• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    packet-switched networks 
    packets
        DNS 
    PACs
        (Privilege Access Certificates)  2nd 
        documentation 
        Kerberos  2nd  3rd  4th  5th  6th 
    PAEs (Physical Address Extensions) 
    paging files
        configuring 
        fragmentation 
        moving 
            to another disk  2nd 
    PAP
        (Password Authentication Protocol)  2nd  3rd  4th  5th  6th  7th  8th 
    parameters
        replication
            controlling  2nd  3rd  4th  5th  6th  7th  8th 
    parent trusts
        Active Directory 
    partition boot systems
        file systems 
    partition extensions  2nd  3rd 
    partition() entry
        Boot.ini 
    partitioning
        GPT disks 
    partitions
        boot partitions  2nd 
        Configuration naming context
            Active Directory 
        creating
            command-line  2nd 
        data partitions 
        ESP (EFI System Partition) 
        expanding 
        extended partitions 
        extending  2nd  3rd  4th  5th 
        FAT  2nd 
        file systems 
        MSR (Microsoft Reserved Partition) 
        NTFS
            conversions 
        OEM partitions 
        primary partitions 
        soft-linked partitions 
        system partitions  2nd 
    Partmgr.sys drivers 
    pass-through authentications 
    Password Authentication Protocol (PAP).   [See PAP (Password Authentication Protocol)]
    password policy restictions
        multiple domains  2nd 
    Password Reset Disk 
    password reset disks 
    Password Reset Disks (PRDs).   [See PRDs (Password Reset Disks)]
    Password variable (OSCML) 
    passwords
        administrator passwords
            managing  2nd 
        anonymous logons  2nd  3rd  4th 
        computer passwords  2nd 
            troubleshooting  2nd 
        crackers 
        credentials caches  2nd  3rd  4th 
        formats  2nd  3rd  4th  5th 
        hashing algorithm 
        LanMan password 
        LanMan passwords
            eliminating 
        migrations
            domains  2nd  3rd  4th  5th  6th 
        NTLMv2 passwords
            samba clients 
        password reset disks 
        resets 
            handling for local accounts  2nd 
            reset disks  2nd  3rd  4th  5th  6th 
        reversible passwords  2nd 
            enabling  2nd  3rd  4th  5th 
        security  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th 
        storage  2nd  3rd  4th  5th  6th  7th  8th  9th 
            Active Directory 
            vunerabilities  2nd 
        vunerabilities  2nd  3rd  4th 
            storage  2nd 
    passwrods
        policies  2nd  3rd  4th  5th  6th 
    PAT
        (Port Address Translation) 
    Pathping utility 
    paths
        upgrade paths
            Windows NT4  2nd 
    PCL
        (Printer Control Language) 
    PDC (primary domain controller) 
    PDC Emulator
        FSMOs 
    PDC Emulators
        Active Directory  2nd  3rd  4th  5th  6th  7th 
        recovering 
    PDCs
        domains
            upgrading  2nd  3rd  4th  5th 
    PDOs (Physical Device Objects) 
    Per Seat client access licensing 
    per seat licensing
        tracking  2nd 
    Per Server access licensing 
    per server licensing
        graphical phase
            Setup  2nd 
    performance enhancements
        NTFS  2nd  3rd 
    performance restictions
        multiple domains  2nd 
    Performing a Defragmentation Analysis procedure (15.7) 
    Performing a Hard Repair of Active Directory procedure (10.12) 
    Performing a Soft Recovery of Active Directory procedure (10.11) 
    Performing a System State Backup procedure (10.6) 
    Performing a System State Restore procedure (10.8) 
    Performing a User and Group Migration Using ADMT procedure (9.5) 
    Performing an Authoritative Restore of Sysvol procedure (10.7) 
    Performing an Authoritative Restore procedure (10.9) 
    Performing an Interactive Backup procedure (21.3) 
    Performing an Offline Defragmentation of Active Directory procedure (10.10) 
    Performing Initial Setup Assessment for NT4 Upgrade procedure (2.1) 
    permissions  2nd 
        accesss permissions
            domains 
        Active Directory
            restores  2nd 
        Allow 
        Allow permissions
            assigning 
            cumulative Allow permission 
        consolidated permissions
            viewing  2nd 
        Deny 
        Deny permissions
            assigning 
            evaluation 
        Enterprise CAs
            required 
        evaluation  2nd  3rd  4th  5th  6th  7th 
        inheritance  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            blocking 
            settings  2nd 
        remote access permissions
            controlling  2nd  3rd 
        RIS images
            setting 
        share permissions  2nd  3rd 
        system privileges  2nd  3rd 
    Personal certificate stores 
    PGP (Pretty Good Privacy)
        encryption 
    Physical Address Extensions (PAEs).   [See PAEs (Physical Address Extensions)]
    Physical Device Objects (PDOs) 
    physical locations
        Configuration naming context
            Active Directory 
    pinouts
        null-modem serial cables 
    pipes
        named pipes 
    PKCS
        (Public Key Cryptography Services) 
    PKI
        (Public Key Infrastructure) 
        3DES support 
        CAs
            installing  2nd  3rd  4th 
            root certificate updates 
        certificates  2nd  3rd  4th  5th  6th  7th  8th 
            archiving  2nd  3rd  4th  5th  6th  7th 
            CA hierarchies  2nd  3rd  4th 
            CA trust hierarchies  2nd  3rd  4th  5th 
            CA trusts  2nd  3rd  4th  5th 
            Delta CRLs (Certificate Revocation Lists) 
            documentation  2nd 
            elements 
            enrollment  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            local certificate stores  2nd  3rd 
            OCSP (Online Certificate Status Protocol)  2nd 
            recovering  2nd  3rd 
            templates 
            validity checks  2nd  3rd  4th  5th  6th  7th 
        cipher keys  2nd 
        command-line tools  2nd  3rd  4th  5th 
        cryptographic elements  2nd  3rd  4th  5th  6th  7th 
        cryptographic services  2nd  3rd  4th  5th  6th 
        digital signatures 
        elements 
            CA (Certification Authority) 
            cryptographic elements 
            public key elements 
        encryption methods  2nd  3rd 
        FIPS 180-2 support 
        goals  2nd  3rd 
        hashes  2nd  3rd  4th  5th 
        keys
            archiving  2nd 
            recovery  2nd  3rd  4th  5th  6th 
            storage  2nd  3rd 
        new features  2nd  3rd  4th 
        private key services  2nd 
        public key services  2nd  3rd  4th  5th  6th 
            D-H (Diffie-Hellman)  2nd 
            DSS (Digital Signature Standard)  2nd 
            RSA 
        qualified subordination 
        resources 
        smart cards
            improvements to 
            preparing for  2nd  3rd 
        user auto-enrollment 
        vendors 
    PKI related RFCs Web site 
    PKIX Working Group 
    PKT (Partition Knowledge Table)
        Dfs (Distributed File Sharing)  2nd  3rd  4th 
        Dfs (Distributed File System) 
    placeholder domains
        installing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
    placement
        redirected folders  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
    Plug and Play (PnP).   [See PnP (Plug and Play)]
    Plug and Play Manager 
    plug-and-play
        ACPI (Advanced Configuration and Power Interface)  2nd  3rd  4th 
            compatibility 
            power management  2nd  3rd 
        Device Manager  2nd  3rd  4th  5th  6th 
        enumeration 
        Plug and Play Manager 
        Power Manager 
        support  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
        WDM (Windows Driver Model)  2nd  3rd  4th  5th  6th  7th  8th  9th 
            bus drivers  2nd 
            busses 
            FDOs (Functional Device Objects) 
            function drivers  2nd 
    PnP
        (Plug and Play) 
        (plug-and-play) 
        ACPI (Advanced Configuration and Power Interface)  2nd  3rd  4th 
            compatibility 
            power management  2nd  3rd 
        Device Manager  2nd  3rd  4th  5th  6th 
        disabling 
        Plug and Play Manager 
        Power Manager 
        support  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
        WDM (Windows Driver Model)  2nd  3rd  4th  5th  6th  7th  8th  9th 
            bus drivers  2nd 
            busses 
            FDOs (Functional Device Objects) 
            function drivers  2nd 
    PocketPCs
        Remote Desktop 
    Point-to-Point Protocol (PPP).   [See PPP (Point-to-Point Protocol)]
    points of failure
        Windows NT 
    Poledit 
        (Policy Editor) 
        administrative shares
            re-creating 
            recreating 
    policies
        account lockout policies  2nd 
        administrative template policies  2nd 
        blocks
            overriding  2nd  3rd 
        computer policies 
        domains
            upgrading  2nd 
        folder redirection  2nd 
        group policies  2nd  3rd  4th  5th 
            administrative template policies  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th 
            components  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd 
            CSEs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            CSEs (client-side extensions) 
            delegating  2nd 
            domains 
            folder redirection policies  2nd 
            GPCs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            GPCs (Group Policy Containers)  2nd 
            GPE (Group Policy Editor) 
            GPOs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
            GPOs (Group Policy Objects) 
            GPTs  2nd  3rd  4th  5th 
            GPTs (Group Policy Templates) 
            individual group policy types  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd 
            network initialization 
            policy hierarchy  2nd  3rd  4th 
            processing 
            purpose of  2nd 
            script policies  2nd  3rd  4th  5th  6th  7th 
            security policies  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
            slow link processing  2nd  3rd  4th  5th 
            software deployment policies  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            special Registry keys  2nd  3rd 
            targeting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            troubleshooting  2nd  3rd 
        groups 
            components  2nd  3rd 
            links  2nd  3rd 
            tools  2nd 
        inheritance
            overriding  2nd  3rd 
        Kerberos  2nd  3rd 
        local policies 
        new features  2nd 
        passwords  2nd  3rd  4th  5th  6th 
        print policies  2nd  3rd 
        RSoP
            (Resultant Set of Policies) 
        security  2nd  3rd  4th  5th  6th 
        standalone servers 
        system policies  2nd 
            tattooing 
        tracking
            Registry 
        user policies 
    policy hierarchy
        GPOs (Group Policy Objects)  2nd  3rd  4th 
    policy tracking
        Registry 
    political restictions
        multiple domains  2nd  3rd  4th 
    political restrictions
        multiple domains 
    polling
        replication  2nd 
    pools
        memory  2nd  3rd  4th  5th 
    porocedures
        10.13 (Changing Active Directory File Locations) 
    Port Address Translation (PAT). PAT (Port Address Translation) 
    port mapping
        NAT (Network Address Translation)  2nd  3rd 
    port monitors
        printer sharing  2nd  3rd  4th 
    ports
        determining
            Network layers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        Kerberos 
    Ports property (printers)  2nd 
    POST
        (Power On Self Test) 
    post-Setup configuration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
    post-upgrade verifications
        domain upgrades  2nd  3rd 
    power management
        ACPI (Advanced Configuration and Power)  2nd  3rd 
    Power Manager 
    Power On Self Test (POST).   [See POST (Power On Self Test)]
    PPP
        (Point-to-Point Protocol)  2nd  3rd 
        authentication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th 
            CHAP (Challenge Handshake Authentication Protocol)  2nd  3rd  4th 
            dial-up authentication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            domain authentication  2nd  3rd  4th 
            EAP (Extensible Authentication Protocol)  2nd  3rd  4th  5th  6th  7th  8th 
            Mixed domains  2nd  3rd  4th 
            MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)  2nd  3rd  4th 
            multidomain authentication  2nd  3rd 
            NT4 limitations  2nd  3rd  4th 
            PAP (Password Authentication Protocol)  2nd  3rd  4th  5th  6th  7th 
            RADIUS (Remote Authentication Dial-In User Services)  2nd  3rd  4th  5th  6th  7th  8th 
            SPAP (Shiva Password Authentication Protocol)  2nd 
            standard transactions  2nd  3rd  4th  5th 
    PPPoE
        (PPP over Ethernet)  2nd  3rd 
    PRDs
        (Password Reset Disks)  2nd  3rd  4th  5th  6th 
    Pre-boot Execution Environment (PXE).   [See PXE (Pre-boot Execution Environment)]
    Pre-Windows 2000 Compatible Access (PW2CA).   [See PW2CA (Pre-Windows 2000 Comptiable Access)]
    preauthenticator
        Kerberos  2nd 
    preference
        administrative template policies  2nd 
    preferences
        administrative template files  2nd 
        administrative template policies  2nd 
    preferential logons
        domains  2nd 
    preliminaries
        NT4  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
    Preparing a Remote Access Server for Smart Card Logons procedure (20.7) 
    Presentation layer (OSI) 
    primaries
        Active Directory 
    primary domain controller (PDC).   [See PDC (primary domain controller)]
    primary group SIDs for the owner
        security descriptors 
    primary name servers
        DNS  2nd  3rd 
    primary partitions 
        creating  2nd 
    print clients
        troubleshooting  2nd 
    print devices 
    print jobs
        delivery  2nd 
    print providers  2nd 
    print queues
        managing  2nd  3rd  4th 
    print servers
        properties
            managing  2nd 
    print services
        managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
    Print$ shares 
    Printer Control Language (PCL).   [See PCL (Printer Control Language)]
    printer drivers
        printer sharing  2nd  3rd  4th  5th  6th  7th  8th  9th 
    printer sharing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
        enhanced metafiles  2nd 
        initial job rendering  2nd  3rd 
        network printing  2nd  3rd  4th 
        port monitors  2nd  3rd  4th 
        print job delivery  2nd 
        printer drivers  2nd  3rd  4th  5th  6th  7th  8th  9th 
        spoolers 
            file location changes  2nd  3rd  4th  5th  6th  7th  8th 
    printers
        client printer connections
            automating  2nd  3rd 
        location tracking  2nd 
        monitoring 
        non-PnP-compatibale printers
            installing 
        print devices 
        properties
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th 
        redirecting  2nd  3rd  4th  5th 
        security  2nd  3rd 
    printing
        clients
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd  54th 
        command-line print administration  2nd  3rd  4th  5th 
        DOS  2nd  3rd 
        Internet 
            printing over  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        local print devices  2nd  3rd  4th  5th 
        mainframe hosts 
        network print devices  2nd  3rd  4th 
        policies  2nd  3rd 
        print clients
            troubleshooting  2nd 
        print queues
            managing  2nd  3rd  4th 
        third-party servers 
            printing to  2nd  3rd 
        troubleshooting  2nd  3rd 
        UNIX hosts  2nd 
        UNIX servers 
        Windows servers  2nd  3rd  4th 
    private headers
        LDM volumes 
    private key protection  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
    private key services
        PKI  2nd 
    private namespaces
        DNS 
    priveleges
        domains
            upgrading 
    Privilege Access Certificates (PACs).   [See PACs (Privilege Access Certificates)]2nd  [See PACs (Privilege Access Certificates)]
    procedure
        16.10 (Viewing Printer Driver Details) 
        Verifying Transitive Trust Accessibility (9.3) 
    procedures
        (6.2) Using the ADSI Editor to View AD Objects 
        1.1 (Installing Windows .NET on a New Machine) 
        1.2 (Continuing with the Graphic Mode Portion of Setup) 
        1.3 (Configuring the System to Dump Only the Contents of the Kernel Memory) 
        1.4 (Correcting Lost Drive Signatures) 
        10.10 (Performing an Offline Defragmentation of Active Directory) 
        10.11 (Performing a Soft Recovery of Active Directory) 
        10.12 (Performing a Hard Repair of Active Directory) 
        10.3 (Changing a Role Master Using an MMC Console) 
        10.4 (Transferring a Role Master Using Ntdsutil) 
        10.5 (Seizing a FSMO Role) 
        10.6 (Performing a System State Backup) 
        10.7 (Performing an Authoritative Restore of Sysvol) 
        10.8 (Performing a System State Restore) 
        10.9 (Performing an Authoritative Restore) 
        11.1 (Viewing a Resultant Set of Permissions) 
        11.10 (Changing Log File Settings) 
        11.11 (Monitoring for Unauthorized Folder Access) 
        11.12 (Monitoring Access to Directory Service Objects) 
        11.13 (Audit Monitor for Logon/Logoff) 
        11.14 (Audit Monitoring for Printers) 
        11.2 (Storing User Names and Passwords) 
        11.3 (Creating a Password Reset Disk) 
        11.4 (Using a PRD to Change a Password) 
        11.5 (High-Level Kerberos Example) 
        11.6 (User Logon Transaction Using Kerberos) 
        11.7 (Server Access Transaction Using Kerberos) 
        11.8 (Configuring a Cross-Realm Trust) 
        11.9 (Testing Cross-Realm Kerberos Ticket Generation) 
        12.1 (Overriding a Policy Block) 
        12.2 (Running the RSoP Wizard in Planning Mode) 
        12.3 (Running the RSoP Wizard in Logging Mode) 
        12.4 (Configuring a GPO Security Descriptor to Filter Policy Recipients) 
        12.5 (Accessing the WMI Filter Interface) 
        12.6 (Using the Security Configuration and Analysis Snap-In) 
        12.7 (Loading ADM Templates into the Group Policy Editor 
        13.1 (Applying Inheritable Rights to an Active Directory Container) 
        13.2 (Delegating Access Rights) 
        13.3 (Functional Description of User and Group Validation Within a Single Domain) 
        13.4 (Functional Description of User and Group Validation Across Domains Using Domain Local Groups) 
        13.5 (Functional Description of User and Group Validation Across Domains Using Universal Group) 
        13.6 (Starting Explorer Shell Using RunAs) 
        14.1 (Creating Primary Partitions on Basic Disks) 
        14.10 (Creating RAID 5 Volumes) 
        14.11 (Deleting a Volume) 
        14.12 (Changing Drive Letters) 
        14.13 (Replacing a Failed Disk in a RAID 5 Volume) 
        14.14 (Building a Fault Tolerant Boot Floppy) 
        14.15 (Replacing a Failed Disk in a Mirrored Volume) 
        14.16 (Moving a Fault Tolerant Volume to Another Computer) 
        14.2 (Creating Extended Partitions and Logical Drives) 
        14.3 (Expanding a Basic Disk Partition Using Diskpart) 
        14.4 (Converting a Basic Disk to a Dynamic Disk) 
        14.5 (Creating Simple Volumes) 
        14.6 (Configuring a Spanned Volume) 
        14.7 (Creating Striped Volumes) 
        14.8 (Creating Mirrored Volumes) 
        14.9 (Breaking a Mirrored Volume) 
        15.1 (Classic NT Link Search Pattern) 
        15.2 (Verifying Link Tracking Operation) 
        15.3 (Verifying WFP Operation) 
        15.4 (Enabling Compression) 
        15.5 (Creating a Mount Point Using the Disk Management Console) 
        15.6 (Using Disk Cleanup) 
        15.7 (Performing a Defragmentation Analysis) 
        16.1 (Installing Additional Network Clients) 
        16.11 (Relocating the Default Spool Directory) 
        16.12 (Installing a Non-PnP-Compatible Printer) 
        16.2 (Changing the Network Provider Order) 
        16.3 (Creating and Sharing a Folder) 
        16.4 (Creating Remote Shares Using the Computer Management Console) 
        16.5 (Restoring Deleted Administrative Shares with Poledit) 
        16.6 (Creating a Dfs Root) 
        16.7 (Creating Dfs Links) 
        16.8 (Designating Additional Dfs Link Targets) 
        16.9 (Removing a Dfs Root) 
        17.1 (Viewing Personal Certificates via the Certificates Snap-In) 
        17.2 (Disabling EFS Using Windows .NET Group Policies) 
        17.3 (Exporting and Deleting the FR Public Key Certificate) 
        17.4 (Obtaining FR Certificates for Additional DRAs) 
        17.5 (Loading an FR Public Key into the EFS Group Policy) 
        17.6 (Exporting and Deleting an FR Private Key) 
        17.7 (Setting Folder Encryption) 
        17.8 (Importing an FR Private Key from a PFX Certificate) 
        18.1 (Installing a Standalone Root CA) 
        18.2 (Enrolling for a Certificate Using the Web) 
        18.3 (Creating a Key Recovery Agent) 
        18.4 (Configuring a CA to Archive Certificates) 
        18.5 (Creating an Archive Template) 
        18.6 (Recovering a Lost Key) 
        19.2 (Assigning a User Home Directory with AD Users and Computers) 
        19.3 (Assigning a Home Directory Using the Command Line) 
        19.4 (Disabling Remote Desktop) 
        19.5 (Changing Default RDP Port in the TSWeb Interface) 
        19.7 (Disabling Remote Desktop on .NET Server) 
        2.1 (Performing Initial Setup Assessment for NT4 Upgrade) 
        2.10 (Accessing the Remote Installation Group Policy) 
        2.11 (Using RIS to Run Setup on a Headless Server) 
        2.2 (Task List for Setting Up Scripted Installations) 
        2.3 (Using Setup Manager to Create an Unattended Installation Script) 
        2.4 (Slipstreaming Service Pack Files) 
        2.5 (Using Riprep to Image a Windows .NET Server) 
        2.6 (Installing Remote Installation Services) 
        2.7 (Configuring a Remote Installation Services Image) 
        2.8 (Configuring a Remote Installation Services Server) 
        2.9 (Setting Permissions on RIS Images) 
        20.1 (CHAP Authentication Transaction) 
        20.10 (Initial Configuration of Routing Services) 
        20.11 (Installing a Demand-Dial Interface) 
        20.12 (Configuring a Demand-Dial Router) 
        20.13 (Configuring Automatic Connection Pickup) 
        20.14 (Configuring NAT and ICF) 
        20.15 (Enabling Internet Connection Sharing and Internet Connection Firewall) 
        20.16 (Manually Obtaining a Computer Certificate) 
        20.17 (Registering an IAS Server with Active Directory) 
        20.18 (Configuring an RRAS Server as an IAS Client) 
        20.19 (Configuring RRAS to Use RADIUS Authentication) 
        20.2 (EAP Smart Card Authentication Transaction) 
        20.4 (Enabling the Smart Card User Template) 
        20.5 (Issuing Enrollment Agent Certificates to Operations Administrators) 
        20.6 (Enrolling a Smart Card User) 
        20.7 (Preparing a Remote Access Server for Smart Card Logons) 
        20.8 (Installing a Direct Serial Line Connection) 
        20.9 (Initializing the RRAS Service to Support Remote Access) 
        21.1 (Adding File Types to the File Exclusion List) 
        21.2 (Registering File Types for Backup Exclusions) 
        21.3 (Performing an Interactive Backup) 
        21.4 (Configuring and Scheduling a Backup Job) 
        21.5 (Restoring a File Manually Using Ntbackup) 
        21.6 (Cataloging a Tape) 
        21.7 (Booting with the Last Known Good Configuration) 
        21.8 (Installing the Recovery Console) 
        3.1 (Using Windows Update to Obtain Drivers for Another System) 
        3.2 (Using EFI DISKPART to Create a New Data Partition) 
        3.3 (Device Driver Update) 
        3.4 (Device Driver Rollback) 
        3.5 (Creating a Fault Tolerant Boot Floppy Disk) 
        3.6 (Using Ntdetect.chk) 
        3.7 (Configuring Performance Monitor to Collect kernel Memory Statistics) 
        3.8 (Charting Performance Monitor Logs) 
        4.1 (Functional Sequence for NetBIOS Name Resolution Using Broadcasts) 
        4.2 (Recovering from Failed Jet Database Conversion) 
        4.3 (Installing WINS on a Windows .NET Server) 
        4.4 (Configuring a WINS Client) 
        4.5 (Adding a Static WINS Mapping) 
        4.6 (Configuring WINS Replication) 
        4.7 (Disabling NetBIOS-over-TCP/IP Name Resolution) 
        5.1 (Functional Description of Query Handling by an Authoritative Name Server) 
        5.10 (Configuring Root Hints) 
        5.11 (Configuring Delegations) 
        5.12 (Enabling Zone Transfers and Notifications) 
        5.13 (Configuring a Secondary Server) 
        5.14 (Integrating a Primary Zone into Active Directory) 
        5.15 (Verifying Resource Record Integration) 
        5.16 (Configuring a Caching-Only Server) 
        5.17 (Configuring a DNS Server to Use a Forwarder) 
        5.18 (Configuring a Dynamic Zone) 
        5.19 (Disabling DNS on an Interface) 
        5.2 (Functional Description of Query Handling by Non-Authoritative Name Server) 
        5.20 (Configuring Scavenging) 
        5.21 (Setting Periodic Scavenging) 
        5.22 (Accessing Advanced Server Parameters) 
        5.23 (Starting DNS from a BIND File) 
        5.24 (Setting the Fail on Load if Bad Zone option) 
        5.25 (Installing DHCP Service Drivers) 
        5.26 (Configuring Scope Options) 
        5.3 (Functional Description of Reverse Lookup Query) 
        5.4 (Functional Description of Standard Polled Zone Transfer) 
        5.5 (Configuring DNS Information for TCP/IP Interface Properties) 
        5.6 (Configuring DNS Information in the System Properties Window) 
        5.7 (Installing DNS Drivers) 
        5.8 (Creating a Forward Lookup Zone) 
        5.9 (Creating a Reverse Lookup Zone) 
        6.1 (Creating a Custom Schema Management Console) 
        6.3 (Binding with LDP) 
        6.4 (Searching with LDP) 
        7. 10 (Forcing Replication with the AD Sites and Services Console) 
        7.11 (Selecting a New Replication Partner) 
        7.12 (Building a New Connection Object) 
        7.13 (Configuring Replmon) 
        7.2 (Replication Trace Showing USN Operation) 
        7.3 (Replication Trace Showing UTD Vector Operation) 
        7.4 (Renaming the Default-First-Site-Name Object) 
        7.5 (Creating a New Site Object) 
        7.6 (Creating a Subnet Object) 
        7.7 (Creating and Configuring Site Link Objects) 
        7.8 (Designating a Bridgehead Server) 
        7.9 (Building a Site Link Bridge Object) 
        8.1 (Assigning Custom UPN Suffixes) 
        9.1 (Promoting the First Windows .NET Domain Controller) 
        9.2 (Upgrading an Account Domain PDC) 
        9.3 (Verifying Transitive Trust Accessibility) 
        9.4 (Configuring the Password Migration Agent) 
        9.5 (Performing a User and Group Migration Using ADMT) 
        9.6 (Renaming a Domain Controller Using NETDOM COMPUTERNAME) 
        Accessing Advanced Server Parameters (5.22) 
        Accessing the Remote Installation Group Policy (2.10) 
        Accessing the WMI Filter Interface (12.5) 
        Adding a Static WINS Mapping (4.5) 
        Adding File Types to the File Exclusion List (21.1) 
        Applying Inheritable Rights to an Active Directory Container (13.1) 
        Assigning a Home Directory Using the Command Line (19.3) 
        Assigning a User Home Directory with AD Users and Computers (19.2) 
        Assigning Custom UPN Suffixes (8.1) 
        Audit Monitor for Logon/Logoff (11.13) 
        Audit Monitoring for Printers (11.14) 
        Binding with LDP (6.3) 
        Booting with the Last Known Good Configuration (21.7) 
        Breaking a Mirrored Volume (14.9) 
        Building a Fault Tolerant Boot Floppy (14.14) 
        Building a New Connection Object (7.12) 
        Building a Site Link Bridge Object (7.9) 
        Cataloging a Tape (21.6) 
        Changing a Role Master Using an MMC Console (10.3) 
        Changing Active Directory File Locations (10.13) 
        Changing Default RDP Port in the TSWeb Interface (19.5) 
        Changing Drive Letters (14.12) 
        Changing Log File Settings (11.10) 
        Changing the Network Provider Order (16.2) 
        CHAP Authentication Transaction (20.1) 
        Charting Performance Monitor Logs (3.8) 
        Classic NT Link Search Pattern (15.1) 
        Configuring a CA to Archive Certificates (18.4) 
        Configuring a Caching-Only Server (5.16) 
        Configuring a Cross-Realm Trust (11.8) 
        Configuring a Demand-Dial Router (20.12) 
        Configuring a DNS Server to Use a Forwarder (5.17) 
        Configuring a Dynamic Zone (5.18) 
        Configuring a GPO Security Descriptor to Filter Policy Recipients (12.4) 
        Configuring a Remote Installation Services Image (2.7) 
        Configuring a Remote Installation Services Server (2.8) 
        Configuring a Secondary Server (5.13) 
        Configuring a Spanned Volume (14.6) 
        Configuring a WINS Client (4.4) 
        Configuring an RRAS Server as an IAS Client (20.18) 
        Configuring and Scheduling a Backup Job (21.4) 
        Configuring Automatic Connection Pickup (20.13) 
        Configuring Delegations (5.11) 
        Configuring DNS Information for TCP/IP Interface Properties (5.5) 
        Configuring DNS Information in the System Properties Window (5.6) 
        Configuring NAT and ICF (20.14) 
        Configuring Performance Monitor to Collect kernel Memory Statistics (3.7) 
        Configuring Replmon (7.13) 
        Configuring Root Hints (5.10) 
        Configuring RRAS to Use RADIUS Authentication (20.19) 
        Configuring Scavenging (5.20) 
        Configuring Scope Options (5.26) 
        Configuring the Password Migration Agent (9.4) 
        Configuring the System to Dump Only the Contents of the Kernel Memory (1.3) 
        Configuring WINS Replication (4.6) 
        Continuing with the Graphic Mode Portion of Setup (1.2) 
        Converting a Basic Disk to a Dynamic Disk (14.4) 
        Correcting Lost Drive Signatures (1.4) 
        Creating a Custom Schema Management Console (6.1) 
        Creating a Dfs Root (16.6) 
        Creating a Fault Tolerant Boot Floppy Disk (3.5) 
        Creating a Forward Lookup Zone (5.8) 
        Creating a Key Recovery Agent (18.3) 
        Creating a Mount Point Using the Disk Management Console (15.5) 
        Creating a New Site Object (7.5) 
        Creating a Password Reset Disk (11.3) 
        Creating a Reverse Lookup Zone (5.9) 
        Creating a Subnet Object (7.6) 
        Creating an Archive Template (18.5) 
        Creating and Configuring Site Link Objects (7.7) 
        Creating and Sharing a Folder (16.3) 
        Creating Dfs Links (16.7) 
        Creating Extended Partitions and Logical Drives (14.2) 
        Creating Mirrored Volumes (14.8) 
        Creating Primary Partitions on Basic Disks (14.1) 
        Creating RAID 5 Volumes (14.10) 
        Creating Remote Shares Using the Computer Management Console (16.4) 
        Creating Simple Volumes (14.5) 
        Creating Striped Volumes (14.7) 
        Delegating Access Rights (13.2) 
        Deleting a Volume (14.11) 
        Designating a Bridgehead Server (7.8) 
        Designating Additional Dfs Link Targets (16.8) 
        Device Driver Rollback (3.4) 
        Device Driver Update (3.3) 
        Disabling DNS on an Interface (5.19) 
        Disabling EFS Using Windows .NET Group Policies (17.2) 
        Disabling NetBIOS-over-TCP/IP Name Resolution (4.7) 
        Disabling Remote Desktop (19.4) 
        Disabling Remote Desktop on .NET Server (19.7) 
        EAP Smart Card Authentication Transaction (20.2) 
        Enabling Compression (15.4) 
        Enabling Internet Connection Sharing and Internet Connection Firewall (20.15) 
        Enabling the Smart Card User Template (20.4) 
        Enabling Zone Transfers and Notifications (5.12) 
        Enrolling a Smart Card User (20.6) 
        Enrolling for a Certificate Using the Web (18.2) 
        Expanding a Basic Disk Partition Using Diskpart (14.3) 
        Exporting and Deleting an FR Private Key (17.6) 
        Exporting and Deleting the FR Public Key Certificate (17.3) 
        Forcing Replication with the AD Sites and Services Console (7.10) 
        Functional Description of Query Handling by an Authoritative Name Server (5.1) 
        Functional Description of Query Handling by Non-Authoritative Name Server (5.2) 
        Functional Description of Reverse Lookup Query (5.3) 
        Functional Description of Standard Polled Zone Transfer (5.4) 
        Functional Description of User and Group Validation Across Domains Using Domain Local Groups (13.4) 
        Functional Description of User and Group Validation Across Domains Using Universal Group (13.5) 
        Functional Description of User and Group Validation Within a Single Domain (13.3) 
        Functional Sequence for NetBIOS Name Resolution Using Broadcasts (4.1) 
        High-Level Kerberos Example (11.5) 
        Importing an FR Private Key from a PFX Certificate (17.8) 
        Initial Configuration of Routing Services (20.10) 
        Initializing the RRAS Service to Support Remote Access (20.9) 
        Installing a Demand-Dial Interface (20.11) 
        Installing a Direct Serial Line Connection (20.8 
        Installing a Non-PnP-Compatible Printer (16.12) 
        Installing a Standalone Root CA (18.1) 
        Installing Additional Network Clients (16.1) 
        Installing DHCP Service Drivers (5.25) 
        Installing DNS Drivers (5.7) 
        Installing Remote Installation Services (2.6) 
        Installing the Recovery Console (21.8) 
        Installing Windows .NET on a New Machine (1.1) 
        Installing WINS on a Windows .NET Server (4.3) 
        Integrating a Primary Zone into Active Directory (5.14) 
        Issuing Enrollment Agent Certificates to Operations Administrators (20.5) 
        Loading ADM Templates into the Group Policy Editor (12.7) 
        Loading an FR Public Key into the EFS Group Policy (17.5) 
        Manually Obtaining a Computer Certificate (20.16) 
        Monitoring Access to Directory Service Objects (11.12) 
        Monitoring for Unauthorized Folder Access (11.11) 
        Moving a Fault Tolerant Volume to Another Computer (14.16) 
        Obtaining FR Certificates for Additional DRAs (17.4) 
        Overriding a Policy Block (12.1) 
        Performing a Defragmentation Analysis (15.7) 
        Performing a Hard Repair of Active Directory (10.12) 
        Performing a Soft Recovery of Active Directory (10.11) 
        Performing a System State Backup (10.6) 
        Performing a System State Restore (10.8) 
        Performing a User and Group Migration Using ADMT (9.5) 
        Performing an Authoritative Restore (10.9) 
        Performing an Authoritative Restore of Sysvol (10.7) 
        Performing an Interactive Backup (21.3) 
        Performing an Offline Defragmentation of Active Directory (10.10) 
        Performing Initial Setup Assessment for NT4 Upgrade (2.1) 
        Preparing a Remote Access Server for Smart Card Logons (20.7) 
        Promoting the First Windows .NET Domain Controller (9.1) 
        Recovering a Lost Key (18.6) 
        Recovering from Failed Jet Database Conversion (4.2) 
        Registering an IAS Server with Active Directory (20.17) 
        Registering File Types for Backup Exclusions (21.2) 
        Relocating the Default Spool Directory (16.11) 
        Removing a Dfs Root (16.9) 
        Renaming a Domain Controller Using NETDOM COMPUTERNAME (9.6) 
        Renaming the Default-First-Site-Name Object (7.4) 
        Replacing a Failed Disk in a Mirrored Volume (14.15) 
        Replacing a Failed Disk in a RAID 5 Volume (14.13) 
        Replication Trace Showing USN Operation (7.2) 
        Replication Trace Showing UTD Vector Operation (7.4) 
        Restoring a File Manually Using Ntbackup (21.5) 
        Restoring Deleted Administrative Shares with Poledit (16.5) 
        Running the RSoP Wizard in Logging Mode (12.3) 
        Running the RSoP Wizard in Planning Mode (12.2) 
        Searching with LDP (6.4) 
        Seizing a FSMO Role (10.5) 
        Selecting a New Replication Partner (7.11) 
        Server Access Transaction Using Kerberos (11.7) 
        Setting Folder Encryption (17.7) 
        Setting Periodic Scavenging (5.21) 
        Setting Permissions on RIS Images (2.9) 
        Setting the Fail on Load if Bad Zone option (5.24) 
        Slipstreaming Service Pack Files (2.4) 
        Starting DNS from a BIND File (5.23) 
        Starting Explorer Shell Using RunAs (13.6) 
        Storing User Names and Passwords (11.2) 
        Task List for Setting Up Scripted Installations (2.2) 
        Testing Cross-Realm Kerberos Ticket Generation (11.9) 
        Transferring a Role Master Using Ntdsutil (10.4) 
        Upgrading an Account Domain PDC (9.2) 
        User Logon Transaction Using Kerberos (11.6) 
        Using a PRD to Change a Password (11.4) 
        Using Disk Cleanup (15.6) 
        Using EFI DISKPART to Create a New Data Partition 
        Using Ntdetect.chk (3.6) 
        Using Riprep to Image a Windows .NET Server (2.5) 
        Using RIS to Run Setup on a Headless Server (2.11) 
        Using Setup Manager to Create an Unattended Installation Script (2.3) 
        Using the ADSI Editor to View AD Objects (6.2) 
        Using the Security Configuration and Analysis Snap-In (12.6) 
        Using Windows Update to Obtain Drivers for Another System (3.1) 
        Verifying Link Tracking Operation (15.2) 
        Verifying Resource Record Integration (5.15) 
        Verifying WFP Operation (15.3) 
        Viewing a Resultant Set of Permissions (11.1) 
        Viewing Personal Certificates via the Certificates Snap-In (17.1) 
        Viewing Printer Driver Details (16.10) 
    process protection
        hardware  2nd  3rd 
    processing
        CSEs
            script processing  2nd 
        group policies 
            loopback processing  2nd  3rd  4th 
    processors
        Datacenter Server
            support 
        Enterprise Server
            support 
        Standard Server
            support 
        supprt 
    product key entry
        automating 
    profile settings
        domains 
    profiles
        RunAs command 
    Programming Server-Side Applications for Windows 2000 (i) 
    Programming the Microsoft Windows Driver Model (i) 
    promoting
        domain controllers
            backup tapes 
            local SAM 
        domains
            troubleshooting  2nd  3rd 
    Promoting the First Windows .NET Domain Controller procedure (9.1) 
    promotion utility
        Domain Controller 
    properties
        print servers
            managing  2nd 
        printers
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th 
    property metadata 
        Active Directory
            replication  2nd  3rd 
    property replication
        Active Directory  2nd 
    Property Version Numbers (PVNs) 
    protection
        drivers 
    protective MBR 
    protocol tracing
        dial-up sessions
            monitoring  2nd  3rd  4th  5th 
    protocols
        20.3 (Standard PPP Transaction Details) 
        Standard PPP Transaction Details (20.3) 
        traceable protocols 
    providers
        (network) 
        installing  2nd  3rd  4th 
        MPRs (Multiple Provider Routers)  2nd  3rd 
        MUPs (Multiple UNC Providers)  2nd 
        NetWare providers 
        network services  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        order
            changing  2nd  3rd 
        print providers  2nd 
        Remote Desktop providers 
        Web Client providers 
        Windows providers 
        Winsock providers 
    PSTN
        (Public Switched Telephone Network) 
    Public Key Cryptography Services (PKCS).   [See PKCS (Public Key Cryptogrphy Services)]
    public key elements (PKI) 
    Public Key entity (certificates) 
    Public Key Infrastructure (PKI).   [See PKI (Public Key Infrastructure)]
    public key services
        PKI  2nd  3rd  4th  5th  6th 
            D-H (Diffie-Hellman)  2nd 
            DSS (Digital Signature Standard)  2nd 
            RSA 
    Public Switched Telephone Network (PSTN).   [See PSTN (Public Switched Telephone Network)]
    publication
        CRLs (Certification Revocation Lists)  2nd  3rd  4th 
    published packages
        software deployment 
    pull updates
        domain controllers 
    PVNs (Property Version Numbers) 
    PW2CA (Pre-Windows 2000 Compatible Access)
        Active Directory 
    PXE
        boot disks
            creating  2nd 
    PXE (Pre-boot Execution Environment
        RIS  2nd