page filesSee paging files, Converting Basic Disks to Dynamic Disks
page table entry (PTE), Defining Terms
page tables, Defining Terms
PAGE_FAULT_IN_NONPAGED_AREA Stop message, Stop Messages for Disks and File Systems, Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA, Resolving the Problem
paged pools, Defining Terms
paging, Defining Terms
paging file volumes
converting to dynamic volumes, Converting Basic Disks to Dynamic Disks
upgrading Windows NT 4.0 to Windows XP Professional, Preparing Multidisk Volumes for Windows XP Professional
paging files
clearing at shutdown, Clearing the Paging File at Shutdown
defragmenting, Files That You Cannot Defragment
overview, Files That You Cannot Defragment
upgrading Windows NT 4.0 to Windows XP Professional, Preparing Multidisk Volumes for Windows XP Professional
PAP (Password Authentication Protocol), Authentication Protocols
parallel cabling connections, Direct Parallel Cabling
parallel Windows XP Professional installations, Performing a Parallel Windows XP Professional Installation, Performing a Parallel Windows XP Professional Installation
partition styles, Disk Management Overview, Converting Basic Disks to Dynamic Disks, Managing GPT Disks in Itanium-based Computers
partition tables
basic disks, Partition Table on Basic Disks, Table 26-7: Partition Table Fields
Boot Indicator field, Boot Indicator Field
CHS fields, Starting and Ending Cylinder, Head, and Sector Fields
EBR, Extended Boot Record on Basic Disks
Relative Sectors field, Relative Sectors and Total Sectors Fields
replacing using DiskProbe, Using DiskProbe to Replace the MBR and Partition Table
System ID field, System ID Field
Total Sectors field, Relative Sectors and Total Sectors Fields
partitions
configuring, Configuring Partitions
converting vs. reformatting existing, Converting vs. Reformatting Existing Disk Partitions
creating during Setup, Creating Partitions During Setup of Windows XP 64-Bit Edition
deployment strategies, Disk Partitions, Sizing Partitions
EFI System, EFI System Partition
extendedSee extended partitions, Basic Volumes
GPT disk requirements, Required Partitions on GPT Disks, OEM or Unknown Partition
LDM Data, LDM Data Partition
logical drivesSee logical drives, Creating Volumes During Windows XP Professional Setup
maximum per disk, Basic Volumes
MSR, Microsoft Reserved Partition
OEM, OEM or Unknown Partition
primarySee primary partitions, Primary Partition
sizing, Sizing Partitions
styles, Disk Management Overview, Converting Basic Disks to Dynamic Disks, Managing GPT Disks in Itanium-based Computers
tablesSee partition tables, Using DiskProbe to Replace the MBR and Partition Table
unknownSee unknown partitions, OEM or Unknown Partition
pass-through authentication, Establishing a Secure Channel
Passport IDs, Stored User Names and Passwords
Password Authentication Protocol (PAP), Authentication Protocols
password reset disk (PRD), Password Reset Disk Creation
Password Reset Wizard, Backing Up and Restoring Passwords
Password Synchronization, Interoperability with UNIX
passwords
backing up and restoring, Backing Up and Restoring Passwords
boot passwords, Boot Protection
changing user, Password Management
Group Policy, Group Policy
managing, Password Management, Backing Up and Restoring Passwords
Password Reset Wizard, Backing Up and Restoring Passwords
policies, Password Policy
Remote Desktop, Enabling Password Authentication at Logon Time
restrictions for blank, Managing Credentials
setting during automatic installations, Setting Passwords, Forcing All Users to Change Local Account Passwords When Upgrading from Windows 98 or Windows Me
setup passwords, Boot Protection
storing new user, Stored User Names and Passwords
strong, Managing Credentials
PathPing (Pathping.exe), Testing the Network Connection with Ping and PathPing, PathPing
PBX (Private Branch Exchange), Private Branch Exchange
PC Card, PC Card and CardBus
PCI (Peripheral Component Interconnect) bus, PCI Bus
PDAs. See portable computers, Chapter 19: Securing Mobile Computers
PEAP (Protected Extensible Authentication Protocol), Configuring 802.11 Security with 802.1x
peer-to-peer networking, Peer-to-Peer Network Environment
performance
NTFS compression, NTFS Compression Performance
optimizing NTFS, Optimizing NTFS Performance, Last Access Time
Performance snap-in (Perfmon.msc), Performance Snap-in
Peripheral Component Interconnect (PCI) bus, PCI Bus
permissions
access control, Rights and Permissions
Advanced Security Settings dialog boxSee Advanced Security Settings dialog box, File and Folder Permissions
backup and restore, File Permissions
configuring for file system directories, Configuring Permissions for File System Directories
configuring shared folder, Configuring Shared Folder Permissions
default, Default Permissions, Applying Folder and Share Permissions at Setup
default Write access permissions for Users group, Security Group Creation in a Clean Installation
effective, File and Folder Permissions, Working with Access Control Lists
Everyone, Managing Anonymous Logons
file and folder, Basic File and Folder Permissions, Applying Folder and Share Permissions at Setup
GPO, Permissions on Group Policy Objects
inheritance, Key Concepts, Modifying Inheritance of Permissions
managing by nesting groups, Managing Permissions by Nesting Groups, Table 16-2: Nesting Rules for Group Memberships
NTFS file and folder, File and Folder Permissions
Offline Files, Offline File and Folder Permissions
ownership, Managing Ownership Permissions, Determining Ownership of Objects
Take Ownership, Managing Ownership Permissions
viewing, Using Whoami
Personal Firewall, Corporate Security
Phone and Modem Options, Configuring Modems
Phone Book Administrator, CPS
Phone Book Service, CPS
piloting deployment plans, Testing and Piloting the Deployment Plan
Ping (Ping.exe), Verifying IP Installation, Testing the Network Connection with Ping and PathPing
ping sweeps, Port Scanning
PJL (Printer Job Language), Spooler Processes
planning
access control, Planning for Effective Access Control
backup and restore, Establishing a Backup Plan, Verify Operations
deploymentsSee deployment planning, Planning the Deployment
Dynamic Update, Planning for Dynamic Update, Using the Windows Update Corporate Site for Dynamic Update
installations, Planning Installations, Planning for Windows Product Activation
LAN workgroup backup, LAN Workgroups, LAN Backup Schedule
stand-alone computer backup, Stand-Alone Computer, Stand-Alone Method Two
WPA (Windows Product Activation), Planning for Windows Product Activation
playing digital media
audio from MIDI devices, Playing Audio from MIDI Devices
CDs, Playing CDs
external MIDI devices, Playing Audio from MIDI Devices
GS Wavetable SW Synth, Playing Audio from MIDI Devices
internal sound cards, Playing Audio from MIDI Devices
software synthesizer, Playing Audio from MIDI Devices
Plug and Play
adding to Risetup images, Adding Plug and Play devices before performing disk duplication with Sysprep
allocating system resources, Allocating System Resources, I/O Port Address and Reserved Memory
automated installations, Plug and Play Devices, Adding Plug and Play devices before performing disk duplication with Sysprep
BIOS settings, Setting Plug and Play BIOS Settings
detection on ACPI systems, Plug and Play Device Detection
detection on non-ACPI systems, Plug and Play Device Detection
device connections and installation guidelines, Plug and Play Overview
device detection, Plug and Play Device Detection, Safely Remove Hardware Application
DMA channels, Direct Memory Access Channels
hot plugging, Safe Removal of Plug and Play Devices
I/O port addresses, I/O Port Address and Reserved Memory
IEEE 1394 (Firewire) support, Plug and Play
IRQ lines, Interrupt Request Lines
overview, Plug and Play Overview
printers, Plug and Play Printers, Cannot Install a Plug and Play Printer
reserved memory, I/O Port Address and Reserved Memory
safe removal of devices, Safe Removal of Plug and Play Devices, Safely Remove Hardware Application
Safely Remove Hardware application, Safe Removal of Plug and Play Devices, Safely Remove Hardware Application
surprise removal, Safe Removal of Plug and Play Devices
Sysprep.exe, Adding Plug and Play devices before performing disk duplication with Sysprep
unattended installations, Plug and Play Devices
USB, USB Support for Plug and Play
write caching policy, Safe Removal of Plug and Play Devices
PnP flag, PnP flag
Pocket PCs. See portable computers, Chapter 19: Securing Mobile Computers
Point and Print, Point and Print
Point-to-Point ProtocolSee PPP (Point-to-Point Protocol), PPPoE
Point-to-Point Tunneling Protocol (PPTP), PPTP
Poledit.exe, Group Policy and System Policy Settings
policies
account lockout, Account Lockout Policy
accountSee account policies, Account Policies
audit, Audit Policy
auditing, Enabling Auditing Policies, Auditing Account Management
authenticationSee authentication policies, Authentication Policy Options
IPSec, Creating IPSec Policies, Connection Types
Kerberos, Kerberos Policy
Load and unload device drivers, Installing Local Printers, Power Users
local, Local Policies, Security Options
Local Security PolicySee Local Security Policy, Local Policies
password, Password Policy
Software Restriction Policies, Software Restriction Policies, Using Software Restriction Policies
Terminal Services, Enabling Group Policy on an Individual Computer, Table 8-4: Group Policy Settings That Affect Remote Desktop
write caching, Safe Removal of Plug and Play Devices
policy change events, Policy Change Events
policy files, System Policy
Poolmon.exe (Memory Pool Monitor), Memory Pool Monitor
pools
nonpaged, Defining Terms
paged, Defining Terms
printer, Printer Pooling
Removable Storage, Media Pools, Application pools
port enumeration, Port Scanning
port monitors
local, Local port monitor, Port Monitor
LPR Port Monitor, Standard Port Monitor
overview, Port Monitor
remote, Remote port monitor
standard port monitor, New to Enabling Printing and Faxing, Standard Port Monitor, Status Reporting
port scanning, Port Scanning
portable computer security
best practices, Best Practices
Bluetooth wireless connectivity eavesdropping, Eavesdropping on Wireless Connectivity
boot protection, Boot Protection
DACL (discretionary access control list), Data Protection
data protection, Data Protection
eavesdropping on wireless connectivity, Eavesdropping on Wireless Connectivity
EFS (Encrypting File System), Data Protection
exposure to untrusted networks, Exposure to Untrusted Networks
hardware protection, Hardware Protection
hardware theft or loss, Increase in the Possibility of Being Lost or Stolen
implementing additional security, Implementing Additional Security for Laptop Computers, User Education
loss, Increase in the Possibility of Being Lost or Stolen
overview, Chapter 19: Securing Mobile Computers, Eavesdropping on Wireless Connectivity
Pocket PCs, Securing Mobile Devices
securing wireless networking in Windows XP, Securing Wireless Networking in Windows XP, Configuring 802.11 Security with 802.1x
theft, Increase in the Possibility of Being Lost or Stolen
untrusted networks, Exposure to Untrusted Networks
updates to security, Difficulty in Applying Security Updates
user education, User Education
Wired Equivalent Privacy (WEP), Eavesdropping on Wireless Connectivity, Configuring Security for 802.11 Wireless Network Connectivity, Configuring 802.11 Security with WEP
wireless connectivity eavesdropping, Eavesdropping on Wireless Connectivity
Wireless Zero Configuration, Using Wireless Zero Configuration in Windows XP
XOR operations, How XOR Operations Work
802.11 wireless network connectivity, Configuring Security for 802.11 Wireless Network Connectivity, Configuring 802.11 Security with 802.1x
802.11b connectivity eavesdropping, Eavesdropping on Wireless Connectivity
portable computers
application installations, Setting Up a Portable Computer
automatic caching, Automatic Caching
BIOS, Setting Up a Portable Computer, Windows XP Professional BIOS Security, Boot Protection
choosing configurations, Choosing Configurations for Portable Computers
cold docking and undocking, Cold Docking and Undocking
configuring battery monitoring and management, Configuring Battery Monitoring and Management
configuring files on network shares for offline use, Configuring Files on a Network Share for Offline Use, Manual Caching
configuring hibernation, Configuring Hibernation and Standby
configuring lid switches, Configuring Power Button, Sleep Button, and Lid Switch Behavior
configuring Offline Files, Configuring Offline Files for Portable Computers, Managing the Offline Files Folder
configuring power buttons, Configuring Power Button, Sleep Button, and Lid Switch Behavior
configuring refresh intervals, Configuring the Group Policy Refresh Interval for Hibernation or Standby
configuring sleep buttons, Configuring Power Button, Sleep Button, and Lid Switch Behavior
configuring synchronization for Offline Files, Configuring Synchronization for Offline Files, Preventing Scheduled Synchronization
docking and undocking, Docking and Undocking, Cold Docking and Undocking, Securely Undocking Portable Computers
dynamic device configuration, Dynamic Device Configuration
dynamic disks, Disks That You Cannot Convert to Dynamic
enabling automatic connection during scheduled synchronization, Enabling Automatic Connection During Scheduled Synchronization
enabling devices to wake systems from hibernation or standby, Enabling Devices to Wake the Computer
fast network logon, Support for Windows XP Professional Fast Network Logon
Folder Redirection, Setting Up a Portable Computer, Combining Folder Redirection with Roaming User Profiles
granting installation and configuration rights, Setting Up a Portable Computer
Group Policy, Configuring the Group Policy Refresh Interval for Hibernation or Standby, Hiding Power Options
hardware, Setting Up a Portable Computer, Managing Hardware on Portable Computers, Cold Docking and Undocking, Hardware Protection
hardware profiles, Using Hardware Profiles for Alternate Configurations
hiding power options, Hiding Power Options
hot docking and undocking, Hot Docking and Undocking, Securely Undocking Portable Computers
infrared devices, Using Infrared Hardware and Video Devices with Portable Computers
IrDA, Infrared Data Association, IrDA User Profiles
managing mobile users, Creating and Managing Standard Desktop Configurations
manual caching, Manual Caching
multiple monitors, Using Multiple Monitors with Portable Computers
offline file storage configuration, Setting Up a Portable Computer
overview, Highlights, Table 7-1: Mobile User Profile Computing Features in Windows XP Professional
power management See power management, Configuring Power Management
power schemes, Setting Up a Portable Computer, Configuring Power Schemes
roaming user profiles, Setting Up a Portable Computer, Configuring Roaming User Profiles and Folder Redirection, Combining Folder Redirection with Roaming User Profiles
securing Offline Files, Securing Offline Files, Encrypting Offline Files
security, Setting Up a Portable Computer, Securing Portable Computers, Windows XP Professional BIOS Security
security. See portable computer security, Chapter 19: Securing Mobile Computers
setting up, Setting Up a Portable Computer
standby mode, Configuring Hibernation and Standby
synchronizing over slow links, Synchronizing Over a Slow Link, Making Network Shares Available Without Synchronization
video devices, Using Infrared Hardware and Video Devices with Portable Computers
wireless networking See wireless networking, Wireless Networking
WLAN, WLAN, 802.11a
WPAN, WPAN, IrDA User Profiles
zero client configuration, Zero Client Configuration, Automatic Wireless Configuration
Portable Operating System Interface (POSIX) compliance, POSIX Compliance
Portqry.exe, Port Scanning
POSIX (Portable Operating System Interface) compliance, POSIX Compliance
POST (power-on self test), POST vs. Primary Display Device, Power-on Self Test, Power-on Self Test for Itanium-based Systems
PostScript drivers, PostScript 5.0 Driver
power buttons, Configuring Power Button, Sleep Button, and Lid Switch Behavior
power management
ACPI, ACPI Power Management
APM, APM Power Management, Configuring APM BIOS
configuring, Configuring Power Management
configuring for display monitors, Configuring Power Management for the Display
features, Power Management Features
interface, Using the Power Management Interface
overview, Setting Up a Portable Computer, Power Management
power policy overview, Power Policy Overview
schemes and options, Power Management Schemes and Options, Hiding Power Options
troubleshooting, Resolving Power Management Problems on x86-based Systems, Recovering from a Failed Hibernation
power schemes
configuring, Configuring Power Schemes
overview, Setting Up a Portable Computer
Power Users group, Power Users
power-on self test (POST), POST vs. Primary Display Device, Power-on Self Test, Power-on Self Test for Itanium-based Systems
power-user features, Advanced or Power-User Features
PPP (Point-to-Point Protocol)
EAP, PPP Extensible Authentication Protocol
logging, PPP Logging
overview, PPPoE
PPP Multilink Protocol (MP), Dynamic Multiple Device Dialing
PPP over Ethernet (PPPoE), PPPoE
PPTP (Point-to-Point Tunneling Protocol), PPTP
PRD (password reset disk), Password Reset Disk Creation
Pre-activated flag, Pre-activated flag
predefined security templates, Security Templates, Setup Security (Setup security.inf)
preparing multidisk volumes for Setup, Preparing Multidisk Volumes for Windows XP Professional
presetting time zones, Presetting Time Zones, Specifying [TapiLocation] Options
preshared keys, Authenticating with Preshared Key
Primary Display devices, POST vs. Primary Display Device
primary DNS suffixes, Primary DNS Suffix
primary GUID partition entry arrays, GUID Partition Entry Array
primary partitions
converting to simple volumes, Converting Basic Disks to Dynamic Disks
creating during Setup, Creating Volumes During Windows XP Professional Setup
extending, Basic Volumes
GPT disks, Basic Volumes, Primary Partition
maximum per disk, Basic Volumes
MBR disks, Basic Volumes
print monitors, Print Monitors, Port Monitor
print processors, Local Print Provider, Port Monitor
print routers, Print Router
print servers
NetWare, NetWare Print Servers, NetWare
UNIX, UNIX Print Servers, UNIX
Print Services for Macintosh, Windows Server 2003 Services for Macintosh
Print Services for UNIX, UNIX Print Servers
Printer Job Language (PJL), Spooler Processes
printer pooling, Printer Pooling
printer publishing, Locating Resources by Publishing Objects
Printers and Faxes folder, New to Enabling Printing and Faxing
printing
Active Directory, Using Active Directory to Find Printers, Searching Active Directory Locations
Add Printer WizardSee Add Printer Wizard, Using Active Directory to Find Printers
adding load and unload device drivers policy, Power Users
availability of printers, Printer Availability
client processes, Client Processes
concepts overview, Printing Concepts
DLC, New to Enabling Printing and Faxing
EMF, Print Job Formats
enhancements, New to Enabling Printing and Faxing
escape codes, Local Print Provider
finding printers using Active Directory, Using Active Directory to Find Printers, Searching Active Directory Locations
font-related problems, Troubleshooting Font-Related Printing Problems
GDI, Client Processes, Graphics Device Interface
IBM host printers, IBM Host Printers, IBM
ICM 2.0, Image Color Management 2.0
IEEE 1284.4 protocol, IEEE 1284.4 Protocol
installing printersSee installing printers, Installing Printers
Internet printing, Internet Printing, Monitoring and Managing Internet Print Jobs, Printing Over the Internet, Figure 11-4: Fax (Local) Properties dialog box
Internet Printing Protocol, Monitoring and Managing Internet Print Jobs
IrDA devices, IrDA
language monitors, Language monitor
local port monitors (Localspl.dll), Local port monitor, Port Monitor
local print provider (Localspl.dll), Spooler Processes, Local Print Provider, Port Monitor
multiple page printing on single page, Printing Preferences
NetWare print servers, NetWare Print Servers, NetWare
number of copies, Printing Preferences
operating systems other than Windows, Printing from Other Operating Systems, IBM Host Printers, UNIX, IBM
overview, Chapter 11: Enabling Printing and Faxing
Plug and Play, Plug and Play Printers, Cannot Install a Plug and Play Printer
preferences, Printing Preferences, Spooler Settings
Print dialog box modifications, Modifications to the Print Dialog Box
print job formats, Print Job Formats
print job priority, Print Job Priority
print job queue security options, Print Queue Security Options
print jobs, creating and sending, Creating and Sending Print Jobs, IEEE 1284.4 Protocol
print jobs, sending methods, Methods of Sending Print Jobs
print monitors, Print Monitors, Port Monitor
print processors, Local Print Provider
print routers, Print Router
printer availability, Printer Availability
printer components, Printer Components, Port Monitor
printer drivers, Printer Drivers, PostScript 5.0 Driver, Printer Drivers, Modifying Local Security Policy Settings
printer pooling, Printer Pooling
printer priority, Printer Priority
processes described, Printing Processes, Spooler Processes
RAW, Print Job Formats
RAW , Print Job Formats
Remote Desktop printer redirection, Resource Redirection, Disabling Printer Redirection
remote port monitors, Remote port monitor
remote print provider, Remote Print Provider
reverse-order printing, Printing Preferences
scheduling printing, Scheduling Printing, Print Job Priority
searching for printers using Active Directory, Using Active Directory to Find Printers, Searching Active Directory Locations
separator page processors, Local Print Provider
spooler components, Print Spooler, Port Monitor
spooler processes, Spooler Processes
spooler settings, Spooler Settings
standard port monitor, New to Enabling Printing and Faxing, Standard Port Monitor, Status Reporting
text print job format, Print Job Formats
troubleshooting, Troubleshooting Printing Problems, Troubleshooting Font-Related Printing Problems
UNIX, UNIX Print Servers, UNIX
USB printers, USB
Winprint print processors, Port Monitor
Printing Preferences dialog box, Printing Preferences
printing. See also faxing, Chapter 11: Enabling Printing and Faxing
Private Branch Exchange (PBX), Private Branch Exchange
private IP addresses, Authorized Private IP Addresses, Unauthorized Private IP Addresses
private keys, Exporting and Importing EFS and DRA Certificates and Private Keys, Importing Certificates, Private Key Storage
privilege use events, Privilege Use Events
privileges
auditing, Auditing the Use of Privileges
connection configuration, Configuration Privileges
list of display names and string constants, Privileges, Table B-2: Privileges
overview, Privileges
Process and Thread Status (Pstat.exe), Process and Thread Status
process throttling, Controlling bandwidth use and enabling process throttling
processes, Defining Terms
Producer, Microsoft Producer
Program Compatibility Wizard, About the Program Compatibility Wizard, Program Compatibility Wizard
Protected Extensible Authentication Protocol (PEAP), Configuring 802.11 Security with 802.1x
protecting boot sectors, Protecting the Boot Sector
Protective MBR, Protective MBR, Table 26-18: Protective MBR in GPT Disks
protocols
authentication, Authentication Protocols, Protocol Selection, Authentication Protocols
DLC printing, New to Enabling Printing and Faxing
H.323See H.323, H.323 Protocol
IEEE 1284.4, IEEE 1284.4 Protocol
Internet Printing Protocol, Monitoring and Managing Internet Print Jobs
IP over 1394, IEEE 1394
IPSec, Securing Data Transmission with IPSec Protocols, Using ESP
IPX, IPX Protocol
IrDial, Using Infrared Hardware and Video Devices with Portable Computers
IrTran-P image exchange, Using Infrared Hardware and Video Devices with Portable Computers
Kerberos V5See Kerberos V5 protocol, Kerberos V5 Authentication Protocol
Negotiate, Account Authentication
NTLM, NTLM, Interactive Logon with NTLM
PPP MP, Dynamic Multiple Device Dialing
RDP, Remote Desktop Protocol
SBP-2, IEEE 1394
SIP, Session Initiation Protocol, RTC Client APIs
61883, IEEE 1394
Pstat.exe (Process and Thread Status), Process and Thread Status
PSTN (Public Switched Telephone Network)
gateway addresses, Specifying the H.323 Gateway
gateway overview, H.323 Gateway
overview, Public Switched Telephone Network
troubleshooting, Troubleshooting PSTN Telephony
PTE (page table entry), Defining Terms
public IP addresses, Public IP Addresses
public keys
encryption overview, How Files Are Encrypted
storage, Certificate and Public Key Storage
Public Switched Telephone NetworkSee PSTN (Public Switched Telephone Network), H.323 Gateway
publishing objects, locating resources by, Locating Resources by Publishing Objects, Logon Scripts
publishing software for users, Group Policy based Software Distribution, Table 5-3: Approaches to Assigning and Publishing Software
pushbutton scanning, Pushbutton Scanning