CA-issued certificates, Replacing Self-Signed Certificates with CA-issued Certificates
cable modems, Cable Modem
cache memory, Caching and Data Recovery
Cacls.exe, Using CACLs
call stacks, Defining Terms
Callback, Callback
cameras, configuring, Configuring Scanners and Cameras, Pushbutton Scanning
capturing on-screen error messages, Identify Problem Symptoms
CardBus, PC Card and CardBus
cd command, Cd or Chdir
CDFS (Compact Disc File System), Playing CDs, Compact Disc File System
certificate authentication, Authentication Protocols
Certificate Export Wizard, Exporting Certificates and Keys
Certificate Import Wizard, Importing Certificates
certificate templates, Using Enterprise Certification Authorities to Issue Certificates
certificates
CA-issued, Replacing Self-Signed Certificates with CA-issued Certificates
EFS overview, Delivering EFS Certificates to Users, How EFS Uses Certificates
enterprise certification authority, using to issue, Using Enterprise Certification Authorities to Issue Certificates
exporting, Exporting and Importing EFS and DRA Certificates and Private Keys, Importing Certificates
generating new, Renewing Certificates and Keys
importing, Exporting and Importing EFS and DRA Certificates and Private Keys, Importing Certificates
obtaining in stand-alone environments, Obtaining an EFS Certificate in a Stand-Alone Environment
renewing, Renewing Certificates and Keys
replacing self-signed with CA-issued, Replacing Self-Signed Certificates with CA-issued Certificates
requesting from CAs, Using Enterprise Certification Authorities to Issue Certificates
security, Certificate and Public Key Storage, Clearing the Paging File at Shutdown
self-signed, Replacing Self-Signed Certificates with CA-issued Certificates
storage, Certificate and Public Key Storage
viewing using Certificates snap-in, Determining Whether an EFS Certificate Exists
Certificates snap-in
requesting certificates from CAs, Using Enterprise Certification Authorities to Issue Certificates
viewing certificates, Determining Whether an EFS Certificate Exists
certification authorities (CA), Using Enterprise Certification Authorities to Issue Certificates
Challenge Handshake Authentication Protocol (CHAP), Authentication Protocols
Change Drive Letter and Paths commandSee Disk Management snap-in, Creating Volumes During Windows XP Professional Setup
change journals
cleanup operations on Windows NT 4.0 volumes, Cleanup Operations on Windows NT Volumes
NTFS compatibility with Windows NT 4.0, NTFS Compatibility with Windows NT 4.0
overview, NTFS Change Journal
CHAP (Challenge Handshake Authentication Protocol), Authentication Protocols
chdir command, Cd or Chdir
check diskSee Chkdsk.exe, Chkdsk
Check Upgrade Only mode, Using Check Upgrade Only Mode, Helpful Information
chkdsk command, Chkdsk
Chkdsk.exe
Autochk.exe, Running Autochk When the Computer Restarts, Using the /c Parameter to Run Autochk on Excluded Volumes
converting FAT volumes to NTFS, NTFS Conversion Issues for FAT Volumes
duration of run, Determining How Long Chkdsk Will Run
examples, Chkdsk Examples
file system repair, Running Chkdsk to Repair File Systems, Chkdsk Examples
mission-critical computers, Running Chkdsk on Mission-Critical Computers
NTFS volumes, The Chkdsk Process on NTFS Volumes, Reducing the Time Required to Run Chkdsk on NTFS Volumes, Using the /i Parameter
overview, Chkdsk
parameters, Chkdsk Parameters
read-only mode, Running Chkdsk to Repair File Systems, Determining How Long Chkdsk Will Run
recovering lost clusters on FAT volumes, Recovering Lost Clusters on FAT Volumes
repair process, The Chkdsk Process on NTFS Volumes
running at startup, Running Autochk When the Computer Restarts
running from My Computer or Windows Explorer, Running Chkdsk from My Computer or Windows Explorer
shortening duration of, Reducing the Time Required to Run Chkdsk on NTFS Volumes, Using the /i Parameter
syntax, Chkdsk Syntax
Chkntfs.exe
Autochk.exe, Running Autochk When the Computer Restarts, Using the /c Parameter to Run Autochk on Excluded Volumes
parameters, Chkntfs Parameters, Using the /c Parameter to Run Autochk on Excluded Volumes
syntax, Chkntfs Syntax
volumes, checking if dirty, Chkdsk
CHS fields, Starting and Ending Cylinder, Head, and Sector Fields
cipher command
determining encryption status, Determining Encryption Status by Using the Cipher Command
file and folder encryption, Encrypting and Decrypting Files and Folders by Using the Cipher Command
generating new certificates, Renewing Certificates and Keys
generating recovery agent certificates, Designating a Data Recovery Agent in a Stand-Alone Environment
requesting CA-issued file encryption certificates, Replacing Self-Signed Certificates with CA-issued Certificates
CIW (Client Installation Wizard), Using RIS Answer Files
Classic security model, Managing Network Authentication
clean installations compared to upgrading, Upgrading vs. Clean Installation, Using the User State Migration Tool
Cleanmgr.exe (Disk Cleanup), Check Your Software, Disk Cleanup
cleanup operations on Windows NT 4.0 volumes, Cleanup Operations on Windows NT Volumes
ClickLock, ClickLock
Client (Respond Only) policy, Creating IPSec Policies
Client for NFS, Interoperability with UNIX
Client Installation Wizard (CIW), Using RIS Answer Files
Client Service for NetWare
deployment planning, IPX Protocol
interoperability, Interoperability with Novell NetWare
print servers, NetWare Print Servers
client side caching (CSC), Offline Files Database
client/server telephony
configuring support, Configuring Client/Server Telephony Support
overview, Client/Server Telephony
clients
configuring DHCP, Configuring the Windows XP Professional DHCP Client
configuring dynamic update for DHCP, Configuring Dynamic Update for DHCP Clients
connecting to Windows networks, Highlights
deployment administration and configuration strategies, Determining Client Administration and Configuration Strategies, Accessibility Options
deployment connectivity strategies, Determining a Client Connectivity Strategy, IPX Protocol
desktop management strategies, Determining Desktop Management Strategies, Choosing Configurations for Portable Computers
dynamic update, Multihomed Clients
installation methods, Choosing an Installation Method
IPX protocols, IPX Protocol
multihomed, Multihomed Clients
Novell Client, IPX Protocol, NetWare Print Servers
portable computer configurations, Choosing Configurations for Portable Computers
preferred configurations, Planning Your Preferred Client Configuration
printing processes, Client Processes
remote access, Statically Configured and Remote Access Clients
Remote Desktop, Client Software, Remote Desktop Web Connection, Installing Client Software, Installing Remote Desktop Web Connection
restarting DHCP, Restarting a DHCP Client
security strategies for deployment, Determining Security Strategies, Encryption
statically configured, Statically Configured and Remote Access Clients
TCP/IP networks, TCP/IP Networks
clients. See also connections; networking, Highlights
cloning, System Preparation Tool
cls command, Cls
clusters
maximum number on FAT16 volumes, Maximum Sizes on FAT16 Volumes
maximum number on NTFS volumes, Maximum Sizes on NTFS Volumes
minimum number on FAT32 volumes, Maximum Sizes on FAT32 Volumes
recovering lost, Recovering Lost Clusters on FAT Volumes
remapping, Cluster Remapping
sizes, Cluster Size
CMAK (Connection Manager Administration Kit), CMAK
Cmdlines.txt
installing MUI Pack using, Installing by Using a Cmdlines.txt File
planning service pack deployments, Setup Manager
using, Using Cmdlines.txt
CMOS problems, Other Disk Problems
code pages, Unicode and Code Pages
codecs, Windows Media Technologies Codecs
cognitive disabilities, Options for Users with Cognitive Disabilities, Snap To
cold docking and undocking, Cold Docking and Undocking
command-line disk management, Remote Disk and Command-Line Disk Management, Managing Disks from the Command Line by Using Fsutil
command-line tools
Apmstat.exe, Determining APM BIOS Compatibility
Boot.ini Configuration Editor (Bootcfg.exe), Reviewing and Correcting Boot.ini Settings on x86-based Systems, Bootcfg
Cacls.exe, Using CACLs
Change Drive Letter and PathsSee Disk Management snap-in, Creating Volumes During Windows XP Professional Setup
Chkdsk.exeSee Chkdsk.exe, Chkdsk
Chkntfs.exeSee Chkntfs.exe, Chkdsk
cipherSee cipher command, Designating a Data Recovery Agent in a Stand-Alone Environment
Compact.exe, Using Compact to Compress a Volume
Convert.exeSee Convert.exe, NTFS Conversion Issues for FAT Volumes
copy command, File Operations to Non-EFS Capable Volumes, File Copy from a Web Folder
Defrag.exeSee Defrag.exe, Defragmenting NTFS Volumes
dir, Determining Ownership of Objects
DiskPartSee DiskPart, Basic Volumes
Driver Query (Driverquery.exe), Driver Query
Event Query (Eventquery.vbs), Event Query
Event Triggers (Eventtriggers.exe), Event Triggers
Fdisk /mbr, Avoid Using the Fdisk /mbr Command to Treat Viruses
file system, list of, File System Tools, Table 13-14: Location of File System Tools
format command, Cluster Size
Fsutil.exeSee Fsutil.exe, Managing Disks from the Command Line by Using Fsutil
Ftonline.exe, Preparing Multidisk Volumes for Windows XP Professional
GetMac (Getmac.exe), GetMac
Group Policy Results (Gpresult.exe), Disabling Startup Programs for Computers on a Network, Group Policy Results
Group Policy Update (Gpupdate.exe), Group Policy Update
IP Config (Ipconfig.exe), Verifying IP Installation, Checking the Configuration with Ipconfig, IP Config
Kernel Debugger (Kd.exe), Using Kernel Debugger (Kd.exe), Kernel Debugger
Ksetup, Kerberos Interoperability
logging output, How to Obtain a Log of Command-Line Tool Output
mountvol, EFI System Partition
msiexec.exe, Installing Windows Installer User Interface Language Packages
NetBT Statistics (Nbtstat.exe), NetBT Statistics
Netsh, Using Netsh to Configure and Monitor Computers, Netsh
Netstat.exe, The Netstat.exe Command, Netstat
Network Connectivity Tester (Netdiag.exe), Tools for Troubleshooting, Network Connectivity Tester
Network Monitor Capture Utility (Netcap.exe), Network Monitor Capture Utility
Nltest.exe, Testing a Domain User Account, Establishing a Secure Channel
Openfiles (Openfiles.exe), OpenFiles
overview, Tool Interface Types
PathPing (Pathping.exe), Testing the Network Connection with Ping and PathPing, PathPing
Ping (Ping.exe), Verifying IP Installation, Testing the Network Connection with Ping and PathPing
Portqry.exe, Port Scanning
Process and Thread Status (Pstat.exe), Process and Thread Status
Remove DiskSee Disk Management snap-in, Offline
Rescan Disks, Unreadable
RunAs, Using RunAs to Start a Program, RunAs (Command-Line Tool)
SC (Sc.exe)See SC (Sc.exe), Managing Services by Using Sc.exe
Secedit.exe, Working with Local Security Policy, Configuring and Analyzing Operations by Using Secedit.exe
starting, Starting Command-Line Tools and Logging Output, Ways to View Command-Line Help
syskey, Enabling the Startup Key
System File Checker (Sfc.exe), System File Checker
Systeminfo (Systeminfo.exe), Systeminfo
Task Kill (Tskill.exe), Task Kill
Task List (Tasklist.exe), Task List
TCP/IP troubleshooting, TCP/IP Troubleshooting Tools, Checking Packet Filtering
viewing Help, Ways to View Command-Line Help
Whoami, Using Whoami
xcopy command, File Operations to Non-EFS Capable Volumes, File Copy from a Web Folder
command-line tools. See also tools, Maintenance and Troubleshooting Tools
Compact Disc File System (CDFS), Playing CDs, Compact Disc File System
Compact.exe, Using Compact to Compress a Volume
compatibility
ACPI BIOS, ACPI Power Management
APM BIOS, Determining APM BIOS Compatibility
applications, Application Compatibility, Testing Custom Applications
file systems, Multiple-Booting and File System Compatibility
Group Policy and System Policy, Checking Local and Domain Policy Compatibility
HAL, Reducing the Number of Reference Images, Table 2-16: HAL Compatibility
hardware, Hardware Requirements and Compatibility, Hardware Compatibility with Windows NT Workstation 4.0
HCLSee HCL (Hardware Compatibility List), Hardware Compatibility List
localized versions of Office XP, Localized Versions of Office XP
MUI Pack, Office XP Multilingual User Interface Pack
multilingual application overview, Ensuring Multilingual Compatibility
multilingual applications, determining compatibility, Determining the Compatibility of Your Current Applications
multiple languages with Active Directory objects, clients, and domain controllers, Multilingual Compatibility with Active Directory Objects, Clients, and Domain Controllers
multiple languages with Office XP and Windows XP Professional, Using Office XP and Windows XP Professional Together, Office XP Multilingual User Interface Pack
multiple operating systems, Multiple Operating Systems and File System Compatibility
multiple-booting, Multiple-Booting and File System Compatibility
NTFS and Windows NT 4.0, NTFS Compatibility with Windows NT 4.0
portable computer BIOS, Setting Up a Portable Computer
Program Compatibility Wizard, Program Compatibility Wizard
troubleshooting multilingual applications, Verifying Application Compatibility
Windows NT 4.0 domain environments, Windows NT 4.0 Compatibility
Compatible (Compatws.inf) security templates, Compatible (Compatws.inf)
compatible IDs, Windows Update, Driver Ranking
compatible matches, Windows Update, Driver Ranking
complete memory dump files, Memory Dump Files, Complete Memory Dump File
Complex Script and Right-to-Left Language Collection
disk space requirements, Language Support Requirements
display problems, Characters in Complex Script, Right-to-Left, or East Asian Languages Do Not Display Correctly
installing, Configuring Regional and Language Options
language group IDs, Built-In Language Support, Table 3-2: Language Support in Windows XP Professional
Compmgmt.msc (Computer Management snap-in), Computer Management Tool
Compressed (zipped) Folders feature, Other Compression Methods, Using the Compressed (zipped) Folders Feature
compressing files or foldersSee file compression, File Compression
Computer Browser service, Computer Browser and Browsing Roles, Adding to and Removing from the Browse List
computer local security groups
Administrators group, Administrators, Administrators
Backup Operators group, Backup Operators
built-in, Computer Local Security Groups, Users
Guests group, Guests
HelpServicesGroup, HelpServicesGroup
Network Configuration Operators group, Network Configuration Operators
overview, Types of Security Groups
Power Users group, Power Users
Remote Desktop Users group, Remote Desktop Users
Replicator group, Replicator
Users group, Users
Computer Management snap-in (Compmgmt.msc), Computer Management Tool
conferencingSee telephony and conferencing, Highlights
configuring
accessibility features, Configuring Accessibility Features
alternate IP addresses, Configuring an Alternate IP Address, Configuring an Alternate IP Address
animation in Internet Explorer, Configuring Animations, Sounds, and Videos in Internet Explorer
APIPA, Configuring APIPA, Configuring APIPA
APM BIOS, Configuring APM BIOS
audio performance options, Configuring Audio Performance Options
battery monitoring and management, Configuring Battery Monitoring and Management
caching, Configuring Caching and Negative Caching
CD and DVD playback options, Configuring CD and DVD Playback Options
communications resources, Configuring Communications Resources
data recovery policy, Configuring Data Recovery Policy in a Stand-Alone Environment, Designating a Data Recovery Agent in a Stand-Alone Environment
desktops for multilingual deployments , Configuring Desktops
device settings, Configuring Device Settings
DHCP, Configuring DHCP, Configuring the Windows XP Professional DHCP Client
digital media devices, Configuring Digital Media Devices
display resolution and appearance, Configuring Display Resolution and Appearance
displays, Configuring the Display, Using Digital Flat Panel Monitors
DNS overview, Configuring DNS to Resolve Host Names and Domain Names, Table 22-2: DNS and NetBIOS Names
drives to record CDs, Configuring Digital Media Devices
dynamic update, Configuring Dynamic Update, Disabling Dynamic Update
fax services, Configuring Fax Service, Sending Faxes
files on network shares for offline use, Configuring Files on a Network Share for Offline Use, Manual Caching
hibernation, Configuring Hibernation and Standby
home networks, Configuring Home Networks, Home Network Configuration Instructions
ICMP Router Discovery, Manually Configuring Default Gateways
ICS computers, Configuring the ICS Computer, Creating a VPN Connection to the Corporate Network
IP addresses manually, Configuring an IP Address Manually, Configuring an IP Address Manually
lid switches, Configuring Power Button, Sleep Button, and Lid Switch Behavior
localized content for multilingual deployments, Configuring Localized Content
modems, Configuring Modems, Setting Modem Properties
MUI Pack user interface language, Configuring the User Interface Language (MUI Pack Only)
multiple IP addresses on network adapters, Configuring Multiple IP Addresses on a Network Adapter, Configuring Multiple IP Addresses on a Network Adapter
multiple monitors, Configuring Multiple Monitors
name resolution settings when DNS is used, Configuring DNS Settings, Table 22-1: DNS Configuration Topics
NetBIOS name resolution, Configuring NetBIOS Name Resolution, Disabling NetBT
Offline Files for portable computers, Configuring Offline Files for Portable Computers, Managing the Offline Files Folder
partitions, Configuring Partitions
permissions for file system directories, Configuring Permissions for File System Directories
power buttons, Configuring Power Button, Sleep Button, and Lid Switch Behavior
power management, Configuring Power Management, Configuring Power Management for the Display
power schemes, Configuring Power Schemes
preferred playback and recording devices, Configuring Preferred Playback and Recording Devices
protocol binding order, Configuring the Protocol Binding Order
refresh intervals using Group Policy, Configuring the Group Policy Refresh Interval for Hibernation or Standby
regional and language options for multilingual deployments, Configuring Regional and Language Options, Configuring the User Interface Language (MUI Pack Only)
regional and language support for user accounts, Configuring Regional and Language Support for User Accounts
remote access connections, Configuring Remote Connections
roaming user profiles, Configuring Roaming User Profiles and Folder Redirection, Combining Folder Redirection with Roaming User Profiles
scanners and cameras, Configuring Scanners and Cameras, Pushbutton Scanning
security for 802.11 wireless network connectivity, Configuring Security for 802.11 Wireless Network Connectivity, Configuring 802.11 Security with WEP
servers for broadcasting presentations, Configuring servers for broadcasting digital media presentations
shared folder permissions, Configuring Shared Folder Permissions
sleep buttons, Configuring Power Button, Sleep Button, and Lid Switch Behavior
sound events and sound schemes, Configuring Sound Events and Sound Schemes
sounds in Internet Explorer, Configuring Animations, Sounds, and Videos in Internet Explorer
standby mode, Configuring Hibernation and Standby
subnet prioritization, Configuring Subnet Prioritization
synchronization for Offline Files, Configuring Synchronization, Configuring Synchronization for Offline Files, Preventing Scheduled Synchronization
System Restore by using Control Panel, Using Control Panel to Configure System Restore
System Restore by using custom scripts, Using Custom Scripts to Configure System Restore
System Restore by using Group Policy, Using the Group Policy Snap-in to Configure System Restore
System Restore by using Regedit.exe (registry editor), Using the Registry Editor to Configure System Restore
System Restore for use with EFS, Data Recovery Implementation Considerations
TCP/IPSee TCP/IP, Highlights
telephony and conferencingSee configuring telephony and conferencing, Configuring Telephony and Conferencing
videos in Internet Explorer, Configuring Animations, Sounds, and Videos in Internet Explorer
WINS, Configuring WINS
802.11 security with WEP, Configuring 802.11 Security with WEP
802.11 security with 802.1x, Configuring 802.11 Security with 802.1x
configuring telephony and conferencing
client/server telephony support, Configuring Client/Server Telephony Support
default dialing location, Defining a Location
directory services, Using Windows Directory Service
H.323 gatekeepers, Specifying the H.323 Gatekeeper
H.323 gateways, Specifying the H.323 Gateway
H.323 proxy addresses, Specifying the H.323 Proxy
ISDN support, Configuring ISDN Support
location information, Defining a Location
modem configuration overview, Configuring Modems
modem properties, Setting Modem Properties
overview, Configuring Telephony and Conferencing
Phone and Modem Options, Configuring Modems
TAPI IP telephony, Configuring TAPI IP Telephony, Using Windows Directory Service
Connection Manager, Deploying Connection Manager, CPS
Connection Manager Administration Kit (CMAK), CMAK
Connection Point Services (CPS), CPS
connection-specific domain names, Connection-Specific Domain Name
connections
accessing network resources, Accessing Network Resources, Local Group Policy
advanced settings, Advanced Settings
authentication, Authentication, How the Remote Access Authentication Process Works
Autodial, Autodial
Callback, Callback
choosing types, Using the New Connection Wizard to Choose Connection Types, Connecting Directly to Another Computer
clients to Windows networks, Highlights
configuring advanced settings, Configuring Advanced Settings
configuring home networks, Configuring Home Networks, Home Network Configuration Instructions
Connection Manager, Deploying Connection Manager, CPS
data encryption, Data Encryption, IPSec
defined, Connection-defined Connections, Connection-defined Connections
Device Manager, Device Manager
dial-up, Dial-up Connection
dial-up preferences, Dial-up Preferences, Callback
dynamic multiple device dialing, Dynamic Multiple Device Dialing
Group Policy, Group Policy Settings for Network Connections, What Can I Configure?, Configuration Privileges
ICF, Using Internet Connection Firewall in Windows XP, Table 18-7: Description of Information Logged by ICF, Internet Connection Firewalls
ICSSee ICS (Internet Connection Sharing), Internet Connection Sharing
incoming, Incoming Connection Types, Managing Incoming Connections
Internet, Connecting to the Internet, Internet Connection, Broadband Connection
IPSec, Connection Types
list of types, Connection Types, Table 23-1: Connection Types
localSee local connections, Local Connections in a Remote Office
modem diagnostics, Modem Diagnostics
modem logging, Modem Logging
network identification, Network Identification
operator-assisted dialing, Operator-Assisted Dialing
optional networking components, Optional Networking Components
outgoing, Managing Outgoing Connections
overview, Highlights, What s New
PPP logging, PPP Logging
remote accessSee remote access connections, Remote Connections to a Private Network
remote network security, Remote Network Security, IPSec
security, How the Remote Access Authentication Process Works
slow-link, Synchronizing Over a Slow Link, Making Network Shares Available Without Synchronization
troubleshooting Internet access configuration problems, Troubleshooting Common Internet Access Configuration Problems, Troubleshooting Common Internet Access Configuration Problems
troubleshooting local area configuration problems, Troubleshooting Common Local Area Configuration Problems, Troubleshooting Common Local Area Configuration Problems
troubleshooting remote access configuration problems, Troubleshooting Common Remote Access Configuration Problems
troubleshooting tools, list of, Troubleshooting Tools
VPN, list of types, VPN Connection Types, L2TP
connections. See also clients; networking, Highlights
consoles, Console Security
Control Panel
Add or Remove Programs, Add or Remove Programs
configuring accessibility features, Configuring Accessibility Features
configuring System Restore, Using Control Panel to Configure System Restore
editing Boot.ini, Reviewing and Correcting Boot.ini Settings on x86-based Systems
Phone and Modem Options, Configuring Modems
shortcut keys for accessibility, Table I-7: Control Panel Shortcuts
Stored User Names and Passwords, Stored User Names and Passwords
User Accounts, Password Management
controlled ports, Configuring 802.11 Security with 802.1x
Convert to Basic Disk commandSee Disk Management snap-in, Disks That You Cannot Convert to Dynamic
Convert to Dynamic Disk commandSee Disk Management snap-in, Disks That You Cannot Convert to Dynamic
Convert to GPT Disk commandSee Disk Management snap-in, Managing GPT Disks in Itanium-based Computers
Convert to MBR Disk commandSee Disk Management snap-in, Managing GPT Disks in Itanium-based Computers
Convert.exe
converting FAT volumes to NTFS, NTFS Conversion Issues for FAT Volumes, Using Convert.exe to Convert FAT Volumes to NTFS
converting volumes in use, Converting Volumes in Use
parameters, Using Convert.exe to Convert FAT Volumes to NTFS
safeguarding data, How Convert.exe Safeguards Data During the Conversion
syntax, Using Convert.exe to Convert FAT Volumes to NTFS
converting
basic disks to dynamic disks, Converting Basic Disks to Dynamic Disks, How to Convert a Basic Disk to Dynamic, Disks That You Cannot Convert to Dynamic
FAT32 to NTFS automatically, Automatically Converting FAT32 to NTFS
file systems, Converting vs. Reformatting Existing Disk Partitions, Converting Volumes to NTFS, How Convert.exe Safeguards Data During the Conversion
GPT disks to MBR disks, Managing GPT Disks in Itanium-based Computers
MBR disks to GPT disks, Managing GPT Disks in Itanium-based Computers
partition styles, Converting Basic Disks to Dynamic Disks, Managing GPT Disks in Itanium-based Computers
short file names to long, Converting Short File Names to Long File Names ($$rename.txt)
storage types, How to Convert a Basic Disk to Dynamic
volumes to NTFS, Converting Volumes to NTFS, How Convert.exe Safeguards Data During the Conversion
copy backups, Backup Types
copy command, File Operations to Non-EFS Capable Volumes, File Copy from a Web Folder, Copy
copying files or folders
between FAT and NTFS volumes, Copying Files Between FAT and NTFS Volumes
compression effects on, Effects of Compression on Moving and Copying Files, Adding Files to an Almost Full NTFS Volume
data stream effects on, Multiple Data Streams
disk quota effects on, Disk Quotas
sparse file effects on, Sparse Files
copyright protection for DVDs, Copyright protection
corporate management features, Corporate Management
corporate securitySee security, Corporate Security
country codes, specifying, Specifying [TapiLocation] Options
CPS (Connection Point Services), CPS
crashesSee Stop messages, Highlights
Creator Group built-in security principal, Built-in Security Principals
Creator Owner built-in security principal, Built-in Security Principals
credentials
blank password restrictions, Managing Credentials
managing, Managing Credentials, Disabling the Welcome Screen
overview, Credentials and Validation
password management, Password Management, Backing Up and Restoring Passwords
smart cards, Smart Cards, Logging On by Using a Smart Card
Stored User Names and Passwords, Stored User Names and Passwords
credentials cache, Kerberos Ticket Cache
CryptoAPI, Components of EFS
cryptographic service provider (CSP), Components of EFS
cryptographic shared keys, Logging On by Using a Smart Card
CSC (client side caching), Offline Files Database
CSP (cryptographic service provider), Components of EFS
customizing
computers for accessibility, Customizing for Accessibility, Utility Manager
desktops for accessibility, Customizing the Desktop
fonts, Customizing Fonts
installationsSee automating installations, Highlights
IPSec policies, Creating IPSec Policies
language options, Customizing Regional and Language Options
mouse pointers, Mouse Pointers
Recovery Console, Customizing Recovery Console
regional options, Customizing Regional and Language Options
RIS installations, Customizing RIS Installations, Using RIS Answer Files
Sysprep installations, Customizing Sysprep Installations, Using Sysprep Reseal Mode
unattended installations, Customizing Unattended Installations, Listing 2-1: Example of an Unattend.txt Answer File
cvtarea parameter, Using the /CVTAREA Parameter