Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] Safe Mode computers starting 2nd 3rd 4th limitations when to launch 2nd 3rd Safe Mode option advanced startups 2nd scalability multiprocessor computers scanners configuring (Device Manager) 2nd 3rd installing (Device Manager) 2nd Windows Image Acquisition (WIA) interface Scanners and Cameras Utility (Control Panel) 2nd 3rd Scheduled Tasks applet (Control Panel) 2nd Scheduled Tasks application configuring 2nd 3rd launch problems troubleshooting 2nd launching 2nd Properties dialog box 2nd Scheduled Tasks Properties dialog box tab options 2nd scheduling printer availability SCSI controllers (Small Computer System Interface) CD/DVD drives 2nd SCSI ports (RS-232) multimedia device connections Secedit.utility as security tool 2nd secondary monitors adding to computers (Dualview) 2nd 3rd 4th configuring for multiple display setup security access rights configuring 2nd 3rd account lockout policies 2nd Account Lockout policy Administrator account renaming Administrator rights 2nd Audit policy setting 2nd 3rd 4th 5th 6th 7th cached credentials configuration options account policies 2nd 3rd 4th 5th IP Security policies 2nd local policies 2nd 3rd 4th 5th 6th public key policies software restriction policies 2nd 3rd EFS administrator use guidelines 2nd certificate storage 2nd certificates, exporting 2nd certification authority (CA) certification authority (CA), certificate requests 2nd file decryption methods 2nd file encryption methods 2nd 3rd 4th policies, setting 2nd practical implementation of 2nd 3rd recovery agents self-signed certificates, generating 2nd supported file systems 2nd troubleshooting issues 2nd 3rd troubleshooting via cipher command switches 2nd 3rd Encrypting File System (EFS) exam questions 2nd 3rd 4th 5th 6th 7th 8th 9th answers 2nd 3rd 4th exercises Configuring a Local Group Policy (13.1) 2nd 3rd Establishing a Password Policy (12.1) 2nd file systems configuring 2nd 3rd firewalls Windows Firewall Full Control rights 2nd Guest account disabling hidden administrative shares 2nd Internet Explorer advanced options configuring 2nd 3rd 4th 5th 6th system information updates Internet zones Limited rights 2nd local security policies effect of GPOs (Group Policy Objects) 2nd management of 2nd lock-down practices 2nd 3rd 4th management of 2nd 3rd 4th 5th passwords never expire option policies 2nd permissions consistent manmagement scheme pop-up ads blocking 2nd remote access configuring 2nd 3rd resources websites review questions answers 2nd Simple File Sharing disabling smart cards logon requirements SP2 improvements SP2 tools buffer overrun protection malware protection Security Center Windows Firewall templates creating (Security Configuration and Analysis tool) 2nd 3rd tools Computer Management Group Policy Editor Local Security Policy Secedit.exe utility 2nd security templates troubleshooting 2nd 3rd 4th 5th Windows Firewall configuring after SP2 installation 2nd function of Windows Product Activation (WPA) 2nd 3rd confirmation codes ID generation information submission 2nd Security Center Security Configuration and Analysis tool file systems security settings 2nd 3rd security levels node software restriction policies security templates as security tool select-and-place questions 2nd 3rd self-signed certificates (EFS) generating 2nd Serial Line Internet Protocol, [See SLIP] serial ports (RS-232) multimedia device connections server computers Offline File feature configuring 2nd servers networking requirements 2nd required RIS components Active Directory DHCP DNS separate disk partitions RIS Admin\#092i386 subfolder 2nd OSChooser subfolder 2nd Service Pack 2, [See SP2] service packs, [See SPs] services networks management of 2nd 3rd 4th 5th 6th settings (user profiles) transferring between computers (Files and Settings Transfer Wizard) 2nd 3rd 4th 5th 6th Setup Manager administrator password bug installing (exercise 2.1) 2nd 3rd running (exercise 2.2) 2nd 3rd running from Windows 2000 Server running from Windows Server 2003 unattended installations answer files, creatinng 2nd deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th share permissions Change 2nd conflicts with NTFS permissions 2nd establishing 2nd exam questions 2nd 3rd 4th 5th 6th 7th 8th Full Control 2nd Read 2nd shared connections Internet configuring ICS) 2nd 3rd 4th 5th shared folders creating 2nd with net share command exercises Installing IIS (5.1) 2nd hidden ADMIN$ share C$ share creating FAX$ share IPC$ share Print$ share hidden administrative shares ($ ) management overview maximum number of connections network drives mapping 2nd offline files caching 2nd 3rd providing 2nd 3rd removing from Computer Management console sharing over web (IIS) 2nd 3rd 4th 5th shared resources connecting to 2nd share permissions establishing 2nd sharing encrypted files 2nd files ForceGuest behaviors 2nd implementation of 2nd local printers 2nd 3rd printers configuration of 2nd implementation of 2nd Shiva PAP Simple File Sharing disabling file access permissions 2nd simple volumes simulation-based questions 2nd 3rd 4th SLIP (Serial Line Internet Protocol) slipstreaming SP2 pre-installations 2nd 3rd 4th 5th 6th small peer-to-peer networks printer setup options smart cards configuring (Device Manager) 2nd 3rd enrollment agents installing (Device Manager) logon requirements PC/SC Workshop website Personal Computer/Smart Card (PC/SC) specification Plug and Play support public key infrastructure (PKI) remote access authentication snapshots System Restore 2nd 3rd software cloning problems 2nd compatibility testing for upgrades 2nd 3rd 4th driver signing System File Protection installation requirements compatibility checks 2nd 3rd 4th software restriction policies additional rules node certificate rule 2nd 3rd 4th designated file type node enforcement node security configuring 2nd 3rd security levels node trusted publishers node Software Update Services (SUS) SP2 deployment benefits 2nd solutions defining installation troubleshooting documentation of installation troubleshooting testing and implementation installation troubleshooting 2nd SP1 major system improvements SP2 (Service Pack 2) 2nd deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th via Group Policy 2nd 3rd 4th 5th 6th 7th via Software Update Services (SUS) 2nd downloading installations Group Policy deployment 2nd 3rd 4th 5th 6th 7th manual 2nd 3rd preparations 2nd slipstreaming 2nd 3rd 4th 5th 6th Internet Explorer Pop-Up Blocker 2nd major system improvements 2nd manual installations 2nd 3rd resources websites security focus security tools buffer overrun protection malware protection Security Center Windows Firewall Windows Firewall configuring 2nd function of spanned volumes spooling print jobs SPs (XP service packs) components of hotfixes potential for errors version 1 major improvements version 2 downloading major improvements 2nd security focus stale data status volumes standby mode airline restrictions power conservation mobile computers 2nd power management scheme 2nd static IP addresses 2nd 3rd 4th 5th 6th 7th 8th network adapters configuring 2nd 3rd 4th 5th stop errors failed installations resolving 2nd 3rd stopped installations troubleshooting storage devices [See also disk devices] Computer Management utility Device Manager Device Services Disk Defragmenter Disk Management 2nd 3rd 4th 5th 6th 7th 8th Event Viewer Indexing Service Performance Alerts and Logs Removable Storage 2nd 3rd 4th WMI Control removable media configuring 2nd 3rd 4th troubleshooting 2nd 3rd 4th storing cached credentials certificates (EFS) 2nd offline files caches stripe sets conversions upgrade preparations striped volumes creating (Diskpart.exe utility) 2nd 3rd study strategies (exam) 2nd active approach 2nd 3rd macro approach 2nd micro approach 2nd subnet masks (TCP/IP) IP addresses classes 2nd 3rd Classless Inter-Domain Routing (CIDR) 2nd host calculations success tips (exam) 2nd 3rd switching between languages in multi-language environment 2nd Symantec Drive Image symmetrical multiprocessing (SMP) processor usage monitoring (Performance Monitor) 2nd QNX Software Systems symmetrical processing (SMP) converting computers to (Device Manager) 2nd 3rd 4th multiprocessor computers synchronizing offline files with network versions Sysprep (System Preparation Tool) computer functionality testing 2nd desktop property configuration domains computer removal extracting images cloning problems 2nd creating 2nd 3rd 4th 5th creating (exercise 2.3) 2nd deploying 2nd 3rd 4th 5th 6th 7th encrypted file usage Mini-Setup Wizard running (exercise 2.4) 2nd 3rd 4th network requirements 2nd 3rd Norton Ghost Image situations to avoid 2nd SP1/SP2 deployment tools Symantec Drive Image unattended installations executing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st troubleshooting 2nd 3rd 4th when to use 2nd 3rd 4th 5th System applet (Control Panel) System Configuration utility (msconfig.exe) clean boots executing video problems troubleshooting system data backups copy type (Windows Backup) daily type (Windows Backup) differential type (Windows Backup) executing (Windows Backup) 2nd 3rd 4th 5th full type (Windows Backup) incremental type (Windows Backup) permissions (Windows Backup) 2nd restoring (Windows Backup) 2nd 3rd 4th 5th System File Checker (scf.exe) driver signatures checking System File Protection driver signing System Information Utility devices conflict/sharing status System Monitor snap-in (Performance Console) counters highlighting Explain button real-time statistics viewing 2nd system partitions booting from system performance [See performance] LogicalDisk Object counters 2nd Memory Object counters 2nd 3rd monitoring overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th optimizing overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th PhysicalDisk Object counters 2nd power management preconfigured modes 2nd processor Object counters System Preparation (sysprep) utility System Preparation Tool, [See Sysprep] system resources accessing in Internet Explorer 2nd system restoration troubleshooting (Safe Mode) 2nd 3rd 4th System Restore earlier system states restoring to 2nd 3rd restore points 2nd 3rd snapshots 2nd 3rd System State data file types 2nd 3rd 4th recovering (Recovery Console) 2nd 3rd 4th 5th 6th system volumes |