A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Compatibility Scripts
For maximum performance on a Terminal server in application server mode, some applications require minor changes after installation. Scripts are available for these applications and must be run after the application installation is complete. The scripts are located in systemroot in \Application Compatibility Scripts\Install.
Connection Manager
Connection Manager 1.2 provides support for local and remote connections to your service using a network of access points, such as those available worldwide through Internet service providers (ISPs). If your service requires secure connections over the Internet, you can use Connection Manager to establish Virtual Private Network (VPN) connections to your service.
Data Decryption Field (DDF)
A header field, in a file encrypted by using the Encrypting File System that contains the file encryption key encrypted with the file encryptor's public key.
Data Recovery Field (DRF)
A header field, in a file encrypted by using the Encrypting File System, that contains the file encryption key encrypted with a recovery agent's public key.
Disk duplication
Disk duplication, or imaging, is a method for duplicating a configuration to multiple destination computers. The destination computers might be part of a network or non-networked. Sysprep works on computers that have similar hardware configurations with identical hardware controllers and hardware abstraction layers (HALs) as the source computer.
Domain Name System (DNS)
A method of naming computers on a network via a hierarchical naming system with the "root" domain at the top of the hierarchy. The Internet uses DNS as do Windows 2000 networks.
Encrypting File System (EFS)
An extension of the NTFS 5.0 file system that allows a user to encrypt files using their private key.
Forward lookup query
A forward lookup is when a host name is resolved to an IP address.
Fully qualified domain name (FQDN)
A Fully qualified domain name is the host name combined with the domain name, such as www.microsoft.com.
Group Policy
Group Policy is a Windows 2000 Technology that allows for centralized change management and desktop control. It is similar to the Windows NT 4.0 System Policies.
Internet Authentication Service (IAS)
Software services that provide security and authentication for dial-in users.
Internet Connection Sharing (ICS)
A Windows 2000 technology that allows multiple computers on a private network to connected to the public Internet via a single connection to the Internet.
Internet Protocol Security (IPSec)
A method of encrypting communications transparently so that they are protected during transit on the wire. Users and applications do not need to be IPSec aware to take advantage of IPSec.
IP Security Policy Management
IPSec is a policy driven security infrastructure. IPSec policies consist of a series of decision trees that determine when and how IPSec should be applied.
Microsoft Management Console (MMC)
The MMC is the central management interface used to administer the Windows 2000 operating system environment.
Mixed mode
Mixed mode allows Windows NT and Windows 2000 domain controllers to co-exist in a domain. Mixed mode does not support the universal and nested group enhancements of Windows 2000. The domain mode setting can be changed to Windows 2000 native mode when all Windows NT domain controllers are removed from a domain.
Multiuser Environment
Terminal Services allows a multiuser environment on a terminal server where each user runs their own applications in their own, dedicated computing environment. This is in contrast to Remote Control programs which typically allow a single user access to the remote machine.
Name server
A name server is a server service that provides a method of translating network names to IP addresses. Two examples of a name server are DNS Servers and WINS Servers.
Native mode
When all domain controllers in the domain have been upgraded to Windows 2000 and an administrator has enabled native mode operation.
Network Address Translation (NAT)
Private addresses cannot receive traffic from Internet locations. Therefore, if an intranet is using private addresses and communicating with Internet locations, the private address must be translated to a public address. A network address translator (NAT) is placed between an intranet that uses private addresses and the Internet, which uses public addresses. Outgoing packets from the intranet have their private addresses translated by the NAT into public addresses. Incoming packets from the Internet have their public addresses translated by the NAT into private addresses.
Network installation shared point
A network share containing the Windows 2000 installation files.
Primary zone database file
A DNS Zone file that is the read/write copy of the zone.
Public Key Infrastructure (PKI)
The term generally used to describe the laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce. Public key infrastructure is also called PKI.
Remote Authentication Dial-In User Service (RADIUS)
A security authentication protocol based on clients and servers and widely used by Internet service providers (ISPs) on non-Microsoft remote servers. RADIUS is the most popular means of authenticating and authorizing dial-up and tunneled network users today.
Remote Desktop Protocol (RDP)
A key component of Terminal Server is the protocol that allows a "super-thin client" to communicate with the Terminal Server over the network. This protocol is based on International Telecommunications Union's (ITU) T.120 protocol, an international, standard multichannel conferencing protocol currently used in the Microsoft NetMeeting conferencing software product. It is tuned for high-bandwidth enterprise environments and will also support encrypted sessions.
Remote Display Protocol
The Remote Display Protocol controls the graphics display on the terminal client.
Remote installation service (RIS)
Software services that allow an administrator to set up new client computers remotely, without having to visit each client. The target clients must support remote booting.
Routing and Remote Access Service (RRAS)
A comprehensive Routing and Remote Access Server service that provides a number of services for remote access connections into and leaving a Windows 2000 network.
Secondary zone database file
The Secondary Zone database file is a read-only copy of the zone database obtained from the Primary DNS Server for the zone.
Secure Sockets Layer (SSL)
A protocol for secure network communications using a combination of public and secret key technology.
Setup Manager
Setup Manager is a wizard that guides you through the process of creating a custom answer file. You can use it to set many of the answer file parameters that customize and automate an installation. Using this tool also minimizes data-entry errors that are more likely to happen when using a text editor to create the answer file.
Smart card
A credit card-sized device used to securely store public and private keys, passwords, and other types of personal information. To use a smart card, you need a smart card reader attached to the computer and a personal PIN number for the smart card. In Windows 2000, smart cards can be used to enable certificate-based authentication and single sign-on to the enterprise.
An answer file that is used with the System preparation tool or Sysprep. System preparation tool. Use Sysprep to install an identical configuration, including applications, on multiple computers. Sysprep allows you to duplicate a custom image based on a Windows 2000 Professional installation from a master computer to destination computers. Both the master and destination computers must have similar hardware and software configurations. The master computer and the destination computers must have the same HAL and mass storage device controllers.
Terminal Client
A machine that runs software that allows it to connect to a terminal server to run applications on the server, rather than locally.
Terminal Server
A machine that runs software services that allow client applications to be run on a server, so that client computers can function as terminals rather than independent systems. The server provides a multisession environment and runs the Windows-based programs being used on the clients.
Terminal Services
An optional component of Microsoft Windows 2000 Server that delivers the Windows 2000 desktop and Windows-based applications to remote computers and devices.
Virtual Private Network
A VPN is a network that is created by using tunneling protocols, such as PPTP/MPPE or L2TP/IPSec.
Windows Management Instrumentation (WMI)
A management infrastructure in Windows 2000 that supports monitoring and controlling system resources through a common set of interfaces and provides a logically organized, consistent model of Windows operation, configuration, and status.
Windows Script Host (WSH)
Using the Windows Script Host, you can automate actions such as creating a shortcut and connecting to and disconnecting from a network server. WSH is language-independent. You can write scripts in common scripting languages such as Visual Basic Scripting Edition and Javascript.
Zone transfer process
The process of transferring, or copying a zone database file from a master server to a Secondary DNS Server.