Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 236
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

packet-switched networks

packets

DNS

PACs

(Privilege Access Certificates) 2nd

documentation

Kerberos 2nd 3rd 4th 5th 6th

PAEs (Physical Address Extensions)

paging files

configuring

fragmentation

moving

to another disk 2nd

PAP

(Password Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th

parameters

replication

controlling 2nd 3rd 4th 5th 6th 7th 8th

parent trusts

Active Directory

partition boot systems

file systems

partition extensions 2nd 3rd

partition() entry

Boot.ini

partitioning

GPT disks

partitions

boot partitions 2nd

Configuration naming context

Active Directory

creating

command-line 2nd

data partitions

ESP (EFI System Partition)

expanding

extended partitions

extending 2nd 3rd 4th 5th

FAT 2nd

file systems

MSR (Microsoft Reserved Partition)

NTFS

conversions

OEM partitions

primary partitions

soft-linked partitions

system partitions 2nd

Partmgr.sys drivers

pass-through authentications

Password Authentication Protocol (PAP). [See PAP (Password Authentication Protocol)]

password policy restictions

multiple domains 2nd

Password Reset Disk

password reset disks

Password Reset Disks (PRDs). [See PRDs (Password Reset Disks)]

Password variable (OSCML)

passwords

administrator passwords

managing 2nd

anonymous logons 2nd 3rd 4th

computer passwords 2nd

troubleshooting 2nd

crackers

credentials caches 2nd 3rd 4th

formats 2nd 3rd 4th 5th

hashing algorithm

LanMan password

LanMan passwords

eliminating

migrations

domains 2nd 3rd 4th 5th 6th

NTLMv2 passwords

samba clients

password reset disks

resets

handling for local accounts 2nd

reset disks 2nd 3rd 4th 5th 6th

reversible passwords 2nd

enabling 2nd 3rd 4th 5th

security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th

storage 2nd 3rd 4th 5th 6th 7th 8th 9th

Active Directory

vunerabilities 2nd

vunerabilities 2nd 3rd 4th

storage 2nd

passwrods

policies 2nd 3rd 4th 5th 6th

PAT

(Port Address Translation)

Pathping utility

paths

upgrade paths

Windows NT4 2nd

PCL

(Printer Control Language)

PDC (primary domain controller)

PDC Emulator

FSMOs

PDC Emulators

Active Directory 2nd 3rd 4th 5th 6th 7th

recovering

PDCs

domains

upgrading 2nd 3rd 4th 5th

PDOs (Physical Device Objects)

Per Seat client access licensing

per seat licensing

tracking 2nd

Per Server access licensing

per server licensing

graphical phase

Setup 2nd

performance enhancements

NTFS 2nd 3rd

performance restictions

multiple domains 2nd

Performing a Defragmentation Analysis procedure (15.7)

Performing a Hard Repair of Active Directory procedure (10.12)

Performing a Soft Recovery of Active Directory procedure (10.11)

Performing a System State Backup procedure (10.6)

Performing a System State Restore procedure (10.8)

Performing a User and Group Migration Using ADMT procedure (9.5)

Performing an Authoritative Restore of Sysvol procedure (10.7)

Performing an Authoritative Restore procedure (10.9)

Performing an Interactive Backup procedure (21.3)

Performing an Offline Defragmentation of Active Directory procedure (10.10)

Performing Initial Setup Assessment for NT4 Upgrade procedure (2.1)

permissions 2nd

accesss permissions

domains

Active Directory

restores 2nd

Allow

Allow permissions

assigning

cumulative Allow permission

consolidated permissions

viewing 2nd

Deny

Deny permissions

assigning

evaluation

Enterprise CAs

required

evaluation 2nd 3rd 4th 5th 6th 7th

inheritance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

blocking

settings 2nd

remote access permissions

controlling 2nd 3rd

RIS images

setting

share permissions 2nd 3rd

system privileges 2nd 3rd

Personal certificate stores

PGP (Pretty Good Privacy)

encryption

Physical Address Extensions (PAEs). [See Physical Device Objects (PDOs)

physical locations

Configuration naming context

Active Directory

pinouts

null-modem serial cables

pipes

named pipes

PKCS

(Public Key Cryptography Services)

PKI

(Public Key Infrastructure)

3DES support

CAs

installing 2nd 3rd 4th

root certificate updates

certificates 2nd 3rd 4th 5th 6th 7th 8th

archiving 2nd 3rd 4th 5th 6th 7th

CA hierarchies 2nd 3rd 4th

CA trust hierarchies 2nd 3rd 4th 5th

CA trusts 2nd 3rd 4th 5th

Delta CRLs (Certificate Revocation Lists)

documentation 2nd

elements

enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

local certificate stores 2nd 3rd

OCSP (Online Certificate Status Protocol) 2nd

recovering 2nd 3rd

templates

validity checks 2nd 3rd 4th 5th 6th 7th

cipher keys 2nd

command-line tools 2nd 3rd 4th 5th

cryptographic elements 2nd 3rd 4th 5th 6th 7th

cryptographic services 2nd 3rd 4th 5th 6th

digital signatures

elements

CA (Certification Authority)

cryptographic elements

public key elements

encryption methods 2nd 3rd

FIPS 180-2 support

goals 2nd 3rd

hashes 2nd 3rd 4th 5th

keys

archiving 2nd

recovery 2nd 3rd 4th 5th 6th

storage 2nd 3rd

new features 2nd 3rd 4th

private key services 2nd

public key services 2nd 3rd 4th 5th 6th

D-H (Diffie-Hellman) 2nd

DSS (Digital Signature Standard) 2nd

RSA

qualified subordination

resources

smart cards

improvements to

preparing for 2nd 3rd

user auto-enrollment

vendors

PKI related RFCs Web site

PKIX Working Group

PKT (Partition Knowledge Table)

Dfs (Distributed File Sharing) 2nd 3rd 4th

Dfs (Distributed File System)

placeholder domains

installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

placement

redirected folders 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

Plug and Play (PnP). [See PnP (Plug and Play)]

Plug and Play Manager

plug-and-play

ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th

compatibility

power management 2nd 3rd

Device Manager 2nd 3rd 4th 5th 6th

enumeration

Plug and Play Manager

Power Manager

support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

WDM (Windows Driver Model) 2nd 3rd 4th 5th 6th 7th 8th 9th

bus drivers 2nd

busses

FDOs (Functional Device Objects)

function drivers 2nd

PnP

(Plug and Play)

(plug-and-play)

ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th

compatibility

power management 2nd 3rd

Device Manager 2nd 3rd 4th 5th 6th

disabling

Plug and Play Manager

Power Manager

support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

WDM (Windows Driver Model) 2nd 3rd 4th 5th 6th 7th 8th 9th

bus drivers 2nd

busses

FDOs (Functional Device Objects)

function drivers 2nd

PocketPCs

Remote Desktop

Point-to-Point Protocol (PPP). [See PPP (Point-to-Point Protocol)]

points of failure

Windows NT

Poledit

(Policy Editor)

administrative shares

re-creating

recreating

policies

account lockout policies 2nd

administrative template policies 2nd

blocks

overriding 2nd 3rd

computer policies

domains

upgrading 2nd

folder redirection 2nd

group policies 2nd 3rd 4th 5th

administrative template policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

components 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd

CSEs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

CSEs (client-side extensions)

delegating 2nd

domains

folder redirection policies 2nd

GPCs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

GPCs (Group Policy Containers) 2nd

GPE (Group Policy Editor)

GPOs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

GPOs (Group Policy Objects)

GPTs 2nd 3rd 4th 5th

GPTs (Group Policy Templates)

individual group policy types 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd

network initialization

policy hierarchy 2nd 3rd 4th

processing

purpose of 2nd

script policies 2nd 3rd 4th 5th 6th 7th

security policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

slow link processing 2nd 3rd 4th 5th

software deployment policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

special Registry keys 2nd 3rd

targeting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

troubleshooting 2nd 3rd

groups

components 2nd 3rd

links 2nd 3rd

tools 2nd

inheritance

overriding 2nd 3rd

Kerberos 2nd 3rd

local policies

new features 2nd

passwords 2nd 3rd 4th 5th 6th

print policies 2nd 3rd

RSoP

(Resultant Set of Policies)

security 2nd 3rd 4th 5th 6th

standalone servers

system policies 2nd

tattooing

tracking

Registry

user policies

policy hierarchy

GPOs (Group Policy Objects) 2nd 3rd 4th

policy tracking

Registry

political restictions

multiple domains 2nd 3rd 4th

political restrictions

multiple domains

polling

replication 2nd

pools

memory 2nd 3rd 4th 5th

porocedures

10.13 (Changing Active Directory File Locations)

Port Address Translation (PAT). PAT (Port Address Translation)

port mapping

NAT (Network Address Translation) 2nd 3rd

port monitors

printer sharing 2nd 3rd 4th

ports

determining

Network layers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

Kerberos

Ports property (printers) 2nd

POST

(Power On Self Test)

post-Setup configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

post-upgrade verifications

domain upgrades 2nd 3rd

power management

ACPI (Advanced Configuration and Power) 2nd 3rd

Power Manager

Power On Self Test (POST). [See POST (Power On Self Test)]

PPP

(Point-to-Point Protocol) 2nd 3rd

authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th

CHAP (Challenge Handshake Authentication Protocol) 2nd 3rd 4th

dial-up authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

domain authentication 2nd 3rd 4th

EAP (Extensible Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th

Mixed domains 2nd 3rd 4th

MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 2nd 3rd 4th

multidomain authentication 2nd 3rd

NT4 limitations 2nd 3rd 4th

PAP (Password Authentication Protocol) 2nd 3rd 4th 5th 6th 7th

RADIUS (Remote Authentication Dial-In User Services) 2nd 3rd 4th 5th 6th 7th 8th

SPAP (Shiva Password Authentication Protocol) 2nd

standard transactions 2nd 3rd 4th 5th

PPPoE

(PPP over Ethernet) 2nd 3rd

PRDs

(Password Reset Disks) 2nd 3rd 4th 5th 6th

Pre-boot Execution Environment (PXE). [See PXE (Pre-boot Execution Environment)]

Pre-Windows 2000 Compatible Access (PW2CA). [See PW2CA (Pre-Windows 2000 Comptiable Access)]

preauthenticator

Kerberos 2nd

preference

administrative template policies 2nd

preferences

administrative template files 2nd

administrative template policies 2nd

preferential logons

domains 2nd

preliminaries

NT4 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

Preparing a Remote Access Server for Smart Card Logons procedure (20.7)

Presentation layer (OSI)

primaries

Active Directory

primary domain controller (PDC). [See security descriptors

primary name servers

DNS 2nd 3rd

primary partitions

creating 2nd

print clients

troubleshooting 2nd

print devices

print jobs

delivery 2nd

print providers 2nd

print queues

managing 2nd 3rd 4th

print servers

properties

managing 2nd

print services

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

Print$ shares

Printer Control Language (PCL). [See PCL (Printer Control Language)]

printer drivers

printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th

printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

enhanced metafiles 2nd

initial job rendering 2nd 3rd

network printing 2nd 3rd 4th

port monitors 2nd 3rd 4th

print job delivery 2nd

printer drivers 2nd 3rd 4th 5th 6th 7th 8th 9th

spoolers

file location changes 2nd 3rd 4th 5th 6th 7th 8th

printers

client printer connections

automating 2nd 3rd

location tracking 2nd

monitoring

non-PnP-compatibale printers

installing

print devices

properties

managing 2nd 3rd 4th 5th 6th 7th 8th 9th

redirecting 2nd 3rd 4th 5th

security 2nd 3rd

printing

clients

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th

command-line print administration 2nd 3rd 4th 5th

DOS 2nd 3rd

Internet

printing over 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

local print devices 2nd 3rd 4th 5th

mainframe hosts

network print devices 2nd 3rd 4th

policies 2nd 3rd

print clients

troubleshooting 2nd

print queues

managing 2nd 3rd 4th

third-party servers

printing to 2nd 3rd

troubleshooting 2nd 3rd

UNIX hosts 2nd

UNIX servers

Windows servers 2nd 3rd 4th

private headers

LDM volumes

private key protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

private key services

PKI 2nd

private namespaces

DNS

priveleges

domains

upgrading

Privilege Access Certificates (PACs). [See PACs (Privilege Access Certificates)]2nd [See PACs (Privilege Access Certificates)]

procedure

16.10 (Viewing Printer Driver Details)

Verifying Transitive Trust Accessibility (9.3)

procedures

(6.2) Using the ADSI Editor to View AD Objects

1.1 (Installing Windows .NET on a New Machine)

1.2 (Continuing with the Graphic Mode Portion of Setup)

1.3 (Configuring the System to Dump Only the Contents of the Kernel Memory)

1.4 (Correcting Lost Drive Signatures)

10.10 (Performing an Offline Defragmentation of Active Directory)

10.11 (Performing a Soft Recovery of Active Directory)

10.12 (Performing a Hard Repair of Active Directory)

10.3 (Changing a Role Master Using an MMC Console)

10.4 (Transferring a Role Master Using Ntdsutil)

10.5 (Seizing a FSMO Role)

10.6 (Performing a System State Backup)

10.7 (Performing an Authoritative Restore of Sysvol)

10.8 (Performing a System State Restore)

10.9 (Performing an Authoritative Restore)

11.1 (Viewing a Resultant Set of Permissions)

11.10 (Changing Log File Settings)

11.11 (Monitoring for Unauthorized Folder Access)

11.12 (Monitoring Access to Directory Service Objects)

11.13 (Audit Monitor for Logon/Logoff)

11.14 (Audit Monitoring for Printers)

11.2 (Storing User Names and Passwords)

11.3 (Creating a Password Reset Disk)

11.4 (Using a PRD to Change a Password)

11.5 (High-Level Kerberos Example)

11.6 (User Logon Transaction Using Kerberos)

11.7 (Server Access Transaction Using Kerberos)

11.8 (Configuring a Cross-Realm Trust)

11.9 (Testing Cross-Realm Kerberos Ticket Generation)

12.1 (Overriding a Policy Block)

12.2 (Running the RSoP Wizard in Planning Mode)

12.3 (Running the RSoP Wizard in Logging Mode)

12.4 (Configuring a GPO Security Descriptor to Filter Policy Recipients)

12.5 (Accessing the WMI Filter Interface)

12.6 (Using the Security Configuration and Analysis Snap-In)

12.7 (Loading ADM Templates into the Group Policy Editor

13.1 (Applying Inheritable Rights to an Active Directory Container)

13.2 (Delegating Access Rights)

13.3 (Functional Description of User and Group Validation Within a Single Domain)

13.4 (Functional Description of User and Group Validation Across Domains Using Domain Local Groups)

13.5 (Functional Description of User and Group Validation Across Domains Using Universal Group)

13.6 (Starting Explorer Shell Using RunAs)

14.1 (Creating Primary Partitions on Basic Disks)

14.10 (Creating RAID 5 Volumes)

14.11 (Deleting a Volume)

14.12 (Changing Drive Letters)

14.13 (Replacing a Failed Disk in a RAID 5 Volume)

14.14 (Building a Fault Tolerant Boot Floppy)

14.15 (Replacing a Failed Disk in a Mirrored Volume)

14.16 (Moving a Fault Tolerant Volume to Another Computer)

14.2 (Creating Extended Partitions and Logical Drives)

14.3 (Expanding a Basic Disk Partition Using Diskpart)

14.4 (Converting a Basic Disk to a Dynamic Disk)

14.5 (Creating Simple Volumes)

14.6 (Configuring a Spanned Volume)

14.7 (Creating Striped Volumes)

14.8 (Creating Mirrored Volumes)

14.9 (Breaking a Mirrored Volume)

15.1 (Classic NT Link Search Pattern)

15.2 (Verifying Link Tracking Operation)

15.3 (Verifying WFP Operation)

15.4 (Enabling Compression)

15.5 (Creating a Mount Point Using the Disk Management Console)

15.6 (Using Disk Cleanup)

15.7 (Performing a Defragmentation Analysis)

16.1 (Installing Additional Network Clients)

16.11 (Relocating the Default Spool Directory)

16.12 (Installing a Non-PnP-Compatible Printer)

16.2 (Changing the Network Provider Order)

16.3 (Creating and Sharing a Folder)

16.4 (Creating Remote Shares Using the Computer Management Console)

16.5 (Restoring Deleted Administrative Shares with Poledit)

16.6 (Creating a Dfs Root)

16.7 (Creating Dfs Links)

16.8 (Designating Additional Dfs Link Targets)

16.9 (Removing a Dfs Root)

17.1 (Viewing Personal Certificates via the Certificates Snap-In)

17.2 (Disabling EFS Using Windows .NET Group Policies)

17.3 (Exporting and Deleting the FR Public Key Certificate)

17.4 (Obtaining FR Certificates for Additional DRAs)

17.5 (Loading an FR Public Key into the EFS Group Policy)

17.6 (Exporting and Deleting an FR Private Key)

17.7 (Setting Folder Encryption)

17.8 (Importing an FR Private Key from a PFX Certificate)

18.1 (Installing a Standalone Root CA)

18.2 (Enrolling for a Certificate Using the Web)

18.3 (Creating a Key Recovery Agent)

18.4 (Configuring a CA to Archive Certificates)

18.5 (Creating an Archive Template)

18.6 (Recovering a Lost Key)

19.2 (Assigning a User Home Directory with AD Users and Computers)

19.3 (Assigning a Home Directory Using the Command Line)

19.4 (Disabling Remote Desktop)

19.5 (Changing Default RDP Port in the TSWeb Interface)

19.7 (Disabling Remote Desktop on .NET Server)

2.1 (Performing Initial Setup Assessment for NT4 Upgrade)

2.10 (Accessing the Remote Installation Group Policy)

2.11 (Using RIS to Run Setup on a Headless Server)

2.2 (Task List for Setting Up Scripted Installations)

2.3 (Using Setup Manager to Create an Unattended Installation Script)

2.4 (Slipstreaming Service Pack Files)

2.5 (Using Riprep to Image a Windows .NET Server)

2.6 (Installing Remote Installation Services)

2.7 (Configuring a Remote Installation Services Image)

2.8 (Configuring a Remote Installation Services Server)

2.9 (Setting Permissions on RIS Images)

20.1 (CHAP Authentication Transaction)

20.10 (Initial Configuration of Routing Services)

20.11 (Installing a Demand-Dial Interface)

20.12 (Configuring a Demand-Dial Router)

20.13 (Configuring Automatic Connection Pickup)

20.14 (Configuring NAT and ICF)

20.15 (Enabling Internet Connection Sharing and Internet Connection Firewall)

20.16 (Manually Obtaining a Computer Certificate)

20.17 (Registering an IAS Server with Active Directory)

20.18 (Configuring an RRAS Server as an IAS Client)

20.19 (Configuring RRAS to Use RADIUS Authentication)

20.2 (EAP Smart Card Authentication Transaction)

20.4 (Enabling the Smart Card User Template)

20.5 (Issuing Enrollment Agent Certificates to Operations Administrators)

20.6 (Enrolling a Smart Card User)

20.7 (Preparing a Remote Access Server for Smart Card Logons)

20.8 (Installing a Direct Serial Line Connection)

20.9 (Initializing the RRAS Service to Support Remote Access)

21.1 (Adding File Types to the File Exclusion List)

21.2 (Registering File Types for Backup Exclusions)

21.3 (Performing an Interactive Backup)

21.4 (Configuring and Scheduling a Backup Job)

21.5 (Restoring a File Manually Using Ntbackup)

21.6 (Cataloging a Tape)

21.7 (Booting with the Last Known Good Configuration)

21.8 (Installing the Recovery Console)

3.1 (Using Windows Update to Obtain Drivers for Another System)

3.2 (Using EFI DISKPART to Create a New Data Partition)

3.3 (Device Driver Update)

3.4 (Device Driver Rollback)

3.5 (Creating a Fault Tolerant Boot Floppy Disk)

3.6 (Using Ntdetect.chk)

3.7 (Configuring Performance Monitor to Collect kernel Memory Statistics)

3.8 (Charting Performance Monitor Logs)

4.1 (Functional Sequence for NetBIOS Name Resolution Using Broadcasts)

4.2 (Recovering from Failed Jet Database Conversion)

4.3 (Installing WINS on a Windows .NET Server)

4.4 (Configuring a WINS Client)

4.5 (Adding a Static WINS Mapping)

4.6 (Configuring WINS Replication)

4.7 (Disabling NetBIOS-over-TCP/IP Name Resolution)

5.1 (Functional Description of Query Handling by an Authoritative Name Server)

5.10 (Configuring Root Hints)

5.11 (Configuring Delegations)

5.12 (Enabling Zone Transfers and Notifications)

5.13 (Configuring a Secondary Server)

5.14 (Integrating a Primary Zone into Active Directory)

5.15 (Verifying Resource Record Integration)

5.16 (Configuring a Caching-Only Server)

5.17 (Configuring a DNS Server to Use a Forwarder)

5.18 (Configuring a Dynamic Zone)

5.19 (Disabling DNS on an Interface)

5.2 (Functional Description of Query Handling by Non-Authoritative Name Server)

5.20 (Configuring Scavenging)

5.21 (Setting Periodic Scavenging)

5.22 (Accessing Advanced Server Parameters)

5.23 (Starting DNS from a BIND File)

5.24 (Setting the Fail on Load if Bad Zone option)

5.25 (Installing DHCP Service Drivers)

5.26 (Configuring Scope Options)

5.3 (Functional Description of Reverse Lookup Query)

5.4 (Functional Description of Standard Polled Zone Transfer)

5.5 (Configuring DNS Information for TCP/IP Interface Properties)

5.6 (Configuring DNS Information in the System Properties Window)

5.7 (Installing DNS Drivers)

5.8 (Creating a Forward Lookup Zone)

5.9 (Creating a Reverse Lookup Zone)

6.1 (Creating a Custom Schema Management Console)

6.3 (Binding with LDP)

6.4 (Searching with LDP)

7. 10 (Forcing Replication with the AD Sites and Services Console)

7.11 (Selecting a New Replication Partner)

7.12 (Building a New Connection Object)

7.13 (Configuring Replmon)

7.2 (Replication Trace Showing USN Operation)

7.3 (Replication Trace Showing UTD Vector Operation)

7.4 (Renaming the Default-First-Site-Name Object)

7.5 (Creating a New Site Object)

7.6 (Creating a Subnet Object)

7.7 (Creating and Configuring Site Link Objects)

7.8 (Designating a Bridgehead Server)

7.9 (Building a Site Link Bridge Object)

8.1 (Assigning Custom UPN Suffixes)

9.1 (Promoting the First Windows .NET Domain Controller)

9.2 (Upgrading an Account Domain PDC)

9.3 (Verifying Transitive Trust Accessibility)

9.4 (Configuring the Password Migration Agent)

9.5 (Performing a User and Group Migration Using ADMT)

9.6 (Renaming a Domain Controller Using NETDOM COMPUTERNAME)

Accessing Advanced Server Parameters (5.22)

Accessing the Remote Installation Group Policy (2.10)

Accessing the WMI Filter Interface (12.5)

Adding a Static WINS Mapping (4.5)

Adding File Types to the File Exclusion List (21.1)

Applying Inheritable Rights to an Active Directory Container (13.1)

Assigning a Home Directory Using the Command Line (19.3)

Assigning a User Home Directory with AD Users and Computers (19.2)

Assigning Custom UPN Suffixes (8.1)

Audit Monitor for Logon/Logoff (11.13)

Audit Monitoring for Printers (11.14)

Binding with LDP (6.3)

Booting with the Last Known Good Configuration (21.7)

Breaking a Mirrored Volume (14.9)

Building a Fault Tolerant Boot Floppy (14.14)

Building a New Connection Object (7.12)

Building a Site Link Bridge Object (7.9)

Cataloging a Tape (21.6)

Changing a Role Master Using an MMC Console (10.3)

Changing Active Directory File Locations (10.13)

Changing Default RDP Port in the TSWeb Interface (19.5)

Changing Drive Letters (14.12)

Changing Log File Settings (11.10)

Changing the Network Provider Order (16.2)

CHAP Authentication Transaction (20.1)

Charting Performance Monitor Logs (3.8)

Classic NT Link Search Pattern (15.1)

Configuring a CA to Archive Certificates (18.4)

Configuring a Caching-Only Server (5.16)

Configuring a Cross-Realm Trust (11.8)

Configuring a Demand-Dial Router (20.12)

Configuring a DNS Server to Use a Forwarder (5.17)

Configuring a Dynamic Zone (5.18)

Configuring a GPO Security Descriptor to Filter Policy Recipients (12.4)

Configuring a Remote Installation Services Image (2.7)

Configuring a Remote Installation Services Server (2.8)

Configuring a Secondary Server (5.13)

Configuring a Spanned Volume (14.6)

Configuring a WINS Client (4.4)

Configuring an RRAS Server as an IAS Client (20.18)

Configuring and Scheduling a Backup Job (21.4)

Configuring Automatic Connection Pickup (20.13)

Configuring Delegations (5.11)

Configuring DNS Information for TCP/IP Interface Properties (5.5)

Configuring DNS Information in the System Properties Window (5.6)

Configuring NAT and ICF (20.14)

Configuring Performance Monitor to Collect kernel Memory Statistics (3.7)

Configuring Replmon (7.13)

Configuring Root Hints (5.10)

Configuring RRAS to Use RADIUS Authentication (20.19)

Configuring Scavenging (5.20)

Configuring Scope Options (5.26)

Configuring the Password Migration Agent (9.4)

Configuring the System to Dump Only the Contents of the Kernel Memory (1.3)

Configuring WINS Replication (4.6)

Continuing with the Graphic Mode Portion of Setup (1.2)

Converting a Basic Disk to a Dynamic Disk (14.4)

Correcting Lost Drive Signatures (1.4)

Creating a Custom Schema Management Console (6.1)

Creating a Dfs Root (16.6)

Creating a Fault Tolerant Boot Floppy Disk (3.5)

Creating a Forward Lookup Zone (5.8)

Creating a Key Recovery Agent (18.3)

Creating a Mount Point Using the Disk Management Console (15.5)

Creating a New Site Object (7.5)

Creating a Password Reset Disk (11.3)

Creating a Reverse Lookup Zone (5.9)

Creating a Subnet Object (7.6)

Creating an Archive Template (18.5)

Creating and Configuring Site Link Objects (7.7)

Creating and Sharing a Folder (16.3)

Creating Dfs Links (16.7)

Creating Extended Partitions and Logical Drives (14.2)

Creating Mirrored Volumes (14.8)

Creating Primary Partitions on Basic Disks (14.1)

Creating RAID 5 Volumes (14.10)

Creating Remote Shares Using the Computer Management Console (16.4)

Creating Simple Volumes (14.5)

Creating Striped Volumes (14.7)

Delegating Access Rights (13.2)

Deleting a Volume (14.11)

Designating a Bridgehead Server (7.8)

Designating Additional Dfs Link Targets (16.8)

Device Driver Rollback (3.4)

Device Driver Update (3.3)

Disabling DNS on an Interface (5.19)

Disabling EFS Using Windows .NET Group Policies (17.2)

Disabling NetBIOS-over-TCP/IP Name Resolution (4.7)

Disabling Remote Desktop (19.4)

Disabling Remote Desktop on .NET Server (19.7)

EAP Smart Card Authentication Transaction (20.2)

Enabling Compression (15.4)

Enabling Internet Connection Sharing and Internet Connection Firewall (20.15)

Enabling the Smart Card User Template (20.4)

Enabling Zone Transfers and Notifications (5.12)

Enrolling a Smart Card User (20.6)

Enrolling for a Certificate Using the Web (18.2)

Expanding a Basic Disk Partition Using Diskpart (14.3)

Exporting and Deleting an FR Private Key (17.6)

Exporting and Deleting the FR Public Key Certificate (17.3)

Forcing Replication with the AD Sites and Services Console (7.10)

Functional Description of Query Handling by an Authoritative Name Server (5.1)

Functional Description of Query Handling by Non-Authoritative Name Server (5.2)

Functional Description of Reverse Lookup Query (5.3)

Functional Description of Standard Polled Zone Transfer (5.4)

Functional Description of User and Group Validation Across Domains Using Domain Local Groups (13.4)

Functional Description of User and Group Validation Across Domains Using Universal Group (13.5)

Functional Description of User and Group Validation Within a Single Domain (13.3)

Functional Sequence for NetBIOS Name Resolution Using Broadcasts (4.1)

High-Level Kerberos Example (11.5)

Importing an FR Private Key from a PFX Certificate (17.8)

Initial Configuration of Routing Services (20.10)

Initializing the RRAS Service to Support Remote Access (20.9)

Installing a Demand-Dial Interface (20.11)

Installing a Direct Serial Line Connection (20.8

Installing a Non-PnP-Compatible Printer (16.12)

Installing a Standalone Root CA (18.1)

Installing Additional Network Clients (16.1)

Installing DHCP Service Drivers (5.25)

Installing DNS Drivers (5.7)

Installing Remote Installation Services (2.6)

Installing the Recovery Console (21.8)

Installing Windows .NET on a New Machine (1.1)

Installing WINS on a Windows .NET Server (4.3)

Integrating a Primary Zone into Active Directory (5.14)

Issuing Enrollment Agent Certificates to Operations Administrators (20.5)

Loading ADM Templates into the Group Policy Editor (12.7)

Loading an FR Public Key into the EFS Group Policy (17.5)

Manually Obtaining a Computer Certificate (20.16)

Monitoring Access to Directory Service Objects (11.12)

Monitoring for Unauthorized Folder Access (11.11)

Moving a Fault Tolerant Volume to Another Computer (14.16)

Obtaining FR Certificates for Additional DRAs (17.4)

Overriding a Policy Block (12.1)

Performing a Defragmentation Analysis (15.7)

Performing a Hard Repair of Active Directory (10.12)

Performing a Soft Recovery of Active Directory (10.11)

Performing a System State Backup (10.6)

Performing a System State Restore (10.8)

Performing a User and Group Migration Using ADMT (9.5)

Performing an Authoritative Restore (10.9)

Performing an Authoritative Restore of Sysvol (10.7)

Performing an Interactive Backup (21.3)

Performing an Offline Defragmentation of Active Directory (10.10)

Performing Initial Setup Assessment for NT4 Upgrade (2.1)

Preparing a Remote Access Server for Smart Card Logons (20.7)

Promoting the First Windows .NET Domain Controller (9.1)

Recovering a Lost Key (18.6)

Recovering from Failed Jet Database Conversion (4.2)

Registering an IAS Server with Active Directory (20.17)

Registering File Types for Backup Exclusions (21.2)

Relocating the Default Spool Directory (16.11)

Removing a Dfs Root (16.9)

Renaming a Domain Controller Using NETDOM COMPUTERNAME (9.6)

Renaming the Default-First-Site-Name Object (7.4)

Replacing a Failed Disk in a Mirrored Volume (14.15)

Replacing a Failed Disk in a RAID 5 Volume (14.13)

Replication Trace Showing USN Operation (7.2)

Replication Trace Showing UTD Vector Operation (7.4)

Restoring a File Manually Using Ntbackup (21.5)

Restoring Deleted Administrative Shares with Poledit (16.5)

Running the RSoP Wizard in Logging Mode (12.3)

Running the RSoP Wizard in Planning Mode (12.2)

Searching with LDP (6.4)

Seizing a FSMO Role (10.5)

Selecting a New Replication Partner (7.11)

Server Access Transaction Using Kerberos (11.7)

Setting Folder Encryption (17.7)

Setting Periodic Scavenging (5.21)

Setting Permissions on RIS Images (2.9)

Setting the Fail on Load if Bad Zone option (5.24)

Slipstreaming Service Pack Files (2.4)

Starting DNS from a BIND File (5.23)

Starting Explorer Shell Using RunAs (13.6)

Storing User Names and Passwords (11.2)

Task List for Setting Up Scripted Installations (2.2)

Testing Cross-Realm Kerberos Ticket Generation (11.9)

Transferring a Role Master Using Ntdsutil (10.4)

Upgrading an Account Domain PDC (9.2)

User Logon Transaction Using Kerberos (11.6)

Using a PRD to Change a Password (11.4)

Using Disk Cleanup (15.6)

Using EFI DISKPART to Create a New Data Partition

Using Ntdetect.chk (3.6)

Using Riprep to Image a Windows .NET Server (2.5)

Using RIS to Run Setup on a Headless Server (2.11)

Using Setup Manager to Create an Unattended Installation Script (2.3)

Using the ADSI Editor to View AD Objects (6.2)

Using the Security Configuration and Analysis Snap-In (12.6)

Using Windows Update to Obtain Drivers for Another System (3.1)

Verifying Link Tracking Operation (15.2)

Verifying Resource Record Integration (5.15)

Verifying WFP Operation (15.3)

Viewing a Resultant Set of Permissions (11.1)

Viewing Personal Certificates via the Certificates Snap-In (17.1)

Viewing Printer Driver Details (16.10)

process protection

hardware 2nd 3rd

processing

CSEs

script processing 2nd

group policies

loopback processing 2nd 3rd 4th

processors

Datacenter Server

support

Enterprise Server

support

Standard Server

support

supprt

product key entry

automating

profile settings

domains

profiles

RunAs command

Programming Server-Side Applications for Windows 2000 (i)

Programming the Microsoft Windows Driver Model (i)

promoting

domain controllers

backup tapes

local SAM

domains

troubleshooting 2nd 3rd

Promoting the First Windows .NET Domain Controller procedure (9.1)

promotion utility

Domain Controller

properties

print servers

managing 2nd

printers

managing 2nd 3rd 4th 5th 6th 7th 8th 9th

property metadata

Active Directory

replication 2nd 3rd

property replication

Active Directory 2nd

Property Version Numbers (PVNs)

protection

drivers

protective MBR

protocol tracing

dial-up sessions

monitoring 2nd 3rd 4th 5th

protocols

20.3 (Standard PPP Transaction Details)

Standard PPP Transaction Details (20.3)

traceable protocols

providers

(network)

installing 2nd 3rd 4th

MPRs (Multiple Provider Routers) 2nd 3rd

MUPs (Multiple UNC Providers) 2nd

NetWare providers

network services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

order

changing 2nd 3rd

print providers 2nd

Remote Desktop providers

Web Client providers

Windows providers

Winsock providers

PSTN

(Public Switched Telephone Network)

Public Key Cryptography Services (PKCS). [See PKCS (Public Key Cryptogrphy Services)]

public key elements (PKI)

Public Key entity (certificates)

Public Key Infrastructure (PKI). [See PKI (Public Key Infrastructure)]

public key services

PKI 2nd 3rd 4th 5th 6th

D-H (Diffie-Hellman) 2nd

DSS (Digital Signature Standard) 2nd

RSA

Public Switched Telephone Network (PSTN). [See PSTN (Public Switched Telephone Network)]

publication

CRLs (Certification Revocation Lists) 2nd 3rd 4th

published packages

software deployment

pull updates

domain controllers

PVNs (Property Version Numbers)

PW2CA (Pre-Windows 2000 Compatible Access)

Active Directory

PXE

boot disks

creating 2nd

PXE (Pre-boot Execution Environment

RIS 2nd