Logo
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Server

Active Directory Domain Services 2008 : Configuring Attributes Not to Be Indexed for Containerized Searches & Configure Attribute Range

5/17/2011 4:22:58 PM

Configuring Attributes Not to Be Indexed for Containerized Searches

Configure the attribute not to be indexed for containerized searches.

To configure an attribute not to be indexed for containerized searches, perform the following steps:

1.
Log on to a domain controller or a member computer that has Windows Server 2008 RSAT installed.

2.
Click Start, click Administrative Tools, and click Active Directory Schema.

3.
In the console tree, expand Active Directory Schema and then click Attributes.

4.
In the details pane, right-click the attribute you do not want to be indexed for categorized containerized searches and click Properties.

5.
On the attribute properties page, deselect the check box next to Index this attribute for containerized searches, as shown in Figure 1.

Figure 1. Configuring an attribute not to be indexed for containerized searches.


6.
Click OK to save the changes.



Configure Attribute Range


Configure the attribute range by using the Active Directory Schema snap-in.

To configure the attribute range, perform the following steps:

1.
Log on to a domain controller or a member computer that has Windows Server 2008 RSAT installed.

2.
Click Start, click Administrative Tools, and click Active Directory Schema.

3.
In the console tree, expand Active Directory Schema and then click Attributes.

4.
In the details pane, right-click the attribute for which you want to configure the range and click Properties.

5.
On the attribute properties page, enter a minimum value in the Minimum field and enter a maximum value in the Maximum field, as shown in Figure 2.

Figure 2. Configuring an attribute’s range.


6.
Click OK to save the changes.

Attribute Range Acceptable Values

The minimum acceptable value is determined by the attribute’s syntax. Integer, Large Integer, and Enumeration syntaxes accept negative numbers. For these syntaxes, the smallest value that can be entered is -2,147,483,648. For all other syntaxes, the smallest value that can be entered is 0 (zero).

The maximum acceptable value is determined by the attribute’s syntax. If minimum and maximum values are defined, the maximum value must be greater than or equal to the minimum value.

Valid characters for minimum and maximum are 0–9.


Other -----------------
- SharePoint 2010 PerformancePoint Services : Working with the Monitoring API - Custom Object Editors
- SharePoint 2010 PerformancePoint Services : Working with the Monitoring API - Custom Objects and Editors
- SharePoint 2010 PerformancePoint Services : Working with the Monitoring API - Working with PPS Objects
- BizTalk 2010 Recipes : EDI Solutions - Subscribing to EDI Promoted Properties
- BizTalk 2010 Recipes : EDI Solutions - Creating Custom EDI Pipelines
- Monitoring Exchange Server 2010 : Monitoring Mail Flow (part 3) - Managing Messages
- Monitoring Exchange Server 2010 : Monitoring Mail Flow (part 2) - Monitoring Transport Queues
- Monitoring Exchange Server 2010 : Monitoring Mail Flow (part 1) - Configuring Message Tracking
- BizTalk 2010 Recipes : EDI Solutions - Configuring EDI Validation with Pipelines
- BizTalk 2010 Recipes : EDI Solutions - Configuring Automatic Acknowledgements
- Windows Server 2003 : Planning a Backup Strategy
- Windows Server 2003 : Monitoring Network Servers
- Monitoring Exchange Server 2010 : Monitoring Exchange Databases (part 2) - Monitoring DAGs
- Monitoring Exchange Server 2010 : Monitoring Exchange Databases (part 1) - Monitoring Exchange Database Information and Statistics
- Exchange Server 2010 : Configuring Transport Servers - Edge Transport Servers
- BizTalk 2010 Recipes : EDI Solutions - Configuring an EDI Envelope
- BizTalk 2010 Recipes : EDI Solutions - Creating and Configuring a Trading Partner
- SharePoint 2010 PerformancePoint Services : Working with the Monitoring API - Setting Up Your Development Environment
- SharePoint 2010 PerformancePoint Services : Installing SharePoint on a Client Operating System
- Exchange Server 2010 : Configuring Transport Servers - Hub Transport Servers (part 2)
 
 
Most view of day
- Microsoft Excel 2010 : Subtotaling by Multiple Columns
- Windows Server 2012 : Ensuring DHCP availability (part 2) - Implementing DHCP failover
- Using BDD 2007 for Deployment Planning
- Microsoft Systems Management Server 2003 : Configuring the Client (part 4) - Managing the Advanced Client Download Cache, Advertised Programs Process Flow
- Maintaining Dynamics GP : Improving stability by Managing Dictionaries
- Communicating with Internet Email : Sending Messages (part 2) - Setting Send Options, Maintaining Outlook Express
- Customizing OneNote 2010 : Customizing the Quick Access Toolbar
- Windows 7 Mobility Features : Working with the Windows 7 User Interface
- Windows Server 2008 R2 file and print services : Administering Distributed File System Services (part 2) - Configuring and administering DFS Replication
- Windows Server : Network Access Policy and Server and Domain Isolation (part 4) - Planning NAP DHCP Enforcement, Domain and Server Isolation
Top 10
- Windows Server 2012 : Configuring IPsec (part 7) - Configuring connection security rules - Monitoring IPsec
- Windows Server 2012 : Configuring IPsec (part 6) - Configuring connection security rules - Creating a custom rule, Configuring authenticated bypass
- Windows Server 2012 : Configuring IPsec (part 5) - Configuring connection security rules - Creating an authentication exemption rule, Creating a server-to-server rule, Creating a tunnel rule
- Windows Server 2012 : Configuring IPsec (part 4) - Configuring connection security rules - Types of connection security rules, Creating an isolation rule
- Windows Server 2012 : Configuring IPsec (part 3) - Configuring IPsec settings - Customizing IPsec tunnel authorizations, Configuring IPsec settings using Windows PowerShell
- Windows Server 2012 : Configuring IPsec (part 2) - Configuring IPsec settings - Customizing IPsec defaults
- Windows Server 2012 : Configuring IPsec (part 1) - Understanding connection security
- Microsoft Project 2010 : Linking Tasks (part 8) - Auditing Task Links,Using the Task Inspector
- Microsoft Project 2010 : Linking Tasks (part 7) - Creating Links by Using the Mouse,Working with Automatic Linking Options
- Microsoft Project 2010 : Linking Tasks (part 6) - Creating Links by Using the Entry Table
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro