Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 225
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

EAP

(Extensible Authentication Protocol)

EAP (Extensible Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th

EAP Smart Card Authentication Transaction procedure (20.2)

Edb.chk file (Active Directory)

Edb.log file (Active Directory)

Edbxxxxx.log file (Active Directory)

editors

NAT (Network Address Translation) 2nd

Edlin

efficiency

domains

EFI

(Extensible Firmware Interface) 2nd

EFI Boot Maintenance Manager

EFI Shell 2nd

Setup

booting

EFI System Partition (ESP). [See 2nd [See EFS 2nd 3rd 4th 5th 6th 7th 8th

(Encrypting File System) 2nd 3rd

group policies

loading DRAs into 2nd

group policy settings

disabling 2nd 3rd

procedures 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th

WebDAV

advantages 2nd

EFS file transactions

file encryption 2nd 3rd 4th 5th 6th 7th 8th

EFS temp files

wiping

EFSINFO command-line tool (encryption)

Emergency Management Services (EMS). [See 2nd [See Emergency Repair Disk (ERD). [See empty roots

EMS 2nd 3rd 4th 5th 6th 7th 8th

(Emergency Management Services) 2nd

bugchecks 2nd 3rd

SAC (Special Administarion Console)

SAC (Special Administration Console) 2nd

EMS (Emergency Management Services)

Enable VGA Mode

enabling

auditing 2nd 3rd

Enabling Compression procedure (15.4)

Enabling Internet Connection Sharing and Internet Connection Firewall procedure (20.15)

Enabling the Smart Card User Template procedure (20.4)

Enabling Zone Transfers and Notifications procedure (5.12)

encrypted file recovery group policies 2nd 3rd

encrypted file transfers

encrypted files

. [See also file encryption]

transporting 2nd

Encrypting File System (EFS). [See EFS (Encrypting File System)]2nd [See EFS (Encrypting File System)]

encryption

3DES

command-line administration

improvements to

copy warnings

DES (Data Encryption Standard)

DESX

exporting

high encryption

file encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

certificate management 2nd 3rd 4th 5th 6th 7th

data encryption 2nd 3rd 4th

data encryption;algorithms 2nd 3rd 4th

DRA configuration 2nd 3rd 4th

EFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

EFS file transactions 2nd 3rd 4th 5th 6th 7th 8th

file decryption process 2nd 3rd

file recovery 2nd 3rd 4th 5th 6th 7th 8th 9th

individual files

process description 2nd 3rd

recovery 2nd 3rd 4th 5th 6th

server-based files 2nd 3rd 4th 5th 6th

transporting 2nd

WebDAV 2nd 3rd 4th 5th 6th 7th 8th

file enryption

disabling 2nd 3rd 4th 5th 6th 7th

file sharing

folder encryption

laptops 2nd 3rd

group policies

managing 2nd 3rd

Microsoft Crypto Provider

offline file encryption

PGP (Pretty Good Privacy)

PKI (Public Key Infrastructure) 2nd 3rd

shared encryption files

visual cues

WebDAV

encrytpion

AES (Advanced Encryption Standard)

end times (Kerberos reply messages)

enhanced metafiles

printer sharing 2nd

enrolling

smart card users

remote access 2nd 3rd 4th 5th 6th 7th 8th 9th

Enrolling a Smart Card User procedure (20.6)

Enrolling for a Certificate Using the Web procedure (18.2)

enrollment

certificates 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

auto-enrollment 2nd 3rd

Certificates snap-in 2nd 3rd

CMC (Certificate Management Messages over CMS) 2nd

Web enrollment 2nd 3rd 4th

enrollment services container (Enterprise CAs)

Enterprise CAs 2nd

certificate templates 2nd 3rd 4th 5th

subordinate CAs

installing

Enterprise Server

clusters

support

hot add memory

support

IA64 support

metadirectories

support

processors

support

support

entries

Boot.ini

Entrust Web site

enumeration

plug-and-play

environments

DLLs

Side-by-Side assemblies 2nd 3rd 4th

folder redirection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

placement 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

policies 2nd

home directories 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

assigning 2nd 3rd

mapping downlevel clients 2nd

home directoriesterminal services 2nd

offline files

checklist 2nd

configuring at server 2nd 3rd 4th 5th 6th 7th 8th

inappropriate uses 2nd 3rd

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

remote desktops 2nd

Synchronization Manager 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

servers

managing via remote desktops 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

user state migration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

FSTW (Files and Settings Transfer Wizard) 2nd 3rd 4th

INF files 2nd 3rd 4th 5th 6th 7th 8th

tools

USMT (User State Migration Toolkit) 2nd 3rd 4th

Erase option (Nvrboot.efi)

ERD (Emergency Repair Disk)

discontinuation of

error reporting tools

errors

stop errors 2nd

ESE (Extensible Storage Engine)

Active Directory

ESE (Extensible Storage Engine)

LDAP

ESP

files

managing 2nd 3rd

viewing

ESP (EFI System Partition) 2nd

Event logs

checking 2nd 3rd 4th

event logs

managing

AUDITPOL utility 2nd 3rd 4th 5th

event notification

Active Directory 2nd 3rd

events

online events

tracking

exceptions

canonical sorting

ACEs

executable loads

Setup 2nd

initial hardware recognition 2nd 3rd

Executive services 2nd 3rd

Expanding a Basic Disk Partition Using Diskpart procedure (14.3)

Explorer

shares

creating 2nd 3rd 4th 5th 6th

Export option (Nvrboot.efi)

Export option (Secedit utility)

exporting

encryption

high encryption

FR private keys 2nd 3rd 4th

Exporting and Deleting an FR Private Key procedure (17.6)

Exporting and Deleting the FR Public Key Certificate procedure (17.3)

extended partitions

creating 2nd 3rd

extended rights

Configuration naming context

Active Directory 2nd

extendible disk partitions

extending

disks

partitions 2nd 3rd

partitions 2nd

Extensible Authentication Protocol (EAP). [See Extensible Firmware Interface (EFI). [See EFI (Extensible Firmware Interface)]2nd [See EFI (Extensible Firmware Interface)]

extensions

DNS

partitions 2nd 3rd

volumes 2nd 3rd

external trusts

Active Directory

extinction intervals

WINS database

setting 2nd 3rd 4th 5th 6th