Tài liệu Windows 7 Resource Kit- P35 docx

50 519 0
Tài liệu Windows 7 Resource Kit- P35 docx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

BranchCache  A new feature of Windows and Windows Server 2008 R2 that improves the responsiveness of intranet applications for remote offices while simultaneously reducing WAN utilization BranchCache keeps a local copy of data that clients access from remote Web and file servers The cache can be placed on a hosted server located in the branch office, or it can reside on users’ individual computers If another client requests the same file, the client downloads it across the LAN without having to retrieve it over the WAN BranchCache ensures that only authorized clients can access requested data, and it is compatible with secure data retrieval over SSL or IPsec buffer overflow  An attack that submits larger or longer values than an application or API is designed to process build  In the context of MDT 2010, the association of source files from the distribution share with a configuration See also Microsoft Deployment Toolkit 2010 (MDT 2010) C catalog  The system index together with the property cache catalog file  A binary file that contains the state of all settings and packages in a Windows image central store  In the context of Group Policy, a location for storing administrative templates for use throughout an organization Only Windows Vista and later versions support using a central store channel  In Meeting Space, the basis for communication between participants in a meeting There are three kinds of Meeting Space channels: metadata, file, and streaming The term channel can also refer to an application-specific event log cloud  In peer-to-peer networks, a grouping of computers that uses addresses of a specific scope A scope is an area of the network over which the address is unique CNG services  See Crypto Next Generation (CNG) services Code Integrity  A feature of Windows that detects changes to system files and drivers compatibility layer  A feature of Protected mode in Windows Internet Explorer that redirects requests for protected resources (such as the user’s Documents folder) to safe locations (such as the Temporary Internet Files folder) component store  A portion of an operating system image that stores one or more operating system features or language packs configuration pass  A phase of Windows installation in which different parts of the operating system are installed and configured You can specify unattended installation settings to be applied in one or more configuration passes configuration set  A file and folder structure containing files that control the preinstallation process and define customizations for the Windows installation Confirmation Identifier  A digitally signed value returned by a Microsoft clearinghouse to activate a system core application  An application that is common to most computers in your organization, such as a virus scanner or a management agent Crypto Next Generation (CNG) services  An extensible cryptographic configuration system that replaces the CryptoAPI of Windows XP and earlier versions Clear key  A key stored unencrypted on the disk volume This key is used to freely access the VMK and, in turn, the FVEK if BitLocker protection is disabled but disk volume remains encrypted Cryptographic Service Provider (CSP)  An infrastructure that developers can use to create applications that use cryptographic functions such as encryption, hashes, and digital signatures client-side cache (CSC)  A Microsoft internal term referring to Offline Files CSC  See client-side cache (CSC) CSP  See Cryptographic Service Provider (CSP) Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 1653 D data store  In deployment, the location in which the USMT stores a user state between the time it is read from the original computer and the time it is deployed to the target computer defense-in-depth  A proven technique of layered protection that reduces the exposure of vulnerabilities For example, you might design a network with three layers of packet filtering: a packet-filtering router, a hardware firewall, and software firewalls on each of the hosts (such as Internet Connection Firewall) If an attacker manages to bypass one or two of the layers of protection, the hosts are still protected Deploying Phase  In deployment, this is the phase in which computers are actually set up and configured Additionally, in this phase the deployment team verifies that deployed computers are stable and usable Deployment Image Servicing and Management (DISM)  A new command-line tool introduced in Windows that can be used to service a Windows image or to prepare a Windows PE image It replaces Package Manager (Pkgmgr.exe), PEImg, and Intlcfg, which were included in Windows Vista The functionality that was included in these tools is now consolidated in DISM, and new functionalities have been added to improve the experience for offline servicing Desktop Windows Manager (DWM)  A feature of Windows that performs desktop composition to enable visual effects such as glass window frames, threedimensional window transition animations, Windows Flip and Windows Flip3D, and high-resolution support destination computer  The computer on which you install Windows during deployment You can either run Windows Setup on the destination computer or copy a master installation onto the destination computer developing phase  In deployment, the period during which the team builds and unit-tests the solution DirectAccess  A new feature of Windows and have an Internet connection, without requiring a VPN connection DirectAccess also enhances the security and flexibility of the corporate network infrastructure, enabling IT professionals to remotely manage and update corporate computers whenever they connect to the Internet—even when users are not logged in directory junction  A technique for redirecting requests for a specific folder to a different location Directory junctions are used to provide backward compatibility for folder locations used in earlier versions of Windows discoverable  A state in which a Bluetooth-enabled device sends out radio signals to advertise its location to other devices and computers DLL  See dynamic-link library (DLL) DNS Security Extensions (DNSSEC)  An Internet standard supported by Windows and Windows Server 2008 R2 that enables computers to authenticate DNS servers, which mitigates man-in-the-middle attacks A man-in-the-middle attack redirects clients to a malicious server, which can allow an attacker to intercept passwords or confidential data DNSSEC  See DNS Security Extensions (DNSSEC) DWM  See Desktop Windows Manager (DWM) Dynamic Driver Provisioning  A new feature of Windows Deployment Services in Windows Server 2008 R2 that stores drivers in a central location, which saves IT professionals time by not requiring operating system images to be updated when new drivers are required (for example, when the IT department buys different hardware) Drivers can be installed dynamically based on the Plug and Play IDs of a PC’s hardware or as predetermined sets based on information contained in the BIOS dynamic-link library (DLL)  A file containing executable code that programs can run Multiple programs can reference a single DLL, and a single program might use many different DLLs Windows Server 2008 R2 that increases the productivity of remote users by enabling them to seamlessly and securely access the corporate network any time they 1654 Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark E envisioning phase  The phase in a MDT 2010 deployment in which management creates teams, performs an assessment of existing systems and applications, defines business goals, creates a vision statement, defines scope, creates user profiles, develops a solution concept, creates risk-assessment documents, writes a project structure, and approves milestones See also Microsoft Deployment Toolkit 2010 (MDT 2010) escalated Remote Assistance (RA)  See solicited Remote Assistance (RA) expert  In a Remote Assistance scenario, the user who provides help Also known as a helper F feature team  In the context of MDT 2010, a crossorganizational team that focuses on solving a particular problem such as security See also Microsoft Deployment Toolkit 2010 (MDT 2010) feature team guide  In the context of MDT 2010, a document that addresses the tasks required of a specific feature team See also Microsoft Deployment Toolkit 2010 (MDT 2010) Federated Search  A new feature of Windows and Windows Server 2008 R2, based on the OpenSearch protocol, which enables users to search remote data sources from within Windows Explorer The goal of Federated Search is not to replace server repositories, like Microsoft Office SharePoint Server, but to enable these repositories to expose their search capabilities through Windows and thus get more value out of the repositories for users file sharing  The process of making files or folders available to more than one user folder redirection  A technique for configuring computers to access user profile data from an alternate location Folder redirection is commonly used to store user documents and data files on a shared folder ForceGuest  A common term for one of the network access models used by Windows XP that requires all network users to be treated as guests Beginning with Windows Vista, however, ForceGuest is no longer a supported setting; turning this setting on is not recommended Full Volume Encryption Key (FVEK)  The algorithmspecific key used to encrypt (and optionally, diffuse) data on disk sectors Currently, this key can vary from 128 bits through 512 bits The default encryption algorithm used on disk volumes is AES 128 bit with Diffuser FVEK  See Full Volume Encryption Key (FVEK) G gadget  A mini-application that can almost anything, including show news updates, display a picture slideshow, or show weather reports GPT  See GUID Partition Table (GPT) Group Policy preferences  Lets you manage drive mappings, registry settings, local users and groups, services, files, and folders without the need to learn a scripting language You can use preference items to reduce scripting and the number of custom system images needed, standardize management, and help secure your networks By using preference item-level targeting, you can streamline desktop management by reducing the number of GPOs needed GUID Partition Table (GPT)  A new disk-partitioning technology that offers several advantages over MBR, including support for larger partitions and up to 128 partitions on a single disk H HAL  See Hardware Abstraction Layer (HAL) Hard-Link Migration  A new feature of the USMT for Windows that enables customers to install Windows Vista or Windows on an existing computer while retaining data locally on that computer during operating system installation forced guest  See ForceGuest Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 1655 Hardware Abstraction Layer (HAL)  A feature of Windows that simplifies how the operating system accesses hardware by providing a single interface that behaves identically across different platforms helper  See expert high-volume deployment  A deployment project that involves a large number of computers HomeGroup  A new networking feature of Windows that makes it easier to share files and printers on a home network You can share pictures, music, videos, documents, and printers with other people in your HomeGroup Other people can't change the files that you share unless you give them permission to so hybrid image  An imaging strategy that combines thick and thin images In a hybrid image, you configure the disk image to install applications on first run, giving the illusion of a thick image but installing the applications from a network source Hybrid images have most of the advantages of thin images However, they aren’t as complex to develop and not require a software distribution infrastructure They require longer installation times, however, which can raise initial deployment costs I ICMP  See Internet Control Message Protocol (ICMP) IFilter  A feature of the Windows search engine that is used to convert documents in different formats into plain text so they can be indexed IFilters are also responsible for extracting a number of formatdependent properties such as Subject, Author, and Locale Microsoft provides IFilters for many common document formats by default, while third-party vendors such as Adobe provide their own IFilters for indexing other forms of content IID  See Installation Identifier (IID) image-based setup  A setup process based on applying a disk image of an operating system to the computer in profile sharing  Sharing a file or folder from within your user profile Also known as in place sharing InPrivate Browsing  Prevents Windows Internet Explorer from storing data about your browsing session InPrivate Filtering  Helps prevent Web site content providers from collecting information about sites you visit Installation Identifier (IID)  A code generated by combining a system’s hardware ID (created by scanning the system hardware) and the product ID (derived from the Windows installation) This code is transmitted to a Microsoft activation clearinghouse during system activation installation image  An operating system image that can be installed on a computer Unlike boot images, installation images cannot be booted directly from the image and must be deployed to a computer before running IntelliMirror  A set of change and configuration management features based on Active Directory Domain Services that enables management of user and computer data and settings, including security data IntelliMirror also provides a limited ability to deploy software to workstations or servers running Microsoft Windows 2000 and later versions Internet Control Message Protocol (ICMP)  A Layer protocol that IP applications use to test connectivity and communicate routing changes ICMP is most commonly used by the Ping tool IPConfig  A command-line tool that displays the current network configuration J Jump List  A list of recent items, such as files, folders, or Web sites, organized by the program that you use to open them In addition to being able to open recent items using a Jump List, you can also pin favorites to a Jump List so that you can quickly get to the items that you use every day in place sharing  See in profile sharing 1656 Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark K Kernel mode  A processing mode provided by x86-based processors that provides processes with unrestricted access to memory and other system resources Beginning with Windows Vista, only system features and trusted drivers should run in Kernel mode Key Management Service (KMS)  An infrastructure that simplifies tracking product keys in enterprise environments KMS  See Key Management Service (KMS) local user profile  The default approach for storing user profiles in Windows in which the user profile is stored on the computer’s hard disk location-aware printing  A new feature of Windows and Windows Server 2008 R2 that makes the Default Printer setting location aware Mobile and laptop users can set a different default printer for each network to which they connect They may have a default printer set for home use and a different default printer set for the office Their computers can now automatically select the correct default printer depending on where the users are currently located known folders  Windows user profile folders that can be redirected with Folder Redirection LTI  See Lite Touch Installation (LTI) L M legacy mode  A Windows Deployment Services mode that uses OSChooser and Riprep (sector-based) images This mode is compatible with RIS Moving from RIS-only functionality to legacy mode happens when you install the Windows Deployment Services update on a server that is running RIS MAK  See Multiple Activation Key (MAK) library  A virtual container for users’ content A library can contain files and folders stored on the local computer or in a remote storage location In Windows Explorer, users interact with libraries in a way similar to the way they would interact with other folders Libraries are built upon the known folders (such as My Documents, My Pictures, and My Music) that users are familiar with, and these known folders are automatically included in the default libraries and set as the default save location malware  A term that describes a broad range of malicious software, including viruses, worms, Trojan horses, spyware, and adware managed service account  A new feature of Windows and Windows Server 2008 R2 that allows administrators to create a class of domain accounts that can be used to manage and maintain services on local computers Mandatory Integrity Control (MIC)  A model in which lower-integrity processes cannot access higher-integrity processes The primary integrity levels are Low, Medium, High, and System Windows assigns to each process an integrity level in its access token Securable objects such as files and registry keys have a new mandatory ACE in the system ACL Lite Touch Installation (LTI)  A deployment option in MDT 2010 that deploys client computers with little human interaction An alternative deployment option, ZTI, deploys client computers with no human interaction, but that requires more preparation and engineering time beforehand Therefore, LTI is more appropriate for environments that deploy fewer computers See also Microsoft Deployment Toolkit 2010 (MDT 2010), Zero Touch Installation (ZTI) mandatory label  An ACE used by MIC local sharing  The process of making files and folders available to other users on the same computer Also known as same computer sharing master computer  A fully assembled computer containing a master installation of Windows mandatory user profile  A user profile that cannot be modified by the user Mandatory user profiles are useful for ensuring consistent desktop environments Master Boot Record (MBR)  The most common disk partition system, MBR is supported by every version of Windows Gradually, MBRs are being replaced by GPTs See also GUID Partition Table (GPT) Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 1657 master image  A collection of files and folders (sometimes compressed into one file) captured from a master installation This image contains the base operating system as well as additional configurations and files master index  A single index formed by combining shadow indexes by using a process called the master merge See also master merge master installation  A Windows installation on a master computer to be captured as a master image You create the master installation by using automation to ensure a consistent and repeatable configuration each time See also master computer, master image master merge  The process of combining index fragments (shadow indexes) into a single content index called the master index See also master index MBR  See Master Boot Record (MBR) MBSA  See Microsoft Baseline Security Analyzer (MBSA) MBSACLI  See Microsoft Baseline Security Analyzer Command Line Interface (MBSACLI) MIC  See Mandatory Integrity Control (MIC) Microsoft Baseline Security Analyzer (MBSA)  A free tool available for download from Microsoft.com that administrators can use to scan computers for security vulnerabilities and missing security updates Microsoft Baseline Security Analyzer Command Line Interface (MBSACLI)  A command-line interface for MBSA, which administrators can use to scan computers for security vulnerabilities and missing security updates from scripts See also Microsoft Baseline Security Analyzer (MBSA) Microsoft Deployment Toolkit 2010 (MDT 2010)  An SA that enables rapid deployment of Windows 7, Windows Server 2008 R2, Windows Vista SP1, Windows Server 2008, Windows XP SP3, and Windows 2003 SP2 MDT 2010 provides unified tools, scripts, and documentation for desktop and server deployment using an integrated deployment console called the Deployment Workbench 1658 Glossary mixed mode  A Windows Deployment Services mode that supports both OSChooser and Windows PE for boot environments and Riprep and ImageX imaging Moving from legacy mode to mixed mode happens when you configure Windows Deployment Services and add wim image files to it Multicast Multiple Stream Transfer  A new feature of Windows Deployment Services in Windows Server 2008 R2 that enables you to more efficiently deploy images to multiple computers across a network Instead of requiring separate direct connections between deployment servers and each client, it enables deployment servers to send image data to multiple clients simultaneously Windows includes an improvement that allows servers to group clients with similar network bandwidth and stream at different rates to each group so that total throughput is not limited by the slowest client Multiple Activation Key (MAK)  A limited-use product key that can be used to activate Windows on multiple computers N name resolution  The process of converting a host name to an IP address NAP  See Network Access Protection (NAP) native mode  A Windows Deployment Services mode that supports only the Windows PE boot environment and ImageX image files The final move to native mode occurs after you have converted all legacy images to the wim image file format and disabled the OSChooser functionality Nbtstat  A command-line tool used to display NetBIOS networking information including cached NetBIOS computer names Net  A command-line tool used to perform a variety of networking tasks including starting and stopping services, sharing resources, and connecting to shared resources Netstat  A command-line tool used to display networking statistics Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark Network Access Protection (NAP)  A feature supported by Windows Vista and later versions that uses network authentication to validate the identity and integrity of client computers before they are allowed to connect to the network Network Monitor  A graphical tool that administrators can use to capture and analyze network communications Network Sharing  The process of making a folder available across the network New Computer scenario  In MDT 2010, a deployment scenario that deploys the operating system and applications to a computer that has not been previously configured and therefore contains no user data See also Microsoft Deployment Toolkit 2010 (MDT 2010) nondestructive imaging  A deployment technique supported by ImageX and Windows Setup in which an operating system image is deployed without destroying the existing data novice  In a Remote Assistance (RA) scenario, the user seeking assistance Nslookup  A command-line tool used to test DNS name resolution O OEM  See Original Equipment Manufacturer (OEM) offered Remote Assistance (RA)  See unsolicited Remote Assistance (RA) Office Genuine Advantage (OGA)  An initiative that tracks the product keys from licensed versions of Microsoft Office programs to ensure that they are not reused on other computers Users who validate their copies of Microsoft Office products gain access to add-ins and updates to those products offline  In the context of preparing an image for deployment, when the operating system is not started and changes or updates are made directly to the image Offline Files  A feature of Windows that locally stores a copy of a file located on a shared folder Windows can then access the local copy of the file if the user needs it while disconnected from the network Windows includes technology for synchronizing Offline Files that have been modified and resolving synchronization conflicts OGA  See Office Genuine Advantage (OGA) online  In the context of preparing an image for deployment, when the operating system is started and changes or updates are made while Windows is running Original Equipment Manufacturer (OEM)  An organization that designs and manufactures computer hardware P P2P  See peer-to-peer (P2P) package  A group of files that Microsoft provides to modify Windows features Package types include service packs, security updates, language packs, and hotfixes panning hand  A specialized cursor that enables dragging a page PatchGuard  Microsoft’s kernel patch protection technology for 64-bit versions of Windows that is designed to prevent unauthorized and unsupported access to the kernel It prohibits all software from performing unsupported patches PathPing  A command-line tool used to test connectivity to an endpoint PathPing collects connectivity statistics for every gateway between the client and the tested endpoint and displays latency and availability statistics for every node PCR  See platform configuration register (PCR) Peer Name Resolution Protocol (PNRP)  A mechanism for distributed, serverless name resolution of peers in a P2P network See also peer-to-peer (P2P) peer-to-peer (P2P)  A method for communicating directly between client computers without involving a separate server In Windows Vista and later versions, P2P refers to a set of networking and collaboration technologies that are used by Windows Meeting Space and other applications Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 1659 pen flick  A Tablet PC pen technique that enables users to call menu commands by moving the pen using various gestures hash of all values that are loaded to it To learn when these registers are reset, refer to the TCG specification document See also Trusted Platform Module (TPM) People Near Me  A subnet-level system that enables users who are signed on to this service to automatically publish their availability onto the local subnet and discover other users using the Web Services Dynamic Discovery (WS-Discovery) protocol Once users are published using People Near Me, they can be invited to start activities such as Windows Meeting Space PNRP  See Peer Name Resolution Protocol (PNRP) personal identification number (PIN)  This is an administrator-specified secret value that must be entered each time the computer starts (or resumes from hibernation) The PIN can have to 20 digits and internally is stored as a 256-bit hash of the entered Unicode characters This value is never displayed to the user in any form or for any reason The PIN is used to provide another factor of protection in conjunction with TPM authentication See also Trusted Platform Module (TPM) phishing  A form of Internet fraud that aims to steal valuable information such as credit cards, Social Security numbers, user IDs, and passwords A fake Web site is created that is similar to that of a legitimate organization, typically a financial institution such as a bank or insurance company An e-mail is sent requesting that the recipient access the fake Web site and enter personal details including security access codes The page looks genuine because it is easy to fake a valid Web site Any HTML page on the Web can be modified to suit a phishing scheme PIN  See personal identification number (PIN) Ping  A command-line tool used to test connectivity to an endpoint 1660 Point-to-Point Tunneling Protocol (PPTP)  A networking technology that supports multiprotocol VPNs This enables remote users to securely access corporate or other networks across the Internet, to dial into an ISP, or to connect directly to the Internet PPTP tunnels, or encapsulates, IP or IPX banter traffic inside IP packets This means that users can remotely run applications that depend on particular network protocols PPTP is described in RFC 2637 PortQry  A command-line tool that tests connectivity to a network service by attempting to establish a TCP connection to an endpoint PPTP  See Point-to-Point Tunneling Protocol (PPTP) Pre-Boot Execution Environment (PXE)  A DHCPbased remote boot technology used to boot or install an operating system on a client computer from a remote server A Windows Deployment Services server is an example of a PXE server Print Management  An MMC snap-in that administrators can use to manage printers, print servers, and print jobs across an enterprise printer driver isolation  A new feature of Windows and Windows Server 2008 R2 that lets you configure printer driver features to run in an isolated process separate from the print spooler process By isolating the printer driver, you can prevent a faulty printer driver from stopping all print operations on a print server, which results in a significant increase in server reliability Planning Phase  A phase in a MDT 2010 deployment in which the deployment team lays the groundwork for the deployment See also Microsoft Deployment Toolkit 2010 (MDT 2010) Printer Migrator  A tool for backing up printer configurations on print servers so that the configuration can be moved between print servers or consolidated from multiple servers onto a single server A commandline version (Printbrm.exe) is also available platform configuration register (PCR)  A register of a TPM This register is sufficiently large to contain a hash (currently only SHA-1) A register can normally only be extended, which means that its content is a running product key  A code used to validate installation media such as CDs during installation Product keys, also known as CD keys, not prove licensing for a product, but they discourage casual copying of software All Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark Windows product keys use five groups of five characters, with the format XXXXX-XXXXX-XXXXX-XXXXXXXXXX shared folder on the network Roaming user profiles provide simplified backup and enable users to use the same profile on different computers protocol handler  A feature of the Windows search engine that is used to communicate with and enumerate the contents of stores such as the file system, MAPI e-mail database, and the CSC or offline files database See also client-side cache (CSC) S proximity  A measurement of the network latency between two computers For Windows Media Sharing to work, the network latency between two computers must be milliseconds or less Punycode  The self-proclaimed “bootstring encoding” of Unicode strings into the limited character set supported by DNS, as defined in RFC 3492 The encoding is used as part of IDNA, which is a system enabling the use of internationalized domain names in all languages that are supported by Unicode where the burden of translation lies entirely with the user application (such as a Web browser) SAM  See Software Asset Management (SAM) same computer sharing  See local sharing screen scraping  A technique for automating applications by simulating keystrokes as if a human were sitting at the keyboard Screen scraping is the least reliable automation technique and should be used only when no other automation option is available Server Message Block (SMB)  A network protocol used for file and printer sharing Server Performance Advisor (SPA)  A report that provides a summary of logged performance data PXE  See Pre-Boot Execution Environment (PXE) shadow index  A temporary index created during the indexing process The shadow indexes created during indexing are later combined into a single index called the master index R sharing  The process of making files, folders, printers, or other resources available to other users RAC  See Reliability Analysis Component (RAC) Reliability Analysis Component (RAC)  A Windows feature that gathers and processes reliability data Replace Computer scenario  In MDT 2010, a deployment scenario that involves giving a new computer to an existing user In this scenario, the user receives a new computer, and the user’s data is migrated to the replacement computer to minimize impact on the user See also Microsoft Deployment Toolkit 2010 (MDT 2010) requested execution level manifest  An application marking that indicates the privileges required by the application Windows uses the requested execution level manifest, among other factors, to determine whether to provide a UAC prompt to the user to elevate privileges when the application is run Roaming User Profile  An alternative approach for storing user profiles that involves storing them on a shatter attack  An attack in which a process attempts to use Windows messages to elevate privileges by injecting code into another process Simple Service Discovery Protocol (SSDP)  This protocol forms the basis of the discovery protocol used by UPnP and PNRP single instance storage  A technique for storing multiple Windows images efficiently and in a single location The deployment engineer configuring a computer has the option to select one of the images for deployment from the client computer Sleep  A new power state that combines the quick resume time of Standby with the data-protection benefits of Hibernate slipstreaming  The process of integrating a service pack into operating system setup files so that new computers immediately have the service pack installed Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 1661 SMB  See Server Message Block (SMB) SME  See subject matter expert (SME) SMS  See Systems Management Server (SMS) sniffer  A tool such as Network Monitor that collects network communications Sniffers are also known as protocol analyzers Software Asset Management (SAM)  An initiative promoted by Microsoft as a way to maintain accurate inventories of installed and licensed software This practice helps organizations maintain legally licensed versions of all the software they need solicited Remote Assistance (RA)  A Remote Assistance request initiated by the novice (the user seeking help) Also known as escalated Remote Assistance (RA) SPA  See Server Performance Advisor (SPA) SSDP  See Simple Service Discovery Protocol (SSDP) startup key  A key stored on a USB flash drive that must be inserted every time the computer starts The startup key is used to provide another factor of protection in conjunction with TPM authentication See also Trusted Platform Module (TPM) Stop error  An error that Windows raises when a Kernel mode process has been compromised or has experienced an unhandled exception subject matter expert (SME)  A person who is skilled in a particular topic During deployment, you should use SMEs to help in the planning, development, and stabilizing processes SMEs are users who are most familiar with the applications and data to migrate (though despite their name, they are not necessarily experts), and they’re usually stakeholders in seeing that the process is properly performed subscription  Provides the ability to collect copies of events from multiple remote computers and store them locally stabilizing phase  In deployment, the phase that addresses the testing of a solution that is feature complete This phase typically occurs when pilots are conducted, with an emphasis on real-world testing and with the goal of identifying, prioritizing, and fixing bugs supplemental application  An application installed on a select few computers in your environment, such as specialized applications used by individual groups Supplemental applications are in contrast to core applications, which are installed on most computers stack  A list of memory locations that identify the calling methods of return locations Windows uses the stack to remember the location to return to when a called method has finished running Sync Center  A tool that provides a user interface for managing content synchronization activities including redirected folders and other folders marked for offline use start address  A URL that points to the starting location for indexed content When indexing is performed, each configured starting address is enumerated by a protocol handler to find the content to be indexed System Starter GPO  A read-only GPO that provides a baseline of settings for a specific scenario Like Starter GPOs, System Starter GPOs derive from a GPO, let you store a collection of Administrative template policy settings in a single object, and can be imported See also Starter GPO Starter GPO  Collections of preconfigured administrative templates in Windows that IT professionals can use as standard baseline configurations to create a live GPO They encapsulate Microsoft best practices, containing recommended policy settings and values for key enterprise scenarios IT professionals also can create and share their own Starter GPOs based on internal or industry regulatory requirements Systems Management Server (SMS)  A Microsoft computer management infrastructure used to improve administrative efficiency and help distribute and manage software T task sequence  A series of actions to run on a destination computer to install Windows and applications and 1662 Glossary Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark ... custom databases, 174 process flow, 173 starting, 174 system requirements, 153 terminology supported, 173 – 174 compatibility evaluators, 1 47? ??148, 1 57 compatibility mode, 173 , 176 Complete-BitsTransfer... (CLR), 278 comparison operators, 446–4 47 Compatibility Administrator tool ACT support, 169 creating AppHelp messages, 176 – 177 creating compatibility fixes, 174 – 176 creating compatibility mode, 176 ... printers, 78 3? ?78 4 roaming user profiles, 533 Windows Deployment Services support, 2 97, 304 Windows Firewall support, 50 Adaptive Display Brightness, 17 Add Features Wizard, 858 Add Printer Wizard, 79 2? ?79 3,

Ngày đăng: 14/12/2013, 19:15

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan