- A -

ABS database described

ABS server described

Access: administering

Access: controlling with authentication

Access: solving problems

Accounts: default

Accounts: setting up

Active Server Pages (ASP) described

Active X server components described

Administering security, access

Administration: ILS service

Administration: improving

Administration: tools

Architecture: component relationships

Architecture: ILS

Architecture: model

Architecture: platform

Architecture: software overview

ASCII text described

Authentication: Challenge-Response, described

Authentication: checking server options

Authentication: controlling access with

Authentication: described

Authentication: failed, monitoring

Authentication: Membership System

Authentication: Windows NT

- B -

Browsers described

- C -

Capacity: memory

Capacity: monitoring

Capacity: monitoring processor

Capacity: monitoring service

Capacity: planning for increased

Capacity: predicting

Challenge-Response authentication described

Changing log settings

Client computer described

Clients, ILS component

Commercial Internet System described

Common gateway interface described

Components: Active X server

Components: descriptions of key processes

Components: ILS high level

Components: ILS relationships with

Components: key

Components: key (table)

Components: relationships between key ILS

Components: testing client-side software

Configuration: and Setup

Configuration: first platform (diagram)

Configuration: monitoring

Configuration: options

Configuration: problem solving

Configuration: troubleshooting platforms

Configuring: ILS

Configuring: ILS

Configuring: Internet Locator Server

Configuring: platform

Configuring: reconfiguring for live service

Confirming: cutover success

Confirming: platform function

Connecting NetMeeting to servers

Connections: checking maximum in ISM

Connections: configuring maximum to ILS server

Connections: problems with clients using ILS

Connectivity: requirements

Connectivity: setting parameters

Conventions, document

Creating ILS entries

Customizing: ILS

Customizing: ILS interface

Cutover process: overview

Cutover process: troubleshooting

- D -

Data: center described

Data: maintaining

Data: problem-solving

Default user account

Design, ILS (diagram)

Disabling ILS service

DLLs, missing files, troubleshooting

DNS described

Document conventions

Documentation, additional

Downloading: Internet Mail

Downloading: Microsoft Internet Explorer, NetMeeting

- E -

E-mail described

Enabling ILS service

Event logs, viewing

Event Viewer messages, using

Events, Windows NT, ILS use of

Example implementation

Extended security

- F -

Features: key

Features: process integration

Files: DLL, missing

Files: log

Firewall, packet passage though

- G -

Globally Unique Identifier described

Going live

GUID described

- H -

Hardware, minimum requirements

Home page described

HTML: described

HTML: interface described

HTTP: described

HTTP: interface component

Hyper Text Markup Language

- I -

IIS HTTP service described

IIS: configuring accounts for use with ILS

IIS: described

IIS: setting up

ILS databases: administration tools

ILS databases: described

ILS databases: managing entries

ILS servers: hardware, software requirements

ILS servers: key component of ILS

ILS servers: monitoring performance

ILS/HTTP process

ILS/LDAP process

ILS/ULP process

ILS: architecture

ILS: components, high level

ILS: configuring

ILS: configuring

ILS: connectivity requirements

ILS: customizing interface

ILS: database component

ILS: described

ILS: design (diagram)

ILS: documentation, additional

ILS: key features

ILS: minimum requirements

ILS: monitoring

ILS: operating

ILS: overview of

ILS: related products

ILS: scaling

ILS: servers, determining load

ILS: service

ILS: service

ILS: service

ILS: service

ILS: setting parameters using ISM, inetcfg

ILS: setting up

ILS: setting up, configuring

ILS: Start Page

ILS: startup problems

ILS: the business need

ILS: topology of network system (diagram)

ILS: uninstalling

Implementation examples

Improving: administration

Improving: operations

Inetcfg: administration tool

Inetcfg: running

Inetcfg: starting and stopping ILS

Installations: testing

Installations: troubleshooting

Integrated functionality

Internet directory protocol, further reading

Internet Explorer, downloading

Internet Information Server

Internet Mail and News described

Internet Mail, downloading

Internet Server Application Programming Interface described

IP: address, pinging

IP: described

ISAPI described

ISM: checking maximum connections

ISM: configuring ILS options

ISM: described

ISM: modifying log settings

ISM: setting security options

ISM: starting, stopping ILS

- J -

Jockey connection example

- K -

Key components (table)

Key processes

- L -

LAN described

LDAP interface component

LDAP server object, monitoring performance through

LDAP Service Properties page

LDAP service, starting and stopping

LDAP: described

LDAP: determining ILS server load

LDAP: granting, denying access to service

LDAP: starting service before receiving queries

Live service, reconfiguring for

Log files, types

Logons: failures

Logons: failures

Logons: problems using Membership Broker

Logons: solving data problems

Logs: maintaining

Logs: modifying settings

- M -

Maintaining: data, logs

Maintaining: ILS transaction logs

Managing: ILS database entries

Managing: processes

MAPI described

Membership Agent described

Membership Broker, logon problems

Membership System: authentication

Membership System: described

Memory: increasing RAM for better performance

Memory: minimum requirements

Memory: monitoring capacity

Memory: monitoring performance

Memory: RAM, adding when going live

Messages, Event Viewer

Microsoft Commercial Internet System described

Microsoft Internet Explorer, downloading

Microsoft Messaging API described

Microsoft NetMeeting, downloading

Minimum requirements of ILS

Model of ILS architecture

Monitoring: capacity

Monitoring: configuration

Monitoring: failed logon attempts

Monitoring: ILS

Monitoring: local resource use

Monitoring: memory performance

Monitoring: performance

Monitoring: primiary indicators

Monitoring: processor performance

Monitoring: security

Monitoring: service

Monitoring: service

- N -

NetMeeting: creating ILS entries

NetMeeting: downloading

NetMeeting: verifying connectivity

NTLM described

- O -

Operating ILS

Options: checking server authentication

Options: configuration

Options: security

Overview: cutover process

Overview: ILS architecture

Overview: ILS platform

Overview: ILS process

Overview: ILS software

- P -

Passwords, default

Performance Monitor: counters

Performance Monitor: counters

Performance Monitor: counters

Performance Monitor: monitoring physical resource

Performance Monitor: setting thresholds

Performance Monitor: using to monitor ILS

Performance: increasing RAM for better

Performance: monitoring

Permissions, setting up

Ping utility: checking connections with

Ping utility: described

Ping utility: testing network functionality with

Planning for increased capacity

Platform architecture

Platforms: configuring

Platforms: confirming function of

Platforms: first platform configuration (diagram)

Platforms: ILS overview

Platforms: preparing

Platforms: troubleshooting

Predicting capacity

Privileges, administrative, setting

Processes: flow

Processes: integration

Processes: key

Processes: managing

Processes: overview

Processes: solving problems

Processor: monitoring capacity

Processor: performance, monitoring

- R -

RAM: described

RAM: increasing for better performance

Random access memory (RAM) described

Reconfiguring: for live service

Reconfiguring: ILS security settings

Registry, corrupted, troubleshooting

Reinstalling ILS binaries using Setup

Relationships: between ILS components

Relationships: between processes

Remote procedure calls (RCPs) described

Rights, setting up

RPCs described

Running: inetcfg

Running: Setup

Running: tests

- S -

Scaling ILS

Screens, Setup (table)

Secure Sockets Layer (SSL) protocol

Security: administering

Security: extended

Security: levels

Security: monitoring

Security: options, setting

Security: reconfiguring settings

Security: solving problems

Servers: configuring maximum connections to

Servers: connecting NetMeeting

Servers: large-scale setup

Servers: not starting

Servers: starting, stopping

Setting up: ILS

Setting up: ILS

Setting up: Performance Monitor logging

Setting up: rights, accounts, permissions

Setting up: Windows NT, IIS

Settings: ILS parameters using ISM, inetcfg

Settings: log, modifying

Settings: Performance Monitor

Settings: security, reconfiguring

Setup: and configuration

Setup: large-scale server

Setup: reinstalling ILS binaries

Setup: running

Setup: screens (table)

Setup: testing client requirements

Setup: troubleshooting

Setup: verifying success of

Simple Network Management Protocol (SNMP) described

SNMP described

Software: component relationships

Software: ILS relation to components

Software: key components (table)

Software: minimum requirements

Software: minimum requirements

Software: overview

SSL: described

SSL: protocol, ILS support

SSL: using support for ILS

Start page

Starting: ILS

Starting: LDAP service before receiving queries

Starting: multiple ILS servers

Startup, troubleshooting problems

Stopping: ILS

Stopping: ILS servers

System stability, evaluating

- T -

Testing: evaluating system stability

Testing: ILS installation

Testing: running tests

Testing: setup, client requirements

Tokens described

Tools: administration

Tools: monitoring

Transaction logs, maintaining

Troubleshooting: cannot start service

Troubleshooting: configuration problems

Troubleshooting: cutover process

Troubleshooting: ILS

Troubleshooting: ILS data problems

Troubleshooting: installations

Troubleshooting: platforms

Troubleshooting: processing problems

Troubleshooting: security, access problems

Troubleshooting: Setup

Troubleshooting: startup problems

Typographical conventions

- U -

ULP interface component

Ulserver.dll, verifying presence of

Uniform Resource Locator (URL) described

Uninstalling ILS

URL described

User accounts, default

- V -

Verifying: Setup success

Verifying: virtual roots

Verifying: Windows NT authentication packages

Viewing ILS transaction logs

Virtual roots, verifying

- W -

WAN described

Web browsers: client component

Web browsers: viewing ILS entries

Web pages, managing ILS database entries with

Wide area network described

Windows NT: corrupt registry problems

Windows NT: events, ILS use of

Windows NT: Performance counters, use

Windows NT: setting administrative privileges

Windows NT: setting up

Windows NT: viewing event logs

Wobble Corporation example

WWW: Service Properties Directories page

WWW: service, starting and stopping


© 1996-1997 Microsoft Corporation. All rights reserved.