[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]D-H (Diffie-Hellman) public key technology 2nd DACLs(discretionary access control lists) (Discretionary Access Control Lists) daily backups (Ntbackup) 2nd data chunking Data Decryption Field (DDF). [See DDF (Data Decryption Field)]data encryption 2nd 3rd 4th algorithms 2nd 3rd 4th Data Encryption Standard (DES). [See DES (Data Encryption Standard)]2nd [See DES (Data Encryption Standard)]3rd [See DES (Data Encryption Standard)]Data Link Control (DLC). [See DLC (Data Link Control)]data link layer(OSI) addressesdetermining 2nd portsdetermining 2nd data partitions Data Recovery Agent (DRA). [See DRA (Data Recovery Agent)]Data Recovery Agents (DRAs). DRAs (Data Recovery Agents) Data Recovery Field (DRF). [See DRF (Data Recovery Field)]data storage configuring 2nd 3rd 4th dynamic disks GPT disks IA32 systemsdisk operations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st LDM (Logical Disk Manager) colume configurations LDM (Logical Disk Manager) volume configurations 2nd 3rd 4th 5th 6th 7th MBR (Master Boot Record) disks data stream encryptionRDP 2nd database engines database size restictionsmultiple domains 2nd databasesActive Directorycompacting 2nd 3rd maintenance 2nd 3rd 4th 5th 6th 7th 8th repairing 2nd 3rd 4th forestsin-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Kerberos LSA LSA databases SAM databases schemas 2nd WINSmanaging 2nd 3rd 4th 5th 6th 7th 8th 9th Datacenter Server IA64 support memorysupport processorssupport datesconfiguringSetup 2nd 3rd DCDIAGActive Directory DCFIRST.INF template (security) Dcpromo utility DCUP5.INF template (security) DDF(Data Decryption Field) Debian documentation Web site Debugging Mode debugging toolsimprovements to dedicated networks Default Domain Controller GPOs (Active Directory) Default Domain GPOs (Active Directory) Default Policy Domain GPCattributes default security templatessecurity policies 2nd 3rd Default-First-Site-Name Objectrenaming definition objectsschemaActive Directory 2nd DEFLTDC.INF template (security) DEFLTSV.INF template (security) DEFRAG defragmentationfile systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th improvements to NTFS 2nd 3rd 4th 5th 6th Dekker, Edward 2nd delaysconsole logons delegatinggroup policiesmanagement 2nd Delegating Access Rights procedure (13.2) delegation 2nd access rightsActive Directory 2nd 3rd 4th 5th 6th DNSconfiguring 2nd 3rd 4th 5th Delegation of Control Wizard delegationsDNSlame delegations deleted containersreplicationActive Directory 2nd deleted object handlingreplicationActive Directory 2nd 3rd deleted objectsreplicationActive Directory deletingattributesGlobal Catalog FR private keys 2nd 3rd 4th recordsWINS volumes 2nd Deleting a Volume procedure (14.11) Delta CRLsPKI Delta CRLs (Certificate Revocation Lists) demand-dial interfacesinstalling 2nd 3rd demand-dial routersconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th demotingdomain controllers 2nd 3rd Deny permissions assigning evaluation of deployingdomains 2nd 3rd 4th 5th 6th 7th scripts 2nd 3rd Windows .NETautomating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd deploymentdisk cloning 2nd 3rd 4th 5th 6th 7th 8th 9th scripted installations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd unattended setup batch files unattended setup scripts creating 2nd 3rd 4th 5th 6th 7th 8th 9th derivationsclassesActive Directory DES(Data Encryption Standard) 2nd 3rd descriptor contentsActive Directorysecurity 2nd 3rd 4th designatingbridgehead servers 2nd 3rd 4th Designating a Bridgehead Server procedure (7.8) Designating Additional Dfs Link Targets procedure (16.8) designingActive DirectoryOU (Organizational Unit) OUs (Organizational Unit) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th OUs (Organizational Units) CA trust hierarchies 2nd 3rd 4th 5th DNS domains 2nd 3rd 4th 5th 6th 7th domainsActive Directory 2nd 3rd 4th 5th 6th 7th 8th sitessrachitectures 2nd 3rd 4th 5th 6th 7th desktop-oriented features DESX algorithm DESX encryption detachable storage Developing Windows NT Device Drivers (i) Developing Windows NT Device Drivers\A ProgrammerÕs Handbook (i) Device Driver Rollback procedure (3.4) Device Driver Update procedure (3.3) device drivers rollbacks 2nd 3rd updates Device Managerplug-and-play 2nd 3rd 4th 5th 6th devicesconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd CPUs 2nd EFI disk utilities 2nd 3rd 4th 5th 6th multiple displays 2nd Windows Update 2nd 3rd 4th installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd CPUs 2nd EFI disk utililities 2nd 3rd 4th 5th 6th IDE hard drives 2nd multiple displays 2nd network adapters 2nd 3rd removable media drives 2nd 3rd 4th SCSI adapters 2nd 3rd Windows Update 2nd 3rd 4th redirecting 2nd removing troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th Dfs(Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th (Distributed File System) console deployment 2nd 3rd links creating 2nd 3rd target assignments 2nd 3rd managingcommand line 2nd MUP polling 2nd namespacesdesigning 2nd PKT (Partition Knowledge Table) referrals 2nd replication topologieschanging 2nd 3rd root directoriescreating 2nd 3rd roots 2nd 3rd limitations links 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th PKT (Partition Knowledge Table) 2nd 3rd 4th removing 2nd 3rd 4th structure 2nd 3rd 4th 5th targets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th FRS (File Replication Service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th DHCPconfiguringDNS support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th installing 2nd RIS(Remote Installation Services) 2nd scope optionsconfiguring 2nd 3rd 4th 5th serversauthorizing 2nd 3rd DHCPINFORM diagnostic loggingFRS (File Replication Service) dial-in connections checkingRAS logs 2nd 3rd 4th dial-in IP settingsNT4 RRAS serversconfiguring 2nd 3rd 4th dial-in verificationsdomains dial-up authentication 2nd 3rd 4th PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th dial-up connectionsname resolution dial-up sessionsmodemsmonitoring 2nd 3rd 4th 5th DIB (Directory Information Base) differential backups (Ntbackup) 2nd Diffie, Whitfield digest authenticationdomains Digest security package Digital Signature Algorithm (DSA). [See DSA (Digital Signature Algorithm)]Digital Signature Security Standard (DSS). [See DSS (Digital Signature Standard)]Digital Signature Trust Web site digital signatures DSA (Digital Signature Algorithm) DSS (Digital Signature Security Standard) hashing technology Direct Mmeory Access (DMA). [See backing up 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th maintenance 2nd 3rd 4th 5th 6th 7th 8th FAT 2nd 3rd home directoriescreating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th terminal services 2nd sharing Directory Information Base (DIB). [See LDAP 2nd 3rd 4th directory recordsNTFS 2nd 3rd 4th 5th 6th 7th 8th directory records (MFT) Directory Replication Agent (DRA). [See Directory Replication Agents (DRAs) Directory Service Agents (DSAs). [See Directory Service Restore Mode Directory Service Restore Mode (Windows) directory services Active DirectoryLDAP 2nd 3rd namesapces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd ANSI components 2nd 3rd history of 2nd 3rd 4th 5th 6th 7th IEC (International Electrotechnical Commission) 2nd IETF (Internet Engineering Task Force) ISO(International Organization for Standardization) 2nd 3rd 4th ITU-T 2nd LDAPnamespaces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th RFCs (Request for Comments) 2nd X.500 components 2nd 3rd 4th 5th LDAP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th LDAP;compared 2nd dirty flagsNTFS 2nd disablingfile encryption 2nd 3rd 4th 5th 6th 7th Disabling DNS on an Interface procedure (5.19) Disabling EFS Using Windows .NET Group Policies procedure (17.2) Disabling NetBIOS-over-TCP/IP Name Resolution procedure (4.7) Disabling Remote Desktop on .NET Server procedure (19.7) Disabling Remote Desktop procedure (19.4) discretionary access control lists (DACLs). [See DACLs (discretionary access control lists)]Discretionary Access Control Lists (DACLs). [See DACLs (Discretionary Access Control Lists)]disk accessstandard disk accessusing disk cachingdisabling disk cloningdeployment 2nd 3rd 4th 5th 6th 7th 8th 9th problems Sysprep 2nd 3rd 4th 5th 6th 7th 8th Disk Management console disk opeartionsIA32 systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st disk partitionsextendible disk partitions disk() entryBoot.ini Disk.sys drivers Diskpart utility 2nd 3rd Diskpart.efi utility 2nd 3rd Diskpart.efi utility (3.2) disksdynamic disks 2nd 3rd converting to 2nd reverting extended partitionscreating 2nd 3rd formatschoosing 2nd 3rd GPTs(GUID Partition Tables) 2nd improvements to 2nd managingcommand-line 2nd 3rd 4th 5th paging filesmoving to 2nd partitionscreating 2nd extending 2nd 3rd 4th 5th primary partitionscreating 2nd Display option (Nvrboot.efi) display specifiersConfiguration naming contextActive Directory 2nd 3rd displaysdevicesinstalling 2nd distinguished namesnamespacesLDAP 2nd Distributed File System (Dfs). [See Dfs (Distributes File System)]DLC(Data Link Control) DLLs(Dynamic Link Libraries) 2nd multiple-version DLL workaround Side-by-Side aseemblies 2nd 3rd 4th Side-by-Side assemblies DMA 2nd 3rd 4th DMA (Direct Memory Access) Dmboot.sys drivers Dmio.sys drivers Dmload.sys drivers DNS(Domain Name System) 2nd Active Directoryforwarders 2nd 3rd 4th 5th 6th 7th 8th integrated zones integration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th zone integration 2nd 3rd 4th 5th administrative accesslimiting application naming contexts BIND boot filesstarting boot information caching-only serversconfiguring 2nd 3rd clientsconfiguring 2nd 3rd 4th 5th resolvers 2nd 3rd 4th 5th conditional forwarding delegationconfiguring 2nd 3rd 4th 5th delegationslame delegations deployingchecklist 2nd non-Windows infrastructure 2nd 3rd DHCPconfiguring support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th domains 2nd 3rd 4th 5th 6th designing 2nd 3rd 4th 5th 6th 7th root domains TLDs (top-level domains) driversinstalling 2nd Dynamic DNSdisabling on interfaces 2nd managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th scavenging configuration 2nd 3rd 4th 5th security 2nd 3rd zone configuration 2nd dynamic updates 2nd 3rd securing 2nd extensions forward lookup zones creating 2nd 3rd 4th 5th hierarchical zonesconfiguring 2nd 3rd 4th 5th 6th 7th 8th host files 2nd incremental zone transfers 2nd 3rd integrated DNS zonesActive Directory 2nd 3rd IPv6 host records managingcommand-line management 2nd multiple serversusing name servers 2nd 3rd caching-only name server primary name servers 2nd 3rd secondary name servers 2nd 3rd namespaces 2nd 3rd private negative query caching notification-driven zone transfers packets queriesauthoritative query responses 2nd non-authoritative query responses 2nd 3rd query handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th authoritative servers 2nd 3rd 4th 5th non-authoritative servers 2nd 3rd 4th reverse lookup queries 2nd 3rd 4th 5th 6th 7th 8th record verifications recordsscavenging 2nd resource records 2nd reverse lookup zonescreating 2nd 3rd 4th root hints 2nd 3rd 4th configuring 2nd 3rd secondaries 2nd secondary serversconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th security 2nd 3rd 4th 5th 6th serversconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th forwarders 2nd 3rd installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th secondary servers 2nd 3rd 4th 5th 6th service locator records stub zones 2nd 3rd 4th trace names unauthorized zone transferspreventing update notifications 2nd 3rd 4th enabling 2nd 3rd updatessecure upgrading 2nd WINS forwarding 2nd zone transfersenabling 2nd 3rd zonesexamining 2nd 3rd 4th 5th 6th 7th DNS resolver cache tool (Tcpip.sys) DNS serversloss ofremedying 2nd 3rd 4th DNS tool (Tcpip.sys) documentationcertificates 2nd PACs (Privilege Access Certificates) Domain Controllerpromotion utility Domain ControllersActive Controllers 2nd 3rd domain controllersActive DirectoryGC-less logons 2nd 3rd metadata cleanup 2nd 3rd 4th 5th 6th 7th convergence time demoting 2nd 3rd installing 2nd 3rd loss ofcorrecting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th null sessions overload prevention placement 2nd 3rd 4th promotinglocal SAM promotionbackup tapes pull updates renaming 2nd 3rd rolessetting 2nd 3rd upgradesapplication compatibility leapfrog upgrades 2nd 3rd requirements 2nd 3rd 4th 5th 6th 7th Domain Local groups (Active Directory) 2nd 3rd 4th Domain Master Browser domain master browsers Domain Migration Administrator domain name masterActive Directory 2nd Domain Name System (DNS) Domain Name System (DNS). [See DNS (Domain Name System)]Domain naming context domain naming contextsActive Directory 2nd 3rd Domain Naming Master (FSMOs) domain roots DomainPassword permission (Active Directory) domains access permissions Active Directory 2nd designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st domain controller placement 2nd 3rd 4th domain name master 2nd FSMOs (Flexible Single Master Operations) infrastructure master 2nd 3rd multiple domain forest trusts 2nd multiple domains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th multiple groups 2nd 3rd 4th 5th navigation PDC Emulators 2nd 3rd 4th 5th 6th 7th replication RIDs (Relative IDs) 2nd role master 2nd root domain names 2nd 3rd 4th 5th 6th schema master 2nd split public/private zones 2nd 3rd third-party name servers 2nd Windows-based zones 2nd 3rd application verification authentication 2nd 3rd 4th child domainsupgrading 2nd 3rd computer authentication computersjoining configuringSetup 2nd 3rd 4th cross-domain authentication 2nd 3rd 4th deploying 2nd 3rd 4th 5th 6th 7th designingActive Directory 2nd 3rd 4th 5th 6th 7th 8th dial-in verifications digest authentication DNS 2nd 3rd 4th 5th 6th designing 2nd 3rd 4th 5th 6th 7th root domains secondaries 2nd TLDs (top-level domains) upgrading 2nd efficiency Forest Trusts functional levelsshift root domain to Windows .NEt functional level shift root domain to Windows .NET functional level group policies integrated DNS zones 2nd 3rd interoperability joining automated setup logon scripts managability master account domainsupgrading 2nd 3rd 4th 5th migratingaccount migrations 2nd 3rd computer account migrations 2nd 3rd group account migrations group accounts 2nd 3rd 4th 5th password migrations 2nd 3rd 4th 5th 6th SID history 2nd 3rd 4th 5th user accounts 2nd 3rd 4th 5th migrating from 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd mixed domains multidomain authentication 2nd 3rd multiple domainslogon configuration 2nd 3rd namespaces 2nd 3rd objectsmaximum number operationsnew PDCsupgrading 2nd 3rd 4th 5th placeholder domainsinstalling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th profile settings promotingtroubleshooting 2nd 3rd recoverability reliability renaming 2nd resource domainsupgrading 2nd 3rd root domainsupgrading 2nd 3rd security share point verification stability system policy verification trust authentication upgradingaccount BDCs 2nd 3rd allotted time for browsing child domains 2nd 3rd Classic NT4 RAS access 2nd 3rd classic scripts 2nd DNS 2nd domain controller requirements 2nd 3rd 4th 5th 6th 7th forests 2nd FSMO (Flexible Single Master Operations) servers functional levels 2nd 3rd 4th 5th 6th group policies 2nd in-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th master account domains 2nd 3rd 4th 5th mixed domains 2nd PDCs 2nd 3rd 4th 5th policies 2nd post-upgrade verifications 2nd 3rd preparations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th priveleges root domains 2nd 3rd SAM 2nd 3rd storage unsupported operations 2nd user authentication DOSprinting from 2nd 3rd DOS-derived Windows hashingpasswords DOS-derived Windows storagepasswords downlevel clientshome directoriesmapping 2nd DRA (Data Recovery Agent) filesopening as 2nd 3rd DRA (Directory Replication Agent) DRAs(Data Recovery Agents) configuring 2nd 3rd 4th EFS group policiesloading into 2nd DRAs (Directory Replication Agents) DRF(Data Recovery Field) drive controllers drive lettersassigningSetup 2nd 3rd 4th 5th 6th 7th changing 2nd 3rd 4th Driver Rollback driversclass drivers device driversrollbacks 2nd 3rd updates DNSinstalling 2nd Driver Rollback file system drivers 2nd 3rd 4th 5th file systems filter drivers largesupport minidrivers printer driversprinter sharing 2nd 3rd 4th 5th 6th 7th 8th 9th protection SCSI driversalternative service drivers drives . [See also hard drives]configurations 2nd drive letterschanging 2nd 3rd 4th formats 2nd redirecting 2nd 3rd removable drives removable media 2nd removable media drives installing 2nd 3rd 4th sizes 2nd 3rd types 2nd 3rd 4th 5th 6th 7th 8th 9th Drwatson.exe 2nd 3rd DSA(Digital Signature Algorithm) DSACLSaccess listsmanaging 2nd 3rd 4th DSAs (Directory Service Agents) DSS(Digital Signature Security Standard) (Digital Signature Standard) 2nd Dssenh CSP provider DSSTORE utility DSUP.INF template (security) DSUPT.INF template (security) dual monitorspreparinginstallation dual-bootsinstallationconsiderations 2nd 3rd DUMPFSMOS command script dumpsmemory dumps 2nd duplexed volumes DVD-RAM drives 2nd dynamic client icons dynamic disks 2nd 3rd booting 2nd 3rd conversions 2nd 3rd 4th 5th 6th 7th 8th 9th converting to 2nd hardware RAID moving between computers 2nd reverting setup 2nd 3rd 4th volume extensions (spanning) 2nd volumescreating for 2nd 3rd extending between 2nd Dynamic DNSadvanced DNS serversconfiguring 2nd 3rd interfacesdisabling 2nd managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th scavengingconfiguring 2nd 3rd 4th 5th securitymanaging 2nd 3rd WINS forwarding 2nd 3rd zonesconfiguring 2nd Dynamic Link Libraries (DLLs). [See DLLs (Dynamic Link Libraries)]2nd [See DLLs (Dynamic Link Libraries)]dynamic updatesDNS 2nd 3rd securing 2nd dynamic volumescreatingcommand-line Recovery Console restrictions 2nd 3rd 4th