Home > Store

Ultimate Windows Server 2003 System Administrator's Guide, The

Register your product to gain access to bonus material or receive a coupon.

Ultimate Windows Server 2003 System Administrator's Guide, The


  • Sorry, this book is no longer in print.
Not for Sale



The ultimate guide to the new Windows .NET Server 2003 for experienced system administrators.

° Not only explains the new features of Windows .NET Server 2003, but also provides continued support for Windows 2000 administration

° Covers changes in security, Active Directory, Microsoft Management Console, and integration with the .NET Framework 1.1, among many others changes

° Foreword from Brian Valentine, VP of Windows Platforms at Microsoft


  • Copyright 2003
  • Dimensions: 7-3/8" x 9-1/4"
  • Pages: 1008
  • Edition: 1st
  • Book
  • ISBN-10: 0-201-79106-4
  • ISBN-13: 978-0-201-79106-8

Windows .NET Server 2003 is the first Microsoft product that is innately affected by the company's recent Trustworthy Computing initiative. If this is successful, this will be the most stable, reliable, and dependable server OS that Microsoft has ever released. It will also feature an integrated environment with the .NET Framework and the Common Language Runtime. The Ultimate Windows .NET Server 2003 System Administrator's Guide is an essential resource for planning, deploying, and administering a Windows .NET enterprise system. The authors draw on years of experience designing and administering Windows NT and UNIX systems in order to guide you through the varied tasks involved in real-world system administration. There are detailed discussions of key Windows .NET Server administrative functions, and descriptions of many advanced tools and optional components. In addition the authors have included a comprehensive and convenient command reference.

Sample Content

Downloadable Sample Chapter

Download the Sample Chapter related to this title.

Table of Contents



1. Administrative Overview.

Windows .NET—A Historical Perspective.

Understanding the .NET.

Windows .NET Administrative Roles.

Scope of Responsibility.

Windows .NET Features and Administration Implications.


2. Windows.NET Structure and Architecture.

Structural Modes, Subsystems, and Managers.

Windows .NET Processes.

Stored and Virtual Memory.

The Boot Process.

Viewing Application Dependencies.

Application Compatibility.

IntelliMirror and Other Innovations.


3. Planning and Installation.

Logical and Physical Structures.

Planning for Windows 2000 and NT Upgrades.


Device Driver Management.

Hardware Autoplay.

Windows Product Activation.

Automatic Product Update.

File Transfer Wizard.

System Restoration.

Uninstall Windows XP Operating System.


4. Getting Started: The OS Interface.

Interface Basics.

Help and Support.


Internet Connectivity and Internet Explorer 6.0.

Winkey Quick Keys.

Internationalization and Localization.

ClearType Mobile Computer/Liquid Crystal Display Enhancements.


5. The Active Directory.

Directory Services.

Active Directory Structural Components.

Open Standards Support and Naming Conventions.

Migration and Backward Compatibility.

Administrative Interface Snap-Ins.

API Options.

Administrative Security and Trust Relationships.

Administrative Delegation.


6. Active Directory Management and Use.

Planning for the Active Directory.

Installing the Active Directory.

Active Directory MMC Snap-In Tools.

Creating Organizational Units.

Locating Objects.

Active Directory Administrative Delegation.

Global Catalog Refinement.

The Active Directory Connector.


7. User Accounts and Groups.

User Accounts.



8. Group Policies.

Understanding Group Policies.

PO Implementation.

PDC Operations Manager.

esultant Set of Policy.

Group Policy WMI Filtering.



9. Permissions, Security, Folder Sharing, and DFS.

Permissions Security, Folder Sharing, and DFS.

Reviewing NTFS Permissions.

Folder Sharing.

Distributed File System Sharing.


10. Kerberos and the Public Key Infrastructure.

Kerberos Authentication.

The Public Key Infrastructure.


11. Additional Security Issues and Solutions.

Security Policy.

Security Authorization Manager.

Windows .NET System Lockdown.

Secure Network Services and Architecture.

The End User's Responsibility.


12. Networking Basics and Naming Services.

Networking Basics.

Naming Services and IP Assignments.

Real Time Communications.

TAPI Streaming Support.

DNS Configuration Through Group Polcy.

Support for Broadband PPPoE Connections.


13. Virtual Private Networks and IP Security.

Virtual Private Networks.

IP Security.


14. Disk Management, Backup and Restoration, and Disaster Recovery.

Disk Management.

Backup and Restoration.

Disaster Management.


15. Terminal Services.

Conceptual Review.

Installing Terminal Services.

Configuring Terminal Services.

Terminal Services Administration.

Terminal Services from a User's Perspective.


16. Internet Information Services.


Understanding the IIS Web Server.

Working with the SMTP Server.

Understanding the NNTP Server.

Understanding the FTP Server.


17. Cluster, Indexing, Message Queuing, SMS, MOM, and WSH.

Understanding Cluster Services.

Index Services.

Message Queuing Services.

System Management Server.

Microsoft Operations Manager.

Windows Scripting Host.


Appendix: Windows.NET Commands and Utilities.

Command Line Tools New Under Windows .NET.

Backup Commands.

Batch Commands.

Comparison Commands.

Display Commands.

File Management Commands.

File Manipulation Commands.

Miscellaneous Commands.

Networking Commands.

Print Commands.

Search Commands.

System Management Commands.

Resource Kit Support Tools.



Index. 0201791064T03252002


Windows .NET is more an update of Windows 2000 than it is a new operating system. This latest version of the base Windows NT technology now expands to support Microsoft's .NET infrastructure and new security initiatives. This book reflects these changes by expanding the authors' previous The Ultimate Windows 2000 System Administrator's Guide. Mindful that Windows 2000 will continue to be deployed, this book not only reflects the new features of Windows .NET but also provides continued support for Windows 2000 administration.

Windows 2000 and Windows .NET are complex, feature-rich operating systems whose deployment in an enterprise requires highly skilled individuals to support its installation, maintenance, and optimization. These individuals are aided by the abundance of tools and wizards for effective operating system management that Microsoft has provided. Indeed, many of the enhanced tools should shift the traditional role of administrator to that of proactive manager of computing environments. Thus, the depth of function, flexibility, and granularity of Windows 2000/.NET ultimately represents both opportunity and challenge for system administration.

This book is written to help you succeed in the administration of the Windows .NET and Windows 2000 Server family. Much of the information it provides is also applicable to the desktop Professional versions of the software. Although the use and management of client software is incorporated, the server side is clearly our primary focus. In this preface, we provide a framework for the primary topics covered, define the target audience, and describe how to use this book.

The Role of the Administrator

Windows .NET will not eliminate the system administrator. To the contrary, features, such as the Active Directory and the Microsoft Management Console (MMC), will vastly broaden this role. Rather than spend time on mundane tasks and the management of dozens of disjointed tools, the consolidated approach provided by Windows .NET will free the administrator to concentrate on more mission-critical activities.

The functions of the Windows .NET system administrator are generally those that support the user population and those that support the system. The following list summarizes some of the most common responsibilities:

User-oriented tasks
  • Adding and removing users
  • Group management
  • User application support
  • End-user customer service, education, and communication
  • Management of basic services such as mail and printing
System-oriented tasks
  • Booting, shutdown, and everything in between
  • Backups and restoration
  • Hardware maintenance, additions, and removal
  • System accounting and monitoring
  • System administration logs
  • System security and password aging
  • Network support
  • General troubleshooting

Obviously, this list only scratches the surface of system administration and IT management. However, as a means of setting the reader's expectations, it does underscore the types of activities for which this book can be used as a guide.

Basis of Our Research

In preparing this book, we used three primary sources of information. First, we relied heavily on our combined professional experience in application development, system administration, and IT management. Unlike so many books written on theory by technical writers, our recommendations did not emerge from a vacuum but are based on reality and experiences. We hope the experience we bring to this book will assist fellow IT professionals to better manage an enterprise.

Second, we used observations from system administrators in the field to provide "reality checks" to our conclusions. Theoretical understanding of Windows .NET is a nice beginning, but it is no substitute for the actual experience of system administrators. Because Windows .NET is a new product, one of our primary sources was participants in Microsoft's Beta Program and their experience with final beta and final release versions of the operating system.

Finally, we performed extensive tests and simulated real-world environments in an extensive laboratory environment. The tests centered primarily on the Standard Server and Enterprise Server versions; however, Windows .NET Web Server edition and Windows XP was also tested and is periodically referenced as client software within the broader enterprise framework. Windows .NET DataCenter was not available for testing at the time this book was written, so references to it are based on published Microsoft specifications. Where differences exist in the version levels, we call attention to them.


The Ultimate Windows .NET Server System Administrator's Guide was written for system administrators and other IT professionals who manage a Windows .NET environment. Administrators coming from other operating system environments like UNIX will find many significant conceptual differences and numerous familiar technologies. Seasoned Windows 2000 and NT administrators will find many familiar aspects, but many significant differences as well, that will require a general updating of their technical skills. The addition of the Active Directory, a new domain model, advanced authentication technologies, and the enhanced MMC are just a few examples of entirely new or expanded operating system features.

Our aim was to produce an intermediate reference guide for administrators, leaving out specialized architectural or programming topics. Thus, this book should be used for an understanding of key concepts and for common "how-to" walkthrough support. Experienced professionals should find the discussions on operating system migration and the use of the new enhanced tools valuable. Those with moderate system administration experience can also benefit, but we assume these readers already have hands-on operating system experience. Novices will need to learn network and operating system fundamentals.

Attempting to provide useful information to an audience of system administrators was a challenge. Inevitably, some of the book's material may appear either overly basic or too advanced, and depending on a reader's level of experience, some discussions will be more helpful than others. To accommodate this wide variance in prior knowledge, we first cover each major topic from a conceptual basis and then expand this foundation with discussions on applying specific advanced Windows .NET functions.

System administrators coming from UNIX might find helpful our sister publication Windows NT and UNIX: Administration, Coexistence, Integration, and Migration (Addison-Wesley, 1998). For Windows 2000 administrators, look at The Ultimate Windows 2000 System Administrator's Guide (Addison-Wesley, 2000).


The book is organized into three parts and an appendix:

  • The first four chapters focus on Windows .NET concepts, deployment, and installation. They cover the role of the system administrator, Windows .NET features, operating system structure, and deployment and actual installation. Chapter 4 discusses getting started with tools such as the MMC.
  • The heart of the book, chapters 5 through 14, is a discussion of fundamental administration topics. In a series of very technical chapters, we cover the Active Directory, user management, group policies, security, printer and file services, networking, and other topics essential to Windows .NET system administration.
  • The last part of the book covers advanced tools and concepts. It examines the Internet Information Service (ISS) and optional components--Terminal Services, System Management Server (SMS), Indexing Services, Message Queuing Services (MQS), Cluster Services--and other topics applicable to enterprise-level system administration.
  • The appendix, Windows .NET Commands and Utilities, is a quick reference for the most significant commands in the operating system and in the Windows .NET Resource Kit.

A Glossary of common terms is also provided.

Other References

There is a wealth of information that should be used by system administrators to supplement this book. The Windows .NET operating system provides extensive online help available from the Start → Help facility. Microsoft also regularly posts white papers on its Web site, which should be regularly checked for updated information.

Trade magazines can also be an excellent source of information. We recommend Computer World, WindowsAdvantage.com, InformIT.COM, Windows 2000 Magazine (formerly Windows NT), ENT, MS Journal, and Dr. Dobb's Journal. As for online services, we strongly recommend Microsoft's security and patch e-mail service at www.microsoft.com/security/.Finally, we will be posting updated information about Windows 2000 and Windows .NET on our Web site at http://www.EnterpriseCertified.com/WinNetbook.htm.



When I'm not managing the Windows engineering team, I like to play hockey. This helps me understand the mentality of IT managers and systems administrators because, like you, I play defense. As a matter of fact, I'm a goaltender, which means I'm the last one standing when my defensive line fails. If we're down a few goals at the end of a period, you'll find me ranting and raging in the locker room, "Where's my defense?" You know how this feels. It's often you defending your system against hackers, you resetting the client machines after an application or configuration "accident," you dealing with a bogged-down network, you trying to stay one step ahead of threats that change speed and direction and seem to shoot toward you at 100 miles per hour. And if the "opponent" scores, it shows up on your record.

Wouldn't it be great if you weren't the last line of defense? Wouldn't you rather be the offense, focusing on adding value for your users, making them more productive, making the tools they need easier to access, getting crucial data to them faster--basically getting (and keeping) them connected to everything they need to do their jobs well? With Windows Server 2003, we've worked to build something as fast, solid, and smooth as the ice on a hockey rink.

We've made file server and web server performance at least twice as fast as Windows 2000; file system performance is 140 percent better; and Active Directory searches are more than four times faster. A range of new and improved features, including memory mirroring, Hot Add Memory, and health detection in Internet Information Services (IIS) 6.0, enhances reliability. Clustering for up to 8 nodes and network load balancing is built in, and, as with Windows 2000, several major OEMs will guarantee 99.9 to 100 percent availability. Configuration wizards install and set up services automatically based on the server roles you choose; settings are securely locked down by default.

During this product cycle, we stopped the development machine to dedicate every Windows employee to an intense security review of every line of Windows Server 2003 code to identify and eliminate possible fail points and exploitable weaknesses so that your Windows server won't go down unless you turn it off.

Windows Server 2003 will help you get more done faster. The .NET Framework is fully integrated and saves developers from writing "plumbing" code so that they can focus their efforts immediately on writing code. Group Policy Management Console (GPMC) has a new user interface that dramatically simplifies policy administration. The addition of Resultant Set of Policy reporting and scripting means that now you're able to model settings in a test domain before copying the policy objects to production domains in your enterprise. With the new volume shadow copy service, users can retrieve previous versions of files from servers instantly, without requiring you to dig through backup tapes. We've greatly enhanced the command-line functionality in the Windows Server 2003 family and added "headless server" capabilities that allow IT administrators to install and manage a computer without a monitor, VGA display adaptor, keyboard, or mouse. And we ship it with ready-to-use scripts. Software Update Services collects new updates from Microsoft as they are released and automatically deploys the ones you approve to clients and servers. And this is just a sample of what Windows Server 2003 offers to clear the way for you to add more value for users.

Deploying Windows Server 2003 is like drafting the right players, suiting themup with the right equipment, and giving them the home rink advantage. Now all you need to maintain a winning style is a great coach and playbook to guide you through using the tools and resources in the right combination at the right times. In The Ultimate Windows Server 2003 System Administrator's Guide, coaches Williams and Walla describe best practices for designing and deploying the Active Directory, sharing and securing network resources, getting users connected no matter where they are, and managing and maintaining Windows Server 2003 servers in your enterprise. This book will be a supportive resource to help you know how to use the tools and features Microsoft shipped, but even better, it guides you through enough of the product internals to approach administration more strategically. A good coach tells you what to do to win; a great coach helps you develop the skills to win on your own. Enjoy this great book.

—Brian Valentine
Senior Vice President,
Microsoft Windows Division


Download the Index file related to this title.



Untitled Document Second Print Updates: The Ultimate Windows Server 2003 System Administrator's Guide

Chapter 1: Admin Overview
Page 2, first paragraph, first two sentences … please replace them as follows:

The fundamental differences between Windows Server 2003 and its predecessor Windows 2000 reside in its embrace of the Microsoft .NET framework, tightened security features, improved scalability, and enhanced administrative tools. While explored later, the .NET framework deserves special mention since it propels the Windows environment into a transparent Internet services-based operating system.

Page 7, Table 1.3 … DataCenter Edition Column
Maximum Ram change 64 GB and 128 GB to 128GB and 512 GB respectively
Multiprocessor Support change Maximum 32 to Maximum 64

Chapter 3: Planning and Installation
Page 101 Figure 3.4

Page 118 Figure 4.2

Page 145 First full paragraph starting with "With each … Remove the second sentence and replace with …
Windows 2003 Server shipped with IE6 configured with enhanced security settings together with other features to reduce administrative headache.

Page 145 before subsection Contacts and Instant Messaging Integration add a new subsection (note: we should be able to get this in with much pagination issues … but I could cut some verbiage if necessary)

The standard configuration for IE6 assumes heightened security settings and thereby reducing threats. A conscious decision must be made to lower predefined settings. The assumption is that access to Internet and intranet sites are achieved on a zone basis in which Trusted sites are added by the administrator or the client user. You should add the Web page that hosts the application to the Trusted sites zone when you want to run a browser-based client application over the Internet. Running a browser-based client application over a protected and secure local intranet requires adding the Web page that hosts the application to the Local intranet zone. Security Configuration is achieved by launching Internet Explore à select tools à select the Security Tab.

Page 148 before the Postscript Section … need to add another section (again, if we need to edit out some language to fit for pagination reasons, let me know)


A new usability feature is Shadow Copies of Shared Folders that provides for the remote storage and retrieval of files that may be damaged or lost on a local system. Shadow Copies of Shared Folders allow a user to access shared files and folders as they existed in the past. This affords not only an ability to compare earlier documents but it provides an excellent means for file recovery. The client software for Shadow Copies of Shared Folders is located on the server and requires client deployment through the Disk Properties MMC Snap-in. The client software for Shadow Copies of Shared Folders is installed on the server in the \\%systemroot%\system32\clients\twclient directory. Group Policy tools are commonly used for deployment. Client views of shadow copies are accessed through the Previous Versions tab of the Properties dialog box of the shared file or folder. The minimum amount of storage space that can be specified is 100 megabytes (MB). Older versions when the storage limit is reached. There is a limit of 64 shadow copies that can be stored on a volume.

Chapter 5: Active Directory
Page 180 after Note add another Note (Because of the room in the last page of this chapter, you should be able to get this in with pagination problems)

NOTE: When connecting to domain controllers running Windows 2000 precautions must be taken to insure that signing LDAP traffic guarantees packaged data comes from a known source. By default, Windows 2000 Active Directory does not sign and encrypt all LDAP traffic. We strongly recommended that all Windows 2000 domain controllers be upgraded to Service Pack 3 or later in order to add these security functions. Alternately, although not recommended, signed and encrypted LDAP traffic can be disabled on Windows Server 2003.

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020