mcp mcp mcp

 


Here is a small list objects that I’ve learned to do throughout my studies. Along with the name, there is also a small description of what the item does and how potentially useful it could be for your company.

Active Directory

Active Directory is an enterprise-class directory service that is scalable, built from the ground up using Internet-standard technologies, and fully integrated at the operating-system level. Active Directory simplifies administration and makes it easier for users to find resources. Active Directory provides a wide range of features and capabilities, including Group Policy, scalability without complexity, support for multiple authentication protocols, and the use of Internet standards. For a more detailed description, see Active Directory.

Active Directory Service Interfaces

Active Directory Service Interfaces is a directory service model and a set of COM interfaces. It enables Windows 95, Windows 98, Windows NT, and Windows 2000 applications to access several network directory services, including Active Directory. It is supplied as a Software Development Kit (SDK).

Asynchronous Transfer Mode

Asynchronous Transfer Mode (ATM) is a high-speed connection-oriented protocol designed to transport multiple types of traffic across a network. It is applicable to both LANs and WANs. Using ATM, your network can simultaneously transport a wide variety of network traffic: voice, data, image, and video.

Certificate Services

Using Certificate Services and the certificate management tools in Windows 2000, you can deploy your own public key infrastructure. With a public key infrastructure, you can implement standards-based technologies such as smart card logon capabilities, client authentication (through Secure Sockets Layer and Transport Layer Security), secure e-mail, digital signatures, and secure connectivity (using Internet Protocol Security). Using Certificate Services, you can set up and manage certification authorities that issue and revoke X.509 V3 certificates. This means that you don't have to depend on commercial client authentication services, although you can integrate commercial client authentication into your public key infrastructure if you choose.

Clustering

Server clusters provide high availability, scalability, and manageability for resources and applications by clustering multiple servers running Windows 2000 Advanced Server. If one of the nodes in the cluster is unavailable due to failure or maintenance, another node immediately begins providing service (a process known as failover). Users accessing the cluster have constant access to server-based resources.

Component Services

Component Services is a set of services based on extensions of the Component Object Model (COM) and on Microsoft Transaction Server (an earlier release of a component-based transaction processing system). Component Services provides improved threading and security, transaction management, object pooling, queued components, and application administration and packaging.

Disk quota support

You can use disk quotas on volumes formatted with the NTFS file system to monitor and limit the amount of disk space available to individual users. You can define the responses that result when users exceed your specified thresholds.

Dynamic DHCP with DNS and Active Directory

Dynamic Host Configuration Protocol (DHCP) works with DNS and Active Directory on IP networks, helping to free you from assigning and tracking static IP addresses. DHCP dynamically assigns IP addresses to computers or other resources connected to an IP network.

Encrypting File System

The Encrypting File System (EFS) in Windows 2000 complements existing access controls and adds a new level of protection for your data. The Encrypting File System runs as an integrated system service, making it easy to manage, difficult to attack, and transparent to the user.

Enterprise Memory Architecture

With Enterprise Memory Architecture, you can run applications that take advantage of large amounts of physical memory on Windows 2000 Advanced Server. Using applications written with the Address Windowing Extensions API, you can map more physical memory into the applications' virtual address memory space for improved performance. You can also use application memory tuning, also known as four gigabyte tuning (4GT), to provide more virtual address memory space to applications, up to 3 GB, by providing less virtual address memory space to the operating system.

Graphical Disk Management

Disk Management is a graphical tool for managing disk storage that includes many new features, such as:

Group Policy (part of Active Directory)

You can use policies to define the allowed actions and the settings for users and computers. In contrast with local policy, you can use Group Policy to set policies that apply across a given site, domain, or organizational unit in Active Directory. Policy-based management simplifies such tasks as operating system updates, application installation, user profiles, and desktop-system lock down.

Indexing Service

You can use Indexing Service to provide a fast, easy, and secure way for users to search for information locally or on the network. Users can use powerful queries to search in files in different formats and languages, either through the Start menu Search command or through HTML pages that they view in a browser.

IntelliMirror

To help reduce costs, administrators have asked for the highest levels of control over portable and desktop systems. IntelliMirror provides this control on client systems running Windows 2000 Professional. You can use IntelliMirror to define policies based on the respective users' business roles, group memberships, and locations. Using these policies, Windows 2000 Professional desktops are automatically reconfigured to meet a specific user's requirements each time that user logs onto the network, no matter where they log on. For more information about IntelliMirror features, see IntelliMirror features.

Internet Authentication Service

Internet Authentication Service (IAS) provides you with a central point for managing authentication, authorization, accounting, and auditing of dial-up or Virtual Private Network users. IAS uses the Internet Engineering Task Force (IETF) protocol called Remote Authentication Dial-In User Service (RADIUS).

Internet Connection Sharing

With the Internet connection sharing feature of Network and Dial-up Connections, you can use Windows 2000 to connect your home network or small office network to the Internet. For example, you might have a home network that connects to the Internet by using a dial-up connection. By enabling Internet connection sharing on the computer that uses the dial-up connection, you are providing network address translation, addressing, and name resolution services for all computers on your home network. For more information, see Internet connection sharing.

Internet Information Services 5.0

The powerful features in Internet Information Services (IIS), a part of Microsoft Windows 2000 Advanced Server, make it easy to share documents and information across a company intranet or the Internet. Using IIS, you can deploy scalable and reliable Web-based applications, and you can bring existing data and applications to the Web. IIS includes Active Server Pages and other features. For more information, see Internet Information Services features.

Internet Protocol Security support

You can use Internet Protocol Security (IPSec) to secure communications within an intranet and to create secure Virtual Private Network solutions across the Internet. IPSec was designed by the Internet Engineering Task Force (IETF) and is an industry standard for encrypting TCP/IP traffic.

Kerberos V5 Protocol support

Kerberos V5 is a mature, industry-standard network authentication protocol. With Kerberos V5 support, a fast, single logon process gives users the access they need to Windows 2000 Advanced Server-based enterprise resources, as well as to other environments that support this protocol. Support for Kerberos V5 includes additional benefits such as mutual authentication (client and server must both provide authentication) and delegated authentication (the user's credential is tracked end-to-end).

Layer 2 Tunneling Protocol support

Layer 2 Tunneling Protocol (L2TP) is a more secure version of Point-to-Point Tunneling Protocol (PPTP) and is used for tunneling, address assignment, and authentication.

Lightweight Directory Access Protocol support

The Lightweight Directory Access Protocol (LDAP), an industry standard, is the primary access protocol for Active Directory. LDAP version 3 was defined by the Internet Engineering Task Force (IETF).

Message queuing

Integrated message queuing functionality in Windows 2000 helps developers build and deploy applications that run more reliably over networks, including the Internet. These applications can interoperate with applications running on different platforms such as mainframes and UNIX-based systems.

Microsoft Management Console

You can use Microsoft Management Console (MMC) to arrange the administrative tools and processes you need within a single interface. You can also delegate tasks to specific users by creating pre-configured MMC consoles for them. The console will provide the user with the tools you select.

Network Address Translation

Network Address Translation (NAT) hides internally managed IP addresses from external networks by translating private internal addresses to public external addresses. This reduces IP address registration costs by letting you use unregistered IP addresses internally, with translation to a small number of registered IP addresses externally. It also hides the internal network structure, reducing the risk of attacks against internal systems.

Network Load Balancing clusters

Previously known as WLBS, Network Load Balancing distributes incoming TCP/IP traffic between multiple servers. Your clustered applications, especially Web server applications, can handle more traffic and provide faster response times.

Operating system migration, support, and integration

Windows 2000 integrates seamlessly with existing systems and contains support for earlier Windows operating systems as well as new features for supporting other popular operating systems. Windows 2000 offers:

Plug and Play

With Plug and Play, a combination of hardware and software support, the server can recognize and adapt to hardware configuration changes automatically, without your intervention and without restarting.

Public key infrastructure and smart card infrastructure

Using Certificate Services and the certificate management tools in Windows 2000, you can deploy your own public key infrastructure. With a public key infrastructure, you can implement standards-based technologies such as smart card logon capabilities, client authentication (through Secure Sockets Layer and Transport Layer Security), secure e-mail, digital signatures, and secure connectivity (using Internet Protocol Security). Using Certificate Services, you can set up and manage certification authorities that issue and revoke X.509 V3 certificates. This means that you don't have to depend on commercial client authentication services, although you can integrate commercial client authentication into your public key infrastructure if you choose.

Quality of Service

Using Windows Quality of Service (QoS), you can control how applications are allotted network bandwidth. You can give important applications more bandwidth, less important applications less bandwidth. QoS-based services and protocols provide a guaranteed, end-to-end, express delivery system for information across the network.

Remote Installation Services

With Remote Installation Services, you can install Windows 2000 Professional remotely, without the need to visit each client. The target clients must either support remote booting with the Pre-Boot eXecution Environment (PXE) ROM, or else must be started with a remote-startup floppy disk. Installation of multiple clients becomes much simpler.

Removable Storage and Remote Storage

Removable Storage makes it easy to track your removable storage media (tapes and optical discs) and to manage the hardware libraries, such as changers and jukeboxes, that contain them. Remote Storage uses criteria you specify to automatically copy little-used files to removable media. If hard-disk space drops below specified levels, Remote Storage removes the (cached) file content from the disk. If the file is needed later, the content is automatically recalled from storage.

Since removable optical discs and tapes are less expensive per megabyte (MB) than hard disks, Removable Storage and Remote Storage can decrease your costs.

Routing and Remote Access service

Routing and Remote Access service is a single integrated service that terminates connections from either dial-up or Virtual Private Network (VPN) clients, or provides routing (IP, IPX, and AppleTalk), or both. With Routing and Remote Access, your Windows 2000 server can function as a remote access server, a VPN server, a gateway, or a branch-office router.

Safe mode startup

With safe mode, you can start Windows 2000 with a minimal set of drivers and services, and then view a log showing the sequence of events at startup. Using safe mode, you can diagnose problems with drivers and other components that might be preventing normal startup.

Smart card infrastructure

Using Certificate Services and the certificate management tools in Windows 2000, you can deploy your own public key infrastructure. With a public key infrastructure, you can implement standards-based technologies such as smart card logon capabilities, client authentication (through Secure Sockets Layer and Transport Layer Security), secure e-mail, digital signatures, and secure connectivity (using Internet Protocol Security).

TAPI 3.0

TAPI 3.0 unifies IP and traditional telephony to enable developers to create a new generation of powerful computer telephony applications that work as effectively over the Internet or an intranet as over the traditional telephone network.

Terminal Services

The Windows 2000 Server family offers the only server operating systems that integrate terminal emulation services. Using Terminal Services, a user can access programs running on the server from a variety of older devices. For example, a user could access a virtual Windows 2000 Professional desktop and 32-bit Windows-based applications from hardware that couldn't run the software locally. Terminal Services provides this capability for both Windows and non-Windows-based client devices. (Non-Windows devices require add-on software by Citrix Systems.) For more information about Terminal Services features, see Terminal Services features.

Virtual Private Networking

You can allow users ready access to the network even when they're out of the office, and reduce the cost of this access, by implementing a Virtual Private Network (VPN). Using VPNs, users can easily and securely connect to the corporate network. The connection is through a local ISP, which reduces connect-time charges.

With Windows 2000 Advanced Server, you can use several new, more secure protocols for creating Virtual Private Networks, including:

Windows Media Services

Using Windows Media Services will allow you to deliver high-quality streaming multimedia to users on the Internet and intranets.

Back