[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]HAL (Hardware Abstraction Layer) drivers handlingI/O 2nd 3rd 4th 5th IA32 memory 2nd 3rd 4th 5th 6th hangsSetuptroubleshooting hard drives. [See also drives]IDE hard drivesinstalling 2nd SCSI drivesinstalling 2nd 3rd hard linksNTFS hard repairsActive Directory hardwareadding 2nd BIOS 2nd certified hardware 2nd chipsets 2nd configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd CPUs 2nd EFI disk utilities 2nd 3rd 4th 5th 6th multiple displays 2nd Windows Update 2nd 3rd 4th devicesremoving driversDriver Rollback protection support drivestypes 2nd 3rd 4th 5th 6th 7th 8th 9th installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd CPUs 2nd EFI disk utilities 2nd 3rd 4th 5th 6th IDE hard drives 2nd multiple displays 2nd network adapters 2nd 3rd removable media drives 2nd 3rd 4th SCSI adapters 2nd 3rd Windows Update 2nd 3rd 4th interrupts 2nd 3rd 4th 5th 6th 7th L2 caches 2nd memory minimum requirements motherboards 2nd multiprocessorssupport process protection 2nd 3rd recognitionSetup 2nd 3rd storage support for 2nd 3rd 4th troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th unsupported hardware 2nd updates Windows .NETrecommendations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th Hardware Abstraction Layer (HAL) drivers Hardware Compatibility List (HCL). [See HCL (Hardware Compatibility List)]hardware RAIDdynamic disks Hashed Message Authentication Code (HMAC). [See HMAC (Hashed Message Authentication Code)]hashes collisions digital signatures hashing mechanisms HMAC (Hashed Message Authentication Code) PKI 2nd 3rd 4th SHA-1 (Secure Hash Algorithm) SHS (Secure Hash Standard) hashing algorithmpasswords hashing mechanisms HCL(Hardware Compatibility List) 2nd HCLsNICsverifying headersNTFS records 2nd security descriptors headless serversinstallingRIS (Remote Installation Services) 2nd 3rd 4th 5th 6th Hellman, Martin Help and Support Center Hidusb.sys drivers hierarchical zonesDNSconfiguring 2nd 3rd 4th 5th 6th 7th 8th hierarchiesCAs (Certificate Authorities) 2nd 3rd 4th High-Level Kerberos Example procedure (11.5) HMAC(Hashed Message Authentication Code) home directoriesassigningAD Users and Computers 2nd 3rd 4th 5th 6th creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th command line 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th terminal services 2nd mappingfor downlevel clients 2nd host filesDNS 2nd host recordsDNS Hosts tool (Tcpip.sys) hot add memoryEnterprise Serversupport hot memory Hubbell, Edwin