- William R Stanek
- Windows Server® 2012 R2 Inside Out: Configuration, Storage, & Essentials
- ixN.html
N
- Name Not Found dialog box, Auditing registry access, Configuring share
permissions
- name resolution services (location services), Planning for server
usage
- named data streams, Hard links
- named pipes (NPs), Enabling remote management, ADMIN$
- naming schemes for computers, Planning partitions
- NAND flash memory, Understanding the disk and file-system
structure
- NAP Client Configuration, MMC tool availability
- NAS (network-attached storage), Essential storage technologies, Storage-management role
services
- NAT (Network Address Translation), Getting to know Windows Server 2012 R2,
Using roles, role
services, and features
- navigation commands, Getting started with taskpads, Creating shell command
tasks
- Nbtstat command, Accessing a command prompt during
installation, Utilities to know
- nested page tables (NPTs), Understanding Hyper-V
- Net Accounts command, Accessing a command prompt during
installation
- Net commands, Accessing a command prompt during
installation, Utilities to know
- Net Computer command, Accessing a command prompt during
installation
- Net Config Server command, Accessing a command prompt during
installation
- Net Config Workstation command, Accessing a command prompt during
installation
- Net Continue command, Accessing a command prompt during
installation
- Net File command, Accessing a command prompt during
installation
- Net Group command, Accessing a command prompt during
installation
- Net Localgroup command, Accessing a command prompt during
installation
- Net Pause command, Accessing a command prompt during
installation
- Net Print command, Accessing a command prompt during
installation
- Net Session command, Accessing a command prompt during
installation
- Net Share command, Accessing a command prompt during
installation, Using and finding shares, Creating and publishing
shared folders, Managing file shares after
configuration
- Net Start command, Accessing a command prompt during
installation, Utilities to know
- Net Statistics command, Accessing a command prompt during
installation
- Net Stop command, Accessing a command prompt during
installation, Utilities to know
- Net Time command, Accessing a command prompt during
installation, Utilities to know
- Net Use command, Accessing a command prompt during
installation, Utilities to know
- Net User command, Accessing a command prompt during
installation
- Net View command, Accessing a command prompt during
installation, Utilities to know
- NetBIOS (Network Basic Input/Output System), Assessing systems,
Naming
computers
- NETLOGON share, ADMIN$
- Netsh command, Accessing a command prompt during
installation, Utilities to know
- Netstat command, Accessing a command prompt during
installation, Utilities to know
- Network Access warning box, Enabling access-denied assistance
- Network Address Translation (NAT), Getting to know Windows Server 2012 R2,
Using roles, role
services, and features
- network administration, Identifying security infrastructure
- Network And Sharing Center, Getting to know Server Manager
- network applications, Identify network services and
applications
- Network Basic Input/Output System (NetBIOS), Assessing systems,
Naming
computers
- Network Connections console, Getting to know Server Manager
- network environment, Your plan: The big picture, Your plan: The big
picture, Examining the interaction between IT and
business units, Predicting network change, Predicting network
change, Evaluating the network infrastructure,
Defining the new
network environment, Defining the new network environment,
Defining the new
network environment, Identify security requirements, Changing the administrative
approach, Select
and implement standards
-
- analyzing existing, Your plan: The big picture, Predicting network
change
- assessing impact on operations, Defining the new network environment
- change management, Select and implement standards
- changing administrative approach, Identify security requirements
- defining new, Your plan: The big picture, Defining the new network
environment
- evaluating infrastructure, Predicting network change
- identifying security requirements, Defining the new network environment
- inventorying systems, Evaluating the network infrastructure
- predicting change in, Examining the interaction between IT and
business units
- selecting and implementing standards, Changing the administrative
approach
- Network Explorer, Using and finding shares, Using and finding shares,
Creating shares by
using Computer Management
- Network File System (NFS), Using graphical administrative tools,
MMC tool
availability, Using roles, role services, and features,
Essential storage
technologies, Using internal and external storage
devices, Storage-management role services,
Creating shared
folders in Server Manager
-
- described, Using
graphical administrative tools, MMC tool availability, Using internal and external
storage devices
- enabling, Storage-management role services
- File And Storage Services, Using roles, role services, and
features
- server-storage communications, Essential storage technologies
- shared folders, Creating shared folders in Server
Manager
- network interface card (NIC), Tracking per-process network
utilization
- Network Interface performance object, Using Performance Monitor
- Network Interface\Bytes Received/Sec counter, Resolving network
bottlenecks
- Network Interface\Bytes Sent/Sec counter, Resolving network bottlenecks
- Network Interface\Bytes Total/Sec counter, Resolving network bottlenecks
- Network Interface\Current Bandwidth counter, Resolving network
bottlenecks
- Network Level Authentication, Getting information on user and remote user
sessions
- Network Load Balancing (NLB), Using roles, role services, and
features
- Network Load Balancing Manager, Using graphical administrative tools
- network management, Examining the interaction between IT and
business units, Predicting network change, Evaluating the network
infrastructure, Assessing systems, Identify network services and
applications, Identifying security infrastructure,
Identifying security
infrastructure, Reviewing network administration,
Reviewing network
administration, Getting network usage information,
Getting an overview
of resource utilization, Tracking per-process network utilization,
Using Performance
Monitor, Resolving disk I/O bottlenecks, Resolving network
bottlenecks, Using and finding shares
-
- assessing systems, Evaluating the network infrastructure
- disaster recovery, Reviewing network administration
- evaluating network infrastructure, Predicting network change
- identifying network services and applications, Assessing systems
- identifying security infrastructure, Identify network services and
applications
- mapping network drives, Using and finding shares
- monitoring performance, Using Performance Monitor
- network administration, Identifying security infrastructure
- network usage information, Getting network usage information
- predicting network change, Examining the interaction between IT and
business units
- resolving network bottlenecks, Resolving disk I/O bottlenecks
- reviewing network administration, Identifying security infrastructure
- tools for, Reviewing network administration
- tracking resource usage, Getting an overview of resource
utilization, Tracking per-process network
utilization
- troubleshooting network activity, Resolving network bottlenecks
- network maps, Evaluating the network infrastructure
- Network Policy And Access Services (NPAS), Planning for server usage, Using roles, role services,
and features
- Network Policy Server, Using graphical administrative tools,
MMC tool
availability
- Network Service special identity, Accessing the event logs and viewing
events
- Network Unlock (BitLocker), Using roles, role services, and features,
Installing
components at the prompt, BitLocker modes, Preparing BitLocker for startup
authentication and secure boot, Provisioning BitLocker prior to
deployment, Deploying BitLocker Drive Encryption,
Setting up and
managing BitLocker Drive Encryption, Enabling BitLocker on operating-system
volumes
-
- configuring, Provisioning BitLocker prior to
deployment
- described, Using
roles, role services, and features, BitLocker modes, Preparing BitLocker for startup
authentication and secure boot
- installing, Installing components at the prompt
- installing by default, Setting up and managing BitLocker Drive
Encryption
- system volumes, Enabling BitLocker on operating-system
volumes
- unlocking computer at startup, Deploying BitLocker Drive Encryption
- network-attached storage (NAS), Essential storage technologies, Storage-management role
services
- networking components, Protocols
- networking protocols, Naming computers
- Never eXecute (NX) bit (DEP), Windows 8.1 and Windows Server 2012
R2
- New RAID-5 Volume Wizard, Configuring RAID 5: Disk striping with
parity
- New Share Wizard, Creating shared folders in Server
Manager
- New Simple Volume Wizard, Creating partitions and simple
volumes
- New Spanned Volume dialog box, Managing volumes on dynamic disks
- New Storage Pool Wizard, Creating storage spaces
- New Striped Volume Wizard, Configuring RAID 0: Striping
- New Sync Share Wizard, Creating sync shares and enabling SMB
access
- New Task Wizard, Creating and managing taskpads
- New Taskpad View Wizard, Creating and managing taskpads
- New Virtual Disk Wizard, Creating a virtual disk in a storage
space
- New Virtual Machine Wizard, Creating virtual machines
- New Volume Wizard, Creating a standard volume, Deduplicating
volumes
- New- cmdlets, Using Windows PowerShell
- New-Item cmdlet, Using Windows PowerShell
- New-MSDSMSupportedHw cmdlet, Adding and removing multipath hardware
devices
- New-SmbShare cmdlet, Working with SMB 3.0, Creating and publishing shared
folders
- NFS (Network File System), Using graphical administrative tools,
MMC tool
availability, Using roles, role services, and features,
Essential storage
technologies, Using internal and external storage
devices, Storage-management role services,
Creating shared
folders in Server Manager
-
- described, Using
graphical administrative tools, MMC tool availability, Using internal and external
storage devices
- enabling, Storage-management role services
- File And Storage Services, Using roles, role services, and
features
- server-storage communications, Essential storage technologies
- shared folders, Creating shared folders in Server
Manager
- NIC (network interface card), Tracking per-process network
utilization
- NIC teaming, Getting to know Server Manager, Tracking per-process network
utilization, Resolving network bottlenecks, Working with SMB 3.0
- NLB (Network Load Balancing), Using roles, role services, and
features
- No eXecute (NX) bit (AMD), Windows 8.1 and Windows Server 2012
R2
- No Execute (NX) policy (Windows Boot Loader), Viewing BCD entries,
Setting BCD entry
values
- noncompliant applications, Software installation essentials,
Configuring UAC and
Admin Approval Mode, Application access tokens
- None authorization level, Understanding TPM states and tools
- nonpaged pool, Resolving performance bottlenecks
- nonresident attributes, NTFS structure
- Notify permission, Applying permissions to registry keys
- NPAS (Network Policy And Access Services), Planning for server usage, Using roles, role services,
and features
- NPs (named pipes), Enabling remote management, ADMIN$
- NPTs (nested page tables), Understanding Hyper-V
- Nslookup command, Utilities to know
- NTFS file system, Performing a clean installation, Introducing the registry,
Managing and
maintaining MPIO, Understanding legacy and protective MBRs,
Converting FAT or
FAT32 to NTFS, Converting FAT or FAT32 to NTFS, Creating partitions and
simple volumes, Creating partitions and simple volumes,
Configuring mount
points, Extending partitions, BitLocker modes, Enabling BitLocker on fixed data
drives, Enabling
BitLocker on fixed data drives, Understanding the disk and file-system
structure, Understanding the disk and file-system
structure, FAT
features, NTFS
structure, NTFS
structure, NTFS
structure, NTFS
structure, NTFS
structure, NTFS
structure, NTFS
features, Analyzing the NTFS structure, Analyzing the NTFS
structure, Advanced NTFS features, Hard links, Change journals,
Change journals,
Object
identifiers, Sparse files, Sparse files, Sparse files, Transactional NTFS, Transactional NTFS, ReFS integrity streams, data
scrubbing, and salvage, Maintaining and optimizing storage,
How quota management
works, How quota
management works, Preventing disk-integrity problems,
Analyzing FAT
volumes by using ChkDsk, Preventing fragmentation of disks,
Preventing
fragmentation of disks, Creating a standard volume, Managing file sharing,
File-sharing
essentials, File
security, access controls, and auditing, Managing access permissions,
Enabling advanced
auditing, Understanding file screening and storage
reporting
-
- access permissions, File security, access controls, and
auditing
- advantages, FAT
features
- analyzing structure, NTFS features
- auditing support, Enabling advanced auditing
- BitLocker Driver Encryption and, BitLocker modes
- boot sector, NTFS structure
- change journals, NTFS structure, Change journals
- Check Disk tool, Preventing disk-integrity problems
- Chkdsk command, Analyzing FAT volumes by using ChkDsk
- choosing partition format, Creating partitions and simple
volumes
- compression, ReFS integrity streams, data scrubbing, and
salvage, How
quota management works
- configuring mount points, Configuring mount points
- converting MBR and GPT disks, Understanding legacy and protective
MBRs
- converting to, Performing a clean installation, Converting FAT or FAT32 to
NTFS, Creating
partitions and simple volumes
- data streams, Hard links
- default cluster sizes, Understanding the disk and file-system
structure
- enabling BitLocker, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on fixed data drives
- extending partitions, Extending partitions
- features, NTFS
structure, Analyzing the NTFS structure
- file screening., Understanding file screening and storage
reporting (see file screening)
- fixed sector size, Understanding the disk and file-system
structure
- formatting removable disks, Converting FAT or FAT32 to NTFS
- hard links, Advanced NTFS features
- managing disk quotas, Maintaining and optimizing storage
- metadata, NTFS
structure, Analyzing the NTFS structure, Transactional NTFS
- object identifiers, Change journals
- Optimize Drives utility, Preventing fragmentation of disks,
Preventing
fragmentation of disks
- Read-Only attribute, Managing access permissions
- ReFS comparison, Transactional NTFS
- reparse points, Object identifiers
- Self-Healing NTFS, Sparse files
- shadow copies and, Managing file sharing
- sparse files, Sparse files, How quota management works
- standard file sharing, File-sharing essentials
- structural overview, NTFS structure
- timestamp updates, Creating a standard volume
- transactional NTFS, Sparse files
- Transactional Registry and, Introducing the registry
- version numbers, NTFS structure
- volume size, Managing and maintaining MPIO
- NTFS permissions, Basic permissions
- NTFS.SYS store engine, ReFS features
- NtfsDisableLastAccessUpdate registry value, Creating a standard
volume
- Ntldr boot loader, Resolving hardware and firmware startup
problems, Changing the operating system display
order
- Nvrboot command, Resolving hardware and firmware startup
problems
- NX (never execute) bit (DEP), Windows 8.1 and Windows Server 2012
R2
- NX (no execute) bit (AMD), Meeting performance, capacity, and
availability requirements
- NX (No Execute) policy (Windows Boot Loader), Viewing BCD entries,
Setting BCD entry
values