[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
packets
PACs
(Privilege Access Certificates) 2nd
PAEs (Physical Address Extensions)
paging files
PAP
(Password Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th
parameters
replication
controlling 2nd 3rd 4th 5th 6th 7th 8th
parent trusts
partition boot systems
partition() entry
partitioning
partitions
Configuration naming context
creating
MSR (Microsoft Reserved Partition)
NTFS
Password Authentication Protocol (PAP). [See PAP (Password Authentication Protocol)]
password policy restictions
Password Reset Disks (PRDs). [See PRDs (Password Reset Disks)]
passwords
administrator passwords
credentials caches 2nd 3rd 4th
LanMan passwords
migrations
NTLMv2 passwords
handling for local accounts 2nd
reset disks 2nd 3rd 4th 5th 6th
security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
storage 2nd 3rd 4th 5th 6th 7th 8th 9th
passwrods
PAT
paths
upgrade paths
PCL
PDC (primary domain controller)
PDC Emulator
PDC Emulators
Active Directory 2nd 3rd 4th 5th 6th 7th
PDCs
domains
PDOs (Physical Device Objects)
Per Seat client access licensing
per seat licensing
per server licensing
graphical phase
performance enhancements
performance restictions
Performing a Defragmentation Analysis procedure (15.7)
Performing a Hard Repair of Active Directory procedure (10.12)
Performing a Soft Recovery of Active Directory procedure (10.11)
Performing a System State Backup procedure (10.6)
Performing a System State Restore procedure (10.8)
Performing a User and Group Migration Using ADMT procedure (9.5)
Performing an Authoritative Restore of Sysvol procedure (10.7)
Performing an Authoritative Restore procedure (10.9)
Performing an Interactive Backup procedure (21.3)
Performing an Offline Defragmentation of Active Directory procedure (10.10)
Performing Initial Setup Assessment for NT4 Upgrade procedure (2.1)
accesss permissions
Active Directory
Allow permissions
consolidated permissions
Deny permissions
Enterprise CAs
evaluation 2nd 3rd 4th 5th 6th 7th
inheritance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
remote access permissions
RIS images
PGP (Pretty Good Privacy)
Physical Address Extensions (PAEs). [See Physical Device Objects (PDOs)
physical locations
Configuration naming context
pinouts
pipes
PKCS
(Public Key Cryptography Services)
PKI
CAs
certificates 2nd 3rd 4th 5th 6th 7th 8th
archiving 2nd 3rd 4th 5th 6th 7th
CA trust hierarchies 2nd 3rd 4th 5th
Delta CRLs (Certificate Revocation Lists)
enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
local certificate stores 2nd 3rd
OCSP (Online Certificate Status Protocol) 2nd
validity checks 2nd 3rd 4th 5th 6th 7th
command-line tools 2nd 3rd 4th 5th
cryptographic elements 2nd 3rd 4th 5th 6th 7th
cryptographic services 2nd 3rd 4th 5th 6th
keys
public key services 2nd 3rd 4th 5th 6th
DSS (Digital Signature Standard) 2nd
smart cards
PKT (Partition Knowledge Table)
Dfs (Distributed File Sharing) 2nd 3rd 4th
placeholder domains
installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
placement
redirected folders 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Plug and Play (PnP). [See PnP (Plug and Play)]
plug-and-play
ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th
Device Manager 2nd 3rd 4th 5th 6th
support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
WDM (Windows Driver Model) 2nd 3rd 4th 5th 6th 7th 8th 9th
FDOs (Functional Device Objects)
PnP
ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th
Device Manager 2nd 3rd 4th 5th 6th
support 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
WDM (Windows Driver Model) 2nd 3rd 4th 5th 6th 7th 8th 9th
FDOs (Functional Device Objects)
PocketPCs
Point-to-Point Protocol (PPP). [See PPP (Point-to-Point Protocol)]
points of failure
administrative shares
policies
administrative template policies 2nd
blocks
domains
group policies 2nd 3rd 4th 5th
administrative template policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
components 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd
CSEs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
folder redirection policies 2nd
GPCs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
GPCs (Group Policy Containers) 2nd
GPOs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
individual group policy types 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd
script policies 2nd 3rd 4th 5th 6th 7th
security policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
slow link processing 2nd 3rd 4th 5th
software deployment policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
targeting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
inheritance
RSoP
tracking
policy hierarchy
GPOs (Group Policy Objects) 2nd 3rd 4th
policy tracking
political restictions
political restrictions
polling
pools
porocedures
10.13 (Changing Active Directory File Locations)
Port Address Translation (PAT). PAT (Port Address Translation)
port mapping
NAT (Network Address Translation) 2nd 3rd
port monitors
ports
determining
Network layers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
POST
post-Setup configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
post-upgrade verifications
power management
ACPI (Advanced Configuration and Power) 2nd 3rd
Power On Self Test (POST). [See POST (Power On Self Test)]
PPP
(Point-to-Point Protocol) 2nd 3rd
authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th
CHAP (Challenge Handshake Authentication Protocol) 2nd 3rd 4th
dial-up authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
domain authentication 2nd 3rd 4th
EAP (Extensible Authentication Protocol) 2nd 3rd 4th 5th 6th 7th 8th
MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) 2nd 3rd 4th
multidomain authentication 2nd 3rd
PAP (Password Authentication Protocol) 2nd 3rd 4th 5th 6th 7th
RADIUS (Remote Authentication Dial-In User Services) 2nd 3rd 4th 5th 6th 7th 8th
SPAP (Shiva Password Authentication Protocol) 2nd
standard transactions 2nd 3rd 4th 5th
PPPoE
PRDs
(Password Reset Disks) 2nd 3rd 4th 5th 6th
Pre-boot Execution Environment (PXE). [See PXE (Pre-boot Execution Environment)]
Pre-Windows 2000 Compatible Access (PW2CA). [See PW2CA (Pre-Windows 2000 Comptiable Access)]
preauthenticator
preference
administrative template policies 2nd
preferences
administrative template files 2nd
administrative template policies 2nd
preferential logons
preliminaries
NT4 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Preparing a Remote Access Server for Smart Card Logons procedure (20.7)
primaries
primary domain controller (PDC). [See security descriptors
primary name servers
print clients
print jobs
print queues
print servers
properties
print services
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
Printer Control Language (PCL). [See PCL (Printer Control Language)]
printer drivers
printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th
printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
printer drivers 2nd 3rd 4th 5th 6th 7th 8th 9th
file location changes 2nd 3rd 4th 5th 6th 7th 8th
printers
client printer connections
non-PnP-compatibale printers
properties
managing 2nd 3rd 4th 5th 6th 7th 8th 9th
printing
clients
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th
command-line print administration 2nd 3rd 4th 5th
printing over 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
local print devices 2nd 3rd 4th 5th
network print devices 2nd 3rd 4th
print clients
print queues
private headers
private key protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
private key services
private namespaces
priveleges
domains
Privilege Access Certificates (PACs). [See PACs (Privilege Access Certificates)]2nd [See PACs (Privilege Access Certificates)]
procedure
16.10 (Viewing Printer Driver Details)
Verifying Transitive Trust Accessibility (9.3)
procedures
(6.2) Using the ADSI Editor to View AD Objects
1.1 (Installing Windows .NET on a New Machine)
1.2 (Continuing with the Graphic Mode Portion of Setup)
1.3 (Configuring the System to Dump Only the Contents of the Kernel Memory)
1.4 (Correcting Lost Drive Signatures)
10.10 (Performing an Offline Defragmentation of Active Directory)
10.11 (Performing a Soft Recovery of Active Directory)
10.12 (Performing a Hard Repair of Active Directory)
10.3 (Changing a Role Master Using an MMC Console)
10.4 (Transferring a Role Master Using Ntdsutil)
10.6 (Performing a System State Backup)
10.7 (Performing an Authoritative Restore of Sysvol)
10.8 (Performing a System State Restore)
10.9 (Performing an Authoritative Restore)
11.1 (Viewing a Resultant Set of Permissions)
11.10 (Changing Log File Settings)
11.11 (Monitoring for Unauthorized Folder Access)
11.12 (Monitoring Access to Directory Service Objects)
11.13 (Audit Monitor for Logon/Logoff)
11.14 (Audit Monitoring for Printers)
11.2 (Storing User Names and Passwords)
11.3 (Creating a Password Reset Disk)
11.4 (Using a PRD to Change a Password)
11.5 (High-Level Kerberos Example)
11.6 (User Logon Transaction Using Kerberos)
11.7 (Server Access Transaction Using Kerberos)
11.8 (Configuring a Cross-Realm Trust)
11.9 (Testing Cross-Realm Kerberos Ticket Generation)
12.1 (Overriding a Policy Block)
12.2 (Running the RSoP Wizard in Planning Mode)
12.3 (Running the RSoP Wizard in Logging Mode)
12.4 (Configuring a GPO Security Descriptor to Filter Policy Recipients)
12.5 (Accessing the WMI Filter Interface)
12.6 (Using the Security Configuration and Analysis Snap-In)
12.7 (Loading ADM Templates into the Group Policy Editor
13.1 (Applying Inheritable Rights to an Active Directory Container)
13.2 (Delegating Access Rights)
13.3 (Functional Description of User and Group Validation Within a Single Domain)
13.4 (Functional Description of User and Group Validation Across Domains Using Domain Local Groups)
13.5 (Functional Description of User and Group Validation Across Domains Using Universal Group)
13.6 (Starting Explorer Shell Using RunAs)
14.1 (Creating Primary Partitions on Basic Disks)
14.10 (Creating RAID 5 Volumes)
14.12 (Changing Drive Letters)
14.13 (Replacing a Failed Disk in a RAID 5 Volume)
14.14 (Building a Fault Tolerant Boot Floppy)
14.15 (Replacing a Failed Disk in a Mirrored Volume)
14.16 (Moving a Fault Tolerant Volume to Another Computer)
14.2 (Creating Extended Partitions and Logical Drives)
14.3 (Expanding a Basic Disk Partition Using Diskpart)
14.4 (Converting a Basic Disk to a Dynamic Disk)
14.5 (Creating Simple Volumes)
14.6 (Configuring a Spanned Volume)
14.7 (Creating Striped Volumes)
14.8 (Creating Mirrored Volumes)
14.9 (Breaking a Mirrored Volume)
15.1 (Classic NT Link Search Pattern)
15.2 (Verifying Link Tracking Operation)
15.3 (Verifying WFP Operation)
15.5 (Creating a Mount Point Using the Disk Management Console)
15.7 (Performing a Defragmentation Analysis)
16.1 (Installing Additional Network Clients)
16.11 (Relocating the Default Spool Directory)
16.12 (Installing a Non-PnP-Compatible Printer)
16.2 (Changing the Network Provider Order)
16.3 (Creating and Sharing a Folder)
16.4 (Creating Remote Shares Using the Computer Management Console)
16.5 (Restoring Deleted Administrative Shares with Poledit)
16.8 (Designating Additional Dfs Link Targets)
17.1 (Viewing Personal Certificates via the Certificates Snap-In)
17.2 (Disabling EFS Using Windows .NET Group Policies)
17.3 (Exporting and Deleting the FR Public Key Certificate)
17.4 (Obtaining FR Certificates for Additional DRAs)
17.5 (Loading an FR Public Key into the EFS Group Policy)
17.6 (Exporting and Deleting an FR Private Key)
17.7 (Setting Folder Encryption)
17.8 (Importing an FR Private Key from a PFX Certificate)
18.1 (Installing a Standalone Root CA)
18.2 (Enrolling for a Certificate Using the Web)
18.3 (Creating a Key Recovery Agent)
18.4 (Configuring a CA to Archive Certificates)
18.5 (Creating an Archive Template)
19.2 (Assigning a User Home Directory with AD Users and Computers)
19.3 (Assigning a Home Directory Using the Command Line)
19.4 (Disabling Remote Desktop)
19.5 (Changing Default RDP Port in the TSWeb Interface)
19.7 (Disabling Remote Desktop on .NET Server)
2.1 (Performing Initial Setup Assessment for NT4 Upgrade)
2.10 (Accessing the Remote Installation Group Policy)
2.11 (Using RIS to Run Setup on a Headless Server)
2.2 (Task List for Setting Up Scripted Installations)
2.3 (Using Setup Manager to Create an Unattended Installation Script)
2.4 (Slipstreaming Service Pack Files)
2.5 (Using Riprep to Image a Windows .NET Server)
2.6 (Installing Remote Installation Services)
2.7 (Configuring a Remote Installation Services Image)
2.8 (Configuring a Remote Installation Services Server)
2.9 (Setting Permissions on RIS Images)
20.1 (CHAP Authentication Transaction)
20.10 (Initial Configuration of Routing Services)
20.11 (Installing a Demand-Dial Interface)
20.12 (Configuring a Demand-Dial Router)
20.13 (Configuring Automatic Connection Pickup)
20.14 (Configuring NAT and ICF)
20.15 (Enabling Internet Connection Sharing and Internet Connection Firewall)
20.16 (Manually Obtaining a Computer Certificate)
20.17 (Registering an IAS Server with Active Directory)
20.18 (Configuring an RRAS Server as an IAS Client)
20.19 (Configuring RRAS to Use RADIUS Authentication)
20.2 (EAP Smart Card Authentication Transaction)
20.4 (Enabling the Smart Card User Template)
20.5 (Issuing Enrollment Agent Certificates to Operations Administrators)
20.6 (Enrolling a Smart Card User)
20.7 (Preparing a Remote Access Server for Smart Card Logons)
20.8 (Installing a Direct Serial Line Connection)
20.9 (Initializing the RRAS Service to Support Remote Access)
21.1 (Adding File Types to the File Exclusion List)
21.2 (Registering File Types for Backup Exclusions)
21.3 (Performing an Interactive Backup)
21.4 (Configuring and Scheduling a Backup Job)
21.5 (Restoring a File Manually Using Ntbackup)
21.7 (Booting with the Last Known Good Configuration)
21.8 (Installing the Recovery Console)
3.1 (Using Windows Update to Obtain Drivers for Another System)
3.2 (Using EFI DISKPART to Create a New Data Partition)
3.5 (Creating a Fault Tolerant Boot Floppy Disk)
3.7 (Configuring Performance Monitor to Collect kernel Memory Statistics)
3.8 (Charting Performance Monitor Logs)
4.1 (Functional Sequence for NetBIOS Name Resolution Using Broadcasts)
4.2 (Recovering from Failed Jet Database Conversion)
4.3 (Installing WINS on a Windows .NET Server)
4.4 (Configuring a WINS Client)
4.5 (Adding a Static WINS Mapping)
4.6 (Configuring WINS Replication)
4.7 (Disabling NetBIOS-over-TCP/IP Name Resolution)
5.1 (Functional Description of Query Handling by an Authoritative Name Server)
5.11 (Configuring Delegations)
5.12 (Enabling Zone Transfers and Notifications)
5.13 (Configuring a Secondary Server)
5.14 (Integrating a Primary Zone into Active Directory)
5.15 (Verifying Resource Record Integration)
5.16 (Configuring a Caching-Only Server)
5.17 (Configuring a DNS Server to Use a Forwarder)
5.18 (Configuring a Dynamic Zone)
5.19 (Disabling DNS on an Interface)
5.2 (Functional Description of Query Handling by Non-Authoritative Name Server)
5.21 (Setting Periodic Scavenging)
5.22 (Accessing Advanced Server Parameters)
5.23 (Starting DNS from a BIND File)
5.24 (Setting the Fail on Load if Bad Zone option)
5.25 (Installing DHCP Service Drivers)
5.26 (Configuring Scope Options)
5.3 (Functional Description of Reverse Lookup Query)
5.4 (Functional Description of Standard Polled Zone Transfer)
5.5 (Configuring DNS Information for TCP/IP Interface Properties)
5.6 (Configuring DNS Information in the System Properties Window)
5.8 (Creating a Forward Lookup Zone)
5.9 (Creating a Reverse Lookup Zone)
6.1 (Creating a Custom Schema Management Console)
7. 10 (Forcing Replication with the AD Sites and Services Console)
7.11 (Selecting a New Replication Partner)
7.12 (Building a New Connection Object)
7.2 (Replication Trace Showing USN Operation)
7.3 (Replication Trace Showing UTD Vector Operation)
7.4 (Renaming the Default-First-Site-Name Object)
7.5 (Creating a New Site Object)
7.6 (Creating a Subnet Object)
7.7 (Creating and Configuring Site Link Objects)
7.8 (Designating a Bridgehead Server)
7.9 (Building a Site Link Bridge Object)
8.1 (Assigning Custom UPN Suffixes)
9.1 (Promoting the First Windows .NET Domain Controller)
9.2 (Upgrading an Account Domain PDC)
9.3 (Verifying Transitive Trust Accessibility)
9.4 (Configuring the Password Migration Agent)
9.5 (Performing a User and Group Migration Using ADMT)
9.6 (Renaming a Domain Controller Using NETDOM COMPUTERNAME)
Accessing Advanced Server Parameters (5.22)
Accessing the Remote Installation Group Policy (2.10)
Accessing the WMI Filter Interface (12.5)
Adding a Static WINS Mapping (4.5)
Adding File Types to the File Exclusion List (21.1)
Applying Inheritable Rights to an Active Directory Container (13.1)
Assigning a Home Directory Using the Command Line (19.3)
Assigning a User Home Directory with AD Users and Computers (19.2)
Assigning Custom UPN Suffixes (8.1)
Audit Monitor for Logon/Logoff (11.13)
Audit Monitoring for Printers (11.14)
Booting with the Last Known Good Configuration (21.7)
Breaking a Mirrored Volume (14.9)
Building a Fault Tolerant Boot Floppy (14.14)
Building a New Connection Object (7.12)
Building a Site Link Bridge Object (7.9)
Changing a Role Master Using an MMC Console (10.3)
Changing Active Directory File Locations (10.13)
Changing Default RDP Port in the TSWeb Interface (19.5)
Changing Drive Letters (14.12)
Changing Log File Settings (11.10)
Changing the Network Provider Order (16.2)
CHAP Authentication Transaction (20.1)
Charting Performance Monitor Logs (3.8)
Classic NT Link Search Pattern (15.1)
Configuring a CA to Archive Certificates (18.4)
Configuring a Caching-Only Server (5.16)
Configuring a Cross-Realm Trust (11.8)
Configuring a Demand-Dial Router (20.12)
Configuring a DNS Server to Use a Forwarder (5.17)
Configuring a Dynamic Zone (5.18)
Configuring a GPO Security Descriptor to Filter Policy Recipients (12.4)
Configuring a Remote Installation Services Image (2.7)
Configuring a Remote Installation Services Server (2.8)
Configuring a Secondary Server (5.13)
Configuring a Spanned Volume (14.6)
Configuring a WINS Client (4.4)
Configuring an RRAS Server as an IAS Client (20.18)
Configuring and Scheduling a Backup Job (21.4)
Configuring Automatic Connection Pickup (20.13)
Configuring Delegations (5.11)
Configuring DNS Information for TCP/IP Interface Properties (5.5)
Configuring DNS Information in the System Properties Window (5.6)
Configuring NAT and ICF (20.14)
Configuring Performance Monitor to Collect kernel Memory Statistics (3.7)
Configuring RRAS to Use RADIUS Authentication (20.19)
Configuring Scope Options (5.26)
Configuring the Password Migration Agent (9.4)
Configuring the System to Dump Only the Contents of the Kernel Memory (1.3)
Configuring WINS Replication (4.6)
Continuing with the Graphic Mode Portion of Setup (1.2)
Converting a Basic Disk to a Dynamic Disk (14.4)
Correcting Lost Drive Signatures (1.4)
Creating a Custom Schema Management Console (6.1)
Creating a Fault Tolerant Boot Floppy Disk (3.5)
Creating a Forward Lookup Zone (5.8)
Creating a Key Recovery Agent (18.3)
Creating a Mount Point Using the Disk Management Console (15.5)
Creating a New Site Object (7.5)
Creating a Password Reset Disk (11.3)
Creating a Reverse Lookup Zone (5.9)
Creating a Subnet Object (7.6)
Creating an Archive Template (18.5)
Creating and Configuring Site Link Objects (7.7)
Creating and Sharing a Folder (16.3)
Creating Extended Partitions and Logical Drives (14.2)
Creating Mirrored Volumes (14.8)
Creating Primary Partitions on Basic Disks (14.1)
Creating RAID 5 Volumes (14.10)
Creating Remote Shares Using the Computer Management Console (16.4)
Creating Simple Volumes (14.5)
Creating Striped Volumes (14.7)
Delegating Access Rights (13.2)
Designating a Bridgehead Server (7.8)
Designating Additional Dfs Link Targets (16.8)
Disabling DNS on an Interface (5.19)
Disabling EFS Using Windows .NET Group Policies (17.2)
Disabling NetBIOS-over-TCP/IP Name Resolution (4.7)
Disabling Remote Desktop (19.4)
Disabling Remote Desktop on .NET Server (19.7)
EAP Smart Card Authentication Transaction (20.2)
Enabling Internet Connection Sharing and Internet Connection Firewall (20.15)
Enabling the Smart Card User Template (20.4)
Enabling Zone Transfers and Notifications (5.12)
Enrolling a Smart Card User (20.6)
Enrolling for a Certificate Using the Web (18.2)
Expanding a Basic Disk Partition Using Diskpart (14.3)
Exporting and Deleting an FR Private Key (17.6)
Exporting and Deleting the FR Public Key Certificate (17.3)
Forcing Replication with the AD Sites and Services Console (7.10)
Functional Description of Query Handling by an Authoritative Name Server (5.1)
Functional Description of Query Handling by Non-Authoritative Name Server (5.2)
Functional Description of Reverse Lookup Query (5.3)
Functional Description of Standard Polled Zone Transfer (5.4)
Functional Description of User and Group Validation Across Domains Using Domain Local Groups (13.4)
Functional Description of User and Group Validation Across Domains Using Universal Group (13.5)
Functional Description of User and Group Validation Within a Single Domain (13.3)
Functional Sequence for NetBIOS Name Resolution Using Broadcasts (4.1)
High-Level Kerberos Example (11.5)
Importing an FR Private Key from a PFX Certificate (17.8)
Initial Configuration of Routing Services (20.10)
Initializing the RRAS Service to Support Remote Access (20.9)
Installing a Demand-Dial Interface (20.11)
Installing a Direct Serial Line Connection (20.8
Installing a Non-PnP-Compatible Printer (16.12)
Installing a Standalone Root CA (18.1)
Installing Additional Network Clients (16.1)
Installing DHCP Service Drivers (5.25)
Installing Remote Installation Services (2.6)
Installing the Recovery Console (21.8)
Installing Windows .NET on a New Machine (1.1)
Installing WINS on a Windows .NET Server (4.3)
Integrating a Primary Zone into Active Directory (5.14)
Issuing Enrollment Agent Certificates to Operations Administrators (20.5)
Loading ADM Templates into the Group Policy Editor (12.7)
Loading an FR Public Key into the EFS Group Policy (17.5)
Manually Obtaining a Computer Certificate (20.16)
Monitoring Access to Directory Service Objects (11.12)
Monitoring for Unauthorized Folder Access (11.11)
Moving a Fault Tolerant Volume to Another Computer (14.16)
Obtaining FR Certificates for Additional DRAs (17.4)
Overriding a Policy Block (12.1)
Performing a Defragmentation Analysis (15.7)
Performing a Hard Repair of Active Directory (10.12)
Performing a Soft Recovery of Active Directory (10.11)
Performing a System State Backup (10.6)
Performing a System State Restore (10.8)
Performing a User and Group Migration Using ADMT (9.5)
Performing an Authoritative Restore (10.9)
Performing an Authoritative Restore of Sysvol (10.7)
Performing an Interactive Backup (21.3)
Performing an Offline Defragmentation of Active Directory (10.10)
Performing Initial Setup Assessment for NT4 Upgrade (2.1)
Preparing a Remote Access Server for Smart Card Logons (20.7)
Promoting the First Windows .NET Domain Controller (9.1)
Recovering from Failed Jet Database Conversion (4.2)
Registering an IAS Server with Active Directory (20.17)
Registering File Types for Backup Exclusions (21.2)
Relocating the Default Spool Directory (16.11)
Renaming a Domain Controller Using NETDOM COMPUTERNAME (9.6)
Renaming the Default-First-Site-Name Object (7.4)
Replacing a Failed Disk in a Mirrored Volume (14.15)
Replacing a Failed Disk in a RAID 5 Volume (14.13)
Replication Trace Showing USN Operation (7.2)
Replication Trace Showing UTD Vector Operation (7.4)
Restoring a File Manually Using Ntbackup (21.5)
Restoring Deleted Administrative Shares with Poledit (16.5)
Running the RSoP Wizard in Logging Mode (12.3)
Running the RSoP Wizard in Planning Mode (12.2)
Selecting a New Replication Partner (7.11)
Server Access Transaction Using Kerberos (11.7)
Setting Folder Encryption (17.7)
Setting Periodic Scavenging (5.21)
Setting Permissions on RIS Images (2.9)
Setting the Fail on Load if Bad Zone option (5.24)
Slipstreaming Service Pack Files (2.4)
Starting DNS from a BIND File (5.23)
Starting Explorer Shell Using RunAs (13.6)
Storing User Names and Passwords (11.2)
Task List for Setting Up Scripted Installations (2.2)
Testing Cross-Realm Kerberos Ticket Generation (11.9)
Transferring a Role Master Using Ntdsutil (10.4)
Upgrading an Account Domain PDC (9.2)
User Logon Transaction Using Kerberos (11.6)
Using a PRD to Change a Password (11.4)
Using EFI DISKPART to Create a New Data Partition
Using Riprep to Image a Windows .NET Server (2.5)
Using RIS to Run Setup on a Headless Server (2.11)
Using Setup Manager to Create an Unattended Installation Script (2.3)
Using the ADSI Editor to View AD Objects (6.2)
Using the Security Configuration and Analysis Snap-In (12.6)
Using Windows Update to Obtain Drivers for Another System (3.1)
Verifying Link Tracking Operation (15.2)
Verifying Resource Record Integration (5.15)
Verifying WFP Operation (15.3)
Viewing a Resultant Set of Permissions (11.1)
Viewing Personal Certificates via the Certificates Snap-In (17.1)
Viewing Printer Driver Details (16.10)
process protection
processing
CSEs
loopback processing 2nd 3rd 4th
processors
Datacenter Server
Enterprise Server
Standard Server
product key entry
profile settings
profiles
Programming Server-Side Applications for Windows 2000 (i)
Programming the Microsoft Windows Driver Model (i)
promoting
domain controllers
domains
Promoting the First Windows .NET Domain Controller procedure (9.1)
promotion utility
properties
print servers
printers
managing 2nd 3rd 4th 5th 6th 7th 8th 9th
Active Directory
property replication
Property Version Numbers (PVNs)
protection
protocol tracing
dial-up sessions
protocols
20.3 (Standard PPP Transaction Details)
Standard PPP Transaction Details (20.3)
providers
MPRs (Multiple Provider Routers) 2nd 3rd
MUPs (Multiple UNC Providers) 2nd
network services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
order
PSTN
(Public Switched Telephone Network)
Public Key Cryptography Services (PKCS). [See PKCS (Public Key Cryptogrphy Services)]
Public Key entity (certificates)
Public Key Infrastructure (PKI). [See PKI (Public Key Infrastructure)]
public key services
DSS (Digital Signature Standard) 2nd
Public Switched Telephone Network (PSTN). [See PSTN (Public Switched Telephone Network)]
publication
CRLs (Certification Revocation Lists) 2nd 3rd 4th
published packages
pull updates
PVNs (Property Version Numbers)
PW2CA (Pre-Windows 2000 Compatible Access)
PXE
boot disks
PXE (Pre-boot Execution Environment