starting in, Starting in Safe Mode
using, Using Safe Mode, Safe Mode Bypasses Startup Programs
Safely Remove Hardware application, Safe Removal of Plug and Play Devices, Safely Remove Hardware Application
SAM (Security Accounts Manager)
account names, Logon Names
interactive logon, Components Used in Interactive Logon
security principals, Security Principals
SAS (Secure Attention Sequence), Interactive Logon with NTLM
SBP-2 Protocol, IEEE 1394
SC (Sc.exe)
managing processes, Managing Services by Using Sc.exe
overview, SC
sc query and sc config commands, Managing Services by Using Sc.exe
ScanDiskSee Chkdsk.exe, Chkdsk
Scanner and Camera Wizard, Scanner and Camera wizard
scanners and cameras, configuring, Configuring Scanners and Cameras, Pushbutton Scanning
scheduling printing, Scheduling Printing, Print Job Priority
scripts
configuring System Restore, Using Custom Scripts to Configure System Restore
DiskPart, Creating DiskPart Scripts, When to Use DiskPart Scripting
Group Policy, Scripts
logon, Roaming User Profiles and Logon Scripts, Logon Scripts
SCSI (Small Computer Standard Interface) bus, SCSI Bus
scsi() syntax, Reviewing and Correcting Boot.ini Settings on x86-based Systems
searching
computers using Active Directory, Searching for Computers
computers using NetBIOS, Searching for Computers
files, folders, and network resources, Searching for Files, Folders, and Network Resources, Searching for Shared Files and Folders
Secedit.exe
configuring and analyzing operations using, Configuring and Analyzing Operations by Using Secedit.exe
overview, Working with Local Security Policy
secpol.msc, Viewing Local Security Policy Settings
sectors
converting basic disks to dynamic disks, Disks That You Cannot Convert to Dynamic
GPT disksSee disk sectors, GPT disks, Disk Sectors on GPT Disks
MBR disksSee disk sectors, MBR disks, Disk Sectors on MBR Disks
Secure (Secure*.inf) security templates, Secure (Secure*.inf)
Secure Attention Sequence (SAS), Interactive Logon with NTLM
secure channels, Establishing a Secure Channel
Secure Server (Require Security) policy, Creating IPSec Policies
security
access controlSee access control, Highlights
Active Directory, Active Directory Security
Advanced Security Settings dialog boxSee Advanced Security Settings dialog box, File and Folder Permissions
backup and restore, Security Considerations, Backup Media Storage
BIOS, Windows XP Professional BIOS Security
certificates, Certificate and Public Key Storage, Clearing the Paging File at Shutdown
clearing paging files at shutdown, Clearing the Paging File at Shutdown
connections, How the Remote Access Authentication Process Works
deployment strategies, Determining Security Strategies, Encryption
enabling 3DES encryption algorithm, Enabling 3DES
event messagesSee security event messages, Appendix E: Security Event Messages
hibernation mode, Disabling Hibernation Mode
ICF, Using Internet Connection Firewall in Windows XP, Table 18-7: Description of Information Logged by ICF, Internet Connection Firewalls
keys, Strengthening Key and File Security, Clearing the Paging File at Shutdown
mapping Windows XP Professional to business needs, Mapping Windows XP Professional to Your Business Needs, Table 1-1: Security Features in Windows XP Professional
Offline Files, Securing Offline Files, Encrypting Offline Files
open encrypted files, Increasing Security for Open Encrypted Files, Clearing the Paging File at Shutdown
portable computers, Setting Up a Portable Computer, Securing Portable Computers, Windows XP Professional BIOS Security
print job queue, Print Queue Security Options
Remote Desktop, Console Security, Security and Encryption in Remote Desktop, Disabling File Redirection
remote network, Remote Network Security, IPSec
TCP/IP. See TCP/IP security, Chapter 18: Implementing TCP/IP Security
templatesSee security templates, Security Templates
Windows XP Home Edition, Corporate Security
802.11, 802.11: Security, RADIUS and 802.1x with 802.11, Configuring Security for 802.11 Wireless Network Connectivity, Configuring 802.11 Security with 802.1x
Security Accounts ManagerSee SAM (Security Accounts Manager), Security Principals
Security Configuration and Analysis snap-in, Working with Local Security Policy, Using the Security Configuration and Analysis Snap-in, Modifying Baseline Analysis Settings
security configuration databases, Creating and Analyzing a Security Configuration Database, Modifying Baseline Analysis Settings
Security Configuration Manager, Applying Folder and Share Permissions at Setup
Security Configuration Tool Set, Creating a Restricted Group Policy, Inheriting, Overwriting, and Ignoring Policy Changes
security context, Security Principals, Important Terms
security descriptors
access control, Security Descriptors
defined, Important Terms
security event messages
account logon events, Account Logon Events
detailed tracking events, Detailed Tracking Events
directory service access events, Directory Service Access Events
logon events, Logon Events, Account Logon Events
object access events, Object Access Events
overview, Security Event Messages, Appendix E: Security Event Messages, Viewing Security Event Messages
policy change events, Policy Change Events
privilege use events, Privilege Use Events
system event messages, System Event Messages
user management events, User Management Events
viewing, Viewing Security Event Messages
security groups
Administrators group, Administrators, Administrators
Backup Operators group, Backup Operators
built-in security principalsSee built-in security principals, Types of Security Groups
Compatibility Mode, About the Program Compatibility Wizard
computer local, Types of Security Groups, Computer Local Security Groups, Users
creating in clean installations, Security Group Creation in a Clean Installation, Table 16-6: User Rights for Clean-installed Workstations
defined, Important Terms
deployment strategies, Security Groups, Guests
domain local, Types of Security Groups, Domain Local Security Groups
global, Types of Security Groups
Guests group, Guests
HelpServicesGroup, HelpServicesGroup
managing Anonymous logons, Managing Anonymous Logons
managing user rights, Managing User Rights by Using Security Groups
memberships associated with default, Memberships Associated with Default Groups, Using Whoami
nesting, Managing Permissions by Nesting Groups, Table 16-2: Nesting Rules for Group Memberships
Network Configuration Operators group, Network Configuration Operators
overview, Security Groups, User Accounts and Security Groups
Power Users group, Power Users
Remote Desktop Users group, Remote Desktop Users
Replicator group, Replicator
special identitiesSee built-in security principals, Types of Security Groups
types, Types of Security Groups
universal, Types of Security Groups
upgrading from Windows NT, Security Group Upgrade from Windows NT 4.0
Users group, Users
well-known SIDs, Well-Known SIDs
security identifierSee SID (security identifier), Security Identifiers
security principals
access tokens, Access Tokens
built-inSee built-in security principals, Types of Security Groups
defined, Important Terms
logon rights, Logon Rights
overview, Security Principals
SAM, Security Principals
services, About Services
SID, Security Identifiers, Access Tokens
security settings, Important Terms
Security Settings extension to Group Policy, Security Settings, Incremental security templates, Working with Local Security Policy
security templates
applying, Creating and Applying Security Templates
Compatible (Compatws.inf), Compatible (Compatws.inf)
configuring permissions for file system directories, Configuring Permissions for File System Directories
creating, Creating and Applying Security Templates
creating restricted Group Policy, Creating a Restricted Group Policy
exporting, Creating and Applying Security Templates
High Secure (Hisec*.inf), High Secure (Hisec*.inf)
ignoring policy changes, Inheriting, Overwriting, and Ignoring Policy Changes
inheriting policy changes, Inheriting, Overwriting, and Ignoring Policy Changes
list of predefined, Security Templates
No Terminal Server SID (Notssid.inf), Setup Security (Setup security.inf)
overview, Security Templates
overwriting policy changes, Inheriting, Overwriting, and Ignoring Policy Changes
Root Directory Permissions (Rootsec.inf), Root Directory Permissions (Rootsec.inf)
Secure (Secure*.inf), Secure (Secure*.inf)
Setup Security (Setup security.inf), Setup Security (Setup security.inf)
using, Using Security Templates, Inheriting, Overwriting, and Ignoring Policy Changes
Security Templates snap-in
configuring permissions for file system directories, Configuring Permissions for File System Directories
creating security templates, Creating and Applying Security Templates
loading, Using Security Templates
overview, Working with Local Security Policy, Using Security Templates
viewing security policy settings, Using Security Templates
Self built-in security principal, Built-in Security Principals
self-signed certificates, replacing with CA-issued, Replacing Self-Signed Certificates with CA-issued Certificates
Send Fax Wizard, Sending Faxes
separator page processors, Local Print Provider
serial cabling connections, Serial Cabling
SerialKeys, SerialKeys, Adding Assistive Technology Products
Server (Request Security) policy, Creating IPSec Policies
Server for NFS, Interoperability with UNIX
Server for NIS, Interoperability with UNIX
Server for PCNFS, Interoperability with UNIX
servers
DNS, querying, Querying DNS Servers
DNS, search order, Querying DNS Servers
DNS, specifying, Specifying DNS Servers
NetWare print, NetWare Print Servers, NetWare
RIS, Before You Use RIS
UNIX print, UNIX Print Servers, UNIX
Service built-in security principal, Built-in Security Principals
service logon, Types of Logon
service packs
combination installations, Combination Installation, Step 6: Deploy the combination installation
command-line parameters, Service Pack Setup Program Naming Convention
creating combination installations, Combination Installation, Step 6: Deploy the combination installation
creating integrated installations, Creating an Integrated Installation, Creating a RIS image
creating update installations, Creating an Update Installation, Running a Hotfix setup program
installing using SMS, Scenario 2: Installing the Service Pack by Using SMS, Creating the SMS advertisement
integrated installations, Integrated Installation, Creating a RIS image
overview, Installing Service Packs and Hotfixes
planning deployments, Planning the Deployment, Testing the Deployment in Your Environment
Servicepack.exe, Service Pack Setup Program Naming Convention
space requirements, Checking Space Requirements
testing deployments, Testing the Deployment in Your Environment
uninstalling, Uninstalling a Service Pack or Hotfix, Uninstalling a Service Pack
update installations, Update Installation, Running a Hotfix setup program
service set identifier (SSID), Using Wireless Zero Configuration in Windows XP
services
Computer Browser, Computer Browser and Browsing Roles, Adding to and Removing from the Browse List
dependencies, determining, Determining Service Dependencies
disabling temporarily, Temporarily Disabling Services, Event Viewer (Eventvwr.msc)
disabling using Recovery Console, Using Recovery Console to Disable Services
disabling using System Configuration Utility (Msconfig.exe), Disabling Services with the System Configuration Utility
Error Reporting, Error Reporting Service, Using Error Reporting, Kernel Mode Reporting, Error Reporting, Kernel Mode Reporting
managing using SC (Sc.exe), Managing Services by Using Sc.exe
Net Logon, Components Used in Interactive Logon
RunAs, Using RunAs to Start a Program, RunAs (Command-Line Tool), RunAs (GUI Feature)
security principals, About Services
Services (Services.msc) snap-in overview, Services Snap-in
Services (Services.msc) snap-in, disabling using, Disabling Services by Using the Services Snap-in
WFP, Windows File Protection Service
WINSSee WINS (Windows Internet Name Service), Name Resolution Using WINS
Services (Services.msc) snap-in, Disabling Services by Using the Services Snap-in, Services Snap-in
Services for Macintosh, Windows Server 2003 Services for Macintosh
Services for NetWare, IPX Protocol, Interoperability with Novell NetWare
Services for UNIX
ActiveState ActivePerl, Interoperability with UNIX
Client for NFS, Interoperability with UNIX
Gateway for NFS, Interoperability with UNIX
Password Synchronization, Interoperability with UNIX
Server for NFS, Interoperability with UNIX
Server for NIS, Interoperability with UNIX
Server for PCNFS, Interoperability with UNIX
Telnet Client and Telnet Server, Interoperability with UNIX
Windows-based Cron service, Interoperability with UNIX
Windows-based Remote Shell service, Interoperability with UNIX
services. See also application and service tools; tools, Application and Service Tools
Services.msc, Disabling Services by Using the Services Snap-in, Services Snap-in
session hijacking, Spoofing
Session Initiation Protocol (SIP), Session Initiation Protocol, RTC Client APIs
Session Manager (Smss.exe), Session Manager
set command, Set
Setup
$$Rename.txt, Converting Short File Names to Long File Names ($$rename.txt)
applying folder and share permissions, Applying Folder and Share Permissions at Setup
assigning drive letters, Creating Volumes During Windows XP Professional Setup
creating partitions, Creating Partitions During Setup of Windows XP 64-Bit Edition
creating volumes, Creating Volumes During Windows XP Professional Setup
enhancements, New Setup Features, Uninstall
File copy, File Copy
GUI mode, GUI Mode
installing operating systems, Unattended Installations, Parameter Descriptions
installing Windows XP Professional on dynamic disks, Installing Windows XP Professional on Dynamic Disks
managing volumes, Managing Volumes During Windows XP Professional Setup, Installing Windows XP Professional on Dynamic Disks
parameters, Parameter Descriptions
process overview, The Setup Process, Running Setup
running, Running Setup
supporting installations, Chapter 4: Supporting Installations
Text mode, Text Mode
troubleshooting, Troubleshooting Windows XP Professional Setup
unattended installations, Unattended Installation, Unattended Installations, Parameter Descriptions
Setup Manager (Setupmgr.exe)
creating answer files, Creating an Answer File by Using Setup Manager
creating distribution folders, Using Setup Manager to Create a Distribution Folder, Copying a Folder to the System Drive of the Computer
planning service pack deployments, Setup Manager
setup passwords, Boot Protection
Setup Security (Setup security.inf) security template, Setup Security (Setup security.inf)
Setup. See also installing, Installing Windows XP Professional on Dynamic Disks
Setupcl.exe, Setupcl.exe
Setupmgr.exeSee Setup Manager (Setupmgr.exe), Using Windows XP Professional Customization Tools
Sfc.exe (System File Checker), System File Checker
share permissions, applying at setup, Applying Folder and Share Permissions at Setup
share publishing, Locating Resources by Publishing Objects
Shared Documents folder, Shared Documents Folder
shared key authentication, Shared Key Authentication
shared keys, Logging On by Using a Smart Card
Shiva Password Authentication Protocol (SPAP), Authentication Protocols
short file names
converting to long, Converting Short File Names to Long File Names ($$rename.txt)
FAT volumes, File Names on FAT Volumes
NTFS, Short File Names, MS DOS-Readable File Names on NTFS Volumes
Windows XP Professional, File Names in Windows XP Professional
shortcut keysSee keyboard shortcuts, Keyboard Shortcuts
ShowSounds, ShowSounds
Shutdown Event Tracker, Shutdown Event Tracker
SID (security identifier)
access tokens, Access Tokens
defined, Important Terms
overview, Security Identifiers
well-known, Well-Known SIDs
Whoami, Using Whoami
signature() syntax, Reviewing and Correcting Boot.ini Settings on x86-based Systems
Sigverif.exe (File Signature Verification tool), File Signature Verification
silent configurations
changing language and regional options, Changing Language and Regional Options
changing MUI Pack defaults, Changing MUI Pack Defaults
overview of multiple language versions, Using Unattended Installations and Silent Configurations, Using Silent Configurations
simple sharing model, Simple Sharing and ForceGuest, Sharing the Root Directory of a Drive
simple volumes, Simple Volumes
Single Instance Storage (SIS), Before You Use RIS
Single Instance Storage Groveler, Before You Use RIS
single sign-on, Kerberos Interoperability
SIP (Session Initiation Protocol), Session Initiation Protocol, RTC Client APIs
SIS (Single Instance Storage), Before You Use RIS
sleep buttons, Configuring Power Button, Sleep Button, and Lid Switch Behavior
slow-link connections, Synchronizing Over a Slow Link, Making Network Shares Available Without Synchronization
Small Computer Standard Interface (SCSI) bus, SCSI Bus
small memory dump files, Memory Dump Files, Small Memory Dump File
smart cards, Smart Cards, Logging On by Using a Smart Card, Authentication Protocols
SMS (Systems Management Server)
advantages, Advantages of Systems Management Server
automating installations, Systems Management Server, Disadvantages of Systems Management Server
disadvantages, Disadvantages of Systems Management Server
hardware and software requirements, Verify Hardware and Software Requirements
installing service packs, Scenario 2: Installing the Service Pack by Using SMS, Creating the SMS advertisement
planning service pack deployments, Systems Management Server
when to use, When to Use Systems Management Server
Smss.exe (Session Manager), Session Manager
smurf attacks, Spoofing
SNA (Systems Network Architecture)
Add Printer Wizard, IBM Host Printers
IBM host printers, IBM Host Printers
Snap To, Snap To
snap-ins
Certificates, Determining Whether an EFS Certificate Exists, Using Enterprise Certification Authorities to Issue Certificates
Computer Management, Computer Management Tool
Disk DefragmenterSee Disk Defragmenter snap-in, Disk Defragmenter
Disk ManagementSee Disk Management snap-in, Disk Management Overview
Event ViewerSee Event Viewer, Using the Event Viewer
Group PolicySee Group Policy, Using Group Policy with Remote Desktop
IP Security Monitor, Using the IP Security Monitor MMC Snap-In
IP Security Policy Management snap-in, IP Security Policy Management Snap-in
IPSec Monitor, IP Security Monitor
Local Security PolicySee Local Security Policy, Working with Local Security Policy
Local Security Settings, Viewing Local Security Policy Settings, Modifying Local Security Policy Settings
Local Users and GroupsSee Local Users and Groups, Password Management
Performance, Performance Snap-in
RSoP, Resultant Set of Policy, Disabling Startup Programs for Computers on a Network, Resultant Set of Policy
Security Configuration and Analysis, Working with Local Security Policy, Using the Security Configuration and Analysis Snap-in, Modifying Baseline Analysis Settings
Security Settings extension to Group Policy, Working with Local Security Policy
Security Templates, Working with Local Security Policy
Services (Services.msc), Disabling Services by Using the Services Snap-in, Services Snap-in
starting, Starting GUI Snap-in Tools
Windows XP 64-Bit Edition, Windows XP 64-Bit Edition Requirements
Software Installation extension in Group Policy, Software Installation
Software Restriction Policies, Software Restriction Policies, Using Software Restriction Policies
sound cards, Sound card
sound schemes for accessibility, Sound Schemes
SoundSentry, SoundSentry
spanned volumes, Spanned Volumes, Importing Spanned or Striped Volumes
SPAP (Shiva Password Authentication Protocol), Authentication Protocols
sparse files
cleanup operations on Windows NT 4.0 volumes, Cleanup Operations on Windows NT Volumes
NTFS compatibility with Windows NT 4.0, NTFS Compatibility with Windows NT 4.0
overview, Sparse Files
special identitiesSee built-in security principals, Types of Security Groups
spoofing, Spoofing
spooling
components, Print Spooler, Port Monitor
processes, Spooler Processes
settings, Spooler Settings
SSID (service set identifier), Using Wireless Zero Configuration in Windows XP
stacks defined, Defining Terms
stand-alone drive libraries, Stand-alone drive library
standard desktop configurations
creating managed desktops, Creating and Managing Standard Desktop Configurations, Table 5-8: Features of a Managed Desktop Configuration
mobile users, Creating and Managing Standard Desktop Configurations
multi-user desktops, Creating and Managing Standard Desktop Configurations, Table 5-10: Features of a Multi-User Desktop Configuration
new users, Creating and Managing Standard Desktop Configurations
overview, Creating and Managing Standard Desktop Configurations
replacing computers, Creating and Managing Standard Desktop Configurations
standard port monitor, New to Enabling Printing and Faxing, Standard Port Monitor, Status Reporting
Standards and Formats setting, Standards and Formats (User Locales)
standby mode
configuring, Configuring Hibernation and Standby
enabling devices to wake systems from, Enabling Devices to Wake the Computer
recovering from failed, Recovering from a Failed Standby
Starting Cylinder, Head, and Sector fields, Starting and Ending Cylinder, Head, and Sector Fields
startup files, list of, Startup Phases for x86-based Systems, Initial Startup and Boot Manager Phase for Itanium-based Systems, Startup Files
startup keys, Enabling the Startup Key
startup phases for Itanium-based systems, Startup Phases for Itanium-based Systems, Plug and Play Device Detection for Itanium-based Systems
startup phases for x86-based systems
boot loader phase, Boot Loader Phase
detecting and configuring hardware phase, Detect and Configure Hardware Phase
initial startup phase, Initial Startup Phase
kernel loading phase, Kernel Loading Phase, Session Manager
logon phase, Logon Phase
overview, Startup Phases for x86-based Systems
Plug and Play device detection phase, Plug and Play Device Detection
POST, Power-on Self Test
startup files, Startup Phases for x86-based Systems
startup troubleshootingSee troubleshooting startup, Chapter 27: Troubleshooting Startup
static IP addressing, Types of IP Address Assignment, Choosing Static IP Addressing
statically configured clients, Statically Configured and Remote Access Clients
STATUS_IMAGE_CHECKSUM_MISMATCH Stop message, Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH, Resolving the Problem
STATUS_SYSTEM_PROCESS_TERMINATED Stop message, Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED, Resolving the Problem
step-frame capture, Video Capture
StickyKeys, StickyKeys for One-Finger or Mouthstick Typing
still image devices, Still Image Devices, Image Color Management 2.0
Stop messages
analyzing Stop errors, Using Memory Dump Files to Analyze Stop Errors, Using WinDbg Debugger (Windbg.exe)
ATTEMPTED_WRITE_TO_READONLY_MEMORY, Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY, Resolving the Problem
BAD_POOL_CALLER, Stop 0xC2 or BAD_POOL_CALLER, Resolving the Problem
Bugcheck information section, Bugcheck Information
call stacks, Defining Terms
checklist, Stop Message Checklist
complete memory dump files, Memory Dump Files, Complete Memory Dump File
DATA_BUS_ERROR, Stop 0x0000002E or DATA_BUS_ERROR, Resolving the Problem
Debug port and status information section, Debug Port and Status Information
Debugging Tools, Stop Message Overview, Using Symbol Files and Debuggers, Using WinDbg Debugger (Windbg.exe)
defined, Highlights
disabling system restarts after, Preventing System Restarts After a Stop Error
Disk Cleanup (Cleanmgr.exe), Check Your Software, Disk Cleanup
Driver information section, Driver Information
DRIVER_IRQL_NOT_LESS_OR_EQUAL, Stop 0x000000D1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem
DRIVER_POWER_STATE_FAILURE, Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE, Resolving the Problem
DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS, Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPE RATIONS, Resolving the Problem
DRIVER_USED_EXCESSIVE_PTES, Stop 0x000000D8 or DRIVER_USED_EXCESSIVE_PTES, Resolving the Problem
Error Reporting service, Using Error Reporting, Kernel Mode Reporting
Event Log reporting, Stop Message System Event Log Reporting
exceptions, Defining Terms
executive initialization type, Executive Initialization Stop Messages, Table C-2: Phase 1 Initialization Stop Messages
file systems, Stop Messages for Disks and File Systems
HAL, Defining Terms, Stop 0x00000079 or MISMATCHED_HAL
hardware checks for recovery, Check Your Hardware
hardware malfunction messages, Hardware Malfunction Messages
hardware type, Stop Messages Caused by Hardware Issues
HARDWARE_INTERRUPT_STORM, Stop 0x000000F2 or HARDWARE_INTERRUPT_STORM, Resolving the Problem
HCL, Stop Messages Caused by Hardware Issues, Check Your Hardware
I/O request packets, Defining Terms
INACCESSIBLE_BOOT_DEVICE, Stop Messages for Disks and File Systems, Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE, Resolving the Problem
installation type, Installation Stop Messages
interrupts, Defining Terms
IRQL, Defining Terms
IRQL_NOT_LESS_OR_EQUAL, Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem
ISR, Defining Terms
Kernel Debugger (Kd.exe), Using Kernel Debugger (Kd.exe), Kernel Debugger
kernel memory dump files, Memory Dump Files, Kernel Memory Dump File
kernel mode, Defining Terms
KERNEL_DATA_INPAGE_ERROR, Stop Messages for Disks and File Systems, Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR, Resolving the Problem
KERNEL_STACK_INPAGE_ERROR, Stop Messages for Disks and File Systems, Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR, Resolving the Problem
kernels, Defining Terms
KMODE_EXCEPTION_NOT_HANDLED, Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED, Resolving the Problem
memory dump files, Memory Dump Files, Using WinDbg Debugger (Windbg.exe)
MISMATCHED_HAL, Stop 0x00000079 or MISMATCHED_HAL, Resolving the Problem
NO_MORE_SYSTEM_PTES, Stop 0x0000003F or NO_MORE_SYSTEM_PTES, Resolving the Problem
nonpaged pools, Defining Terms
NTFS_FILE_SYSTEM, Stop Messages for Disks and File Systems, Stop 0x00000024 or NTFS_FILE_SYSTEM, Resolving the Problem
OCA Web site, Using the Online Crash Analysis Web Site, Online Crash Analysis Web Site
overview, Highlights, Stop Message Overview
page faults, Defining Terms
page tables, Defining Terms
PAGE_FAULT_IN_NONPAGED_AREA, Stop Messages for Disks and File Systems, Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA, Resolving the Problem
paged pools, Defining Terms
paging, Defining Terms
processes, Defining Terms
PTE, Defining Terms
Recommended user action section, Recommended User Action
screen sections, Stop Message Screen Sections, Debug Port and Status Information
small memory dump files, Memory Dump Files, Small Memory Dump File
software checks for recovery, Check Your Software
software type, Stop Messages Caused by Faulty Software
stacks, Defining Terms
startup type, Installation Stop Messages
STATUS_IMAGE_CHECKSUM_MISMATCH, Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH, Resolving the Problem
STATUS_SYSTEM_PROCESS_TERMINATED, Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED, Resolving the Problem
Stop 0xA, Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem
Stop 0xBE, Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY, Resolving the Problem
Stop 0xCE, Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPE RATIONS, Resolving the Problem
Stop 0xC000021A, Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED, Resolving the Problem
Stop 0xC0000221, Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH, Resolving the Problem
Stop 0xC2, Stop 0xC2 or BAD_POOL_CALLER, Resolving the Problem
Stop 0xD1, Stop 0x000000D1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem
Stop 0xD8, Stop 0x000000D8 or DRIVER_USED_EXCESSIVE_PTES, Resolving the Problem
Stop 0xEA, Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER, Resolving the Problem
Stop 0xED, Stop 0x000000ED or UNMOUNTABLE_BOOT_VOLUME, Resolving the Problem
Stop 0xF2, Stop 0x000000F2 or HARDWARE_INTERRUPT_STORM, Resolving the Problem
Stop 0x000000CE, Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPE RATIONS, Resolving the Problem
Stop 0x000000D1, Stop 0x000000D1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem
Stop 0x000000D8, Stop 0x000000D8 or DRIVER_USED_EXCESSIVE_PTES, Resolving the Problem
Stop 0x000000EA, Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER, Resolving the Problem
Stop 0x000000ED, Stop 0x000000ED or UNMOUNTABLE_BOOT_VOLUME, Resolving the Problem
Stop 0x000000F2, Stop 0x000000F2 or HARDWARE_INTERRUPT_STORM, Resolving the Problem
Stop 0x0000000A, Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL, Resolving the Problem
Stop 0x0000001E, Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED, Resolving the Problem
Stop 0x0000002E, Stop 0x0000002E or DATA_BUS_ERROR, Resolving the Problem
Stop 0x00000024, Stop Messages for Disks and File Systems, Stop 0x00000024 or NTFS_FILE_SYSTEM, Resolving the Problem
Stop 0x0000003F, Stop 0x0000003F or NO_MORE_SYSTEM_PTES, Resolving the Problem
Stop 0x00000050, Stop Messages for Disks and File Systems, Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA, Resolving the Problem
Stop 0x0000007A, Stop Messages for Disks and File Systems, Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR, Resolving the Problem
Stop 0x0000007B, Stop Messages for Disks and File Systems, Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE, Resolving the Problem
Stop 0x0000007F, Stop 0x0000007F or UNEXPECTED_KERNEL_MODE_TRAP, Resolving the Problem
Stop 0x00000077, Stop Messages for Disks and File Systems, Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR, Resolving the Problem
Stop 0x00000079, Stop 0x00000079 or MISMATCHED_HAL, Resolving the Problem
Stop 0x0000009F, Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE, Resolving the Problem
Stop 0x1E, Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED, Resolving the Problem
Stop 0x2E, Stop 0x0000002E or DATA_BUS_ERROR, Resolving the Problem
Stop 0x24, Stop Messages for Disks and File Systems, Stop 0x00000024 or NTFS_FILE_SYSTEM, Resolving the Problem
Stop 0x3F, Stop 0x0000003F or NO_MORE_SYSTEM_PTES, Resolving the Problem
Stop 0x50, Stop Messages for Disks and File Systems, Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA, Resolving the Problem
Stop 0x7A, Stop Messages for Disks and File Systems, Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR, Resolving the Problem
Stop 0x7B, Stop Messages for Disks and File Systems, Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE, Resolving the Problem
Stop 0x7F, Stop 0x0000007F or UNEXPECTED_KERNEL_MODE_TRAP, Resolving the Problem
Stop 0x77, Stop Messages for Disks and File Systems, Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR, Resolving the Problem
Stop 0x79, Stop 0x00000079 or MISMATCHED_HAL, Resolving the Problem
Stop 0x9F, Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE, Resolving the Problem
symbol files, Using Symbol Files and Debuggers
THREAD_STUCK_IN_DEVICE_DRIVER, Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER, Resolving the Problem
threads, Defining Terms
top of the stack, Defining Terms
types, Types of Stop Messages, Table C-2: Phase 1 Initialization Stop Messages
UNEXPECTED_KERNEL_MODE_TRAP, Stop 0x0000007F or UNEXPECTED_KERNEL_MODE_TRAP, Resolving the Problem
UNMOUNTABLE_BOOT_VOLUME, Stop 0x000000ED or UNMOUNTABLE_BOOT_VOLUME, Resolving the Problem
user mode, Defining Terms
WinDbg Debugger (Windbg.exe), Using WinDbg Debugger (Windbg.exe), Kernel Debugger
storage
backup and restore, Storage and Media, Media Types, Backup Media Storage
Removable StorageSee Removable Storage, Removable Storage
types, Disk Management Overview
Stored User Names and Passwords, Stored User Names and Passwords
striped sets, Preparing Multidisk Volumes for Windows XP Professional
striped volumes, Striped Volumes, Importing Spanned or Striped Volumes
strong passwords, Managing Credentials
subpictures, Subpicture
supplicant, Configuring 802.11 Security with 802.1x
Support Tools, Support Tools, Table 4-1: Support Tools That Aid in Deployment, Preparing Multidisk Volumes for Windows XP Professional
surprise removal of devices, Safe Removal of Plug and Play Devices
symbol files, Using Symbol Files and Debuggers
symmetric keys, How Files Are Encrypted
Synchronization Manager, User Data Management, Overview of Managing Files and Folders, Synchronizing Files, How Synchronization Works
syskey, Enabling the Startup Key, Boot Protection
Syskey Wizard, Enabling the Startup Key
Sysprep.exe (System Preparation tool)
advantages, Advantages of Sysprep
advantages of multiprocessor to uniprocessor, Multiprocessor to uniprocessor
advantages of uniprocessor to multiprocessor, Uniprocessor to multiprocessor
Audit Boot Mode, Using Sysprep Audit Boot Mode, Audit Boot mode
components, Sysprep Components, Pre-activated flag
customizing, Customizing Sysprep Installations, Using Sysprep Reseal Mode
disadvantages, Disadvantages of Sysprep
disadvantages of multiprocessor to uniprocessor, Multiprocessor to uniprocessor
disadvantages of uniprocessor to multiprocessor, Uniprocessor to multiprocessor
disk-imaging tools, Selecting Disk-imaging Tools
DiskPart scripts, When to Use DiskPart Scripting
extending disk partitions, Using Sysprep to Extend Disk Partitions
Factory Mode, Using Sysprep Factory Mode, Table 2-7: WinBom.ini Sections, Factory mode
HAL compatibility, Reducing the Number of Reference Images, Table 2-16: HAL Compatibility
hardware and software requirements, Verify Hardware and Software Requirements
installing operating system overview, Sysprep
installing Windows XP Professional on nonnetworked computers, Installing Windows XP Professional on Nonnetworked Computers, Add customized information and components
MiniSetup Wizard, Using MiniSetup, MiniSetup flag
multiprocessor to uniprocessor, Multiprocessor to uniprocessor
NoSIDGen flag, NoSIDGen flag
overview, System Preparation Tool
parameters, Sysprep.exe
Plug and Play, Adding Plug and Play devices before performing disk duplication with Sysprep
PnP flag, PnP flag
Pre-activated flag, Pre-activated flag
process overview, Overview of the Sysprep Process
reducing number of reference images, Reducing the Number of Reference Images, Uniprocessor to multiprocessor
requirements, Requirements for Running Sysprep
Reseal Mode, Using Sysprep Reseal Mode, Reseal mode
running, Running Sysprep, Add customized information and components
Setupcl.exe, Setupcl.exe
Sysprep.inf, Using Sysprep.inf, Sysprep.inf
uniprocessor to multiprocessor, Uniprocessor to multiprocessor
user interface, Sysprep User Interface, Pre-activated flag
when to use, When to Use Sysprep
WPA (Windows Product Activation), How Sysprep Works with Windows Product Activation
Sysprep.inf, Using Sysprep.inf, Sysprep.inf
System built-in security principal, Built-in Security Principals
System Configuration Utility (Msconfig.exe)
disabling services, Disabling Services with the System Configuration Utility
disabling startup programs, Disabling Startup Programs by Using the System Configuration Utility
editing Boot.ini, Reviewing and Correcting Boot.ini Settings on x86-based Systems
overview, System Configuration Utility, Startup Tab
System File Checker (Sfc.exe), System File Checker
system files
backup and restore, Boot and System Files, Table 14-1: Advanced Backup Options
encryption, What Can Be Encrypted
extracting from operating system CD, Extracting Files from the Operating System CD
list of, System Files
reference, Appendix A: System Files Reference, Extracting Files from the Operating System CD
replacing using Recovery Console, Using Recovery Console to Restore the Registry Keys HKEY_LOCAL_MACHINE\SYSTEM and HKEY_LOCAL_MACHINE\SOFTWARE
tools, System File Tools, System File Checker
System ID field, System ID Field
System Information (Msinfo32.exe), System Information, Checking the Operating System Configuration, System Information
system keys, Boot Protection
system locales, Language for Non-Unicode Programs (System Locale)
System Policy
coexistence with Group Policy, System Policy and Group Policy Coexistence
compared to Group Policy, System Policy
compatibility with Group Policy, Checking Local and Domain Policy Compatibility
overview, Group Policy and System Policy Settings
registry-based policies, System Policy
troubleshooting, Troubleshooting Group Policy and System Policy
System Policy Editor, Group Policy and System Policy Settings
system pools, System pools
System Preparation toolSee Sysprep.exe (System Preparation tool), System Preparation Tool
system resources, allocating, Allocating System Resources, I/O Port Address and Reserved Memory
System Restore
behavior with other recovery features, How System Restore Works with Other Windows XP Professional Features, Table D-5: How System Restore Works with Windows XP Tools and Features
configuring, Data Recovery Implementation Considerations
configuring by using Control Panel, Using Control Panel to Configure System Restore
configuring by using custom scripts, Using Custom Scripts to Configure System Restore
configuring by using Group Policy, Using the Group Policy Snap-in to Configure System Restore
configuring by using Regedit.exe (registry editor), Using the Registry Editor to Configure System Restore
file monitoring, File Monitoring
overview, System Restore
restore point management, Restore Points and Restore Point Management, Archiving and Purging of Restore Points
undoing changes, Using System Restore to Undo Changes
using, Using System Restore, Table D-5: How System Restore Works with Windows XP Tools and Features
System State
backing up on remote computers, Backing Up Files on Remote Computers
backup and restore, Backing Up System State Data, Table 14-1: Advanced Backup Options, Backup
restoring, Restoring System State Data
restoring on remote computers, Backing Up Files on Remote Computers
system volumes, Converting Basic Disks to Dynamic Disks, Before Converting Disks to Dynamic
Systeminfo (Systeminfo.exe), Systeminfo
systemroot command, Systemroot
Systems Management ServerSee SMS (Systems Management Server), Systems Management Server
Systems Network ArchitectureSee SNA (Systems Network Architecture), IBM Host Printers
System32 folder, subfolders list, System32 Folder, Table A-5: System32 Folder and Subfolders