[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
Abstract class
access
RIS images
security logs
access control entries (ACEs). [See ACEs (access control entries)]
Access Control Entry (ACE). [See ACE (Access Control Entry)]
access control inheritance 2nd 3rd 4th 5th 6th
access control lists (ACLs). [See ACLs (access control lists)]
access lists
managing
access permissions
evaluation 2nd 3rd 4th 5th 6th 7th
GPCs
GPTs
access rights
delegation 2nd 3rd 4th 5th 6th
contents
accessing
member servers
authentication 2nd 3rd 4th 5th 6th
Accessing Advanced Server Parameters procedure (5.22)
Accessing the Remote Installation Group Policy procedure (2.10)
Accessing the WMI Filter Interface procedure (12.5)
ACCM (Asynchronous-Control-Character-Map)
account BDCs
account migrations
ACE
ACEs
canonical sorting
objects
ACLs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
access permissions
evaluation 2nd 3rd 4th 5th 6th 7th
ACEs
DACLs
(discretionary access control lists)
objects
permissions
SACLs
(Advanced Configuration and Power Interface)
plug-and-play 2nd 3rd 4th 5th 6th 7th 8th
ACPI compatibility checks
Setup
initial hardware recognition 2nd
activation
Windows Product Activation 2nd 3rd 4th 5th
Active Directory
backing up 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
restoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
System State backups 2nd 3rd 4th
classes
database
DNS
forwarders 2nd 3rd 4th 5th 6th 7th 8th
integration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
zone integration 2nd 3rd 4th 5th
DNS servers
domain controllers
loss of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
metadata cleanup 2nd 3rd 4th 5th 6th 7th
domains
designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
domain controller placement 2nd 3rd 4th
FSMOs (Flexible Single Master Operations)
multiple domain forest trusts 2nd
multiple domains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
multiple groups 2nd 3rd 4th 5th
PDC Emulators 2nd 3rd 4th 5th 6th 7th
remote access 2nd 3rd 4th 5th 6th 7th 8th
root domain names 2nd 3rd 4th 5th 6th
split public/private zones 2nd 3rd
ESE (Extensible Storage Engine)
forests
in-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
FSMOs
loss of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
GPOs (Group Policy Objects)
groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Domain Local groups 2nd 3rd 4th 5th 6th 7th
Global groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Universal groups 2nd 3rd 4th 5th 6th 7th 8th
GUID (Globally Unique Identifier)
IAS (Internet Authentication Service)
IP subnets
maintenance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
namespaces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th
Global Catalogs 2nd 3rd 4th 5th
naming contexts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
service location 2nd 3rd 4th 5th 6th
trust relationships 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
object
objects
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
protecting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
OU
OUs
designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
lower-level OUs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
passwords
PW2CA (Pre-Windows 2000 Compatible List)
replication
bridgehead server selection 2nd
collision handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
deleted object handling 2nd 3rd
frequency 2nd 3rd 4th 5th 6th 7th
garbage collection 2nd 3rd 4th
identical distinguished names 2nd 3rd
inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
ISTGs (Inter-Site Topology Generators) 2nd 3rd 4th 5th
KCC (Knowledge Consistency Checker)
loss of components 2nd 3rd 4th 5th
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
parameter control 2nd 3rd 4th 5th 6th 7th 8th
RPCs (Remote Procedure Calls) 2nd
special operations 2nd 3rd 4th 5th 6th 7th 8th 9th
topology 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
WTS (Windows Time Service) 2nd 3rd
restoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
authoritative restores 2nd 3rd 4th 5th 6th 7th 8th
backup tape time limits 2nd 3rd 4th 5th
System State files 2nd 3rd 4th
functional operations 2nd 3rd 4th
object identification 2nd 3rd 4th
security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
access control inheritance 2nd 3rd 4th 5th 6th
access list management 2nd 3rd 4th
access rights delegation 2nd 3rd 4th 5th 6th
descriptor contents 2nd 3rd 4th
groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
LSA (Local Security Authority)
object protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
SLS (Secondary Logon Service) 2nd 3rd 4th 5th
SRM (Security Reference Monitor)
sercurity
SMTP (Simple Mail Transport Protocol)
utilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
ADSI Edit tool 2nd 3rd 4th 5th 6th 7th 8th
Schema console 2nd 3rd 4th 5th 6th 7th
WAN links
Active Directory Migration Tool (ADMT). [See ADMT (Active Directory Migration Tool)]2nd [See ADMT (Active Directory Migration Tool)]
Active Directory Services Interface (ADSI). [See Active Directory User Objects
AD Users and Computers
home directories
adapters
network adapters
adding
attributes
Adding a Static WINS Mapping procedure (4.5)
Adding File Types to the File Exclusion List procedure (21.1)
address mapping
NAT (Network Address Translation) 2nd 3rd
Address Windowing Extensions (AWE). [See AWE (Address Windowing Extensions)]
addresses
determining
Network layers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
MAC addresses
ADM listings
administrative template files 2nd 3rd 4th
ADM template files 2nd 3rd 4th 5th 6th
administrative access
DNS
administrative template policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
ADM template files 2nd 3rd 4th 5th 6th
administrator passwords
managing
adminstrative template policies
ADMT
(Active Directory Migration Tool) 2nd
ADSI (Active Directory Services Interface)
ADSI Edit tool
Active Directory 2nd 3rd 4th 5th 6th 7th 8th
Advanced Configuration and Power Interface (ACPI). [See ACPI (Advanced Configuration and Power Interface)]
Advanced Encryption Standard (AES). [See 2nd [See Advanced property (printers) 2nd 3rd
Advanced Research Project Administration (ARPA). [See ARPA (Advanced Research Project Administration)]
Advanced RISC Computing (ARC) path. [See ARC (Advanced RISC Computing) path]
AES
(Advanced Encryption Standard)
AES (Advanced Encryption Standard)
AIA
(Authority Information Access) 2nd 3rd
AIA (Authority Information Access) containers (Enterprise CAs)
AIPIPA (Automatic Private IP Addressing)
AKIs
algorithms
DSA (Digital Signature Algorithm)
encryption
hashing algorithms
KCC (Knowledge Consistency Checker)
allocation units. [See Allow permissions
alternative Startfrom files (RIS)
analysis snap-in
Analyze option (Secedit utility)
anonymous access
anonymous logons
ANSI
application compatibility
domain controllers
Windows NT4
application compatibility checks
Application layer
SMBs (Server Message Blocks) 2nd 3rd
Application mode (terminal services)
Application naming conctext
replication
Application naming context
Active Directory 2nd 3rd 4th 5th 6th
application naming contexts 2nd
application servers
applications
Applying Inheritable Rights to an Active Directory Container procedure (13.1)
ARC
(Advanced RISC Computing) path
ARC paths
Boot.ini
architecture
security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Windows .NET 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th
architectures
sites
designing 2nd 3rd 4th 5th 6th 7th
archived certificates
archiving
certificates
keys
ARPA
(Advanced Research Project Administration)
ASR
ASR (Automated System Recovery)
assigned packages
assigning
drive letters
Assigning a Home Directory Using the Command Line procedure (19.3)
Assigning a User Home Directory with AD Users and Computers procedure (19.2)
Assigning Custom UPN Suffixes procedure (8.1)
asynchronous processing
CSEs (Client-Side Extensions) 2nd
Asynchronous-Control-Character-Map (ACCM). [See Atapi.sys drivers
atomic transactions
Attribute Scoped Query (ASQ). [See Boot.ini
Global Catalog
objects
audio
Audit Monitor for Logon/Logoff procedure (11.13)
Audit Monitoring for Printers procedure (11.14)
auditing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
event logs
images
recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th
AUDITPOL utility
event logs
authenticated users
limitations
authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
classic NT authentication
IAS (Internet Authentication Services)
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
cross-domain authentication 2nd 3rd 4th
member server access 2nd 3rd 4th 5th 6th
MITv5 Kerberos interoperability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
PACs (Privilege Access Certificates) 2nd 3rd 4th 5th 6th
transactions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
vocabulary 2nd 3rd 4th 5th 6th
methods
PPP
CHAP (Challenge Handshake Authentication Protocol) 2nd 3rd 4th
dial-up authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
domain authentication 2nd 3rd 4th
EAP (Extensible Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th
MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 2nd 3rd 4th
multidomain authentication 2nd 3rd
PAP (Password Authentication Protocol) 2nd 3rd 4th 5th 6th 7th
RADIUS (Remote Authentication Dial-In User Services) 2nd 3rd 4th 5th 6th 7th 8th
SPAP (Shiva Password Authentication Protocol) 2nd
standard transactions 2nd 3rd 4th 5th
PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th
authentication functions
authentication packages
authenticator
authoritative query responses
authoritative restores
Active Directory 2nd 3rd 4th 5th 6th 7th 8th
authoritative servers
DNS
query handling 2nd 3rd 4th 5th
Authority Information Access (AIA). [See AIA (Authoity Information Access)]2nd [See AIA (Authoity Information Access)]3rd [See AIA (Authoity Information Access)]
Authority Information Access entity (certificates)
Authority Key Identifier (AKIs). [See AKIs (Authority Key Identifiers)]
Authority Key Identifier entity (certificates)
authorization
groups
authorization data
Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th
authorization data field (encrypted tickets)
authorizations
auto-enrollment
AUTOCHK
CHKDSK
configuring
file systems
fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
repairs
Automated System Recovery (ASR). [See Automatic Private IP Addressing (APIPA)
automating
deployment
Windows .NET 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th
Auxiliary class
AWE