[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]RA (Registration Authority) RADIUS(Remote Authentication Dial-In User Services) 2nd 3rd 4th 5th 6th 7th 8th IASsupport 2nd 3rd 4th 5th 6th RRASsupport 2nd 3rd 4th 5th 6th RAID 5 volumes 2nd 3rd failed disksreplcaing in 2nd 3rd 4th 5th RAS serversanonymous access 2nd remote access 2nd 3rd 4th 5th 6th 7th 8th RBFG (Remote Boot Floppy Generator) RC algorithms rdisk() entryBoot.ini RDP (Remote Desktop Protocol) 2nd clientsconnections 2nd 3rd 4th data stream encryption 2nd improvements to remote assistance Remote Desktopdisabling Remote Desktop client 2nd 3rd 4th 5th 6th 7th 8th 9th 10th serversmanaging 2nd 3rd 4th 5th 6th RDP Redirector realm names (Kerberos reply messages) realmsKerberos record verificationsDNS recordsDNSresource records 2nd scavenging 2nd MFT MFT recordsreparse points 2nd 3rd 4th 5th 6th 7th NTFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th $Data 2nd 3rd 4th $File_Name 2nd 3rd $Standard_Information 2nd 3rd header information 2nd short name generation 2nd 3rd 4th WINSdeleting managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th recoverabilitydomains recoveringcertificates 2nd 3rd failed fault tolerant disks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th keysPKI 2nd 3rd 4th 5th Recovery Console 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th Recovering a Lost Key procedure (18.6) Recovering from Failed Jet Database Conversion procedure (4.2) recoveryfile encryption 2nd 3rd 4th 5th 6th file systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd Windows File Protection 2nd 3rd 4th 5th 6th 7th 8th 9th keysPKI Recovery Console 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th dynamic volumes installing 2nd 3rd 4th 5th limitations 2nd 3rd loadingRIS (Remote Installation Services) 2nd options 2nd 3rd 4th recovery stagesActive Directory recursive search type flagsDNS Red Hat v7.1 Reference Guide Web site redirectionfoldersmanaging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th redirectors default share points 2nd 3rd 4th NetWare Redirector network services 2nd 3rd 4th 5th 6th 7th 8th 9th RDP Redirector Registry keys server file systems TDI (Transport Driver Interface) WebDAV Redirector Windows Redirector referencesMITv5 Kerberos 2nd referralsclients Dfs (Distributed File Sharing) 2nd refresh intervalsrecord scavenging registeringnamesWINS Windows .NET 2nd 3rd 4th 5th Registering an IAS Server with Active Directory procedure (20.17) Registering File Types for Backup Exclusions procedure (21.2) Registration Authority (RA) Registrycells keyspolicies 2nd 3rd redirectors LDP entries modemsentries mount point information policy tracking printer entries shared folders sizeimprovements to structure Synchronization Managersettings Registry size limit (RSL) Registry size limit (RSL). [See administrative template files 2nd relationshipstrusts relative distinguished namesnamespacesLDAP Relative IDs (RIDs). [See domains Relocating the Default Spool Directory procedure (16.11) RemInstall shares remote accessActive Directory domains 2nd 3rd 4th 5th 6th 7th 8th broadband cell-switched networks circuit-switched networks dedicated networks demand-dial routersconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th IAS (Internet Authentication Services)configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Internet gatewaysconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th managing 2nd 3rd 4th 5th 6th modemsinstalling and configuring for 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd network bridgesconfiguring 2nd 3rd 4th 5th 6th 7th NT4 RAS servers 2nd 3rd 4th 5th 6th 7th 8th NT4 RRAS serversconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th packet-switched networks PPP (Point-to-Point Protocol)authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th serversconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th smart cardscertificate templates preaparation 2nd 3rd 4th certificate testing 2nd configuring for deploying for 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th enrollment agent certificates 2nd 3rd 4th 5th 6th 7th form factors 2nd PKI preparations 2nd 3rd remote logon testing 2nd 3rd RRAS configuration 2nd 3rd 4th 5th selecting 2nd 3rd user enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th VPNsconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th WAN device support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st remote access permissionscontrolling 2nd 3rd Remote Administration mode (terminal services) Remote Assistance remote assistanceRDP Remote Assistanceterminal services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Remote Authentication Dial-In User Services (RADIUS). [See RADIUS (Remote Authentication Dial-In User Services)]Remote Boot Floppy Generator (RBFG). [See terminal services 2nd 3rd 4th Remote Desktopdisabling PocketPCs Remote Desktop (RDP) 2nd 3rd 4th 5th 6th 7th 8th Remote Desktop client (Mstsc.exe) 2nd 3rd 4th 5th 6th 7th 8th Remote Desktop Protocol (RDP). [See RDP (Remote Desktop Protocol)]2nd [See RDP (Remote Desktop Protocol)]Remote Desktop providers Remote Installation Services (RIS). [See RIS (Remote Installation Services)]2nd [See RIS (Remote Installation Services)]remote logon testingsmart cards 2nd 3rd remote managementservers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th Remote Procedure Calls (RPCs). [See creating 2nd 3rd 4th 5th Remote Storage File Analysis utility Remote Storage Services (RSS). [See RSS (Remote Storage Services)]2nd [See RSS (Remote Storage Services)]removable drivesNTFS 2nd 3rd removable media drives 2nd 3rd installing 2nd 3rd 4th removable storage Removable Storage Management (RSM) service. [See RSM (Removable Storage Management) service]Removable Storage Management (RSM). [See Removable Storage Manager (RSM) Removing a Dfs Root procedure (16.9) renamingDefault-First-Site-Name Object domain controllers 2nd 3rd domains 2nd Renaming a Domain Controller Using NETDOM COMPUTERNAME procedure (9.6) Renaming the Default-First-Site-Name Object procedure (7.4) renewal intervalsWINS databasesetting 2nd 3rd 4th 5th 6th repairsforcingAUTOCHK reparse pointsfile systems 2nd 3rd 4th 5th 6th 7th identifying MFT records 2nd 3rd 4th 5th 6th 7th mount points Replacing a Failed Disk in a Mirrored Volume procedure (14.15) Replacing a Failed Disk in a RAID 5 Volume procedure (14.13) replica ring formations replica ring repairs 2nd replicationaccount replicationBDCs Active DirectoryApplication naming context bridgehead server selection 2nd bridgehead servers 2nd collision handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th connections 2nd 3rd deleted containers 2nd deleted object handling 2nd 3rd deleted objects frequency 2nd 3rd 4th 5th 6th 7th garbage collection 2nd 3rd 4th identical distinguished names 2nd 3rd inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th inter-site topologies 2nd ISTGs (Inter-Site Topology Generators) 2nd 3rd 4th 5th KCC (Knowledge Consistency Checker) linked values loss of components 2nd 3rd 4th 5th managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st methods 2nd 3rd 4th moved objects naming contexts 2nd 3rd NET TIME 2nd 3rd 4th new features 2nd parameter control 2nd 3rd 4th 5th 6th 7th 8th property metadata 2nd 3rd property replication 2nd simultaneous modification 2nd site objects 2nd 3rd 4th sites 2nd 3rd special operations 2nd 3rd 4th 5th 6th 7th 8th 9th topology 2nd 3rd 4th 5th 6th 7th 8th 9th 10th transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th WIN32TM 2nd 3rd 4th WTS (Windows Time Service) 2nd 3rd bridging connectionsmanually creating 2nd forcing 2nd 3rd 4th FRS (File Replication Service) diagnostic logging intervalssetting 2nd 3rd 4th 5th loosely coupled replication mechanisms manually controlling 2nd 3rd membersgroups RPCs (Remote Procedure Calls) 2nd scripts security descriptors SMTP (Simple Mail Transport Protocol) Windows NT WINS 2nd 3rd 4th 5th configuring 2nd 3rd 4th replication topologiesDfschanging 2nd 3rd replication topologyFRS (File Replication Service) 2nd 3rd 4th Replication Trace Showing USN Operation procedure (7.2) Replication Trace Showing UTD Vector Operation procedure (7.3) Request for Comments (RFCs). [See certificates Res1.log file (Active Directory) Res2.log file (Active Directory) reserved variablesOSCML resetspasswords handling for local accounts 2nd reset disks 2nd 3rd 4th 5th 6th resettingUPNsscripts resolversDNS clients 2nd 3rd 4th 5th resource domainsupgrading 2nd 3rd Resource KitGPRESULT (Standard Utility) tool 2nd GPRESULT tool SHOWPRIVS tool WHOAMI tool 2nd resource recordsDNS 2nd resource sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd administrative shares CD-ROM drives clientsprinting configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th fax sharing file sharingadministrative shares 2nd configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th Dfs (Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th remote share creation 2nd 3rd 4th 5th share creation 2nd 3rd 4th 5th 6th 7th 8th share permissions 2nd 3rd XP desktops 2nd 3rd FxsSrvCp$ IPC$ shares Netlogin shares network applications 2nd 3rd 4th print servicesmanaging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st Print$ printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th enhanced metafiles 2nd initial job rendering 2nd 3rd network printing 2nd 3rd 4th port monitors 2nd 3rd 4th print job delivery 2nd printer drivers 2nd 3rd 4th 5th 6th 7th 8th 9th spoolers 2nd 3rd 4th 5th 6th 7th 8th 9th providers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th installing 2nd 3rd 4th MPRs (Multiple Provider Routers) 2nd 3rd MUPs (Multiple UNC Providers) 2nd order changing 2nd 3rd print providers redirectors 2nd 3rd 4th 5th 6th 7th 8th 9th default share points 2nd 3rd 4th server file systems RemInstall shares shared foldersconnecting to 2nd 3rd 4th 5th 6th Sysvol shares resourcesnetwork services 2nd 3rd 4th 5th PKI responsesICMP (Internet Control Message Protocol)controlling restore pointsNtbackup restoresmonitoring restoringActive Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th authoritative restores 2nd 3rd 4th 5th 6th 7th 8th backup tape time limits 2nd 3rd 4th 5th permissions 2nd System State files 2nd 3rd 4th Sysvol 2nd files 2nd 3rd 4th 5th 6th 7th Last Known Good Configuration 2nd Control Sets 2nd 3rd 4th 5th 6th systems Restoring a File Manually Using Ntbackup procedure (21.5) Restoring Deleted Administrative Shares with Poledit procedure (16.5) restrictionsdatabase size restrictionsmultiple domains 2nd dynamic volumes 2nd 3rd 4th NetBIOS name resolution 2nd 3rd password policy restrictionsmultiple domains 2nd performance restrictionsmultiple domains 2nd political restrictionsmultiple domains 2nd 3rd 4th SMTP replication restrictionsmultiple domains Resultant Set of Policies (RSoP). [See RSoP (Resultant Set of Policies)]reverse lookup queriesDNS 2nd 3rd 4th 5th 6th 7th 8th reverse lookup zonesDNScreating 2nd 3rd 4th reversible passwords 2nd enabling 2nd 3rd 4th 5th revertingdynamic disks revision levelsversion numbersGPOs revocation checkscertificates RFCs (Request for Comments) 2nd Richter, Jeffrey RID MasterFSMOs RIDswell-known RIDs 2nd 3rd RIDs (Relative IDs)Active Directory 2nd Rijmen, Vincent RIP(Routing Information Protocol) Ripreprequirements RIS imagescreating 2nd 3rd 4th 5th 6th 7th scripts RIS(Remote Installation Services) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th BINL (Boot Information Negotiation Layer) 2nd 3rd 4th 5th CIWscreen customization 2nd 3rd 4th 5th CIW (Client Installation Wizard) 2nd 3rd 4th 5th 6th 7th configuring 2nd 3rd 4th 5th verification custom computer names DHCP 2nd functional overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th group policiescontrolling 2nd 3rd headless server installations 2nd 3rd 4th 5th 6th imagesaccess control creating 2nd 3rd 4th 5th 6th 7th installing 2nd 3rd 4th PXE (Pre-boot Execution Environment 2nd PXE boot diskscreating 2nd setup scripts 2nd 3rd volume requirements 2nd Rivest, Ron Rivest, Ronald role masterActive Directory 2nd role mastersFSMOs rolesdomain controllerssetting 2nd 3rd rollbacksdevice drivers 2nd 3rd root CAs root certificate updatesCAs root command (Nslookup) root directoriesDfscreating 2nd 3rd root domain namesActive Directory domains 2nd 3rd 4th 5th 6th root domains upgrading 2nd 3rd root hintsDNS 2nd 3rd 4th configuring 2nd 3rd updating 2nd Root System Description Table (RSDT) root zonesDNSWindows 2000 RootDSELDAP 2nd rootsDfs 2nd 3rd limitations removing 2nd 3rd 4th routersdemand-dial routersconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th routingActive Directory domains 2nd 3rd 4th 5th 6th 7th 8th demand-dial routersconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th Internet routing 2nd 3rd 4th 5th 6th NT4 RAS servers 2nd 3rd 4th 5th 6th 7th 8th NT4 RRAS serversconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th PPP (Point-to-Point Protocol)authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th routing protocols WAN device support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st Routing and Remote Access Services (RRAS). [See RRAS (Routing and Remote Access Services)]2nd [See RRAS (Routing and Remote Access Services)]Routing Information Protocol (RIP). [See RIP (Routing Information Protocol)]routing protocols RPCs (Remote Procedure Calls) RRAS(Routing and Remote Access Services) 2nd . [See also NT4 RRAS servers]configuring 2nd 3rd 4th 5th 6th 7th 8th RADIUS authentication 2nd 3rd 4th 5th 6th smart card acceptance 2nd 3rd 4th 5th initializing 2nd 3rd Internet gatewaysconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th managingcommand line 2nd 3rd 4th 5th NATconfiguring in 2nd RSA Labs Web site RSA public key technology RSAenh CSP provider RSDT (Root System Description Table) RSL(Registry size limit) RSL (Registry size limit) RSM(Removable Storage Management) service RSM (Removable Storage Management) Ntbackup 2nd 3rd 4th 5th RSM (Removable Storage Manager) RSoP(Resultant Set of Policies) GPOs (Group Policy Objects) 2nd 3rd 4th 5th 6th 7th GPRESULT logging 2nd RSoP Wizard RSS(Remote Storage Services) 2nd rulesschemaActive Directory 2nd 3rd 4th RunAsActive Directory 2nd 3rd 4th 5th RunAs commandprofiles switches 2nd 3rd syntax 2nd runningscriptsunattended setup Running the RSoP Wizard in Logging Mode procedure (12.3) Running the RSoP Wizard in Planning Mode procedure (12.2) Russinovich, Mark 2nd