Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] L2TP (Layer 2 Tunneling Protocol) Language bar (desktop) multi-language support configuration languages support configuring 2nd 3rd laptops [See also mobile computers] power management schemes 2nd Last Known Good Configuration returning to (Registry) 2nd 3rd launching remote sessions Remote Desktop application 2nd 3rd 4th Scheduled Tasks application 2nd Task Manager 2nd Layer 2 Tunneling Protocol, [See L2TP] learning styles meta-learning learning styles (exam) 2nd leases IP addresses (DHCP) 2nd legacy support earlier Windows systems levels (folders) permission assignments 2nd 3rd 4th 5th List Folder Contents permission (NTFS) local groups built-in Anonymous Logon Authenticated Users Creator Owner Dialup Everyone Interactive Network configuring 2nd 3rd 4th creating default 2nd Administrators Backup Operators Guests Power Users Remote Desktop Users Users 2nd exam questions 2nd 3rd 4th 5th 6th 7th 8th 9th answers 2nd 3rd 4th management of 2nd 3rd 4th naming resources websites 2nd review questions 2nd answers 2nd local policies auditing configuration options 2nd 3rd security configuring 2nd 3rd 4th 5th 6th user rights configuration options Local Policy Security as security tool local print devices connecting to 2nd 3rd 4th 5th 6th local printers installing 2nd 3rd sharing 2nd 3rd local printing printer setup options local profiles local security policies domains effect of GPOs (Group Policy Objects) 2nd management of 2nd subdivisions Account Policies 2nd 3rd 4th 5th 6th IP Security Policies 2nd 3rd Local Policies 2nd 3rd 4th 5th 6th Public Key Policies 2nd Software Restriction Policies 2nd 3rd Software Restrictions Policies Local Security Policy EFS policies setting 2nd Local Security Settings Administrative Tools (Control Panel) 2nd 3rd local settings languages switching between 2nd local user profiles new user logon process 2nd local users access rights configuring 2nd 3rd accounts .NET passport adding 2nd 3rd 4th changing 2nd 3rd 4th deleting 2nd 3rd 4th anonymous logons auditing options 2nd 3rd 4th 5th 6th 7th configuration issues 2nd 3rd 4th 5th 6th 7th deny permission individual rights granting management issues 2nd 3rd 4th 5th 6th 7th management of 2nd 3rd 4th 5th 6th policies Active Directory integration settings configuring 2nd conflicts display settings network communication settings restriction warnings scripting settings security settings software deployment locations modems multiple configuration 2nd user profiles changing 2nd lock-down practices for XP computers 2nd 3rd 4th lockouts account policies configuring 2nd Logging Computer Performance (exercise 9.1) 2nd 3rd 4th logical drives deleting (Disk Management) LogicalDisk Object counters 2nd 3rd 4th Logman tool logon events auditing logs system performance creating (Performance Logs and Alerts) 2nd 3rd 4th 5th 6th loopback addresses (IP) 2nd 3rd low-power states awakening from password protection lpr utility (IP) 2nd |