[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
CA
CA Version entity (certificates)
cache-coherent Non-Uniform Memory Allocation (ccNUMA). [See passwords
caches
caching
caching-only name server
caching-only servers
DNS
CAL
CALs
canonical sorting
ACEs
CAs
(Certification Authorities) 2nd 3rd 4th 5th
AIA (Authority Information Access) 2nd 3rd
certificates
archiving 2nd 3rd 4th 5th 6th 7th
enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
CRLs
(Certificate Revocation Lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
obtaining via Windows Update 2nd 3rd
certificate templates 2nd 3rd 4th 5th
Standard Server
trust hierarchies
cataloging
Cataloging a Tape procedure (21.6)
CCITT
(Comit
ccNUMA (cache-coherent Non-Uniform Memory Allocation)
CD-ROM drives
CDP (CRL Distribution Points) container (Enterprise CAs)
cells
Certificate Management Messages over CMS (CMC). [See 2nd [See Certificate Request Wizard
Certificate Revocation Lists (CRLs). [See CRLs (Certificate Revocation Lists)]
Certificate Template entity (certificates)
certificate templates container (Enterprise CAs)
archiving 2nd 3rd 4th 5th 6th 7th
CAs
(Certification Authorities) 2nd 3rd 4th 5th
CRLs (Certificate Revocation Lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
trust hierarchies 2nd 3rd 4th 5th
enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
CMC (Certificate Management Messages over CMS) 2nd
enrollment agent certificates
issuing;remote access 2nd 3rd 4th 5th 6th 7th
Enterprise CAs
certificate templates 2nd 3rd 4th 5th
Kerberos
PACs (Privilege Access Certificates) 2nd 3rd 4th 5th 6th
local certificate stores 2nd 3rd
managing 2nd 3rd 4th 5th 6th 7th
OCSP (Online Certificate Status Protocol) 2nd
PKI (Public Key Infrastructure)
smart cards
SPCs (Software Publishing Certificates)
templates
preparing for remote access 2nd 3rd 4th
validity checks 2nd 3rd 4th 5th 6th 7th
Web Server
Certificates snap-in
Certification Authority (CA). [See CA (Certification Authority)]
Challenge Handshake Authentication Protocol (CHAP). [See CHAP (Challenge Handshake Authentication Protocol)]
Change Journal
ChangePDC permission (Active Directory)
Changing a Role Master Using an MMC Console procedure (10.3)
Changing Active Directory File Locations procedure (10.13)
Changing Default RDP Port in the TSWeb Interface procedure (19.5)
Changing Drive Letters procedure (14.12)
Changing Log File Settings procedure (11.10)
Changing the Network Provider Order procedure (16.2)
CHAP
(Challenge Handshake Authentication Protocol) 2nd 3rd 4th 5th
CHAP Authentication Transaction procedure (20.1)
Character Phase Setup
Charting Performance Monitor Logs procedure (3.8)
checking
checklist
installation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
child domains
child trusts
CHKDSK
AUTOCHK
file systems
fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
CHKNTFS
AUTOCHK
CIFS (Common Internet File System)
CIPHER command
certificates
CISVC
CIW
(Client Installation Wizard) 2nd 3rd 4th 5th 6th 7th
screens
class derivations
schema
classes
derivations
LDAP
objects
classic interface
Classic NT Link Search Pattern procedure (15.1)
Classic NT storage
Classic NT4 RAS access
domains
classic scripts
domains
classifications
groups
Client Access License (CAL). [See CAL (Client Access License)]
Client Installation Wizard (CIW). [See CIW (Client Installation Wizard)]
client name resolution
client printer connections
client-side extensions (CSEs). [See CSEs (client-side extensions)]
Client/Server Runtime Subsystem (CSRSS). [See clientÕs name and realm field (encrypted tickets)
compatibility
DNS
downlevel cliens
fax servers
Kerberos authentication
print clients
printing
configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th
WINS
cloning
disks
deployment 2nd 3rd 4th 5th 6th 7th 8th 9th
Sysprep 2nd 3rd 4th 5th 6th 7th 8th
cluster addressing
cluster mapping
cluster maps
clusters
Enterprise Server
file systems 2nd 3rd 4th 5th 6th 7th
CMC (Certificate Management Messages over CMS) 2nd
collision handling
replication
Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
collisions
Comit
command line
Dfs
home directories
RRAS
shares
terminal services
command lines
forced updates
command-line
disks
file encryption
printing
administration 2nd 3rd 4th 5th
command-line management
command-line tools
security descriptors
managing 2nd 3rd 4th 5th 6th 7th
commands
RunAs
Common Internet File System (CIFS). [See LDAP 2nd 3rd
compacting
Active Directory database 2nd 3rd
compatibility settings
components
groups
LSA 2nd 3rd 4th 5th 6th 7th 8th 9th
compression
file compression 2nd 3rd 4th 5th
files
computer account migrations
computer authentication
computer startup
Kerberos authentication 2nd 3rd 4th 5th 6th 7th
computers
domains
conditional forwarding
configuration
AUTOCHK
client-side caching 2nd 3rd 4th 5th 6th 7th 8th
clients
printing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th
demand-dial routers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
devices 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
EFI disk utililities 2nd 3rd 4th 5th 6th
DHCP
DNS support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
DNS
hierarchical zones 2nd 3rd 4th 5th 6th 7th 8th
secondary servers 2nd 3rd 4th 5th 6th 7th 8th 9th
DNS servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
Fax service 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
file sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
remote share creation 2nd 3rd 4th 5th
share creation 2nd 3rd 4th 5th 6th 7th 8th
final configuration 2nd 3rd 4th
IA64 storage 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
IAS (Internet Authentication Services) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
Internet gateways
NAT 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
modems
for remote access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
multiple domains
network bridges 2nd 3rd 4th 5th 6th 7th
post Setup configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
remote access servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th
RIS server
RRAS 2nd 3rd 4th 5th 6th 7th 8th
smart card acceptance 2nd 3rd 4th 5th
Setup
configuration phase 2nd 3rd 4th
graphical phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
IA64 differences 2nd 3rd 4th 5th 6th
text phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
smart cards
troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
VPNs
connections 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
WINS
configuration phase
Configure option (Secedit utility)
Configure Your Server Wizard 2nd
Configuring a CA to Archive Certificates procedure (18.4)
Configuring a Caching-Only Server procedure (5.16)
Configuring a Cross-Realm Trust procedure (11.8)
Configuring a Demand-Dial Router procedure (20.12)
Configuring a DNS Server to Use a Forwarder procedure (5.17)
Configuring a Dynamic Zone procedure (5.18)
Configuring a GPO Security Descriptor to Filter Policy Recipients procedure (12.4)
Configuring a Remote Installation Services Image procedure (2.7)
Configuring a Remote Installation Services Server procedure (2.8)
Configuring a Secondary Server procedure (5.13)
Configuring a Spanned Volume procedure (14.6)
Configuring a WINS Client procedure (4.4)
Configuring an RRAS Server as an IAS Client procedure (20.18)
Configuring and Scheduling a Backup Job procedure (21.4)
Configuring Automatic Connection Pickup procedure (20.13)
Configuring Delegations procedure (5.11)
Configuring DNS Information for TCP/IP Interface Properties procedure (5.5)
Configuring DNS Information in the System Properties Window procedure (5.6)
Configuring NAT and ICF procedure (20.14)
Configuring Performance Monitor to Collect kernel Memory Statistics procedure (3.7)
Configuring Replmon procedure (7.13)
Configuring Root Hints procedure (5.10)
Configuring RRAS to Use RADIUS Authentication procedure (20.19)
Configuring Scavenging procedure (5.20)
Configuring Scope Options procedure (5.26)
Configuring the Password Migration Agent procedure (9.4)
Configuring the System to Dump Only the Contents of the Kernel Memory procedure (1.3)
Configuring WINS Replication procedure (4.6)
connections
browsers
client printer connections
dial-in connections
ICF (Internet Connection Firewall) 2nd
ICS (Internet Connection Sharing) 2nd 3rd 4th 5th
modems
testing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
replication
shared folders 2nd 3rd 4th 5th 6th
browsers 2nd 3rd 4th 5th 6th 7th 8th
console (WINS)
console logons
console sessions
consolidated permissions
contacts
exchanging
Content Indexing Service (CISVC). [See CISVC (Context Indexing Service)]
content rules
Continuing with the Graphic Mode Portion of Setup procedure (1.2)
Control Sets
Last Known Good Configuration 2nd 3rd 4th 5th 6th
controller() entry
convergence time
conversion
NTFS 2nd 3rd 4th 5th 6th 7th 8th
conversions
disks
dynamic disks 2nd 3rd 4th 5th 6th 7th 8th 9th
Converting a Basic Disk to a Dynamic Disk procedure (14.4)
copy warnings
copying
files
Correcting Lost Drive Signatures procedure (1.4)
cover pages
faxes
CPUs
crackers
Creating a Custom Schema Management Console procedure (6.1)
Creating a Dfs Root procedure (16.6)
Creating a Fault Tolerant Boot Floppy Disk procedure (3.5)
Creating a Forward Lookup Zone procedure (5.8)
Creating a Key Recovery Agent procedure (18.3)
Creating a Mount Point Using the Disk Management Console procedure (15.5)
Creating a New Site Object procedures (7.5)
Creating a Password Reset Disk procedure (11.3)
Creating a Reverse Lookup Zone procedure (5.9)
Creating a Subnet Object procedure (7.6)
Creating an Archive Template procedure (18.5)
Creating and Configuring Site Link Objects procedure (7.7)
Creating and Sharing a Folder procedure (16.3)
Creating Dfs Links procedure (16.7)
Creating Extended Partitions and Logical Drives procedure (14.2)
Creating Mirrored Volumes procedure (14.8)
Creating Primary Partitions on Basic Disks procedure (14.1)
Creating RAID 5 Volumes procedure (14.10)
Creating Remote Shares Using the Computer Management Console procedure (16.4)
Creating Simple Volumes procedure (14.5)
Creating Striped Volumes procedure (14.7)
credentials caches
CRLs
(Certificate Revocation Lists) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
obtaining via Windows Update 2nd 3rd
cross-domain authentication 2nd 3rd 4th
cross-domain GPO links
cross-realm architecture
MITv5 Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
cross-realm trusts
MITv5 Kerberos
creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
cross-trust hierachies
cryptographic elements (PKI) 2nd 3rd 4th 5th 6th 7th
Cryptographic Service Provider (CSP). [See CSP (Cryptographic Service Provider)]
cryptographic services
CSEs
background refreshes 2nd 3rd 4th
group policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
synchronous processing 2nd 3rd 4th
CSP
(Cryptographic Service Provider)
CSRSS (Client/Server Runtime Subsystem)
CTLs
custom computer names
cutoff speeds
slow link processing