Inside Windows Server 1002003 [Electronic resources]

Addison Wesley

نسخه متنی -صفحه : 245/ 239
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SAC (Special Administration Console)

EMS 2nd 3rd

SACLs

(system access control lists)

Safe Mode

backups 2nd 3rd 4th 5th

Safe Mode with Command Prompt

Safe Mode with Networking

SAM

(Security Account Manager) 2nd 3rd

domains

upgrading 2nd 3rd

SAM databases 2nd

samba clients

NTLMv2 passwords

SAS

(Secure Attention Sequence)

SAS (Secure Attention Sequence)

scavenging

Dynamic DNS

configuring 2nd 3rd 4th 5th

records

DNS 2nd

Schannel security package

scheduling

backup jobs 2nd 3rd 4th 5th 6th

schema

Active Directory

class derivations 2nd

definition objects 2nd

functional operations 2nd 3rd 4th

object classes 2nd

object identification 2nd 3rd 4th

rules 2nd 3rd 4th

Schema console

Active Directory 2nd 3rd 4th 5th 6th 7th

schema master

Active Directory 2nd

Schema Master

Schema naming context

Schema Master (FSMOs)

Schema naming context

Active Directory 2nd

Schema Master

schema upgrades

forests 2nd

Schema.ini file (Active Directory)

schemas

databases 2nd

Schlumberger Web site

scope options

DHCP

configuring 2nd 3rd 4th 5th

script

deploying 2nd 3rd

running

unattended setup

script policies

deploying 2nd 3rd

group policies 2nd 3rd 4th 5th 6th 7th

script processing

CSEs (Client-Side Extensions) 2nd

scripted installations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

scripts

Clonegg

Cloneggu

Clonelg

Clonepr

domains

support 2nd

replication

Riprep

RIS 2nd 3rd

Sidhist

types

unattended scripts

customizations

unattended setup batch files

unattended setup scripts

creating 2nd 3rd 4th 5th 6th 7th 8th 9th

VBScript

viruses

SCSI

problems

resolving 2nd

SCSI adapters

installing 2nd 3rd

SCSI cables

checking

SCSI drivers

alternative

SCSI drives

installing 2nd 3rd

Scsiport.sys drivers

searches

LDAP 2nd

searching

shared folders

connecting to

Searching with LDP procedure (6.4)

Secedit utility

secondaries

DNS 2nd

secondary bootstrap 2nd

Secondary Logon Service (SLS). [See DNS 2nd 3rd

secondary servers

DNS

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th

secrets (LSA)

sectors

file systems 2nd 3rd 4th 5th 6th 7th

Secure Attention Sequence (SAS). [See 2nd [See Secure Hash Algorithm (SHA). [See SHA-1 (Secure Hash Algorithm)]

Secure Hash Standard (SHS). [See SHS (Secure Hash Standard)]

SecureID smart cards

SecureNet Web site

security

access masks

access permissions

evaluation 2nd 3rd 4th 5th 6th 7th

access tokens 2nd 3rd 4th

ACLs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

access permission evaluation 2nd 3rd 4th 5th 6th 7th

Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

access control inheritance 2nd 3rd 4th 5th 6th

access list management 2nd 3rd 4th

access permissions

access rights 2nd

access rights delegation 2nd 3rd 4th 5th 6th

anonymous access 2nd

descriptor contents 2nd 3rd 4th

event notification 2nd 3rd

groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

improvements to 2nd

LSA (Local Security Authority)

managing 2nd 3rd 4th

object protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

primaries

RunAs 2nd 3rd 4th 5th

security descriptors

security principals 2nd

service accounts 2nd

SLS (Secondary Logon Service) 2nd 3rd 4th 5th

SRM (Security Reference Monitor)

architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

auditing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

audit logs 2nd

enabling 2nd 3rd

event log managment 2nd 3rd 4th 5th

kernel object auditing

recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th

authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th

Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th

limitations 2nd

MITv5 Kerberos interoperability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

support 2nd

backups

EMS 2nd 3rd 4th 5th 6th 7th 8th

EMS (Emergency Management Services)

interactive backups 2nd 3rd 4th 5th 6th 7th

job scheduling 2nd 3rd 4th 5th 6th

Safe Mode 2nd 3rd 4th 5th

BSOD (Blue Screen of Death)

recovering from 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

components

connections

ICF (Internet Connection Firewall) 2nd

Digest security package

DNS 2nd 3rd 4th 5th 6th

domains

Dynamic DNS

managing 2nd 3rd

encryption

PKI (Public Key Infrastructure) 2nd 3rd

file encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

certificate management 2nd 3rd 4th 5th 6th 7th

data encryption 2nd 3rd 4th

data encryption algorithms 2nd 3rd 4th

disabling 2nd 3rd 4th 5th 6th 7th

EFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

EFS file transactions 2nd 3rd 4th 5th 6th 7th 8th

FEK (File Encryption Key) 2nd 3rd 4th 5th 6th

file decryption process 2nd 3rd

individual files

private key protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

process description 2nd 3rd

recovery 2nd 3rd

transporting 2nd

WebDAV 2nd 3rd 4th 5th 6th 7th 8th

Kerberos 2nd 3rd 4th

authorization data 2nd 3rd 4th 5th 6th 7th 8th 9th

LSA

(Local Security Authority)

components 2nd 3rd 4th 5th 6th 7th 8th 9th

functional diagram

operations 2nd

Negotiate security package

network access 2nd 3rd

Ntbackup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th

NTLM

passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th

anonymous logons 2nd 3rd 4th

computer passwords 2nd 3rd 4th

crackers

credentials caches 2nd 3rd 4th

formats 2nd 3rd 4th 5th

handling for local accounts 2nd

hashing algorithm

password reset disks

policies 2nd 3rd 4th 5th 6th

reset disks 2nd 3rd 4th 5th 6th

resets

reversible passwords 2nd 3rd 4th 5th

storage 2nd 3rd 4th 5th 6th 7th 8th 9th

vunerabilities 2nd 3rd 4th 5th 6th

permissions 2nd

inheritance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

system privileges 2nd 3rd

viewing 2nd

PKI

cipher keys 2nd

hashes 2nd 3rd 4th

policies 2nd 3rd 4th 5th 6th

folder redirection 2nd

Kerberos 2nd

print policies 2nd 3rd

printers 2nd 3rd

Recovery Console 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

restores 2nd 3rd 4th 5th 6th 7th

Schannel

security descriptors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

SIDs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

terminal services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

viruses

VBScript

Windows NT

lack of management granularity

limitations of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

multiple logon IDs

nontransitive trust relationships

poor operational performance

poor replication performance

restricted account database size

single point of failure

Security Account Manager (SAM). [See SAM (Security Account Manager)]2nd [See SAM (Security Account Manager)]3rd [See SAM (Security Account Manager)]

security checks

upgrades 2nd

security databases

LSA

security descriptors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

Active Directory

DACLs (discretionary access control lists)

headers

managing

command-line tools 2nd 3rd 4th 5th 6th 7th

NTFS 2nd 3rd 4th 5th 6th 7th

links

lookups 2nd

owner SIDs

primary group SIDs for the owner

replication

SACLs (system access control lists)

security groups

group policies

filtering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

security logs

access

controlling

security packages

LSA 2nd 3rd 4th

security policies

analysis snap-in 2nd 3rd 4th

configuring 2nd 3rd

default security templates 2nd 3rd

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

security-related GPT files 2nd 3rd 4th 5th

specialty security templates 2nd

templates

distributing 2nd 3rd

security principals

Active Directory 2nd

Kerberos

Security Reference Monitor (SRM). [See SRM (Security Reference Monitor)]2nd [See SRM (Security Reference Monitor)]

Security Requirements for Cryptographic Modules

Security Support Provider Interface (SSPI). [See SSPI (Security Support Provider Interface)]

Security Support Providers (SSPs). [See SSPs (Security Support Providers)]

security templates

distributing 2nd 3rd

security-related GPT files

managing 2nd 3rd 4th 5th

Seizing a FSMO Role procedure (10.5)

Selecting a New Replication Partner procedure (7.11)

Send Fax Wizard

sending

faxes 2nd 3rd 4th 5th 6th 7th

Seperator Pages property (printers) 2nd 3rd 4th

Serenum.sys drivers

Serial Number entity (certificates)

Serial.sys drivers

Server Access Transaction Using Kerberos procedure (11.7)

server command (Nslookup)

server file systems

redirectors

Server Message Block (SMB) command protocol. [See moving between 2nd 3rd

server-based files

file encryption 2nd 3rd 4th 5th 6th

Kerberos

impersonation 2nd

trusted for delegation 2nd 3rd 4th

Serverdomain variable (OSCML)

Servername variable (OSCML)

servers

bridgehead servers

designating 2nd 3rd 4th

client-side caching

configuring 2nd 3rd 4th 5th 6th 7th 8th

DHCP servers

authorizing 2nd 3rd

DNS

secondary servers 2nd 3rd 4th 5th 6th

DNS servers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

forwarders 2nd 3rd

installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

loss of 2nd 3rd 4th

multiple use

fax servers 2nd

FSMO servers

placement

GC (Global Catalog) servers 2nd

headless servers

installing 2nd 3rd

logon servers

identification

managing

RDP (Remote Desktop Protocol) 2nd 3rd

via remote desktop 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th

member servers

minimum hardware requirements

naming

Setup 2nd 3rd 4th

print servers

managing 2nd

remote access servers

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

standalone servers

policies

terminal services

security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

service account authentication (Kerberos)

service accounts

Active Directory

security 2nd

service drivers

booting process

service locations

Kerberos

service locator records

DNS

service pack installation

slipstreaming 2nd 3rd

Service Principal Names (SPNs). [See SPNs (Service Principal Names)]

Service Principal Names) 2nd 3rd 4th 5th

services

Active Directory

locating 2nd 3rd 4th 5th 6th

Configuration naming context

Active Directory

Kerberos

Services for Macintosh (SFM). [See SFM (Services for Macintosh)]

Services for UNIX (SFU) Web site

session key field (encrypted tickets)

Session Keys (Kerberos reply messages)

Session layer (OSI) 2nd

Session Manager

booting process 2nd 3rd 4th

Set [no]d2 command (Nslookup)

set [no]debug command (Nslookup)

set [no]deframe command (Nslookup)

set [no]recurse command (Nslookup)

set querytype command (Nslookup)

setting

intervals

replication 2nd 3rd 4th 5th

roles

domain controllers 2nd 3rd

Setting Folder Encryption procedure (17.7)

Setting Periodic Scavenging procedure (5.21)

Setting Permissions on RIS Images procedure (2.9)

Setting the Fail on Load if Bad Zone option procedure (5.24)

Setup

booting

EFI Shell

Character Phase Setup

installation 2nd 3rd 4th 5th

configuration phase 2nd 3rd 4th 5th

initial user logon

setup

dynamic disks 2nd 3rd 4th

Setup

function keys

graphic phase

Graphic Phase Setup

installation 2nd 3rd 4th 5th 6th 7th 8th 9th

graphical phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

administrator password management 2nd

dates 2nd 3rd

domains 2nd 3rd 4th

licensing 2nd 3rd

per seat licensing 2nd

per server licensing 2nd

server naming 2nd 3rd 4th

terminal server licensing 2nd

times 2nd 3rd

workgroups 2nd 3rd 4th

IA64 Setup

compared 2nd 3rd 4th 5th 6th

post-Setup configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

text phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

ACPI compatibility checks 2nd

disk formats 2nd 3rd

drive letter assignments 2nd 3rd 4th 5th 6th 7th

executable loads 2nd

files 2nd 3rd 4th

initial hardware recognition 2nd 3rd

troubleshooting

setup batch files

unattended setup batch files

Setup Information File (SIF). [See 2nd [See RIS 2nd 3rd

unattended setup scripts

creating 2nd 3rd 4th 5th 6th 7th 8th 9th

Setupreg.hiv drivers

SFM

(Services for Macintosh)

SFU (Services for UNIX) Web site

SHA-1

(Secure Hash Algorithm)

shadows

volumes

Shamir, Adi

share permissions 2nd 3rd

share point verification

domains

share points 2nd

redirectors 2nd 3rd 4th

shared encryption files

shared folders

connecting to 2nd 3rd 4th 5th 6th

browsers 2nd 3rd 4th 5th 6th 7th 8th

searching

Registry

shared interrupts

shared resources 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

clients

printing configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th

file sharing

administrative share 2nd

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

Dfs (Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th

remote share creation 2nd 3rd 4th 5th

share creation 2nd 3rd 4th 5th 6th 7th 8th

share permissions 2nd 3rd

XP desktops 2nd 3rd

network applications 2nd 3rd 4th

network services 2nd 3rd 4th 5th

print services

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

enhanced metafiles 2nd

initial job rendering 2nd 3rd

network printing 2nd 3rd 4th

port monitors 2nd 3rd 4th

print job delivery 2nd

printer drivers 2nd 3rd 4th 5th 6th 7th 8th 9th

spoolers 2nd 3rd 4th 5th 6th 7th 8th 9th

providers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

installing 2nd 3rd 4th

MPRs (Multiple Provider Routers) 2nd 3rd

MUPs (Multiple UNC Providers) 2nd

order changing 2nd 3rd

print providers

redirectors 2nd 3rd 4th 5th 6th 7th 8th 9th

default share points 2nd 3rd 4th

server file systems

shared folders

connecting to 2nd 3rd 4th 5th 6th

shares

administrative shares

re-creating

recreating

creating

command line 2nd

Explorer 2nd 3rd 4th 5th 6th

remote computers 2nd 3rd 4th 5th

ICS (Internet Connection Sharing) 2nd 3rd 4th 5th

names

length

Sharing property (printers) 2nd 3rd 4th

sharing. [See shells. [See domains 2nd

Shiva PAP (SPAP). [See SPAP (Shiva PAP)]

short name generation

NTFS records 2nd 3rd 4th

short name preservation

files

NTFS

short-cut trusts

Kerberos 2nd

shortcut trusts

Active Directory

SHOWPRIVS tool (Resource Kit)

SHS

(Secure Hash Standard)

shutdown event tracker

SID history

domains

migrating 2nd 3rd 4th 5th

Side-by-Side assemblies

(DLLs) 2nd 3rd 4th

Sidhist script

SIDs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

functions

well-known SIDs

SIF (Setup Information File) 2nd

Siffle variable (OSCML)

Signature Algorithm entity (certificates)

signature() entry

Boot.ini 2nd 3rd 4th

Simple Mail Transport Protocol (SMTP). [See 2nd [See Simple Network Management Protocol (SNMP). [See SNMP (Single Network Management Protocol)]

Simple Network Time Protocol (SNTP). [See SNTP (Simple Network Time Protocol)]

simple volumes 2nd

simultaneous modification

replication

Active Directory 2nd

Single Instance Storage (SIS). [See SIS (Single Instance Storage)]2nd [See SIS (Single Instance Storage)]3rd [See SIS (Single Instance Storage)]

single point of failure

Windows NT

SIS

(Single Instance Storage) 2nd 3rd

file recovery

SIS (Single Instance Storage) groveler 2nd 3rd

SIS Groveler

site link bridge objects

creating 2nd 3rd 4th 5th

site objects

Active Directory 2nd 3rd 4th

site policies

GPCs

multidomain forests

sites

architectures

designing 2nd 3rd 4th 5th 6th 7th

Configuration naming context

Active Directory

creating 2nd

inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th

links

creating 2nd 3rd 4th 5th

replication

Active Directory 2nd 3rd

server objects

moving between 2nd 3rd

sizes

drives 2nd 3rd

GPT drives

NTFS 2nd

SKIs (Subject Key Identifiers)

SKUs

(Stock Keeping Units)

slipstreaming

service pack installations 2nd 3rd

Slipstreaming Service Pack Files procedure (2.4)

slipstreams

slow link processing

group policies 2nd 3rd 4th

cutoff speeds

SLS (Secondary Logon Service)

Active Directory

security 2nd 3rd 4th 5th

smart cards

improvements to

providers

remote access

certificate template preparation 2nd 3rd 4th

certificate testing 2nd

configuring for

deploying for 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th

enrollment agent certificates 2nd 3rd 4th 5th 6th 7th

form factors 2nd

PKI preparations 2nd 3rd

remote logon testing 2nd 3rd

RRAS configuration 2nd 3rd 4th 5th

selecting 2nd 3rd

user enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th

SecureID smart cards

SMB

MAC layer 2nd

SMB (Server Message Block) command protocol

SMBs

(Server Message Blocks) 2nd 3rd

traffic

restricting

Transport layer 2nd

Smss.exe drivers

SMTP

(Simple Mail Transport Protocol)

SMTP (Simple Mail Transport Protocol)

SMTP replication restictions

multiple domains

SNMP

(Simple Network Management Protocol)

SNTP

(Simple Network Time Protocol)

soft recoveries

Active Directory

soft-linked partitions

software deployment policies

group policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

Miscrosoft Installer

MSI (Microsoft installer) 2nd 3rd

troubleshooting 2nd 3rd 4th 5th

Windows Installer service 2nd 3rd

software deployment policies

software mirrors

breaking

Software Publishers Association (SPA). [See SPA (Software Publishers Association)]

Software Publishing Certificates (SPCs). [See SPCs (Software Publishing Certificates)]

SOHO networks

Internet gateways

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

Solomon, David

SPA

(Software Publishers Association)

spanned volumes 2nd

SPAP

(Shiva PAP)

(Shiva Password Authentication Protocol) 2nd

sparse files

NTFS 2nd

SPCs

(Software Publishing Certificates)

split public/private zones

Active Directory domains 2nd 3rd

SPNs

(Service Principal Names) 2nd 3rd 4th 5th

spoolers

printer sharing

file location changes 2nd 3rd 4th 5th 6th 7th 8th

SRM

(Security Reference Monitor) 2nd

Active Directory

SSH (Secure Shell)

authentication services

SSPI

(Security Support Provider Interface)

SSPs

(Security Support Providers)

stability

domains

standalone roots

standalone servers

policies

Standard PPP Transaction Details protocol (20.3)

Standard Server 2nd 3rd

CAs (Certification Authorities)

support

memory

support

processors

support

terminal services

support

standard transactions

PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th

start times (Kerberos reply messages)

Starting DNS from a BIND File procedure (5.23)

Starting Explorer Shell Using RunAs procedure (13.6)

startup (computer)

Kerberos authentication 2nd 3rd 4th 5th 6th 7th

static IP addressing

Step-by-Step Guide to Kerberos 5 Interoperability Web site

Stock Keeping Units (SKUs). [See SKUs (Stock Keeping Units)]

stop errors

common stop errors 2nd

storage

certificates

CAs

local certificate stores 2nd 3rd

configuring 2nd 3rd 4th 5th 6th

data storage

dynamic disks

GPT disks

IA32 systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st

LDM (Logical Disk Manager) volume configurations 2nd 3rd 4th 5th 6th 7th 8th

MBR (Master Boot Record) disks

detachable storage

domains

FEK (File Encryption Key)

fixed spinning storage

keys

PKI 2nd 3rd

names 2nd

passwords 2nd 3rd 4th 5th 6th 7th

Active Directory

vunerabilities 2nd

removable storage

tape storage

WMI filters 2nd

Storing User Names and Passwords procedure (11.2)

streaming ciphers

stripe size

striped volumes 2nd

creating 2nd

Structural class

LDAP

structure rules

Active Directory 2nd

stub zones

DNS 2nd 3rd 4th

Suberror variable (OSCML)

Subject entity (certificates)

Subject Key Identifier entity (certificates)

Subject Key Identifiers (SKIs). [See Subnet Master Browser

subordinate CAs

installing

superhidden definition

Boot.ini

support

authentication

methods 2nd

drivers

large

hardware 2nd 3rd 4th

IA32 memory

legacy application support 2nd 3rd 4th

IA64 memory

legacy application support

legacy application support;file system redirection 2nd

legacy application support;Registry reflection 2nd

legacy application support;WOW64 2nd

multiprocessors

plug-and-play 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

support files

Active Directory 2nd 3rd

moving 2nd

switches

Boot.ini 2nd 3rd 4th

CHKDSK 2nd

RunAs command 2nd 3rd

SxS assemblies. [See symbols files

symmetric cipher keys

synchronization

GPOs

troubleshooting 2nd 3rd 4th

time

Synchronization Manager

offline files

managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

options

synchronous processing

CSEs (Client-Side Extensions) 2nd 3rd 4th

syntax

RunAs command 2nd

syntax rules

Active Directory 2nd

Sysfiles.inf file 2nd

Sysprep

factory options 2nd

images

auditing

limitations 2nd

Sysprepdrivers variable (OSCML)

Syspreppath variable (OSCML)

system access control lists (SACLs). [See SACLs (system access control lists)]

system failures

Ntbackup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th

system information

troubleshooting

system kernel

booting process 2nd

system partitions 2nd

expanding

system policies

tattooing

System Policy Editor

system policy verification

domains

system privileges 2nd 3rd

viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

system properties

DNS

configuring 2nd

System Restore

Ntbackup

XP desktops 2nd 3rd

system restores

System State backups

Active Directory

performing 2nd 3rd 4th

System State files

Active Directory

restoring 2nd 3rd 4th

backing up

Ntbackup 2nd

Sysvol

Active Directory

restoring 2nd

Sysvol shares