[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]SAC (Special Administration Console)EMS 2nd 3rd SACLs(system access control lists) Safe Modebackups 2nd 3rd 4th 5th Safe Mode with Command Prompt Safe Mode with Networking SAM(Security Account Manager) 2nd 3rd domainsupgrading 2nd 3rd SAM databases 2nd samba clientsNTLMv2 passwords SAS(Secure Attention Sequence) SAS (Secure Attention Sequence) scavengingDynamic DNSconfiguring 2nd 3rd 4th 5th recordsDNS 2nd Schannel security package schedulingbackup jobs 2nd 3rd 4th 5th 6th schemaActive Directory class derivations 2nd definition objects 2nd functional operations 2nd 3rd 4th object classes 2nd object identification 2nd 3rd 4th rules 2nd 3rd 4th Schema consoleActive Directory 2nd 3rd 4th 5th 6th 7th schema masterActive Directory 2nd Schema MasterSchema naming context Schema Master (FSMOs) Schema naming context Active Directory 2nd Schema Master schema upgradesforests 2nd Schema.ini file (Active Directory) schemasdatabases 2nd Schlumberger Web site scope optionsDHCPconfiguring 2nd 3rd 4th 5th scriptdeploying 2nd 3rd runningunattended setup script policiesdeploying 2nd 3rd group policies 2nd 3rd 4th 5th 6th 7th script processingCSEs (Client-Side Extensions) 2nd scripted installations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd scriptsClonegg Cloneggu Clonelg Clonepr domainssupport 2nd replication Riprep RIS 2nd 3rd Sidhist types unattended scriptscustomizations unattended setup batch files unattended setup scripts creating 2nd 3rd 4th 5th 6th 7th 8th 9th VBScriptviruses SCSIproblemsresolving 2nd SCSI adaptersinstalling 2nd 3rd SCSI cableschecking SCSI driversalternative SCSI drivesinstalling 2nd 3rd Scsiport.sys drivers searchesLDAP 2nd searchingshared foldersconnecting to Searching with LDP procedure (6.4) Secedit utility secondariesDNS 2nd secondary bootstrap 2nd Secondary Logon Service (SLS). [See DNS 2nd 3rd secondary serversDNSconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th secrets (LSA) sectorsfile systems 2nd 3rd 4th 5th 6th 7th Secure Attention Sequence (SAS). [See 2nd [See Secure Hash Algorithm (SHA). [See SHA-1 (Secure Hash Algorithm)]Secure Hash Standard (SHS). [See SHS (Secure Hash Standard)]SecureID smart cards SecureNet Web site securityaccess masks access permissionsevaluation 2nd 3rd 4th 5th 6th 7th access tokens 2nd 3rd 4th ACLs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th access permission evaluation 2nd 3rd 4th 5th 6th 7th Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st access control inheritance 2nd 3rd 4th 5th 6th access list management 2nd 3rd 4th access permissions access rights 2nd access rights delegation 2nd 3rd 4th 5th 6th anonymous access 2nd descriptor contents 2nd 3rd 4th event notification 2nd 3rd groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th improvements to 2nd LSA (Local Security Authority) managing 2nd 3rd 4th object protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th primaries RunAs 2nd 3rd 4th 5th security descriptors security principals 2nd service accounts 2nd SLS (Secondary Logon Service) 2nd 3rd 4th 5th SRM (Security Reference Monitor) architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th auditing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th audit logs 2nd enabling 2nd 3rd event log managment 2nd 3rd 4th 5th kernel object auditing recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th limitations 2nd MITv5 Kerberos interoperability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st support 2nd backupsEMS 2nd 3rd 4th 5th 6th 7th 8th EMS (Emergency Management Services) interactive backups 2nd 3rd 4th 5th 6th 7th job scheduling 2nd 3rd 4th 5th 6th Safe Mode 2nd 3rd 4th 5th BSOD (Blue Screen of Death)recovering from 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th components connectionsICF (Internet Connection Firewall) 2nd Digest security package DNS 2nd 3rd 4th 5th 6th domains Dynamic DNSmanaging 2nd 3rd encryptionPKI (Public Key Infrastructure) 2nd 3rd file encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th certificate management 2nd 3rd 4th 5th 6th 7th data encryption 2nd 3rd 4th data encryption algorithms 2nd 3rd 4th disabling 2nd 3rd 4th 5th 6th 7th EFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th EFS file transactions 2nd 3rd 4th 5th 6th 7th 8th FEK (File Encryption Key) 2nd 3rd 4th 5th 6th file decryption process 2nd 3rd individual files private key protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th process description 2nd 3rd recovery 2nd 3rd transporting 2nd WebDAV 2nd 3rd 4th 5th 6th 7th 8th Kerberos 2nd 3rd 4th authorization data 2nd 3rd 4th 5th 6th 7th 8th 9th LSA(Local Security Authority) components 2nd 3rd 4th 5th 6th 7th 8th 9th functional diagram operations 2nd Negotiate security package network access 2nd 3rd Ntbackup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th NTLM passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th anonymous logons 2nd 3rd 4th computer passwords 2nd 3rd 4th crackers credentials caches 2nd 3rd 4th formats 2nd 3rd 4th 5th handling for local accounts 2nd hashing algorithm password reset disks policies 2nd 3rd 4th 5th 6th reset disks 2nd 3rd 4th 5th 6th resets reversible passwords 2nd 3rd 4th 5th storage 2nd 3rd 4th 5th 6th 7th 8th 9th vunerabilities 2nd 3rd 4th 5th 6th permissions 2nd inheritance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th system privileges 2nd 3rd viewing 2nd PKIcipher keys 2nd hashes 2nd 3rd 4th policies 2nd 3rd 4th 5th 6th folder redirection 2nd Kerberos 2nd print policies 2nd 3rd printers 2nd 3rd Recovery Console 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th restores 2nd 3rd 4th 5th 6th 7th Schannel security descriptors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th SIDs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th terminal services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th virusesVBScript Windows NTlack of management granularity limitations of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th multiple logon IDs nontransitive trust relationships poor operational performance poor replication performance restricted account database size single point of failure Security Account Manager (SAM). [See SAM (Security Account Manager)]2nd [See SAM (Security Account Manager)]3rd [See SAM (Security Account Manager)]security checksupgrades 2nd security databasesLSA security descriptors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th Active Directory DACLs (discretionary access control lists) headers managingcommand-line tools 2nd 3rd 4th 5th 6th 7th NTFS 2nd 3rd 4th 5th 6th 7th links lookups 2nd owner SIDs primary group SIDs for the owner replication SACLs (system access control lists) security groupsgroup policiesfiltering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th security logsaccesscontrolling security packagesLSA 2nd 3rd 4th security policiesanalysis snap-in 2nd 3rd 4th configuring 2nd 3rd default security templates 2nd 3rd managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th security-related GPT files 2nd 3rd 4th 5th specialty security templates 2nd templatesdistributing 2nd 3rd security principalsActive Directory 2nd Kerberos Security Reference Monitor (SRM). [See SRM (Security Reference Monitor)]2nd [See SRM (Security Reference Monitor)]Security Requirements for Cryptographic Modules Security Support Provider Interface (SSPI). [See SSPI (Security Support Provider Interface)]Security Support Providers (SSPs). [See SSPs (Security Support Providers)]security templatesdistributing 2nd 3rd security-related GPT filesmanaging 2nd 3rd 4th 5th Seizing a FSMO Role procedure (10.5) Selecting a New Replication Partner procedure (7.11) Send Fax Wizard sendingfaxes 2nd 3rd 4th 5th 6th 7th Seperator Pages property (printers) 2nd 3rd 4th Serenum.sys drivers Serial Number entity (certificates) Serial.sys drivers Server Access Transaction Using Kerberos procedure (11.7) server command (Nslookup) server file systemsredirectors Server Message Block (SMB) command protocol. [See moving between 2nd 3rd server-based filesfile encryption 2nd 3rd 4th 5th 6th Kerberosimpersonation 2nd trusted for delegation 2nd 3rd 4th Serverdomain variable (OSCML) Servername variable (OSCML) servers bridgehead serversdesignating 2nd 3rd 4th client-side cachingconfiguring 2nd 3rd 4th 5th 6th 7th 8th DHCP serversauthorizing 2nd 3rd DNSsecondary servers 2nd 3rd 4th 5th 6th DNS serversconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th forwarders 2nd 3rd installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th loss of 2nd 3rd 4th multiple use fax servers 2nd FSMO serversplacement GC (Global Catalog) servers 2nd headless serversinstalling 2nd 3rd logon serversidentification managingRDP (Remote Desktop Protocol) 2nd 3rd via remote desktop 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th member servers minimum hardware requirements namingSetup 2nd 3rd 4th print serversmanaging 2nd remote access serversconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th standalone serverspolicies terminal servicessecurity 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th service account authentication (Kerberos) service accountsActive Directorysecurity 2nd service driversbooting process service locationsKerberos service locator recordsDNS service pack installationslipstreaming 2nd 3rd Service Principal Names (SPNs). [See SPNs (Service Principal Names)]Service Principal Names) 2nd 3rd 4th 5th servicesActive Directorylocating 2nd 3rd 4th 5th 6th Configuration naming contextActive Directory Kerberos Services for Macintosh (SFM). [See SFM (Services for Macintosh)]Services for UNIX (SFU) Web site session key field (encrypted tickets) Session Keys (Kerberos reply messages) Session layer (OSI) 2nd Session Managerbooting process 2nd 3rd 4th Set [no]d2 command (Nslookup) set [no]debug command (Nslookup) set [no]deframe command (Nslookup) set [no]recurse command (Nslookup) set querytype command (Nslookup) settingintervalsreplication 2nd 3rd 4th 5th rolesdomain controllers 2nd 3rd Setting Folder Encryption procedure (17.7) Setting Periodic Scavenging procedure (5.21) Setting Permissions on RIS Images procedure (2.9) Setting the Fail on Load if Bad Zone option procedure (5.24) SetupbootingEFI Shell Character Phase Setupinstallation 2nd 3rd 4th 5th configuration phase 2nd 3rd 4th 5th initial user logon setupdynamic disks 2nd 3rd 4th Setupfunction keys graphic phase Graphic Phase Setupinstallation 2nd 3rd 4th 5th 6th 7th 8th 9th graphical phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th administrator password management 2nd dates 2nd 3rd domains 2nd 3rd 4th licensing 2nd 3rd per seat licensing 2nd per server licensing 2nd server naming 2nd 3rd 4th terminal server licensing 2nd times 2nd 3rd workgroups 2nd 3rd 4th IA64 Setupcompared 2nd 3rd 4th 5th 6th post-Setup configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th text phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th ACPI compatibility checks 2nd disk formats 2nd 3rd drive letter assignments 2nd 3rd 4th 5th 6th 7th executable loads 2nd files 2nd 3rd 4th initial hardware recognition 2nd 3rd troubleshooting setup batch filesunattended setup batch files Setup Information File (SIF). [See 2nd [See RIS 2nd 3rd unattended setup scripts creating 2nd 3rd 4th 5th 6th 7th 8th 9th Setupreg.hiv drivers SFM(Services for Macintosh) SFU (Services for UNIX) Web site SHA-1(Secure Hash Algorithm) shadowsvolumes Shamir, Adi share permissions 2nd 3rd share point verificationdomains share points 2nd redirectors 2nd 3rd 4th shared encryption files shared foldersconnecting to 2nd 3rd 4th 5th 6th browsers 2nd 3rd 4th 5th 6th 7th 8th searching Registry shared interrupts shared resources 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd clientsprinting configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th file sharingadministrative share 2nd configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th Dfs (Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th remote share creation 2nd 3rd 4th 5th share creation 2nd 3rd 4th 5th 6th 7th 8th share permissions 2nd 3rd XP desktops 2nd 3rd network applications 2nd 3rd 4th network services 2nd 3rd 4th 5th print servicesmanaging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th enhanced metafiles 2nd initial job rendering 2nd 3rd network printing 2nd 3rd 4th port monitors 2nd 3rd 4th print job delivery 2nd printer drivers 2nd 3rd 4th 5th 6th 7th 8th 9th spoolers 2nd 3rd 4th 5th 6th 7th 8th 9th providers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th installing 2nd 3rd 4th MPRs (Multiple Provider Routers) 2nd 3rd MUPs (Multiple UNC Providers) 2nd order changing 2nd 3rd print providers redirectors 2nd 3rd 4th 5th 6th 7th 8th 9th default share points 2nd 3rd 4th server file systems shared foldersconnecting to 2nd 3rd 4th 5th 6th sharesadministrative sharesre-creating recreating creatingcommand line 2nd Explorer 2nd 3rd 4th 5th 6th remote computers 2nd 3rd 4th 5th ICS (Internet Connection Sharing) 2nd 3rd 4th 5th nameslength Sharing property (printers) 2nd 3rd 4th sharing. [See shells. [See domains 2nd Shiva PAP (SPAP). [See SPAP (Shiva PAP)]short name generationNTFS records 2nd 3rd 4th short name preservationfilesNTFS short-cut trustsKerberos 2nd shortcut trustsActive Directory SHOWPRIVS tool (Resource Kit) SHS(Secure Hash Standard) shutdown event tracker SID historydomainsmigrating 2nd 3rd 4th 5th Side-by-Side assemblies (DLLs) 2nd 3rd 4th Sidhist script SIDs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th functions well-known SIDs SIF (Setup Information File) 2nd Siffle variable (OSCML) Signature Algorithm entity (certificates) signature() entryBoot.ini 2nd 3rd 4th Simple Mail Transport Protocol (SMTP). [See 2nd [See Simple Network Management Protocol (SNMP). [See SNMP (Single Network Management Protocol)]Simple Network Time Protocol (SNTP). [See SNTP (Simple Network Time Protocol)]simple volumes 2nd simultaneous modificationreplicationActive Directory 2nd Single Instance Storage (SIS). [See SIS (Single Instance Storage)]2nd [See SIS (Single Instance Storage)]3rd [See SIS (Single Instance Storage)]single point of failureWindows NT SIS(Single Instance Storage) 2nd 3rd file recovery SIS (Single Instance Storage) groveler 2nd 3rd SIS Groveler site link bridge objectscreating 2nd 3rd 4th 5th site objectsActive Directory 2nd 3rd 4th site policiesGPCsmultidomain forests sitesarchitecturesdesigning 2nd 3rd 4th 5th 6th 7th Configuration naming contextActive Directory creating 2nd inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th linkscreating 2nd 3rd 4th 5th replicationActive Directory 2nd 3rd server objectsmoving between 2nd 3rd sizesdrives 2nd 3rd GPT drives NTFS 2nd SKIs (Subject Key Identifiers) SKUs(Stock Keeping Units) slipstreamingservice pack installations 2nd 3rd Slipstreaming Service Pack Files procedure (2.4) slipstreams slow link processinggroup policies 2nd 3rd 4th cutoff speeds SLS (Secondary Logon Service)Active Directorysecurity 2nd 3rd 4th 5th smart cardsimprovements to providers remote accesscertificate template preparation 2nd 3rd 4th certificate testing 2nd configuring for deploying for 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th enrollment agent certificates 2nd 3rd 4th 5th 6th 7th form factors 2nd PKI preparations 2nd 3rd remote logon testing 2nd 3rd RRAS configuration 2nd 3rd 4th 5th selecting 2nd 3rd user enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th SecureID smart cards SMBMAC layer 2nd SMB (Server Message Block) command protocol SMBs(Server Message Blocks) 2nd 3rd trafficrestricting Transport layer 2nd Smss.exe drivers SMTP(Simple Mail Transport Protocol) SMTP (Simple Mail Transport Protocol) SMTP replication restictionsmultiple domains SNMP(Simple Network Management Protocol) SNTP(Simple Network Time Protocol) soft recoveriesActive Directory soft-linked partitions software deployment policiesgroup policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Miscrosoft Installer MSI (Microsoft installer) 2nd 3rd troubleshooting 2nd 3rd 4th 5th Windows Installer service 2nd 3rd software deployment policies software mirrorsbreaking Software Publishers Association (SPA). [See SPA (Software Publishers Association)]Software Publishing Certificates (SPCs). [See SPCs (Software Publishing Certificates)]SOHO networksInternet gatewaysconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th Solomon, David SPA(Software Publishers Association) spanned volumes 2nd SPAP(Shiva PAP) (Shiva Password Authentication Protocol) 2nd sparse filesNTFS 2nd SPCs(Software Publishing Certificates) split public/private zonesActive Directory domains 2nd 3rd SPNs(Service Principal Names) 2nd 3rd 4th 5th spoolersprinter sharing file location changes 2nd 3rd 4th 5th 6th 7th 8th SRM(Security Reference Monitor) 2nd Active Directory SSH (Secure Shell)authentication services SSPI(Security Support Provider Interface) SSPs(Security Support Providers) stabilitydomains standalone roots standalone serverspolicies Standard PPP Transaction Details protocol (20.3) Standard Server 2nd 3rd CAs (Certification Authorities)support memorysupport processorssupport terminal servicessupport standard transactionsPPP (Point-to-Point Protocol) 2nd 3rd 4th 5th start times (Kerberos reply messages) Starting DNS from a BIND File procedure (5.23) Starting Explorer Shell Using RunAs procedure (13.6) startup (computer)Kerberos authentication 2nd 3rd 4th 5th 6th 7th static IP addressing Step-by-Step Guide to Kerberos 5 Interoperability Web site Stock Keeping Units (SKUs). [See SKUs (Stock Keeping Units)]stop errorscommon stop errors 2nd storage certificatesCAs local certificate stores 2nd 3rd configuring 2nd 3rd 4th 5th 6th data storage dynamic disks GPT disks IA32 systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st LDM (Logical Disk Manager) volume configurations 2nd 3rd 4th 5th 6th 7th 8th MBR (Master Boot Record) disks detachable storage domains FEK (File Encryption Key) fixed spinning storage keysPKI 2nd 3rd names 2nd passwords 2nd 3rd 4th 5th 6th 7th Active Directory vunerabilities 2nd removable storage tape storage WMI filters 2nd Storing User Names and Passwords procedure (11.2) streaming ciphers stripe size striped volumes 2nd creating 2nd Structural classLDAP structure rulesActive Directory 2nd stub zonesDNS 2nd 3rd 4th Suberror variable (OSCML) Subject entity (certificates) Subject Key Identifier entity (certificates) Subject Key Identifiers (SKIs). [See Subnet Master Browser subordinate CAs installing superhidden definitionBoot.ini supportauthenticationmethods 2nd driverslarge hardware 2nd 3rd 4th IA32 memorylegacy application support 2nd 3rd 4th IA64 memorylegacy application support legacy application support;file system redirection 2nd legacy application support;Registry reflection 2nd legacy application support;WOW64 2nd multiprocessors plug-and-play 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th support filesActive Directory 2nd 3rd moving 2nd switchesBoot.ini 2nd 3rd 4th CHKDSK 2nd RunAs command 2nd 3rd SxS assemblies. [See symbols files symmetric cipher keys synchronizationGPOstroubleshooting 2nd 3rd 4th time Synchronization Manageroffline filesmanaging 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th options synchronous processingCSEs (Client-Side Extensions) 2nd 3rd 4th syntaxRunAs command 2nd syntax rulesActive Directory 2nd Sysfiles.inf file 2nd Sysprepfactory options 2nd imagesauditing limitations 2nd Sysprepdrivers variable (OSCML) Syspreppath variable (OSCML) system access control lists (SACLs). [See SACLs (system access control lists)]system failuresNtbackup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th system informationtroubleshooting system kernelbooting process 2nd system partitions 2nd expanding system policiestattooing System Policy Editor system policy verificationdomains system privileges 2nd 3rd viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th system propertiesDNSconfiguring 2nd System RestoreNtbackupXP desktops 2nd 3rd system restores System State backupsActive Directoryperforming 2nd 3rd 4th System State files Active Directoryrestoring 2nd 3rd 4th backing upNtbackup 2nd SysvolActive Directoryrestoring 2nd Sysvol shares