[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Z]Valid From entity (certificates) Valid To entity (certificates) Validate option (Secedit utility) validating serverKerberos validating server name (Kerberos reply messages) validity checkscertificates 2nd 3rd 4th 5th 6th 7th variablesOSCML VBScriptviruses VCN(Virtual Cluster Number) vendorsPKI verificationsRISconfigurations Verifying Link Tracking Operation procedure (15.2) Verifying Resource Record Integration procedure (5.15) Verifying Transitive Trust Accessibility procedure (9.3) Verifying WFP Operation procedure (15.3) Verisign Web site Version entity (certificates) version numbersGPOs 2nd storage 2nd versionsNtldr Windows .NETcompared 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Vga.sys drivers Vgaoem.fon drivers videotroubleshooting Videoprt.sys drivers viewingaccess tokens ACEs (access control entries) consolidated permissions consolidated permisssions ESP (EFI System Partition) GPOs (Group Policy Objects) 2nd 3rd group membership lists MAC addresses system privileges 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th ticketsKerberos Viewing a Resultant Set of Permissions procedure (11.1) Viewing Personal Certificates via the Certificates Snap-In procedure (17.1) Viewing Printer Driver Details procedure (16.10) virtual blocksLDM volumes Virtual Cluster Number (VCN). [See VCN (Virtual Cluster Number)]Virtual List Views Virtual Memory Manager (VMM). [See VBScript Viscarola, Peter visual cuesfile encryption VMM (Virtual Memory Manager) vocabularyKerberos 2nd 3rd 4th 5th 6th volume extensions 2nd 3rd Volume ManagerLDM volumes volume requirmentsRIS 2nd Volume Shadow Copy Service (VSS). [See VSS (Volume Shadow Copy Service)]volume shadow service (Ntbackup) 2nd 3rd 4th volumesdeleting 2nd dynamic diskscreating on 2nd 3rd dynamic volumescreating restrictions 2nd 3rd 4th extendingbetween dynamic disks 2nd file systems mirrored volumes 2nd breaking 2nd 3rd 4th 5th creating 2nd replacing in 2nd 3rd 4th RAID 5 volumes 2nd shadows simple volumes 2nd spanned volumes 2nd striped volumes 2nd creating 2nd VPNsconnectionsconfiguring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th VSS(Volume Shadow Copy Service) vunerabilitiespasswords 2nd 3rd 4th storage 2nd