• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    FACT (Fixed ACPI Description Table) 
    factory options
        Sysprep  2nd 
    failed fault tolerant disks
        boot floppys
            building  2nd  3rd 
        mirrored volumes
            replacing in  2nd  3rd  4th 
        RAID 5 volumes
            replacing in  2nd  3rd  4th  5th 
        recovering  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
    Fastfat.sys drivers 
    FastLane Migrator 
    FAT  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        (File Allocation Table)  2nd 
        cluster maps  2nd  3rd  4th  5th 
        directories  2nd  3rd 
        FAT32  2nd  3rd 
        partitions  2nd 
        sizes  2nd 
        weaknesses  2nd  3rd 
    FAT12 
    FAT16 
    FAT32  2nd  3rd  4th  5th  6th 
        weaknesses  2nd  3rd 
    fault tolerance
        file systems  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
            AUTOCHK  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            Change Journal  2nd  3rd  4th  5th 
            CHKDSK  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            logging  2nd  3rd  4th  5th 
            Windows File Protection  2nd  3rd  4th  5th  6th  7th  8th  9th 
    fault tolerant boot disks 
    fault tolerant disks
        boot floppys
            building  2nd  3rd 
        dynamic disks
            moving between computers  2nd 
        failed fault tolerant disks
            recovering  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
        mirrored volumes
            replacing in  2nd  3rd  4th 
        RAID 5 volumes
            replacing in  2nd  3rd  4th  5th 
    fax devices
        managing  2nd 
    Fax service  2nd  3rd  4th 
        configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        installing  2nd 
    Fax severs
        clients
            connecting to  2nd 
    fax sharing  2nd 
    faxes
        contacts 
        cover pages
            managing  2nd  3rd  4th 
        monitoring  2nd 
        queues
            managing  2nd 
        sending  2nd  3rd  4th  5th  6th  7th 
    Fdisk.efi utility 
    FDOs
        (Functional Device Objects) 
        WDM (Windows Driver Model)
            plug-and-play 
    Federal Information Processing Standards (FIPS) 
    Federal Information Processing Standards (FIPS).   [See FIPS (Federal Information Processing Standards)]
    FEK
        (File Encryption Key)  2nd  3rd  4th  5th  6th  7th 
        storage 
    fields
        encrypted tickets 
    File Allocation Table (FAT).   [See FAT (File Allocation Table)]
    file decryption  2nd  3rd 
    file encryption  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th 
        certificates
            management  2nd  3rd  4th  5th  6th  7th 
        command-line administration
            improvements to 
        copy warnings 
        data encryption  2nd  3rd  4th 
            algorithms  2nd  3rd  4th 
            FEK (File Encryption Key)  2nd  3rd  4th  5th  6th 
            private key protection  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        disabling  2nd  3rd  4th  5th  6th  7th 
        DRAs
            configuring  2nd  3rd  4th 
        EFS  2nd  3rd  4th  5th  6th  7th  8th 
            procedures  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th 
        EFS file transactions  2nd  3rd  4th  5th  6th  7th  8th 
        FEK (File Encryption Key) 
        file decryption process  2nd  3rd 
        file recovery  2nd  3rd  4th  5th  6th  7th  8th  9th 
        folder encryption
            laptops  2nd  3rd 
        group policies 
        individual files 
        managing  2nd  3rd 
        offline file encryption 
        process description  2nd  3rd 
        recovery  2nd  3rd 
        server-based files  2nd  3rd  4th  5th  6th 
        shared encrypted files 
        transporting  2nd 
        visual cues 
        WebDAV  2nd  3rd  4th  5th  6th  7th  8th  9th 
    File Encryption Key (FEK).   [See FEK (File Encryption Key)]
    file exclusions
        Ntbackup  2nd  3rd  4th  5th  6th 
    file journaling
        NTFS  2nd 
    file records (MFT) 
    file recovery
        file encryption  2nd  3rd  4th  5th  6th  7th  8th  9th 
        SIS 
    File Replication Service (FRS).   [See FRS (File Replication Service)]2nd  [See FRS (File Replication Service)]
    file sharing
        configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            administrative shares  2nd 
            remote share creation  2nd  3rd  4th  5th 
            share creation  2nd  3rd  4th  5th  6th  7th  8th 
            share permissions  2nd  3rd 
            XP desktops  2nd  3rd 
        Dfs
            (Distributed File Sharing)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th 
            console 
            deploying  2nd  3rd 
            links  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            managing  2nd 
            MUP polling  2nd 
            namespace design  2nd 
            PKT (Partition Knowledge Table)  2nd  3rd  4th  5th 
            referrals  2nd 
            replication topology changes  2nd  3rd 
            roots  2nd  3rd  4th  5th  6th  7th  8th 
            structure  2nd  3rd  4th  5th 
            targets  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th 
        directories
            choosing 
        encrypted file sharing 
        folders
            connecting to  2nd  3rd  4th  5th  6th 
    file system drivers  2nd  3rd  4th  5th 
    File System Recognizer (FSR).   [See FSR (File System Recognizer)]
    file systems  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th 
        CD-ROM file system 
        CD-RW operations  2nd  3rd  4th  5th  6th  7th 
        clusters  2nd  3rd  4th  5th  6th  7th 
        defragmentation  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            improvements to 
        drivers 
        DVD-RAM operations  2nd  3rd  4th  5th  6th  7th 
        EFS
            (Encrypting File System) 
        FAT  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            (File Allocation Table)  2nd 
            cluster maps  2nd  3rd  4th  5th 
            directories  2nd  3rd 
            FAT32  2nd  3rd 
            partitions  2nd 
            sizes  2nd 
            weaknesses  2nd  3rd 
        FAT32  2nd 
        fault tolerance  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
            AUTOCHK  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            Change Journal  2nd  3rd  4th  5th 
            CHKDSK  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            logging  2nd  3rd  4th  5th 
            Windows File Protection  2nd  3rd  4th  5th  6th  7th  8th  9th 
        file compression  2nd  3rd  4th  5th 
        files 
        folders 
        fragmentation 
        FSR
            (File System Recognizer) 
        LTS  2nd  3rd  4th  5th 
            (Link Tracking Service)  2nd 
            link sources  2nd 
            network tracking  2nd  3rd  4th 
        MFT
            (Master File Table) 
        MFT records
            reparse points  2nd  3rd  4th  5th  6th  7th 
        NTFS  2nd  3rd 
    file Systems
        NTFS
            (NT File System) 
    file systems
        NTFS
            attributes  2nd  3rd 
            cluster addressing  2nd 
            cluster mapping  2nd 
            conversion  2nd  3rd  4th  5th  6th  7th  8th 
            defragmentation  2nd  3rd  4th  5th  6th 
            directory records  2nd  3rd  4th  5th  6th  7th  8th 
            dirty flags  2nd 
            file compression  2nd  3rd  4th  5th  6th 
            file journaling  2nd 
            hard links 
            MFT fragmentation  2nd  3rd  4th 
            MFT metadata records  2nd  3rd  4th  5th  6th  7th  8th 
            named data streams  2nd  3rd  4th  5th  6th  7th  8th 
            performance enhancements  2nd  3rd 
            records  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            removable drives  2nd  3rd 
            security descriptors  2nd  3rd  4th  5th  6th  7th 
            short name preservation 
            sparse files  2nd 
            structure  2nd 
            timestamps  2nd 
            versions 
        partition boot sectors 
        partitions 
        performance
            improvements to 
        quotas  2nd  3rd 
        recovery  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
        reparse points  2nd  3rd  4th  5th  6th  7th 
        RSS
            (Remote Storage Services) 
        sectors  2nd  3rd  4th  5th  6th  7th 
        UDF
            (Universal Disk Format) 
        volumes 
    file-and-print support
        Web Server 
    files
        ADM template files  2nd  3rd  4th  5th  6th 
        backups
            .  [See also backups]
            interactive backups  2nd  3rd  4th  5th  6th  7th 
        compression
            NTFS  2nd  3rd  4th  5th  6th 
        contiguous files 
        copying
            troubleshooting 
        file systems 
        managing
            ESP  2nd  3rd 
        offline files
            checklist  2nd 
            configuring at server  2nd  3rd  4th  5th  6th  7th  8th 
            inappropriate uses  2nd  3rd 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
            remote desktops  2nd 
            Synchronization Manager  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        opening
            as DRA files  2nd  3rd 
        paging files
            configuring 
            fragmentation 
            moving  2nd  3rd 
        restoring  2nd  3rd  4th  5th  6th  7th 
        Setup  2nd  3rd  4th 
        short name preservation
            NTFS 
        SIF (Setup Information File) 
        sparse files
            NTFS  2nd 
        support files
            Active Directory  2nd  3rd 
            moving  2nd 
        System State files 
            restoring  2nd  3rd  4th 
        timestamps 
    Files and Settings Transfer Wizard (FSTW).   [See FSTW (Files and Settings Trasfer Wizard)]
    filter drivers 
    filtering
        group policies
            security groups  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
    FIPS
        (Federal Information Processing Standards) 
    FIPS (Federal Information Processing Standards) 
    firewalls
        bridgehead servers 
        ICF (Internet Connection Firewall)  2nd 
        SMB traffic
            restricting 
        terminal services  2nd 
    firmware 
    Fixed ACPI Description Table (FACP) 
    fixed spinning storage 
    flags (DNS packets) 
    flags (Kerberos reply messages) 
    flat names 
    Flexible Single Master Operations (FSMOs).   [See FSMOs (Flexible Single Master Operations)]2nd  [See FSMOs (Flexible Single Master Operations)]3rd  [See FSMOs (Flexible Single Master Operations)]
    Floppy.sys drivers 
    folder encryption
        laptops
            setting  2nd  3rd 
    Folder Options window 
    folder redirection policies  2nd 
    folders
        administraive shares
            re-creating 
            recreating 
        attributes
            NTFS 
        file systems 
        redirection
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
        remote shares
            creating  2nd  3rd  4th  5th 
        shared folders
            connecting to  2nd  3rd  4th  5th  6th 
            Registry 
        shares
            creating  2nd  3rd  4th  5th  6th  7th  8th 
    forced updates
        CSEs (Client-Side Extensions)  2nd 
            command line 
    forcing
        replication  2nd  3rd  4th 
    Forcing Replication with the AD Sites and Services Console procedure (7.10) 
    Forest trusts 
    forest trusts
        Active Directory 
        designing  2nd 
    Forest Trusts
        domains 
    forests
        Active Directory  2nd 
        domains
            upgrading  2nd 
        trusts 
        upgrading
            in-place upgrades  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            schema upgrades  2nd 
    form factors
        smart cards
            remote access  2nd 
    format checks
        certificates 
    Format.efi utility 
    formats
        disks
            choosing  2nd  3rd 
        drives  2nd 
        GPTs (GUID Partition Tables)  2nd  3rd  4th  5th  6th  7th 
        passwords  2nd  3rd  4th  5th 
    forward lookup zones
        DNS 
            creating  2nd  3rd  4th  5th 
    forwarders 
        conditional forwarding  2nd  3rd 
        DNS servers
            configuring for  2nd  3rd 
        DNS/Active Directory integration  2nd  3rd  4th  5th  6th  7th  8th 
        WINS forwarding  2nd 
    FR private keys
        deleting  2nd  3rd  4th 
        exporting  2nd  3rd  4th 
    fragmentation
        file systems 
        NTFS  2nd  3rd  4th 
        paging files 
    frequency
        replication
            Active Directory  2nd  3rd  4th  5th  6th  7th 
    FRS
        (File Replication Service) 
    FRS (File Replication Service)  2nd  3rd 
        Dfs (Distributed File Sharing)  2nd  3rd  4th 
        diagnostic logging 
        limitations  2nd  3rd 
        replication topology  2nd  3rd  4th 
        target server failures  2nd  3rd 
    FSMO servers
        placement 
    FSMOs
        (Flexible Single Master Operations)  2nd  3rd 
        Active Directory
            domains 
            loss of  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
    FSR
        (File System Recognizer) 
    FSTW  2nd  3rd  4th 
        (Files and Settings Transfer Wizard) 
    Fsutil console 
    FT disk sets 
    Ftdisk.sys drivers 
    ftp
        authentication services 
    function drivers
        WDM (Windows Driver Model)
            plug-and-play  2nd 
    function keys
        Setup 
    Functional Description of Query Handling by an Authoritative Name Server procedure (5.1) 
    Functional Description of Query Handling by Non-Authoritative Name Server procedure (5.2) 
    Functional Description of Reverse Lookup Query procedure (5.3) 
    Functional Description of Standard Polled Zone Transfer procedure (5.4) 
    Functional Description of User and Group Validation Across Domains Using Domain Local Groups procedu 
    Functional Description of User and Group Validation Across Domains Using Universal Group procedure ( 
    Functional Description of User and Group Validation Within a Single Domain procedure (13.3) 
    Functional Device Objects (FDOs).   [See FDOs (Functional Device Objects)]
    functional diagram
        LSA
            (Local Security Authority) 
    functional levels
        domains
            shift root domain to Windows .NET functional level  2nd 
            upgrading  2nd  3rd  4th  5th  6th 
    functional operations
        schema
            Active Directory  2nd  3rd  4th 
    Functional Sequence for NetBIOS Name Resolution Using Broadcasts procedure (4.1) 
    functions
        SIDs 
    FxsSrvCp$ shares