Term
| Access Control Entry (ACE) |
|
Definition
| An entry within an access control list (ACL) that grants or denies permissions to users or group for a given resource. |
|
|
Term
| Access Control List (ACL) |
|
Definition
| A set of access control entries that define an object's permission settings. ACLs enable administrator to explicitly control access to resources |
|
|
Term
|
Definition
| In AD FS, an organization that has been granted access to a resource partner's we-based application. Users in the account partner can access this application without the need for a separate user account in the resource partner's domain |
|
|
Term
|
Definition
| The Windows Server 2008 directory service that replaces the antiquated Windows NT domain structure. Active Directory forms the basis for centralized network management on Windows Server 2008 networks, providing a hierarchical view of network resources. Also known in Windows Server 2008 as Active Directory Domain Services (AD DS). Active Directory Application Mode (ADAM) |
|
|
Term
| Active Directory Application Mode (ADAM) |
|
Definition
| A standalone mode of Active Directory that enables organizations to use directory-enabled applications in their own directory, with its own schema, independently of the main corporate Active Directory database. |
|
|
Term
| Active Directory Federation Services (AD FS)_ |
|
Definition
| A new set of technologies in Windows Server 2003 R2 and enhanced in Windows Server 2008 that enables partner companies to access Active Directory resources across the Internet in a trusted manner, without having to have user accounts in the resource domain |
|
|
Term
| Active Directory - integrated zone |
|
Definition
| A DNS zone that is hosted on a domain controller and stored in one or more AD DS application directory partitions and replicated with AD DS. |
|
|
Term
| Active Directory Lightweight Directory Services (AD LDS) |
|
Definition
| An update to ADAM that provides directory services for directory-enabled applications on Windows networks without the need for deploying additional domain or domain controllers |
|
|
Term
| Active Directory Migration Tool (ADMT) |
|
Definition
| A utility that enables you to move objects such as users, groups, and computer from a Windows NT 4.0 domain to an Active Directory domain or to move objects between Active Directory domain in the same or different forests. This tools removes the manual work required to disjoin old domains and join the new domain. |
|
|
Term
| Active Directory Rights Management Services (AD RMS) |
|
Definition
| A directory service that uses a certification base to confirm the identity of users of information on the network, thereby enabling you to create and work with rights-protected information and ensure that only authorized users have access to these items |
|
|
Term
| Active Directory Service Interfaces (ADSI) |
|
Definition
| A directory service model implemented as a set of COM interfaces. ADSI allows Windows application to access Active Directory, often through ActiveX interfaces such as VBScript. |
|
|
Term
| Active Directory Users and Computers |
|
Definition
| the primary systems administrator utility for managing users, groups, and computers in a Windows Server 2008 domain, implemented as a Microsoft Management Console (MMC) snap-in |
|
|
Term
|
Definition
| A single running copy of the AD LDS directory service, which includes a separate directory data store, a unique service name, and a unique service description. |
|
|
Term
|
Definition
| A utility that prepares a Windows 2000 or Windows Server 2003 forest or domain for receiving domain controllers running Windows Server 2008. it has several parameters, the most important of which are /forestprep, which prepares the forest, /domainprep, which prepares the domain, and /rodcprep, which prepares the domain for receiving red-only domain controllers (RODC). |
|
|
Term
|
Definition
| Active Directory Rights Management Services |
|
|
Term
|
Definition
| Active Directory Service Interfaces |
|
|
Term
|
Definition
| A utility that enables you to view and edit information about any AD DS or AD LDS object, including schema and configuration data |
|
|
Term
|
Definition
| An acronym that stands for Microsoft's recommendation of placing Accounts into Global groups, placing these groups into Domain local groups, and granting Permissions to the domain local group |
|
|
Term
|
Definition
| Authority Information Access |
|
|
Term
| Application Directory Partition |
|
Definition
| A partitioned section of Active Directory that is replicated only to specified domain controllers. Applications use application directory partitions to store their application-specific data |
|
|
Term
|
Definition
| Through the Software Installation utility in Group Policy, administrator can assign applications to users and computers. Assigned applications are always available to the user, even if the user attempts to uninstall them. Applications assigned to a computer will automatically be installed on the next restart. |
|
|
Term
|
Definition
| Occurs when one task waits until another is finished before beginning. This is typically associated with scripts, such as a user logon script not running before the computer startup script has completed. This is the default behavior in Windows Server 2008 |
|
|
Term
|
Definition
| The basic unit of an object, this is the single property contained in the schema that defines the object through it's values. For example, an attribute of a standard user account is the account name. |
|
|
Term
|
Definition
| A security process that tracks the usage of selected network resources, typically storing the results in a log file. |
|
|
Term
|
Definition
| A command-line tool that enables you to configure audit policy settings and directory service auditing subcategories. |
|
|
Term
|
Definition
| The process by which a server validates a user's logon credentials so that access to a network resource can be granted or denied |
|
|
Term
| Authority Information Access (AIA) |
|
Definition
| A certificate extension that points to URLs where you can retrieve an issuing CA's certificate |
|
|
Term
|
Definition
| The ability to automatically enroll users and computers for certificates, retrieve existing certificates, and renew expired certificates without user intervention. |
|
|
Term
|
Definition
|
|
Term
| Backup Domain Controller (BDC) |
|
Definition
| A Windows NT 3.x or 4.0 server that contains a backup read-only copy of the domain security accounts manager (user account and security information). BDCs take the load off the primary domain controller (PDC) by servicing logon requests. Periodic synchronizing ensures that data between the PDC and BDCs remains consistent. |
|
|
Term
|
Definition
| A term associated with performance monitoring, this is the initial result of monitoring typical network and server performance under a normal load. All future results are measure against the baseline readings. A baseline will typically have performance readings for the processor(s), memory, disk subsystem, and network subsystem. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A new feature o windows Server 2008 and Windows Vista that enables you to encrypt the entire contents of your system partition. It is useful for protecting sensitive data on computers such as laptops or branch office domain controllers that are susceptible to theft. |
|
|
Term
|
Definition
| The contact point for the exchange of directory information between Active Directory sites. The bridgehead server receives information replicated from other sites and replicates it to its site's other domain controllers. It ensures that the greatest portion of replication occurs within sites rather than between them. |
|
|
Term
|
Definition
| A user account that is created by default when Windows is installed on a computer. An example is the local Administrator account. |
|
|
Term
|
Definition
| Certification Authority (CA) |
|
|
Term
|
Definition
| CRL distribution point (CDP) |
|
|
Term
|
Definition
| The process by which users and computer can be given permission to make requests for certificates, retrieve existing certificates, and renew expired certificates. Each CA that is installed on a server has web pages that users can access to submit basic and advanced certificate requests. |
|
|
Term
| Certificate Revocation List (CRL) |
|
Definition
| A document published by a CA that lists certificates that have been issued but no longer valid. By default, the CA publishes the CRL on a weekly basis. |
|
|
Term
|
Definition
| Provided by AD CS to simplify the process of requesting and issuing certificates for various purposes. Each template contains the rules and settings that must be in place to create a certificate of a certain type. Certificate templates are available only on enterprise root and subordinate CAs. |
|
|
Term
| Certificate Authority (CA) |
|
Definition
| A trusted authority either within a network or a third-party company that manages security credentials such that is guarantees the user object holding a certificate is who it claims to be. |
|
|
Term
|
Definition
| Indicates the location of the last information successfully written from the transaction logs to the database. In a data-recovery scenario, the checkpoint file indicates where the recovery or replaying of data should begin. |
|
|
Term
|
Definition
| When a log file fills up, it is overwritten with new data rather than a new log file being created. This conserves disk space but can result in data loss in a disaster recovery scenario. |
|
|
Term
|
Definition
| In AD FS, a statement made by a server about a client, such as its name, identity, key, group, privilege, or capability. You can enable specific claim types that are accepted by the account partner; claims that fail to match these types will be rejected. Claim types can include identity claims, group claims, or custom claims, and identity claims can include UPN claims, email claims, and common name claims. |
|
|
Term
|
Definition
| In AD FS, the act of processing incoming claims to the resource application hosted by the resource federation service. |
|
|
Term
|
Definition
| The portion of a Group Policy object that allows for computer policies to be configured and applied. |
|
|
Term
|
Definition
| The relaying of a DNS request for zone information for specific domains from one server to another when the first server is unable to process the request. |
|
|
Term
|
Definition
| An Active Directory object stored on domain controllers that is used to represent inbound replication links. Domain controllers create their own connection objects for intrasite replication through the Knowledge Consistency Checker (KCC), whereas only a single domain controller in a site creates connection objects for interstice replication, through the Intersite Topology Generator. |
|
|
Term
|
Definition
| An object in Active Directory that is capable of holding other objects. An example of a container would be the Users folder in Active Directory Users and Computers |
|
|
Term
|
Definition
| The process of stabilization after network changes occur. Often associated with routing or replication, this ensures each router or server contains consistent information. |
|
|
Term
|
Definition
| The metrics used in performance monitoring, these are what you are actually monitoring. An example of a counter for a CPU object would be %Processing Time. |
|
|
Term
|
Definition
| The storing of a limited set of passwords on an RODC. You can configure credential caching to store only those passwords of users who are authorized to log on at a given RODC. |
|
|
Term
|
Definition
| Certificate Revocation List (CRL) |
|
|
Term
| CRL Distribution Point (CDP) |
|
Definition
| A certificate extension that indicates URL locations where a CRL can be retrieved. Multiple HTTP, FTP, FILE, or LDAP locations can be included. |
|
|
Term
|
Definition
| A utility that imports comma-separated text files into the AD DS database. You can use this utility to automate the bulk creation of user or group accounts |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The command-line utility used to promote a Windows Server 2008 system to a domain controller. DCPROMO can also be used to demote a domain controller to a member server. |
|
|
Term
|
Definition
| Dynamic Domain Name System (DDNS) |
|
|
Term
|
Definition
| The process of offloading the responsibility for a given task or set of tasks to another user or group. Delegation in Windows Server 2008 usually involves granting permission to someone else to perform a specific administrative task such as creating computer accounts. |
|
|
Term
|
Definition
| A CRL that includes the list of certificates revoked since the issuance of the most recent complete (base) CRL. Its use optimizes bandwidth usage when certificates are frequently revoked |
|
|
Term
|
Definition
| Distributed File System (DFS) |
|
|
Term
|
Definition
| Dynamic Host Configuration Protocol (DHCP) |
|
|
Term
|
Definition
| A database that contains any number of different types of data. In Windows Server 2008, Active Directory is a database that contains information about objects in the domain, such as computer, users, groups, and printers. |
|
|
Term
|
Definition
| Provides the methods of storing directory data and making that data available to other directory objects. A directory service makes it possible for users to find any object in the directory given any one of its attributes |
|
|
Term
| Directory System Agent (DSA) |
|
Definition
| Makes data within Active Directory accessible to application that want it, acting as a liaison between the directory database and the applications. |
|
|
Term
|
Definition
| An administrative disk space limitation set on the server storage space, on a per-volume basis, that can be used by any particular user. |
|
|
Term
|
Definition
| The name that uniquely identifies an object. A distinguished name is composed of the relative distinguished name, the domain name, and the container holding the object. An example would be CN=AnyUser,CN=Examcram,CN=COM. This refers to the AnyUser user account in the examcram.com domain |
|
|
Term
| Distributed File System (DFS) |
|
Definition
| A Windows Server 2008 service that allows resources from multiple server locations to be presented through Active Directory as a contiguous set of files and folders, resulting in more ease of use of network resources for user. |
|
|
Term
|
Definition
| An Active Directory group of user accounts or other groups used strictly for email distribution. A distribution group cannot be used to grant permissions to resources. That type of group is called a security group. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A command-line tool that can perform most of the DNS server administrative tasks in Windows Server 2008 |
|
|
Term
|
Definition
| A process in which the master DNS server for a zone notifies secondary servers of changes so that the secondary servers can determine whether they need to initiate a zone transfer. |
|
|
Term
|
Definition
| A logical grouping of Windows Server 2008 computers, users, and groups that share a common directory database. Domains act as a security boundary and are defined by an administrator. |
|
|
Term
|
Definition
| A server that is capable of performing authentication. In Windows Server 2008, a domain controller holds an editable copy of the Active Directory database. |
|
|
Term
|
Definition
| Windows Server 2008 domains can operate at one of three functional levels: Windows 2000 native, Windows Server 2003 native, or the Windows Server 2008 functional level. Each functional level has different trade-offs between features and limitations |
|
|
Term
|
Definition
| A domain local group can contain other domain local groups from its own domain, as well as global groups from any domain in the forest. A domain local group can be used to assign permissions to resources located in the same domain as the group. |
|
|
Term
|
Definition
| A hierarchical name-resolution system that resolves host names (fully qualified domain names, FQDNs) into IP addresses and vice versa. DNS also makes it possible for the distributed Active Directory data-base to function, by allowing clients to query the locations of services in the forest and domain. |
|
|
Term
|
Definition
| One of the two forestwide flexible single master operations (FSMO) roles, the Domain Naming Master's job is to ensure domain name uniqueness within the forest. |
|
|
Term
|
Definition
| A user account that is stored in the AD DS database. It permits a user to log on to any computer in the domain where it is located or a trusted domain. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| A command-line tool that enables you to add objects such as users, groups, contacts, or computer to the AD DS database. |
|
|
Term
| Dynamic Domain Name System (DDNS) |
|
Definition
| An extension of the DNS that allows Windows 2000 and later systems to automatically register their A records (by themselves or by the DHCP server) with DNS at the time they obtain an IP address from a DHCP server. |
|
|
Term
| Dynamic Host Configuration Protocol (DHCP) |
|
Definition
| A service that allows an administrator to specify a range of valid IP addresses to be used on a network, as well as exclusion IP addresses that should not be assigned (for example, if they were already statically assigned elsewhere). These addresses are automatically given out to computers configured to use DHCP as they boot up on the network, thus saving the administrator from having to configure static IP addresses on each network device. |
|
|
Term
|
Definition
| A user who has been issued a special certificate that grants him the authority to enroll users into advanced security and issue certificates on behalf of the users. |
|
|
Term
|
Definition
| The physical workstation or server where the enrollment agent certificate is installed and used by the authorized person to enroll uses and issue certificates. |
|
|
Term
|
Definition
| A CA that is integrated with AD DS. Enterprise CA's replicate certificates with AD DS replication and require that users be authenticated. |
|
|
Term
|
Definition
| Extensible Storage Engine |
|
|
Term
| Extensible Storage Engine (ESE) |
|
Definition
| The Active Directory database engine, ESE is an improved version of the older Jet database technology. The ESE database uses the concept of discrete transactions and log files to ensure the integrity of Active Directory. Each request to the DSA to add, modify, or delete an object or attribute is treated as an individual transaction. As these transactions occur on each domain controller, they are recorded in a series of log files that are associated with each ntds.dit file. |
|
|
Term
|
Definition
| A trust relationship created between a Windows Server 2008 Active Directory domain and a Windows NT 4 domain, or between Active Directory domains in different forests. |
|
|
Term
|
Definition
| In AD FS, a web-based application that is configured so that uses in an organization connected by means of a federation trust can be authenticated to access this application without the need for a separate AD DS user account. |
|
|
Term
|
Definition
| In AD FS, a relationship between two organizations that allows for access to web-based applications without establishing an external or forest trust between the organizations' domains. |
|
|
Term
| File Replication Service (FRS) |
|
Definition
| A service that provides multimaster replication between specified domain controllers within an Active Directory tree. |
|
|
Term
| File Transfer Protocol (FTP) |
|
Definition
| A standard TCP/IP utility that allows for the transfer of files from an FTP server to a client machine running the FTP client. |
|
|
Term
| Fine-Grained password policies |
|
Definition
| A new feature of Windows Server 2008 that enables you to configure password policies that apply only to specific users or groups within a domain. |
|
|
Term
|
Definition
| A hardware or software security system that limits access to network resources across subnets. Typically, a firewall is used between a private network and the Internet to prevent outsiders from accessing the private network. The firewall also limits what Internet services users of the private network can access. |
|
|
Term
|
Definition
| A namespace that cannot be partitioned to produce additional domains. Windows NT 4 and earlier domains were examples of flat namespaces, as opposed to the Windows Server 2008 hierarchical namespace |
|
|
Term
| Flexible single-master operations (FSMO) |
|
Definition
| Five roles that are required by Windows Server 2008 not to follow the typical multimaster model and instead are hosted on only a single domain controller in each domain, in the case of the Infrastructure Master, PDC Emulator, and RID Master, or on only a single domain controller in the forest, in the case of the Domain Naming Master and the Schema Master. |
|
|
Term
|
Definition
| A Windows Server 2008 feature that allows special folders, such as My Documents, on local Windows XP Professional or Vista Business/Enterprise/Ultimate system hard drives to be redirected to a shared network location. |
|
|
Term
|
Definition
| A grouping of Active Directory trees that have a trust relationship between them. Forests can consist of a noncontiguous namespace and, unlike domains and trees, do not have to be given a specific name. |
|
|
Term
|
Definition
| The three forest functional levels are Windows 2000, Windows Server 2003, and Windows Server 2008. The default forest functional level is Windows 2000. When the forest functional level is raised to Windows Server 2003 or Windows Server 2008, advanced forestwide Active Directory features are available according to the level chosen. |
|
|
Term
|
Definition
| The first domain created in a forest. |
|
|
Term
|
Definition
| A trust relationship established between two Active Directory forests |
|
|
Term
|
Definition
| A DNS name-resolution process by which a hostname is resolved to an IP address |
|
|
Term
|
Definition
| The relaying of a DNS request from one server to another, when the first server is unable to process the request. |
|
|
Term
|
Definition
| Fully Qualified Domain Name (FQDN) |
|
|
Term
|
Definition
| File Replication Service (FRS) |
|
|
Term
|
Definition
| Flexible Single-Master Operations (FSMO) |
|
|
Term
|
Definition
| File Transfer Protocol (FTP) |
|
|
Term
| Full Zone Transfer (AXFR) |
|
Definition
| A zone transfer in which the master server transmits the entire zone database to that zone's secondary servers. |
|
|
Term
| Fully Qualified Domain Name (FQDN) |
|
Definition
| A DNS domain name that unambiguously describes the location of the host within a domain tree. An example of an FQDN would be the computer www.examcram.com |
|
|
Term
|
Definition
| A concept introduced in Windows Server 2003 that determines what level of features and interoperability with other Windows operating systems is available in a domain or forest. In Windows 2000, functional levels were referred to as modes. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Contains a partial replica of every Windows Server 2008 domain object within the Active Directory, enabling users to find any object in the directory. The partial replica contains the most commonly used attributes of an object, as well as information on how to locate a complete replica elsewhere in the directory, if needed. |
|
|
Term
|
Definition
| The Windows Server 2008 server that holds the Global Catalog for the forest |
|
|
Term
|
Definition
| A global group can contain users from the same domain in which the group is located, and global groups can be added to domain local groups to control access to network resources. |
|
|
Term
| Globally Unique Identifier (GUID) |
|
Definition
| A hexadecimal number supplied by the manufacturer of a product that uniquely identifies the hardware or software. A GUID is in the form of eight characters, followed by three sets of four characters, followed by 12 characters. For example, {15DEF489-AE24-10BF-C11A-00BB844CE637} is a valid format for a GUID (braces included) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A command-line utility that displays information about the current effect Group Policy has had on the local computer and logged-in user account. |
|
|
Term
|
Definition
| The Windows Server 2008 feature that allows for policy creation, which affects domain users and computer. Policies can be anything from desktop settings to application assignments to security settings and more. |
|
|
Term
| Group Policy Management Editor |
|
Definition
| The Microsoft Management Console (MMC) snap-in that is used to modify the settings of a Group Policy object. |
|
|
Term
| Group Policy Object (GPO) |
|
Definition
| A collection of policies that apply to a specific target, such as the domain itself (Default Domain Policy) or an Organizational Unit (OU). GPOs are modified through the Group Policy Editor to define policy settings. |
|
|
Term
|
Definition
| Globally Unique Identifier |
|
|
Term
|
Definition
| A namespace , such as with DNS, that can be partitioned out in the form of a tree. This allows great flexibility in using a domain name because any number of subdomains can be created under a parent domain. |
|
|
Term
|
Definition
| The new virtualization tool included with the 64-bit editions of Windows Server 2008 that enables you to run multiple instances of the operating system on a single server. |
|
|
Term
| Incremental zone transfer (IXFR) |
|
Definition
| A zone transfer in which the master server transmits only the modified portion of each zone file to that zone's secondary servers. |
|
|
Term
|
Definition
| The FSMO role that is responsible for receiving replicated changes from other domains within the forest and replicating these changes to all domain controllers within its domain. Each domain has one Infrastructure Master; it also is responsible fro tracking what Active Directory container an object is located in. |
|
|
Term
|
Definition
| The process by which an object obtains settings information from a parent object. |
|
|
Term
| Intersite Topology Generator (ISTG) |
|
Definition
| The Windows Server 2008 server that is responsible for evaluating and creating the topology for intersite replication. |
|
|
Term
|
Definition
| A CA server that is involved in the day-to-day issuing of certificates for computers and users on the network. |
|
|
Term
|
Definition
| Intersite Topology Generator (ISTG) |
|
|
Term
|
Definition
| Incremental zone transfer (IXFR) |
|
|
Term
|
Definition
| Technology that allows software features to be updated when they are accessed. Whereas in the past, missing application features needed to be manually installed, JIT technology allows the features to be install on the fly as they are accessed, with no other intervention required. |
|
|
Term
|
Definition
| Knowledge Consistency Checker (KCC) |
|
|
Term
|
Definition
| An Internet standard security protocol that has largely replaced the older LAN Manager user-authentication mechanism from earlier Windows NT versions. |
|
|
Term
| Knowledge Consistency Checker (KCC) |
|
Definition
| A Windows Server 2008 service that ensures consistent database information is kept across all domain controllers. It attempts to ensure that replication can always take place. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The delay that occurs in replication from the time a change is made to one replica and the time that change is applied to all other replicas in the directory. |
|
|
Term
|
Definition
| Lightweight Directory Access Protocol (LDAP) |
|
|
Term
|
Definition
| A utility that enables you to import data formatted in the LDAP Data Interchange Format (LDIF) format to the AD DS database. You can use this tool to automate the creation of user, computer, or group accounts. |
|
|
Term
|
Definition
| A GUI-based tool that enables you to perform several types of administrator actions on any LDAP directory service, including AD DS and AD LDS. |
|
|
Term
| Lightweight Directory Access Protocol |
|
Definition
| The protocol that allows access to Active Directory. LDAP is an Internet standard for accessing directory services. |
|
|
Term
|
Definition
| A Group Policy that exists in one object and is linked to another object. Linked policies are used to reduce administrative duplication in applying the same policies to multiple OUs. |
|
|
Term
|
Definition
| A network where all hosts are connected over fast connections (4MBps or greater for Token Ring; 10MBps or better for Ethernet). LANs typically do not involve outside data carriers (such as Frame Relay lines or T1 circuits) and are generally wholly owned by the organization. |
|
|
Term
|
Definition
| A security group that exists on a local workstation or sever and is used for granting permissions to local resources. Typically, global groups from a domain are placed inside a local group to gain access to resources on a local machine. |
|
|
Term
| Local Group Policy Objects |
|
Definition
| Objects that exist on the local Windows Server 2008 system. Site-, domain-, and OU-applied GPOs take precedence over local GPOs. |
|
|
Term
|
Definition
| A user account that is stored in the SAM of a member server or client computer. Such an account can be used to log on to that computer only and does not possess domain privileges. |
|
|
Term
|
Definition
| A server that is a member of a domain but is not a domain controller. A Windows Server 2008 domain can have Windows NT, Windows 2000, Windows Server 2003, and Windows Server 2008 member servers, regardless of the domain functional level. |
|
|
Term
| Microsoft Management Console (MMC) |
|
Definition
| An extensible management framework that provides a common look and feel to all Windows Server 2008 utilities. |
|
|
Term
|
Definition
| Microsoft Management Console (MMC) |
|
|
Term
|
Definition
| A server that has two or more network cards. This allows a server either to function as a router or to belong to more than one subnet simultaneously. Alternatively, multiple network adapters can be used for load balancing or fault tolerance. |
|
|
Term
|
Definition
| A replication model in which any domain controller will replicate data to any other domain controller. This is the default behavior in Windows Server 2008. It contrasts with the single-master replication model of Windows NT 4, in which a PDC contained the master copy of everything and BDCs contained backup copies. |
|
|
Term
|
Definition
| The process of resolving a hostname into a format that computers can understand. This is typically resolving a DNS name or NetBIOS name to an IP address but could also be a MAC address on non-TCP/IP networks. |
|
|
Term
|
Definition
| An application programming interface (API) used on Windows NT 4 and earlier networks by services requesting and providing name resolution and network data management. |
|
|
Term
|
Definition
| A utility that enables you to capture, view, and analyze frames transmitted across the network to network adapter cards on your computer. It is useful for detecting incursions by unauthorized users and tracing their activity on the network. |
|
|
Term
| Nonlocal Group Policy objects |
|
Definition
| GPOs that are stored in Active Directory rather than on the local machine. These can be site-, domain-, or OU-level GPOs. |
|
|
Term
|
Definition
| A TCP/IP utility used in troubleshooting DNS name resolution problems |
|
|
Term
|
Definition
| A command-line utility that provides a number of Active Directory management functions. |
|
|
Term
|
Definition
| The Windows NT/2000 file system that supports a much more robust feature set than either FAT16 or FAT32 (which was used on Windows 9x). You should use NTFS whenever possible on Windows Server 2008 systems; indeed, the server installation utility automatically creates an NTFS partition during installation. |
|
|
Term
|
Definition
| A distinct entity represented by a series of attributes within Active Directory. An object can be a user, group, computer, folder, file, printer, and so on. |
|
|
Term
|
Definition
| A number that uniquely identifies an object class or attribute. In the United States, the American National Standards Institute (ANSI) issues object identifiers, which take the form of an x.x.x.x dotted decimal format. Microsoft, for example, was issued the root object identifier of 1.2.840.113556, from which it can create further subobject identifiers. |
|
|
Term
|
Definition
| Online Certificate Status Protocol (OCSP) |
|
|
Term
| Online Certificate Status Protocol (OCSP) |
|
Definition
| A protocol that enables rapid certificate status validations. AD CS in Windows Server 2008 includes an OCSP Responder role service. |
|
|
Term
|
Definition
| A Windows Server 2008 domain controller that has been assigned one or more of the special Active Directory domain roles, such as Schema Master, Domain Naming Master, PDC Emulator, Infrastructure Master, and Relative Identifier (RID) Master. |
|
|
Term
|
Definition
| An Active Directory container object that allows an administrator to logically group users, groups, computers, and other OUs into administrative units. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A collection of software compiled into a distributable form, such as a Windows Installer (.msi) package created with WinInstall. |
|
|
Term
| Parent-Child Trust Relationship |
|
Definition
| The relationship whereby a child object trusts its parent object, and the parent object is trusted by tall child objects under it. Active Directory automatically creates two-way transitive trust relationships between parent and child objects. |
|
|
Term
|
Definition
| A schema attribute that tracks the internal replication status of partial replicas, such as those found on GC servers. |
|
|
Term
| Password Settings Object (PSO) |
|
Definition
| An object class defined in the AD DS schema that holds attributes for the fine-grained password and account lockout policy settings. |
|
|
Term
|
Definition
| A new feature of Windows Server 2003 R2 that contributes to better Active Directory and UNIX interoperability by automatically synchronizing passwords between the two. |
|
|
Term
|
Definition
| The process of modifying or updating software packages |
|
|
Term
|
Definition
| Primary domain controller (PDC) |
|
|
Term
|
Definition
| The domain-level FSMO role that replicates data with Windows NT 4 BDCs in a domain, in effect functioning as an NT 4 PDC. |
|
|
Term
|
Definition
| A TCP/IP utility that tests for basic connectivity between the client machine running Ping and any other TCP/IP host. |
|
|
Term
|
Definition
| Public Key Infrastructure (PKI) |
|
|
Term
|
Definition
| Settings and rules that are applied to users or computers, usually Group Policy in Windows Server 2008 and System Policy in Windows NT 4. |
|
|
Term
| Preferred Bridgehead Server |
|
Definition
| Rather than letting the KCC decide which server should be a bridgehead server, you can designate preferred bridgehead servers to be used if the primary goes down. Only one preferred bridgehead server can be active at a time. |
|
|
Term
| Primary Domain Controller (PDC) |
|
Definition
| A Windows NT 4 (and earlier) server that contains the master copy of the domain database and the only writable copy of the database. PDCs authenticate user logon requests and track security-related changes with-in the domain. |
|
|
Term
|
Definition
| A master copy of the DNS zone data hosted on a server that is the primary source of information for records found in this zone. |
|
|
Term
|
Definition
|
|
Term
| Public Key Infrastructure (PKI) |
|
Definition
| An industry standard technology that allows for the establishment of secure communication between hosts based on a public key/private key or certificate-based system. |
|
|
Term
|
Definition
| Through the software Installation utility in Group Policy, administrators can publish applications to users. Published applications appear in Add/Remove Programs and can be optionally installed by the user. |
|
|
Term
|
Definition
| Relative distinguished name (RDN) |
|
|
Term
| Read-only domain controller (RODC) |
|
Definition
| A new Windows Server 2008 feature in which the domain controller is installed with a read-only directory database. You cannot perform directory updates directly from the RODC. It is especially suitable in reduced security environments such as branch offices. |
|
|
Term
|
Definition
| A trust relationship in Windows Server 2008 that is created between an Active Directory domain and a Unix realm. |
|
|
Term
|
Definition
| A data repository on each computer that contains information about that computer's configuration. The Registry is organized into a hierarchical tree and is made up of hives, keys, and values. |
|
|
Term
| Relative distinguished name (RDN) |
|
Definition
| The part of a DNS name that defines the host. For example, in the FQDN www.examcram.com, www is the relative distinguished name. |
|
|
Term
| Relative Identifier (RID) |
|
Definition
| The part of the security identifier (SID) that uniquely identifies an account or group within a domain. |
|
|
Term
| Reliability and Performance Monitor |
|
Definition
| A Microsoft Management Console application that contains several tools for monitoring your computer's performance. |
|
|
Term
|
Definition
| A component of the Reliability and Performance Monitor that provides a trend analysis of you computer's system stability with time. It shows how events such as hardware or application failures, software installations or removals, and so on affect your computer's stability. |
|
|
Term
|
Definition
| A copy of any given Active Directory object. Each copy of an object stored on multiple domain controllers is a replica. |
|
|
Term
|
Definition
| The process of copying data from one Windows Server 2008 domain controller to another. Replication is a process managed by an administrator and typically occurs automatically whenever changes are made to a replica of an object. |
|
|
Term
| Request for Comments (RFC) |
|
Definition
| Official uniquely numbered documents that specify Internet standards for the TCP/IP protocol. |
|
|
Term
|
Definition
| In AD FS, an organization that hosts a server containing a web-based application that has been configured for access by users in the trusted organization. |
|
|
Term
|
Definition
| Standard database record types used in DNS zone database files. Common types of resource records include Address (A), Mail Exchanger (MX), Start of Authority (SOA), and Name Server (NS), among others. |
|
|
Term
| Resultant Set of Policy (RSoP) |
|
Definition
| A Windows Server 2008 Group Policy tool that lets you simulate the effects of Group Policies without actually implementing them. RSoP has two modes: logging mode and planning mode. Logging mode determines the resultant effect of policy settings that have been applied to an existing user and computer based on a site, domain, or organizational unit. Planning mode simulates the resultant effect of policy settings that are applied to a user and computer. |
|
|
Term
|
Definition
| A DNS name-resolution process by which an IP address is resolved to a hostname. |
|
|
Term
|
Definition
| Relative Identifier (RID) |
|
|
Term
|
Definition
| The domain-level FSMO role that is responsible for managing pools of RIDs and ensuring that every object in the domain gets a unique RID. |
|
|
Term
|
Definition
| Read-Only Domain Controller (RODC) |
|
|
Term
|
Definition
| The topmost CA in a PKI hierarchy, this is the most authoritative certificate server. You should protect this server with the highest level of security possible, such as storing it offline in a vault. If it is compromised, the entire PKI hierarchy is compromised. |
|
|
Term
|
Definition
| A list of the names and IP addresses of DNS servers that are authoritative for the Internet root domains. Used by a DNS server to forward queries for Internet domains that it is unable to resolve from its own database. |
|
|
Term
|
Definition
| A load-balancing mechanism that DNS servers use to distribute name resolution activity among all available DNS servers. |
|
|
Term
|
Definition
| A dedicated network hardware appliance or a server running routing software and multiple network cards. Routers join dissimilar network topologies (such as Ethernet to Frame Relay) or simply segment networks into multiple subnets. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Measurement (often subjective) of how well a resource such as a server can expand to accommodate growing needs. |
|
|
Term
|
Definition
| The process by which a DNS server searches for and deletes aged (stale) resource records |
|
|
Term
|
Definition
| In Active Directory, a schema is a database that contains the description of object classes and the attributes that the object classes must possess and can possess. |
|
|
Term
|
Definition
| The Windows Server 2008 domain controller that has been assigned the Operations Master role to control all schema updates within a forest. |
|
|
Term
|
Definition
| Secure dynamic DNS (SDDNS). |
|
|
Term
|
Definition
| An additional copy of DNS zone data hosted on a DNS server that is a secondary source for this zone information. |
|
|
Term
| Secure Dynamic DNS (SDDNS) |
|
Definition
| An enhancement to DNS that enables you to permit dynamic updates only from authorized client computers in an Active Directory-integrated zone. |
|
|
Term
|
Definition
| A type of group that can contain user accounts or other groups and can be used to assign levels of access (permissions) to shared resources. |
|
|
Term
| Security Identifier (SID) |
|
Definition
| A number that uniquely identifies a user, group, or computer account. Every account is issued one when created. If the account is later deleted and re-created with the same name, it will have a different SID. Once an SID is used in a domain, it can never be used again. |
|
|
Term
|
Definition
| Collections of standard settings that can be applied administratively to give a consistent level of security to a system. |
|
|
Term
|
Definition
| The act of moving an operations master role from one domain controller to another when the original role holder is no longer available on the network. You cannot seize a role if the original role holder is available; you must transfer it instead. Once you have seized a role, you cannot bring back the original role holder without reinstalling Active Directory in most cases. |
|
|
Term
|
Definition
| A new feature of Windows Servers 2008 that enables you to install a minimal version of the server without a GUI, Start menu, taskbar, or many ancillary components. A Server Core computer can hold most of the roles that an ordinary Windows Server 2008 computer holds, but with a smaller network footprint and fewer points of attack. |
|
|
Term
|
Definition
| A new feature of Windows Server 2003 R2 that helps integrate Active Directory and UNIX by enabling an Active Directory domain controller to function as a UNIX NIS server. |
|
|
Term
| Server Performance Advisor |
|
Definition
| A utility that provides an in-depth view of current server performance and suggestions for making improvements. |
|
|
Term
|
Definition
| A Windows Server 2008 trust relationship between two domains within the same forest. Shortcut trusts are used to reduce the path authentication needs to travel by directly connecting child domains. |
|
|
Term
|
Definition
| Security Identifier (SID) |
|
|
Term
|
Definition
| A mechanism that validates the SIDs of users in a trusted domain that is attempting to authenticate across a trust relationship to a trusting domain. It enhances security by verifying that the authentication request contains only SIDs of security principals in the trusted domain. |
|
|
Term
|
Definition
| Certain Active Directory operations that are only allowed to occur in one place at any given time (as opposed to being allowed to occur in multiple locations simultaneously). Examples of single-master operations include schema modifications, RID assignments, and infrastructure changes. |
|
|
Term
|
Definition
| The ideal of having one username and password that works for everything on a network. Windows Server 2008 features like Active Directory Federations Services bring this closer to a reality than ever before. |
|
|
Term
|
Definition
| A physical component of Active Directory. Sites are created for the purpose of balancing logon authentication with replication. They can have zero (in planning), one, or multiple IP subnets. These subnets should be well connected with fast LAN links. |
|
|
Term
|
Definition
| A connection between sites, it is used to join multiple locations. |
|
|
Term
|
Definition
| A collection of site links that helps Active Directory work out the cost of replicating traffic from one point to another within the network infrastructure that is not directly connected by a single site link. By default, all site links are bridged, but this can be disabled in favor of manually configured site link bridges. |
|
|
Term
|
Definition
| A way for AD to determine what path to replicate traffic over on a routed network. The lower the cost, the more preferable it is for AD to use a particular site link. For example, if you have a T1 and an ISDN site link connecting the same sites, the T1 site link would have a lower cost than the ISDN site link, making it the preferred path for traffic. In other words, the faster the link, the lower the site link cost. |
|
|
Term
|
Definition
| A connection between sites that is not fast enough to provide full functionality in an acceptable timeframe. Site connections below 512KBps are defined as slow links in Windows Server 2008. |
|
|
Term
|
Definition
| A credit card-sized device that is used with an access code to enable certificate-based authentication and single sign-on to the enterprise. Smartcards securely store certificates, public and private keys, passwords, and other types of personal information. A smartcard reader attached to the computer reads the smartcard. |
|
|
Term
|
Definition
| A Group Policy component that allows administrators to optionally assign applications to be available to users and computers or publish applications to users. |
|
|
Term
|
Definition
| A component that can be added or removed from a Microsoft Management Console (MMC) console to provide specific functionality. The Windows Server 2008 administrative tools are implemented as snap-ins. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A CA whose database is stored locally and not integrated with AD DS. Typically, an organization has a standalone root CA coupled with enterprise subordinate CA's. This practice enables the administrator to keep the standalone root CA offline and secured in a safe location such as a vault. It is brought back online only when required fro issuing certificates to subordinate CAs. |
|
|
Term
|
Definition
| Also called a static address, this is where a network device (such as a server) is manually configured with an IP address that doesn't change rather than obtaining an address automatically from a DHCP server. |
|
|
Term
|
Definition
| Implemented using the Extensible Storage Engine, this is the physical storage of each Active Directory replica. |
|
|
Term
|
Definition
| A DNS zone that contains source information about authoritative name servers for its zone only. The DNS server hosting the stub zone obtains its information from another server that hosts a primary or secondary copy of the same zone data. |
|
|
Term
|
Definition
| A collection of hosts on a TCP/IP network that are not separated by routers. A basic corporate LAN with one location would be referred to as a subnet when it is connected by a router to another network, such as that of an Internet service provider. |
|
|
Term
|
Definition
| A CA whose certificates come from a root CA. The subordinate CA's job is to issue certificates to users and computers on the network. Each subordinate CA may be dedicated to a single type of certificate, such as smart cards, Encrypting File System (EFS), or a geographical location of multisite network. |
|
|
Term
|
Definition
| Synchronous processing occurs when one task does not wait for another to complete before it begins. Rather, the two run concurrently. This is typically associated with scripts in Windows Server 2008, such as a user logon script running without waiting for the computer startup script to finish. |
|
|
Term
|
Definition
| A locally store system key that encrypts the SAM database on Windows 2000 and later computers. It is required for computers to start. For added security, you can remove this key and store it on a floppy disk or specify a password to be entered manually on startup. |
|
|
Term
|
Definition
| Windows NT 4 Registry-based policy settings that have largely been replaced in Windows Server 2008 by Group Policy. System Policies can still be created using poledit.exe, however, for backward compatibility with pre-Windows 2000 clients. |
|
|
Term
|
Definition
| A shared folder on an NTFS partition on every AD domain controller that contains information (scripts, Group Policy info, and so on) that is replicated to other domain controllers in the domain. The SYSVOL folder is created during the installation of Active Directory. |
|
|
Term
|
Definition
| Transmission Control Protocol/Internet Protocol |
|
|
Term
|
Definition
| A special account created for the sold purpose of copying as needed when creating a large number of user accounts with similar privileges. |
|
|
Term
|
Definition
| The amount of time a packet destined for a host will exist before it is deleted from the network. TTLs are used to prevent networks from becoming congested with packages that cannot reach their destinations. |
|
|
Term
|
Definition
| The act of moving one of the operations masters roles from one domain controller to another when the original role holder is available on the network. You cannot transfer the role if the original holder is not available. |
|
|
Term
|
Definition
| An automatically created trust in Windows Server 2008 that exists between domain trees within a forest and domains within a tree. Transitive trusts are two-way trust relationships. Unlike with Windows NT 4, transitive trusts in Windows Server 2008 can flow between domains. This way, if Domain1 trusts Domain2, and Domain2 trusts Domain3, Domain1 automatically trusts Domain3. |
|
|
Term
| Transmission Control Protocol/Internet Protocol (TCP/IP) |
|
Definition
| The standard suite of networking protocols for communicating on the Internet. It is the default protocol in Windows Server 2008. |
|
|
Term
|
Definition
| A collection of Active Directory domains that are connected through transitive trusts and share a common Global Catalog and schema. Domains with a tree must form a contiguous namespace. A tree is contained within a forest, and multiple trees can exist within a forest. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| An Active Directory security group that can be used anywhere within a domain tree or forest, the only caveat being that universal groups can only be used when an Active Directory domain has been converted to native mode. |
|
|
Term
|
Definition
| A feature that can be used once a domain has been raised to the Windows Server 2008 functional level, it allows users in universal groups to log on without the presence of a GC server. |
|
|
Term
| Update Sequence Number (USN) |
|
Definition
| A 64-bit number that keeps track of changes as they are written to copies of Active Directory. As changes are made, this number increments by one. Every attribute in Active Directory has a USN value. |
|
|
Term
|
Definition
| User Principal Name (UPN) |
|
|
Term
|
Definition
| The portion of the UPN following the @ character. By default, this is the DNS domain name of the domain where the user account is located. However, you can define an alternate UPN suffix that enables you to conceal the actual domain structure of the forest or match the user's email address domain name. |
|
|
Term
|
Definition
| The portion of a Group Policy object that allows for user policy settings to be configured and applied. |
|
|
Term
|
Definition
| The name employed by a user to log on to a domain. AD DS uses this name and its associated password to authenticate the user. |
|
|
Term
| User Principal Name (UPN) |
|
Definition
| An alternate username that is formatted in a manner similar to that of an email address (for example, user@domain.com). Its use enables a user to more easily log on to a domain in the forest other than the domain she belongs to. |
|
|
Term
| User Principal Name (UPN) suffix |
|
Definition
|
|
Term
|
Definition
| Contains settings that define the user environment, typically applied when the user logs on to the system. |
|
|
Term
|
Definition
| Update sequence number (USN) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A command-line tool that enables you to perform backups and restores. In Windows Server 2008, this is the only tool that you can use to perform system state backups and restores. |
|
|
Term
|
Definition
| A network that contains only fast connections between domains and hosts. The definition of "fast" is somewhat subjective and may vary from organization to organization. |
|
|
Term
|
Definition
| Multiple networks connected by slow connections between routers. |
|
|
Term
| Windows 2000 Functional Level |
|
Definition
| The default functional level that exists when you install AD DS on Windows Server 2008. In this functional level, you can have any combination of domain controllers running Windows 2000, Windows Server 2003, and Windows Server 2008. |
|
|
Term
| Windows Internet Name Service (WINS) |
|
Definition
| A dynamic name-resolution system that resolves NetBIOS names to IP addresses on Windows TCP/IP networks. With Windows Server 2008, WINS has been kept in place as a feature so that any legacy clients or applications on the network can use it. |
|
|
Term
| Windows Management Instrumentation (WMI) |
|
Definition
| A Windows Server 2008 management infrastructure for monitoring and controlling system resources. WMI filters are commonly used in Group Policy to modify the scope of a GPO according to the attributes of destination computers. |
|
|
Term
|
Definition
| Enables the running of VBScript or JavaScript scripts natively on a Windows system, offering increased power and flexibility over traditional batch files. |
|
|
Term
| Windows Server 2003 Functional Level |
|
Definition
| The functional level of either the domain or forest that you can select after you have removed or upgraded all Windows 2000 domain controllers. This functional level implements all the features of Windows Server 2003 Active Directory but at the expense of some backward compatibility; it does not implement new features of Windows Server 2008 Active Directory. |
|
|
Term
| Windows Server 2008 Functional Level |
|
Definition
| The highest functional level of the domain or forest that you can select after you have removed or upgraded all Windows 2000 and Windows Server 2003 domain controllers. This functional level implements all the features of Windows Server 2008 Active Directory but at the expense of backward compatibility with old Windows servers. |
|
|
Term
| Windows Server Virtualization |
|
Definition
| The capability of running multiple copies of different operating systems on a single server. The 64-bit edition of Windows 2008 contains a built-in virtualization capability known as Hyper-V. You can use Microsoft Virtual Serer 2005 on 32-bit editions of Windows Server 2008 or on older Windows Server versions. |
|
|
Term
| Windows System Resource Manager (WSRM) |
|
Definition
| An administrative feature that enables you to control how processor and memory resources are allocated to applications, services, and processes running on the server. |
|
|
Term
|
Definition
| An optional utility that ships with Windows Server 2008 and can be used to create Windows Installer packages. |
|
|
Term
|
Definition
| Windows Internet Name Service (WINS) |
|
|
Term
|
Definition
| Windows Management Instrumentation (WMI) |
|
|
Term
|
Definition
| A group of workstations and servers that are networked but not within the concept of a domain. In a workgroup, each machine maintains its own local accounts database and can be difficult to administer as the number of computer in the workgroup grows. |
|
|
Term
|
Definition
| The Windows interface to Windows Script Host (WSH). |
|
|
Term
|
Definition
| Windows Rights Resource Manager (WSRM) |
|
|
Term
|
Definition
| A set of standards developed by the International Standards Organization (ISO) that defines distributed directory services. |
|
|
Term
|
Definition
| A discrete portion of the local or Internet-based DNS namespace, for which a single DNS server is authoritative. |
|
|
Term
|
Definition
| The act of dividing the DNS namespace into a series of zones and delegating their management by creating resource records in other zones that point to the authoritative DNS servers for the zone being delegated |
|
|