• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    RA (Registration Authority) 
    RADIUS
        (Remote Authentication Dial-In User Services)  2nd  3rd  4th  5th  6th  7th  8th 
        IAS
            support  2nd  3rd  4th  5th  6th 
        RRAS
            support  2nd  3rd  4th  5th  6th 
    RAID 5 volumes  2nd  3rd 
        failed disks
            replcaing in  2nd  3rd  4th  5th 
    RAS servers
        anonymous access  2nd 
        remote access  2nd  3rd  4th  5th  6th  7th  8th 
    RBFG (Remote Boot Floppy Generator) 
    RC algorithms 
    rdisk() entry
        Boot.ini 
    RDP 
        (Remote Desktop Protocol)  2nd 
        clients
            connections  2nd  3rd  4th 
        data stream encryption  2nd 
        improvements to 
        remote assistance 
        Remote Desktop
            disabling 
        Remote Desktop client  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        servers
            managing  2nd  3rd  4th  5th  6th 
    RDP Redirector 
    realm names (Kerberos reply messages) 
    realms
        Kerberos 
    record verifications
        DNS 
    records
        DNS
            resource records  2nd 
            scavenging  2nd 
        MFT 
        MFT records
            reparse points  2nd  3rd  4th  5th  6th  7th 
        NTFS  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            $Data  2nd  3rd  4th 
            $File_Name  2nd  3rd 
            $Standard_Information  2nd  3rd 
            header information  2nd 
            short name generation  2nd  3rd  4th 
        WINS
            deleting 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
    recoverability
        domains 
    recovering
        certificates  2nd  3rd 
        failed fault tolerant disks  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
        keys
            PKI  2nd  3rd  4th  5th 
        Recovery Console  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
    Recovering a Lost Key procedure (18.6) 
    Recovering from Failed Jet Database Conversion procedure (4.2) 
    recovery
        file encryption  2nd  3rd  4th  5th  6th 
        file systems  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
            Windows File Protection  2nd  3rd  4th  5th  6th  7th  8th  9th 
        keys
            PKI 
    Recovery Console  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        dynamic volumes 
        installing  2nd  3rd  4th  5th 
        limitations  2nd  3rd 
        loading
            RIS (Remote Installation Services)  2nd 
        options  2nd  3rd  4th 
    recovery stages
        Active Directory 
    recursive search type flags
        DNS 
    Red Hat v7.1 Reference Guide Web site 
    redirection
        folders
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
    redirectors 
        default share points  2nd  3rd  4th 
        NetWare Redirector 
        network services  2nd  3rd  4th  5th  6th  7th  8th  9th 
        RDP Redirector 
        Registry keys 
        server file systems 
        TDI (Transport Driver Interface) 
        WebDAV Redirector 
        Windows Redirector 
    references
        MITv5 Kerberos  2nd 
    referrals
        clients 
        Dfs (Distributed File Sharing)  2nd 
    refresh intervals
        record scavenging 
    registering
        names
            WINS 
        Windows .NET  2nd  3rd  4th  5th 
    Registering an IAS Server with Active Directory procedure (20.17) 
    Registering File Types for Backup Exclusions procedure (21.2) 
    Registration Authority (RA) 
    Registry
        cells 
        keys
            policies  2nd  3rd 
            redirectors 
        LDP entries 
        modems
            entries 
        mount point information 
        policy tracking 
        printer entries 
        shared folders 
        size
            improvements to 
        structure 
        Synchronization Manager
            settings 
    Registry size limit (RSL) 
    Registry size limit (RSL).   [See RSL (Registry size limit)]
    Registry.pol files
        administrative template files  2nd 
    relationships
        trusts 
    relative distinguished names
        namespaces
            LDAP 
    Relative IDs (RIDs).   [See RIDs (Relative IDs)]
    reliability
        domains 
    Relocating the Default Spool Directory procedure (16.11) 
    RemInstall shares 
    remote access
        Active Directory domains  2nd  3rd  4th  5th  6th  7th  8th 
        broadband 
        cell-switched networks 
        circuit-switched networks 
        dedicated networks 
        demand-dial routers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        IAS (Internet Authentication Services)
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
        Internet gateways
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
        managing  2nd  3rd  4th  5th  6th 
        modems
            installing and configuring for  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd 
        network bridges
            configuring  2nd  3rd  4th  5th  6th  7th 
        NT4 RAS servers  2nd  3rd  4th  5th  6th  7th  8th 
        NT4 RRAS servers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th 
        packet-switched networks 
        PPP (Point-to-Point Protocol)
            authentication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th 
        servers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th 
        smart cards
            certificate templates preaparation  2nd  3rd  4th 
            certificate testing  2nd 
            configuring for 
            deploying for  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th 
            enrollment agent certificates  2nd  3rd  4th  5th  6th  7th 
            form factors  2nd 
            PKI preparations  2nd  3rd 
            remote logon testing  2nd  3rd 
            RRAS configuration  2nd  3rd  4th  5th 
            selecting  2nd  3rd 
            user enrollment  2nd  3rd  4th  5th  6th  7th  8th  9th 
        VPNs
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th 
        WAN device support  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st 
    remote access permissions
        controlling  2nd  3rd 
    Remote Administration mode (terminal services) 
    Remote Assistance 
    remote assistance
        RDP 
    Remote Assistance
        terminal services  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
    Remote Authentication Dial-In User Services (RADIUS).   [See RADIUS (Remote Authentication Dial-In User Services)]
    Remote Boot Floppy Generator (RBFG).   [See RBFG (Remote Boot Floppy Generator)]
    remote control
        terminal services  2nd  3rd  4th 
    Remote Desktop
        disabling 
        PocketPCs 
    Remote Desktop (RDP)  2nd  3rd  4th  5th  6th  7th  8th 
    Remote Desktop client (Mstsc.exe)  2nd  3rd  4th  5th  6th  7th  8th 
    Remote Desktop Protocol (RDP).   [See RDP (Remote Desktop Protocol)]2nd  [See RDP (Remote Desktop Protocol)]
    Remote Desktop providers 
    Remote Installation Services (RIS).   [See RIS (Remote Installation Services)]2nd  [See RIS (Remote Installation Services)]
    remote logon testing
        smart cards  2nd  3rd 
    remote management
        servers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
    Remote Procedure Calls (RPCs).   [See RPCs (Remote Procedure Calls)]
    remote shares
        creating  2nd  3rd  4th  5th 
    Remote Storage File Analysis utility 
    Remote Storage Services (RSS).   [See RSS (Remote Storage Services)]2nd  [See RSS (Remote Storage Services)]
    removable drives
        NTFS  2nd  3rd 
    removable media drives  2nd  3rd 
        installing  2nd  3rd  4th 
    removable storage 
    Removable Storage Management (RSM) service.   [See RSM (Removable Storage Management) service]
    Removable Storage Management (RSM).   [See RSM (Removable Storage Management)]
    Removable Storage Manager (RSM) 
    Removing a Dfs Root procedure (16.9) 
    renaming
        Default-First-Site-Name Object 
        domain controllers  2nd  3rd 
        domains  2nd 
    Renaming a Domain Controller Using NETDOM COMPUTERNAME procedure (9.6) 
    Renaming the Default-First-Site-Name Object procedure (7.4) 
    renewal intervals
        WINS database
            setting  2nd  3rd  4th  5th  6th 
    repairs
        forcing
            AUTOCHK 
    reparse points
        file systems  2nd  3rd  4th  5th  6th  7th 
        identifying 
        MFT records  2nd  3rd  4th  5th  6th  7th 
        mount points 
    Replacing a Failed Disk in a Mirrored Volume procedure (14.15) 
    Replacing a Failed Disk in a RAID 5 Volume procedure (14.13) 
    replica ring formations 
    replica ring repairs  2nd 
    replication
        account replication
            BDCs 
        Active Directory
            Application naming context 
            bridgehead server selection  2nd 
            bridgehead servers  2nd 
            collision handling  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            connections  2nd  3rd 
            deleted containers  2nd 
            deleted object handling  2nd  3rd 
            deleted objects 
            frequency  2nd  3rd  4th  5th  6th  7th 
            garbage collection  2nd  3rd  4th 
            identical distinguished names  2nd  3rd 
            inter-site replication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            inter-site topologies  2nd 
            ISTGs (Inter-Site Topology Generators)  2nd  3rd  4th  5th 
            KCC (Knowledge Consistency Checker) 
            linked values 
            loss of components  2nd  3rd  4th  5th 
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
            methods  2nd  3rd  4th 
            moved objects 
            naming contexts  2nd  3rd 
            NET TIME  2nd  3rd  4th 
            new features  2nd 
            parameter control  2nd  3rd  4th  5th  6th  7th  8th 
            property metadata  2nd  3rd 
            property replication  2nd 
            simultaneous modification  2nd 
            site objects  2nd  3rd  4th 
            sites  2nd  3rd 
            special operations  2nd  3rd  4th  5th  6th  7th  8th  9th 
            topology  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            transactions  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
            troubleshooting  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
            WIN32TM  2nd  3rd  4th 
            WTS (Windows Time Service)  2nd  3rd 
        bridging 
        connections
            manually creating  2nd 
        forcing  2nd  3rd  4th 
        FRS (File Replication Service) 
            diagnostic logging 
        intervals
            setting  2nd  3rd  4th  5th 
        loosely coupled replication mechanisms 
        manually controlling  2nd  3rd 
        members
            groups 
        RPCs (Remote Procedure Calls)  2nd 
        scripts 
        security descriptors 
        SMTP (Simple Mail Transport Protocol) 
        Windows NT 
        WINS  2nd  3rd  4th  5th 
            configuring  2nd  3rd  4th 
    replication topologies
        Dfs
            changing  2nd  3rd 
    replication topology
        FRS (File Replication Service)  2nd  3rd  4th 
    Replication Trace Showing USN Operation procedure (7.2) 
    Replication Trace Showing UTD Vector Operation procedure (7.3) 
    Request for Comments (RFCs).   [See RFCs (Request for Comments)]
    requests
        certificates 
    Res1.log file (Active Directory) 
    Res2.log file (Active Directory) 
    reserved variables
        OSCML 
    resets
        passwords 
            handling for local accounts  2nd 
            reset disks  2nd  3rd  4th  5th  6th 
    resetting
        UPNs
            scripts 
    resolvers
        DNS clients  2nd  3rd  4th  5th 
    resource domains
        upgrading  2nd  3rd 
    Resource Kit
        GPRESULT (Standard Utility) tool  2nd 
        GPRESULT tool 
        SHOWPRIVS tool 
        WHOAMI tool  2nd 
    resource records
        DNS  2nd 
    resource sharing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd 
        administrative shares 
            CD-ROM drives 
        clients
            printing configuration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd  54th 
        fax sharing 
        file sharing
            administrative shares  2nd 
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            Dfs (Distributed File Sharing)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th 
            remote share creation  2nd  3rd  4th  5th 
            share creation  2nd  3rd  4th  5th  6th  7th  8th 
            share permissions  2nd  3rd 
            XP desktops  2nd  3rd 
        FxsSrvCp$ 
        IPC$ shares 
        Netlogin shares 
        network applications  2nd  3rd  4th 
        print services
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
        Print$ 
        printer sharing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
            enhanced metafiles  2nd 
            initial job rendering  2nd  3rd 
            network printing  2nd  3rd  4th 
            port monitors  2nd  3rd  4th 
            print job delivery  2nd 
            printer drivers  2nd  3rd  4th  5th  6th  7th  8th  9th 
            spoolers  2nd  3rd  4th  5th  6th  7th  8th  9th 
        providers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
            installing  2nd  3rd  4th 
            MPRs (Multiple Provider Routers)  2nd  3rd 
            MUPs (Multiple UNC Providers)  2nd 
            order changing  2nd  3rd 
            print providers 
        redirectors  2nd  3rd  4th  5th  6th  7th  8th  9th 
            default share points  2nd  3rd  4th 
            server file systems 
        RemInstall shares 
        shared folders
            connecting to  2nd  3rd  4th  5th  6th 
        Sysvol shares 
    resources
        network services  2nd  3rd  4th  5th 
        PKI 
    responses
        ICMP (Internet Control Message Protocol)
            controlling 
    restore points
        Ntbackup 
    restores
        monitoring 
    restoring
        Active Directory  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
            authoritative restores  2nd  3rd  4th  5th  6th  7th  8th 
            backup tape time limits  2nd  3rd  4th  5th 
            permissions  2nd 
            System State files  2nd  3rd  4th 
            Sysvol  2nd 
        files  2nd  3rd  4th  5th  6th  7th 
        Last Known Good Configuration  2nd 
            Control Sets  2nd  3rd  4th  5th  6th 
        systems 
    Restoring a File Manually Using Ntbackup procedure (21.5) 
    Restoring Deleted Administrative Shares with Poledit procedure (16.5) 
    restrictions
        database size restrictions
            multiple domains  2nd 
        dynamic volumes  2nd  3rd  4th 
        NetBIOS name resolution  2nd  3rd 
        password policy restrictions
            multiple domains  2nd 
        performance restrictions
            multiple domains  2nd 
        political restrictions
            multiple domains  2nd  3rd  4th 
        SMTP replication restrictions
            multiple domains 
    Resultant Set of Policies (RSoP).   [See RSoP (Resultant Set of Policies)]
    reverse lookup queries
        DNS  2nd  3rd  4th  5th  6th  7th  8th 
    reverse lookup zones
        DNS
            creating  2nd  3rd  4th 
    reversible passwords  2nd 
        enabling  2nd  3rd  4th  5th 
    reverting
        dynamic disks 
    revision levels
        version numbers
            GPOs 
    revocation checks
        certificates 
    RFCs (Request for Comments)  2nd 
    Richter, Jeffrey 
    RID Master
        FSMOs 
    RIDs
        well-known RIDs  2nd  3rd 
    RIDs (Relative IDs)
        Active Directory  2nd 
    Rijmen, Vincent 
    RIP
        (Routing Information Protocol) 
    Riprep
        requirements 
        RIS images
            creating  2nd  3rd  4th  5th  6th  7th 
        scripts 
    RIS
        (Remote Installation Services)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th 
        BINL (Boot Information Negotiation Layer)  2nd  3rd  4th  5th 
        CIW
            screen customization  2nd  3rd  4th  5th 
        CIW (Client Installation Wizard)  2nd  3rd  4th  5th  6th  7th 
        configuring  2nd  3rd  4th  5th 
            verification 
        custom computer names 
        DHCP  2nd 
        functional overview  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th 
        group policies
            controlling  2nd  3rd 
        headless server installations  2nd  3rd  4th  5th  6th 
        images
            access control 
            creating  2nd  3rd  4th  5th  6th  7th 
        installing  2nd  3rd  4th 
        PXE (Pre-boot Execution Environment  2nd 
        PXE boot disks
            creating  2nd 
        setup scripts  2nd  3rd 
        volume requirements  2nd 
    Rivest, Ron 
    Rivest, Ronald 
    role master
        Active Directory  2nd 
    role masters
        FSMOs 
    roles
        domain controllers
            setting  2nd  3rd 
    rollbacks
        device drivers  2nd  3rd 
    root CAs 
    root certificate updates
        CAs 
    root command (Nslookup) 
    root directories
        Dfs
            creating  2nd  3rd 
    root domain names
        Active Directory domains  2nd  3rd  4th  5th  6th 
    root domains 
        upgrading  2nd  3rd 
    root hints
        DNS  2nd  3rd  4th 
            configuring  2nd  3rd 
            updating  2nd 
    Root System Description Table (RSDT) 
    root zones
        DNS
            Windows 2000 
    RootDSE
        LDAP  2nd 
    roots
        Dfs  2nd  3rd 
            limitations 
            removing  2nd  3rd  4th 
    routers
        demand-dial routers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
    routing
        Active Directory domains  2nd  3rd  4th  5th  6th  7th  8th 
        demand-dial routers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        Internet routing  2nd  3rd  4th  5th  6th 
        NT4 RAS servers  2nd  3rd  4th  5th  6th  7th  8th 
        NT4 RRAS servers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th 
        PPP (Point-to-Point Protocol)
            authentication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th 
        routing protocols 
        WAN device support  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st 
    Routing and Remote Access Services (RRAS).   [See RRAS (Routing and Remote Access Services)]2nd  [See RRAS (Routing and Remote Access Services)]
    Routing Information Protocol (RIP).   [See RIP (Routing Information Protocol)]
    routing protocols 
    RPCs (Remote Procedure Calls) 
    RRAS
        (Routing and Remote Access Services)  2nd 
        .  [See also NT4 RRAS servers]
        configuring  2nd  3rd  4th  5th  6th  7th  8th 
            RADIUS authentication  2nd  3rd  4th  5th  6th 
            smart card acceptance  2nd  3rd  4th  5th 
        initializing  2nd  3rd 
        Internet gateways
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
        managing
            command line  2nd  3rd  4th  5th 
        NAT
            configuring in  2nd 
    RSA Labs Web site 
    RSA public key technology 
    RSAenh CSP provider 
    RSDT (Root System Description Table) 
    RSL
        (Registry size limit) 
    RSL (Registry size limit) 
    RSM
        (Removable Storage Management) service 
    RSM (Removable Storage Management) 
        Ntbackup  2nd  3rd  4th  5th 
    RSM (Removable Storage Manager) 
    RSoP
        (Resultant Set of Policies) 
        GPOs (Group Policy Objects)  2nd  3rd  4th  5th  6th  7th 
            GPRESULT 
            logging  2nd 
    RSoP Wizard 
    RSS
        (Remote Storage Services)  2nd 
    rules
        schema
            Active Directory  2nd  3rd  4th 
    RunAs
        Active Directory  2nd  3rd  4th  5th 
    RunAs command
        profiles 
        switches  2nd  3rd 
        syntax  2nd 
    running
        scripts
            unattended setup 
    Running the RSoP Wizard in Logging Mode procedure (12.3) 
    Running the RSoP Wizard in Planning Mode procedure (12.2) 
    Russinovich, Mark  2nd