AC-3 audio, AC-3 audio
Accelerated Graphics Port (AGP), AGP Bus, Accelerated Graphics Port
access control
access tokens, Important Terms
ACE, Access Control Entries
ACLSee ACL (access control list), Working with Access Control Lists
applying to new objects, How Access Control Is Applied to New Objects, Determining Ownership of Objects
auditing Account Management, Auditing Account Management
auditing and analyzing, Auditing and Analyzing Access Control, Configuring and Analyzing Operations by Using Secedit.exe
auditing of system events, Key Concepts
auditing privilege use, Auditing the Use of Privileges
Cacls.exe, Using CACLs
configuring and analyzing operations, Configuring and Analyzing Operations by Using Secedit.exe
DACL, How Access Control Is Applied to New Objects
default permissions, Default Permissions, Applying Folder and Share Permissions at Setup
default user rights for clean-installed workstations, Security Group Creation in a Clean Installation, Table 16-6: User Rights for Clean-installed Workstations
default Write access permissions for Users group, Security Group Creation in a Clean Installation
deployment strategies, Authorization, Group Policy
discretionary access to securable objects, Key Concepts
enabling auditing policies, Enabling Auditing Policies, Auditing Account Management
Event Viewer, Using the Event Viewer
Guest accounts, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option
inheritance, Important Terms, Key Concepts, Modifying Inheritance of Permissions
key concepts, Key Concepts, Security Descriptors
local computer policy databases, Creating and Analyzing a Security Configuration Database, Modifying Baseline Analysis Settings
Local Security PolicySee Local Security Policy, Working with Local Security Policy
managing anonymous logons, Managing Anonymous Logons
managing network authentication, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option
managing user rights using security groups, Managing User Rights by Using Security Groups
multi-user access to encrypted files, Authorizing Multi-User Access to Encrypted Files, Sharing Encrypted Files
network, Network Access Control
overview, Highlights, Overview of Access Control
ownership permissions, Managing Ownership Permissions, Determining Ownership of Objects
permission inheritance, Key Concepts, Modifying Inheritance of Permissions
permissions overview, Rights and Permissions
planning, Planning for Effective Access Control
rights, Rights and Permissions
Secedit.exe, Configuring and Analyzing Operations by Using Secedit.exe
Security Configuration and Analysis snap-in, Working with Local Security Policy, Using the Security Configuration and Analysis Snap-in, Modifying Baseline Analysis Settings
security configuration databases, Creating and Analyzing a Security Configuration Database, Modifying Baseline Analysis Settings
security context, Important Terms
security descriptors, Important Terms, Security Descriptors
security groupsSee security groups, User Accounts and Security Groups
security policy overview, Using Security Policy
security principals, Important Terms
security settings, Important Terms
security templatesSee security templates, Security Templates
sharing files and folders, Sharing Files and Folders Under the Guest-Only Option
SID, Important Terms
Software Restriction Policies, Software Restriction Policies, Using Software Restriction Policies
system event auditing, Key Concepts
user accountsSee user accounts, User Accounts and Security Groups
user-based authorization, User-based Authorization
validating requests for access, User-based Authorization
access control entries (ACE), Access Control Entries
access control listsSee ACL (access control list), Working with Access Control Lists
access tokens, Access Tokens, Important Terms
accessibility
assistive technology, Adding Assistive Technology Products
automating logon, User Profiles
ClickLock, ClickLock
cognitive disabilities, Options for Users with Cognitive Disabilities, Snap To
color schemes, Size and Color Schemes, Color and Contrast Settings
configuring accessibility features, Configuring Accessibility Features
contrast settings, Color and Contrast Settings
cursor blink-rate options, Cursor Blink-Rate Options
customizing computers, Customizing for Accessibility, Utility Manager
customizing fonts, Customizing Fonts
deployment planning, Accessibility Options
Fast User Switching, User Profiles
FilterKeys, FilterKeys for Users with Impaired Manual Dexterity, Keyboard Filters
Group Policy, Group Policy
hearing impairments, Options for Users with Hearing Impairments, NetMeeting
insertion point indicator blink rate, Insertion Point Indicator Blink Rate
keyboard audio cues, Keyboard Audio Cues
keyboard shortcuts, Keyboard Shortcuts, ToggleKeys for Users Who Inadvertently Activate the Lock Keys
keyboard-only input, MouseKeys for Keyboard-only Input
Magnifier, Magnifier
mobility impairments, Options for Users with Mobility Impairments, SerialKeys
mouse options, Mouse Options, ClickLock
mouse pointers, Mouse Pointers
mouthstick typing, StickyKeys for One-Finger or Mouthstick Typing
Narrator, Microsoft Narrator
NetMeeting, NetMeeting
on-screen keyboards, Keyboard Layouts, Unicode and Code Pages
one-finger typing, StickyKeys for One-Finger or Mouthstick Typing
overview, Appendix I: Accessibility for People with Disabilities
seizure disorders, Options for Users Who Experience Seizures, Color and Contrast Settings
SerialKeys, SerialKeys, Adding Assistive Technology Products
setting options by disability type, Setting Accessibility Options by Type of Disability
ShowSounds, ShowSounds
size schemes, Size and Color Schemes
Snap To, Snap To
sound schemes, Sound Schemes
SoundSentry, SoundSentry
StickyKeys, StickyKeys for One-Finger or Mouthstick Typing
timing patterns, Timing Patterns
ToggleKeys, Keyboard Audio Cues, ToggleKeys for Users Who Inadvertently Activate the Lock Keys
user profiles, User Profiles
Utility Manager, Utility Manager
vision impairments, Options for Users with Vision Impairments, Sound Schemes
Windows Explorer, Customizing the Desktop
Windows Installer, Windows Installer
Accessibility Wizard
Administrative Options setting, User Profiles
configuring accessibility features, Configuring Accessibility Features
shortcut keys, Table I-5: Accessibility Wizard Shortcuts
account authentication, Account Authentication, Logon Names
account lockout policies, Account Lockout Policy
account logon events, Account Logon Events
Account Management, auditing, Auditing Account Management
account policies
account lockout policies, Account Lockout Policy
Default Domain GPO, Account Policies
Kerberos policies, Kerberos Policy
password policies, Password Policy
accounts
Administrator, User Account Creation
Guest, User Account Creation, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option
lockout policies, Account Lockout Policy
policiesSee account policies, Account Policies
usersSee user accounts, User Account Creation
ACE (access control entries), Access Control Entries
ACL (access control list)
ACE, Access Control Entries
applying access control to new objects, How Access Control Is Applied to New Objects, Determining Ownership of Objects
Cacls.exe, Using CACLs
default permissions, Default Permissions, Applying Folder and Share Permissions at Setup
defined, Important Terms
viewing, Working with Access Control Lists
working with, Working with Access Control Lists
ACPI (Advanced Configuration and Power Interface)
BIOS compatibility, ACPI Power Management
firmware, checking for compliance, Check Firmware Versions
HAL, Check Firmware Versions
Plug and Play detection, Plug and Play Device Detection
power management, ACPI Power Management
Active Directory
computer settings in Group Policy, Computer Settings Management
deployment planning, Mapping Windows XP Professional to Your Business Needs, Table 1-1: Security Features in Windows XP Professional
desktop management overview, Managing Desktops in an Active Directory Environment
desktop management using Group Policy, Using Group Policy to Manage Desktops, Table 5-5: Command-Line Parameters for GPUdate.exe
desktop management using IntelliMirror, Using IntelliMirror to Manage Desktops, Table 5-3: Approaches to Assigning and Publishing Software
DNS, DNS and Active Directory Domains
GPO overview, Group Policy Objects
GPO processing order, GPO Processing Order
Group Policy extensions, list of, Managing Users and Desktops by Using Group Policy Extensions
Group Policy-based software distribution, Group Policy based Software Distribution, Table 5-3: Approaches to Assigning and Publishing Software
implementing IntelliMirror, Implementing IntelliMirror
IntelliMirror overview, Managing Desktops in an Active Directory Environment
interactive logon, Components Used in Interactive Logon
linking GPOs to OUs, Implementing IntelliMirror
managing files and folders, Overview of Managing Files and Folders, Searching for Network Resources in an Active Directory Environment, Searching for Shared Files and Folders
multilingual compatibility with objects, clients, and domain controllers, Multilingual Compatibility with Active Directory Objects, Clients, and Domain Controllers
printers, Using Active Directory to Find Printers, Searching Active Directory Locations, Locating Resources by Publishing Objects
publishing, Locating Resources by Publishing Objects
refreshing Group Policy from command line, Refreshing Group Policy from the Command Line, Table 5-5: Command-Line Parameters for GPUdate.exe
RISSee RIS (Remote Installation Services), Before You Use RIS
RSoP snap-in in Group Policy, Resultant Set of Policy
searching fields, Searching Active Directory Fields
searching for computers, Searching for Computers
searching locations, Searching Active Directory Locations
security, Active Directory Security
share publishing, Locating Resources by Publishing Objects
user data management using IntelliMirror, User Data Management
user settings management using IntelliMirror, User Settings Management
Windows domain environments, Active Directory, DNS and Active Directory Domains
ActiveState ActivePerl, Interoperability with UNIX
ActiveSync 3.0, Using Infrared Hardware and Video Devices with Portable Computers
Add Hardware Wizard, Manual Detection and Installation
Add or Remove Programs, Add or Remove Programs
Add Printer Wizard
Active Directory, Using Active Directory to Find Printers
local printers, Plug and Play Printers
network printers, Add Printer Wizard
printer pooling, Printer Pooling
SNA, IBM Host Printers
Address Resolution Protocol (ARP), Understanding Internet Layer Protocols, ARP
administrative templates
desktop management, System Policy
Group Policy, Administrative Templates
Administrator accounts, User Account Creation
Administrators group
assigning object ownership, Managing Ownership Permissions
disk quotas, Disk Quotas and Administrators
overview, Administrators, Administrators
Administrators Tools Pack (ATP), Troubleshooting Remote Desktop
Advanced Configuration and Power InterfaceSee ACPI (Advanced Configuration and Power Interface), Check Firmware Versions
Advanced Power Management (APM), APM Power Management, Configuring APM BIOS
Advanced RISC Computing (ARC) paths, Reviewing and Correcting Boot.ini Settings on x86-based Systems
Advanced Security Settings dialog box
Auditing tab, Enabling Auditing Policies
Effective Permissions tab, Working with Access Control Lists
overview, File and Folder Permissions, Working with Access Control Lists
Owner tab, Managing Ownership Permissions
Permissions tab, Modifying Inheritance of Permissions
Afd.sys, Configuring Registry Settings
AGP (Accelerated Graphics Port), AGP Bus, Accelerated Graphics Port
AH (Authentication Header), Securing Data Transmission with IPSec Protocols
allocation unit (cluster) size option, Formatting a Volume
allocation units, recovering lost, Recovering Lost Clusters on FAT Volumes
alternate IP Configuration, Types of IP Address Assignment, Choosing Alternate IP Configuration
Anonymous Logon built-in security principal, Built-in Security Principals
Anonymous users, Managing Anonymous Logons
answer files, Using the [GuiRunOnce] Section of the Answer File, Applications that use the same type of installation mechanism might not run correctly if you do not use a-wait parameter., Specifying [RegionalSettings] Options, Specifying [GuiUnattended] Options, Specifying [TapiLocation] Options, Ensuring Consistency Within [RegionalSettings], Specifying [Unattended] Options, Specifying [GuiUnattended] Options
automatically converting FAT32 to NTFS, Automatically Converting FAT32 to NTFS
creating manually, Creating an Answer File Manually
creating using Setup Manager (Setupmgr.exe), Creating an Answer File by Using Setup Manager
customizing language and regional options, Customizing Regional and Language Options
detecting video modes, Detecting Video Mode for Computer Displays
driver signing policies, Driver Signatures
example for multiple languages, Example Answer File
language and regional settings, Defining Language and Regional Settings in the Answer File, Example Answer File
presetting time zones, Presetting Time Zones, Specifying [TapiLocation] Options
RIS, Using RIS Answer Files, Listing 2-3: Sample Ristndrd.sif Answer File
Ristndrd.sif, Using RIS Answer Files, Listing 2-3: Sample Ristndrd.sif Answer File
setting passwords, Setting Passwords, Forcing All Users to Change Local Account Passwords When Upgrading from Windows 98 or Windows Me
Sysprep.inf, Using Sysprep.inf, Sysprep.inf
Unattend.txtSee Unattend.txt, Example of an Unattend.txt Answer File
Winnt.sif, Creating an Answer File Manually
APIPA (Automatic Private IP Addressing)
choosing, Choosing APIPA
configuring, Configuring APIPA, Configuring APIPA
overview, Types of IP Address Assignment
APM (Advanced Power Management), APM Power Management, Configuring APM BIOS
Apmstat.exe, Determining APM BIOS Compatibility
Apple Macintosh system interoperability, Interoperability with Apple Macintosh Systems, Microsoft Internet Applications for Apple Macintosh Computers
AppleTalk Phase 2 Protocol Suite, Windows Server 2003 Services for Macintosh
application and service tools
boot logging, Boot Logging
Boot.ini Configuration Editor (Bootcfg.exe), Bootcfg
Dependency Walker (Depends.exe), Dependency Walker
Device ManagerSee Device Manager, Device Manager
DirectX Diagnostic Tool (Dxdiag.exe), DirectX Diagnostic Tool, Saving Information, DirectX Diagnostic Tool
Dr. Watson (DrWtsn32.exe), Dr. Watson
Error Reporting service, Error Reporting Service, Using Error Reporting, Kernel Mode Reporting, Error Reporting, Kernel Mode Reporting
Event Query (Eventquery.vbs), Event Query
Event Triggers (Eventtriggers.exe), Event Triggers
Event ViewerSee Event Viewer, Event Viewer
Global Flags Editor (Gflags.exe), Global Flags Editor
Group Policy Results (Gpresult.exe), Group Policy Results
Group Policy Update (Gpupdate.exe), Group Policy Update
Group PolicySee Group Policy, Group Policy Snap-in
Kernel Debugger (Kd.exe), Using Kernel Debugger (Kd.exe), Kernel Debugger
list of, Application and Service Tools
Memory Pool Monitor (Poolmon.exe), Memory Pool Monitor
OCA Web site, Online Crash Analysis Web Site
Openfiles (Openfiles.exe), OpenFiles
Performance snap-in (Perfmon.msc), Performance Snap-in
Process and Thread Status (Pstat.exe), Process and Thread Status
Program Compatibility Wizard, Program Compatibility Wizard
Regedit.exe (registry editor), Using the Registry Editor to Configure System Restore, Registry Editor, Registry Subtrees
RSoP snap-in, Resultant Set of Policy
RunAs, Using RunAs to Start a Program, RunAs (Command-Line Tool), RunAs (GUI Feature)
SC (Sc.exe)See SC (Sc.exe), SC
Services (Services.msc) snap-in, Disabling Services by Using the Services Snap-in, Services Snap-in
Shutdown Event Tracker, Shutdown Event Tracker
System Configuration UtilitySee System Configuration Utility (Msconfig.exe), System Configuration Utility
System Information (Msinfo32.exe), System Information, Checking the Operating System Configuration, System Information
Systeminfo (Systeminfo.exe), Systeminfo
Task Kill (Tskill.exe), Task Kill
Task List (Tasklist.exe), Task List
Task Manager (Taskmgr.exe), Ending Processes and Applications That Are Not Responding, Preserving the Core System Processes, Task Manager
WinDbg Debugger (Windbg.exe), Using WinDbg Debugger (Windbg.exe), Kernel Debugger
application compatibility, Application Compatibility, Testing Custom Applications
application pools, Application pools
ARC (Advanced RISC Computing) paths, Reviewing and Correcting Boot.ini Settings on x86-based Systems
architecture
DVD, DVD Architecture, Video card with DirectX VA
EFS, Components of EFS
WIA, WIA Architecture
Windows XP 64-Bit Edition, Overview of Windows XP 64-Bit Edition
802.11, 802.11: Architecture
archive attributes, Backup Types
area codes, specifying, Specifying [TapiLocation] Options
ARP (Address Resolution Protocol), Understanding Internet Layer Protocols, ARP
AS Exchange (Authentication Service Exchange), Logging On by Using a Smart Card
ASR (Automated System Recovery)
backups, ASR Backup
considerations, ASR Considerations
overview, Technology Features, Automated System Recovery
restoring systems, ASR Restore, ASR Considerations
troubleshooting startup, Saving System Files and Settings by Using Automated System Recovery, Saving System Files and Settings by Using Automated System Recovery
ASR Wizard, ASR Backup
assigning
software to users and computers, Group Policy based Software Distribution, Table 5-3: Approaches to Assigning and Publishing Software
user rights, User Rights Assignment
assistive technology, Adding Assistive Technology Products
ATP (Administrators Tools Pack), Troubleshooting Remote Desktop
ATTEMPTED_WRITE_TO_READONLY_MEMORY Stop message, Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY, Resolving the Problem
attrib command, Attrib
audio decoder, Audio decoder
audio renderer, Audio renderer
Audit Boot Mode, Using Sysprep Audit Boot Mode, Audit Boot mode
auditing
access control, Auditing and Analyzing Access Control, Configuring and Analyzing Operations by Using Secedit.exe
Account Management, Auditing Account Management
Application log, Using the Event Viewer
audit policy, Audit Policy
disk quotas, Auditing Disk Space Use
logon, Auditing and Troubleshooting, Security Event Messages
policies, Enabling Auditing Policies, Auditing Account Management
privilege use, Auditing the Use of Privileges
Security log, Using the Event Viewer
system events, Key Concepts
System log, Using the Event Viewer
troubleshooting, Auditing and Troubleshooting, Security Event Messages
auditing. See also security event messages, Appendix E: Security Event Messages
Authenticated Users built-in security principal, Built-in Security Principals
authentication
account authentication, Account Authentication, Logon Names
auditing, Auditing and Troubleshooting, Security Event Messages
blank password restrictions, Managing Credentials
challenge/response methods, NTLM
connections, Authentication, How the Remote Access Authentication Process Works
credentials, Credentials and Validation
deployment strategies, Authentication
interactive, Guests, Built-in Security Principals, Memberships Associated with Default Groups, Security Group Creation in a Clean Installation, Table 16-6: User Rights for Clean-installed Workstations
interactive logon process, Interactive Logon Process
IPSec, Selecting an IPSec Authentication Method, Authentication Methods
Kerberos V5 protocolSee Kerberos V5 protocol, Kerberos V5 Authentication Protocol
logging on using domain credentials, Logging On Using Domain Credentials
LSA, Credentials and Validation
managing credentials, Managing Credentials, Disabling the Welcome Screen
network, Managing Network Authentication, Sharing Files and Folders Under the Guest-Only Option, Network Access Control
NTLM protocol, NTLM, Interactive Logon with NTLM
open system, Open System Authentication
overview, Highlights, Authentication Overview
pass-through, Establishing a Secure Channel
password management, Password Management, Backing Up and Restoring Passwords
policiesSee authentication policies, Authentication Policy Options
protocols, Authentication Protocols, Protocol Selection, Authentication Protocols
Remote Desktop, Enabling Password Authentication at Logon Time
security groups, Security Groups
security principalsSee security principals, Security Principals
shared key, Shared Key Authentication
smart cards, Smart Cards, Logging On by Using a Smart Card
Stored User Names and Passwords, Stored User Names and Passwords
troubleshooting, Auditing and Troubleshooting, Security Event Messages
validation, Credentials and Validation
802.11, 802.11: Authentication, Shared Key Authentication
Authentication Header (AH), Securing Data Transmission with IPSec Protocols
authentication policies
account lockout policies, Account Lockout Policy
account policies, Account Policies, Kerberos Policy
Kerberos policies, Kerberos Policy
local policies, Local Policies, Security Options
overview, Authentication Policy Options
password policies, Password Policy
Authentication Service Exchange (AS Exchange), Logging On by Using a Smart Card
authentication. See also logon, Highlights
authenticator, Kerberos V5 Authentication Protocol, Configuring 802.11 Security with 802.1x
authorizationSee access control, Highlights
authorized private IP addresses, Authorized Private IP Addresses
Autochk.exe, Running Autochk When the Computer Restarts, Using the /c Parameter to Run Autochk on Excluded Volumes
AutoComplete, Options for Users with Cognitive Disabilities
AutoCorrect, Options for Users with Cognitive Disabilities
Autodial, Autodial
autologon, Automating Logon
Automated System RecoverySee ASR (Automated System Recovery), Automated System Recovery
automatic caching, Automatic Caching
automatic detection and installation of local printers, Automatic Detection and Installation
Automatic Private IP AddressingSee APIPA (Automatic Private IP Addressing), Types of IP Address Assignment
Automatic Updates, Windows Update
automatic wireless configuration, Automatic Wireless Configuration
automating installations, Using the [GuiRunOnce] Section of the Answer File, Applications that use the same type of installation mechanism might not run correctly if you do not use a-wait parameter.
adding applications, Adding Applications
adding hardware device support, Adding Hardware Device Support, Adding Plug and Play devices before performing disk duplication with Sysprep
application installation programs, Using Application Installation Programs
automatically converting FAT32 to NTFS, Automatically Converting FAT32 to NTFS
batch files, Using a Batch File to Control How Multiple Applications Are Installed
Cmdlines.txt, Using Cmdlines.txt
converting short file names, Converting Short File Names to Long File Names ($$rename.txt)
creating answer files manually, Creating an Answer File Manually
creating answer files using Setup Manager (Setupmgr.exe), Creating an Answer File by Using Setup Manager
customizing components and features, Customizing Components and Features
customizing language and regional options, Customizing Regional and Language Options
customizing overview, Customizing the Installations
customizing tool list, Customizing the Installations
customizing tools overview, Using Windows XP Professional Customization Tools
detecting video modes, Detecting Video Mode for Computer Displays
distribution folders, Create a Distribution Folder, Copying a Folder to the System Drive of the Computer
driver signatures, Driver Signatures
driver signing policies, Driver Signatures
Dynamic Update overview, Dynamic Update
HAL, Choosing an Automated Installation and Customization Tool, Hardware Abstraction Layers
hardware requirements, Verify Hardware and Software Requirements
installing operating systemsSee installing operating systems, Installing the Operating System
mass storage devices, Mass Storage Devices
overview, Highlights, Dynamic Update
password setting, Setting Passwords, Forcing All Users to Change Local Account Passwords When Upgrading from Windows 98 or Windows Me
Plug and Play, Plug and Play Devices, Adding Plug and Play devices before performing disk duplication with Sysprep
preparing, Preparing for the Installations, Copying a Folder to the System Drive of the Computer
presetting time zones, Presetting Time Zones
process overview, Design an Automated and Customized Installation
RISSee RIS (Remote Installation Services), Remote Installation Services
Setup, Converting Short File Names to Long File Names ($$rename.txt), Unattended Installations, Parameter Descriptions
software requirements, Verify Hardware and Software Requirements
System Preparation toolSee Sysprep.exe (System Preparation tool), System Preparation Tool
tool choice guidelines, Choosing an Automated Installation and Customization Tool
tool locations and information, Where to Find the Tools and Related Information
unattended installationsSee unattended installations, Unattended Installation
Windows Installer, Using Windows Installer Service
WPA, Windows Product Activation