[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]Abstract classLDAP accessRIS imagescontrolling security logscontrolling access control entries (ACEs). [See ACEs (access control entries)]Access Control Entry (ACE). [See ACE (Access Control Entry)]access control inheritance 2nd 3rd 4th 5th 6th access control lists (ACLs). [See ACLs (access control lists)]access listsmanagingActive Directory 2nd 3rd 4th access masks access permissionsActive Directory domains evaluation 2nd 3rd 4th 5th 6th 7th GPCsassigning GPTsassigning access rightsActive Directory 2nd delegation 2nd 3rd 4th 5th 6th access tokens 2nd 3rd 4th contentsviewing accessingmember serversauthentication 2nd 3rd 4th 5th 6th Accessing Advanced Server Parameters procedure (5.22) Accessing the Remote Installation Group Policy procedure (2.10) Accessing the WMI Filter Interface procedure (12.5) ACCM (Asynchronous-Control-Character-Map) account BDCsupgrading 2nd 3rd account lockout policies 2nd account migrationsdomains 2nd 3rd ACE(Access Control Entry) ACEs(access control entries) canonical sortingexceptions evaluation 2nd 3rd inheritance 2nd 3rd modifying viewing ACL Editor 2nd 3rd objectsownership management 2nd ACLs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th (access control lists) access permissionsevaluation 2nd 3rd 4th 5th 6th 7th ACEs(access control entries) evaluation 2nd 3rd inheritance 2nd 3rd modifying viewing DACLs(discretionary access control lists) objectsownership management 2nd permissionsinheritance 2nd 3rd 4th SACLs(system access control lists) ACPI (Advanced Configuration and Power Interface) plug-and-play 2nd 3rd 4th 5th 6th 7th 8th power management 2nd 3rd ACPI compatibility checksSetupinitial hardware recognition 2nd activationautomating Windows Product Activation 2nd 3rd 4th 5th Active Directoryanonymous access 2nd backing up 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th necessity of 2nd restoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th System State backups 2nd 3rd 4th classesderivations clients 2nd content rules databasecompacting 2nd 3rd repairing 2nd 3rd 4th DNSdynamic updates 2nd 3rd forwarders 2nd 3rd 4th 5th 6th 7th 8th integrated zones integration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th record scavenging 2nd security 2nd 3rd 4th 5th 6th zone integration 2nd 3rd 4th 5th DNS serversloss of 2nd 3rd 4th domain controllersGC-less logons 2nd 3rd loss of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th metadata cleanup 2nd 3rd 4th 5th 6th 7th domainsdesigning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th domain controller placement 2nd 3rd 4th domain naming master 2nd FSMOs (Flexible Single Master Operations) infrastructure master 2nd 3rd multiple domain forest trusts 2nd multiple domains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th multiple groups 2nd 3rd 4th 5th navigation PDC Emulators 2nd 3rd 4th 5th 6th 7th remote access 2nd 3rd 4th 5th 6th 7th 8th replication RIDs (Relative IDs) 2nd role master 2nd root domain names 2nd 3rd 4th 5th 6th schema master 2nd split public/private zones 2nd 3rd third-party name servers 2nd Windows-based zones 2nd 3rd drag-and-drop operations ESE (Extensible Storage Engine) forestsin-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th FSMOsloss of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th GPOs (Group Policy Objects)defaults groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th authorization 2nd 3rd Builtin groups 2nd 3rd 4th classifications 2nd Domain Local groups 2nd 3rd 4th 5th 6th 7th Global groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Machine Local groups 2nd 3rd nesting 2nd Universal groups 2nd 3rd 4th 5th 6th 7th 8th GUID (Globally Unique Identifier) IAS (Internet Authentication Service)registering with 2nd 3rd integrated DNS zones 2nd 3rd integrated zones IP subnetscreating LDAP 2nd 3rd maintenance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th namespaces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th client compatibility 2nd compatibility settings domains 2nd forests 2nd Global Catalogs 2nd 3rd 4th 5th naming contexts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th service location 2nd 3rd 4th 5th 6th trees 2nd 3rd 4th trust relationships 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th null sessions 2nd 3rd objectmaximum number of objectsattributes classes managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd protecting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th OID (Object Identifier) 2nd OU(Organizational Unit) designing OUsdesigning 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th lower-level OUs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th passwordsstorage PW2CA (Pre-Windows 2000 Compatible List) recovery stages replicationApplication naming context bridgehead server selection 2nd bridgehead servers 2nd collision handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th connections 2nd 3rd deleted containers 2nd deleted object handling 2nd 3rd deleted objects forcing 2nd 3rd 4th frequency 2nd 3rd 4th 5th 6th 7th garbage collection 2nd 3rd 4th identical distinguished names 2nd 3rd inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th inter-site topologies 2nd intervals 2nd 3rd 4th 5th ISTGs (Inter-Site Topology Generators) 2nd 3rd 4th 5th KCC (Knowledge Consistency Checker) linked values loss of components 2nd 3rd 4th 5th managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st manually controlling 2nd 3rd methods 2nd 3rd 4th moved objects naming contexts 2nd 3rd NET TIME 2nd 3rd 4th new features 2nd parameter control 2nd 3rd 4th 5th 6th 7th 8th property metadata 2nd 3rd property replication 2nd RPCs (Remote Procedure Calls) 2nd simultaneous modification 2nd site objects 2nd 3rd 4th sites 2nd 3rd special operations 2nd 3rd 4th 5th 6th 7th 8th 9th topology 2nd 3rd 4th 5th 6th 7th 8th 9th 10th transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th WIN32TM 2nd 3rd 4th WTS (Windows Time Service) 2nd 3rd restoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th authoritative restores 2nd 3rd 4th 5th 6th 7th 8th backup tape time limits 2nd 3rd 4th 5th permissions 2nd System State files 2nd 3rd 4th Sysvol 2nd schema class derivations 2nd defination objects 2nd functional operations 2nd 3rd 4th object classes 2nd object identification 2nd 3rd 4th rules 2nd 3rd 4th security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st access control inheritance 2nd 3rd 4th 5th 6th access list management 2nd 3rd 4th access permissions access rights 2nd access rights delegation 2nd 3rd 4th 5th 6th descriptor contents 2nd 3rd 4th event notification 2nd 3rd groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th improvements to 2nd LSA (Local Security Authority) managing 2nd 3rd 4th object protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th primaries security descriptors security principals 2nd service accounts 2nd SLS (Secondary Logon Service) 2nd 3rd 4th 5th SRM (Security Reference Monitor) sercurityRunAs 2nd 3rd 4th 5th SMTP (Simple Mail Transport Protocol) structure rules support files 2nd 3rd moving 2nd syntax rules tape backups trust relationships utilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th ADSI Edit tool 2nd 3rd 4th 5th 6th 7th 8th DCDIAG LDAP browser 2nd 3rd 4th 5th management consoles 2nd 3rd Schema console 2nd 3rd 4th 5th 6th 7th WAN linksloss of Active Directory Migration Tool (ADMT). [See ADMT (Active Directory Migration Tool)]2nd [See ADMT (Active Directory Migration Tool)]Active Directory Services Interface (ADSI). [See Active Directory User Objects AD Users and Computershome directoriesassigning 2nd 3rd adaptersnetwork adaptersconfiguring 2nd 3rd installing 2nd 3rd addingattributesGlobal Catalog hardware 2nd Adding a Static WINS Mapping procedure (4.5) Adding File Types to the File Exclusion List procedure (21.1) address mappingNAT (Network Address Translation) 2nd 3rd Address Windowing Extensions (AWE). [See AWE (Address Windowing Extensions)]addressesdeterminingNetwork layers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th MAC addressescomponents viewing Adleman, Len ADM listingsadministrative template files 2nd 3rd 4th ADM template files 2nd 3rd 4th 5th 6th administrative accessDNSlimiting administrative shares CD-ROM drives re-creating recreating administrative template policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th ADM listings 2nd 3rd 4th ADM template files 2nd 3rd 4th 5th 6th creating 2nd policies 2nd preferences 2nd Registry.pol files 2nd administrator passwordsmanagingSetup 2nd adminstrative template policiespreferences 2nd ADMT(Active Directory Migration Tool) 2nd improvements to ADSI (Active Directory Services Interface) ADSI Edit toolActive Directory 2nd 3rd 4th 5th 6th 7th 8th ADSM backup package Advanced Configuration and Power Interface (ACPI). [See ACPI (Advanced Configuration and Power Interface)]Advanced Encryption Standard (AES). [See 2nd [See Advanced property (printers) 2nd 3rd Advanced Research Project Administration (ARPA). [See ARPA (Advanced Research Project Administration)]Advanced RISC Computing (ARC) path. [See ARC (Advanced RISC Computing) path]AES(Advanced Encryption Standard) AES (Advanced Encryption Standard) agent-based network backups AIA(Authority Information Access) 2nd 3rd AIA (Authority Information Access) containers (Enterprise CAs) AIPIPA (Automatic Private IP Addressing) AKIs(Authority Key Identifiers) algorithmsdata encryption 2nd 3rd 4th DSA (Digital Signature Algorithm) encryptionRC algorithms hashing algorithmspasswords KCC (Knowledge Consistency Checker) allocation units. [See Allow permissions assigning cumulative Allow permissions alternative Startfrom files (RIS) analysis snap-insecurity policies 2nd 3rd 4th Analyze option (Secedit utility) anonymous accessActive Directory 2nd NT4 RAS servers 2nd anonymous logonspasswords 2nd 3rd 4th ANSIdirectory services answer section (DNS packets) application compatibilitydomain controllersupgrades Windows NT4backups application compatibility checksupgrades 2nd 3rd Application layerSMBs (Server Message Blocks) 2nd 3rd Application layer (OSI) 2nd Application mode (terminal services) Application naming conctextreplicationActive Directory Application naming contextActive Directory 2nd 3rd 4th 5th 6th application naming contexts 2nd application serversCALs application verification applicationsDrwatson.exe 2nd 3rd Applying Inheritable Rights to an Active Directory Container procedure (13.1) ARC(Advanced RISC Computing) path Boot.ini 2nd 3rd ARC pathsBoot.inispecial paths 2nd 3rd architecturesecurity 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Windows .NET 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th architecturessitesdesigning 2nd 3rd 4th 5th 6th 7th archived certificatesrecovering 2nd 3rd archivingcertificatesCAs 2nd 3rd 4th 5th 6th 7th keysPKI 2nd ArcServe backup package ARPA(Advanced Research Project Administration) ASQ (Attribute Scoped Query) ASR(Automated System Recovery) ASR (Automated System Recovery)Ntbackup 2nd 3rd 4th 5th 6th assemblies assigned packagessoftware deployment assigningdrive lettersSetup 2nd 3rd 4th 5th 6th 7th permission inheritance 2nd permissions Assigning a Home Directory Using the Command Line procedure (19.3) Assigning a User Home Directory with AD Users and Computers procedure (19.2) Assigning Custom UPN Suffixes procedure (8.1) asymmetric cipher keys asynchronous processingCSEs (Client-Side Extensions) 2nd Asynchronous-Control-Character-Map (ACCM). [See Atapi.sys drivers atomic transactionsActive Directory Attribute Scoped Query (ASQ). [See Boot.ini Default Policy Domain GPC Global Catalogadding deleting NTFS 2nd 3rd objectsActive Directory X.500 2nd 3rd 4th audioredirecting 2nd audit logs 2nd Audit Monitor for Logon/Logoff procedure (11.13) Audit Monitoring for Printers procedure (11.14) auditing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th audit logs 2nd enabling 2nd 3rd event logsmanaging 2nd 3rd 4th 5th imagesSysprep kernel object auditing recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th AUDITPOL utilityevent logsmanaging 2nd 3rd 4th 5th authenticated userslimitationsdomain/computer joining authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st classic NT authenticationlimitations 2nd domains computer authentication trust authentication IAS (Internet Authentication Services)configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Kerberos 2nd 3rd 4th 5th 6th authenticator 2nd cross-domain authentication 2nd 3rd 4th member server access 2nd 3rd 4th 5th 6th MITv5 Kerberos interoperability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st Mixed domains mutual authentication 2nd PACs (Privilege Access Certificates) 2nd 3rd 4th 5th 6th policies 2nd preauthenticator 2nd short-cut trusts 2nd situations tickets 2nd 3rd 4th 5th transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th vocabulary 2nd 3rd 4th 5th 6th methodssupport 2nd pass-through authentications PPPCHAP (Challenge Handshake Authentication Protocol) 2nd 3rd 4th dial-up authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th domain authentication 2nd 3rd 4th EAP (Extensible Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th Mixed domains 2nd 3rd 4th MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 2nd 3rd 4th multidomain authentication 2nd 3rd NT4 limitations 2nd 3rd 4th PAP (Password Authentication Protocol) 2nd 3rd 4th 5th 6th 7th RADIUS (Remote Authentication Dial-In User Services) 2nd 3rd 4th 5th 6th 7th 8th SPAP (Shiva Password Authentication Protocol) 2nd standard transactions 2nd 3rd 4th 5th PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th authentication functionsKerberos authentication packagesLSA 2nd authenticatorKerberos 2nd authoritative query responsesDNS 2nd authoritative restoresActive Directory 2nd 3rd 4th 5th 6th 7th 8th authoritative serversDNSquery handling 2nd 3rd 4th 5th Authority Information Access (AIA). [See AIA (Authoity Information Access)]2nd [See AIA (Authoity Information Access)]3rd [See AIA (Authoity Information Access)]Authority Information Access entity (certificates) Authority Key Identifier (AKIs). [See AKIs (Authority Key Identifiers)]Authority Key Identifier entity (certificates) authorizationgroupsActive Directory 2nd 3rd authorization dataKerberos 2nd 3rd 4th 5th 6th 7th 8th 9th authorization data field (encrypted tickets) authorizationsDHCP servers 2nd 3rd auto-enrollmentcertificates 2nd 3rd PKI AUTOCHKCHKDSKcompared 2nd configuringCHKNTFS 2nd file systemsfault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th repairsforcing to Automated System Recovery (ASR). [See Automatic Private IP Addressing (APIPA) automatingactivation deploymentWindows .NET 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th product key entry Auxiliary classLDAP AWE(Address Windowing Extensions) 2nd 3rd