• Chapter 1. Installing and Configuring Windows Server 2003
  • software development Company Server 2003
  • Chapter 1. Installing and Configuring Windows Server 2003
  • New Features in Windows Server 2003
  • Best Practices
  • Moving Forward
  • Version Comparisons
  • Hardware Recommendations
  • Installation Checklist
  • Functional Overview of Windows Server 2003 Setup
  • Installing Windows Server 2003
  • Post Setup Configurations
  • Functional Description of the Windows Server 2003 Boot Process
  • Correcting Common Setup Problems
  • Chapter 2. Performing Upgrades and Automated Installations
  • New Features in Windows Server 2003
  • NT4 Upgrade Functional Overview
  • Upgrading an NT4 or Windows 2000 Server
  • Automating Windows Server 2003 Deployments
  • Moving Forward
  • Chapter 3. Adding Hardware
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Architecture
  • Overview of Windows Server 2003 Plug and Play
  • Installing and Configuring Devices
  • Troubleshooting New Devices
  • Moving Forward
  • Chapter 4. Managing NetBIOS Name Resolution
  • New Features in Windows Server 2003
  • Moving Forward
  • Overview of Windows Server 2003 Networking
  • Name Resolution and Network Services
  • Network Diagnostic Utilities
  • Resolving NetBIOS Names Using Broadcasts
  • Resolving NetBIOS Names Using Lmhosts
  • Resolving NetBIOS Names Using WINS
  • Managing WINS
  • Disabling NetBIOS-over-TCP/IP Name Resolution
  • Chapter 5. Managing DNS
  • New Features in Windows Server 2003
  • Configuring a Caching-Only Server
  • Configuring a DNS Server to Use a Forwarder
  • Managing Dynamic DNS
  • Configuring Advanced DNS Server Parameters
  • Examining Zones with Nslookup
  • Command-Line Management of DNS
  • Configuring DHCP to Support DNS
  • Moving Forward
  • Overview of DNS Domain Structure
  • Functional Description of DNS Query Handling
  • Designing DNS Domains
  • Active Directory Integration
  • Configuring DNS Clients
  • Installing and Configuring DNS Servers
  • Configuring Secondary DNS Servers
  • Integrating DNS Zones into Active Directory
  • Chapter 6. Understanding Active Directory Services
  • New Features in Windows Server 2003
  • Active Directory Support Files
  • Active Directory Utilities
  • Bulk Imports and Exports
  • Moving Forward
  • Limitations of Classic NT Security
  • Directory Service Components
  • Brief History of Directory Services
  • X.500 Overview
  • LDAP Information Model
  • LDAP Namespace Structure
  • Active Directory Namespace Structure
  • Active Directory Schema
  • Chapter 7. Managing Active Directory Replication
  • New Features in Windows Server 2003
  • Replication Overview
  • Detailed Replication Transaction Descriptions
  • Designing Site Architectures
  • Configuring Inter-site Replication
  • Controlling Replication Parameters
  • Special Replication Operations
  • Troubleshooting Replication Problems
  • Moving Forward
  • Chapter 8. Designing Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Design Objectives
  • DNS and Active Directory Namespaces
  • Domain Design Strategies
  • Strategies for OU Design
  • Flexible Single Master Operations
  • Domain Controller Placement
  • Moving Forward
  • Chapter 9. Deploying Windows Server 2003 Domains
  • New Features in Windows Server 2003
  • Preparing for an NT Domain Upgrade
  • In-Place Upgrade of an NT4 Domain
  • In-Place Upgrade of a Windows 2000 Forest
  • Migrating from NT and Windows 2000 Domains to Windows Server 2003
  • Additional Domain Operations
  • Moving Forward
  • Chapter 10. Active Directory Maintenance
  • New Features in Windows Server 2003
  • Loss of a DNS Server
  • Loss of a Domain Controller
  • Loss of Key Replication Components
  • Backing Up the Directory
  • Performing Directory Maintenance
  • Moving Forward
  • Chapter 11. Understanding Network Access Security and Kerberos
  • New Features in Windows Server 2003
  • Windows Server 2003 Security Architecture
  • Security Components
  • Password Security
  • Authentication
  • Analysis of Kerberos Transactions
  • MITv5 Kerberos Interoperability
  • Security Auditing
  • Moving Forward
  • Chapter 12. Managing Group Policies
  • New Features in Windows Server 2003
  • Group Policy Operational Overview
  • Managing Individual Group Policy Types
  • Moving Forward
  • Chapter 13. Managing Active Directory Security
  • New Features in Windows Server 2003
  • Overview of Active Directory Security
  • Using Groups to Manage Active Directory Objects
  • Service Accounts
  • Using the Secondary Logon Service and RunAs
  • Using WMI for Active Directory Event Notification
  • Moving Forward
  • Chapter 14. Configuring Data Storage
  • New Features in Windows Server 2003
  • Functional Description of Windows Server 2003 Data Storage
  • Performing Disk Operations on IA32 Systems
  • Recovering Failed Fault Tolerant Disks
  • Working with GPT Disks
  • Moving Forward
  • Chapter 15. Managing File Systems
  • New Features in Windows Server 2003
  • Overview of Windows Server 2003 File Systems
  • NTFS Attributes
  • Link Tracking Service
  • Reparse Points
  • File System Recovery and Fault Tolerance
  • Quotas
  • File System Operations
  • Moving Forward
  • Chapter 16. Managing Shared Resources
  • New Features in Windows Server 2003
  • Functional Description of Windows Resource Sharing
  • Configuring File Sharing
  • Connecting to Shared Folders
  • Resource Sharing Using the Distributed File System (Dfs)
  • Printer Sharing
  • Configuring Windows Server 2003 Clients to Print
  • Managing Print Services
  • Moving Forward
  • Chapter 17. Managing File Encryption
  • New Features in Windows Server 2003
  • File Encryption Functional Description
  • Certificate Management
  • Encrypted File Recovery
  • Encrypting Server-Based Files
  • EFS File Transactions and WebDAV
  • Special EFS Guidelines
  • EFS Procedures
  • Moving Forward
  • Chapter 18. Managing a Public Key Infrastructure
  • New Features in Windows Server 2003
  • Moving Forward
  • PKI Goals
  • Cryptographic Elements in Windows Server 2003
  • Public/Private Key Services
  • Certificates
  • Certification Authorities
  • Certificate Enrollment
  • Key Archival and Recovery
  • Command-Line PKI Tools
  • Chapter 19. Managing the User Operating Environment
  • New Features in Windows Server 2003
  • Side-by-Side Assemblies
  • User State Migration
  • Managing Folder Redirection
  • Creating and Managing Home Directories
  • Managing Offline Files
  • Managing Servers via Remote Desktop
  • Moving Forward
  • Chapter 20. Managing Remote Access and Internet Routing
  • New Features in Windows Server 2003
  • Configuring a Network Bridge
  • Configuring Virtual Private Network Connections
  • Configuring Internet Authentication Services (IAS)
  • Moving Forward
  • Functional Description of WAN Device Support
  • PPP Authentication
  • NT4 RAS Servers and Active Directory Domains
  • Deploying Smart Cards for Remote Access
  • Installing and Configuring Modems
  • Configuring a Remote Access Server
  • Configuring a Demand-Dial Router
  • Configuring an Internet Gateway Using NAT
  • Chapter 21. Recovering from System Failures
  • New Features in Windows Server 2003
  • Functional Description Ntbackup
  • Backup and Restore Operations
  • Recovering from Blue Screen Stops
  • Using Emergency Management Services (EMS)
  • Using Safe Mode
  • Restoring Functionality with the Last Known Good Configuration
  • Recovery Console
  • Moving Forward
  • Who Should Read This Book
  • Who This Book Is Not For
  • Conventions
  • Acknowledgments
  • About the Author
  • About the Technical Reviewers
  • Index
  • Index A
  • Index B
  • Index C
  • Index D
  • Index E
  • Index F
  • Index G
  • Index H
  • Index I
  • Index J
  • Index K
  • Index L
  • Index M
  • Index N
  • Index O
  • Index P
  • Index Q
  • Index R
  • Index S
  • Index SYMBOL
  • Index T
  • Index U
  • Index V
  • Index W
  • Index X
  • Index Z
  • Preface

  • [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

    SAC (Special Administration Console)
        EMS  2nd  3rd 
    SACLs
        (system access control lists) 
    Safe Mode
        backups  2nd  3rd  4th  5th 
    Safe Mode with Command Prompt 
    Safe Mode with Networking 
    SAM
        (Security Account Manager)  2nd  3rd 
        domains
            upgrading  2nd  3rd 
    SAM databases  2nd 
    samba clients
        NTLMv2 passwords 
    SAS
        (Secure Attention Sequence) 
    SAS (Secure Attention Sequence) 
    scavenging
        Dynamic DNS
            configuring  2nd  3rd  4th  5th 
        records
            DNS  2nd 
    Schannel security package 
    scheduling
        backup jobs  2nd  3rd  4th  5th  6th 
    schema
        Active Directory 
            class derivations  2nd 
            definition objects  2nd 
            functional operations  2nd  3rd  4th 
            object classes  2nd 
            object identification  2nd  3rd  4th 
            rules  2nd  3rd  4th 
    Schema console
        Active Directory  2nd  3rd  4th  5th  6th  7th 
    schema master
        Active Directory  2nd 
    Schema Master
        Schema naming context 
    Schema Master (FSMOs) 
    Schema naming context 
        Active Directory  2nd 
        Schema Master 
    schema upgrades
        forests  2nd 
    Schema.ini file (Active Directory) 
    schemas
        databases  2nd 
    Schlumberger Web site 
    scope options
        DHCP
            configuring  2nd  3rd  4th  5th 
    script
        deploying  2nd  3rd 
        running
            unattended setup 
    script policies
        deploying  2nd  3rd 
        group policies  2nd  3rd  4th  5th  6th  7th 
    script processing
        CSEs (Client-Side Extensions)  2nd 
    scripted installations  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd 
    scripts
        Clonegg 
        Cloneggu 
        Clonelg 
        Clonepr 
        domains
            support  2nd 
        replication 
        Riprep 
        RIS  2nd  3rd 
        Sidhist 
        types 
        unattended scripts
            customizations 
        unattended setup batch files 
        unattended setup scripts 
            creating  2nd  3rd  4th  5th  6th  7th  8th  9th 
        VBScript
            viruses 
    SCSI
        problems
            resolving  2nd 
    SCSI adapters
        installing  2nd  3rd 
    SCSI cables
        checking 
    SCSI drivers
        alternative 
    SCSI drives
        installing  2nd  3rd 
    Scsiport.sys drivers 
    searches
        LDAP  2nd 
    searching
        shared folders
            connecting to 
    Searching with LDP procedure (6.4) 
    Secedit utility 
    secondaries
        DNS  2nd 
    secondary bootstrap  2nd 
    Secondary Logon Service (SLS).   [See SLS (Secondary Logon Service)]
    secondary name servers
        DNS  2nd  3rd 
    secondary servers
        DNS
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th 
    secrets (LSA) 
    sectors
        file systems  2nd  3rd  4th  5th  6th  7th 
    Secure Attention Sequence (SAS).   [See SAS (Secure Attention Sequence)]2nd  [See SAS (Secure Attention Sequence)]
    Secure Hash Algorithm (SHA).   [See SHA-1 (Secure Hash Algorithm)]
    Secure Hash Standard (SHS).   [See SHS (Secure Hash Standard)]
    SecureID smart cards 
    SecureNet Web site 
    security
        access masks 
        access permissions
            evaluation  2nd  3rd  4th  5th  6th  7th 
        access tokens  2nd  3rd  4th 
        ACLs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            access permission evaluation  2nd  3rd  4th  5th  6th  7th 
        Active Directory  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st 
            access control inheritance  2nd  3rd  4th  5th  6th 
            access list management  2nd  3rd  4th 
            access permissions 
            access rights  2nd 
            access rights delegation  2nd  3rd  4th  5th  6th 
            anonymous access  2nd 
            descriptor contents  2nd  3rd  4th 
            event notification  2nd  3rd 
            groups  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            improvements to  2nd 
            LSA (Local Security Authority) 
            managing  2nd  3rd  4th 
            object protection  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            primaries 
            RunAs  2nd  3rd  4th  5th 
            security descriptors 
            security principals  2nd 
            service accounts  2nd 
            SLS (Secondary Logon Service)  2nd  3rd  4th  5th 
            SRM (Security Reference Monitor) 
        architecture  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        auditing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            audit logs  2nd 
            enabling  2nd  3rd 
            event log managment  2nd  3rd  4th  5th 
            kernel object auditing 
            recommendations  2nd  3rd  4th  5th  6th  7th  8th  9th 
        authentication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th 
            Kerberos  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th 
            limitations  2nd 
            MITv5 Kerberos interoperability  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
            support  2nd 
        backups
            EMS  2nd  3rd  4th  5th  6th  7th  8th 
            EMS (Emergency Management Services) 
            interactive backups  2nd  3rd  4th  5th  6th  7th 
            job scheduling  2nd  3rd  4th  5th  6th 
            Safe Mode  2nd  3rd  4th  5th 
        BSOD (Blue Screen of Death)
            recovering from  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
        components 
        connections
            ICF (Internet Connection Firewall)  2nd 
        Digest security package 
        DNS  2nd  3rd  4th  5th  6th 
        domains 
        Dynamic DNS
            managing  2nd  3rd 
        encryption
            PKI (Public Key Infrastructure)  2nd  3rd 
        file encryption  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th 
            certificate management  2nd  3rd  4th  5th  6th  7th 
            data encryption  2nd  3rd  4th 
            data encryption algorithms  2nd  3rd  4th 
            disabling  2nd  3rd  4th  5th  6th  7th 
            EFS  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th 
            EFS file transactions  2nd  3rd  4th  5th  6th  7th  8th 
            FEK (File Encryption Key)  2nd  3rd  4th  5th  6th 
            file decryption process  2nd  3rd 
            individual files 
            private key protection  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 
            process description  2nd  3rd 
            recovery  2nd  3rd 
            transporting  2nd 
            WebDAV  2nd  3rd  4th  5th  6th  7th  8th 
        Kerberos  2nd  3rd  4th 
            authorization data  2nd  3rd  4th  5th  6th  7th  8th  9th 
        LSA
            (Local Security Authority) 
            components  2nd  3rd  4th  5th  6th  7th  8th  9th 
            functional diagram 
            operations  2nd 
        Negotiate security package 
        network access  2nd  3rd 
        Ntbackup  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th 
        NTLM 
        passwords  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th 
            anonymous logons  2nd  3rd  4th 
            computer passwords  2nd  3rd  4th 
            crackers 
            credentials caches  2nd  3rd  4th 
            formats  2nd  3rd  4th  5th 
            handling for local accounts  2nd 
            hashing algorithm 
            password reset disks 
            policies  2nd  3rd  4th  5th  6th 
            reset disks  2nd  3rd  4th  5th  6th 
            resets 
            reversible passwords  2nd  3rd  4th  5th 
            storage  2nd  3rd  4th  5th  6th  7th  8th  9th 
            vunerabilities  2nd  3rd  4th  5th  6th 
        permissions  2nd 
            inheritance  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th 
            system privileges  2nd  3rd 
            viewing  2nd 
        PKI
            cipher keys  2nd 
            hashes  2nd  3rd  4th 
        policies  2nd  3rd  4th  5th  6th 
            folder redirection  2nd 
            Kerberos  2nd 
        print policies  2nd  3rd 
        printers  2nd  3rd 
        Recovery Console  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 
        restores  2nd  3rd  4th  5th  6th  7th 
        Schannel 
        security descriptors  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        SIDs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        terminal services  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        viruses
            VBScript 
        Windows NT
            lack of management granularity 
            limitations of  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
            multiple logon IDs 
            nontransitive trust relationships 
            poor operational performance 
            poor replication performance 
            restricted account database size 
            single point of failure 
    Security Account Manager (SAM).   [See SAM (Security Account Manager)]2nd  [See SAM (Security Account Manager)]3rd  [See SAM (Security Account Manager)]
    security checks
        upgrades  2nd 
    security databases
        LSA 
    security descriptors  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th 
        Active Directory 
        DACLs (discretionary access control lists) 
        headers 
        managing
            command-line tools  2nd  3rd  4th  5th  6th  7th 
        NTFS  2nd  3rd  4th  5th  6th  7th 
            links 
            lookups  2nd 
        owner SIDs 
        primary group SIDs for the owner 
        replication 
        SACLs (system access control lists) 
    security groups
        group policies
            filtering  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
    security logs
        access
            controlling 
    security packages
        LSA  2nd  3rd  4th 
    security policies
        analysis snap-in  2nd  3rd  4th 
        configuring  2nd  3rd 
        default security templates  2nd  3rd 
        managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        security-related GPT files  2nd  3rd  4th  5th 
        specialty security templates  2nd 
        templates
            distributing  2nd  3rd 
    security principals
        Active Directory  2nd 
        Kerberos 
    Security Reference Monitor (SRM).   [See SRM (Security Reference Monitor)]2nd  [See SRM (Security Reference Monitor)]
    Security Requirements for Cryptographic Modules 
    Security Support Provider Interface (SSPI).   [See SSPI (Security Support Provider Interface)]
    Security Support Providers (SSPs).   [See SSPs (Security Support Providers)]
    security templates
        distributing  2nd  3rd 
    security-related GPT files
        managing  2nd  3rd  4th  5th 
    Seizing a FSMO Role procedure (10.5) 
    Selecting a New Replication Partner procedure (7.11) 
    Send Fax Wizard 
    sending
        faxes  2nd  3rd  4th  5th  6th  7th 
    Seperator Pages property (printers)  2nd  3rd  4th 
    Serenum.sys drivers 
    Serial Number entity (certificates) 
    Serial.sys drivers 
    Server Access Transaction Using Kerberos procedure (11.7) 
    server command (Nslookup) 
    server file systems
        redirectors 
    Server Message Block (SMB) command protocol.   [See SMB (Server Message Block) command protocol]
    server objects
        sites
            moving between  2nd  3rd 
    server-based files
        file encryption  2nd  3rd  4th  5th  6th 
        Kerberos
            impersonation  2nd 
        trusted for delegation  2nd  3rd  4th 
    Serverdomain variable (OSCML) 
    Servername variable (OSCML) 
    servers 
        bridgehead servers
            designating  2nd  3rd  4th 
        client-side caching
            configuring  2nd  3rd  4th  5th  6th  7th  8th 
        DHCP servers
            authorizing  2nd  3rd 
        DNS
            secondary servers  2nd  3rd  4th  5th  6th 
        DNS servers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
            forwarders  2nd  3rd 
            installing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
            loss of  2nd  3rd  4th 
            multiple use 
        fax servers  2nd 
        FSMO servers
            placement 
        GC (Global Catalog) servers  2nd 
        headless servers
            installing  2nd  3rd 
        logon servers
            identification 
        managing
            RDP (Remote Desktop Protocol)  2nd  3rd 
            via remote desktop  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th 
        member servers 
        minimum hardware requirements 
        naming
            Setup  2nd  3rd  4th 
        print servers
            managing  2nd 
        remote access servers
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th 
        standalone servers
            policies 
        terminal services
            security  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
    service account authentication (Kerberos) 
    service accounts
        Active Directory
            security  2nd 
    service drivers
        booting process 
    service locations
        Kerberos 
    service locator records
        DNS 
    service pack installation
        slipstreaming  2nd  3rd 
    Service Principal Names (SPNs).   [See SPNs (Service Principal Names)]
    Service Principal Names)  2nd  3rd  4th  5th 
    services
        Active Directory
            locating  2nd  3rd  4th  5th  6th 
        Configuration naming context
            Active Directory 
        Kerberos 
    Services for Macintosh (SFM).   [See SFM (Services for Macintosh)]
    Services for UNIX (SFU) Web site 
    session key field (encrypted tickets) 
    Session Keys (Kerberos reply messages) 
    Session layer (OSI)  2nd 
    Session Manager
        booting process  2nd  3rd  4th 
    Set [no]d2 command (Nslookup) 
    set [no]debug command (Nslookup) 
    set [no]deframe command (Nslookup) 
    set [no]recurse command (Nslookup) 
    set querytype command (Nslookup) 
    setting
        intervals
            replication  2nd  3rd  4th  5th 
        roles
            domain controllers  2nd  3rd 
    Setting Folder Encryption procedure (17.7) 
    Setting Periodic Scavenging procedure (5.21) 
    Setting Permissions on RIS Images procedure (2.9) 
    Setting the Fail on Load if Bad Zone option procedure (5.24) 
    Setup
        booting
            EFI Shell 
        Character Phase Setup
            installation  2nd  3rd  4th  5th 
        configuration phase  2nd  3rd  4th  5th 
            initial user logon 
    setup
        dynamic disks  2nd  3rd  4th 
    Setup
        function keys 
        graphic phase 
        Graphic Phase Setup
            installation  2nd  3rd  4th  5th  6th  7th  8th  9th 
        graphical phase  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            administrator password management  2nd 
            dates  2nd  3rd 
            domains  2nd  3rd  4th 
            licensing  2nd  3rd 
            per seat licensing  2nd 
            per server licensing  2nd 
            server naming  2nd  3rd  4th 
            terminal server licensing  2nd 
            times  2nd  3rd 
            workgroups  2nd  3rd  4th 
        IA64 Setup
            compared  2nd  3rd  4th  5th  6th 
        post-Setup configuration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
        text phase  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
            ACPI compatibility checks  2nd 
            disk formats  2nd  3rd 
            drive letter assignments  2nd  3rd  4th  5th  6th  7th 
            executable loads  2nd 
            files  2nd  3rd  4th 
            initial hardware recognition  2nd  3rd 
        troubleshooting 
    setup batch files
        unattended setup batch files 
    Setup Information File (SIF).   [See SIF (Setup Information File)]2nd  [See SIF (Setup Information File)]
    setup scripts
        RIS  2nd  3rd 
        unattended setup scripts 
            creating  2nd  3rd  4th  5th  6th  7th  8th  9th 
    Setupreg.hiv drivers 
    SFM
        (Services for Macintosh) 
    SFU (Services for UNIX) Web site 
    SHA-1
        (Secure Hash Algorithm) 
    shadows
        volumes 
    Shamir, Adi 
    share permissions  2nd  3rd 
    share point verification
        domains 
    share points  2nd 
        redirectors  2nd  3rd  4th 
    shared encryption files 
    shared folders
        connecting to  2nd  3rd  4th  5th  6th 
            browsers  2nd  3rd  4th  5th  6th  7th  8th 
            searching 
        Registry 
    shared interrupts 
    shared resources  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd 
        clients
            printing configuration  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th  48th  49th  50th  51st  52nd  53rd  54th 
        file sharing
            administrative share  2nd 
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
            Dfs (Distributed File Sharing)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th  45th  46th  47th 
            remote share creation  2nd  3rd  4th  5th 
            share creation  2nd  3rd  4th  5th  6th  7th  8th 
            share permissions  2nd  3rd 
            XP desktops  2nd  3rd 
        network applications  2nd  3rd  4th 
        network services  2nd  3rd  4th  5th 
        print services
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
        printer sharing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
            enhanced metafiles  2nd 
            initial job rendering  2nd  3rd 
            network printing  2nd  3rd  4th 
            port monitors  2nd  3rd  4th 
            print job delivery  2nd 
            printer drivers  2nd  3rd  4th  5th  6th  7th  8th  9th 
            spoolers  2nd  3rd  4th  5th  6th  7th  8th  9th 
        providers  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 
            installing  2nd  3rd  4th 
            MPRs (Multiple Provider Routers)  2nd  3rd 
            MUPs (Multiple UNC Providers)  2nd 
            order changing  2nd  3rd 
            print providers 
        redirectors  2nd  3rd  4th  5th  6th  7th  8th  9th 
            default share points  2nd  3rd  4th 
            server file systems 
        shared folders
            connecting to  2nd  3rd  4th  5th  6th 
    shares
        administrative shares
            re-creating 
            recreating 
        creating
            command line  2nd 
            Explorer  2nd  3rd  4th  5th  6th 
            remote computers  2nd  3rd  4th  5th 
        ICS (Internet Connection Sharing)  2nd  3rd  4th  5th 
        names
            length 
    Sharing property (printers)  2nd  3rd  4th 
    sharing.   [See resource sharing]
    shells.   [See interfaces]
    shift root domain to Windows .NET functional level
        domains  2nd 
    Shiva PAP (SPAP).   [See SPAP (Shiva PAP)]
    short name generation
        NTFS records  2nd  3rd  4th 
    short name preservation
        files
            NTFS 
    short-cut trusts
        Kerberos  2nd 
    shortcut trusts
        Active Directory 
    SHOWPRIVS tool (Resource Kit) 
    SHS
        (Secure Hash Standard) 
    shutdown event tracker 
    SID history
        domains
            migrating  2nd  3rd  4th  5th 
    Side-by-Side assemblies 
        (DLLs)  2nd  3rd  4th 
    Sidhist script 
    SIDs  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        functions 
        well-known SIDs 
    SIF (Setup Information File)  2nd 
    Siffle variable (OSCML) 
    Signature Algorithm entity (certificates) 
    signature() entry
        Boot.ini  2nd  3rd  4th 
    Simple Mail Transport Protocol (SMTP).   [See SMTP (Simple Mail Transport Protocol)]2nd  [See SMTP (Simple Mail Transport Protocol)]
    Simple Network Management Protocol (SNMP).   [See SNMP (Single Network Management Protocol)]
    Simple Network Time Protocol (SNTP).   [See SNTP (Simple Network Time Protocol)]
    simple volumes  2nd 
    simultaneous modification
        replication
            Active Directory  2nd 
    Single Instance Storage (SIS).   [See SIS (Single Instance Storage)]2nd  [See SIS (Single Instance Storage)]3rd  [See SIS (Single Instance Storage)]
    single point of failure
        Windows NT 
    SIS
        (Single Instance Storage)  2nd  3rd 
        file recovery 
    SIS (Single Instance Storage) groveler  2nd  3rd 
    SIS Groveler 
    site link bridge objects
        creating  2nd  3rd  4th  5th 
    site objects
        Active Directory  2nd  3rd  4th 
    site policies
        GPCs
            multidomain forests 
    sites
        architectures
            designing  2nd  3rd  4th  5th  6th  7th 
        Configuration naming context
            Active Directory 
        creating  2nd 
        inter-site replication  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th 
        links
            creating  2nd  3rd  4th  5th 
        replication
            Active Directory  2nd  3rd 
        server objects
            moving between  2nd  3rd 
    sizes
        drives  2nd  3rd 
        GPT drives 
        NTFS  2nd 
    SKIs (Subject Key Identifiers) 
    SKUs
        (Stock Keeping Units) 
    slipstreaming
        service pack installations  2nd  3rd 
    Slipstreaming Service Pack Files procedure (2.4) 
    slipstreams 
    slow link processing
        group policies  2nd  3rd  4th 
            cutoff speeds 
    SLS (Secondary Logon Service)
        Active Directory
            security  2nd  3rd  4th  5th 
    smart cards
        improvements to 
        providers 
        remote access
            certificate template preparation  2nd  3rd  4th 
            certificate testing  2nd 
            configuring for 
            deploying for  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th 
            enrollment agent certificates  2nd  3rd  4th  5th  6th  7th 
            form factors  2nd 
            PKI preparations  2nd  3rd 
            remote logon testing  2nd  3rd 
            RRAS configuration  2nd  3rd  4th  5th 
            selecting  2nd  3rd 
            user enrollment  2nd  3rd  4th  5th  6th  7th  8th  9th 
        SecureID smart cards 
    SMB
        MAC layer  2nd 
    SMB (Server Message Block) command protocol 
    SMBs
        (Server Message Blocks)  2nd  3rd 
        traffic
            restricting 
        Transport layer  2nd 
    Smss.exe drivers 
    SMTP
        (Simple Mail Transport Protocol) 
    SMTP (Simple Mail Transport Protocol) 
    SMTP replication restictions
        multiple domains 
    SNMP
        (Simple Network Management Protocol) 
    SNTP
        (Simple Network Time Protocol) 
    soft recoveries
        Active Directory 
    soft-linked partitions 
    software deployment policies
        group policies  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        Miscrosoft Installer 
        MSI (Microsoft installer)  2nd  3rd 
        troubleshooting  2nd  3rd  4th  5th 
        Windows Installer service  2nd  3rd 
            software deployment policies 
    software mirrors
        breaking 
    Software Publishers Association (SPA).   [See SPA (Software Publishers Association)]
    Software Publishing Certificates (SPCs).   [See SPCs (Software Publishing Certificates)]
    SOHO networks
        Internet gateways
            configuring  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th 
    Solomon, David 
    SPA
        (Software Publishers Association) 
    spanned volumes  2nd 
    SPAP
        (Shiva PAP) 
        (Shiva Password Authentication Protocol)  2nd 
    sparse files
        NTFS  2nd 
    SPCs
        (Software Publishing Certificates) 
    split public/private zones
        Active Directory domains  2nd  3rd 
    SPNs
        (Service Principal Names)  2nd  3rd  4th  5th 
    spoolers
        printer sharing 
            file location changes  2nd  3rd  4th  5th  6th  7th  8th 
    SRM
        (Security Reference Monitor)  2nd 
        Active Directory 
    SSH (Secure Shell)
        authentication services 
    SSPI
        (Security Support Provider Interface) 
    SSPs
        (Security Support Providers) 
    stability
        domains 
    standalone roots 
    standalone servers
        policies 
    Standard PPP Transaction Details protocol (20.3) 
    Standard Server  2nd  3rd 
        CAs (Certification Authorities)
            support 
        memory
            support 
        processors
            support 
        terminal services
            support 
    standard transactions
        PPP (Point-to-Point Protocol)  2nd  3rd  4th  5th 
    start times (Kerberos reply messages) 
    Starting DNS from a BIND File procedure (5.23) 
    Starting Explorer Shell Using RunAs procedure (13.6) 
    startup (computer)
        Kerberos authentication  2nd  3rd  4th  5th  6th  7th 
    static IP addressing 
    Step-by-Step Guide to Kerberos 5 Interoperability Web site 
    Stock Keeping Units (SKUs).   [See SKUs (Stock Keeping Units)]
    stop errors
        common stop errors  2nd 
    storage 
        certificates
            CAs 
            local certificate stores  2nd  3rd 
        configuring  2nd  3rd  4th  5th  6th 
        data storage 
            dynamic disks 
            GPT disks 
            IA32 systems  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st 
            LDM (Logical Disk Manager) volume configurations  2nd  3rd  4th  5th  6th  7th  8th 
            MBR (Master Boot Record) disks 
        detachable storage 
        domains 
        FEK (File Encryption Key) 
        fixed spinning storage 
        keys
            PKI  2nd  3rd 
        names  2nd 
        passwords  2nd  3rd  4th  5th  6th  7th 
            Active Directory 
            vunerabilities  2nd 
        removable storage 
        tape storage 
        WMI filters  2nd 
    Storing User Names and Passwords procedure (11.2) 
    streaming ciphers 
    stripe size 
    striped volumes  2nd 
        creating  2nd 
    Structural class
        LDAP 
    structure rules
        Active Directory  2nd 
    stub zones
        DNS  2nd  3rd  4th 
    Suberror variable (OSCML) 
    Subject entity (certificates) 
    Subject Key Identifier entity (certificates) 
    Subject Key Identifiers (SKIs).   [See SKIs (Subject Key Identifiers)]
    Subnet Master Browser 
    subordinate CAs 
        installing 
    superhidden definition
        Boot.ini 
    support
        authentication
            methods  2nd 
        drivers
            large 
        hardware  2nd  3rd  4th 
        IA32 memory
            legacy application support  2nd  3rd  4th 
        IA64 memory
            legacy application support 
            legacy application support;file system redirection  2nd 
            legacy application support;Registry reflection  2nd 
            legacy application support;WOW64  2nd 
        multiprocessors 
        plug-and-play  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 
    support files
        Active Directory  2nd  3rd 
            moving  2nd 
    switches
        Boot.ini  2nd  3rd  4th 
        CHKDSK  2nd 
        RunAs command  2nd  3rd 
    SxS assemblies.   [See Side-by-Side assemblies]
    symbols files 
    symmetric cipher keys 
    synchronization
        GPOs
            troubleshooting  2nd  3rd  4th 
        time 
    Synchronization Manager
        offline files
            managing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
        options 
    synchronous processing
        CSEs (Client-Side Extensions)  2nd  3rd  4th 
    syntax
        RunAs command  2nd 
    syntax rules
        Active Directory  2nd 
    Sysfiles.inf file  2nd 
    Sysprep
        factory options  2nd 
        images
            auditing 
        limitations  2nd 
    Sysprepdrivers variable (OSCML) 
    Syspreppath variable (OSCML) 
    system access control lists (SACLs).   [See SACLs (system access control lists)]
    system failures
        Ntbackup  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th 
    system information
        troubleshooting 
    system kernel
        booting process  2nd 
    system partitions  2nd 
        expanding 
    system policies
        tattooing 
    System Policy Editor 
    system policy verification
        domains 
    system privileges  2nd  3rd 
        viewing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 
    system properties
        DNS
            configuring  2nd 
    System Restore
        Ntbackup
            XP desktops  2nd  3rd 
    system restores 
    System State backups
        Active Directory
            performing  2nd  3rd  4th 
    System State files 
        Active Directory
            restoring  2nd  3rd  4th 
        backing up
            Ntbackup  2nd 
    Sysvol
        Active Directory
            restoring  2nd 
    Sysvol shares