... editing an existing template and then saving it as a new template. Module 8: Implementing Security in a Windows 2000 Network 9 What Is Security Configuration and Analysis? ? Analyze System Security ... Configuring and Analyzing System Security Configuring and Analyzing System Security Configuring and Analyzing System Security Set Up a Security Database Set Up...
...
that the administrator uses.
Note
Module 2: Strategies for Administering a Windows 2000 Network 9
Installing Windows 2000 Snap-Ins
Snap-Ins:
? Are Contained in Windows 2000 Administrative ... Tools
(Adminpak.msi)
Windows 2000
Administration Tools
(Adminpak.msi)
Install
Install
Install
Administer
Administer
Administer
Windows 2000 Administration Tools i...
... Introduction to Managing a Windows 2000 Network
Domains
!
A domain is a security boundary
# A domain administrator can administer only within the
domain, unless explicitly granted administration ...
organizational units in Active
Directory.
Lead -in
An organizational unit is a
container in which you
organize objects in a
domain.
14 Module 1: Introdu...
... as objects in a centralized database, Active Directory enables a
single administrator to centrally manage and administer these resources.
?? Active Directory contains attributes and information ... locations of
these resources.
8 Module 1: Introduction to Advanced Administration of a Windows 2000 Network
Delegating Administrative Control
Domain
OU1
OU2
OU3
Admin1
Adm...
...
The link state table is a collection of all connectors, and their status, in an
Exchange 2000 organization. Each server running Exchange 2000 maintains a
copy of the link state table and uses ... a route using the latest information
from the link state table so that messages are not routed along a path
containing a failed link.
!
The link state algorithm eliminates mess...
...
Additionally, users that are authenticated by Basic authentication must log on
by using a valid Windows user name and password. The user name usually
includes a Windows domain name and an account ... all users that are authenticated by Basic
authentication.
Network
The Network group is a built -in, automatically maintained group in
Windows 2000 that consists of all us...
... WINS server accesses all indexed sequential access method (ISAM)
database. The ISAM database is a replicated database that contains NetBIOS computer names and
IP address mappings. For a WINS ... database that is administered
as a single, separate entity. It can consist of a single domain or a domain with subdomains. The
lower-level subdomains of a zone can also be split into s...
... relational
database engine of the WINS server accesses all indexed sequential access method (ISAM)
database. The ISAM database is a replicated database that contains NetBIOS computer names and ... stand-
alone subordinate CAs or enterprise subordinate CAs. A stand-alone CA has a simple default
policy module. It does not store any information remotely.
Installing a Stand-Alone S...
... they are constantly
evolving, protecting your network against them requires implementing and administer-
ing an update management infrastructure. More dangerous attacks are launched by
malicious, ... that students meet the following prerequisites:
■ Have a solid understanding of networking fundamentals.
■ Have at least one year of experience implementing and administering a Win...
... relational database engine of the WINS server accesses an indexed se-
quential access method (ISAM) database. The ISAM database is a replicated database
that contains NetBIOS computer names and IP address ... Install a Subordinate Enterprise CA that uses a commercial CA as the parent.
139.
Your company receives faxes via a Windows 2000 Server computer that has a
modem installe...