Партнерка на США и Канаду по недвижимости, выплаты в крипто

  • 30% recurring commission
  • Выплаты в USDT
  • Вывод каждую неделю
  • Комиссия до 5 лет за каждого referral

The syntax for the Netdom. exe utility is as follows:

netdom command object [/D:domain] [options]

NOTE

This command should be used only by the most knowledgeable system administrator. We recommend that you use the graphical Active Directory snap-in tools while gaining familiarity with Windows Server 2003 domains. The options available for this utility are expansive. If you use it, refer to the published information supplied for the Netdom Resource Kit Support Tool.

 

NLTEST. EXE—NETWORK DOMAIN TEST

The Nltest. exe utility identifies domain controllers and trust relationships. It can also be used to force a shutdown and to synchronize Windows NT 4.0 user accounts. The syntax is as follows:

nltest [option] ...

PMON. EXE—PROCESS MONITOR

The Pmon. exe tool launches the Process Monitor, which examines processes to identify problems like memory leaks. Chapter 2 has more information on process monitoring.

PVIEWER. EXE—PROCESS VIEWER

The Pviewer. exetool launches the Process Viewer. It is used to view processes and identify problems such as memory leaks. See Chapter 2 for more information on process monitoring.

REPADMIN. EXE—REPLICATION DIAGNOSIS TOOL

The Repadmin. exe command-line utility permits the administrator to view the replication topology (also called RepsFrom and RepsTo) from each domain controller and can be used to manually create the replication topology. The syntax is as follows:

repadmin command arguments [/u:[domain\]user /pw:{password|*}]

Table A.88. Nltest. exe Parameters

Option

Description

/SERVER:ServerName

Directs nltest to a specified remote computer.

/QUERY

Verifies the health of the named Servername domain controller.

/REPL

Forces a partial replication on the local system or the Servername.

/SYNC

Forces a full replication on the local system or the Servername.

/SC_QUERY:DomainName

Verifies the secure channel.

/SC_RESET:DomainName

Resets the secure channel between Windows 2003 computers.

/DCLIST:DomainName

Lists all domain controllers—Windows 2000/.NET, PDC, and BDC.

/TRANSPORT_NOTIFY

Notifies of a new transport.

/USER:UserName

Displays user account attributes.

/LOGON_QUERY

Outputs the cumulative number of logon attempts.

/PARENTDOMAIN

Identifies the parent domain.

/BDC_QUERY:DomainName

Identifies all domain BDCs and their current state of replication.

/SHUTDOWN:Reason [Seconds]

Shuts down in the specified time period.

/SHUTDOWN_ABORT

Aborts the shutdown command.

Here command represents one of the commands listed in Table A.89, and arguments specifies the command's arguments.

НЕ нашли? Не то? Что вы ищете?
REPLMON. EXE—REPLICATION MONITOR

The Replmon. exe utility launches the graphical Replication Monitor snap-in tool, which provides a view of Active Directory replication status and topology. It can also be used to force replication, as discussed in Chapter 6.

RSDIAG. EXE—REMOTE STORAGE DIAGNOSIS TOOL

The Rsdiag. exe command-line utility is used to view diagnostic information about jobs, managed NTFS volumes, removable media, and other remote storage data (see Table A.90). The syntax is

rsdiag [/c jobname] [/d filetype fullpath&filename] [/e errorcode]

[/i] [/j [jobname]] [/m] [/r [/f]] [/s] [/t] [/v [driveletter]]

[/x queuedrecall] [/w fullpath&filename]

SDCHECK. EXE—SECURITY DESCRIPTOR CHECK UTILITY

The Sdcheck. exe command-line tool outputs the security descriptor for any Active Directory object stored (see Table A.91). This descriptor contains the object's ACL.

Table A.89. Repadmin. exe Parameters

Option

Description

/u:[domain\]user

Sets an optional user as the administrator.

/pw:{password|*}

Sets the password for the alternative administrator set with the /u option.

/sync name-context

DestDC

DSA_UUID [/force] [/async]

[/full] [/addref] [/allsources]

Starts the replication with following options:

/force— overrides the normal replication schedule.

/async— starts the replication but does not wait for the replication event to complete.

/full— forces a full replication of all objects.

/addref— Adds a notification entry for this destination if one does not exist.

/allsources— Syncs the destination with all sources instead of just one.

/showreps [Naming_Context] [DSA [SourceDCUUID]] [/verbose] [/unreplicated] [/nocache]

Outputs the replication partners.

/showmeta Object_DN [DSA] [/nocache]

Shows the metadata for Active Directory objects.

/?

Outputs all optional commands.

The syntax for Sdcheck. exe utility is as follows:

sdcheck Server Object [-dumpSD] [-dumpAll] [-debug] [[-domain:

DomainName] - user: UserName - password: Password] [/?]

SECEDIT COMMAND

secedit /refreshpolicy has been replaced with gpupdate (see page 769).

Analyzes security settings comparing settings in the specified database with the systems current security settings. The results may be viewed in the Security Configuration and Analysis snap-in. The syntax is

secedit /analyze /db filename. sdb [/cfg filename] [/overwrite]

[/log filename] [/quiet]

Configures local security policy settings by applying the stored database settings. The syntax is

secedit /configure /db filename [/cfg filename ] [/overwrite]

[/areas area1 area2...] [/log filename] [/quiet]

Table A.90. Rsdiag. exe Parameters

Option

Description

/c jobname

Cancels the specified job.

/d filetype fullpath&filename

Converts the database to a text file. The file type identifies the source file type from among the following (fullpath&filename must include the full path):

e— Engine database

f— File System Agent database

a— File System Agent collection

n— Engine collection

s— Subsystem collection

/i

Identifies the version data.

/j [jobname]

Specifies the job to be output. If not specified, all jobs are output.

/m

Displays the volumes that can be managed.

/s

Outputs physical storage information.

/t

Loads the trace files.

/v [driveletter]

Displays extended information about the specified drive.

 

Table A.91. Sdcheck. exe Parameters

Option

Description

-dumpSD

Outputs the security descriptor of the specified object only.

-dumpSD

Outputs the security descriptor of the object and its parents.

-domain: DomainName

Specifies the domain for the object.

-user: UserName

Specifies a user other than the one currently logged on.

-password: Password

Identifies the password for the specified user.

Export security settings stored in the database. The syntax is

secedit /export [/DB filename] [/tablename] [/CFG

filename] [/areas area1 area2...]

[/log filename] [/quiet]

Import a security template into the named database. The syntax is

secedit /import /db filename. sdb /cfg filename. inf [/overwrite]

[/areas area1 area2...]

[/log filename] [/quiet]

Validates security temple syntax. Enter

secedit /validate filename

Creates a rollback template with respect to a configuration template. When applying a configuration template to a computer, you have the option of creating rollback template which, when applied, resets the security settings to the values before the configuration template was applied. The syntax is

secedit /GenerateRollback /CFG filename. inf /RBK

SecurityTemplatefilename. inf [/log Rollbackfilename. inf] [/quiet]

Option

Qualifier

Description

/db

filename

Database used to perform the security configuration.

/overwrite

Filename

Database is deleted prior to importing the security template. Without this parameter, security settings are accumulated into the database, giving priority to template settings where conflicts occur.

/areas

area1 area

Security setting areas to be applied to the system. If not specified, all security settings defined in the database are applied to the system. To configure multiple areas, separate each area by a space. The following areas are supported: SECURTY POLICY, GROUP_MGMT, USER_ RIGHTS, REGKEYS, FILESTORE, and SERVICES.

/log

filename

File to log the status of the configuration process. The default file isscesrv. log is located in the %windir%\security\logs directory.

/quiet

Configuration takes place without prompting the user.

/CFG

filename

Security template name.

/RBK

filename

Rollback template name.

SIDWALK. EXE—SID WALK

The Sidwalk. exe command-line utility takes a mapping file as input and scans its ACLs in the Registry, file system, file and print shares, and local group membership. The mapping file can be used for Sidwalk conversion on multiple computers.

The syntax for this utility is as follows:

sidwalk profile_file [profile_file...] [/t] [/f [path]] [/r] [/s] [/p]

[/g] [/l file] [/?]

Table A.92. Sidwalk. exe Parameters

Option

Description

/l file

Creates a converter file as named.

/f [path]

Scans all directories unless the path is set, then only the subtree directories are scanned.

/g

Scans local groups.

/p

Scans shared printers.

/r

Scans the Registry.

/s

Scan all shares.

/t

Performs a test or dry run.

 

Table A.93. Tlist. exe Parameters

Option

Description

-m pattern

Lists all processes with associated DLLs.

-p processname

Outputs the PID for the specified process.

-s

Outputs the services associated with a process.

-t

Outputs a process tree.

SNMPUTILG. EXE—SNMP UTILITY TOOL

The Snmputilg. exe utility invokes the graphical SNMP Utility Tool and is used in conjunction with the older SNMP Browser Tools (Snmputil. exe.) to manage SNMP network elements.

TLIST. EXE—TASK LIST VIEWER

The Tlist. exe command-line utility lists currently executing processes (tasks) and outputs information such as the process identification number (PID) and process name. Its syntax is

tlist [pid] [pattern] [-m pattern] [-p processname] [-s] [-t]

POSTSCRIPT

This appendix provides an overview of the most frequently used utilities available under Windows 2000 and Windows Server 2003. Our selection was based on feedback from system administrators who reviewed early versions of the book. A special note of appreciation is made to Ellen Beck Gardner for her help in compiling the command descriptions.

Glossary

Account lockout

Based on the lockout security policy, a user will be denied access, or locked out, after a predefined number of failed logon attempts. The duration of the lockout is also set in the lockout security policy.

ACE (access control entry)

An entry in the access control list (ACL) that includes a security ID (SID) and an access rights list. When the SID is matched, access rights are granted or denied.

ACL (access control list)

An object's owner controls whether access to the object is allowed or disallowed. For this purpose, each object has an ACL that comprises access control entries (ACE). Also known as the discretionary access control list (DACL), the ACL is the portion of the security descriptor that enforces permissions associated with an object. (The other components of the security descriptor are the object's creator [otherwise known as its owner], its group [a POSIX compliance element that relates to the "primary group"], and the system access control list, or SACL, which regulates auditing.)

ACPI (Advanced Configuration and Power Interface)

An industry power management specification used by Windows 2000 Plug and Play hardware management.

ACS (Admission Control Service)

The part of the Quality of Service (QoS) network management feature that defines who shares shared network resources and how they are used. It also regulates subnet bandwidth.

Active Directory services

Microsoft Corporation's advanced directory service that is shipped with Windows 2000 Server versions. See Chapters 5 and 6 for information about directory concepts and Active Directory's capabilities.

Active partition

The partition from which the operating system starts; it must be the primary partition on a basic disk. On Windows 2000 systems, the active partition can also be the system volume. If Windows 2000 is dual-booted with earlier Microsoft operating systems, all start-up files for both operating systems must reside on the active partition.

ActiveX

An umbrella term for Microsoft technologies that permit applications developers to create Web-interactive content.

Adapter card

A printed circuit board or hardware chip set that permits network connections between computers. Also known as a network card.

Address

A DNS resource record that maps the domain name to an IP address.

Address classes

Three levels of address class exist based on IP numbers: A, B, and C. For additional information, see Chapter 12.

Address pool

The group or collection of scoped addresses available for license by a DHCP Server.

Address Resolution Protocol (ARP)

As part of the TCP/IP suite, this protocol provides resolution between IP and MAC addresses.

Administrator

As defined by Windows 2000, a member of the Administrators group, with full control over a specific computer or domain.

ADSI (Active Directory Service Interface)

An API that permits applications on Windows 9x, Windows NT, and Windows 2000 to interface with networked directory services.

Agent

A computer or network device that runs SNMP (the Simple Network Management Protocol) and provides information about its location and configuration.

API (Application Programming Interface)

A routine that can be called by an application to carry out requests of other applications or the operating system. An example is the display-handling routines available from the Win32 API.

AppleTalk

The default network protocol for Apple Macintosh computer systems. Windows 2000 Server provides connectivity to AppleTalk clients.

Asymmetric encryption

A system of encryption that uses mathematically related public and private encryption keys. The private key remains confidential; the public key is passed out freely. To encrypt a message, a sender uses the receiver's public key. The receiver can then decrypt the message with the corresponding private key.

Asynchronous communication

Transmission of data at irregular intervals. Start and stop bits signal when each character has been received.

ATM (asynchronous transfer mode)

A communication protocol that transmits fixed-length 53-byte packets. It is generally viewed as a rapid method of data communication.

Attribute

In terms of files, designation of a file as read-only, archival, encrypted, or compressed. In terms of Active Directory schema, definition of the features of the object class.

Auditing

A means of tracking the activities of system and user behavior.

Authentication

The process of matching a user's logon name and password against Windows 2000 security files. For standalone computers, it is carried out on the local system. For network logon, it is conducted by an Active Directory domain controller.

Authoritative restore

A form of object resolution used by the Backup tool in which specified objects are replaced.

Backup media pool

Defined by the Backup tool, the hardware devices dedicated to storage.

Backup Operators

A predefined user group whose members have authority to perform backup of data regardless of the object's attribute.

Bandwidth

In digital communications terms, the bits-per-second (bps) transfer rate. In analog communications, a range between high and low frequencies.

Basic disk

The hard drive that contains the primary partition, extended partitions, and logical drives. It can also access MS-DOS.

Basic volume

A storage method used by Windows NT 4.0 or earlier systems.

Batch program

A form of a text-based (ASCII) script that invokes other applications or batch programs. It uses the extension. cmd or. bat.

BDC (Backup Domain Controller)

Used by Windows NT Server 4.0 or earlier as a subordinate domain controller to the Primary Domain Controller, the BDC contains read-only copies of information such as the domain's security account manager (SAM). It is used in a Windows 2000 domain when the domain is configured in mixed mode.

BIND (Berkeley Internet Name Domain)

A version of DNS ported to most variants of UNIX.

BIOS (basic input/output system)

The system used in personal computers to check hardware, for basic operating system startup, and to initiate data communications. It is stored in Read-Only Memory (ROM).

Bit (binary digit)

The smallest unit of information used by personal computers. It is expressed as a 1 or 0 to designate true or false.

Bits per second (bps)

A measure of communication speed based on character transfer. A character is defined as 8 bits. In a typical asynchronous environment, an additional start and stop bit is added.

Boot

The process of starting or resetting a computer's operating system.

Boot files

Files required to initiate a Windows 2000 operating system, for example, Ntldr and .

Boot logging

A process that occurs automatically with system startup and saves information regarding boot activities. It is stored in the root directory as an ASCII file called Ntldr. txt.

Boot partition

The location of Windows 2000 operating system and support files. It has to be located in the same partition used for initial booting that contains Ntldr and .

BOOTP (Bootstrap Protocol)

Part of the TCP/IP used by diskless workstations or devices like network printers.

Browser

An application that interprets HTTP communications and displays HTML output from the Internet or an intranet.

Built-in groups

Shipped by default with Windows 2000 to incorporate a standard set of rights, these groups are provided so that rights can be easily applied to user accounts.

CA (certification authority)

The issuer of digital certificates or the corporate authority that establishes and verifies public keys. See Chapter 10 for additional information about the public key infrastructure and Microsoft's implementation of CA.

Cache

A local store of data commonly used by programs like DNS.

Callback number

Defined by the end user or the administrator, the number the server will call to connect with a remote client. It is often used for roaming users who want to limit hotel toll costs while connected to the home office server.

Canonical name

An object's distinguished name that is output without LDAP attribute tags such as DC= or CN=.

CDFS (Compact Disk File System)

A protected-mode file system used for CD-ROM storage and access.

Certificate

A certificate binds an encryption key with encrypted data. Certificates are digitally signed by certificate authorities.

CGI (Common Gateway Interface)

A server-based script that initiates services, it is commonly used in association with Web services.

Child domain

Part of a domain hierarchical tree. It shares the domain namespace, Global Catalog, and schema with all other domains in the tree. For example, if the child domain is called "sales" in the domain, its name is sales. .

Child object

An object nested within a parent object.

Client

Any system connected to or requesting services from another computer. That other computer is known as a server. At any given time, a computer can be a client or a server.

Cluster

A group of computers that share a workload and perform redundant fault tolerance. If a member of a cluster fails, another member will assume the workload in a process known as failover.

Cluster Services

The software component that manages cluster functions.

Cluster-aware application

Applications that conform to the cluster API. Not all applications are designed to work in a cluster environment. For additional information, see Chapter 17.

COM (Component Object Model)

The programming model that permits object interoperability and reusability. Theoretically, COM components can be used by different applications and within varied operating system environments. Microsoft's Object Linking & Embedding (OLE) and ActiveX are based on COM. DCOM (Distributed Component Object Model) is the network variant of COM.

Command prompt

The character-based window in which supported MS-DOS utilities and certain scripts such as batch files are run.

Common groups

The list of groups accessible from the Start menu that are common to all users.

Communication port

The port that permits single-bit asynchronous data transmission. Also known as the serial port.

Community name

The name used to group SNMP devices.

Compact Disk File System (CDFS)

A 32-bit protected-mode file system used for compact disks.

Computer account

Created by the domain administrator, the account that identifies a unique computer in the domain.

CPU time

The total processor time in seconds used by a process.

CPU usage

The percentage of the CPU that is being used. It is shown in the Task Manager.

CRC (cyclical redundancy check)

Checks for errors in data transmission. Each transmission includes data and extra (redundant) error-checking values. CRC is used by communications protocols such as XMODEM and Kermit.

Cryptographic Service Provider (CSP)

Code that performs authentication, encoding, and encryption services. It creates and destroys keys and their utilization. Windows-based applications gain access through the CryptoAPI.

DACL (discretionary access control list)

The part of an object's security descriptor that defines who has permission to use, or is specifically denied access to, an object.

DDE (dynamic data exchange)

A Microsoft implementation of Interprocess Communication (IPC) that permits DDE-enabled applications to share data.

Device driver

A code that communicates between Windows 2000 and hardware such as a modem, network card, and printer. Without it, a device is not recognized by Windows 2000. The Hardware Compatibility List (HCL) lists device drivers shipped with Windows 2000. Other drivers must be obtained from the hardware manufacturer.

Device Manager

Interfacing within the Executive, or kernel, mode of Windows 2000, it is an administrative tool used to control computer devices. It lists device properties and performs updates and further configuration.

Dfs (distributed file system)

The system of shared folders located on different servers that are linked into a single namespace, permitting transparent access to shared folders regardless of their location on the network.

Dfs link

The link from the Dfs root to shared folders or other Dfs roots.

Dfs root

A container for Dfs files and links.

DHCP (Dynamic Host Configuration Protocol)

An industry-standard networking protocol that provides TCP/IP-based networks with the ability to dynamically assign Internet Protocol (IP) addresses and eliminate address conflicts for the defined IP number range.

Dial-up connection

A connection that permits communication from a computer or network through telephone exchanges. It can be made through a modem, ISDN line, or X.25 network.

Differential backup

A backup of all files that have been added or modified since the last scheduled full or incremental backup. It does not set the Archival attribute, thereby marking the files as having been backed up.

Digital signature

The security method that binds the identity of a user to a file or object.

Digital Signature Standard (DSS)

A cryptographic standard that uses the Digital Signature Algorithm (DSA) to generate and verify signatures and SHA-1 as its message hash algorithm. DSA is a public-key cipher used to create digital signatures. It is not employed for data encryption.

Из за большого объема этот материал размещен на нескольких страницах:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19