[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]MAC(Media Access Control) MAC (Media Access Control) layer MAC addressescomponents viewing MAC layerSMB 2nd MAC variable (OSCML) Machine Local groups (Active Directory) 2nd 3rd Machinedomain variable (OSCML) Machinename variable (OSCML) Machineou variable (OSCML) Machinetype variable (OSCML) Macintosh print providers mailslots mainframe hostsprinting to and from managabilitydomains management consolesActive Directory 2nd 3rd managingActive Directorysecurity 2nd 3rd 4th filesESP 2nd 3rd group policies 2nd 3rd system policies 2nd IA32 memory 2nd 3rd IA64 memory 2nd objectsActive Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd replicationActive Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st security descriptorscommand-line tools 2nd 3rd 4th 5th 6th 7th Manually Obtaining a Computer Certificate procedure (20.16) mappingaddress mappingNAT (Network Address Translation) 2nd 3rd clipboard mapping 2nd home directoriesfor downlevel clients 2nd port mappingNAT (Network Address Translation) 2nd 3rd Mason, Anthony mass storage drivesupdating master account domainsupgrading 2nd 3rd 4th 5th Master Boot Record Master Boot Record (MBR) disks. [See Master Boot Record (MBR). [See MBR (Master Boot Record)]Maximum Received Reconstructed Unit (MRRU). [See Maximum Transmission Unit (MTU). [See (Master Boot Record) MBR (Master Boot Record) disks MD (message digest) hashing mechanisms mebership listsgroupsviewing Media Access Control (MAC) layer Media Access Control (MAC). [See MAC (Media Access Control)]media drivesremovable media drivesinstalling 2nd 3rd 4th Meggitt, Ashley member servers accessingauthentication 2nd 3rd 4th 5th 6th membersgroupsuniversal memory Datacenter Serversupport DMA (Direct Memory Access) 2nd 3rd 4th 5th Enterprise Serversupport hot memory IA32 memoryhandling 2nd 3rd 4th 5th 6th legacy application support 2nd 3rd 4th management 2nd 3rd IA64 memorylegacy application support 2nd 3rd 4th 5th 6th 7th 8th 9th management 2nd kernel memorytracking pools 2nd 3rd 4th 5th Standard Serversupport usageimprovements memory dumps 2nd configuring 2nd 3rd 4th examining 2nd 3rd 4th 5th message digests. [See hases]metadata recordsMFT metadata records (MFT) 2nd 3rd 4th 5th 6th 7th 8th 9th metadirectoriesEnterprise Server metafilesprinter sharing 2nd methodsreplicationActiveDirectory 2nd 3rd 4th MFT(Master File Table) buffer zone changes fragmentationNTFS 2nd 3rd 4th metadata records 2nd 3rd 4th 5th 6th 7th 8th 9th records reparse point 2nd 3rd 4th 5th 6th 7th Microsoft Client Microsoft Crypto Provider Microsoft data partitions Microsoft Metadirectory Services (MMS). [See MMS (Microsoft Metadirectory Services)]Microsoft PKI documentation Microsoft Reserved Partition (MSR). [See MSR (Microsoft Reserved Partiton)]2nd [See Migapp.inf file 2nd 3rd migrationdomains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd account migration 2nd 3rd computer account migration 2nd 3rd group account migration group accounts 2nd 3rd 4th 5th password migration 2nd 3rd 4th 5th 6th SID history 2nd 3rd 4th 5th user accounts 2nd 3rd 4th 5th user state migration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th FSTW (Files and Settings Transfer Wizard) 2nd 3rd 4th INF files 2nd 3rd 4th 5th 6th 7th 8th tools USMT (User State Migration Toolkit) 2nd 3rd 4th Migsys.inf file 2nd 3rd 4th Miguser.inf file 2nd minidrivers minimum requirementshardwareservers mirrored volumes 2nd breaking 2nd 3rd 4th 5th creating 2nd fault tolerant disksreplacing in 2nd 3rd 4th mirrorssoftwarebreaking Miscrosoft installer (MSI). [See cross-realm architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th cross-realm trustscreating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th Kerberized applications 2nd 3rd 4th references 2nd mixed domains Mixed domainsauthenticationPPP (Point-to-Point Protocol) 2nd 3rd 4th Kerberos mixed domainsupgrading 2nd preferential logons 2nd XP policy placement 2nd 3rd 4th MMS(Microsoft Metadirectory Service) Mobsync.exeoffline filesmanaging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th ModeBDCs ModemDet.txt log recordstroubleshooting 2nd ModemLog filestroubleshooting 2nd modemsconfiguringfor remote access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd connectionstesting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th dial-up sessionsmonitoring 2nd 3rd 4th 5th installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd logstroubleshooting 2nd 3rd null-modem serial cablespinouts Registry entries modesWindowsDirectory Service Restore Mode Modify option (Nvrboot.efi) modifyingGPOs (Group Policy Objects) 2nd 3rd monitoringfaxes 2nd modemsdial-up sessions 2nd 3rd 4th 5th Monitoring Access to Directory Service Objects procedure (11.12) Monitoring for Unauthorized Folder Access procedure (11.11) MoronÕs Guide to Kerberos, The Web site Moskowitz, JeremyWindows 2000\: Group Policy Profiles, and IntelliMirror (i) motherboards 2nd mount point informationRegistry mount pointsreparse points Mountmgr.sys drivers moved objectsreplicationActive Directory movingpaging files Moving a Fault Tolerant Volume to Another Computer procedure (14.16) MPRs(Multiple Provider Routers) 2nd 3rd MRRU (Maximum Received Reconstructed Unit) MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 2nd 3rd 4th MS-CHAPv2 MSI MSI (Microsoft installer)software deployment policies 2nd 3rd MSR (Microsoft Reserved Partition) 2nd MTU (Maximum Transmission Unit) multidomain forestsGPCssite policies Multihomed NetBIOS multimedia devicespreparinginstallation multiple displaysdevicesinstalling 2nd multiple domain foreststrustsdesigning 2nd multiple domainsActive Directory 2nd 3rd 4th 5th database size restrictions 2nd logonsconfiguring 2nd 3rd password policy restrictions 2nd performance restrictions 2nd political restrictions 2nd 3rd 4th 5th reasons for 2nd 3rd 4th 5th 6th 7th 8th 9th SMTP replication restrictions Multiple Provider Routers (MPRs). [See MPRs (Multiple Provider Routers)]multiple-version DLL workaround multiprocessorssupport MUP pollingDfs (Distributed File Sharing) 2nd MUPs(Multiple UNC Providers) 2nd mutual authenticationKerberos 2nd