Safely Remove Hardware application, Safe Removal of Plug and Play Devices, Safely Remove Hardware Application

SAM (Security Accounts Manager)

account names, Logon Names

interactive logon, Components Used in Interactive Logon

security principals, Security Principals

SAS (Secure Attention Sequence), Interactive Logon with NTLM

SBP-2 Protocol, IEEE 1394

SC (Sc.exe)

managing processes, Managing Services by Using Sc.exe

overview, SC

sc query and sc config commands, Managing Services by Using Sc.exe

ScanDiskSee Chkdsk.exe, Chkdsk

Scanner and Camera Wizard, Scanner and Camera wizard

scanners and cameras, configuring, Configuring Scanners and Cameras, Pushbutton Scanning

scheduling printing, Scheduling Printing, Print Job Priority

scripts

configuring System Restore, Using Custom Scripts to Configure System Restore

DiskPart, Creating DiskPart Scripts, When to Use DiskPart Scripting

Group Policy, Scripts

logon, Roaming User Profiles and Logon Scripts, Logon Scripts

SCSI (Small Computer Standard Interface) bus, SCSI Bus

scsi() syntax, Reviewing and Correcting Boot.ini Settings on x86-based Systems

searching

computers using Active Directory, Searching for Computers

computers using NetBIOS, Searching for Computers

files, folders, and network resources, Searching for Files, Folders, and Network Resources, Searching for Shared Files and Folders

Secedit.exe

configuring and analyzing operations using, Configuring and Analyzing Operations by Using Secedit.exe

overview, Working with Local Security Policy

secpol.msc, Viewing Local Security Policy Settings

sectors

converting basic disks to dynamic disks, Disks That You Cannot Convert to Dynamic

GPT disksSee disk sectors, GPT disks, Disk Sectors on GPT Disks

MBR disksSee disk sectors, MBR disks, Disk Sectors on MBR Disks

Secure (Secure*.inf) security templates, Secure (Secure*.inf)

Secure Attention Sequence (SAS), Interactive Logon with NTLM

secure channels, Establishing a Secure Channel

Secure Server (Require Security) policy, Creating IPSec Policies

security

access controlSee access control, Highlights

Active Directory, Active Directory Security

Advanced Security Settings dialog boxSee Advanced Security Settings dialog box, File and Folder Permissions

backup and restore, Security Considerations, Backup Media Storage

BIOS, Windows XP Professional BIOS Security

certificates, Certificate and Public Key Storage, Clearing the Paging File at Shutdown

clearing paging files at shutdown, Clearing the Paging File at Shutdown

connections, How the Remote Access Authentication Process Works

deployment strategies, Determining Security Strategies, Encryption

enabling 3DES encryption algorithm, Enabling 3DES

event messagesSee security event messages, Appendix E: Security Event Messages

hibernation mode, Disabling Hibernation Mode

ICF, Using Internet Connection Firewall in Windows XP, Table 18-7: Description of Information Logged by ICF, Internet Connection Firewalls

keys, Strengthening Key and File Security, Clearing the Paging File at Shutdown

mapping Windows XP Professional to business needs, Mapping Windows XP Professional to Your Business Needs, Table 1-1: Security Features in Windows XP Professional

Offline Files, Securing Offline Files, Encrypting Offline Files

open encrypted files, Increasing Security for Open Encrypted Files, Clearing the Paging File at Shutdown

portable computers, Setting Up a Portable Computer, Securing Portable Computers, Windows XP Professional BIOS Security

print job queue, Print Queue Security Options

Remote Desktop, Console Security, Security and Encryption in Remote Desktop, Disabling File Redirection

remote network, Remote Network Security, IPSec

TCP/IP. See TCP/IP security, Chapter 18: Implementing TCP/IP Security

templatesSee security templates, Security Templates

Windows XP Home Edition, Corporate Security

802.11, 802.11: Security, RADIUS and 802.1x with 802.11, Configuring Security for 802.11 Wireless Network Connectivity, Configuring 802.11 Security with 802.1x

Security Accounts ManagerSee SAM (Security Accounts Manager), Security Principals

Security Configuration and Analysis snap-in, Working with Local Security Policy, Using the Security Configuration and Analysis Snap-in, Modifying Baseline Analysis Settings

security configuration databases, Creating and Analyzing a Security Configuration Database, Modifying Baseline Analysis Settings

Security Configuration Manager, Applying Folder and Share Permissions at Setup

Security Configuration Tool Set, Creating a Restricted Group Policy, Inheriting, Overwriting, and Ignoring Policy Changes

security context, Security Principals, Important Terms

security descriptors

access control, Security Descriptors

defined, Important Terms

security event messages

account logon events, Account Logon Events

detailed tracking events, Detailed Tracking Events

directory service access events, Directory Service Access Events

logon events, Logon Events, Account Logon Events

object access events, Object Access Events

overview, Security Event Messages, Appendix E: Security Event Messages, Viewing Security Event Messages

policy change events, Policy Change Events

privilege use events, Privilege Use Events

system event messages, System Event Messages

user management events, User Management Events

viewing, Viewing Security Event Messages

security groups

Administrators group, Administrators, Administrators

Backup Operators group, Backup Operators

built-in security principalsSee built-in security principals, Types of Security Groups

Compatibility Mode, About the Program Compatibility Wizard

computer local, Types of Security Groups, Computer Local Security Groups, Users

creating in clean installations, Security Group Creation in a Clean Installation, Table 16-6: User Rights for Clean-installed Workstations

defined, Important Terms

deployment strategies, Security Groups, Guests

domain local, Types of Security Groups, Domain Local Security Groups

global, Types of Security Groups

Guests group, Guests

HelpServicesGroup, HelpServicesGroup

managing Anonymous logons, Managing Anonymous Logons

managing user rights, Managing User Rights by Using Security Groups

memberships associated with default, Memberships Associated with Default Groups, Using Whoami

nesting, Managing Permissions by Nesting Groups, Table 16-2: Nesting Rules for Group Memberships

Network Configuration Operators group, Network Configuration Operators

overview, Security Groups, User Accounts and Security Groups

Power Users group, Power Users

Remote Desktop Users group, Remote Desktop Users

Replicator group, Replicator

special identitiesSee built-in security principals, Types of Security Groups

types, Types of Security Groups

universal, Types of Security Groups

upgrading from Windows NT, Security Group Upgrade from Windows NT 4.0

Users group, Users

well-known SIDs, Well-Known SIDs

security identifierSee SID (security identifier), Security Identifiers

security principals

access tokens, Access Tokens

built-inSee built-in security principals, Types of Security Groups

defined, Important Terms

logon rights, Logon Rights

overview, Security Principals

SAM, Security Principals

services, About Services

SID, Security Identifiers, Access Tokens

security settings, Important Terms

Security Settings extension to Group Policy, Security Settings, Incremental security templates, Working with Local Security Policy

security templates

applying, Creating and Applying Security Templates

Compatible (Compatws.inf), Compatible (Compatws.inf)

configuring permissions for file system directories, Configuring Permissions for File System Directories

creating, Creating and Applying Security Templates

creating restricted Group Policy, Creating a Restricted Group Policy

exporting, Creating and Applying Security Templates

High Secure (Hisec*.inf), High Secure (Hisec*.inf)

ignoring policy changes, Inheriting, Overwriting, and Ignoring Policy Changes

inheriting policy changes, Inheriting, Overwriting, and Ignoring Policy Changes

list of predefined, Security Templates

No Terminal Server SID (Notssid.inf), Setup Security (Setup security.inf)

overview, Security Templates

overwriting policy changes, Inheriting, Overwriting, and Ignoring Policy Changes

Root Directory Permissions (Rootsec.inf), Root Directory Permissions (Rootsec.inf)

Secure (Secure*.inf), Secure (Secure*.inf)

Setup Security (Setup security.inf), Setup Security (Setup security.inf)

using, Using Security Templates, Inheriting, Overwriting, and Ignoring Policy Changes

Security Templates snap-in

configuring permissions for file system directories, Configuring Permissions for File System Directories

creating security templates, Creating and Applying Security Templates

loading, Using Security Templates

overview, Working with Local Security Policy, Using Security Templates

viewing security policy settings, Using Security Templates

Self built-in security principal, Built-in Security Principals

self-signed certificates, replacing with CA-issued, Replacing Self-Signed Certificates with CA-issued Certificates

Send Fax Wizard, Sending Faxes

separator page processors, Local Print Provider

serial cabling connections, Serial Cabling

SerialKeys, SerialKeys, Adding Assistive Technology Products

Server (Request Security) policy, Creating IPSec Policies

Server for NFS, Interoperability with UNIX

Server for NIS, Interoperability with UNIX

Server for PCNFS, Interoperability with UNIX

servers

DNS, querying, Querying DNS Servers

DNS, search order, Querying DNS Servers

DNS, specifying, Specifying DNS Servers

NetWare print, NetWare Print Servers, NetWare

RIS, Before You Use RIS

UNIX print, UNIX Print Servers, UNIX

Service built-in security principal, Built-in Security Principals

service logon, Types of Logon

service packs

combination installations, Combination Installation, Step 6: Deploy the combination installation

command-line parameters, Service Pack Setup Program Naming Convention

creating combination installations, Combination Installation, Step 6: Deploy the combination installation

creating integrated installations, Creating an Integrated Installation, Creating a RIS image

creating update installations, Creating an Update Installation, Running a Hotfix setup program

installing using SMS, Scenario 2: Installing the Service Pack by Using SMS, Creating the SMS advertisement

integrated installations, Integrated Installation, Creating a RIS image

overview, Installing Service Packs and Hotfixes

planning deployments, Planning the Deployment, Testing the Deployment in Your Environment

Servicepack.exe, Service Pack Setup Program Naming Convention

space requirements, Checking Space Requirements

testing deployments, Testing the Deployment in Your Environment

uninstalling, Uninstalling a Service Pack or Hotfix, Uninstalling a Service Pack

update installations, Update Installation, Running a Hotfix setup program

service set identifier (SSID), Using Wireless Zero Configuration in Windows XP

services

Computer Browser, Computer Browser and Browsing Roles, Adding to and Removing from the Browse List

dependencies, determining, Determining Service Dependencies

disabling temporarily, Temporarily Disabling Services, Event Viewer (Eventvwr.msc)

disabling using Recovery Console, Using Recovery Console to Disable Services

disabling using System Configuration Utility (Msconfig.exe), Disabling Services with the System Configuration Utility

Error Reporting, Error Reporting Service, Using Error Reporting, Kernel Mode Reporting, Error Reporting, Kernel Mode Reporting

managing using SC (Sc.exe), Managing Services by Using Sc.exe

Net Logon, Components Used in Interactive Logon

RunAs, Using RunAs to Start a Program, RunAs (Command-Line Tool), RunAs (GUI Feature)

security principals, About Services

Services (Services.msc) snap-in overview, Services Snap-in

Services (Services.msc) snap-in, disabling using, Disabling Services by Using the Services Snap-in

WFP, Windows File Protection Service

WINSSee WINS (Windows Internet Name Service), Name Resolution Using WINS

Services (Services.msc) snap-in, Disabling Services by Using the Services Snap-in, Services Snap-in

Services for Macintosh, Windows Server 2003 Services for Macintosh

Services for NetWare, IPX Protocol, Interoperability with Novell NetWare

Services for UNIX

ActiveState ActivePerl, Interoperability with UNIX

Client for NFS, Interoperability with UNIX

Gateway for NFS, Interoperability with UNIX

Password Synchronization, Interoperability with UNIX

Server for NFS, Interoperability with UNIX

Server for NIS, Interoperability with UNIX

Server for PCNFS, Interoperability with UNIX

Telnet Client and Telnet Server, Interoperability with UNIX

Windows-based Cron service, Interoperability with UNIX

Windows-based Remote Shell service, Interoperability with UNIX

services. See also application and service tools; tools, Application and Service Tools

Services.msc, Disabling Services by Using the Services Snap-in, Services Snap-in

session hijacking, Spoofing

Session Initiation Protocol (SIP), Session Initiation Protocol, RTC Client APIs

Session Manager (Smss.exe), Session Manager

set command, Set

Setup

$$Rename.txt, Converting Short File Names to Long File Names ($$rename.txt)

applying folder and share permissions, Applying Folder and Share Permissions at Setup

assigning drive letters, Creating Volumes During Windows XP Professional Setup

creating partitions, Creating Partitions During Setup of Windows XP 64-Bit Edition

creating volumes, Creating Volumes During Windows XP Professional Setup

enhancements, New Setup Features, Uninstall

File copy, File Copy

GUI mode, GUI Mode

installing operating systems, Unattended Installations, Parameter Descriptions

installing Windows XP Professional on dynamic disks, Installing Windows XP Professional on Dynamic Disks

managing volumes, Managing Volumes During Windows XP Professional Setup, Installing Windows XP Professional on Dynamic Disks

parameters, Parameter Descriptions

process overview, The Setup Process, Running Setup

running, Running Setup

supporting installations, Chapter 4: Supporting Installations

Text mode, Text Mode

troubleshooting, Troubleshooting Windows XP Professional Setup

unattended installations, Unattended Installation, Unattended Installations, Parameter Descriptions

Setup Manager (Setupmgr.exe)

creating answer files, Creating an Answer File by Using Setup Manager

creating distribution folders, Using Setup Manager to Create a Distribution Folder, Copying a Folder to the System Drive of the Computer

planning service pack deployments, Setup Manager

setup passwords, Boot Protection

Setup Security (Setup security.inf) security template, Setup Security (Setup security.inf)

Setup. See also installing, Installing Windows XP Professional on Dynamic Disks

Setupcl.exe, Setupcl.exe

Setupmgr.exeSee Setup Manager (Setupmgr.exe), Using Windows XP Professional Customization Tools

Sfc.exe (System File Checker), System File Checker

share permissions, applying at setup, Applying Folder and Share Permissions at Setup

share publishing, Locating Resources by Publishing Objects

Shared Documents folder, Shared Documents Folder

shared key authentication, Shared Key Authentication

shared keys, Logging On by Using a Smart Card

Shiva Password Authentication Protocol (SPAP), Authentication Protocols

short file names

converting to long, Converting Short File Names to Long File Names ($$rename.txt)

FAT volumes, File Names on FAT Volumes

NTFS, Short File Names, MS DOS-Readable File Names on NTFS Volumes

Windows XP Professional, File Names in Windows XP Professional

shortcut keysSee keyboard shortcuts, Keyboard Shortcuts

ShowSounds, ShowSounds

Shutdown Event Tracker, Shutdown Event Tracker

SID (security identifier)

access tokens, Access Tokens

defined, Important Terms

overview, Security Identifiers

well-known, Well-Known SIDs

Whoami, Using Whoami

signature() syntax, Reviewing and Correcting Boot.ini Settings on x86-based Systems

Sigverif.exe (File Signature Verification tool), File Signature Verification

silent configurations

changing language and regional options, Changing Language and Regional Options

changing MUI Pack defaults, Changing MUI Pack Defaults

overview of multiple language versions, Using Unattended Installations and Silent Configurations, Using Silent Configurations

simple sharing model, Simple Sharing and ForceGuest, Sharing the Root Directory of a Drive

simple volumes, Simple Volumes

Single Instance Storage (SIS), Before You Use RIS

Single Instance Storage Groveler, Before You Use RIS

single sign-on, Kerberos Interoperability

SIP (Session Initiation Protocol), Session Initiation Protocol, RTC Client APIs

SIS (Single Instance Storage), Before You Use RIS

sleep buttons, Configuring Power Button, Sleep Button, and Lid Switch Behavior

slow-link connections, Synchronizing Over a Slow Link, Making Network Shares Available Without Synchronization

Small Computer Standard Interface (SCSI) bus, SCSI Bus

small memory dump files, Memory Dump Files, Small Memory Dump File

smart cards, Smart Cards, Logging On by Using a Smart Card, Authentication Protocols

SMS (Systems Management Server)

advantages, Advantages of Systems Management Server

automating installations, Systems Management Server, Disadvantages of Systems Management Server

disadvantages, Disadvantages of Systems Management Server

hardware and software requirements, Verify Hardware and Software Requirements

installing service packs, Scenario 2: Installing the Service Pack by Using SMS, Creating the SMS advertisement

planning service pack deployments, Systems Management Server

when to use, When to Use Systems Management Server

Smss.exe (Session Manager), Session Manager

smurf attacks, Spoofing

SNA (Systems Network Architecture)

Add Printer Wizard, IBM Host Printers

IBM host printers, IBM Host Printers

Snap To, Snap To

snap-ins

Certificates, Determining Whether an EFS Certificate Exists, Using Enterprise Certification Authorities to Issue Certificates

Computer Management, Computer Management Tool

Disk DefragmenterSee Disk Defragmenter snap-in, Disk Defragmenter

Disk ManagementSee Disk Management snap-in, Disk Management Overview

Event ViewerSee Event Viewer, Using the Event Viewer

Group PolicySee Group Policy, Using Group Policy with Remote Desktop

IP Security Monitor, Using the IP Security Monitor MMC Snap-In

IP Security Policy Management snap-in, IP Security Policy Management Snap-in

IPSec Monitor, IP Security Monitor

Local Security PolicySee Local Security Policy, Working with Local Security Policy

Local Security Settings, Viewing Local Security Policy Settings, Modifying Local Security Policy Settings

Local Users and GroupsSee Local Users and Groups, Password Management

Performance, Performance Snap-in

RSoP, Resultant Set of Policy, Disabling Startup Programs for Computers on a Network, Resultant Set of Policy

Security Configuration and Analysis, Working with Local Security Policy, Using the Security Configuration and Analysis Snap-in, Modifying Baseline Analysis Settings

Security Settings extension to Group Policy, Working with Local Security Policy

Security Templates, Working with Local Security Policy

Services (Services.msc), Disabling Services by Using the Services Snap-in, Services Snap-in

starting, Starting GUI Snap-in Tools

Windows XP 64-Bit Edition, Windows XP 64-Bit Edition Requirements

Software Installation extension in Group Policy, Software Installation

Software Restriction Policies, Software Restriction Policies, Using Software Restriction Policies

sound cards, Sound card

sound schemes for accessibility, Sound Schemes

SoundSentry, SoundSentry

spanned volumes, Spanned Volumes, Importing Spanned or Striped Volumes

SPAP (Shiva Password Authentication Protocol), Authentication Protocols

sparse files

cleanup operations on Windows NT 4.0 volumes, Cleanup Operations on Windows NT Volumes

NTFS compatibility with Windows NT 4.0, NTFS Compatibility with Windows NT 4.0

overview, Sparse Files

special identitiesSee built-in security principals, Types of Security Groups

spoofing, Spoofing

spooling

components, Print Spooler, Port Monitor

processes, Spooler Processes

settings, Spooler Settings

SSID (service set identifier), Using Wireless Zero Configuration in Windows XP

stacks defined, Defining Terms

stand-alone drive libraries, Stand-alone drive library

standard desktop configurations

creating managed desktops, Creating and Managing Standard Desktop Configurations, Table 5-8: Features of a Managed Desktop Configuration

mobile users, Creating and Managing Standard Desktop Configurations

multi-user desktops, Creating and Managing Standard Desktop Configurations, Table 5-10: Features of a Multi-User Desktop Configuration

new users, Creating and Managing Standard Desktop Configurations

overview, Creating and Managing Standard Desktop Configurations

replacing computers, Creating and Managing Standard Desktop Configurations

standard port monitor, New to Enabling Printing and Faxing, Standard Port Monitor, Status Reporting

Standards and Formats setting, Standards and Formats (User Locales)

standby mode

configuring, Configuring Hibernation and Standby

enabling devices to wake systems from, Enabling Devices to Wake the Computer

recovering from failed, Recovering from a Failed Standby

Starting Cylinder, Head, and Sector fields, Starting and Ending Cylinder, Head, and Sector Fields

startup files, list of, Startup Phases for x86-based Systems, Initial Startup and Boot Manager Phase for Itanium-based Systems, Startup Files

startup keys, Enabling the Startup Key

startup phases for Itanium-based systems, Startup Phases for Itanium-based Systems, Plug and Play Device Detection for Itanium-based Systems

startup phases for x86-based systems

boot loader phase, Boot Loader Phase

detecting and configuring hardware phase, Detect and Configure Hardware Phase

initial startup phase, Initial Startup Phase

kernel loading phase, Kernel Loading Phase, Session Manager

logon phase, Logon Phase

overview, Startup Phases for x86-based Systems

Plug and Play device detection phase, Plug and Play Device Detection

POST, Power-on Self Test

startup files, Startup Phases for x86-based Systems

startup troubleshootingSee troubleshooting startup, Chapter 27: Troubleshooting Startup

static IP addressing, Types of IP Address Assignment, Choosing Static IP Addressing

statically configured clients, Statically Configured and Remote Access Clients

STATUS_IMAGE_CHECKSUM_MISMATCH Stop message, Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH, Resolving the Problem

STATUS_SYSTEM_PROCESS_TERMINATED Stop message, Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED, Resolving the Problem

step-frame capture, Video Capture

StickyKeys, StickyKeys for One-Finger or Mouthstick Typing

still image devices, Still Image Devices, Image Color Management 2.0

Stop messages

analyzing Stop errors, Using Memory Dump Files to Analyze Stop Errors, Using WinDbg Debugger (Windbg.exe)

ATTEMPTED_WRITE_TO_READONLY_MEMORY, Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY, Resolving the Problem

BAD_POOL_CALLER, Stop 0xC2 or BAD_POOL_CALLER, Resolving the Problem

Bugcheck information section, Bugcheck Information

call stacks, Defining Terms

checklist, Stop Message Checklist

complete memory dump files, Memory Dump Files, Complete Memory Dump File

DATA_BUS_ERROR, Stop 0x0000002E or DATA_BUS_ERROR, Resolving the Problem

Debug port and status information section, Debug Port and Status Information

Debugging Tools, Stop Message Overview, Using Symbol Files and Debuggers, Using WinDbg Debugger (Windbg.exe)

defined, Highlights

disabling system restarts after, Preventing System Restarts After a Stop Error

Disk Cleanup (Cleanmgr.exe), Check Your Software, Disk Cleanup

Driver information section, Driver Information

DRIVER_IRQL_NOT_LESS_OR_EQUAL, Stop 0x000000D1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem

DRIVER_POWER_STATE_FAILURE, Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE, Resolving the Problem

DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS, Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPE RATIONS, Resolving the Problem

DRIVER_USED_EXCESSIVE_PTES, Stop 0x000000D8 or DRIVER_USED_EXCESSIVE_PTES, Resolving the Problem

Error Reporting service, Using Error Reporting, Kernel Mode Reporting

Event Log reporting, Stop Message System Event Log Reporting

exceptions, Defining Terms

executive initialization type, Executive Initialization Stop Messages, Table C-2: Phase 1 Initialization Stop Messages

file systems, Stop Messages for Disks and File Systems

HAL, Defining Terms, Stop 0x00000079 or MISMATCHED_HAL

hardware checks for recovery, Check Your Hardware

hardware malfunction messages, Hardware Malfunction Messages

hardware type, Stop Messages Caused by Hardware Issues

HARDWARE_INTERRUPT_STORM, Stop 0x000000F2 or HARDWARE_INTERRUPT_STORM, Resolving the Problem

HCL, Stop Messages Caused by Hardware Issues, Check Your Hardware

I/O request packets, Defining Terms

INACCESSIBLE_BOOT_DEVICE, Stop Messages for Disks and File Systems, Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE, Resolving the Problem

installation type, Installation Stop Messages

interrupts, Defining Terms

IRQL, Defining Terms

IRQL_NOT_LESS_OR_EQUAL, Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem

ISR, Defining Terms

Kernel Debugger (Kd.exe), Using Kernel Debugger (Kd.exe), Kernel Debugger

kernel memory dump files, Memory Dump Files, Kernel Memory Dump File

kernel mode, Defining Terms

KERNEL_DATA_INPAGE_ERROR, Stop Messages for Disks and File Systems, Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR, Resolving the Problem

KERNEL_STACK_INPAGE_ERROR, Stop Messages for Disks and File Systems, Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR, Resolving the Problem

kernels, Defining Terms

KMODE_EXCEPTION_NOT_HANDLED, Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED, Resolving the Problem

memory dump files, Memory Dump Files, Using WinDbg Debugger (Windbg.exe)

MISMATCHED_HAL, Stop 0x00000079 or MISMATCHED_HAL, Resolving the Problem

NO_MORE_SYSTEM_PTES, Stop 0x0000003F or NO_MORE_SYSTEM_PTES, Resolving the Problem

nonpaged pools, Defining Terms

NTFS_FILE_SYSTEM, Stop Messages for Disks and File Systems, Stop 0x00000024 or NTFS_FILE_SYSTEM, Resolving the Problem

OCA Web site, Using the Online Crash Analysis Web Site, Online Crash Analysis Web Site

overview, Highlights, Stop Message Overview

page faults, Defining Terms

page tables, Defining Terms

PAGE_FAULT_IN_NONPAGED_AREA, Stop Messages for Disks and File Systems, Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA, Resolving the Problem

paged pools, Defining Terms

paging, Defining Terms

processes, Defining Terms

PTE, Defining Terms

Recommended user action section, Recommended User Action

screen sections, Stop Message Screen Sections, Debug Port and Status Information

small memory dump files, Memory Dump Files, Small Memory Dump File

software checks for recovery, Check Your Software

software type, Stop Messages Caused by Faulty Software

stacks, Defining Terms

startup type, Installation Stop Messages

STATUS_IMAGE_CHECKSUM_MISMATCH, Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH, Resolving the Problem

STATUS_SYSTEM_PROCESS_TERMINATED, Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED, Resolving the Problem

Stop 0xA, Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem

Stop 0xBE, Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY, Resolving the Problem

Stop 0xCE, Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPE RATIONS, Resolving the Problem

Stop 0xC000021A, Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED, Resolving the Problem

Stop 0xC0000221, Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH, Resolving the Problem

Stop 0xC2, Stop 0xC2 or BAD_POOL_CALLER, Resolving the Problem

Stop 0xD1, Stop 0x000000D1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem

Stop 0xD8, Stop 0x000000D8 or DRIVER_USED_EXCESSIVE_PTES, Resolving the Problem

Stop 0xEA, Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER, Resolving the Problem

Stop 0xED, Stop 0x000000ED or UNMOUNTABLE_BOOT_VOLUME, Resolving the Problem

Stop 0xF2, Stop 0x000000F2 or HARDWARE_INTERRUPT_STORM, Resolving the Problem

Stop 0x000000CE, Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPE RATIONS, Resolving the Problem

Stop 0x000000D1, Stop 0x000000D1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem

Stop 0x000000D8, Stop 0x000000D8 or DRIVER_USED_EXCESSIVE_PTES, Resolving the Problem

Stop 0x000000EA, Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER, Resolving the Problem

Stop 0x000000ED, Stop 0x000000ED or UNMOUNTABLE_BOOT_VOLUME, Resolving the Problem

Stop 0x000000F2, Stop 0x000000F2 or HARDWARE_INTERRUPT_STORM, Resolving the Problem

Stop 0x0000000A, Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem

Stop 0x0000001E, Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED, Resolving the Problem

Stop 0x0000002E, Stop 0x0000002E or DATA_BUS_ERROR, Resolving the Problem

Stop 0x00000024, Stop Messages for Disks and File Systems, Stop 0x00000024 or NTFS_FILE_SYSTEM, Resolving the Problem

Stop 0x0000003F, Stop 0x0000003F or NO_MORE_SYSTEM_PTES, Resolving the Problem

Stop 0x00000050, Stop Messages for Disks and File Systems, Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA, Resolving the Problem

Stop 0x0000007A, Stop Messages for Disks and File Systems, Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR, Resolving the Problem

Stop 0x0000007B, Stop Messages for Disks and File Systems, Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE, Resolving the Problem

Stop 0x0000007F, Stop 0x0000007F or UNEXPECTED_KERNEL_MODE_TRAP, Resolving the Problem

Stop 0x00000077, Stop Messages for Disks and File Systems, Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR, Resolving the Problem

Stop 0x00000079, Stop 0x00000079 or MISMATCHED_HAL, Resolving the Problem

Stop 0x0000009F, Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE, Resolving the Problem

Stop 0x1E, Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED, Resolving the Problem

Stop 0x2E, Stop 0x0000002E or DATA_BUS_ERROR, Resolving the Problem

Stop 0x24, Stop Messages for Disks and File Systems, Stop 0x00000024 or NTFS_FILE_SYSTEM, Resolving the Problem

Stop 0x3F, Stop 0x0000003F or NO_MORE_SYSTEM_PTES, Resolving the Problem

Stop 0x50, Stop Messages for Disks and File Systems, Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA, Resolving the Problem

Stop 0x7A, Stop Messages for Disks and File Systems, Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR, Resolving the Problem

Stop 0x7B, Stop Messages for Disks and File Systems, Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE, Resolving the Problem

Stop 0x7F, Stop 0x0000007F or UNEXPECTED_KERNEL_MODE_TRAP, Resolving the Problem

Stop 0x77, Stop Messages for Disks and File Systems, Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR, Resolving the Problem

Stop 0x79, Stop 0x00000079 or MISMATCHED_HAL, Resolving the Problem

Stop 0x9F, Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE, Resolving the Problem

symbol files, Using Symbol Files and Debuggers

THREAD_STUCK_IN_DEVICE_DRIVER, Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER, Resolving the Problem

threads, Defining Terms

top of the stack, Defining Terms

types, Types of Stop Messages, Table C-2: Phase 1 Initialization Stop Messages

UNEXPECTED_KERNEL_MODE_TRAP, Stop 0x0000007F or UNEXPECTED_KERNEL_MODE_TRAP, Resolving the Problem

UNMOUNTABLE_BOOT_VOLUME, Stop 0x000000ED or UNMOUNTABLE_BOOT_VOLUME, Resolving the Problem

user mode, Defining Terms

WinDbg Debugger (Windbg.exe), Using WinDbg Debugger (Windbg.exe), Kernel Debugger

storage

backup and restore, Storage and Media, Media Types, Backup Media Storage

Removable StorageSee Removable Storage, Removable Storage

types, Disk Management Overview

Stored User Names and Passwords, Stored User Names and Passwords

striped sets, Preparing Multidisk Volumes for Windows XP Professional

striped volumes, Striped Volumes, Importing Spanned or Striped Volumes

strong passwords, Managing Credentials

subpictures, Subpicture

supplicant, Configuring 802.11 Security with 802.1x

Support Tools, Support Tools, Table 4-1: Support Tools That Aid in Deployment, Preparing Multidisk Volumes for Windows XP Professional

surprise removal of devices, Safe Removal of Plug and Play Devices

symbol files, Using Symbol Files and Debuggers

symmetric keys, How Files Are Encrypted

Synchronization Manager, User Data Management, Overview of Managing Files and Folders, Synchronizing Files, How Synchronization Works

syskey, Enabling the Startup Key, Boot Protection

Syskey Wizard, Enabling the Startup Key

Sysprep.exe (System Preparation tool)

advantages, Advantages of Sysprep

advantages of multiprocessor to uniprocessor, Multiprocessor to uniprocessor

advantages of uniprocessor to multiprocessor, Uniprocessor to multiprocessor

Audit Boot Mode, Using Sysprep Audit Boot Mode, Audit Boot mode

components, Sysprep Components, Pre-activated flag

customizing, Customizing Sysprep Installations, Using Sysprep Reseal Mode

disadvantages, Disadvantages of Sysprep

disadvantages of multiprocessor to uniprocessor, Multiprocessor to uniprocessor

disadvantages of uniprocessor to multiprocessor, Uniprocessor to multiprocessor

disk-imaging tools, Selecting Disk-imaging Tools

DiskPart scripts, When to Use DiskPart Scripting

extending disk partitions, Using Sysprep to Extend Disk Partitions

Factory Mode, Using Sysprep Factory Mode, Table 2-7: WinBom.ini Sections, Factory mode

HAL compatibility, Reducing the Number of Reference Images, Table 2-16: HAL Compatibility

hardware and software requirements, Verify Hardware and Software Requirements

installing operating system overview, Sysprep

installing Windows XP Professional on nonnetworked computers, Installing Windows XP Professional on Nonnetworked Computers, Add customized information and components

MiniSetup Wizard, Using MiniSetup, MiniSetup flag

multiprocessor to uniprocessor, Multiprocessor to uniprocessor

NoSIDGen flag, NoSIDGen flag

overview, System Preparation Tool

parameters, Sysprep.exe

Plug and Play, Adding Plug and Play devices before performing disk duplication with Sysprep

PnP flag, PnP flag

Pre-activated flag, Pre-activated flag

process overview, Overview of the Sysprep Process

reducing number of reference images, Reducing the Number of Reference Images, Uniprocessor to multiprocessor

requirements, Requirements for Running Sysprep

Reseal Mode, Using Sysprep Reseal Mode, Reseal mode

running, Running Sysprep, Add customized information and components

Setupcl.exe, Setupcl.exe

Sysprep.inf, Using Sysprep.inf, Sysprep.inf

uniprocessor to multiprocessor, Uniprocessor to multiprocessor

user interface, Sysprep User Interface, Pre-activated flag

when to use, When to Use Sysprep

WPA (Windows Product Activation), How Sysprep Works with Windows Product Activation

Sysprep.inf, Using Sysprep.inf, Sysprep.inf

System built-in security principal, Built-in Security Principals

System Configuration Utility (Msconfig.exe)

disabling services, Disabling Services with the System Configuration Utility

disabling startup programs, Disabling Startup Programs by Using the System Configuration Utility

editing Boot.ini, Reviewing and Correcting Boot.ini Settings on x86-based Systems

overview, System Configuration Utility, Startup Tab

System File Checker (Sfc.exe), System File Checker

system files

backup and restore, Boot and System Files, Table 14-1: Advanced Backup Options

encryption, What Can Be Encrypted

extracting from operating system CD, Extracting Files from the Operating System CD

list of, System Files

reference, Appendix A: System Files Reference, Extracting Files from the Operating System CD

replacing using Recovery Console, Using Recovery Console to Restore the Registry Keys HKEY_LOCAL_MACHINE\SYSTEM and HKEY_LOCAL_MACHINE\SOFTWARE

tools, System File Tools, System File Checker

System ID field, System ID Field

System Information (Msinfo32.exe), System Information, Checking the Operating System Configuration, System Information

system keys, Boot Protection

system locales, Language for Non-Unicode Programs (System Locale)

System Policy

coexistence with Group Policy, System Policy and Group Policy Coexistence

compared to Group Policy, System Policy

compatibility with Group Policy, Checking Local and Domain Policy Compatibility

overview, Group Policy and System Policy Settings

registry-based policies, System Policy

troubleshooting, Troubleshooting Group Policy and System Policy

System Policy Editor, Group Policy and System Policy Settings

system pools, System pools

System Preparation toolSee Sysprep.exe (System Preparation tool), System Preparation Tool

system resources, allocating, Allocating System Resources, I/O Port Address and Reserved Memory

System Restore

behavior with other recovery features, How System Restore Works with Other Windows XP Professional Features, Table D-5: How System Restore Works with Windows XP Tools and Features

configuring, Data Recovery Implementation Considerations

configuring by using Control Panel, Using Control Panel to Configure System Restore

configuring by using custom scripts, Using Custom Scripts to Configure System Restore

configuring by using Group Policy, Using the Group Policy Snap-in to Configure System Restore

configuring by using Regedit.exe (registry editor), Using the Registry Editor to Configure System Restore

file monitoring, File Monitoring

overview, System Restore

restore point management, Restore Points and Restore Point Management, Archiving and Purging of Restore Points

undoing changes, Using System Restore to Undo Changes

using, Using System Restore, Table D-5: How System Restore Works with Windows XP Tools and Features

System State

backing up on remote computers, Backing Up Files on Remote Computers

backup and restore, Backing Up System State Data, Table 14-1: Advanced Backup Options, Backup

restoring, Restoring System State Data

restoring on remote computers, Backing Up Files on Remote Computers

system volumes, Converting Basic Disks to Dynamic Disks, Before Converting Disks to Dynamic

Systeminfo (Systeminfo.exe), Systeminfo

systemroot command, Systemroot

Systems Management ServerSee SMS (Systems Management Server), Systems Management Server

Systems Network ArchitectureSee SNA (Systems Network Architecture), IBM Host Printers

System32 folder, subfolders list, System32 Folder, Table A-5: System32 Folder and Subfolders



Microsoft Windows XP Professional Resource Kit 2003
Microsoft Windows XP Professional Resource Kit 2003
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 338
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net