overview, Authentication Protocols
802.1x standard, PPP Extensible Authentication Protocol
EAP-MD5, EAP-MD5
EAP-TLS, EAP-TLS
East Asian Language Collection
disk space requirements, Language Support Requirements
display problems, Characters in Complex Script, Right-to-Left, or East Asian Languages Do Not Display Correctly
installing, Configuring Regional and Language Options
language group IDs, Built-In Language Support, Table 3-2: Language Support in Windows XP Professional
EBR (extended boot record), Extended Boot Record on Basic Disks
effective permissions, File and Folder Permissions, Working with Access Control Lists
EFI (Extensible Firmware Interface)
GPT disk boot sectors, Boot Sectors on GPT Disks
GPT disk sectors, Protective MBR
overview, Managing GPT Disks in Itanium-based Computers
Protective MBR, Protective MBR, Table 26-18: Protective MBR in GPT Disks
EFI System partitions, EFI System Partition
EFS (Encrypting File System)
architecture, Components of EFS
benefits, Overview of EFS
certificates, Delivering EFS Certificates to Users, Replacing Self-Signed Certificates with CA-issued Certificates
clearing paging files at shutdown, Clearing the Paging File at Shutdown
components, Components of EFS
configuring data recovery policy, Configuring Data Recovery Policy in a Stand-Alone Environment, Designating a Data Recovery Agent in a Stand-Alone Environment
CryptoAPI, Components of EFS
CSP, Components of EFS
decryption overview, Encrypting and Decrypting by Using EFS
decryption process, The Decryption Process
deployment strategies, Encryption
determining encryption status, Determining Encryption Status By Using My Computer, Determining Encryption Status by Using the Cipher Command
disabling, Disabling EFS
DPAPI, Components of EFS
DRASee DRA (data recovery agents), Data Recovery and Data Recovery Agents
EFS driver, Components of EFS
enabling options on shortcut menu, Enabling EFS Options on the Shortcut Menu
encrypted file structure, Structure of an Encrypted File
encryption overview, Encrypting and Decrypting by Using EFS, The Decryption Process
encryption process, The Encryption Process
enterprise certification authority, using to issue certificates, Using Enterprise Certification Authorities to Issue Certificates
error messages, Common Error Messages
exporting certificates and private keys, Exporting and Importing EFS and DRA Certificates and Private Keys, Importing Certificates
file and folder encryption overview, What Can Be Encrypted
file and folder encryption using cipher command, Encrypting and Decrypting Files and Folders by Using the Cipher Command
file and folder encryption using My Computer, Encrypting and Decrypting Files and Folders by Using My Computer
FSRTL, Components of EFS, Increasing Security for Open Encrypted Files
hibernation mode, Disabling Hibernation Mode
implementation tips, Tips for Implementing EFS
importing certificates and private keys, Exporting and Importing EFS and DRA Certificates and Private Keys, Importing Certificates
local file operations, Local and Remote File Operations in a File Share Environment, Local File Operations and Plaintext Files
multi-user access to encrypted files, Authorizing Multi-User Access to Encrypted Files, Sharing Encrypted Files
multiple operating systems, Multiple Operating Systems and EFS
Offline Files, Encrypting Offline Files, What Can Be Encrypted, Encrypting Offline Files
open encrypted files, increasing security, Increasing Security for Open Encrypted Files, Clearing the Paging File at Shutdown
overview, Encryption, Chapter 17: Encrypting File System, Overview of EFS
portable computers, Data Protection
recovery precautions, Taking Recovery Precautions, Recovering Encrypted Files
remote operations in file share environments, Remote EFS Operations in a File Share Environment, File Operations to Non-EFS Capable Volumes
remote operations in Web folder environments, Remote EFS Operations in a Web Folder Environment, File Copy from a Web Folder
remote operations overview, Remote EFS Operations on File Shares and Web Folders
sharing files, Considerations for Sharing Encrypted Files, Sharing Encrypted Files
system file encryption, What Can Be Encrypted
troubleshooting, Troubleshooting EFS, Common Error Messages
virus checking files, Virus Check Program Cannot Check All Files
Web folders (WebDAV), Remote EFS Operations in a Web Folder Environment, File Copy from a Web Folder
Win32 API, Components of EFS
3DES encryption algorithm, Components of EFS, Enabling 3DES
EFS (Encrypting File System). See also encryption, Encrypting and Decrypting by Using EFS
EFS driver, Components of EFS
EFS service, Components of EFS
EISA bus, EISA Bus
EISA Configuration partitions
converting to dynamic volumes, Converting Basic Disks to Dynamic Disks
Eject PC command, Securely Undocking Portable Computers
Emergency Repair DiskSee ASR (Automated System Recovery), Technology Features
EMF (Enhanced Metafile), Print Job Formats
enable command, Enable
enable compression option, Formatting a Volume
enabling
APM, Determining APM BIOS Compatibility
auditing policies, Enabling Auditing Policies, Auditing Account Management
automatic connection during scheduled synchronization, Enabling Automatic Connection During Scheduled Synchronization
boot logging, Boot Logging
compression, File Compression, Other Compression Tools
devices to wake computers from hibernation or standby, Enabling Devices to Wake the Computer
disk quotas, Disk Quotas
encryptionSee EFS (Encrypting File System), Encryption
IP address assignments, Enabling IP Address Assignment, Configuring an Alternate IP Address
Mode Pruning, Enabling Mode Pruning
Remote Desktop, Deploying Remote Desktop
startup key protection, Enabling the Startup Key
Stop message Event Log reporting, Stop Message System Event Log Reporting
3DES, Enabling 3DES
Encapsulating Security Payload (ESP), Using ESP
encrypted files
backup and restore, Encrypted Files, Backing Up and Restoring Encrypted Files or Folders
encryption using cipher command, Encrypting and Decrypting Files and Folders by Using the Cipher Command
encryption using My Computer, Encrypting and Decrypting Files and Folders by Using My Computer
increasing security for open, Increasing Security for Open Encrypted Files, Clearing the Paging File at Shutdown
multi-user access, Authorizing Multi-User Access to Encrypted Files, Sharing Encrypted Files
NTFS, Encryption
structure, Structure of an Encrypted File
troubleshooting, Unable to Encrypt Files, Encrypted File Is Unencrypted When Copied or Moved
Encrypting File SystemSee EFS (Encrypting File System), Encryption
encryption
cleanup operations on Windows NT 4.0 volumes, Cleanup Operations on Windows NT Volumes
configuring data recovery policy, Configuring Data Recovery Policy in a Stand-Alone Environment, Designating a Data Recovery Agent in a Stand-Alone Environment
deployment strategies, Encryption
determining status, Determining Encryption Status By Using My Computer, Determining Encryption Status by Using the Cipher Command
DRASee DRA (data recovery agents), Data Recovery and Data Recovery Agents
files and folders, What Can Be Encrypted, Encrypting and Decrypting Files and Folders by Using My Computer, Encrypting and Decrypting Files and Folders by Using the Cipher Command
multi-user access to encrypted files, Authorizing Multi-User Access to Encrypted Files, Sharing Encrypted Files
NTFS, Encryption
NTFS compatibility with Windows NT 4.0, NTFS Compatibility with Windows NT 4.0
Offline Files, Encrypting Offline Files, What Can Be Encrypted, Encrypting Offline Files
process, The Encryption Process
recovery precautions, Taking Recovery Precautions, Recovering Encrypted Files
remote, Remote Encryption on File Shares, Remote Decryption on File Shares, Remote Encryption of Files on Web Folders, Remote Decryption of Files on Web Folders
Remote Desktop, Security and Encryption in Remote Desktop, Disabling File Redirection
sharing files, Considerations for Sharing Encrypted Files, Sharing Encrypted Files
system files, What Can Be Encrypted
virus checking files, Virus Check Program Cannot Check All Files
802.11, 802.11: Encryption
encryption. See also EFS (Encrypting File System), Encrypting and Decrypting by Using EFS
Ending Cylinder, Head, and Sector fields, Starting and Ending Cylinder, Head, and Sector Fields
Enhanced Metafile (EMF), Print Job Formats
enhancements
backup and restore, Technology Features
disk management, New in Disk Management, Table 12-2: Enhancements and Changes Since Windows NT 4.0
faxing, New to Enabling Printing and Faxing
file systems, New in File Systems, Table 13-2: Enhancements Since Windows NT 4.0
networking, New in Microsoft Networking, Policy Handling
portable computers, Overview of Windows XP Professional Support for Mobile Users, Table 7-1: Mobile User Profile Computing Features in Windows XP Professional
printing, New to Enabling Printing and Faxing
Setup, New Setup Features, Uninstall
troubleshooting disks and file systems, New in Troubleshooting Disks and File Systems
enhancements. See also features; new features, Technology Features
enterprise certification authorities (CA), Using Enterprise Certification Authorities to Issue Certificates
error codes, Device Manager, Appendix F: Device Manager Error Codes, Table F-1: Device Manager Error Codes
error messagesSee Stop messages, Stop Messages for Disks and File Systems
Error Reporting service
analyzing Stop errors, Using Error Reporting, Kernel Mode Reporting
overview, Error Reporting, Kernel Mode Reporting
troubleshooting startup, Error Reporting Service
escape codes, Local Print Provider
ESP (Encapsulating Security Payload), Using ESP
ESS (extended service set), 802.11: Architecture
Ethernet, Ethernet
Event Log, Stop message reporting, Stop Message System Event Log Reporting
event messages, securitySee security event messages, Appendix E: Security Event Messages
Event Query (Eventquery.vbs), Event Query
Event Triggers (Eventtriggers.exe), Event Triggers
Event Viewer
Application log, Using the Event Viewer, Event Viewer
overview, Using the Event Viewer
Security log, Using the Event Viewer, Event Viewer
System log, Using the Event Viewer, Event Viewer
troubleshooting networking, Tools for Troubleshooting
troubleshooting startup, Event Viewer (Eventvwr.msc)
Eventquery.vbs (Event Query), Event Query
events
account logon, Account Logon Events
detailed tracking, Detailed Tracking Events
directory service access, Directory Service Access Events
logon, Logon Events, Account Logon Events
object access, Object Access Events
policy change, Policy Change Events
privilege use, Privilege Use Events
user management, User Management Events
Eventtriggers.exe (Event Triggers), Event Triggers
Eventvwr.mscSee Event Viewer, Event Viewer (Eventvwr.msc)
Everyone built-in security principal, Built-in Security Principals
Everyone permissions, Managing Anonymous Logons
exceeding disk quota limits, Exceeding Disk Quota Limits
exceptions defined, Defining Terms
exit command, Exit
expand command, Extracting Files from the Operating System CD, Expand
exporting EFS and DRA certificates and private keys, Exporting and Importing EFS and DRA Certificates and Private Keys, Importing Certificates
extended boot record (EBR), Extended Boot Record on Basic Disks
extended partition tables, Extended Boot Record on Basic Disks
extended partitions
creating during Setup, Creating Volumes During Windows XP Professional Setup
extending, Basic Volumes
extending using Sysprep.exe, Using Sysprep to Extend Disk Partitions
GPT disks, Basic Volumes
maximum per disk, Basic Volumes
extended service set (ESS), 802.11: Architecture
extending
basic volumes, Basic Volumes
dynamic volumes, Simple Volumes, Spanned Volumes, Before Converting Disks to Dynamic
Extensible Authentication ProtocolSee EAP (Extensible Authentication Protocol), Authentication Protocols
Extensible Firmware InterfaceSee EFI (Extensible Firmware Interface), Managing GPT Disks in Itanium-based Computers
external MIDI devices, Playing Audio from MIDI Devices
extracting files from operating system CD, Extracting Files from the Operating System CD