[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]FACT (Fixed ACPI Description Table) factory optionsSysprep 2nd failed fault tolerant disksboot floppysbuilding 2nd 3rd mirrored volumesreplacing in 2nd 3rd 4th RAID 5 volumesreplacing in 2nd 3rd 4th 5th recovering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th Fastfat.sys drivers FastLane Migrator FAT 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th (File Allocation Table) 2nd cluster maps 2nd 3rd 4th 5th directories 2nd 3rd FAT32 2nd 3rd partitions 2nd sizes 2nd weaknesses 2nd 3rd FAT12 FAT16 FAT32 2nd 3rd 4th 5th 6th weaknesses 2nd 3rd fault tolerancefile systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd AUTOCHK 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Change Journal 2nd 3rd 4th 5th CHKDSK 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th logging 2nd 3rd 4th 5th Windows File Protection 2nd 3rd 4th 5th 6th 7th 8th 9th fault tolerant boot disks fault tolerant disksboot floppysbuilding 2nd 3rd dynamic disksmoving between computers 2nd failed fault tolerant disksrecovering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th mirrored volumesreplacing in 2nd 3rd 4th RAID 5 volumesreplacing in 2nd 3rd 4th 5th fax devicesmanaging 2nd Fax service 2nd 3rd 4th configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th installing 2nd Fax seversclientsconnecting to 2nd fax sharing 2nd faxescontacts cover pagesmanaging 2nd 3rd 4th monitoring 2nd queuesmanaging 2nd sending 2nd 3rd 4th 5th 6th 7th Fdisk.efi utility FDOs(Functional Device Objects) WDM (Windows Driver Model)plug-and-play Federal Information Processing Standards (FIPS) Federal Information Processing Standards (FIPS). [See (File Encryption Key) 2nd 3rd 4th 5th 6th 7th storage fieldsencrypted tickets File Allocation Table (FAT). [See FAT (File Allocation Table)]file decryption 2nd 3rd file encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th certificatesmanagement 2nd 3rd 4th 5th 6th 7th command-line administrationimprovements to copy warnings data encryption 2nd 3rd 4th algorithms 2nd 3rd 4th FEK (File Encryption Key) 2nd 3rd 4th 5th 6th private key protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th disabling 2nd 3rd 4th 5th 6th 7th DRAsconfiguring 2nd 3rd 4th EFS 2nd 3rd 4th 5th 6th 7th 8th procedures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th EFS file transactions 2nd 3rd 4th 5th 6th 7th 8th FEK (File Encryption Key) file decryption process 2nd 3rd file recovery 2nd 3rd 4th 5th 6th 7th 8th 9th folder encryptionlaptops 2nd 3rd group policies individual files managing 2nd 3rd offline file encryption process description 2nd 3rd recovery 2nd 3rd server-based files 2nd 3rd 4th 5th 6th shared encrypted files transporting 2nd visual cues WebDAV 2nd 3rd 4th 5th 6th 7th 8th 9th File Encryption Key (FEK). [See FEK (File Encryption Key)]file exclusionsNtbackup 2nd 3rd 4th 5th 6th file journalingNTFS 2nd file records (MFT) file recoveryfile encryption 2nd 3rd 4th 5th 6th 7th 8th 9th SIS File Replication Service (FRS). [See 2nd [See configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th administrative shares 2nd remote share creation 2nd 3rd 4th 5th share creation 2nd 3rd 4th 5th 6th 7th 8th share permissions 2nd 3rd XP desktops 2nd 3rd Dfs(Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th console deploying 2nd 3rd links 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th managing 2nd MUP polling 2nd namespace design 2nd PKT (Partition Knowledge Table) 2nd 3rd 4th 5th referrals 2nd replication topology changes 2nd 3rd roots 2nd 3rd 4th 5th 6th 7th 8th structure 2nd 3rd 4th 5th targets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th directorieschoosing encrypted file sharing foldersconnecting to 2nd 3rd 4th 5th 6th file system drivers 2nd 3rd 4th 5th File System Recognizer (FSR). [See FSR (File System Recognizer)]file systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th CD-ROM file system CD-RW operations 2nd 3rd 4th 5th 6th 7th clusters 2nd 3rd 4th 5th 6th 7th defragmentation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th improvements to drivers DVD-RAM operations 2nd 3rd 4th 5th 6th 7th EFS(Encrypting File System) FAT 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th (File Allocation Table) 2nd cluster maps 2nd 3rd 4th 5th directories 2nd 3rd FAT32 2nd 3rd partitions 2nd sizes 2nd weaknesses 2nd 3rd FAT32 2nd fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd AUTOCHK 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Change Journal 2nd 3rd 4th 5th CHKDSK 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th logging 2nd 3rd 4th 5th Windows File Protection 2nd 3rd 4th 5th 6th 7th 8th 9th file compression 2nd 3rd 4th 5th files folders fragmentation FSR(File System Recognizer) LTS 2nd 3rd 4th 5th (Link Tracking Service) 2nd link sources 2nd network tracking 2nd 3rd 4th MFT(Master File Table) MFT recordsreparse points 2nd 3rd 4th 5th 6th 7th NTFS 2nd 3rd file SystemsNTFS(NT File System) file systemsNTFSattributes 2nd 3rd cluster addressing 2nd cluster mapping 2nd conversion 2nd 3rd 4th 5th 6th 7th 8th defragmentation 2nd 3rd 4th 5th 6th directory records 2nd 3rd 4th 5th 6th 7th 8th dirty flags 2nd file compression 2nd 3rd 4th 5th 6th file journaling 2nd hard links MFT fragmentation 2nd 3rd 4th MFT metadata records 2nd 3rd 4th 5th 6th 7th 8th named data streams 2nd 3rd 4th 5th 6th 7th 8th performance enhancements 2nd 3rd records 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th removable drives 2nd 3rd security descriptors 2nd 3rd 4th 5th 6th 7th short name preservation sparse files 2nd structure 2nd timestamps 2nd versions partition boot sectors partitions performanceimprovements to quotas 2nd 3rd recovery 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd reparse points 2nd 3rd 4th 5th 6th 7th RSS(Remote Storage Services) sectors 2nd 3rd 4th 5th 6th 7th UDF(Universal Disk Format) volumes file-and-print supportWeb Server filesADM template files 2nd 3rd 4th 5th 6th backups. [See also backups]interactive backups 2nd 3rd 4th 5th 6th 7th compressionNTFS 2nd 3rd 4th 5th 6th contiguous files copyingtroubleshooting file systems managingESP 2nd 3rd offline fileschecklist 2nd configuring at server 2nd 3rd 4th 5th 6th 7th 8th inappropriate uses 2nd 3rd managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th remote desktops 2nd Synchronization Manager 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th openingas DRA files 2nd 3rd paging filesconfiguring fragmentation moving 2nd 3rd restoring 2nd 3rd 4th 5th 6th 7th Setup 2nd 3rd 4th short name preservationNTFS SIF (Setup Information File) sparse filesNTFS 2nd support filesActive Directory 2nd 3rd moving 2nd System State files restoring 2nd 3rd 4th timestamps Files and Settings Transfer Wizard (FSTW). [See FSTW (Files and Settings Trasfer Wizard)]filter drivers filteringgroup policiessecurity groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th FIPS(Federal Information Processing Standards) FIPS (Federal Information Processing Standards) firewallsbridgehead servers ICF (Internet Connection Firewall) 2nd SMB trafficrestricting terminal services 2nd firmware Fixed ACPI Description Table (FACP) fixed spinning storage flags (DNS packets) flags (Kerberos reply messages) flat names Flexible Single Master Operations (FSMOs). [See FSMOs (Flexible Single Master Operations)]2nd [See FSMOs (Flexible Single Master Operations)]3rd [See FSMOs (Flexible Single Master Operations)]Floppy.sys drivers folder encryptionlaptopssetting 2nd 3rd Folder Options window folder redirection policies 2nd foldersadministraive sharesre-creating recreating attributesNTFS file systems redirectionmanaging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th remote sharescreating 2nd 3rd 4th 5th shared foldersconnecting to 2nd 3rd 4th 5th 6th Registry sharescreating 2nd 3rd 4th 5th 6th 7th 8th forced updatesCSEs (Client-Side Extensions) 2nd command line forcingreplication 2nd 3rd 4th Forcing Replication with the AD Sites and Services Console procedure (7.10) Forest trusts forest trustsActive Directory designing 2nd Forest Trustsdomains forestsActive Directory 2nd domainsupgrading 2nd trusts upgradingin-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th schema upgrades 2nd form factorssmart cardsremote access 2nd format checkscertificates Format.efi utility formatsdiskschoosing 2nd 3rd drives 2nd GPTs (GUID Partition Tables) 2nd 3rd 4th 5th 6th 7th passwords 2nd 3rd 4th 5th forward lookup zonesDNS creating 2nd 3rd 4th 5th forwarders conditional forwarding 2nd 3rd DNS serversconfiguring for 2nd 3rd DNS/Active Directory integration 2nd 3rd 4th 5th 6th 7th 8th WINS forwarding 2nd FR private keysdeleting 2nd 3rd 4th exporting 2nd 3rd 4th fragmentationfile systems NTFS 2nd 3rd 4th paging files frequencyreplicationActive Directory 2nd 3rd 4th 5th 6th 7th FRS(File Replication Service) FRS (File Replication Service) 2nd 3rd Dfs (Distributed File Sharing) 2nd 3rd 4th diagnostic logging limitations 2nd 3rd replication topology 2nd 3rd 4th target server failures 2nd 3rd FSMO serversplacement FSMOs(Flexible Single Master Operations) 2nd 3rd Active Directorydomains loss of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th FSR(File System Recognizer) FSTW 2nd 3rd 4th (Files and Settings Transfer Wizard) Fsutil console FT disk sets Ftdisk.sys drivers ftpauthentication services function driversWDM (Windows Driver Model)plug-and-play 2nd function keysSetup Functional Description of Query Handling by an Authoritative Name Server procedure (5.1) Functional Description of Query Handling by Non-Authoritative Name Server procedure (5.2) Functional Description of Reverse Lookup Query procedure (5.3) Functional Description of Standard Polled Zone Transfer procedure (5.4) Functional Description of User and Group Validation Across Domains Using Domain Local Groups procedu Functional Description of User and Group Validation Across Domains Using Universal Group procedure ( Functional Description of User and Group Validation Within a Single Domain procedure (13.3) Functional Device Objects (FDOs). [See FDOs (Functional Device Objects)]functional diagramLSA(Local Security Authority) functional levelsdomainsshift root domain to Windows .NET functional level 2nd upgrading 2nd 3rd 4th 5th 6th functional operationsschemaActive Directory 2nd 3rd 4th Functional Sequence for NetBIOS Name Resolution Using Broadcasts procedure (4.1) functionsSIDs FxsSrvCp$ shares