[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
D-H (Diffie-Hellman) public key technology 2nd
DACLs
(discretionary access control lists)
(Discretionary Access Control Lists)
Data Decryption Field (DDF). [See DDF (Data Decryption Field)]
Data Encryption Standard (DES). [See DES (Data Encryption Standard)]2nd [See DES (Data Encryption Standard)]3rd [See DES (Data Encryption Standard)]
Data Link Control (DLC). [See DLC (Data Link Control)]
data link layer
addresses
ports
Data Recovery Agent (DRA). [See DRA (Data Recovery Agent)]
Data Recovery Agents (DRAs). DRAs (Data Recovery Agents)
Data Recovery Field (DRF). [See DRF (Data Recovery Field)]
IA32 systems
disk operations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
LDM (Logical Disk Manager) colume configurations
LDM (Logical Disk Manager) volume configurations 2nd 3rd 4th 5th 6th 7th
MBR (Master Boot Record) disks
data stream encryption
database size restictions
databases
Active Directory
maintenance 2nd 3rd 4th 5th 6th 7th 8th
forests
in-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
WINS
managing 2nd 3rd 4th 5th 6th 7th 8th 9th
memory
processors
dates
configuring
DCDIAG
DCFIRST.INF template (security)
DDF
debugging tools
Default Domain Controller GPOs (Active Directory)
Default Domain GPOs (Active Directory)
Default Policy Domain GPC
default security templates
Default-First-Site-Name Object
definition objects
schema
DEFLTDC.INF template (security)
DEFLTSV.INF template (security)
defragmentation
file systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
delays
delegating
group policies
Delegating Access Rights procedure (13.2)
access rights
Active Directory 2nd 3rd 4th 5th 6th
DNS
delegations
DNS
deleted containers
replication
deleted object handling
replication
deleted objects
replication
deleting
attributes
records
Deleting a Volume procedure (14.11)
Delta CRLs
Delta CRLs (Certificate Revocation Lists)
demand-dial interfaces
demand-dial routers
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
demoting
deploying
domains 2nd 3rd 4th 5th 6th 7th
Windows .NET
automating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd
deployment
disk cloning 2nd 3rd 4th 5th 6th 7th 8th 9th
scripted installations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
creating 2nd 3rd 4th 5th 6th 7th 8th 9th
derivations
classes
DES
(Data Encryption Standard) 2nd 3rd
descriptor contents
Active Directory
designating
bridgehead servers 2nd 3rd 4th
Designating a Bridgehead Server procedure (7.8)
Designating Additional Dfs Link Targets procedure (16.8)
designing
Active Directory
OUs (Organizational Unit) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
CA trust hierarchies 2nd 3rd 4th 5th
DNS domains 2nd 3rd 4th 5th 6th 7th
domains
Active Directory 2nd 3rd 4th 5th 6th 7th 8th
sites
srachitectures 2nd 3rd 4th 5th 6th 7th
Developing Windows NT Device Drivers (i)
Developing Windows NT Device Drivers\
Device Driver Rollback procedure (3.4)
Device Driver Update procedure (3.3)
Device Manager
plug-and-play 2nd 3rd 4th 5th 6th
devices
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
EFI disk utilities 2nd 3rd 4th 5th 6th
installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
EFI disk utililities 2nd 3rd 4th 5th 6th
removable media drives 2nd 3rd 4th
troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
Dfs
(Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th
managing
namespaces
PKT (Partition Knowledge Table)
replication topologies
root directories
links 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
PKT (Partition Knowledge Table) 2nd 3rd 4th
targets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
FRS (File Replication Service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
DHCP
configuring
DNS support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
RIS
(Remote Installation Services) 2nd
scope options
servers
diagnostic logging
FRS (File Replication Service)
checking
dial-in IP settings
NT4 RRAS servers
dial-in verifications
dial-up authentication 2nd 3rd 4th
PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th
dial-up connections
dial-up sessions
modems
DIB (Directory Information Base)
differential backups (Ntbackup) 2nd
digest authentication
Digital Signature Algorithm (DSA). [See DSA (Digital Signature Algorithm)]
Digital Signature Security Standard (DSS). [See DSS (Digital Signature Standard)]
Digital Signature Trust Web site
DSA (Digital Signature Algorithm)
DSS (Digital Signature Security Standard)
Direct Mmeory Access (DMA). [See backing up 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
maintenance 2nd 3rd 4th 5th 6th 7th 8th
home directories
creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Directory Information Base (DIB). [See LDAP 2nd 3rd 4th
directory records
NTFS 2nd 3rd 4th 5th 6th 7th 8th
Directory Replication Agent (DRA). [See Directory Replication Agents (DRAs)
Directory Service Agents (DSAs). [See Directory Service Restore Mode
Directory Service Restore Mode (Windows)
Active Directory
namesapces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd
history of 2nd 3rd 4th 5th 6th 7th
IEC (International Electrotechnical Commission) 2nd
IETF (Internet Engineering Task Force)
ISO
(International Organization for Standardization) 2nd 3rd 4th
LDAP
namespaces 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
RFCs (Request for Comments) 2nd
LDAP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
dirty flags
disabling
file encryption 2nd 3rd 4th 5th 6th 7th
Disabling DNS on an Interface procedure (5.19)
Disabling EFS Using Windows .NET Group Policies procedure (17.2)
Disabling NetBIOS-over-TCP/IP Name Resolution procedure (4.7)
Disabling Remote Desktop on .NET Server procedure (19.7)
Disabling Remote Desktop procedure (19.4)
discretionary access control lists (DACLs). [See DACLs (discretionary access control lists)]
Discretionary Access Control Lists (DACLs). [See DACLs (Discretionary Access Control Lists)]
disk access
standard disk access
disk caching
disk cloning
deployment 2nd 3rd 4th 5th 6th 7th 8th 9th
Sysprep 2nd 3rd 4th 5th 6th 7th 8th
disk opeartions
IA32 systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
disk partitions
disk() entry
disks
extended partitions
formats
GPTs
managing
paging files
partitions
primary partitions
display specifiers
Configuration naming context
displays
devices
distinguished names
namespaces
Distributed File System (Dfs). [See Dfs (Distributes File System)]
DLC
DLLs
multiple-version DLL workaround
Side-by-Side aseemblies 2nd 3rd 4th
DNS
Active Directory
forwarders 2nd 3rd 4th 5th 6th 7th 8th
integration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
zone integration 2nd 3rd 4th 5th
administrative access
BIND boot files
caching-only servers
clients
delegation
delegations
deploying
non-Windows infrastructure 2nd 3rd
DHCP
configuring support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
designing 2nd 3rd 4th 5th 6th 7th
drivers
Dynamic DNS
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
scavenging configuration 2nd 3rd 4th 5th
hierarchical zones
configuring 2nd 3rd 4th 5th 6th 7th 8th
incremental zone transfers 2nd 3rd
integrated DNS zones
managing
multiple servers
secondary name servers 2nd 3rd
notification-driven zone transfers
queries
authoritative query responses 2nd
non-authoritative query responses 2nd 3rd
query handling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
authoritative servers 2nd 3rd 4th 5th
non-authoritative servers 2nd 3rd 4th
reverse lookup queries 2nd 3rd 4th 5th 6th 7th 8th
records
reverse lookup zones
secondary servers
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th
servers
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
secondary servers 2nd 3rd 4th 5th 6th
unauthorized zone transfers
update notifications 2nd 3rd 4th
updates
zone transfers
zones
examining 2nd 3rd 4th 5th 6th 7th
DNS resolver cache tool (Tcpip.sys)
DNS servers
loss of
documentation
PACs (Privilege Access Certificates)
Domain Controller
Domain Controllers
domain controllers
Active Directory
metadata cleanup 2nd 3rd 4th 5th 6th 7th
loss of
correcting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
promoting
promotion
roles
upgrades
requirements 2nd 3rd 4th 5th 6th 7th
Domain Local groups (Active Directory) 2nd 3rd 4th
Domain Migration Administrator
domain name master
Domain Name System (DNS). [See DNS (Domain Name System)]
domain naming contexts
DomainPassword permission (Active Directory)
designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
domain controller placement 2nd 3rd 4th
FSMOs (Flexible Single Master Operations)
multiple domain forest trusts 2nd
multiple domains 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
multiple groups 2nd 3rd 4th 5th
PDC Emulators 2nd 3rd 4th 5th 6th 7th
root domain names 2nd 3rd 4th 5th 6th
split public/private zones 2nd 3rd
child domains
computers
configuring
cross-domain authentication 2nd 3rd 4th
deploying 2nd 3rd 4th 5th 6th 7th
designing
Active Directory 2nd 3rd 4th 5th 6th 7th 8th
designing 2nd 3rd 4th 5th 6th 7th
functional levels
shift root domain to Windows .NEt functional level
shift root domain to Windows .NET functional level
master account domains
migrating
computer account migrations 2nd 3rd
group accounts 2nd 3rd 4th 5th
password migrations 2nd 3rd 4th 5th 6th
migrating from 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
multidomain authentication 2nd 3rd
multiple domains
objects
operations
PDCs
placeholder domains
installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
promoting
resource domains
root domains
upgrading
Classic NT4 RAS access 2nd 3rd
domain controller requirements 2nd 3rd 4th 5th 6th 7th
FSMO (Flexible Single Master Operations) servers
functional levels 2nd 3rd 4th 5th 6th
in-place upgrades 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th
master account domains 2nd 3rd 4th 5th
post-upgrade verifications 2nd 3rd
preparations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th
DOS
DOS-derived Windows hashing
DOS-derived Windows storage
downlevel clients
home directories
files
DRA (Directory Replication Agent)
DRAs
EFS group policies
DRAs (Directory Replication Agents)
DRF
drive letters
assigning
drivers
device drivers
DNS
file system drivers 2nd 3rd 4th 5th
large
printer drivers
printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th
SCSI drivers
. [See also hard drives]
drive letters
types 2nd 3rd 4th 5th 6th 7th 8th 9th
DSA
DSACLS
access lists
DSAs (Directory Service Agents)
DSS
(Digital Signature Security Standard)
(Digital Signature Standard) 2nd
dual monitors
preparing
dual-boots
installation
dumps
conversions 2nd 3rd 4th 5th 6th 7th 8th 9th
volume extensions (spanning) 2nd
volumes
Dynamic DNS
advanced DNS servers
interfaces
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
scavenging
security
zones
Dynamic Link Libraries (DLLs). [See DLLs (Dynamic Link Libraries)]2nd [See DLLs (Dynamic Link Libraries)]
dynamic updates
dynamic volumes
creating