Desktop
Scenario 2: Filtering Administrators from Terminal Services Group Policies
Additional References
Windows Firewall Operations Guide
Administering Windows Firewall
Introduction
Managing Windows Firewall
Best Practices for Managing Windows Firewall
Managing Resets, Startup, and Shutdown
Known Issues for Managing Resets, Startup, and Shutdown
Configuring Windows Firewall with SCW
Use SCW to Configure Windows Firewall
Enabling and Disabling Windows Firewall
Turn Windows Firewall On or Off
Turn Windows Firewall On or Off for a Specific Connection
Turn Windows Firewall On with No Exceptions
Restoring Windows Firewall Default Settings
Restore Windows Firewall Default Settings
Managing Windows Firewall Profiles
Known Issues for Managing Windows Firewall Profiles
Determine Which Profile Windows Firewall Is Using
Specify Which Profile You Are Configuring
Managing Program, Port, and System Service Firewall Rules
Known Issues for Managing Firewall Rules
Configuring Program Firewall Rules
Add a Program to the Firewall Rules List
Edit or Delete a Program Firewall Rule
Identify Blocked Servers, Listeners, and Peers
Identify Unblocked Servers, Listeners, and Peers
Configuring Port Firewall Rules
Add a Port to the Firewall Rules List
Edit or Delete a Port Firewall Rule
Configuring System Service Firewall Rules
Enable or Disable the File and Printer Sharing Firewall Rule
Enable or Disable the Remote Desktop Firewall Rule
Enable or Disable the UPnP Framework Firewall Rule
Enable or Disable the Remote Administration Firewall Rule
Configuring Firewall Rules for Specific Connections
Add a Port to the Firewall Rules List for a Specific Connection
Edit or Delete a Connection-Specific Port Firewall Rule
Configuring Scope Settings
Change the Scope of a Firewall Rule
Managing IPsec, Multicast, and ICMP Settings
Known Issues for Managing IPsec, Multicast, and ICMP Settings
Configuring ICMP Settings
Block and Unblock ICMP Messages
Configuring IPsec Settings
Configure Authenticated IPsec Bypass
Configuring Multicast Settings
Block Unicast Responses to Multicast Traffic
Managing Windows Firewall Notifications
Known Issues for Managing Windows Firewall Notifications
Enable or Disable Windows Firewall Notifications
Optimizing Windows Firewall
Best Practices for Optimizing Windows Firewall
Known Issues for Optimizing Windows Firewall
Monitoring Windows Firewall
Best Practices for Monitoring Windows Firewall
Using the Windows Firewall Log
Known Issues for Using the Windows Firewall Log
Enable or Disable the Windows Firewall Log
View the Windows Firewall Log File
Change the Name and Location of the Windows Firewall Log File
Change the Size of the Windows Firewall Log File
Interpreting the Windows Firewall Log
Identify Program Failures
Identify Malicious Activity
Using the Security Log
Known Issues for Using the Security Log
Enable Auditing of Windows Firewall Events
View Windows Firewall Events in Event Viewer
Securing Windows Firewall
Best Practices for Securing Windows Firewall
Known Issues for Securing Windows Firewall
Preventing Administrators from Turning Windows Firewall On or Off
Prevent Local Administrators from Turning Windows Firewall On or Off
Preventing Administrators from Creating Exceptions
Prevent Local Administrators from Creating Program Exceptions
Prevent Local Administrators from Creating Port Exceptions
Additional Resources
Troubleshooting Windows Firewall
Introduction
Verifying Computer Settings
Quick Fixes
Configuring a Computer for Troubleshooting
Troubleshooting Windows Firewall Problems
Fixing Network Access Problems
File and Printer Sharing Does Not Work
Computer Names Do Not Resolve When Used in a UNC Path
VPN and Remote Access Connections Fail
Remote Administration Tools Fail
The Ping Command Times Out
A Computer Receives Network Traffic Only from Its Local Subnet or Specific Computers
Fixing Program Problems
A Program in the Exceptions List Does Not Run Properly
A Notification Says Windows Explorer Is Trying to Listen on a Port
A User Cannot Determine What to Add to the Exceptions List
A Program Removed from the Exceptions List Keeps Working
There Is a Problem Running an Antivirus Program
A System Service Runs in Svchost.exe and Cannot Be Added to the Exceptions List
An Unexpected Program Appears in the Exceptions List
Fixing Configuration and Management Problems
A Program Named “Unspecified” Appears in the Exceptions List
A Windows Firewall Setting Does Not Take Effect
One or More Windows Firewall Settings Appear Dimmed
Additional Resources for Windows Firewall Troubleshooting
Windows Server 2003 PKI Operations Guide
Basic Administrative Tasks
Migrating from a Stand-alone to an Enterprise CA
Windows Server 2003 PKI and Role-Based Administration
Role Separation
CA Auditing
Setting Up CA Auditing
Auditing and Event Management
CA Maintenance
Custom CA Configuration
Enrollment Processing
Tuning CA Database Performance
Viewing Extended Information
Managing Subject Relative Distinguished Names in the Certificate Subject
Enabling the Netscape Revocation Method
Configuring the SMTP Exit Module
Using SSL to Communicate with Exchange Server
Related Links for Windows Server 2003 PKI Operations
Appendix A
How to Use Windows Firewall with a Server Cluster
Using Windows Server 2003 with Service Pack 1 in a Managed Environment: Controlling Communication with the Internet
Introduction to Controlling Communication with the Internet for Windows Server 2003 with SP1
Activation, Registration, and Resulting Internet Communication in Windows Server 2003 with Service Pack 1
Certificate Support and Internet Communication
Device Manager, Hardware Wizards, and Internet Communication
Dynamic Update and Internet Communication
Event Viewer and Internet Communication
File Association Web Service and Internet Communication
Help and Support Center: Features That Communicate with the Internet
HyperTerminal and Internet Communication
Internet Explorer 6.0 and Resulting Internet Communication in Windows Server 2003 with Service Pack 1
Internet Information Services and Internet Communication
Internet Protocol Version 6 (IPv6) and Internet Communication
NetMeeting and Internet Communication
Online Device Help and Internet Communication
Outlook Express 6.0 and Resulting Internet Communication in Windows Server 2003 with Service Pack 1
Plug and Play and Internet Communication
Program Compatibility Wizard and Internet Communication
Remote Assistance and Internet Communication
Search Companion and Internet Communication
Terminal Server Licensing and Internet Communication
Windows Error Reporting and Internet Communication
Windows Media Player and Internet Communication
Windows Media Services and Internet Communication
Windows Time Service and Internet Communication
Windows Update, Automatic Updates, and Internet Communication
Appendix A: Resources for Learning About Automated Installation and Deployment
Appendix B: Resources for Learning About Group Policy
Appendix C: Group Policy Settings Listed Under the Internet Communication Management Key
Appendix D: Differences in Windows Server 2003 Before and After Service Pack 1
Appendix E: Windows Firewall and Security Configuration Wizard
Appendix F: Internet Connection Sharing and Network Bridge
Appendix G: Message Queuing and Internet Communication
Appendix H: Connection Manager and Internet Communication
Appendix I: Passport Manager Administration
Appendix J: Online Ordering Wizards, Add Network Place Wizard, and New Connection Wizard
Related Links for Controlling Communication with the Internet
Windows Server 2003: Operations Whitepapers
User Data and Settings Management
User Profiles Overview
User Profile Structure
Enhancements to User Profiles in Windows Server 2003 and Windows XP
How to Configure a Roaming User Profile
Security Considerations when Configuring Roaming User Profiles
Best Practices for User Profiles
Folder Redirection Overview
How to Configure Folder Redirection
Security Considerations when Configuring Folder Redirection
Best Practices for Folder Redirection
Related Technologies: Offline Files and Synchronization Manager
Common Scenarios for IntelliMirror User Data and Settings Features
Appendix: Group Policy Settings for Roaming User Profiles
Related Links
SSL/TLS in Windows Server 2003
Introduction (SSL/TLS in Windows Server 2003)
Overview of SSL/TLS Encryption
SSL/TLS in Detail
SSL/TLS Scenarios
SSL and Firewalls
Performance Considerations
Choosing the Right Printer Drivers
Introduction (Choosing the Right Printer Drivers)
User-mode vs. Kernel-mode Drivers
Unidrv and PostScript-based Drivers
Designed for Windows Drivers
Alternate Options
Summary (Choosing the Right Printer Drivers)
Related Links (Choosing the Right Printer Drivers)
GPMC Scripting: Automate GPO management tasks
Getting Started with GPMC Scripting
Retrieving Permissions for a GPO
Obtaining RsoP Reports
GPMC Opens New Possibilities
Advanced Certificate Enrollment and Management
Introduction (Advanced Certificate Enrollment and Management)
Requesting Offline Domain Controller Certificates (Advanced Certificate Enrollment and Management)
Processing Domain Controller Certificates
Domain Controller Certificate Installation
Removing Domain Controller Certificates
Troubleshooting (Advanced Certificate Enrollment and Management)
Appendix 1: Identifying a Domain Controller GUID
Appendix 2: Sample Scripts
Appendix 3: Certreq.exe Syntax
Appendix 4: Certutil -setextension
Appendix 5: ASN.1 File Structure
Appendix 6: Encoding and Decoding with Hexadecimal, Binary, and Base64
Summary (Advanced Certificate Enrollment and Management)
Related Links (Advanced Certificate Enrollment and Management)
Administering Group Policy with Group Policy Management Console Abstract
Introduction (Administering Group Policy with Group Policy Management Console)
Group Policy Management Console Overview (Administering Group Policy with Group Policy Management Console)
Creating and Editing GPOs
Scoping GPOs
Group Policy Inheritance
Delegating Group Policy (Administering Group Policy with Group Policy Management Console)
Reporting on GPO Settings
GPO Details
GPO Operations
WMI Filters
Searching for GPOs
Group Policy Modeling
Group Policy Results (Administering Group Policy with Group Policy Management Console)
Platform Dependencies
GPMC Options
Internet Explorer Enhanced Security Configuration Considerations
Scripting Group Policy-related Tasks
Related Links (Administering Group Policy with Group Policy Management Console)
Maintaining the MIIS 2003 Database
Overview of Maintaining MIIS 2003
Overview of the SQL Server 2000 Implementation for MIIS 2003
Configuring SQL Server 2000 to Support MIIS 2003
SQL Server 2000 Databases Used by MIIS 2003
SQL Server 2000 Backup Types and Recovery Models
Backup Strategies for Your MIIS Database
Creating a New Backup Device
Scheduling Full Database Backups by Using the Database Maintenance Plan Wizard
Scheduling Differential Database Backups by Using SQL Server Enterprise Manager
Scheduling Backups of the System Databases
Backing Up the MIIS 2003 Encryption Key
Restoring the MIIS Database
Recommendations for Backing Up and Restoring the MIIS Database
Ensuring Failover and High Availability
Monitoring the MIIS Database
Establishing a Performance Baseline
Setting Alerts to Monitor System Events
Additional Ways to Monitor the MIIS Database
Optimizing the MIIS Database
Additional Resources (Maintaining the MIIS 2003 Database)
Network Load Balancing Event Messages
Microsoft Windows 2000 Server and Windows Server 2003 Common NLB Events
Microsoft Windows Server 2003-only NLB Events
Implementing Common Desktop Management Scenarios with the Group Policy Management Console
Introduction (Implementing Common Desktop Management Scenarios with the Group Policy Management Console)
Understanding and Using the Scenarios
Deploying the Scenarios
Configuring Specific Features
Switching Between Scenarios
Extending the Scenarios
Appendix A: GPO Scenario Policy Settings
Appendix B: Running CommonScenarios.msi
Key Archival and Management in Windows Server 2003
Understanding Manual Key Archival
Understanding Automatic Key Archival
Understanding User Key Recovery
Implementing Key Archival Walkthrough
Migrating Exchange KMS to Windows Server 2003 CA
Troubleshooting - Key Archival and Management in Windows Server 2003
Appendix A: Certificate Request Structure
Appendix B: Additional Information
Appendix C: Useful Commands
R2: Operations (R2 only)
ADFS Operations Guide
Administering Active Directory Federation Services
Introduction
Managing ADFS Components
Managing the Federation Service
Managing a Federation Server Farm
Changing the Location of the ADFS Directory
Implementing a Server Farm of Federation Servers
Adding a New Federation Server
Install prerequisite applications
Create a self-signed, token-signing certificate
Export the private key portion of a token-signing certificate
Install the Federation Service on an additional federation server
Configure event logging on a federation server
Removing a Federation Server
Remove an ADFS component
Managing Trust Policy on Federation Servers
Change the Federation Service trust policy location
Change the Federation Service URI
Change the Federation Service endpoint URL
Configure the Federation Service default Web pages
Change the primary display name for a trust policy
Change a claims transform module
Change the token lifetime for a Federation Service
Change the trust policy refresh period
Change the Windows domain trust cache refresh period
Managing Certificates Used by Federation Servers
Managing Token-signing Certificates
Create a self-signed, token-signing certificate
View the current token-signing certificate
Turn CRL checking on or off
Export the public key portion of a token-signing certificate
Export the private key portion of a token-signing certificate
Change the token-signing certificate that a federation server uses
Managing Verification Certificates
Add a verification certificate to the trust policy
Add a verification certificate to an account partner
View the current verification certificate
Remove a verification certificate
Rolling Over a Token-signing Certificate
Create a self-signed, token-signing certificate
Export the public key portion of a token-signing certificate
Export the private key portion of a token-signing certificate
Add a verification certificate to an account partner
Change the token-signing certificate that a federation server uses
Remove a verification certificate
Managing the Federation Service Proxy (Optional)
Managing a Federation Server Proxy Farm
Changing the Location of the ADFS Directory
Adding a New Federation Server Proxy
Install prerequisite applications
Install the Federation Service Proxy on an additional federation server proxy
Export the public key portion of a client authentication certificate
Add a Federation Service Proxy certificate to the trust policy
Configure event logging on a federation server proxy
Removing a Federation Server Proxy
Remove an ADFS component
Remove a Federation Service Proxy (FSP) certificate from the trust policy
Managing Certificates Used by Federation Server Proxies
Managing Client Authentication Certificates
Create a self-signed, token-signing certificate
View the current client authentication certificate
Export the public key portion of a client authentication certificate
Add a Federation Service Proxy certificate to the trust policy
Change the client authentication certificate that a federation server proxy uses
Rolling Over a Client Authentication Certificate
Create a self-signed, token-signing certificate
Export the public key portion of a client authentication certificate
Add a Federation Service Proxy certificate to the trust policy
Change the client authentication certificate that a federation server proxy uses
Remove a Federation Service Proxy (FSP) certificate from the trust policy
Managing ADFS Web Agents and Applications
Installing and Removing ADFS Web Agents
Install the ADFS Web Agent component of ADFS
Remove the ADFS Web Agent component of ADFS
Adding and Configuring a Windows NT Token-based Application
Add a new Windows NT token-based application to the Federation Service
Enable or disable a Web application
Set the cookie path for a Windows NT token-based application
Set the cookie domain for a Windows NT token-based application
Set the Federation Service URL for a Windows NT token-based application
Set the return URL for a Windows NT token-based application
Set the application URL for an application
Configure event logging for a Windows NT token-based application
Configure authentication methods for a federated application
Adding and Configuring a Claims-aware Application
Add a new claims-aware application to the Federation Service
Enable or disable a Web application
Set the Federation Service URL for a claims-aware application
Set the return URL for a claims-aware application
Set the application URL for an application
Set the cookie path for a claims-aware application
Set the cookie domain for a claims-aware application
Configure event logging for a claims-aware application
Configure authentication methods for a federated application
Managing Security for Web Applications
Configure authentication methods for a federated application
Configure the security token protection method for a federated application
Change the token lifetime for an application
Configure a policy page for a Web site
Backing Up ADFS Components
Back up ADFS components on a federation server, federation server proxy, or Web server
Managing ADFS Partnerships
Adding a New Account Partner
Add a new account partner by manually configuring the trust policy
Export an account or resource policy file to a partner organization
Add a new account partner by importing an existing policy file
Adding a New Resource Partner
Add a new resource partner by manually configuring the trust policy
Export an account or resource policy file to a partner organization
Add a new resource partner by importing an existing policy file
Configuring Windows Trust for Account and Resource Partners
Configure an account partner to use Windows trust
Configure a resource partner to use Windows trust
Discontinue Windows trust for an account partner
Discontinue Windows trust for a resource partner
Removing ADFS Partners
Delete an existing account partner
Delete an existing resource partner
Managing Partner Relationships
Enable enhanced identity privacy
Export a generic policy file to a partner organization
Export an account or resource policy file to a partner organization
Enable or disable a resource partner
Enable or disable an account partner
Configure resource account options
Managing Accounts and Account Stores
Enable or disable an account store
Managing Active Directory Account Stores
Add an Active Directory account store
Remove an Active Directory account store
Managing ADAM Account Stores
Prepare an ADAM instance for use with ADFS
Add an ADAM account store
Change the server name or IP address for an ADAM account store
Change the display name for an ADAM account store
Change the port number for an ADAM account store
Change the search base for an ADAM account store
Change the user name attribute for an ADAM account store
Enable or disable TLS and SSL for an ADAM account store
Using Multiple Account Stores
Change account store priority
Change the URI for an ADAM account store
Managing Claims and Claim Mapping
Exposing Account Store Attributes as Claims
Map an organization custom claim to an Active Directory or ADAM user attribute (custom claim extraction)
Map an organization group claim to an ADAM attribute and value (group claim extraction)
Mapping Claims as Part of Application Authorization
Map an organization group claim to an Active Directory group (group claim extraction)
Map an organization group claim to a resource group
Create an incoming group claim mapping
Create an incoming custom claim mapping
Create an outgoing group or custom claim mapping
Change the organization claim mapping of an outgoing group or custom claim
Change the organization claim mapping of an incoming group or custom claim
Creating, Deleting, and Configuring Claims
Create an organization group or custom claim
Delete an organization group or custom claim
Change the auditing limitation for an organization group or custom claim
Configure a claims transform module
Change the domain suffix for an incoming or outgoing e-mail claim
Enable or disable an organization identity claim for an account or resource partner
Troubleshooting Active Directory Federation Services
Verifying ADFS Computer Settings and Connectivity
Configuring ADFS Servers for Troubleshooting
Troubleshooting ADFS Problems
A certificate has been issued to the wrong site
IIS 6.0 Operations Guide
Technical Reference
Windows Server 2003 Technical Reference
A to Z Technologies List
New and Updated Collections
Technologies Collections
Active Directory Collection
Active Directory Application Mode
Active Directory Application Mode Technical Reference
What Is Active Directory Application Mode?
How Active Directory Application Mode Works
Active Directory Application Mode Tools and Settings
Active Directory Structure and Storage Technologies
Domains and Forests Technical Reference
What Are Domains and Forests?
How Domains and Forests Work
Domains and Forests Tools and Settings
Active Directory Schema Technical Reference
What Is the Active Directory Schema?
How the Active Directory Schema Works
Active Directory Schema Tools and Settings
Data Store Technical Reference
What Is the Data Store?
How the Data Store Works
Data Store Tools and Settings
DNS Support for Active Directory Technical Reference
What Is DNS Support for Active Directory?
How DNS Support for Active Directory Works
DNS Support for Active Directory Tools and Settings
Domain Controller Roles
Global Catalog Technical Reference
What Is the Global Catalog?
How the Global Catalog Works
Global Catalog Tools and Settings
Operations Masters Technical Reference
What are Operations Masters?
How Operations Masters Work
Operations Masters Tools and Settings
Active Directory Replication Technologies
Active Directory Replication Model Technical Reference
What Is the Active Directory Replication Model?
How the Active Directory Replication Model Works
Active Directory Replication Tools and Settings
Active Directory Replication Topology Technical Reference
What Is Active Directory Replication Topology?
How Active Directory Replication Topology Works
Active Directory Replication Tools and Settings
Active Directory Search and Publication Technologies
Active Directory Searches Technical Reference
What Are Active Directory Searches?
How Active Directory Searches Work
Active Directory Searches Tools and Settings
Service Publication and Service Principal Names Technical Reference
What Are Service Publication and Service Principal Names?
How Service Publication and Service Principal Names Work
Service Publication and Service Principal Names Tools and Settings
Active Directory Installation, Upgrade, and Migration Technologies
Active Directory Functional Levels Technical Reference
What Are Active Directory Functional Levels?
How Active Directory Functional Levels Work
Active Directory Functional Levels Tools and Settings
Active Directory Installation Wizard Technical Reference
What Is the Active Directory Installation Wizard?
How the Active Directory Installation Wizard Works
Domain Rename Technical Reference
What Is Domain Rename?
How Domain Rename Works
Core Operating System Collection
Printing Technologies
Network Printing Technical Reference
What Is Network Printing?
How Network Printing Works
Network Printing Tools and Settings
Recovery and Reliability Technologies
Recovery Console Technical Reference
What Is Recovery Console?
Recovery Console Tools and Settings
Emergency Management Services Technical Reference
What Is Emergency Management Services?
How Emergency Management Services Works
Emergency Management Services Tools and Settings
Shutdown Event Tracker Technical Reference
What Is Shutdown Event Tracker?
How Shutdown Event Tracker Works
Shutdown Event Tracker Tools and Settings
Backup Technical Reference
What Is Backup?
How Backup Works
Backup Tools and Settings
Shadow Copies for Shared Folders Technical Reference
What Is Shadow Copies for Shared Folders?
How Shadow Copies for Shared Folders Work
Shadow Copies for Shared Folders Tools and Settings
Volume Shadow Copy Service Technical Reference
What Is Volume Shadow Copy Service?
How Volume Shadow Copy Service Works
Volume Shadow Copy Service Tools and Settings
Scalability Factors for Shadow Copies
Device Management Technologies
Device Driver Technical Reference
What Is a Device Driver?
How Device Drivers Work
Device Driver Tools and Settings
Plug and Play Technical Reference
What Is Plug and Play?
How Plug and Play Works
Plug and Play Tools and Settings
Installation and Setup Technologies
Setup Technical Reference
What Is Setup?
How Setup Works
Setup Tools and Settings
Unattended Installation Technical Reference
What Is Unattended Installation?
How Unattended Installation Works
Unattended Installation Tools and Settings
Sysprep Technical Reference
What Is Sysprep?
How Sysprep Works
Sysprep Tools and Settings
Remote Installation Services Technical Reference
What Is Remote Installation Services?
How Remote Installation Services Work
Remote Installation Services Tools and Settings
Group Policy Collection
Core Group Policy Technical Reference
What Is Core Group Policy?
How Core Group Policy Works
Core Group Policy Tools and Settings
Group Policy Components
Administrative Templates Extension Technical Reference
What Is Administrative Templates Extension?
How Administrative Templates Extension Works
Administrative Templates Extension Tools and Settings
Group Policy Software Installation Extension Technical Reference
What Is Group Policy Software Installation Extension?
How Group Policy Software Installation Extension Works
Group Policy Software Installation Extension Tools and Settings
Security Settings Extension Technical Reference
What Is Security Settings Extension?
How Security Settings Extension Works
Security Settings Extension Tools and Settings
IPSec Policy Extension Technical Reference
What Is IPSec Policy Extension?
How IPSec Policy Extension Works
IPSec Policy Extension Tools and Settings
Software Restriction Policies Technical Reference
What Are Software Restriction Policies?
How Software Restriction Policies Work
Software Restriction Policies Tools and Settings
Scripts Extension Technical Reference
What Is Scripts Extension?
How Scripts Extension Works
Scripts Extension Tools and Settings
Wireless Network Policies Extension Technical Reference
What Is Wireless Network Policies Extension?
How Wireless Network Policies Extension Works
Wireless Network Policies Extension Tools and Settings
Folder Redirection Extension Technical Reference
What Is Folder Redirection Extension?
How Folder Redirection Extension Works
Folder Redirection Extension Tools and Settings
Internet Explorer Maintenance Extension Technical Reference
What Is Internet Explorer Maintenance Extension?
How Internet Explorer Maintenance Extension Works
Internet Explorer Maintenance Extension Tools and Settings
Remote Installation Services Extension Technical Reference
What Is Remote Installation Services Extension?
How Remote Installation Services Extension Works
Remote Installation Services Extension Tools and Settings
Group Policy Administrative Tools
Group Policy Management Console Technical Reference
What Is Group Policy Management Console?
How Group Policy Management Console Works
Group Policy Management Console Tools and Settings
Group Policy Object Editor Technical Reference
What Is Group Policy Object Editor?
How Group Policy Object Editor Works
Group Policy Object Editor Tools and Settings
Resultant Set of Policy Technical Reference
What Is Resultant Set of Policy?
How Resultant Set of Policy Works
Resultant Set of Policy Tools and Settings
High Availability and Scalability Collection
Clustering Technologies
Server Clusters Technical Reference
What Is a Server Cluster?
How a Server Cluster Works
Server Cluster Tools and Settings
Network Load Balancing Technical Reference
What Is Network Load Balancing?
How Network Load Balancing Works
Network Load Balancing Tools and Settings
Resource and Memory Management Technologies
4GT Technical Reference
What Is 4GT?
How 4GT Works
4GT Tools and Settings
PAE X86 Technical Reference
What Is PAE X86?
How PAE X86 Works
PAE X86 Tools and Settings
Windows System Resource Manager Technical Reference
What is Windows System Resource Manager?
How Windows System Resource Manager Works
Networking Collection
Core Networking Technologies
TCP/IP Technical Reference
What Is TCP/IP?
How TCP/IP Works
TCP/IP Tools and Settings
IPv6 Technical Reference
What Is IPv6?
How IPv6 Works
IPv6 Tools and Settings
Routing Technologies
Demand Dial Routing Technical Reference
What Is Demand Dial Routing?
How Demand Dial Routing Works
Demand Dial Tools and Settings
IPv4 Multicasting Technical Reference
What Is IPv4 Multicasting?
How IPv4 Multicasting Works
IPv4 Multicasting Tools and Settings
NAT Technical Reference
What Is NAT?
How NAT Works
NAT Tools and Settings
Unicast IPv4 Routing Technical Reference
What Is Unicast IPv4 Routing?
How Unicast IPv4 Routing Protocols and Services Work
How Unicast IPv4 Routing Works
Unicast IPv4 Routing Tools and Settings
Network Monitoring Technologies
SNMP Technical Reference
What Is SNMP?
How SNMP Works
Computer Browser Service Technical Reference
What Is Computer Browser Service?
How Computer Browser Service Works
Name Resolution Technologies
DNS Technical Reference
What Is DNS?
How DNS Works
DNS Tools and Settings
WINS Technical Reference
What Is WINS?
How WINS Works
WINS Tools and Settings
Network Configuration Technologies
DHCP Technical Reference
What Is DHCP?
How DHCP Works
DHCP Tools and Settings
DNS registration changes for Windows Server 2003 based DHCP Servers
Windows Time Service Technical Reference
How the Windows Time Service Works
Windows Time Service Tools and Settings
Network Access Technologies
Connection Manager Technical Reference
What Is Connection Manager?
How Connection Manager Works
Connection Manager Tools and Settings
IAS Technical Reference
What Is IAS?
How IAS Works
IAS Tools and Settings
VPN Technical Reference
What Is VPN?
How VPN Works
VPN Tools and Settings
802.11 Wireless Technical Reference
What Is 802.11 Wireless?
How 802.11 Wireless Works
802.11 Wireless Tools and Settings
Network Interoperability Technologies
RPC Technical Reference
What Is RPC?
How RPC Works
Services for Netware Technical Reference
What Is Services for Netware
How Services for Netware Works
Services for Netware Tools and Settings
Remote Access Technologies
Dial-up Remote Access Technical Reference
What Is Dial-up Remote Access?
How Dial-up Remote Access Works
Dial-up Remote Access Tools and Settings
Telnet Technical Reference
What Is Telnet?
How Telnet Works
Telnet Tools and Settings
Terminal Services Technical Reference
What Is Terminal Services?
How Terminal Services Works
Terminal Services Tools and Settings
Data Streaming and E-mail Technologies
ATM Technical Reference
What Is ATM?
How ATM Works
POP3 Service Technical Reference
What Is POP3 Service?
How POP3 Service Works
POP3 Service Tools and Settings
QoS Technical Reference
What Is QoS?
How QoS Works
QoS Tools and Settings
Network Security Technologies
Windows Firewall Technical Reference
What Is Windows Firewall?
How Windows Firewall Works
Windows Firewall Tools and Settings
Storage Technologies Collection
File Services Technologies
Disk Quotas Technical Reference
What Are Disk Quotas?
How Disk Quotas Work
Disk Quotas Tools and Settings
DFS Technical Reference
What Is DFS?
How DFS Works
DFS Tools and Settings
FRS Technical Reference
What Is FRS?
How FRS Works
FRS Tools and Settings
File Systems Technologies
NTFS Technical Reference
What Is NTFS?
How NTFS Works
NTFS Tools and Settings
FAT Technical Reference
What Is FAT?
How FAT Works
FAT Tools and Settings
Disk Defragmenter Technical Reference
What Is Disk Defragmenter?
How Disk Defragmenter Works
Disk Defragmenter Tools and Settings
Disks and Volumes
Basic Disks and Volumes Technical Reference
What Are Basic Disks and Volumes?
How Basic Disks and Volumes Work
Basic Disks and Volumes Tools and Settings
Dynamic Disks and Volumes Technical Reference
What Are Dynamic Disks and Volumes?
How Dynamic Disks and Volumes Work
Dynamic Disks and Volumes Tools and Settings
Storage Services Technologies
Virtual Disk Service Technical Reference
What Is Virtual Disk Service?
How Virtual Disk Service Works
Virtual Disk Service Tools and Settings
Remote Storage Technical Reference
What Is Remote Storage?
How Remote Storage Works
Remote Storage Tools and Settings
Removable Storage Technical Reference
What Is Removable Storage?
How Removable Storage Works
Removable Storage Tools and Settings
Windows Security Collection
Logon and Authentication Technologies
Digest Authentication Technical Reference
What is Digest Authentication?
How Digest Authentication Works
Digest Authentication Tools and Settings
Interactive Logon Technical Reference
What is Interactive Logon?
How Interactive Logon Works
Interactive Logon Tools and Settings
Kerberos Authentication Technical Reference
What Is Kerberos Authentication?
How the Kerberos Version 5 Authentication Protocol Works
Kerberos Authentication Tools and Settings
TLS/SSL Technical Reference
What is TLS/SSL?
How TLS/SSL Works
TLS/SSL Tools and Settings
Authorization and Access Control Technologies
Security Descriptors and Access Control Lists Technical Reference
What Are Security Descriptors and Access Control Lists?
How Security Descriptors and Access Control Lists Work
Security Descriptors and Access Control Lists Tools and Settings
Access Tokens Technical Reference
What Are Access Tokens?
How Access Tokens Work
Access Tokens Tools and Settings
Permissions Technical Reference
What Are Permissions?
How Permissions Work
Permissions Tools and Settings
Security Principals Technical Reference
What Are Security Principals?
How Security Principals Work
Security Principals Tools and Settings
Security Identifiers Technical Reference
What Are Security Identifiers?
How Security Identifiers Work
Security Identifiers Tools
Data Security Technologies
Encrypting File System Technical Reference
What is Encrypting File System?
How Encrypting File System Works
Encrypting File System Tools and Settings
IPSec Technical Reference
What Is IPSec?
How IPSec Works
IPSec Tools and Settings
PKI Technologies
CA Certificates Technical Reference
Certificates Technical Reference
Certificate Services Technical Reference
Trust Technologies
Domain and Forest Trusts Technical Reference
What Are Domain and Forest Trusts?
How Domain and Forest Trusts Work
Domain and Forest Trust Tools and Settings
Security Considerations for Trusts
Tools and Settings Collection
Windows Support Tools
Notational Conventions
Procedural Conventions
Related Information on the Internet
New and Removed Tools
Alphabetical List of Tools
Active Directory Management Support Tools
Acldiag.exe
Adsiedit.msc
Clonepr
Dsacls.exe
Dsastat.exe
Ldp.exe
Movetree.exe
Ntfrsutl.exe
Repadmin.exe
Replmon.exe
Sdcheck.exe
Search.vbs
Setspn.exe
Disk and Data Management Support Tools
Connstat.cmd
Devcon.exe
Dfsutil.exe
Dmdiag.exe
Dskprobe.exe
Ftonline.exe
Health_chk.cmd
Iologsum.cmd
Rsdiag.exe
Rsdir.exe
Topchk.cmd
File and Folder Management Support Tools
Bindiff.exe
Bitsadmin.exe
Cabarc.exe
Depends.exe
Diruse.exe
Efsinfo.exe
Filever.exe
Msizap.exe
Showaccs.exe
Spcheck.exe
Windiff.exe
Hardware Management Support Tools
Internet Services Management Support Tools
Httpcfg.exe
Httpcfg Remarks
Httpcfg Examples
Httpcfg Syntax
Network Services Management Support Tools
Browstat.exe
Dcdiag.exe
Dhcploc.exe
Dnscmd.exe
Dnslint.exe
Getsid.exe
Iasparse.exe
Netcap.exe
Netdiag.exe
Netdom.exe
Nltest.exe
Portqry.exe
Performance Monitoring Support Tools
Exctrlst.exe
Gflags.exe
Pviewer.exe
Printer and Fax Management Support Tools
Process and Service Management Support Tools
Memsnap.exe
Poolmon.exe
Remote Administration Support Tools
Remote.exe
Security Management Support Tools
Ksetup.exe
Ktpass.exe
Sidwalk.exe
Sidwalker Security Administration Tools
Sidwkr.dll
Xcacls.exe
Software and System Deployment Support Tools
Addiag.exe
System Management Support Tools
Glossary
Security Policy Settings
Account Policies
Local Policies
Event Log
Restricted Groups
System Services
Registry
File System
Wireless Network (IEEE 802.11) Policies
Public Key Policies
Software Restriction Policies
IP Security Policies on Active Directory
Windows Firewall Settings
Windows Firewall Settings: Optional Components
Windows Firewall Settings: Remote Administration Tools
Windows Firewall Settings: Server Roles
Windows Firewall Settings: Services
IIS 6.0 Technical Reference
Product Help
Security and Protection
Auditing
Authorization and Access Control
Authorization Manager
Kerberos Authentication
Logon and Authentication
Public Key Infrastructure
Security Configuration Wizard
Security Policy
Smart Cards
Windows Server 2003 Glossary

No comments:

Post a Comment