[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
SAC (Special Administration Console)
SACLs
Safe Mode
SAM
(Security Account Manager) 2nd 3rd
domains
samba clients
SAS
SAS (Secure Attention Sequence)
scavenging
Dynamic DNS
records
scheduling
backup jobs 2nd 3rd 4th 5th 6th
schema
functional operations 2nd 3rd 4th
object identification 2nd 3rd 4th
Schema console
Active Directory 2nd 3rd 4th 5th 6th 7th
schema master
Schema Master
schema upgrades
Schema.ini file (Active Directory)
schemas
scope options
DHCP
script
running
script policies
group policies 2nd 3rd 4th 5th 6th 7th
script processing
CSEs (Client-Side Extensions) 2nd
scripted installations 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
scripts
domains
unattended scripts
creating 2nd 3rd 4th 5th 6th 7th 8th 9th
VBScript
SCSI
problems
SCSI adapters
SCSI cables
SCSI drivers
SCSI drives
searches
searching
shared folders
Searching with LDP procedure (6.4)
secondaries
Secondary Logon Service (SLS). [See DNS 2nd 3rd
secondary servers
DNS
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th
sectors
file systems 2nd 3rd 4th 5th 6th 7th
Secure Attention Sequence (SAS). [See 2nd [See Secure Hash Algorithm (SHA). [See SHA-1 (Secure Hash Algorithm)]
Secure Hash Standard (SHS). [See SHS (Secure Hash Standard)]
security
access permissions
evaluation 2nd 3rd 4th 5th 6th 7th
ACLs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
access permission evaluation 2nd 3rd 4th 5th 6th 7th
Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
access control inheritance 2nd 3rd 4th 5th 6th
access list management 2nd 3rd 4th
access rights delegation 2nd 3rd 4th 5th 6th
descriptor contents 2nd 3rd 4th
groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
LSA (Local Security Authority)
object protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
SLS (Secondary Logon Service) 2nd 3rd 4th 5th
SRM (Security Reference Monitor)
architecture 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
auditing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
event log managment 2nd 3rd 4th 5th
recommendations 2nd 3rd 4th 5th 6th 7th 8th 9th
authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
Kerberos 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th
MITv5 Kerberos interoperability 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
backups
EMS 2nd 3rd 4th 5th 6th 7th 8th
EMS (Emergency Management Services)
interactive backups 2nd 3rd 4th 5th 6th 7th
job scheduling 2nd 3rd 4th 5th 6th
BSOD (Blue Screen of Death)
recovering from 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
connections
ICF (Internet Connection Firewall) 2nd
Dynamic DNS
encryption
PKI (Public Key Infrastructure) 2nd 3rd
file encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
certificate management 2nd 3rd 4th 5th 6th 7th
data encryption algorithms 2nd 3rd 4th
disabling 2nd 3rd 4th 5th 6th 7th
EFS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th
EFS file transactions 2nd 3rd 4th 5th 6th 7th 8th
FEK (File Encryption Key) 2nd 3rd 4th 5th 6th
file decryption process 2nd 3rd
private key protection 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
WebDAV 2nd 3rd 4th 5th 6th 7th 8th
authorization data 2nd 3rd 4th 5th 6th 7th 8th 9th
LSA
components 2nd 3rd 4th 5th 6th 7th 8th 9th
Ntbackup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th
passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
computer passwords 2nd 3rd 4th
credentials caches 2nd 3rd 4th
handling for local accounts 2nd
reset disks 2nd 3rd 4th 5th 6th
reversible passwords 2nd 3rd 4th 5th
storage 2nd 3rd 4th 5th 6th 7th 8th 9th
vunerabilities 2nd 3rd 4th 5th 6th
inheritance 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
PKI
Recovery Console 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
restores 2nd 3rd 4th 5th 6th 7th
security descriptors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
SIDs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
terminal services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
viruses
Windows NT
lack of management granularity
limitations of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
nontransitive trust relationships
restricted account database size
Security Account Manager (SAM). [See SAM (Security Account Manager)]2nd [See SAM (Security Account Manager)]3rd [See SAM (Security Account Manager)]
security checks
security databases
security descriptors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
DACLs (discretionary access control lists)
managing
command-line tools 2nd 3rd 4th 5th 6th 7th
primary group SIDs for the owner
SACLs (system access control lists)
security groups
group policies
filtering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
security logs
access
security packages
security policies
default security templates 2nd 3rd
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
security-related GPT files 2nd 3rd 4th 5th
specialty security templates 2nd
templates
security principals
Security Reference Monitor (SRM). [See SRM (Security Reference Monitor)]2nd [See SRM (Security Reference Monitor)]
Security Requirements for Cryptographic Modules
Security Support Provider Interface (SSPI). [See SSPI (Security Support Provider Interface)]
Security Support Providers (SSPs). [See SSPs (Security Support Providers)]
security templates
security-related GPT files
Seizing a FSMO Role procedure (10.5)
Selecting a New Replication Partner procedure (7.11)
sending
Seperator Pages property (printers) 2nd 3rd 4th
Serial Number entity (certificates)
Server Access Transaction Using Kerberos procedure (11.7)
server file systems
Server Message Block (SMB) command protocol. [See moving between 2nd 3rd
server-based files
file encryption 2nd 3rd 4th 5th 6th
Kerberos
trusted for delegation 2nd 3rd 4th
bridgehead servers
client-side caching
configuring 2nd 3rd 4th 5th 6th 7th 8th
DHCP servers
DNS
secondary servers 2nd 3rd 4th 5th 6th
DNS servers
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
FSMO servers
GC (Global Catalog) servers 2nd
headless servers
logon servers
managing
RDP (Remote Desktop Protocol) 2nd 3rd
via remote desktop 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
naming
print servers
remote access servers
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th
standalone servers
terminal services
security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
service account authentication (Kerberos)
service accounts
Active Directory
service drivers
service locations
service locator records
service pack installation
Service Principal Names (SPNs). [See SPNs (Service Principal Names)]
Service Principal Names) 2nd 3rd 4th 5th
services
Active Directory
Configuration naming context
Services for Macintosh (SFM). [See SFM (Services for Macintosh)]
Services for UNIX (SFU) Web site
session key field (encrypted tickets)
Session Keys (Kerberos reply messages)
Session Manager
set [no]debug command (Nslookup)
set [no]deframe command (Nslookup)
set [no]recurse command (Nslookup)
set querytype command (Nslookup)
setting
intervals
roles
Setting Folder Encryption procedure (17.7)
Setting Periodic Scavenging procedure (5.21)
Setting Permissions on RIS Images procedure (2.9)
Setting the Fail on Load if Bad Zone option procedure (5.24)
Setup
booting
Character Phase Setup
configuration phase 2nd 3rd 4th 5th
setup
Setup
Graphic Phase Setup
installation 2nd 3rd 4th 5th 6th 7th 8th 9th
graphical phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
administrator password management 2nd
IA64 Setup
post-Setup configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
text phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
drive letter assignments 2nd 3rd 4th 5th 6th 7th
initial hardware recognition 2nd 3rd
setup batch files
Setup Information File (SIF). [See 2nd [See RIS 2nd 3rd
creating 2nd 3rd 4th 5th 6th 7th 8th 9th
SFM
SFU (Services for UNIX) Web site
SHA-1
shadows
share point verification
shared folders
connecting to 2nd 3rd 4th 5th 6th
browsers 2nd 3rd 4th 5th 6th 7th 8th
shared resources 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
clients
printing configuration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th
file sharing
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
Dfs (Distributed File Sharing) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th
remote share creation 2nd 3rd 4th 5th
share creation 2nd 3rd 4th 5th 6th 7th 8th
network applications 2nd 3rd 4th
network services 2nd 3rd 4th 5th
print services
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
printer sharing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
printer drivers 2nd 3rd 4th 5th 6th 7th 8th 9th
spoolers 2nd 3rd 4th 5th 6th 7th 8th 9th
providers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
MPRs (Multiple Provider Routers) 2nd 3rd
MUPs (Multiple UNC Providers) 2nd
redirectors 2nd 3rd 4th 5th 6th 7th 8th 9th
default share points 2nd 3rd 4th
shared folders
connecting to 2nd 3rd 4th 5th 6th
shares
administrative shares
creating
remote computers 2nd 3rd 4th 5th
ICS (Internet Connection Sharing) 2nd 3rd 4th 5th
names
Sharing property (printers) 2nd 3rd 4th
sharing. [See shells. [See domains 2nd
Shiva PAP (SPAP). [See SPAP (Shiva PAP)]
short name generation
short name preservation
files
short-cut trusts
shortcut trusts
SHS
SID history
domains
SIDs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
SIF (Setup Information File) 2nd
Signature Algorithm entity (certificates)
signature() entry
Simple Mail Transport Protocol (SMTP). [See 2nd [See Simple Network Management Protocol (SNMP). [See SNMP (Single Network Management Protocol)]
Simple Network Time Protocol (SNTP). [See SNTP (Simple Network Time Protocol)]
simultaneous modification
replication
Single Instance Storage (SIS). [See SIS (Single Instance Storage)]2nd [See SIS (Single Instance Storage)]3rd [See SIS (Single Instance Storage)]
single point of failure
SIS
(Single Instance Storage) 2nd 3rd
SIS (Single Instance Storage) groveler 2nd 3rd
site link bridge objects
site objects
site policies
GPCs
sites
architectures
designing 2nd 3rd 4th 5th 6th 7th
Configuration naming context
inter-site replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
links
replication
server objects
sizes
SKIs (Subject Key Identifiers)
SKUs
slipstreaming
service pack installations 2nd 3rd
Slipstreaming Service Pack Files procedure (2.4)
slow link processing
SLS (Secondary Logon Service)
Active Directory
smart cards
remote access
certificate template preparation 2nd 3rd 4th
deploying for 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th
enrollment agent certificates 2nd 3rd 4th 5th 6th 7th
RRAS configuration 2nd 3rd 4th 5th
user enrollment 2nd 3rd 4th 5th 6th 7th 8th 9th
SMB
SMB (Server Message Block) command protocol
SMBs
(Server Message Blocks) 2nd 3rd
traffic
SMTP
(Simple Mail Transport Protocol)
SMTP (Simple Mail Transport Protocol)
SMTP replication restictions
SNMP
(Simple Network Management Protocol)
SNTP
(Simple Network Time Protocol)
soft recoveries
software deployment policies
group policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
MSI (Microsoft installer) 2nd 3rd
troubleshooting 2nd 3rd 4th 5th
Windows Installer service 2nd 3rd
software mirrors
Software Publishers Association (SPA). [See SPA (Software Publishers Association)]
Software Publishing Certificates (SPCs). [See SPCs (Software Publishing Certificates)]
SOHO networks
Internet gateways
configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
SPA
(Software Publishers Association)
SPAP
(Shiva Password Authentication Protocol) 2nd
sparse files
SPCs
(Software Publishing Certificates)
split public/private zones
Active Directory domains 2nd 3rd
SPNs
(Service Principal Names) 2nd 3rd 4th 5th
spoolers
file location changes 2nd 3rd 4th 5th 6th 7th 8th
SRM
(Security Reference Monitor) 2nd
SSH (Secure Shell)
SSPI
(Security Support Provider Interface)
SSPs
stability
standalone servers
Standard PPP Transaction Details protocol (20.3)
CAs (Certification Authorities)
memory
processors
terminal services
standard transactions
PPP (Point-to-Point Protocol) 2nd 3rd 4th 5th
start times (Kerberos reply messages)
Starting DNS from a BIND File procedure (5.23)
Starting Explorer Shell Using RunAs procedure (13.6)
startup (computer)
Kerberos authentication 2nd 3rd 4th 5th 6th 7th
Step-by-Step Guide to Kerberos 5 Interoperability Web site
Stock Keeping Units (SKUs). [See SKUs (Stock Keeping Units)]
stop errors
certificates
local certificate stores 2nd 3rd
configuring 2nd 3rd 4th 5th 6th
IA32 systems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
LDM (Logical Disk Manager) volume configurations 2nd 3rd 4th 5th 6th 7th 8th
MBR (Master Boot Record) disks
keys
passwords 2nd 3rd 4th 5th 6th 7th
Storing User Names and Passwords procedure (11.2)
Structural class
structure rules
stub zones
Subject Key Identifier entity (certificates)
Subject Key Identifiers (SKIs). [See Subnet Master Browser
superhidden definition
support
authentication
drivers
IA32 memory
legacy application support 2nd 3rd 4th
IA64 memory
legacy application support;file system redirection 2nd
legacy application support;Registry reflection 2nd
legacy application support;WOW64 2nd
plug-and-play 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
support files
switches
SxS assemblies. [See symbols files
synchronization
GPOs
Synchronization Manager
offline files
managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
synchronous processing
CSEs (Client-Side Extensions) 2nd 3rd 4th
syntax
syntax rules
Sysprep
images
Sysprepdrivers variable (OSCML)
system access control lists (SACLs). [See SACLs (system access control lists)]
system failures
Ntbackup 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th
system information
system kernel
system policies
system policy verification
viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
system properties
DNS
System Restore
Ntbackup
System State backups
Active Directory
Active Directory
backing up
Sysvol
Active Directory