Information Technology Reference
In-Depth Information
local GPOs A Group Policy Object that's stored on local comput-
ers and can be edited by the Group Policy Object Editor snap-in.
object A grouping of information that describes a network
resource, such as a shared printer, or an organizing structure, such
as a domain or an OU.
local group A group created in the local SAM database on a
member server or workstation or a stand-alone computer.
octet An 8-bit value; a number from 0 to 255 that's one of the
four numbers found in a dotted decimal IP address.
local profile A user profile stored on the same system where the
user logs on.
offline defragmentation Defragmentation of the Active
Directory database that also compacts the database to improve per-
formance. The Active Directory service must be stopped before
offline defragmentation can occur.
local user account A user account defined on a local computer
that's authorized to access resources only on that computer. Local
user accounts are mainly used on stand-alone computers or in a
workgroup network with computers that aren't part of an Active
Directory domain.
one-way trust A trust relationship in which one domain trusts
another, but the reverse is not true.
mandatory profile A user profile that can be changed during a
user's logon session, but the next time the user logs on, the changes
aren't saved, and the profile reverts to its original state.
online defragmentation Defragmentation of the Active
Directory database that removes deleted objects and frees up space
in the database but doesn't compact the database. Online defrag-
mentation occurs automatically when Active Directory performs
garbage collection.
online responder (OR) A role service that enables clients to
check a certificate's revocation status without having to download
the certificate revocation list (CRL).
operations master A domain controller with sole responsibility
for certain domain or forestwide functions.
organizational unit (OU) An Active Directory container used
to organize a network's users and resources into logical administra-
tive units.
patches Software updates normally intended to fix security vul-
nerabilities and software bugs.
member server A Windows server that's in the management
scope of a Windows domain but doesn't have Active Directory
installed.
metric A value assigned to the gateway based on the speed of the
interface used to access the gateway.
multimaster replication The process for replicating Active
Directory objects in which changes to the database can occur on
any domain controller and are propagated, or replicated, to all
other domain controllers.
network client The part of the OS that sends requests to a
server to access network resources.
network connection An icon in the Network Connections
window that shows the components needed for the computer to
connect to a network.
permission inheritance The process of transmitting permis-
sions from a parent object to a child object.
Network Device Enrollment Service (NDES) A service that
allows network devices, such as routers and switches, to obtain cer-
tificates by using Simple Certificate Enrollment Protocol (SCEP), a
Cisco proprietary protocol.
permissions Settings that define which resources users can access
and what level of access they have to resources.
Ping A utility used to test network connectivity and IP address
configuration.
network discovery The process whereby a computer finds other
computers on a network and allows other computers to find it.
piping Sending the output of one command as input to another
command.
network map A graphical view of the network from your com-
puter's perspective. It includes your computer, the networks to
which your computer is connected, other devices on the network,
and the Internet.
primary zone A DNS zone containing a read/write master copy
of all resource records for the zone; this zone is authoritative for
the zone.
public key infrastructure (PKI) A security system that binds a
user's or device's identity to a cryptographic key that secures data
transfer with encryption and ensures data authenticity with digital
certificates.
network protocol Software that specifies the rules and format
of communication between devices on a network.
network provider A software component that allows Windows
applications to connect to resources on other computers.
read only domain controller (RODC) A new feature of Active
Directory Domain Services in Windows Server 2008, an RODC
provides the same authentication and authorization services as a
standard domain controller, but administrators can't make changes
on an RODC directly.
network server software The part of the OS that receives
requests for shared network resources and makes those resources
available to a network client.
New Technology File System (NTFS) A file system used on
Windows OSs that supports compression, encryption, and fine-
tuned permissions.
realm trust A trust used to integrate users of other OSs into a
Windows Server 2008 domain or forest; requires the OS to be run-
ning Kerberos V5 authentication.
nonauthoritative restore A method of restoring Active
Directory data from a backup that restores the database, or por-
tions of it, and allows the data to be updated through replication
by other domain controllers.
recursive query A query in which the DNS server processes the
query until it responds with an address that satisfies the query or
with an “I don't know” message. The process might require the
DNS server to query several additional DNS servers.
NTFS permissions Permissions set on folders or files on an
NTFS-formatted volume. NTFS permissions protect both network
and interactive file access.
referral A response to an iterative query in which the address of
another name server is returned to the requester.
Search WWH ::




Custom Search