[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]EAP(Extensible Authentication Protocol) EAP (Extensible Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th EAP Smart Card Authentication Transaction procedure (20.2) Edb.chk file (Active Directory) Edb.log file (Active Directory) Edbxxxxx.log file (Active Directory) editorsNAT (Network Address Translation) 2nd Edlin efficiencydomains EFI(Extensible Firmware Interface) 2nd EFI Boot Maintenance Manager EFI Shell 2nd Setupbooting EFI System Partition (ESP). [See 2nd [See EFS 2nd 3rd 4th 5th 6th 7th 8th (Encrypting File System) 2nd 3rd group policiesloading DRAs into 2nd group policy settingsdisabling 2nd 3rd procedures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th WebDAVadvantages 2nd EFS file transactionsfile encryption 2nd 3rd 4th 5th 6th 7th 8th EFS temp fileswiping EFSINFO command-line tool (encryption) Emergency Management Services (EMS). [See 2nd [See Emergency Repair Disk (ERD). [See empty roots EMS 2nd 3rd 4th 5th 6th 7th 8th (Emergency Management Services) 2nd bugchecks 2nd 3rd SAC (Special Administarion Console) SAC (Special Administration Console) 2nd EMS (Emergency Management Services) Enable VGA Mode enablingauditing 2nd 3rd Enabling Compression procedure (15.4) Enabling Internet Connection Sharing and Internet Connection Firewall procedure (20.15) Enabling the Smart Card User Template procedure (20.4) Enabling Zone Transfers and Notifications procedure (5.12) encrypted file recovery group policies 2nd 3rd encrypted file transfers encrypted files. [See also file encryption]transporting 2nd Encrypting File System (EFS). [See EFS (Encrypting File System)]2nd [See EFS (Encrypting File System)]encryption3DES command-line administrationimprovements to copy warnings DES (Data Encryption Standard) DESX exportinghigh encryption file encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th certificate management 2nd 3rd 4th 5th 6th 7th data encryption 2nd 3rd 4th data encryption;algorithms 2nd 3rd 4th DRA configuration 2nd 3rd 4th EFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th EFS file transactions 2nd 3rd 4th 5th 6th 7th 8th file decryption process 2nd 3rd file recovery 2nd 3rd 4th 5th 6th 7th 8th 9th individual files process description 2nd 3rd recovery 2nd 3rd 4th 5th 6th server-based files 2nd 3rd 4th 5th 6th transporting 2nd WebDAV 2nd 3rd 4th 5th 6th 7th 8th file enryptiondisabling 2nd 3rd 4th 5th 6th 7th file sharing folder encryptionlaptops 2nd 3rd group policies managing 2nd 3rd Microsoft Crypto Provider offline file encryption PGP (Pretty Good Privacy) PKI (Public Key Infrastructure) 2nd 3rd shared encryption files visual cues WebDAV encrytpionAES (Advanced Encryption Standard) end times (Kerberos reply messages) enhanced metafilesprinter sharing 2nd enrollingsmart card usersremote access 2nd 3rd 4th 5th 6th 7th 8th 9th Enrolling a Smart Card User procedure (20.6) Enrolling for a Certificate Using the Web procedure (18.2) enrollmentcertificates 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th auto-enrollment 2nd 3rd Certificates snap-in 2nd 3rd CMC (Certificate Management Messages over CMS) 2nd Web enrollment 2nd 3rd 4th enrollment services container (Enterprise CAs) Enterprise CAs 2nd certificate templates 2nd 3rd 4th 5th subordinate CAsinstalling Enterprise Server clusterssupport hot add memorysupport IA64 support metadirectoriessupport processorssupport support entriesBoot.ini Entrust Web site enumerationplug-and-play environmentsDLLsSide-by-Side assemblies 2nd 3rd 4th folder redirection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th placement 2nd 3rd 4th 5th 6th 7th 8th 9th 10th policies 2nd home directories 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th assigning 2nd 3rd mapping downlevel clients 2nd home directoriesterminal services 2nd offline fileschecklist 2nd configuring at server 2nd 3rd 4th 5th 6th 7th 8th inappropriate uses 2nd 3rd managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th remote desktops 2nd Synchronization Manager 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th serversmanaging via remote desktops 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th user state migration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th FSTW (Files and Settings Transfer Wizard) 2nd 3rd 4th INF files 2nd 3rd 4th 5th 6th 7th 8th tools USMT (User State Migration Toolkit) 2nd 3rd 4th Erase option (Nvrboot.efi) ERD (Emergency Repair Disk)discontinuation of error reporting tools errorsstop errors 2nd ESE (Extensible Storage Engine)Active DirectoryESE (Extensible Storage Engine) LDAP ESPfilesmanaging 2nd 3rd viewing ESP (EFI System Partition) 2nd Event logschecking 2nd 3rd 4th event logsmanagingAUDITPOL utility 2nd 3rd 4th 5th event notificationActive Directory 2nd 3rd eventsonline eventstracking exceptionscanonical sortingACEs executable loadsSetup 2nd initial hardware recognition 2nd 3rd Executive services 2nd 3rd Expanding a Basic Disk Partition Using Diskpart procedure (14.3) Explorersharescreating 2nd 3rd 4th 5th 6th Export option (Nvrboot.efi) Export option (Secedit utility) exportingencryptionhigh encryption FR private keys 2nd 3rd 4th Exporting and Deleting an FR Private Key procedure (17.6) Exporting and Deleting the FR Public Key Certificate procedure (17.3) extended partitions creating 2nd 3rd extended rightsConfiguration naming contextActive Directory 2nd extendible disk partitions extendingdiskspartitions 2nd 3rd partitions 2nd Extensible Authentication Protocol (EAP). [See Extensible Firmware Interface (EFI). [See EFI (Extensible Firmware Interface)]2nd [See EFI (Extensible Firmware Interface)]extensionsDNS partitions 2nd 3rd volumes 2nd 3rd external trustsActive Directory extinction intervalsWINS databasesetting 2nd 3rd 4th 5th 6th