S
SACL

A list of access controls used for auditing.

secondary zone

Read-only, host copies of known DNS information, designed to reduce traffic in an enterprise.

security baseline

An initial analysis that acquires data concerning the security of Active Directory, security policies, server scope, and GPO design.

security policy

A set of predefined standards to determine the security rules and regulations for an enterprise. Usually this is a document or set of easily accessible standards.

selective authentication

A trust that exists only in certain distinct locations throughout the infrastructure.

server availability

The time period in which a server is up, running, and not inaccessible.

server downtime

The period of time in which the operating ...

Get MCITP: Windows Server® 2008 Enterprise Administrator, Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.