• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    CA
        (Certification Authority) 
    CA hierarchy checks 
    CA Version entity (certificates) 
    cache-coherent Non-Uniform Memory Allocation (ccNUMA).   [See ccNUMA (cache-coherent Non-Uniform Memory Allocation)]
    cached logon credentials
        passwords 
    caches
        L2 caches  2nd 
    caching
        client-side caching 
    caching-only name server
        DNS 
    caching-only servers
        DNS
            configuring  2nd  3rd 
    CAL
        (Client Access License) 
    CALs
        application servers 
    canonical sorting
        ACEs
            exceptions 
    CAPTURE command (NetWare) 
    CAs
        (Certification Authorities)  2nd  3rd  4th  5th 
        AIA (Authority Information Access)  2nd  3rd 
        certificate storage 
        certificates
            archiving  2nd  3rd  4th  5th  6th  7th 
            enrollment  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
        CRLs
            (Certificate Revocation Lists)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            obtaining via Windows Update  2nd  3rd 
            publication  2nd  3rd  4th 
        Enterprise CAs  2nd 
            certificate templates  2nd  3rd  4th  5th 
        hierarchies  2nd  3rd  4th 
        installing  2nd  3rd  4th 
        root CAs 
        root certificate updates 
        Standard Server
            support 
        trust hierarchies
            designing  2nd  3rd  4th  5th 
        trusts  2nd  3rd  4th  5th 
    cataloging
        tapes  2nd 
    Cataloging a Tape procedure (21.6) 
    CCITT
        (Comit Consultatif International Tlphonique et Tlgraphique) 
    ccNUMA (cache-coherent Non-Uniform Memory Allocation) 
    CD-ROM drives
        administrative shares 
        troubleshooting 
    CD-ROM file system 
    CD-RW drives  2nd 
    Cdfs.sys drivers 
    CDP (CRL Distribution Points) container (Enterprise CAs) 
    CDPs entity (certificates) 
    cell-switched networks 
    cells
        Registry 
    Certificate Management Messages over CMS (CMC).   [See CMC (Certificate Management Messages over CMS)]2nd  [See CMC (Certificate Management Messages over CMS)]
    Certificate Request Wizard 
    Certificate Revocation Lists (CRLs).   [See CRLs (Certificate Revocation Lists)]
    Certificate Template entity (certificates) 
    certificate templates container (Enterprise CAs) 
    certificates 
        archiving  2nd  3rd  4th  5th  6th  7th 
        CAs
            (Certification Authorities)  2nd  3rd  4th  5th 
            CRLs (Certificate Revocation Lists)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            Enterprise CAs  2nd 
            hierarchies  2nd  3rd  4th 
            installing  2nd  3rd  4th 
            storage 
            trust hierarchies  2nd  3rd  4th  5th 
            trusts  2nd  3rd  4th  5th 
        certificate snap-in 
        documentation  2nd 
        elements 
        enrollment  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
            auto-enrollment  2nd  3rd 
            Certificates snap-in  2nd  3rd 
            CMC (Certificate Management Messages over CMS)  2nd 
            Web enrollment  2nd  3rd  4th 
        enrollment agent certificates
            issuing;remote access  2nd  3rd  4th  5th  6th  7th 
        Enterprise CAs
            certificate templates  2nd  3rd  4th  5th 
        Kerberos
            PACs (Privilege Access Certificates)  2nd  3rd  4th  5th  6th 
        local certificate stores  2nd  3rd 
        managing  2nd  3rd  4th  5th  6th  7th 
            CIPHER command 
        OCSP (Online Certificate Status Protocol)  2nd 
        PKI  2nd  3rd  4th  5th  6th 
            templates 
        PKI (Public Key Infrastructure) 
        recovering  2nd  3rd 
        requests 
        smart cards
            testing  2nd 
        SPCs (Software Publishing Certificates) 
        templates
            preparing for remote access  2nd  3rd  4th 
        validity checks  2nd  3rd  4th  5th  6th  7th 
        Web Server
            support 
    certificates snap-in 
    Certificates snap-in
        certificates  2nd  3rd 
    Certification Authority (CA).   [See CA (Certification Authority)]
    certified hardware  2nd 
    Certmgr utility 
    CERTUTIL utitlity 
    Challenge Handshake Authentication Protocol (CHAP).   [See CHAP (Challenge Handshake Authentication Protocol)]
    Change Journal
        file systems  2nd  3rd  4th  5th 
        USN (Update Sequence Number) 
    ChangePDC permission (Active Directory) 
    Changing a Role Master Using an MMC Console procedure (10.3) 
    Changing Active Directory File Locations procedure (10.13) 
    Changing Default RDP Port in the TSWeb Interface procedure (19.5) 
    Changing Drive Letters procedure (14.12) 
    Changing Log File Settings procedure (11.10) 
    Changing the Network Provider Order procedure (16.2) 
    CHAP
        (Challenge Handshake Authentication Protocol)  2nd  3rd  4th  5th 
    CHAP Authentication Transaction procedure (20.1) 
    Character Phase Setup
        installation  2nd  3rd  4th  5th 
    Charting Performance Monitor Logs procedure (3.8) 
    checking
        Event logs  2nd  3rd  4th 
    checklist
        installation  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
    child domains
        upgrading  2nd  3rd 
    child trusts
        Active Directory 
    chipsets  2nd 
    CHKDSK
        AUTOCHK
            compared  2nd 
        file systems
            fault tolerance  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        switches  2nd 
    CHKNTFS
        AUTOCHK
            configuring  2nd 
    CIFS (Common Internet File System) 
    CIPHER command
        certificates
            managing 
        file encryption 
        folder encryption 
    cipher keys (PKI)  2nd 
    circuit-switched networks 
    CISVC
        (Content Indexing Service) 
    CIW
        (Client Installation Wizard)  2nd  3rd  4th  5th  6th  7th 
        screens
            customizing  2nd  3rd  4th  5th 
    Clark, Jason D. 
    class derivations
        schema
            Active Directory  2nd 
    class drivers 
    Class2.sys drivers 
    classes
        derivations
            Active Directory 
        LDAP
            information model  2nd 
            inheritance  2nd  3rd  4th 
            object instances  2nd 
        objects
            Active Directory 
        X.500  2nd  3rd  4th 
    classic interface
        reverting to 
    Classic NT Link Search Pattern procedure (15.1) 
    Classic NT storage
        passwords 
    Classic NT4 RAS access
        domains
            upgrading  2nd  3rd 
    classic scripts
        domains
            upgrading  2nd 
    classifications
        groups
            Active Directory  2nd 
    Classpnp.sys drivers 
    Client Access License (CAL).   [See CAL (Client Access License)]
    Client Installation Wizard (CIW).   [See CIW (Client Installation Wizard)]
    client name resolution
        WINS  2nd  3rd 
    client printer connections
        automating  2nd  3rd 
    Client Services for Netware 
    client-side caching 
    client-side extensions (CSEs).   [See CSEs (client-side extensions)]
    Client/Server Runtime Subsystem (CSRSS).   [See CSRSS (Client/Server Runtime Subsystem)]
    clientÕs name and realm field (encrypted tickets) 
    clients 
        compatibility
            Active Directory  2nd 
        DNS
            configuring  2nd  3rd  4th  5th 
            resolvers  2nd  3rd  4th  5th 
        downlevel cliens
            home directory mapping  2nd 
        fax servers
            connecting to  2nd 
        installing 
        Kerberos 
        Kerberos authentication
            situations 
        print clients
            troubleshooting  2nd 
        printing
            configuration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd  54th 
        referrals 
        WINS
            configuring  2nd  3rd 
    clipboard mapping  2nd 
    Clonegg script 
    Cloneggu script 
    Clonelg script 
    Clonepr scripts 
    cloning
        disks
            deployment  2nd  3rd  4th  5th  6th  7th  8th  9th 
            problems 
            Sysprep  2nd  3rd  4th  5th  6th  7th  8th 
    cluster addressing
        NTFS  2nd 
    cluster mapping
        NTFS  2nd 
    cluster maps
        FAT  2nd  3rd  4th  5th 
    cluster size 
    clusters
        Enterprise Server
            support 
        file systems  2nd  3rd  4th  5th  6th  7th 
            cluster size 
    CMC (Certificate Management Messages over CMS)  2nd 
    Cogswell, Bryce 
    collision handling
        replication
            Active Directory  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
    collisions
        hashes 
    Comit Consultatif International Tlphonique et Tlgraphique (CCITT).   [See CCITT (Comite Consultatif International Telephonique et Telegraphique)]
    command line
        Dfs
            managing  2nd 
        home directories
            creating  2nd  3rd  4th  5th  6th 
        RRAS
            managing  2nd  3rd  4th  5th 
        shares
            creating  2nd 
        terminal services
            managing  2nd  3rd  4th  5th  6th 
    command lines
        forced updates
            CSEs (Client-Side Extensions) 
    command-line
        disks
            managing  2nd  3rd  4th  5th 
        file encryption
            administration improvements 
        printing
            administration  2nd  3rd  4th  5th 
    command-line management
        DNS  2nd 
    command-line tools
        PKI  2nd  3rd  4th  5th 
        security descriptors
            managing  2nd  3rd  4th  5th  6th  7th 
    commands
        DUMPFSMOS 
        RunAs
            profiles 
            switches  2nd  3rd 
            syntax  2nd 
    Common Internet File System (CIFS).   [See CIFS (Common Internet File System)]
    common names
        namespaces
            LDAP  2nd  3rd 
    Common.adm legacy template 
    compacting
        Active Directory database  2nd  3rd 
    compatibility settings
        Active Directory 
    components
        groups
            policies  2nd  3rd 
        LSA  2nd  3rd  4th  5th  6th  7th  8th  9th 
    compression
        file compression  2nd  3rd  4th  5th 
        files
            NTFS  2nd  3rd  4th  5th  6th 
    computer account migrations
        domains  2nd  3rd 
    computer authentication
        domains 
    Computer Migration Wizard 
    computer passwords  2nd 
        troubleshooting  2nd 
    computer policies 
        GPOs  2nd  3rd 
    computer startup
        Kerberos authentication  2nd  3rd  4th  5th  6th  7th 
    computers
        domains
            joining to 
    conditional forwarding
        DNS  2nd  3rd 
        name servers 
    configuration
        AUTOCHK
            CHKNTFS  2nd 
        client-side caching  2nd  3rd  4th  5th  6th  7th  8th 
        clients
            printing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd  54th 
        data storage  2nd  3rd  4th 
        demand-dial routers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        devices  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
            CPUs  2nd 
            EFI disk utililities  2nd  3rd  4th  5th  6th 
            multiple displays  2nd 
            Windows Update  2nd  3rd  4th 
        DHCP
            DNS support  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        DNS
            caching-only servers  2nd  3rd 
            delegation  2nd  3rd  4th  5th 
            hierarchical zones  2nd  3rd  4th  5th  6th  7th  8th 
            root hints  2nd  3rd 
            secondary servers  2nd  3rd  4th  5th  6th  7th  8th  9th 
        DNS clients  2nd  3rd  4th  5th 
        DNS servers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
        DRAs  2nd  3rd  4th 
        drives  2nd 
        Fax service  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        file sharing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            administrative shares  2nd 
            remote share creation  2nd  3rd  4th  5th 
            share creation  2nd  3rd  4th  5th  6th  7th  8th 
            share permissions  2nd  3rd 
            XP desktops  2nd  3rd 
        final configuration  2nd  3rd  4th 
        IA64 storage  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        IAS (Internet Authentication Services)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        ICF  2nd  3rd  4th 
        inter-site replication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        Internet gateways
            NAT  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
        Lmhosts  2nd 
        memory dumps  2nd  3rd  4th 
        modems
            for remote access  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
        multiple domains
            logons  2nd  3rd 
        NAT  2nd  3rd  4th 
            in RRAS  2nd 
        network adapters  2nd  3rd 
        network bridges  2nd  3rd  4th  5th  6th  7th 
        paging files 
        post Setup configuration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
        remote access servers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th 
        RIS server
            verification 
        RIS servers  2nd  3rd  4th  5th 
        RRAS  2nd  3rd  4th  5th  6th  7th  8th 
            smart card acceptance  2nd  3rd  4th  5th 
        security policies  2nd  3rd 
        Setup
            configuration phase  2nd  3rd  4th 
            graphical phase  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            IA64 differences  2nd  3rd  4th  5th  6th 
            text phase  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
        smart cards
            remote access 
        storage  2nd 
        troubleshooting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        VPNs
            connections  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th 
        WINS
            clients  2nd  3rd 
            replication  2nd  3rd  4th 
        WMI filters  2nd  3rd  4th 
    Configuration naming context 
        Active Directory 
            display specifiers  2nd  3rd 
            extended rights  2nd 
            Lost and Found 
            partitions 
            physical locations 
            services 
            sites 
    configuration phase
        Setup  2nd  3rd  4th  5th 
            initial user logon 
    Configure option (Secedit utility) 
    Configure Your Server Wizard  2nd 
    Configuring a CA to Archive Certificates procedure (18.4) 
    Configuring a Caching-Only Server procedure (5.16) 
    Configuring a Cross-Realm Trust procedure (11.8) 
    Configuring a Demand-Dial Router procedure (20.12) 
    Configuring a DNS Server to Use a Forwarder procedure (5.17) 
    Configuring a Dynamic Zone procedure (5.18) 
    Configuring a GPO Security Descriptor to Filter Policy Recipients procedure (12.4) 
    Configuring a Remote Installation Services Image procedure (2.7) 
    Configuring a Remote Installation Services Server procedure (2.8) 
    Configuring a Secondary Server procedure (5.13) 
    Configuring a Spanned Volume procedure (14.6) 
    Configuring a WINS Client procedure (4.4) 
    Configuring an RRAS Server as an IAS Client procedure (20.18) 
    Configuring and Scheduling a Backup Job procedure (21.4) 
    Configuring Automatic Connection Pickup procedure (20.13) 
    Configuring Delegations procedure (5.11) 
    Configuring DNS Information for TCP/IP Interface Properties procedure (5.5) 
    Configuring DNS Information in the System Properties Window procedure (5.6) 
    Configuring NAT and ICF procedure (20.14) 
    Configuring Performance Monitor to Collect kernel Memory Statistics procedure (3.7) 
    Configuring Replmon procedure (7.13) 
    Configuring Root Hints procedure (5.10) 
    Configuring RRAS to Use RADIUS Authentication procedure (20.19) 
    Configuring Scavenging procedure (5.20) 
    Configuring Scope Options procedure (5.26) 
    Configuring the Password Migration Agent procedure (9.4) 
    Configuring the System to Dump Only the Contents of the Kernel Memory procedure (1.3) 
    Configuring WINS Replication procedure (4.6) 
    connections
        browsers
            troubleshooting  2nd  3rd 
        client printer connections
            automating  2nd  3rd 
        dial-in connections
            checking  2nd  3rd  4th 
        ICF (Internet Connection Firewall)  2nd 
        ICS (Internet Connection Sharing)  2nd  3rd  4th  5th 
        modems
            testing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            troubleshooting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
        replication
            Active Directory  2nd  3rd 
            manually creating  2nd 
        shared folders  2nd  3rd  4th  5th  6th 
            browsers  2nd  3rd  4th  5th  6th  7th  8th 
            searching 
    console (WINS)
        configuring  2nd 
    console logons
        delaying 
    console sessions
        inviting users to 
    consolidated permissions
        viewing  2nd 
    contacts
        exchanging
            via fax 
    Content Indexing Service (CISVC).   [See CISVC (Context Indexing Service)]
    content rules
        Active Directory  2nd 
    contiguous files 
    Continuing with the Graphic Mode Portion of Setup procedure (1.2) 
    Control Sets
        Last Known Good Configuration  2nd  3rd  4th  5th  6th 
    Controlled Migration Suite 
    controller() entry
        Boot.ini 
    convergence time
        domain controllers 
    conversion
        NTFS  2nd  3rd  4th  5th  6th  7th  8th 
    conversions
        disks
            dynamic disks  2nd 
        dynamic disks  2nd  3rd  4th  5th  6th  7th  8th  9th 
    Converting a Basic Disk to a Dynamic Disk procedure (14.4) 
    copy backups (Ntbackup) 
    Copy option (Nvrboot.efi) 
    copy warnings
        file encryption 
    copying
        files
            troubleshooting 
    Correcting Lost Drive Signatures procedure (1.4) 
    cover pages
        faxes
            managing  2nd  3rd  4th 
    CPUs
        installing  2nd 
    crackers
        passwords 
    Creating a Custom Schema Management Console procedure (6.1) 
    Creating a Dfs Root procedure (16.6) 
    Creating a Fault Tolerant Boot Floppy Disk procedure (3.5) 
    Creating a Forward Lookup Zone procedure (5.8) 
    Creating a Key Recovery Agent procedure (18.3) 
    Creating a Mount Point Using the Disk Management Console procedure (15.5) 
    Creating a New Site Object procedures (7.5) 
    Creating a Password Reset Disk procedure (11.3) 
    Creating a Reverse Lookup Zone procedure (5.9) 
    Creating a Subnet Object procedure (7.6) 
    Creating an Archive Template procedure (18.5) 
    Creating and Configuring Site Link Objects procedure (7.7) 
    Creating and Sharing a Folder procedure (16.3) 
    Creating Dfs Links procedure (16.7) 
    Creating Extended Partitions and Logical Drives procedure (14.2) 
    Creating Mirrored Volumes procedure (14.8) 
    Creating Primary Partitions on Basic Disks procedure (14.1) 
    Creating RAID 5 Volumes procedure (14.10) 
    Creating Remote Shares Using the Computer Management Console procedure (16.4) 
    Creating Simple Volumes procedure (14.5) 
    Creating Striped Volumes procedure (14.7) 
    credentials caches
        passwords  2nd  3rd  4th 
    CRLs
        (Certificate Revocation Lists)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
        Delta CRLs 
        obtaining via Windows Update  2nd  3rd 
        publication  2nd  3rd  4th 
    cross-domain authentication  2nd  3rd  4th 
    cross-domain GPO links
        GPCs  2nd  3rd 
    cross-realm architecture
        MITv5 Kerberos  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
    cross-realm trusts
        MITv5 Kerberos
            creating  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
    cross-trust hierachies
        CAs 
    Cross-Trust Lists (CTLs) 
    cryptographic elements (PKI)  2nd  3rd  4th  5th  6th  7th 
    Cryptographic Service Provider (CSP).   [See CSP (Cryptographic Service Provider)]
    cryptographic services
        PKI  2nd  3rd  4th  5th  6th 
    CSEs
        (client-side extensions) 
        asynchronous processing  2nd 
        background refreshes  2nd  3rd  4th 
        forced updates  2nd 
            command line 
        group policies  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
        list of 
        script processing  2nd 
        synchronous processing  2nd  3rd  4th 
    CSP
        (Cryptographic Service Provider) 
    CSRSS (Client/Server Runtime Subsystem) 
    CSVDE tool (LDAP)  2nd 
    CTLs
        (Cross-Trust Lists) 
    cumulative Allow permissions 
    custom computer names
        RIS 
    cutoff speeds
        slow link processing
            group policies