Inside Windows Server 1002003 [Electronic resources] نسخه متنی

This is a Digital Library

With over 100,000 free electronic resource in Persian, Arabic and English

Inside Windows Server 1002003 [Electronic resources] - نسخه متنی

Addison Wesley

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

SAC (Special Administration Console)

EMS
2nd
3rd

SACLs

(system access control lists)

Safe Mode

backups
2nd
3rd
4th
5th

Safe Mode with Command Prompt

Safe Mode with Networking

SAM

(Security Account Manager)
2nd
3rd

domains

upgrading
2nd
3rd

SAM databases
2nd

samba clients

NTLMv2 passwords

SAS

(Secure Attention Sequence)

SAS (Secure Attention Sequence)

scavenging

Dynamic DNS

configuring
2nd
3rd
4th
5th

records

DNS
2nd

Schannel security package

scheduling

backup jobs
2nd
3rd
4th
5th
6th

schema

Active Directory

class derivations
2nd

definition objects
2nd

functional operations
2nd
3rd
4th

object classes
2nd

object identification
2nd
3rd
4th

rules
2nd
3rd
4th

Schema console

Active Directory
2nd
3rd
4th
5th
6th
7th

schema master

Active Directory
2nd

Schema Master

Schema naming context

Schema Master (FSMOs)

Schema naming context

Active Directory
2nd

Schema Master

schema upgrades

forests
2nd

Schema.ini file (Active Directory)

schemas

databases
2nd

Schlumberger Web site

scope options

DHCP

configuring
2nd
3rd
4th
5th

script

deploying
2nd
3rd

running

unattended setup

script policies

deploying
2nd
3rd

group policies
2nd
3rd
4th
5th
6th
7th

script processing

CSEs (Client-Side Extensions)
2nd

scripted installations
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd

scripts

Clonegg

Cloneggu

Clonelg

Clonepr

domains

support
2nd

replication

Riprep

RIS
2nd
3rd

Sidhist

types

unattended scripts

customizations

unattended setup batch files

unattended setup scripts

creating
2nd
3rd
4th
5th
6th
7th
8th
9th

VBScript

viruses

SCSI

problems

resolving
2nd

SCSI adapters

installing
2nd
3rd

SCSI cables

checking

SCSI drivers

alternative

SCSI drives

installing
2nd
3rd

Scsiport.sys drivers

searches

LDAP
2nd

searching

shared folders

connecting to

Searching with LDP procedure (6.4)

Secedit utility

secondaries

DNS
2nd

secondary bootstrap
2nd

Secondary Logon Service (SLS).
[See DNS
2nd
3rd

secondary servers

DNS

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th

secrets (LSA)

sectors

file systems
2nd
3rd
4th
5th
6th
7th

Secure Attention Sequence (SAS).
[See 2nd
[See Secure Hash Algorithm (SHA).
[See SHA-1 (Secure Hash Algorithm)]

Secure Hash Standard (SHS).
[See SHS (Secure Hash Standard)]

SecureID smart cards

SecureNet Web site

security

access masks

access permissions

evaluation
2nd
3rd
4th
5th
6th
7th

access tokens
2nd
3rd
4th

ACLs
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

access permission evaluation
2nd
3rd
4th
5th
6th
7th

Active Directory
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st

access control inheritance
2nd
3rd
4th
5th
6th

access list management
2nd
3rd
4th

access permissions

access rights
2nd

access rights delegation
2nd
3rd
4th
5th
6th

anonymous access
2nd

descriptor contents
2nd
3rd
4th

event notification
2nd
3rd

groups
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

improvements to
2nd

LSA (Local Security Authority)

managing
2nd
3rd
4th

object protection
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

primaries

RunAs
2nd
3rd
4th
5th

security descriptors

security principals
2nd

service accounts
2nd

SLS (Secondary Logon Service)
2nd
3rd
4th
5th

SRM (Security Reference Monitor)

architecture
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

auditing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

audit logs
2nd

enabling
2nd
3rd

event log managment
2nd
3rd
4th
5th

kernel object auditing

recommendations
2nd
3rd
4th
5th
6th
7th
8th
9th

authentication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th

Kerberos
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th

limitations
2nd

MITv5 Kerberos interoperability
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

support
2nd

backups

EMS
2nd
3rd
4th
5th
6th
7th
8th

EMS (Emergency Management Services)

interactive backups
2nd
3rd
4th
5th
6th
7th

job scheduling
2nd
3rd
4th
5th
6th

Safe Mode
2nd
3rd
4th
5th

BSOD (Blue Screen of Death)

recovering from
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

components

connections

ICF (Internet Connection Firewall)
2nd

Digest security package

DNS
2nd
3rd
4th
5th
6th

domains

Dynamic DNS

managing
2nd
3rd

encryption

PKI (Public Key Infrastructure)
2nd
3rd

file encryption
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th

certificate management
2nd
3rd
4th
5th
6th
7th

data encryption
2nd
3rd
4th

data encryption algorithms
2nd
3rd
4th

disabling
2nd
3rd
4th
5th
6th
7th

EFS
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th

EFS file transactions
2nd
3rd
4th
5th
6th
7th
8th

FEK (File Encryption Key)
2nd
3rd
4th
5th
6th

file decryption process
2nd
3rd

individual files

private key protection
2nd
3rd
4th
5th
6th
7th
8th
9th
10th

process description
2nd
3rd

recovery
2nd
3rd

transporting
2nd

WebDAV
2nd
3rd
4th
5th
6th
7th
8th

Kerberos
2nd
3rd
4th

authorization data
2nd
3rd
4th
5th
6th
7th
8th
9th

LSA

(Local Security Authority)

components
2nd
3rd
4th
5th
6th
7th
8th
9th

functional diagram

operations
2nd

Negotiate security package

network access
2nd
3rd

Ntbackup
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th

NTLM

passwords
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th

anonymous logons
2nd
3rd
4th

computer passwords
2nd
3rd
4th

crackers

credentials caches
2nd
3rd
4th

formats
2nd
3rd
4th
5th

handling for local accounts
2nd

hashing algorithm

password reset disks

policies
2nd
3rd
4th
5th
6th

reset disks
2nd
3rd
4th
5th
6th

resets

reversible passwords
2nd
3rd
4th
5th

storage
2nd
3rd
4th
5th
6th
7th
8th
9th

vunerabilities
2nd
3rd
4th
5th
6th

permissions
2nd

inheritance
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th

system privileges
2nd
3rd

viewing
2nd

PKI

cipher keys
2nd

hashes
2nd
3rd
4th

policies
2nd
3rd
4th
5th
6th

folder redirection
2nd

Kerberos
2nd

print policies
2nd
3rd

printers
2nd
3rd

Recovery Console
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th

restores
2nd
3rd
4th
5th
6th
7th

Schannel

security descriptors
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

SIDs
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

terminal services
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

viruses

VBScript

Windows NT

lack of management granularity

limitations of
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

multiple logon IDs

nontransitive trust relationships

poor operational performance

poor replication performance

restricted account database size

single point of failure

Security Account Manager (SAM).
[See SAM (Security Account Manager)]2nd
[See SAM (Security Account Manager)]3rd
[See SAM (Security Account Manager)]

security checks

upgrades
2nd

security databases

LSA

security descriptors
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th

Active Directory

DACLs (discretionary access control lists)

headers

managing

command-line tools
2nd
3rd
4th
5th
6th
7th

NTFS
2nd
3rd
4th
5th
6th
7th

links

lookups
2nd

owner SIDs

primary group SIDs for the owner

replication

SACLs (system access control lists)

security groups

group policies

filtering
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

security logs

access

controlling

security packages

LSA
2nd
3rd
4th

security policies

analysis snap-in
2nd
3rd
4th

configuring
2nd
3rd

default security templates
2nd
3rd

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

security-related GPT files
2nd
3rd
4th
5th

specialty security templates
2nd

templates

distributing
2nd
3rd

security principals

Active Directory
2nd

Kerberos

Security Reference Monitor (SRM).
[See SRM (Security Reference Monitor)]2nd
[See SRM (Security Reference Monitor)]

Security Requirements for Cryptographic Modules

Security Support Provider Interface (SSPI).
[See SSPI (Security Support Provider Interface)]

Security Support Providers (SSPs).
[See SSPs (Security Support Providers)]

security templates

distributing
2nd
3rd

security-related GPT files

managing
2nd
3rd
4th
5th

Seizing a FSMO Role procedure (10.5)

Selecting a New Replication Partner procedure (7.11)

Send Fax Wizard

sending

faxes
2nd
3rd
4th
5th
6th
7th

Seperator Pages property (printers)
2nd
3rd
4th

Serenum.sys drivers

Serial Number entity (certificates)

Serial.sys drivers

Server Access Transaction Using Kerberos procedure (11.7)

server command (Nslookup)

server file systems

redirectors

Server Message Block (SMB) command protocol.
[See moving between
2nd
3rd

server-based files

file encryption
2nd
3rd
4th
5th
6th

Kerberos

impersonation
2nd

trusted for delegation
2nd
3rd
4th

Serverdomain variable (OSCML)

Servername variable (OSCML)

servers

bridgehead servers

designating
2nd
3rd
4th

client-side caching

configuring
2nd
3rd
4th
5th
6th
7th
8th

DHCP servers

authorizing
2nd
3rd

DNS

secondary servers
2nd
3rd
4th
5th
6th

DNS servers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

forwarders
2nd
3rd

installing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

loss of
2nd
3rd
4th

multiple use

fax servers
2nd

FSMO servers

placement

GC (Global Catalog) servers
2nd

headless servers

installing
2nd
3rd

logon servers

identification

managing

RDP (Remote Desktop Protocol)
2nd
3rd

via remote desktop
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th

member servers

minimum hardware requirements

naming

Setup
2nd
3rd
4th

print servers

managing
2nd

remote access servers

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th

standalone servers

policies

terminal services

security
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

service account authentication (Kerberos)

service accounts

Active Directory

security
2nd

service drivers

booting process

service locations

Kerberos

service locator records

DNS

service pack installation

slipstreaming
2nd
3rd

Service Principal Names (SPNs).
[See SPNs (Service Principal Names)]

Service Principal Names)
2nd
3rd
4th
5th

services

Active Directory

locating
2nd
3rd
4th
5th
6th

Configuration naming context

Active Directory

Kerberos

Services for Macintosh (SFM).
[See SFM (Services for Macintosh)]

Services for UNIX (SFU) Web site

session key field (encrypted tickets)

Session Keys (Kerberos reply messages)

Session layer (OSI)
2nd

Session Manager

booting process
2nd
3rd
4th

Set [no]d2 command (Nslookup)

set [no]debug command (Nslookup)

set [no]deframe command (Nslookup)

set [no]recurse command (Nslookup)

set querytype command (Nslookup)

setting

intervals

replication
2nd
3rd
4th
5th

roles

domain controllers
2nd
3rd

Setting Folder Encryption procedure (17.7)

Setting Periodic Scavenging procedure (5.21)

Setting Permissions on RIS Images procedure (2.9)

Setting the Fail on Load if Bad Zone option procedure (5.24)

Setup

booting

EFI Shell

Character Phase Setup

installation
2nd
3rd
4th
5th

configuration phase
2nd
3rd
4th
5th

initial user logon

setup

dynamic disks
2nd
3rd
4th

Setup

function keys

graphic phase

Graphic Phase Setup

installation
2nd
3rd
4th
5th
6th
7th
8th
9th

graphical phase
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

administrator password management
2nd

dates
2nd
3rd

domains
2nd
3rd
4th

licensing
2nd
3rd

per seat licensing
2nd

per server licensing
2nd

server naming
2nd
3rd
4th

terminal server licensing
2nd

times
2nd
3rd

workgroups
2nd
3rd
4th

IA64 Setup

compared
2nd
3rd
4th
5th
6th

post-Setup configuration
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

text phase
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

ACPI compatibility checks
2nd

disk formats
2nd
3rd

drive letter assignments
2nd
3rd
4th
5th
6th
7th

executable loads
2nd

files
2nd
3rd
4th

initial hardware recognition
2nd
3rd

troubleshooting

setup batch files

unattended setup batch files

Setup Information File (SIF).
[See 2nd
[See RIS
2nd
3rd

unattended setup scripts

creating
2nd
3rd
4th
5th
6th
7th
8th
9th

Setupreg.hiv drivers

SFM

(Services for Macintosh)

SFU (Services for UNIX) Web site

SHA-1

(Secure Hash Algorithm)

shadows

volumes

Shamir, Adi

share permissions
2nd
3rd

share point verification

domains

share points
2nd

redirectors
2nd
3rd
4th

shared encryption files

shared folders

connecting to
2nd
3rd
4th
5th
6th

browsers
2nd
3rd
4th
5th
6th
7th
8th

searching

Registry

shared interrupts

shared resources
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd

clients

printing configuration
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th
48th
49th
50th
51st
52nd
53rd
54th

file sharing

administrative share
2nd

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

Dfs (Distributed File Sharing)
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th
45th
46th
47th

remote share creation
2nd
3rd
4th
5th

share creation
2nd
3rd
4th
5th
6th
7th
8th

share permissions
2nd
3rd

XP desktops
2nd
3rd

network applications
2nd
3rd
4th

network services
2nd
3rd
4th
5th

print services

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

printer sharing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

enhanced metafiles
2nd

initial job rendering
2nd
3rd

network printing
2nd
3rd
4th

port monitors
2nd
3rd
4th

print job delivery
2nd

printer drivers
2nd
3rd
4th
5th
6th
7th
8th
9th

spoolers
2nd
3rd
4th
5th
6th
7th
8th
9th

providers
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th

installing
2nd
3rd
4th

MPRs (Multiple Provider Routers)
2nd
3rd

MUPs (Multiple UNC Providers)
2nd

order changing
2nd
3rd

print providers

redirectors
2nd
3rd
4th
5th
6th
7th
8th
9th

default share points
2nd
3rd
4th

server file systems

shared folders

connecting to
2nd
3rd
4th
5th
6th

shares

administrative shares

re-creating

recreating

creating

command line
2nd

Explorer
2nd
3rd
4th
5th
6th

remote computers
2nd
3rd
4th
5th

ICS (Internet Connection Sharing)
2nd
3rd
4th
5th

names

length

Sharing property (printers)
2nd
3rd
4th

sharing.
[See shells.
[See domains
2nd

Shiva PAP (SPAP).
[See SPAP (Shiva PAP)]

short name generation

NTFS records
2nd
3rd
4th

short name preservation

files

NTFS

short-cut trusts

Kerberos
2nd

shortcut trusts

Active Directory

SHOWPRIVS tool (Resource Kit)

SHS

(Secure Hash Standard)

shutdown event tracker

SID history

domains

migrating
2nd
3rd
4th
5th

Side-by-Side assemblies

(DLLs)
2nd
3rd
4th

Sidhist script

SIDs
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

functions

well-known SIDs

SIF (Setup Information File)
2nd

Siffle variable (OSCML)

Signature Algorithm entity (certificates)

signature() entry

Boot.ini
2nd
3rd
4th

Simple Mail Transport Protocol (SMTP).
[See 2nd
[See Simple Network Management Protocol (SNMP).
[See SNMP (Single Network Management Protocol)]

Simple Network Time Protocol (SNTP).
[See SNTP (Simple Network Time Protocol)]

simple volumes
2nd

simultaneous modification

replication

Active Directory
2nd

Single Instance Storage (SIS).
[See SIS (Single Instance Storage)]2nd
[See SIS (Single Instance Storage)]3rd
[See SIS (Single Instance Storage)]

single point of failure

Windows NT

SIS

(Single Instance Storage)
2nd
3rd

file recovery

SIS (Single Instance Storage) groveler
2nd
3rd

SIS Groveler

site link bridge objects

creating
2nd
3rd
4th
5th

site objects

Active Directory
2nd
3rd
4th

site policies

GPCs

multidomain forests

sites

architectures

designing
2nd
3rd
4th
5th
6th
7th

Configuration naming context

Active Directory

creating
2nd

inter-site replication
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th

links

creating
2nd
3rd
4th
5th

replication

Active Directory
2nd
3rd

server objects

moving between
2nd
3rd

sizes

drives
2nd
3rd

GPT drives

NTFS
2nd

SKIs (Subject Key Identifiers)

SKUs

(Stock Keeping Units)

slipstreaming

service pack installations
2nd
3rd

Slipstreaming Service Pack Files procedure (2.4)

slipstreams

slow link processing

group policies
2nd
3rd
4th

cutoff speeds

SLS (Secondary Logon Service)

Active Directory

security
2nd
3rd
4th
5th

smart cards

improvements to

providers

remote access

certificate template preparation
2nd
3rd
4th

certificate testing
2nd

configuring for

deploying for
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th

enrollment agent certificates
2nd
3rd
4th
5th
6th
7th

form factors
2nd

PKI preparations
2nd
3rd

remote logon testing
2nd
3rd

RRAS configuration
2nd
3rd
4th
5th

selecting
2nd
3rd

user enrollment
2nd
3rd
4th
5th
6th
7th
8th
9th

SecureID smart cards

SMB

MAC layer
2nd

SMB (Server Message Block) command protocol

SMBs

(Server Message Blocks)
2nd
3rd

traffic

restricting

Transport layer
2nd

Smss.exe drivers

SMTP

(Simple Mail Transport Protocol)

SMTP (Simple Mail Transport Protocol)

SMTP replication restictions

multiple domains

SNMP

(Simple Network Management Protocol)

SNTP

(Simple Network Time Protocol)

soft recoveries

Active Directory

soft-linked partitions

software deployment policies

group policies
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

Miscrosoft Installer

MSI (Microsoft installer)
2nd
3rd

troubleshooting
2nd
3rd
4th
5th

Windows Installer service
2nd
3rd

software deployment policies

software mirrors

breaking

Software Publishers Association (SPA).
[See SPA (Software Publishers Association)]

Software Publishing Certificates (SPCs).
[See SPCs (Software Publishing Certificates)]

SOHO networks

Internet gateways

configuring
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th

Solomon, David

SPA

(Software Publishers Association)

spanned volumes
2nd

SPAP

(Shiva PAP)

(Shiva Password Authentication Protocol)
2nd

sparse files

NTFS
2nd

SPCs

(Software Publishing Certificates)

split public/private zones

Active Directory domains
2nd
3rd

SPNs

(Service Principal Names)
2nd
3rd
4th
5th

spoolers

printer sharing

file location changes
2nd
3rd
4th
5th
6th
7th
8th

SRM

(Security Reference Monitor)
2nd

Active Directory

SSH (Secure Shell)

authentication services

SSPI

(Security Support Provider Interface)

SSPs

(Security Support Providers)

stability

domains

standalone roots

standalone servers

policies

Standard PPP Transaction Details protocol (20.3)

Standard Server
2nd
3rd

CAs (Certification Authorities)

support

memory

support

processors

support

terminal services

support

standard transactions

PPP (Point-to-Point Protocol)
2nd
3rd
4th
5th

start times (Kerberos reply messages)

Starting DNS from a BIND File procedure (5.23)

Starting Explorer Shell Using RunAs procedure (13.6)

startup (computer)

Kerberos authentication
2nd
3rd
4th
5th
6th
7th

static IP addressing

Step-by-Step Guide to Kerberos 5 Interoperability Web site

Stock Keeping Units (SKUs).
[See SKUs (Stock Keeping Units)]

stop errors

common stop errors
2nd

storage

certificates

CAs

local certificate stores
2nd
3rd

configuring
2nd
3rd
4th
5th
6th

data storage

dynamic disks

GPT disks

IA32 systems
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st

LDM (Logical Disk Manager) volume configurations
2nd
3rd
4th
5th
6th
7th
8th

MBR (Master Boot Record) disks

detachable storage

domains

FEK (File Encryption Key)

fixed spinning storage

keys

PKI
2nd
3rd

names
2nd

passwords
2nd
3rd
4th
5th
6th
7th

Active Directory

vunerabilities
2nd

removable storage

tape storage

WMI filters
2nd

Storing User Names and Passwords procedure (11.2)

streaming ciphers

stripe size

striped volumes
2nd

creating
2nd

Structural class

LDAP

structure rules

Active Directory
2nd

stub zones

DNS
2nd
3rd
4th

Suberror variable (OSCML)

Subject entity (certificates)

Subject Key Identifier entity (certificates)

Subject Key Identifiers (SKIs).
[See Subnet Master Browser

subordinate CAs

installing

superhidden definition

Boot.ini

support

authentication

methods
2nd

drivers

large

hardware
2nd
3rd
4th

IA32 memory

legacy application support
2nd
3rd
4th

IA64 memory

legacy application support

legacy application support;file system redirection
2nd

legacy application support;Registry reflection
2nd

legacy application support;WOW64
2nd

multiprocessors

plug-and-play
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th

support files

Active Directory
2nd
3rd

moving
2nd

switches

Boot.ini
2nd
3rd
4th

CHKDSK
2nd

RunAs command
2nd
3rd

SxS assemblies.
[See symbols files

symmetric cipher keys

synchronization

GPOs

troubleshooting
2nd
3rd
4th

time

Synchronization Manager

offline files

managing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

options

synchronous processing

CSEs (Client-Side Extensions)
2nd
3rd
4th

syntax

RunAs command
2nd

syntax rules

Active Directory
2nd

Sysfiles.inf file
2nd

Sysprep

factory options
2nd

images

auditing

limitations
2nd

Sysprepdrivers variable (OSCML)

Syspreppath variable (OSCML)

system access control lists (SACLs).
[See SACLs (system access control lists)]

system failures

Ntbackup
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th
14th
15th
16th
17th
18th
19th
20th
21st
22nd
23rd
24th
25th
26th
27th
28th
29th
30th
31st
32nd
33rd
34th
35th
36th
37th
38th
39th
40th
41st
42nd
43rd
44th

system information

troubleshooting

system kernel

booting process
2nd

system partitions
2nd

expanding

system policies

tattooing

System Policy Editor

system policy verification

domains

system privileges
2nd
3rd

viewing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

system properties

DNS

configuring
2nd

System Restore

Ntbackup

XP desktops
2nd
3rd

system restores

System State backups

Active Directory

performing
2nd
3rd
4th

System State files

Active Directory

restoring
2nd
3rd
4th

backing up

Ntbackup
2nd

Sysvol

Active Directory

restoring
2nd

Sysvol shares

/ 245