[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] RADIUS (Remote Authentication Dial-in User Service) 2nd 3rd 4th RAID 2nd 3rd 4th 5th 6th 7th 8th 9th 10th (Redundant Array of Inexpensive Disks) 2nd Disk Management MMC snap-in 2nd Diskpart.exe 2nd dynamic disk RAID configuration 2nd hardware RAID 2nd RAID 0 RAID 0+1 RAID 1 2nd 3rd 4th RAID 5 2nd 3rd 4th 5th 6th RAID 6 software RAID 2nd raising functional levels 2nd domains forests 2nd RAM-disks 2nd 3rd RAS (Remote Access Servers) 2nd RAS (Remote Access System) scaling hardware cryptographic accelerators 2nd hardware RAS solutions 2nd modem support 2nd multihomed Internet connections 2nd multiplexing 2nd PPTP (Point to Point Tunneling Protocol) security Rbfg.exe (Remote Boot floppy Generator) 2nd RDC (Remote Desktop Connection) 2nd 3rd readers ( smartcard ) 2nd reading event logs 2nd realm names rebooting system records RRs (resource records) 2nd SOA (Start of Authority) 2nd SRV (Service) resource records 2nd recovering corrupted files deleted files 2nd folders 2nd overwritten files recovery ASR (Automated System Recovery) 2nd 3rd 4th 5th 6th 7th bootstrap portion cluster service recovery 2nd 3rd requirements 2nd DHCP (Dynamic Host Configuration Protocol) databases 2nd failed account migrations 2nd NAS (Network Attached Storage) 2nd Recovery Console installing 2nd SANs (Storage Area Networks) 2nd services 2nd test restores 2nd volume shadow copies 2nd Windows 2000 to Windows Server 2003 upgrades 2nd 3rd Recovery Console installing 2nd recovey SAM database 2nd recursive queries RECURSIVE QUERIES/Sec counter 2nd RECURSIVE QUERY FAILURE/Sec counter redirecting folders 2nd 3rd benefits of 2nd guidelines 2nd redirecting folders 2nd Terminal Services 2nd 3rd Redirector[ colon ] Bytes Total/sec counter redundancy DHCP (Dynamic Host Configuration Protocol) 2nd 100/100 failover approach 2nd 3rd 50/50 failover approach 2nd 3rd 80/20 failover approach 2nd server clusters standby scopes redundant Global Catalogs 2nd servery redundancy 2nd Session Directory 2nd Terminal Services 2nd Redundant Array of Inexpensive Disks. [See See RAID]2nd [See See RAID] redundant back-planes redundant power systems referrals creating 2nd 3rd refresh intervals (Group Policy) 2nd registerdns (/registerdns) option (ipconfig command) Registry auditing backing up maintenance 2nd permissions assigning 2nd Registry Editor 2nd remote access security 2nd size of Registry Editor 2nd Registry Event Provider Registry Provider regsvr32 command relay agents (DHCP) 2nd remote access L2TP (Layer 2 Tunneling Protocol) 2nd PPTP (Point-to-Point Tunneling Protocol) 2nd Remote Desktop enabling 2nd Remote Access Servers (RAS) 2nd Remote Access System. [See See RAS] remote administration 2nd Administration Tools Pack Convenience Consoles 2nd custom consoles 2nd installing 2nd 3rd auditing 2nd delegating 2nd desktops 2nd EMS (Emergency Management Service) enabling 2nd SAC (Special Administration Console) 2nd serial connection configuration 2nd IIS (Internet Information Services) Internet Information Services Manager 2nd Remote Administration (HTML) Tool 2nd 3rd 4th Terminal Services 2nd monitoring 2nd RDC (Remote Desktop Connection) 2nd 3rd Registry Remote Assistance 2nd enabling 2nd requirements 2nd sending invitations for 2nd 3rd 4th 5th Remote Desktop for Administration 2nd 3rd advantages of 2nd compared to Terminal Services console mode disconnect timeouts enabling 2nd 3rd multiple remote sessions reset timeouts supported hardware RIS (Remote Installation Service) 2nd 3rd 4th advantages benefits of 2nd best practices 2nd RIPrep images 2nd 3rd server images 2nd system requirements 2nd 3rd security 2nd WMI (Windows Management Instrumentation) scripts Remote Administration (HTML) Tool 2nd 3rd 4th Remote Assistance 2nd enabling 2nd requirements 2nd sending invitations for 2nd 3rd 4th 5th Remote Authentication Dial-in User Service (RADIUS) 2nd 3rd 4th Remote Boot floppy Generator (Rbfg.exe) 2nd Remote Desktop enabling 2nd Remote Desktop Connection (RDC) 2nd 3rd Remote Desktop for Administration 2nd 3rd advantages of 2nd compared to Terminal Services console mode disconnect timeouts enabling 2nd 3rd multiple remote sessions reset timeouts supported hardware Remote Installation Preparation Wizard (RIPrep) images 2nd 3rd Remote Installation Service. [See See RIS]2nd [See See RIS]3rd [See See RIS]4th [See See RIS] Remote Storage 2nd 3rd 4th 5th allocating media for 2nd 3rd backup devices 2nd best practices 2nd configuring 2nd 3rd 4th junction points removing FloppyLocker Service permissions 2nd unnecessary services renaming domains 2nd 3rd cleanup tasks 2nd current forest description domain controller preparation limitations 2nd prerequisites 2nd XML file modification 2nd renewing certificates autorenewal replicas application partitions 2nd domain controllers 2nd 3rd replication management 2nd replication DFS (Distributed File System) 2nd managing 2nd monitoring 2nd multi-master replication 2nd replication topology 2nd 3rd validating 2nd WINS (Windows Internet Naming Service) 2nd zone replication replication traffic 2nd Replmon tool 2nd reports HTML reports security reports creating 2nd 3rd Reseal mode (Sysprep) reset timeouts configuring resolving names. [See See name resolution] resource forests resource records (RRs) 2nd A (host) 2nd AAAA CNAME (Canonical Name) 2nd ISDN KEY MB (mailbox) NS (Name Server) 2nd PTR (Pointer) RP (Responsible Person) SOA (Start of Authority) 2nd SRV (Service) 2nd 3rd 4th 5th WKS (Well Known Service) resources, checking availability of 2nd 3rd responding to problems external scripts 2nd services recovery and notification 2nd Responsible Person (RP) records restoring GPOs (Group Policy Objects) restoring. [See See recovery] Restrict Terminal Services Users... option (Terminal Services) Restricted Groups creating 2nd Resultant Set of Policy. [See See RSoP] Retail Media Activation Keys reverse lookup zones revision control 2nd checking in/out documents 2nd document versioning 2nd 3rd RF (Radio Frequency) attenuation 2nd 3rd RID Master role RID master role seizing 2nd rights administrators 2nd 3rd 4th assigning with Group Policy 2nd 3rd compared to permissions cross-forest rights 2nd delegating with Group Policy 2nd granting 2nd 3rd highly managed users 2nd mobile users 2nd 3rd RIPrep images 2nd 3rd RIS (Remote Installation Service) 2nd 3rd 4th advantages benefits of 2nd best practices 2nd RIPrep images 2nd 3rd server images 2nd system requirements 2nd 3rd roaming profiles 2nd 3rd RoboMon role-based administration 2nd 3rd best practices directory service administrators 2nd network administrators 2nd Operations Managers security administrators 2nd roles administrative roles 2nd directory service administrators 2nd FSMO (Flexible Single Master Operation) roles 2nd Domain Naming Master Infrastructure Master moving 2nd 3rd 4th PDC Emulator placement of 2nd RID Master Schema Master network administrators 2nd Operations Managers role-based administration security administrators 2nd seizing server roles 2nd configuring 2nd 3rd smartcard roles 2nd Routing and Remote Access Services. [See See RRAS] RP (Responsible Person) records RRAS (Routing and Remote Access Services) VPNs (Virtual Private Networks) 2nd RRs (resource records) 2nd A (host) 2nd AAAA CNAME (Canonical Name) 2nd ISDN KEY MB (mailbox) NS (Name Server) 2nd PTR (Pointer) RP (Responsible Person) SOA (Start of Authority) 2nd SRV (Service) 2nd 3rd 4th 5th WKS (Well Known Service) RSoP (Resultant Set of Policies) 2nd Group Policy Modeling 2nd logging mode RSoP (Resultant Set of Policy) 2nd Run As dialog box Run As Other User dialog box running applications Run As command |