• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    Abstract class
        LDAP 
    access
        RIS images
            controlling 
        security logs
            controlling 
    access control entries (ACEs).   [See ACEs (access control entries)]
    Access Control Entry (ACE).   [See ACE (Access Control Entry)]
    access control inheritance  2nd  3rd  4th  5th  6th 
    access control lists (ACLs).   [See ACLs (access control lists)]
    access lists
        managing
            Active Directory  2nd  3rd  4th 
    access masks 
    access permissions
        Active Directory 
        domains 
        evaluation  2nd  3rd  4th  5th  6th  7th 
        GPCs
            assigning 
        GPTs
            assigning 
    access rights
        Active Directory  2nd 
            delegation  2nd  3rd  4th  5th  6th 
    access tokens  2nd  3rd  4th 
        contents
            viewing 
    accessing
        member servers
            authentication  2nd  3rd  4th  5th  6th 
    Accessing Advanced Server Parameters procedure (5.22) 
    Accessing the Remote Installation Group Policy procedure (2.10) 
    Accessing the WMI Filter Interface procedure (12.5) 
    ACCM (Asynchronous-Control-Character-Map) 
    account BDCs
        upgrading  2nd  3rd 
    account lockout policies  2nd 
    account migrations
        domains  2nd  3rd 
    ACE
        (Access Control Entry) 
    ACEs
        (access control entries) 
        canonical sorting
            exceptions 
        evaluation  2nd  3rd 
        inheritance  2nd  3rd 
        modifying 
        viewing 
    ACL Editor  2nd  3rd 
        objects
            ownership management  2nd 
    ACLs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        (access control lists) 
        access permissions
            evaluation  2nd  3rd  4th  5th  6th  7th 
        ACEs
            (access control entries) 
            evaluation  2nd  3rd 
            inheritance  2nd  3rd 
            modifying 
            viewing 
        DACLs
            (discretionary access control lists) 
        objects
            ownership management  2nd 
        permissions
            inheritance  2nd  3rd  4th 
        SACLs
            (system access control lists) 
    ACPI 
        (Advanced Configuration and Power Interface) 
        plug-and-play  2nd  3rd  4th  5th  6th  7th  8th 
            power management  2nd  3rd 
    ACPI compatibility checks
        Setup
            initial hardware recognition  2nd 
    activation
        automating 
        Windows Product Activation  2nd  3rd  4th  5th 
    Active Directory
        anonymous access  2nd 
        backing up  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
            necessity of  2nd 
            restoring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            System State backups  2nd  3rd  4th 
        classes
            derivations 
        clients  2nd 
        content rules 
        database
            compacting  2nd  3rd 
            repairing  2nd  3rd  4th 
        DNS
            dynamic updates  2nd  3rd 
            forwarders  2nd  3rd  4th  5th  6th  7th  8th 
            integrated zones 
            integration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th 
            record scavenging  2nd 
            security  2nd  3rd  4th  5th  6th 
            zone integration  2nd  3rd  4th  5th 
        DNS servers
            loss of  2nd  3rd  4th 
        domain controllers
            GC-less logons  2nd  3rd 
            loss of  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
            metadata cleanup  2nd  3rd  4th  5th  6th  7th 
        domains
            designing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th 
            domain controller placement  2nd  3rd  4th 
            domain naming master  2nd 
            FSMOs (Flexible Single Master Operations) 
            infrastructure master  2nd  3rd 
            multiple domain forest trusts  2nd 
            multiple domains  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
            multiple groups  2nd  3rd  4th  5th 
            navigation 
            PDC Emulators  2nd  3rd  4th  5th  6th  7th 
            remote access  2nd  3rd  4th  5th  6th  7th  8th 
            replication 
            RIDs (Relative IDs)  2nd 
            role master  2nd 
            root domain names  2nd  3rd  4th  5th  6th 
            schema master  2nd 
            split public/private zones  2nd  3rd 
            third-party name servers  2nd 
            Windows-based zones  2nd  3rd 
        drag-and-drop operations 
        ESE (Extensible Storage Engine) 
        forests
            in-place upgrades  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        FSMOs
            loss of  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        GPOs (Group Policy Objects)
            defaults 
        groups  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            authorization  2nd  3rd 
            Builtin groups  2nd  3rd  4th 
            classifications  2nd 
            Domain Local groups  2nd  3rd  4th  5th  6th  7th 
            Global groups  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
            Machine Local groups  2nd  3rd 
            nesting  2nd 
            Universal groups  2nd  3rd  4th  5th  6th  7th  8th 
        GUID (Globally Unique Identifier) 
        IAS (Internet Authentication Service)
            registering with  2nd  3rd 
        integrated DNS zones  2nd  3rd 
        integrated zones 
        IP subnets
            creating 
        LDAP  2nd  3rd 
        maintenance  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        namespaces  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th 
            client compatibility  2nd 
            compatibility settings 
            domains  2nd 
            forests  2nd 
            Global Catalogs  2nd  3rd  4th  5th 
            naming contexts  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            service location  2nd  3rd  4th  5th  6th 
            trees  2nd  3rd  4th 
            trust relationships  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
        null sessions  2nd  3rd 
        object
            maximum number of 
        objects
            attributes 
            classes 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd 
            protecting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        OID (Object Identifier)  2nd 
        OU
            (Organizational Unit) 
            designing 
        OUs
            designing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
            lower-level OUs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        passwords
            storage 
        PW2CA (Pre-Windows 2000 Compatible List) 
        recovery stages 
        replication
            Application naming context 
            bridgehead server selection  2nd 
            bridgehead servers  2nd 
            collision handling  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            connections  2nd  3rd 
            deleted containers  2nd 
            deleted object handling  2nd  3rd 
            deleted objects 
            forcing  2nd  3rd  4th 
            frequency  2nd  3rd  4th  5th  6th  7th 
            garbage collection  2nd  3rd  4th 
            identical distinguished names  2nd  3rd 
            inter-site replication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            inter-site topologies  2nd 
            intervals  2nd  3rd  4th  5th 
            ISTGs (Inter-Site Topology Generators)  2nd  3rd  4th  5th 
            KCC (Knowledge Consistency Checker) 
            linked values 
            loss of components  2nd  3rd  4th  5th 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
            manually controlling  2nd  3rd 
            methods  2nd  3rd  4th 
            moved objects 
            naming contexts  2nd  3rd 
            NET TIME  2nd  3rd  4th 
            new features  2nd 
            parameter control  2nd  3rd  4th  5th  6th  7th  8th 
            property metadata  2nd  3rd 
            property replication  2nd 
            RPCs (Remote Procedure Calls)  2nd 
            simultaneous modification  2nd 
            site objects  2nd  3rd  4th 
            sites  2nd  3rd 
            special operations  2nd  3rd  4th  5th  6th  7th  8th  9th 
            topology  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            transactions  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
            troubleshooting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
            WIN32TM  2nd  3rd  4th 
            WTS (Windows Time Service)  2nd  3rd 
        restoring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            authoritative restores  2nd  3rd  4th  5th  6th  7th  8th 
            backup tape time limits  2nd  3rd  4th  5th 
            permissions  2nd 
            System State files  2nd  3rd  4th 
            Sysvol  2nd 
        schema 
            class derivations  2nd 
            defination objects  2nd 
            functional operations  2nd  3rd  4th 
            object classes  2nd 
            object identification  2nd  3rd  4th 
            rules  2nd  3rd  4th 
        security  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st 
            access control inheritance  2nd  3rd  4th  5th  6th 
            access list management  2nd  3rd  4th 
            access permissions 
            access rights  2nd 
            access rights delegation  2nd  3rd  4th  5th  6th 
            descriptor contents  2nd  3rd  4th 
            event notification  2nd  3rd 
            groups  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            improvements to  2nd 
            LSA (Local Security Authority) 
            managing  2nd  3rd  4th 
            object protection  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            primaries 
            security descriptors 
            security principals  2nd 
            service accounts  2nd 
            SLS (Secondary Logon Service)  2nd  3rd  4th  5th 
            SRM (Security Reference Monitor) 
        sercurity
            RunAs  2nd  3rd  4th  5th 
        SMTP (Simple Mail Transport Protocol) 
        structure rules 
        support files  2nd  3rd 
            moving  2nd 
        syntax rules 
        tape backups 
        trust relationships 
        utilities  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th 
            ADSI Edit tool  2nd  3rd  4th  5th  6th  7th  8th 
            DCDIAG 
            LDAP browser  2nd  3rd  4th  5th 
            management consoles  2nd  3rd 
            Schema console  2nd  3rd  4th  5th  6th  7th 
        WAN links
            loss of 
    Active Directory Migration Tool (ADMT).   [See ADMT (Active Directory Migration Tool)]2nd  [See ADMT (Active Directory Migration Tool)]
    Active Directory Services Interface (ADSI).   [See ADSI (Active Directory Services Interface)]
    Active Directory User Objects 
    AD Users and Computers
        home directories
            assigning  2nd  3rd 
    adapters
        network adapters
            configuring  2nd  3rd 
            installing  2nd  3rd 
    adding
        attributes
            Global Catalog 
        hardware  2nd 
    Adding a Static WINS Mapping procedure (4.5) 
    Adding File Types to the File Exclusion List procedure (21.1) 
    address mapping
        NAT (Network Address Translation)  2nd  3rd 
    Address Windowing Extensions (AWE).   [See AWE (Address Windowing Extensions)]
    addresses
        determining
            Network layers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        MAC addresses
            components 
            viewing 
    Adleman, Len 
    ADM listings
        administrative template files  2nd  3rd  4th 
    ADM template files  2nd  3rd  4th  5th  6th 
    administrative access
        DNS
            limiting 
    administrative shares 
        CD-ROM drives 
        re-creating 
        recreating 
    administrative template policies  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th 
        ADM listings  2nd  3rd  4th 
        ADM template files  2nd  3rd  4th  5th  6th 
        creating  2nd 
        policies  2nd 
        preferences  2nd 
        Registry.pol files  2nd 
    administrator passwords
        managing
            Setup  2nd 
    adminstrative template policies
        preferences  2nd 
    ADMT
        (Active Directory Migration Tool)  2nd 
        improvements to 
    ADSI (Active Directory Services Interface) 
    ADSI Edit tool
        Active Directory  2nd  3rd  4th  5th  6th  7th  8th 
    ADSM backup package 
    Advanced Configuration and Power Interface (ACPI).   [See ACPI (Advanced Configuration and Power Interface)]
    Advanced Encryption Standard (AES).   [See AES (Advanced Encryption Standard)]2nd  [See AES (Advanced Encryption Standard)]
    Advanced property (printers)  2nd  3rd 
    Advanced Research Project Administration (ARPA).   [See ARPA (Advanced Research Project Administration)]
    Advanced RISC Computing (ARC) path.   [See ARC (Advanced RISC Computing) path]
    AES
        (Advanced Encryption Standard) 
    AES (Advanced Encryption Standard) 
    agent-based network backups 
    AIA
        (Authority Information Access)  2nd  3rd 
    AIA (Authority Information Access) containers (Enterprise CAs) 
    AIPIPA (Automatic Private IP Addressing) 
    AKIs
        (Authority Key Identifiers) 
    algorithms
        data encryption  2nd  3rd  4th 
        DSA (Digital Signature Algorithm) 
        encryption
            RC algorithms 
        hashing algorithms
            passwords 
        KCC (Knowledge Consistency Checker) 
    allocation units.   [See clusters]
    Allow permissions 
        assigning 
        cumulative Allow permissions 
    alternative Startfrom files (RIS) 
    analysis snap-in
        security policies  2nd  3rd  4th 
    Analyze option (Secedit utility) 
    anonymous access
        Active Directory  2nd 
        NT4 RAS servers  2nd 
    anonymous logons
        passwords  2nd  3rd  4th 
    ANSI
        directory services 
    answer section (DNS packets) 
    application compatibility
        domain controllers
            upgrades 
        Windows NT4
            backups 
    application compatibility checks
        upgrades  2nd  3rd 
    Application layer
        SMBs (Server Message Blocks)  2nd  3rd 
    Application layer (OSI)  2nd 
    Application mode (terminal services) 
    Application naming conctext
        replication
            Active Directory 
    Application naming context
        Active Directory  2nd  3rd  4th  5th  6th 
    application naming contexts  2nd 
    application servers
        CALs 
    application verification 
    applications
        Drwatson.exe  2nd  3rd 
    Applying Inheritable Rights to an Active Directory Container procedure (13.1) 
    ARC
        (Advanced RISC Computing) path 
        Boot.ini  2nd  3rd 
    ARC paths
        Boot.ini
            special paths  2nd  3rd 
    architecture
        security  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        Windows .NET  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th 
    architectures
        sites
            designing  2nd  3rd  4th  5th  6th  7th 
    archived certificates
        recovering  2nd  3rd 
    archiving
        certificates
            CAs  2nd  3rd  4th  5th  6th  7th 
        keys
            PKI  2nd 
    ArcServe backup package 
    ARPA
        (Advanced Research Project Administration) 
    ASQ (Attribute Scoped Query) 
    ASR
        (Automated System Recovery) 
    ASR (Automated System Recovery)
        Ntbackup  2nd  3rd  4th  5th  6th 
    assemblies 
    assigned packages
        software deployment 
    assigning
        drive letters
            Setup  2nd  3rd  4th  5th  6th  7th 
        permission inheritance  2nd 
        permissions 
    Assigning a Home Directory Using the Command Line procedure (19.3) 
    Assigning a User Home Directory with AD Users and Computers procedure (19.2) 
    Assigning Custom UPN Suffixes procedure (8.1) 
    asymmetric cipher keys 
    asynchronous processing
        CSEs (Client-Side Extensions)  2nd 
    Asynchronous-Control-Character-Map (ACCM).   [See ACCM (Asynchronous-Control-Character-Map)]
    Atapi.sys drivers 
    atomic transactions
        Active Directory 
    Attribute Scoped Query (ASQ).   [See ASQ (Attribute Scoped Query)]
    attributes
        Boot.ini 
        Default Policy Domain GPC 
        Global Catalog
            adding 
            deleting 
        NTFS  2nd  3rd 
        objects
            Active Directory 
        X.500  2nd  3rd  4th 
    audio
        redirecting  2nd 
    audit logs  2nd 
    Audit Monitor for Logon/Logoff procedure (11.13) 
    Audit Monitoring for Printers procedure (11.14) 
    auditing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        audit logs  2nd 
        enabling  2nd  3rd 
        event logs
            managing  2nd  3rd  4th  5th 
        images
            Sysprep 
        kernel object auditing 
        recommendations  2nd  3rd  4th  5th  6th  7th  8th  9th 
    AUDITPOL utility
        event logs
            managing  2nd  3rd  4th  5th 
    authenticated users
        limitations
            domain/computer joining 
    authentication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
        classic NT authentication
            limitations  2nd 
        domains 
            computer authentication 
            trust authentication 
        IAS (Internet Authentication Services)
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        Kerberos  2nd  3rd  4th  5th  6th 
            authenticator  2nd 
            cross-domain authentication  2nd  3rd  4th 
            member server access  2nd  3rd  4th  5th  6th 
            MITv5 Kerberos interoperability  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
            Mixed domains 
            mutual authentication  2nd 
            PACs (Privilege Access Certificates)  2nd  3rd  4th  5th  6th 
            policies  2nd 
            preauthenticator  2nd 
            short-cut trusts  2nd 
            situations 
            tickets  2nd  3rd  4th  5th 
            transactions  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
            vocabulary  2nd  3rd  4th  5th  6th 
        methods
            support  2nd 
        pass-through authentications 
        PPP
            CHAP (Challenge Handshake Authentication Protocol)  2nd  3rd  4th 
            dial-up authentication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            domain authentication  2nd  3rd  4th 
            EAP (Extensible Authentication Protocol)  2nd  3rd  4th  5th  6th  7th  8th 
            Mixed domains  2nd  3rd  4th 
            MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)  2nd  3rd  4th 
            multidomain authentication  2nd  3rd 
            NT4 limitations  2nd  3rd  4th 
            PAP (Password Authentication Protocol)  2nd  3rd  4th  5th  6th  7th 
            RADIUS (Remote Authentication Dial-In User Services)  2nd  3rd  4th  5th  6th  7th  8th 
            SPAP (Shiva Password Authentication Protocol)  2nd 
            standard transactions  2nd  3rd  4th  5th 
        PPP (Point-to-Point Protocol)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th 
    authentication functions
        Kerberos 
    authentication packages
        LSA  2nd 
    authenticator
        Kerberos  2nd 
    authoritative query responses
        DNS  2nd 
    authoritative restores
        Active Directory  2nd  3rd  4th  5th  6th  7th  8th 
    authoritative servers
        DNS
            query handling  2nd  3rd  4th  5th 
    Authority Information Access (AIA).   [See AIA (Authoity Information Access)]2nd  [See AIA (Authoity Information Access)]3rd  [See AIA (Authoity Information Access)]
    Authority Information Access entity (certificates) 
    Authority Key Identifier (AKIs).   [See AKIs (Authority Key Identifiers)]
    Authority Key Identifier entity (certificates) 
    authorization
        groups
            Active Directory  2nd  3rd 
    authorization data
        Kerberos  2nd  3rd  4th  5th  6th  7th  8th  9th 
    authorization data field (encrypted tickets) 
    authorizations
        DHCP servers  2nd  3rd 
    auto-enrollment
        certificates  2nd  3rd 
        PKI 
    AUTOCHK
        CHKDSK
            compared  2nd 
        configuring
            CHKNTFS  2nd 
        file systems
            fault tolerance  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        repairs
            forcing to 
    Automated System Recovery (ASR).   [See ASR (Automated System Recovery)]
    Automatic Private IP Addressing (APIPA) 
    automating
        activation 
        deployment
            Windows .NET  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd  54th  55th  56th  57th  58th  59th  60th  61st  62nd  63rd  64th  65th  66th  67th  68th  69th  70th  71st  72nd  73rd  74th 
        product key entry 
    Auxiliary class
        LDAP 
    AWE
        (Address Windowing Extensions)  2nd  3rd