• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    D-H (Diffie-Hellman) public key technology  2nd 
    DACLs
        (discretionary access control lists) 
        (Discretionary Access Control Lists) 
    daily backups (Ntbackup)  2nd 
    data chunking 
    Data Decryption Field (DDF).   [See DDF (Data Decryption Field)]
    data encryption  2nd  3rd  4th 
        algorithms  2nd  3rd  4th 
    Data Encryption Standard (DES).   [See DES (Data Encryption Standard)]2nd  [See DES (Data Encryption Standard)]3rd  [See DES (Data Encryption Standard)]
    Data Link Control (DLC).   [See DLC (Data Link Control)]
    data link layer
        (OSI) 
        addresses
            determining  2nd 
        ports
            determining  2nd 
    data partitions 
    Data Recovery Agent (DRA).   [See DRA (Data Recovery Agent)]
    Data Recovery Agents (DRAs). DRAs (Data Recovery Agents) 
    Data Recovery Field (DRF).   [See DRF (Data Recovery Field)]
    data storage 
        configuring  2nd  3rd  4th 
        dynamic disks 
        GPT disks 
        IA32 systems
            disk operations  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
        LDM (Logical Disk Manager) colume configurations 
        LDM (Logical Disk Manager) volume configurations  2nd  3rd  4th  5th  6th  7th 
        MBR (Master Boot Record) disks 
    data stream encryption
        RDP  2nd 
    database engines 
    database size restictions
        multiple domains  2nd 
    databases
        Active Directory
            compacting  2nd  3rd 
            maintenance  2nd  3rd  4th  5th  6th  7th  8th 
            repairing  2nd  3rd  4th 
        forests
            in-place upgrades  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        Kerberos 
        LSA 
        LSA databases 
        SAM databases 
        schemas  2nd 
        WINS
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th 
    Datacenter Server 
        IA64 support 
        memory
            support 
        processors
            support 
    dates
        configuring
            Setup  2nd  3rd 
    DCDIAG
        Active Directory 
    DCFIRST.INF template (security) 
    Dcpromo utility 
    DCUP5.INF template (security) 
    DDF
        (Data Decryption Field) 
    Debian documentation Web site 
    Debugging Mode 
    debugging tools
        improvements to 
    dedicated networks 
    Default Domain Controller GPOs (Active Directory) 
    Default Domain GPOs (Active Directory) 
    Default Policy Domain GPC
        attributes 
    default security templates
        security policies  2nd  3rd 
    Default-First-Site-Name Object
        renaming 
    definition objects
        schema
            Active Directory  2nd 
    DEFLTDC.INF template (security) 
    DEFLTSV.INF template (security) 
    DEFRAG 
    defragmentation
        file systems  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        improvements to 
        NTFS  2nd  3rd  4th  5th  6th 
    Dekker, Edward  2nd 
    delays
        console logons 
    delegating
        group policies
            management  2nd 
    Delegating Access Rights procedure (13.2) 
    delegation  2nd 
        access rights
            Active Directory  2nd  3rd  4th  5th  6th 
        DNS
            configuring  2nd  3rd  4th  5th 
    Delegation of Control Wizard 
    delegations
        DNS
            lame delegations 
    deleted containers
        replication
            Active Directory  2nd 
    deleted object handling
        replication
            Active Directory  2nd  3rd 
    deleted objects
        replication
            Active Directory 
    deleting
        attributes
            Global Catalog 
        FR private keys  2nd  3rd  4th 
        records
            WINS 
        volumes  2nd 
    Deleting a Volume procedure (14.11) 
    Delta CRLs
        PKI 
    Delta CRLs (Certificate Revocation Lists) 
    demand-dial interfaces
        installing  2nd  3rd 
    demand-dial routers
        configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
    demoting
        domain controllers  2nd  3rd 
    Deny permissions 
        assigning 
        evaluation of 
    deploying
        domains  2nd  3rd  4th  5th  6th  7th 
        scripts  2nd  3rd 
        Windows .NET
            automating  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd  54th  55th  56th  57th  58th  59th  60th  61st  62nd  63rd  64th  65th  66th  67th  68th  69th  70th  71st  72nd  73rd 
    deployment
        disk cloning  2nd  3rd  4th  5th  6th  7th  8th  9th 
        scripted installations  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
        unattended setup batch files 
        unattended setup scripts 
            creating  2nd  3rd  4th  5th  6th  7th  8th  9th 
    derivations
        classes
            Active Directory 
    DES
        (Data Encryption Standard)  2nd  3rd 
    descriptor contents
        Active Directory
            security  2nd  3rd  4th 
    designating
        bridgehead servers  2nd  3rd  4th 
    Designating a Bridgehead Server procedure (7.8) 
    Designating Additional Dfs Link Targets procedure (16.8) 
    designing
        Active Directory
            OU (Organizational Unit) 
            OUs (Organizational Unit)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            OUs (Organizational Units) 
        CA trust hierarchies  2nd  3rd  4th  5th 
        DNS domains  2nd  3rd  4th  5th  6th  7th 
        domains
            Active Directory  2nd  3rd  4th  5th  6th  7th  8th 
        sites
            srachitectures  2nd  3rd  4th  5th  6th  7th 
    desktop-oriented features 
    DESX algorithm 
    DESX encryption 
    detachable storage 
    Developing Windows NT Device Drivers (i) 
    Developing Windows NT Device Drivers\
        A ProgrammerÕs Handbook (i) 
    Device Driver Rollback procedure (3.4) 
    Device Driver Update procedure (3.3) 
    device drivers 
        rollbacks  2nd  3rd 
        updates 
    Device Manager
        plug-and-play  2nd  3rd  4th  5th  6th 
    devices
        configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
            CPUs  2nd 
            EFI disk utilities  2nd  3rd  4th  5th  6th 
            multiple displays  2nd 
            Windows Update  2nd  3rd  4th 
        installing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
            CPUs  2nd 
            EFI disk utililities  2nd  3rd  4th  5th  6th 
            IDE hard drives  2nd 
            multiple displays  2nd 
            network adapters  2nd  3rd 
            removable media drives  2nd  3rd  4th 
            SCSI adapters  2nd  3rd 
            Windows Update  2nd  3rd  4th 
        redirecting  2nd 
        removing 
        troubleshooting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th 
    Dfs
        (Distributed File Sharing)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th 
        (Distributed File System) 
        console 
        deployment  2nd  3rd 
        links 
            creating  2nd  3rd 
            target assignments  2nd  3rd 
        managing
            command line  2nd 
        MUP polling  2nd 
        namespaces
            designing  2nd 
        PKT (Partition Knowledge Table) 
        referrals  2nd 
        replication topologies
            changing  2nd  3rd 
        root directories
            creating  2nd  3rd 
        roots  2nd  3rd 
            limitations 
            links  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
            PKT (Partition Knowledge Table)  2nd  3rd  4th 
            removing  2nd  3rd  4th 
        structure  2nd  3rd  4th  5th 
        targets  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th 
            FRS (File Replication Service)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
    DHCP
        configuring
            DNS support  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        installing  2nd 
        RIS
            (Remote Installation Services)  2nd 
        scope options
            configuring  2nd  3rd  4th  5th 
        servers
            authorizing  2nd  3rd 
    DHCPINFORM 
    diagnostic logging
        FRS (File Replication Service) 
    dial-in connections 
        checking
            RAS logs  2nd  3rd  4th 
    dial-in IP settings
        NT4 RRAS servers
            configuring  2nd  3rd  4th 
    dial-in verifications
        domains 
    dial-up authentication  2nd  3rd  4th 
        PPP (Point-to-Point Protocol)  2nd  3rd  4th  5th  6th  7th  8th  9th 
    dial-up connections
        name resolution 
    dial-up sessions
        modems
            monitoring  2nd  3rd  4th  5th 
    DIB (Directory Information Base) 
    differential backups (Ntbackup)  2nd 
    Diffie, Whitfield 
    digest authentication
        domains 
    Digest security package 
    Digital Signature Algorithm (DSA).   [See DSA (Digital Signature Algorithm)]
    Digital Signature Security Standard (DSS).   [See DSS (Digital Signature Standard)]
    Digital Signature Trust Web site 
    digital signatures 
        DSA (Digital Signature Algorithm) 
        DSS (Digital Signature Security Standard) 
        hashing technology 
    Direct Mmeory Access (DMA).   [See DMA (Direct Memory Access)]
    directories
        Active Directory
            backing up  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
            maintenance  2nd  3rd  4th  5th  6th  7th  8th 
        FAT  2nd  3rd 
        home directories
            creating  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            terminal services  2nd 
        sharing 
    Directory Information Base (DIB).   [See DIB (Directory Information Base)]
    directory information trees
        namespaces
            LDAP  2nd  3rd  4th 
    directory records
        NTFS  2nd  3rd  4th  5th  6th  7th  8th 
    directory records (MFT) 
    Directory Replication Agent (DRA).   [See DRA (Directory Replication Agent)]
    Directory Replication Agents (DRAs) 
    Directory Service Agents (DSAs).   [See DSAs (Directory Service Agents)]
    Directory Service Restore Mode 
    Directory Service Restore Mode (Windows) 
    directory services 
        Active Directory
            LDAP  2nd  3rd 
            namesapces  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd 
        ANSI 
        components  2nd  3rd 
        history of  2nd  3rd  4th  5th  6th  7th 
        IEC (International Electrotechnical Commission)  2nd 
        IETF (Internet Engineering Task Force) 
        ISO
            (International Organization for Standardization)  2nd  3rd  4th 
        ITU-T  2nd 
        LDAP
            namespaces  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        RFCs (Request for Comments)  2nd 
        X.500 
            components  2nd  3rd  4th  5th 
            LDAP  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            LDAP;compared  2nd 
    dirty flags
        NTFS  2nd 
    disabling
        file encryption  2nd  3rd  4th  5th  6th  7th 
    Disabling DNS on an Interface procedure (5.19) 
    Disabling EFS Using Windows .NET Group Policies procedure (17.2) 
    Disabling NetBIOS-over-TCP/IP Name Resolution procedure (4.7) 
    Disabling Remote Desktop on .NET Server procedure (19.7) 
    Disabling Remote Desktop procedure (19.4) 
    discretionary access control lists (DACLs).   [See DACLs (discretionary access control lists)]
    Discretionary Access Control Lists (DACLs).   [See DACLs (Discretionary Access Control Lists)]
    disk access
        standard disk access
            using 
    disk caching
        disabling 
    disk cloning
        deployment  2nd  3rd  4th  5th  6th  7th  8th  9th 
        problems 
        Sysprep  2nd  3rd  4th  5th  6th  7th  8th 
    Disk Management console 
    disk opeartions
        IA32 systems  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
    disk partitions
        extendible disk partitions 
    disk() entry
        Boot.ini 
    Disk.sys drivers 
    Diskpart utility  2nd  3rd 
    Diskpart.efi utility  2nd  3rd 
    Diskpart.efi utility (3.2) 
    disks
        dynamic disks  2nd  3rd 
            converting to  2nd 
            reverting 
        extended partitions
            creating  2nd  3rd 
        formats
            choosing  2nd  3rd 
        GPTs
            (GUID Partition Tables)  2nd 
            improvements to  2nd 
        managing
            command-line  2nd  3rd  4th  5th 
        paging files
            moving to  2nd 
        partitions
            creating  2nd 
            extending  2nd  3rd  4th  5th 
        primary partitions
            creating  2nd 
    Display option (Nvrboot.efi) 
    display specifiers
        Configuration naming context
            Active Directory  2nd  3rd 
    displays
        devices
            installing  2nd 
    distinguished names
        namespaces
            LDAP  2nd 
    Distributed File System (Dfs).   [See Dfs (Distributes File System)]
    DLC
        (Data Link Control) 
    DLLs
        (Dynamic Link Libraries)  2nd 
        multiple-version DLL workaround 
        Side-by-Side aseemblies  2nd  3rd  4th 
        Side-by-Side assemblies 
    DMA  2nd  3rd  4th 
    DMA (Direct Memory Access) 
    Dmboot.sys drivers 
    Dmio.sys drivers 
    Dmload.sys drivers 
    DNS
        (Domain Name System)  2nd 
        Active Directory
            forwarders  2nd  3rd  4th  5th  6th  7th  8th 
            integrated zones 
            integration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th 
            zone integration  2nd  3rd  4th  5th 
        administrative access
            limiting 
        application naming contexts 
        BIND boot files
            starting 
        boot information 
        caching-only servers
            configuring  2nd  3rd 
        clients
            configuring  2nd  3rd  4th  5th 
            resolvers  2nd  3rd  4th  5th 
        conditional forwarding 
        delegation
            configuring  2nd  3rd  4th  5th 
        delegations
            lame delegations 
        deploying
            checklist  2nd 
            non-Windows infrastructure  2nd  3rd 
        DHCP
            configuring support  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        domains  2nd  3rd  4th  5th  6th 
            designing  2nd  3rd  4th  5th  6th  7th 
            root domains 
            TLDs (top-level domains) 
        drivers
            installing  2nd 
        Dynamic DNS
            disabling on interfaces  2nd 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            scavenging configuration  2nd  3rd  4th  5th 
            security  2nd  3rd 
            zone configuration  2nd 
        dynamic updates  2nd  3rd 
            securing  2nd 
        extensions 
        forward lookup zones 
            creating  2nd  3rd  4th  5th 
        hierarchical zones
            configuring  2nd  3rd  4th  5th  6th  7th  8th 
        host files  2nd 
        incremental zone transfers  2nd  3rd 
        integrated DNS zones
            Active Directory  2nd  3rd 
        IPv6 host records 
        managing
            command-line management  2nd 
        multiple servers
            using 
        name servers  2nd  3rd 
            caching-only name server 
            primary name servers  2nd  3rd 
            secondary name servers  2nd  3rd 
        namespaces  2nd  3rd 
            private 
        negative query caching 
        notification-driven zone transfers 
        packets 
        queries
            authoritative query responses  2nd 
            non-authoritative query responses  2nd  3rd 
        query handling  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
            authoritative servers  2nd  3rd  4th  5th 
            non-authoritative servers  2nd  3rd  4th 
            reverse lookup queries  2nd  3rd  4th  5th  6th  7th  8th 
        record verifications 
        records
            scavenging  2nd 
        resource records  2nd 
        reverse lookup zones
            creating  2nd  3rd  4th 
        root hints  2nd  3rd  4th 
            configuring  2nd  3rd 
        secondaries  2nd 
        secondary servers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th 
        security  2nd  3rd  4th  5th  6th 
        servers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
            forwarders  2nd  3rd 
            installing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
            secondary servers  2nd  3rd  4th  5th  6th 
        service locator records 
        stub zones  2nd  3rd  4th 
        trace names 
        unauthorized zone transfers
            preventing 
        update notifications  2nd  3rd  4th 
            enabling  2nd  3rd 
        updates
            secure 
        upgrading  2nd 
        WINS forwarding  2nd 
        zone transfers
            enabling  2nd  3rd 
        zones
            examining  2nd  3rd  4th  5th  6th  7th 
    DNS resolver cache tool (Tcpip.sys) 
    DNS servers
        loss of
            remedying  2nd  3rd  4th 
    DNS tool (Tcpip.sys) 
    documentation
        certificates  2nd 
        PACs (Privilege Access Certificates) 
    Domain Controller
        promotion utility 
    Domain Controllers
        Active Controllers  2nd  3rd 
    domain controllers
        Active Directory
            GC-less logons  2nd  3rd 
            metadata cleanup  2nd  3rd  4th  5th  6th  7th 
        convergence time 
        demoting  2nd  3rd 
        installing  2nd  3rd 
        loss of
            correcting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
        null sessions 
        overload prevention 
        placement  2nd  3rd  4th 
        promoting
            local SAM 
        promotion
            backup tapes 
        pull updates 
        renaming  2nd  3rd 
        roles
            setting  2nd  3rd 
        upgrades
            application compatibility 
            leapfrog upgrades  2nd  3rd 
            requirements  2nd  3rd  4th  5th  6th  7th 
    Domain Local groups (Active Directory)  2nd  3rd  4th 
    Domain Master Browser 
    domain master browsers 
    Domain Migration Administrator 
    domain name master
        Active Directory  2nd 
    Domain Name System (DNS) 
    Domain Name System (DNS).   [See DNS (Domain Name System)]
    Domain naming context 
    domain naming contexts
        Active Directory  2nd  3rd 
    Domain Naming Master (FSMOs) 
    domain roots 
    DomainPassword permission (Active Directory) 
    domains 
        access permissions 
        Active Directory  2nd 
            designing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st 
            domain controller placement  2nd  3rd  4th 
            domain name master  2nd 
            FSMOs (Flexible Single Master Operations) 
            infrastructure master  2nd  3rd 
            multiple domain forest trusts  2nd 
            multiple domains  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
            multiple groups  2nd  3rd  4th  5th 
            navigation 
            PDC Emulators  2nd  3rd  4th  5th  6th  7th 
            replication 
            RIDs (Relative IDs)  2nd 
            role master  2nd 
            root domain names  2nd  3rd  4th  5th  6th 
            schema master  2nd 
            split public/private zones  2nd  3rd 
            third-party name servers  2nd 
            Windows-based zones  2nd  3rd 
        application verification 
        authentication  2nd  3rd  4th 
        child domains
            upgrading  2nd  3rd 
        computer authentication 
        computers
            joining 
        configuring
            Setup  2nd  3rd  4th 
        cross-domain authentication  2nd  3rd  4th 
        deploying  2nd  3rd  4th  5th  6th  7th 
        designing
            Active Directory  2nd  3rd  4th  5th  6th  7th  8th 
        dial-in verifications 
        digest authentication 
        DNS  2nd  3rd  4th  5th  6th 
            designing  2nd  3rd  4th  5th  6th  7th 
            root domains 
            secondaries  2nd 
            TLDs (top-level domains) 
            upgrading  2nd 
        efficiency 
        Forest Trusts 
        functional levels
            shift root domain to Windows .NEt functional level 
            shift root domain to Windows .NET functional level 
        group policies 
        integrated DNS zones  2nd  3rd 
        interoperability 
        joining 
            automated setup 
        logon scripts 
        managability 
        master account domains
            upgrading  2nd  3rd  4th  5th 
        migrating
            account migrations  2nd  3rd 
            computer account migrations  2nd  3rd 
            group account migrations 
            group accounts  2nd  3rd  4th  5th 
            password migrations  2nd  3rd  4th  5th  6th 
            SID history  2nd  3rd  4th  5th 
            user accounts  2nd  3rd  4th  5th 
        migrating from  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
        mixed domains 
        multidomain authentication  2nd  3rd 
        multiple domains
            logon configuration  2nd  3rd 
        namespaces  2nd  3rd 
        objects
            maximum number 
        operations
            new 
        PDCs
            upgrading  2nd  3rd  4th  5th 
        placeholder domains
            installing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        profile settings 
        promoting
            troubleshooting  2nd  3rd 
        recoverability 
        reliability 
        renaming  2nd 
        resource domains
            upgrading  2nd  3rd 
        root domains
            upgrading  2nd  3rd 
        security 
        share point verification 
        stability 
        system policy verification 
        trust authentication 
        upgrading
            account BDCs  2nd  3rd 
            allotted time for 
            browsing 
            child domains  2nd  3rd 
            Classic NT4 RAS access  2nd  3rd 
            classic scripts  2nd 
            DNS  2nd 
            domain controller requirements  2nd  3rd  4th  5th  6th  7th 
            forests  2nd 
            FSMO (Flexible Single Master Operations) servers 
            functional levels  2nd  3rd  4th  5th  6th 
            group policies  2nd 
            in-place upgrades  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th 
            master account domains  2nd  3rd  4th  5th 
            mixed domains  2nd 
            PDCs  2nd  3rd  4th  5th 
            policies  2nd 
            post-upgrade verifications  2nd  3rd 
            preparations  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th 
            priveleges 
            root domains  2nd  3rd 
            SAM  2nd  3rd 
            storage 
            unsupported operations  2nd 
        user authentication 
    DOS
        printing from  2nd  3rd 
    DOS-derived Windows hashing
        passwords 
    DOS-derived Windows storage
        passwords 
    downlevel clients
        home directories
            mapping  2nd 
    DRA 
        (Data Recovery Agent) 
        files
            opening as  2nd  3rd 
    DRA (Directory Replication Agent) 
    DRAs
        (Data Recovery Agents) 
        configuring  2nd  3rd  4th 
        EFS group policies
            loading into  2nd 
    DRAs (Directory Replication Agents) 
    DRF
        (Data Recovery Field) 
    drive controllers 
    drive letters
        assigning
            Setup  2nd  3rd  4th  5th  6th  7th 
        changing  2nd  3rd  4th 
    Driver Rollback 
    drivers
        class drivers 
        device drivers
            rollbacks  2nd  3rd 
            updates 
        DNS
            installing  2nd 
        Driver Rollback 
        file system drivers  2nd  3rd  4th  5th 
        file systems 
        filter drivers 
        large
            support 
        minidrivers 
        printer drivers
            printer sharing  2nd  3rd  4th  5th  6th  7th  8th  9th 
        protection 
        SCSI drivers
            alternative 
        service drivers 
    drives 
        .  [See also hard drives]
        configurations  2nd 
        drive letters
            changing  2nd  3rd  4th 
        formats  2nd 
        redirecting  2nd  3rd 
        removable drives 
        removable media  2nd 
        removable media drives 
            installing  2nd  3rd  4th 
        sizes  2nd  3rd 
        types  2nd  3rd  4th  5th  6th  7th  8th  9th 
    Drwatson.exe  2nd  3rd 
    DSA
        (Digital Signature Algorithm) 
    DSACLS
        access lists
            managing  2nd  3rd  4th 
    DSAs (Directory Service Agents) 
    DSS
        (Digital Signature Security Standard) 
        (Digital Signature Standard)  2nd 
    Dssenh CSP provider 
    DSSTORE utility 
    DSUP.INF template (security) 
    DSUPT.INF template (security) 
    dual monitors
        preparing
            installation 
    dual-boots
        installation
            considerations  2nd  3rd 
    DUMPFSMOS command script 
    dumps
        memory dumps  2nd 
    duplexed volumes 
    DVD-RAM drives  2nd 
    dynamic client icons 
    dynamic disks  2nd  3rd 
        booting  2nd  3rd 
        conversions  2nd  3rd  4th  5th  6th  7th  8th  9th 
        converting to  2nd 
        hardware RAID 
        moving between computers  2nd 
        reverting 
        setup  2nd  3rd  4th 
        volume extensions (spanning)  2nd 
        volumes
            creating for  2nd  3rd 
            extending between  2nd 
    Dynamic DNS
        advanced DNS servers
            configuring  2nd  3rd 
        interfaces
            disabling  2nd 
        managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
        scavenging
            configuring  2nd  3rd  4th  5th 
        security
            managing  2nd  3rd 
        WINS forwarding  2nd  3rd 
        zones
            configuring  2nd 
    Dynamic Link Libraries (DLLs).   [See DLLs (Dynamic Link Libraries)]2nd  [See DLLs (Dynamic Link Libraries)]
    dynamic updates
        DNS  2nd  3rd 
            securing  2nd 
    dynamic volumes
        creating
            command-line 
        Recovery Console 
        restrictions  2nd  3rd  4th