Accelerated Graphics Port (AGP), AGP Bus, Accelerated Graphics Port

access control

access tokens, Important Terms

ACE, Access Control Entries

ACLSee ACL (access control list), Working with Access Control Lists

applying to new objects, How Access Control Is Applied to New Objects, Determining Ownership of Objects

auditing Account Management, Auditing Account Management

auditing and analyzing, Auditing and Analyzing Access Control, Configuring and Analyzing Operations by Using Secedit.exe

auditing of system events, Key Concepts

auditing privilege use, Auditing the Use of Privileges

Cacls.exe, Using CACLs

configuring and analyzing operations, Configuring and Analyzing Operations by Using Secedit.exe

DACL, How Access Control Is Applied to New Objects

default permissions, Default Permissions, Applying Folder and Share Permissions at Setup

default user rights for clean-installed workstations, Security Group Creation in a Clean Installation, Table 16-6: User Rights for Clean-installed Workstations

default Write access permissions for Users group, Security Group Creation in a Clean Installation

deployment strategies, Authorization, Group Policy

discretionary access to securable objects, Key Concepts

enabling auditing policies, Enabling Auditing Policies, Auditing Account Management

Event Viewer, Using the Event Viewer

Guest accounts, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option

inheritance, Important Terms, Key Concepts, Modifying Inheritance of Permissions

key concepts, Key Concepts, Security Descriptors

local computer policy databases, Creating and Analyzing a Security Configuration Database, Modifying Baseline Analysis Settings

Local Security PolicySee Local Security Policy, Working with Local Security Policy

managing anonymous logons, Managing Anonymous Logons

managing network authentication, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option

managing user rights using security groups, Managing User Rights by Using Security Groups

multi-user access to encrypted files, Authorizing Multi-User Access to Encrypted Files, Sharing Encrypted Files

network, Network Access Control

overview, Highlights, Overview of Access Control

ownership permissions, Managing Ownership Permissions, Determining Ownership of Objects

permission inheritance, Key Concepts, Modifying Inheritance of Permissions

permissions overview, Rights and Permissions

planning, Planning for Effective Access Control

rights, Rights and Permissions

Secedit.exe, Configuring and Analyzing Operations by Using Secedit.exe

Security Configuration and Analysis snap-in, Working with Local Security Policy, Using the Security Configuration and Analysis Snap-in, Modifying Baseline Analysis Settings

security configuration databases, Creating and Analyzing a Security Configuration Database, Modifying Baseline Analysis Settings

security context, Important Terms

security descriptors, Important Terms, Security Descriptors

security groupsSee security groups, User Accounts and Security Groups

security policy overview, Using Security Policy

security principals, Important Terms

security settings, Important Terms

security templatesSee security templates, Security Templates

sharing files and folders, Sharing Files and Folders Under the Guest-Only Option

SID, Important Terms

Software Restriction Policies, Software Restriction Policies, Using Software Restriction Policies

system event auditing, Key Concepts

user accountsSee user accounts, User Accounts and Security Groups

user-based authorization, User-based Authorization

validating requests for access, User-based Authorization

access control entries (ACE), Access Control Entries

access control listsSee ACL (access control list), Working with Access Control Lists

access tokens, Access Tokens, Important Terms

accessibility

assistive technology, Adding Assistive Technology Products

automating logon, User Profiles

ClickLock, ClickLock

cognitive disabilities, Options for Users with Cognitive Disabilities, Snap To

color schemes, Size and Color Schemes, Color and Contrast Settings

configuring accessibility features, Configuring Accessibility Features

contrast settings, Color and Contrast Settings

cursor blink-rate options, Cursor Blink-Rate Options

customizing computers, Customizing for Accessibility, Utility Manager

customizing fonts, Customizing Fonts

deployment planning, Accessibility Options

Fast User Switching, User Profiles

FilterKeys, FilterKeys for Users with Impaired Manual Dexterity, Keyboard Filters

Group Policy, Group Policy

hearing impairments, Options for Users with Hearing Impairments, NetMeeting

insertion point indicator blink rate, Insertion Point Indicator Blink Rate

keyboard audio cues, Keyboard Audio Cues

keyboard shortcuts, Keyboard Shortcuts, ToggleKeys for Users Who Inadvertently Activate the Lock Keys

keyboard-only input, MouseKeys for Keyboard-only Input

Magnifier, Magnifier

mobility impairments, Options for Users with Mobility Impairments, SerialKeys

mouse options, Mouse Options, ClickLock

mouse pointers, Mouse Pointers

mouthstick typing, StickyKeys for One-Finger or Mouthstick Typing

Narrator, Microsoft Narrator

NetMeeting, NetMeeting

on-screen keyboards, Keyboard Layouts, Unicode and Code Pages

one-finger typing, StickyKeys for One-Finger or Mouthstick Typing

overview, Appendix I: Accessibility for People with Disabilities

seizure disorders, Options for Users Who Experience Seizures, Color and Contrast Settings

SerialKeys, SerialKeys, Adding Assistive Technology Products

setting options by disability type, Setting Accessibility Options by Type of Disability

ShowSounds, ShowSounds

size schemes, Size and Color Schemes

Snap To, Snap To

sound schemes, Sound Schemes

SoundSentry, SoundSentry

StickyKeys, StickyKeys for One-Finger or Mouthstick Typing

timing patterns, Timing Patterns

ToggleKeys, Keyboard Audio Cues, ToggleKeys for Users Who Inadvertently Activate the Lock Keys

user profiles, User Profiles

Utility Manager, Utility Manager

vision impairments, Options for Users with Vision Impairments, Sound Schemes

Windows Explorer, Customizing the Desktop

Windows Installer, Windows Installer

Accessibility Wizard

Administrative Options setting, User Profiles

configuring accessibility features, Configuring Accessibility Features

shortcut keys, Table I-5: Accessibility Wizard Shortcuts

account authentication, Account Authentication, Logon Names

account lockout policies, Account Lockout Policy

account logon events, Account Logon Events

Account Management, auditing, Auditing Account Management

account policies

account lockout policies, Account Lockout Policy

Default Domain GPO, Account Policies

Kerberos policies, Kerberos Policy

password policies, Password Policy

accounts

Administrator, User Account Creation

Guest, User Account Creation, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option

lockout policies, Account Lockout Policy

policiesSee account policies, Account Policies

usersSee user accounts, User Account Creation

ACE (access control entries), Access Control Entries

ACL (access control list)

ACE, Access Control Entries

applying access control to new objects, How Access Control Is Applied to New Objects, Determining Ownership of Objects

Cacls.exe, Using CACLs

default permissions, Default Permissions, Applying Folder and Share Permissions at Setup

defined, Important Terms

viewing, Working with Access Control Lists

working with, Working with Access Control Lists

ACPI (Advanced Configuration and Power Interface)

BIOS compatibility, ACPI Power Management

firmware, checking for compliance, Check Firmware Versions

HAL, Check Firmware Versions

Plug and Play detection, Plug and Play Device Detection

power management, ACPI Power Management

Active Directory

computer settings in Group Policy, Computer Settings Management

deployment planning, Mapping Windows XP Professional to Your Business Needs, Table 1-1: Security Features in Windows XP Professional

desktop management overview, Managing Desktops in an Active Directory Environment

desktop management using Group Policy, Using Group Policy to Manage Desktops, Table 5-5: Command-Line Parameters for GPUdate.exe

desktop management using IntelliMirror, Using IntelliMirror to Manage Desktops, Table 5-3: Approaches to Assigning and Publishing Software

DNS, DNS and Active Directory Domains

GPO overview, Group Policy Objects

GPO processing order, GPO Processing Order

Group Policy extensions, list of, Managing Users and Desktops by Using Group Policy Extensions

Group Policy-based software distribution, Group Policy based Software Distribution, Table 5-3: Approaches to Assigning and Publishing Software

implementing IntelliMirror, Implementing IntelliMirror

IntelliMirror overview, Managing Desktops in an Active Directory Environment

interactive logon, Components Used in Interactive Logon

linking GPOs to OUs, Implementing IntelliMirror

managing files and folders, Overview of Managing Files and Folders, Searching for Network Resources in an Active Directory Environment, Searching for Shared Files and Folders

multilingual compatibility with objects, clients, and domain controllers, Multilingual Compatibility with Active Directory Objects, Clients, and Domain Controllers

printers, Using Active Directory to Find Printers, Searching Active Directory Locations, Locating Resources by Publishing Objects

publishing, Locating Resources by Publishing Objects

refreshing Group Policy from command line, Refreshing Group Policy from the Command Line, Table 5-5: Command-Line Parameters for GPUdate.exe

RISSee RIS (Remote Installation Services), Before You Use RIS

RSoP snap-in in Group Policy, Resultant Set of Policy

searching fields, Searching Active Directory Fields

searching for computers, Searching for Computers

searching locations, Searching Active Directory Locations

security, Active Directory Security

share publishing, Locating Resources by Publishing Objects

user data management using IntelliMirror, User Data Management

user settings management using IntelliMirror, User Settings Management

Windows domain environments, Active Directory, DNS and Active Directory Domains

ActiveState ActivePerl, Interoperability with UNIX

ActiveSync 3.0, Using Infrared Hardware and Video Devices with Portable Computers

Add Hardware Wizard, Manual Detection and Installation

Add or Remove Programs, Add or Remove Programs

Add Printer Wizard

Active Directory, Using Active Directory to Find Printers

local printers, Plug and Play Printers

network printers, Add Printer Wizard

printer pooling, Printer Pooling

SNA, IBM Host Printers

Address Resolution Protocol (ARP), Understanding Internet Layer Protocols, ARP

administrative templates

desktop management, System Policy

Group Policy, Administrative Templates

Administrator accounts, User Account Creation

Administrators group

assigning object ownership, Managing Ownership Permissions

disk quotas, Disk Quotas and Administrators

overview, Administrators, Administrators

Administrators Tools Pack (ATP), Troubleshooting Remote Desktop

Advanced Configuration and Power InterfaceSee ACPI (Advanced Configuration and Power Interface), Check Firmware Versions

Advanced Power Management (APM), APM Power Management, Configuring APM BIOS

Advanced RISC Computing (ARC) paths, Reviewing and Correcting Boot.ini Settings on x86-based Systems

Advanced Security Settings dialog box

Auditing tab, Enabling Auditing Policies

Effective Permissions tab, Working with Access Control Lists

overview, File and Folder Permissions, Working with Access Control Lists

Owner tab, Managing Ownership Permissions

Permissions tab, Modifying Inheritance of Permissions

Afd.sys, Configuring Registry Settings

AGP (Accelerated Graphics Port), AGP Bus, Accelerated Graphics Port

AH (Authentication Header), Securing Data Transmission with IPSec Protocols

allocation unit (cluster) size option, Formatting a Volume

allocation units, recovering lost, Recovering Lost Clusters on FAT Volumes

alternate IP Configuration, Types of IP Address Assignment, Choosing Alternate IP Configuration

Anonymous Logon built-in security principal, Built-in Security Principals

Anonymous users, Managing Anonymous Logons

answer files, Using the [GuiRunOnce] Section of the Answer File, Applications that use the same type of installation mechanism might not run correctly if you do not use a-wait parameter., Specifying [RegionalSettings] Options, Specifying [GuiUnattended] Options, Specifying [TapiLocation] Options, Ensuring Consistency Within [RegionalSettings], Specifying [Unattended] Options, Specifying [GuiUnattended] Options

automatically converting FAT32 to NTFS, Automatically Converting FAT32 to NTFS

creating manually, Creating an Answer File Manually

creating using Setup Manager (Setupmgr.exe), Creating an Answer File by Using Setup Manager

customizing language and regional options, Customizing Regional and Language Options

detecting video modes, Detecting Video Mode for Computer Displays

driver signing policies, Driver Signatures

example for multiple languages, Example Answer File

language and regional settings, Defining Language and Regional Settings in the Answer File, Example Answer File

presetting time zones, Presetting Time Zones, Specifying [TapiLocation] Options

RIS, Using RIS Answer Files, Listing 2-3: Sample Ristndrd.sif Answer File

Ristndrd.sif, Using RIS Answer Files, Listing 2-3: Sample Ristndrd.sif Answer File

setting passwords, Setting Passwords, Forcing All Users to Change Local Account Passwords When Upgrading from Windows 98 or Windows Me

Sysprep.inf, Using Sysprep.inf, Sysprep.inf

Unattend.txtSee Unattend.txt, Example of an Unattend.txt Answer File

Winnt.sif, Creating an Answer File Manually

APIPA (Automatic Private IP Addressing)

choosing, Choosing APIPA

configuring, Configuring APIPA, Configuring APIPA

overview, Types of IP Address Assignment

APM (Advanced Power Management), APM Power Management, Configuring APM BIOS

Apmstat.exe, Determining APM BIOS Compatibility

Apple Macintosh system interoperability, Interoperability with Apple Macintosh Systems, Microsoft Internet Applications for Apple Macintosh Computers

AppleTalk Phase 2 Protocol Suite, Windows Server 2003 Services for Macintosh

application and service tools

boot logging, Boot Logging

Boot.ini Configuration Editor (Bootcfg.exe), Bootcfg

Dependency Walker (Depends.exe), Dependency Walker

Device ManagerSee Device Manager, Device Manager

DirectX Diagnostic Tool (Dxdiag.exe), DirectX Diagnostic Tool, Saving Information, DirectX Diagnostic Tool

Dr. Watson (DrWtsn32.exe), Dr. Watson

Error Reporting service, Error Reporting Service, Using Error Reporting, Kernel Mode Reporting, Error Reporting, Kernel Mode Reporting

Event Query (Eventquery.vbs), Event Query

Event Triggers (Eventtriggers.exe), Event Triggers

Event ViewerSee Event Viewer, Event Viewer

Global Flags Editor (Gflags.exe), Global Flags Editor

Group Policy Results (Gpresult.exe), Group Policy Results

Group Policy Update (Gpupdate.exe), Group Policy Update

Group PolicySee Group Policy, Group Policy Snap-in

Kernel Debugger (Kd.exe), Using Kernel Debugger (Kd.exe), Kernel Debugger

list of, Application and Service Tools

Memory Pool Monitor (Poolmon.exe), Memory Pool Monitor

OCA Web site, Online Crash Analysis Web Site

Openfiles (Openfiles.exe), OpenFiles

Performance snap-in (Perfmon.msc), Performance Snap-in

Process and Thread Status (Pstat.exe), Process and Thread Status

Program Compatibility Wizard, Program Compatibility Wizard

Regedit.exe (registry editor), Using the Registry Editor to Configure System Restore, Registry Editor, Registry Subtrees

RSoP snap-in, Resultant Set of Policy

RunAs, Using RunAs to Start a Program, RunAs (Command-Line Tool), RunAs (GUI Feature)

SC (Sc.exe)See SC (Sc.exe), SC

Services (Services.msc) snap-in, Disabling Services by Using the Services Snap-in, Services Snap-in

Shutdown Event Tracker, Shutdown Event Tracker

System Configuration UtilitySee System Configuration Utility (Msconfig.exe), System Configuration Utility

System Information (Msinfo32.exe), System Information, Checking the Operating System Configuration, System Information

Systeminfo (Systeminfo.exe), Systeminfo

Task Kill (Tskill.exe), Task Kill

Task List (Tasklist.exe), Task List

Task Manager (Taskmgr.exe), Ending Processes and Applications That Are Not Responding, Preserving the Core System Processes, Task Manager

WinDbg Debugger (Windbg.exe), Using WinDbg Debugger (Windbg.exe), Kernel Debugger

application compatibility, Application Compatibility, Testing Custom Applications

application pools, Application pools

ARC (Advanced RISC Computing) paths, Reviewing and Correcting Boot.ini Settings on x86-based Systems

architecture

DVD, DVD Architecture, Video card with DirectX VA

EFS, Components of EFS

WIA, WIA Architecture

Windows XP 64-Bit Edition, Overview of Windows XP 64-Bit Edition

802.11, 802.11: Architecture

archive attributes, Backup Types

area codes, specifying, Specifying [TapiLocation] Options

ARP (Address Resolution Protocol), Understanding Internet Layer Protocols, ARP

AS Exchange (Authentication Service Exchange), Logging On by Using a Smart Card

ASR (Automated System Recovery)

backups, ASR Backup

considerations, ASR Considerations

overview, Technology Features, Automated System Recovery

restoring systems, ASR Restore, ASR Considerations

troubleshooting startup, Saving System Files and Settings by Using Automated System Recovery, Saving System Files and Settings by Using Automated System Recovery

ASR Wizard, ASR Backup

assigning

software to users and computers, Group Policy based Software Distribution, Table 5-3: Approaches to Assigning and Publishing Software

user rights, User Rights Assignment

assistive technology, Adding Assistive Technology Products

ATP (Administrators Tools Pack), Troubleshooting Remote Desktop

ATTEMPTED_WRITE_TO_READONLY_MEMORY Stop message, Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY, Resolving the Problem

attrib command, Attrib

audio decoder, Audio decoder

audio renderer, Audio renderer

Audit Boot Mode, Using Sysprep Audit Boot Mode, Audit Boot mode

auditing

access control, Auditing and Analyzing Access Control, Configuring and Analyzing Operations by Using Secedit.exe

Account Management, Auditing Account Management

Application log, Using the Event Viewer

audit policy, Audit Policy

disk quotas, Auditing Disk Space Use

logon, Auditing and Troubleshooting, Security Event Messages

policies, Enabling Auditing Policies, Auditing Account Management

privilege use, Auditing the Use of Privileges

Security log, Using the Event Viewer

system events, Key Concepts

System log, Using the Event Viewer

troubleshooting, Auditing and Troubleshooting, Security Event Messages

auditing. See also security event messages, Appendix E: Security Event Messages

Authenticated Users built-in security principal, Built-in Security Principals

authentication

account authentication, Account Authentication, Logon Names

auditing, Auditing and Troubleshooting, Security Event Messages

blank password restrictions, Managing Credentials

challenge/response methods, NTLM

connections, Authentication, How the Remote Access Authentication Process Works

credentials, Credentials and Validation

deployment strategies, Authentication

interactive, Guests, Built-in Security Principals, Memberships Associated with Default Groups, Security Group Creation in a Clean Installation, Table 16-6: User Rights for Clean-installed Workstations

interactive logon process, Interactive Logon Process

IPSec, Selecting an IPSec Authentication Method, Authentication Methods

Kerberos V5 protocolSee Kerberos V5 protocol, Kerberos V5 Authentication Protocol

logging on using domain credentials, Logging On Using Domain Credentials

LSA, Credentials and Validation

managing credentials, Managing Credentials, Disabling the Welcome Screen

network, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option, Network Access Control

NTLM protocol, NTLM, Interactive Logon with NTLM

open system, Open System Authentication

overview, Highlights, Authentication Overview

pass-through, Establishing a Secure Channel

password management, Password Management, Backing Up and Restoring Passwords

policiesSee authentication policies, Authentication Policy Options

protocols, Authentication Protocols, Protocol Selection, Authentication Protocols

Remote Desktop, Enabling Password Authentication at Logon Time

security groups, Security Groups

security principalsSee security principals, Security Principals

shared key, Shared Key Authentication

smart cards, Smart Cards, Logging On by Using a Smart Card

Stored User Names and Passwords, Stored User Names and Passwords

troubleshooting, Auditing and Troubleshooting, Security Event Messages

validation, Credentials and Validation

802.11, 802.11: Authentication, Shared Key Authentication

Authentication Header (AH), Securing Data Transmission with IPSec Protocols

authentication policies

account lockout policies, Account Lockout Policy

account policies, Account Policies, Kerberos Policy

Kerberos policies, Kerberos Policy

local policies, Local Policies, Security Options

overview, Authentication Policy Options

password policies, Password Policy

Authentication Service Exchange (AS Exchange), Logging On by Using a Smart Card

authentication. See also logon, Highlights

authenticator, Kerberos V5 Authentication Protocol, Configuring 802.11 Security with 802.1x

authorizationSee access control, Highlights

authorized private IP addresses, Authorized Private IP Addresses

Autochk.exe, Running Autochk When the Computer Restarts, Using the /c Parameter to Run Autochk on Excluded Volumes

AutoComplete, Options for Users with Cognitive Disabilities

AutoCorrect, Options for Users with Cognitive Disabilities

Autodial, Autodial

autologon, Automating Logon

Automated System RecoverySee ASR (Automated System Recovery), Automated System Recovery

automatic caching, Automatic Caching

automatic detection and installation of local printers, Automatic Detection and Installation

Automatic Private IP AddressingSee APIPA (Automatic Private IP Addressing), Types of IP Address Assignment

Automatic Updates, Windows Update

automatic wireless configuration, Automatic Wireless Configuration

automating installations, Using the [GuiRunOnce] Section of the Answer File, Applications that use the same type of installation mechanism might not run correctly if you do not use a-wait parameter.

adding applications, Adding Applications

adding hardware device support, Adding Hardware Device Support, Adding Plug and Play devices before performing disk duplication with Sysprep

application installation programs, Using Application Installation Programs

automatically converting FAT32 to NTFS, Automatically Converting FAT32 to NTFS

batch files, Using a Batch File to Control How Multiple Applications Are Installed

Cmdlines.txt, Using Cmdlines.txt

converting short file names, Converting Short File Names to Long File Names ($$rename.txt)

creating answer files manually, Creating an Answer File Manually

creating answer files using Setup Manager (Setupmgr.exe), Creating an Answer File by Using Setup Manager

customizing components and features, Customizing Components and Features

customizing language and regional options, Customizing Regional and Language Options

customizing overview, Customizing the Installations

customizing tool list, Customizing the Installations

customizing tools overview, Using Windows XP Professional Customization Tools

detecting video modes, Detecting Video Mode for Computer Displays

distribution folders, Create a Distribution Folder, Copying a Folder to the System Drive of the Computer

driver signatures, Driver Signatures

driver signing policies, Driver Signatures

Dynamic Update overview, Dynamic Update

HAL, Choosing an Automated Installation and Customization Tool, Hardware Abstraction Layers

hardware requirements, Verify Hardware and Software Requirements

installing operating systemsSee installing operating systems, Installing the Operating System

mass storage devices, Mass Storage Devices

overview, Highlights, Dynamic Update

password setting, Setting Passwords, Forcing All Users to Change Local Account Passwords When Upgrading from Windows 98 or Windows Me

Plug and Play, Plug and Play Devices, Adding Plug and Play devices before performing disk duplication with Sysprep

preparing, Preparing for the Installations, Copying a Folder to the System Drive of the Computer

presetting time zones, Presetting Time Zones

process overview, Design an Automated and Customized Installation

RISSee RIS (Remote Installation Services), Remote Installation Services

Setup, Converting Short File Names to Long File Names ($$rename.txt), Unattended Installations, Parameter Descriptions

software requirements, Verify Hardware and Software Requirements

System Preparation toolSee Sysprep.exe (System Preparation tool), System Preparation Tool

tool choice guidelines, Choosing an Automated Installation and Customization Tool

tool locations and information, Where to Find the Tools and Related Information

unattended installationsSee unattended installations, Unattended Installation

Windows Installer, Using Windows Installer Service

WPA, Windows Product Activation



Microsoft Windows XP Professional Resource Kit 2003
Microsoft Windows XP Professional Resource Kit 2003
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 338
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net