A |
ADMINISTER command line interface #1
|
ADMINISTER command line interface #2
|
Advanced Server
|
desktop interoperability
|
down-level interoperability
|
Event Viewer tool
|
introduction to
|
license management
|
management interfaces
|
monitoring and tracking network activity
|
network browsing services
|
network file and printer sharing
|
OpenVMS system integration
|
overview
|
platform and application independence
|
printing features
|
remote network management
|
security
|
server configuration
|
transports and protocols
|
troubleshooting
|
upgrading V4 and V5 servers
|
user environment management
|
See logon scripts
|
Advanced Server for DIGITAL UNIX servers
|
domain controller considerations
|
Allowing guest access
|
Allowing users access
|
from other domains
|
to LAN Manager servers
|
Assigning permissions and rights
|
Auditing
|
categories of events, table of
|
directories
|
security, tracking
|
types of directory and files, table of
|
user actions
|
Authentication
|
pass-through
|
Autoshares
|
B |
Backup domain controller
|
defined
|
Browsing domains
|
Built-in global groups #1
|
Built-in global groups #2
|
categories of
|
table of
|
using
|
Built-in local groups
|
Account Operators
|
Administrators
|
Backup Operators
|
defined
|
Guests
|
Print Operators
|
Built-in local groups
|
rights and abilities, table
|
Built-in local groups
|
Server Operators
|
table of
|
Users
|
using
|
Built-in user accounts
|
administrator
|
guest
|
C |
Complete trust model
|
advantages and disadvantages, table of
|
description
|
example of domain configuration
|
example of network security configuration
|
D |
Directories
|
auditing
|
connecting to shared
|
home directories, description
|
overview
|
ownership
|
permissions, setting
|
sharing
|
Discretionary access control
|
Domain controller
|
Advanced Server
|
Domain controller
|
Advanced Server
|
Advanced Server for DIGITAL UNIX
|
backup
|
LAN Manager V2.x servers
|
primary
|
Windows NT Server #1
|
Windows NT Server #2
|
Domains
|
complete trust model
|
description
|
figure of
|
master domain model
|
multiple master domain model #1
|
multiple master domain model #2
|
operator groups, setting up
|
security overview
|
single domain model
|
Windows 95 and Windows 98, running with
|
Windows for Workgroups, running with
|
Windows, MS-DOS, OS/2, running with #1
|
Windows, MS-DOS, OS/2, running with #2
|
Windows NT computers, running with
|
worksheet
|
Drive letters, assigning
|
F |
File ownership
|
File sharing
|
access, controlling #1
|
access, controlling #2
|
auditing
|
connecting to shared resources
|
permissions, setting
|
with MS-DOS users
|
with network users
|
with network users
|
G |
Global groups
|
built-in
|
defined
|
differences between global and local
|
figure of
|
purpose, table of
|
Groups
|
Account Operators
|
Administrators
|
assigning permissions and rights
|
Backup Operators
|
built-in global, defined
|
built-in local
|
built-in local, defined
|
contents of local and global, table of
|
defined
|
Domain Admins
|
Domain Guests
|
Domain Users
|
Guest
|
limit in LAN Manager
|
local group, defined
|
Print Operators
|
Server Operators
|
server-specific
|
worksheet
|
Guest account
|
defined
|
Guest account
|
enabling
|
H |
Home directory
|
L |
LAN Manager V2.x servers
|
as a domain controller
|
LAN Manager V2.x servers
|
interoperability with
|
LANMAN.INI file
|
Licenses, managing
|
Licensing access to Advanced Server
|
Local groups
|
built-in
|
defined #1
|
defined #2
|
differences between global and local
|
figure of
|
purpose, table of
|
user rights
|
Local groups
|
using
|
Logging on
|
as system administrator
|
at MS-DOS computers
|
at OS/2 computers
|
at Windows 95 or Windows 98 computers
|
at Windows computers
|
authentication
|
Logon scripts
|
defined
|
M |
Managing print jobs
|
Master domain model
|
advantages and disadvantages
|
description
|
Master domain model
|
example of domain configuration
|
example of network security configuration
|
MS-DOS computers
|
domain
|
file sharing considerations
|
Multiple domain networks
|
Multiple master domain model
|
advantages and disadvantages
|
description
|
example of domain configuration
|
example of network security configuration
|