R

RAID (redundant array of independent disks), Planning Partitions, Tuning Virtual Memory, Optimizing Hardware for Server Clusters, Meeting Performance, Capacity, and Availability Requirements, Capacity Planning for Terminal Services, Hardware and Configuration Considerations for Domain Controllers
Active Directory installation requirements, Hardware and Configuration Considerations for Domain Controllers
fault tolerance with, Planning Partitions
hardware configurations for clusters, Optimizing Hardware for Server Clusters
levels of, Meeting Performance, Capacity, and Availability Requirements
optimizing virtual memory, Tuning Virtual Memory
Terminal Services capacity planning, Capacity Planning for Terminal Services
RAID 0 (disk striping), Optimizing Networking for Server Clusters, Meeting Performance, Capacity, and Availability Requirements, LDM Metadata and LDM Data Partitions
RAID 1 (disk mirroring), Optimizing Networking for Server Clusters, Meeting Performance, Capacity, and Availability Requirements, LDM Metadata and LDM Data Partitions, Moving Dynamic Disks, Moving Dynamic Disks, Moving Dynamic Disks, Creating a Mirrored Set Using Two New Disks, Adding a Mirror to an Existing Volume
adding mirror to existing volume, Creating a Mirrored Set Using Two New Disks
boot and system volumes and, Adding a Mirror to an Existing Volume
defined, Meeting Performance, Capacity, and Availability Requirements
mirrored set with two new disks, Moving Dynamic Disks
mirrored volumes using, LDM Metadata and LDM Data Partitions
overview of, Moving Dynamic Disks
server clusters, Optimizing Networking for Server Clusters
RAID 5 (disk striping with parity), Meeting Performance, Capacity, and Availability Requirements, LDM Metadata and LDM Data Partitions, Mirroring Boot and System Volumes on GPT Disks, Rebuilding Mirrored System Volumes on GPT Disks
configuring, Mirroring Boot and System Volumes on GPT Disks
defined, Meeting Performance, Capacity, and Availability Requirements
resolving problems with, Rebuilding Mirrored System Volumes on GPT Disks
volumes, LDM Metadata and LDM Data Partitions
RAID controllers, Meeting Performance, Capacity, and Availability Requirements
RAM (random access memory), Continue Past Lockups and Freezes, Tuning Virtual Memory, Task Manager and Process Resource Monitor Essentials, Resolving Memory Bottlenecks, Cluster Organization, Understanding Application Center, Sizing Print Server Hardware and Optimizing Configuration, Capacity Planning for Terminal Services
Component Load Balancing clusters, Understanding Application Center
for printers, Sizing Print Server Hardware and Optimizing Configuration
incompatible and malfunctioning, Continue Past Lockups and Freezes
optimizing virtual memory, Tuning Virtual Memory
performance bottlenecks and, Resolving Memory Bottlenecks
performance data, Task Manager and Process Resource Monitor Essentials
server clusters, Cluster Organization
Terminal Services capacity planning and, Capacity Planning for Terminal Services
random access memory., Understanding Application Center (see )
RAW printing process, Understanding Windows Server 2003 Print Services, Adding AppleTalk Printers, Comprehensive Printer Troubleshooting
overview of, Understanding Windows Server 2003 Print Services
resolving incorrect printing, Comprehensive Printer Troubleshooting
standard TCP/IP monitor settings, Adding AppleTalk Printers
RDN (relative distinguished name), Protocols and Client Interfaces, Active Directory Trusts, Design Considerations for Active Directory Search and Global Catalogs
defined, Protocols and Client Interfaces
overview of, Active Directory Trusts
searching directory, Design Considerations for Active Directory Search and Global Catalogs
RDP (Remote Desktop Protocol), New Features for the Remote Desktop Connection Client, Configuring Global Connection Settings
Read & Execute permission, files and folders, Basic Permissions
Read Attributes permission, Basic Permissions
Read Data permission, Basic Permissions
Read Extended Attributes permission, Basic Permissions
Read permission, Basic Permissions, Special Permissions, Connecting to Shared Printers Using the Command Line and Scripts
files and folders, Basic Permissions, Special Permissions
printers, Connecting to Shared Printers Using the Command Line and Scripts
reallocation policies, Changing the Media Type in a Media Pool
realm trusts, Examining Domain and Forest Trusts
reboot, Postinstallation
record export, WINS, WINS Implementation Details and New Features
recovery, Creating Registry Backups, Planning for Day-to-Day Operations, Enabling Conflict Detection on DHCP Servers, Setting DHCP Database Properties, Compacting the WINS Database, Hardware and Configuration Considerations for Domain Controllers, Creating Domain Controllers in a New Domain, Restoring GPOs, Developing Contingency Procedures, Setting Startup and Recovery Options, Setting Restore, Backup Type, and Backup Log Options, Backing Up Your Data, Recovering Configuration Data, Restoring a Failed Domain Controller by Installing a New Domain Controller, Resolving Startup Issues, Repairing Missing or Corrupted System Files
Active Directory from backup media, Creating Domain Controllers in a New Domain
configuration data, Recovering Configuration Data
configuring Active Directory for fast, Hardware and Configuration Considerations for Domain Controllers
contingency procedures for, Developing Contingency Procedures
DHCP configuration, Enabling Conflict Detection on DHCP Servers
DHCP database, Setting DHCP Database Properties
GPOs, Restoring GPOs
missing or corrupted system files, Resolving Startup Issues
options for, Setting Startup and Recovery Options
planning for, Planning for Day-to-Day Operations
Registry, Creating Registry Backups
shutdown issues, Repairing Missing or Corrupted System Files
startup issues, Restoring a Failed Domain Controller by Installing a New Domain Controller
WINS database, Compacting the WINS Database
with Backup utility, Setting Restore, Backup Type, and Backup Log Options, Backing Up Your Data
Recovery Console, Winnt32 Command-Line Parameters, Setting Startup and Recovery Options
installing and using, Setting Startup and Recovery Options
Winnt32 parameters for, Winnt32 Command-Line Parameters
recovery plan, Postinstallation, Upgrade Issues
recovery, Active Directory, Recovering Configuration Data, Recovering Configuration Data, Backup and Recovery Strategies for Active Directory, Performing a Nonauthoritative Restore of Active Directory, Performing a Primary Restore of Sysvol Data, Performing a Primary Restore of Sysvol Data
authoritative restore, Performing a Nonauthoritative Restore of Active Directory
backup strategies, Recovering Configuration Data
domain controller, Performing a Primary Restore of Sysvol Data
nonauthoritative restore, Backup and Recovery Strategies for Active Directory
primary restore of sysvol data, Performing a Primary Restore of Sysvol Data
recursion, disabling, Configuring Forwarders and Conditional Forwarding
redirected folders, Using Folder Redirection, Managing File Synchronization
redundancy, high availability, Planning for Hardware Needs
redundant array of independent disks., Hardware and Configuration Considerations for Domain Controllers (see )
refresh, Group Policy, Group Policy Processing, Applying Security Templates, Applying Security Templates, Group Policy Refresh, Viewing Applicable GPOs and Last Refresh, Refreshing Group Policy Manually
all processing handled as, Group Policy Processing
interval for, Applying Security Templates
manual operation of, Refreshing Group Policy Manually
modifying, Group Policy Refresh
overview of, Applying Security Templates
viewing last, Viewing Applicable GPOs and Last Refresh
REG command, Types of Registry Data Available, Loading and Unloading Hive Files, Preventing Access to the Registry Utilities
permissions, Preventing Access to the Registry Utilities
working with Registry, Types of Registry Data Available, Loading and Unloading Hive Files
regional and language options, Installation Sequence, Using the Regional and Language Options Utility
RegionalSettings section, Unattend.txt answer file, Examining Answer Files
registrations, DNS Client service, Try Reregistering the Client
registrations, WINS, Configuring Automatic Replication Partners, Checking Server Status and Configuration, Checking Active Registrations and Scavenging Records
active, Checking Active Registrations and Scavenging Records
burst handling, Configuring Automatic Replication Partners
troubleshooting, Checking Server Status and Configuration
Registry, Introducing the Registry, Introducing the Registry, Registry Root Keys, Registry Root Keys, Registry Root Keys, HKLMSYSTEM, HKEY_CLASSES_ROOT, HKEY_CLASSES_ROOT, HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, Where Registry Data Comes From, Types of Registry Data Available, Managing the Registry, Searching the Registry, Adding Keys and Values, Modifying the Registry of a Remote Machine, Importing and Exporting Registry Data, Loading and Unloading Hive Files, Working with the Registry from the Command Line, Creating Registry Backups, Creating Registry Backups, Removing Partial or Damaged Settings for Individual Applications, Preventing Access to the Registry Utilities, Controlling Remote Registry Access, Auditing Registry Access, How Shadow Copies Works, Modifying Applications After Installation, Modifying Group Policy Refresh
access control, Removing Partial or Damaged Settings for Individual Applications
application configuration, Modifying Applications After Installation
auditing access, Auditing Registry Access
backing up, Working with the Registry from the Command Line
command line for, Loading and Unloading Hive Files
data, HKEY_CURRENT_USER
hive files, Importing and Exporting Registry Data
HKEY_CLASSES_ROOT, HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG, HKEY_CLASSES_ROOT
HKEY_CURRENT_USER, HKEY_CLASSES_ROOT
HKEY_LOCAL_MACHINE, Registry Root Keys
HKEY_USERS, HKLMSYSTEM
importing and exporting data, Modifying the Registry of a Remote Machine
maintenance, Creating Registry Backups
managing, Types of Registry Data Available
modifying, Searching the Registry
modifying remotely, Adding Keys and Values
overview of, Introducing the Registry
permissions on specific keys, Preventing Access to the Registry Utilities
Policy Processing, Modifying Group Policy Refresh
postinstallation state of, Where Registry Data Comes From
remote access control, Controlling Remote Registry Access
restoring, Creating Registry Backups
root keys on 64-bit systems, Registry Root Keys
searching, Managing the Registry
shadow copy service writer, How Shadow Copies Works
structure, Introducing the Registry
subtrees, Registry Root Keys
Registry Editor, Understanding the Registry Structure, Understanding the Registry Structure, Types of Registry Data Available, Managing the Registry, Searching the Registry, Modifying the Registry of a Remote Machine, Removing Partial or Damaged Settings for Individual Applications, Configuring Drive Letters
changing drive letter of system or boot volume, Configuring Drive Letters
importing and exporting data, Modifying the Registry of a Remote Machine
managing Registry with, Types of Registry Data Available
modifying permissions, Removing Partial or Damaged Settings for Individual Applications
modifying Registry values, Searching the Registry
reading Registry, Understanding the Registry Structure
Regedt32 and, Understanding the Registry Structure
searching Registry, Managing the Registry
REG_BINARY data type, Types of Registry Data Available
REG_DWORD data type, Types of Registry Data Available, Searching the Registry, Modifying Applications After Installation
REG_EXPAND_SZ data type, Types of Registry Data Available
REG_FULL_RESOURCE_DESCRIPTOR data type, Types of Registry Data Available
REG_MULTI_SZ data type, Types of Registry Data Available, Searching the Registry
REG_SZ data type, Types of Registry Data Available, Searching the Registry
relative distinguished name., Protocols and Client Interfaces (see )
relative ID (RID) master role, Configuring the Delegated Service or Computer Account, Using, Locating, and Transferring the Domain Naming Master Role
relative identifiers (RIDs), Defining Active Directory Server Roles
relay agents, DHCP, Planning DHCP Implementations, Repairing the DHCP Database
reliability, Microsoft .NET Passport Support, Benefits and Limitations of Clustering
high, Benefits and Limitations of Clustering
Windows Server 2003, Microsoft .NET Passport Support
Remboot.sif file, The Remboot.sif File
remote access server, Server Roles
remote computers, MMC and Remote Computers, Adding Keys and Values, Controlling Remote Registry Access, Getting Information on User and Remote User Sessions, Viewing Event Logs on Remote Systems, Monitoring Performance Remotely, Working with Local Group Policy
accessing local group policy, Working with Local Group Policy
event logs on, Viewing Event Logs on Remote Systems
MMC and, MMC and Remote Computers
modifying Registry, Adding Keys and Values
monitoring performance, Monitoring Performance Remotely
Registry access control, Controlling Remote Registry Access
user session data, Getting Information on User and Remote User Sessions
Remote Desktop Connection, Remote Administration Gets a Face-Lift, Getting Information on User and Remote User Sessions
Remote Desktop Connection clients, Configuring Remote Desktop for Administration Through Group Policy, Configuring Remote Desktop for Administration Through Group Policy, New Features for the Remote Desktop Connection Client, Installing Remote Desktop Connection Clients, Terminal Services Clients
connecting to terminal servers, Terminal Services Clients
features, Configuring Remote Desktop for Administration Through Group Policy
installing, New Features for the Remote Desktop Connection Client
running, Installing Remote Desktop Connection Clients
Remote Desktop for Administration, Using Remote Desktop for Administration, Using Remote Desktop for Administration, Using Remote Desktop for Administration, Configuring Remote Desktop for Administration, Permitting and Restricting Remote Logon, Permitting and Restricting Remote Logon, Configuring Remote Desktop for Administration Through Group Policy, Tracking Who's Logged On
configuring, Permitting and Restricting Remote Logon
enabling, Using Remote Desktop for Administration
enabling on servers, Configuring Remote Desktop for Administration
overview of, Using Remote Desktop for Administration
permitting/restricting remote logon, Permitting and Restricting Remote Logon
Remote Desktop Connection clients and, Configuring Remote Desktop for Administration Through Group Policy
tracking who is logged on, Tracking Who's Logged On
Remote Desktop Protocol (RDP), New Features for the Remote Desktop Connection Client, Configuring Global Connection Settings
Remote Desktop Users Group, Permitting and Restricting Remote Logon
remote installation boot floppy (RIBF), Using Remote Installation Services, Configuring RIS Settings in Group Policy
Remote Installation Preparation Wizard., Installed (File-System-Based) Image by RIPrep (see )
Remote Installation Setup Wizard., RIS Answer Files (see )
remote locations, evaluating network, Analyzing the Existing Network
Remote Procedure Calls., Using, Locating, and Transferring the Schema Master Role (see )
Remote Registry service, Controlling Remote Registry Access
Remote Storage, Reparse Points, How Shadow Copies Works
Remote tab, System utility, Using the System Utility
RemoteInstall section, RIS file, Examining Answer Files
removable media, Using Removable Media, Understanding Media Libraries, Understanding Media Libraries, Understanding Media Pools, Working with the Removable Storage Snap-In, Understanding Media State and Identification, Understanding Access Permissions for Removable Storage, Changing Library Media Types, Deleting Application Media Pools, Using the Operator Requests Queue, Completing or Refusing Requests
access permissions, Understanding Media State and Identification, Completing or Refusing Requests
media libraries, Understanding Media Libraries, Understanding Access Permissions for Removable Storage
media pools, Understanding Media Libraries, Changing Library Media Types
media state and identification, Working with the Removable Storage Snap-In
Removable Storage snap-in, Understanding Media Pools
requests, Using the Operator Requests Queue
Work Queue, Deleting Application Media Pools
Removable Storage, Computer Management System Tools, Using Removable Media, Understanding Media Pools, Understanding Media State and Identification
access permissions, Understanding Media State and Identification
Computer Management Storage tool, Computer Management System Tools
overview of, Using Removable Media
working with, Understanding Media Pools
renaming, Sorting and Renaming Menu Items, Moving User Accounts, Modifying Other Group Settings
groups, Modifying Other Group Settings
menu items, Sorting and Renaming Menu Items
user accounts, Moving User Accounts
Rendom.exe, Domains Can Be Renamed
Repadmin utility, Upgrading from Windows 2000
reparse points, NTFS, Reparse Points
REPL interface, Directory Service Architecture
replicas, DFS, Enhanced File Management by Using DFS
replication, Domains Can Be Renamed, Active Directory and Global Catalog Are Optimized, Upgrading from Windows 2000, Zones That Aren't Integrated with Active Directory, Configuring Default Application Directory Partitions and Replication Scope, Check the Server's TCP/IP Configuration, WINS Name Registration and Cache, Directory Service Architecture, Designing and Managing the Domain Environment, Designating Replication Attributes, Forest Administration, Working with Active Directory Sites, Working with Active Directory Sites, Single Site vs. Multiple Sites, Single Site vs. Multiple Sites, Single Site vs. Multiple Sites, Determining Site Boundaries, Determining Site Boundaries, Replication Enhancements for Windows Server 2003, Replication Architecture: An Overview, Intrasite Replication Essentials, Intrasite Replication Essentials, Intersite Replication Essentials, Intersite Replication Essentials, Sysvol Replication Using the File Replication Service, Associating Domain Controllers with a Site, Understanding IP and SMTP Replication Transports, Understanding IP and SMTP Replication Transports, Configuring Site Link Bridges, Configuring Site Bridgehead Servers, Configuring Site Link Replication Options, Monitoring and Troubleshooting Replication
Active Directory–integrated zones and, Zones That Aren't Integrated with Active Directory
architecture, Replication Enhancements for Windows Server 2003
attributes, Designating Replication Attributes
designing, Designing and Managing the Domain Environment
directory partitions and, Intersite Replication Essentials
domain plan and, Forest Administration
enhancements to, Active Directory and Global Catalog Are Optimized, Determining Site Boundaries
intersite, Working with Active Directory Sites, Single Site vs. Multiple Sites, Intrasite Replication Essentials
intrasite, Working with Active Directory Sites, Single Site vs. Multiple Sites, Replication Architecture: An Overview
IP transports, Understanding IP and SMTP Replication Transports
ISTG and, Configuring Site Link Bridges
monitoring and troubleshooting, Monitoring and Troubleshooting Replication
overview of, Directory Service Architecture, Associating Domain Controllers with a Site
priority or urgent, Intrasite Replication Essentials
rings, Intersite Replication Essentials
scope, Configuring Default Application Directory Partitions and Replication Scope
selective, Domains Can Be Renamed
site bridgehead servers, Configuring Site Bridgehead Servers
site link options, Configuring Site Link Replication Options
site traffic and, Single Site vs. Multiple Sites
SMTP transports, Understanding IP and SMTP Replication Transports
troubleshooting DNS Server service, Check the Server's TCP/IP Configuration
upgrade preparation tools, Upgrading from Windows 2000
WINS, WINS Name Registration and Cache
with FRS, Sysvol Replication Using the File Replication Service
Replication Administrator, Monitoring and Troubleshooting Replication
Replication Monitor (ReplMon), Configuring Site Bridgehead Servers, Using the Replication Monitor
replication partners, WINS Name Registration and Cache, WINS Name Registration and Cache, Installing WINS, Configuring Replication Partners, Configuring Burst Handling
automatic feature, WINS Name Registration and Cache
configuring, Configuring Replication Partners
persistent connection feature, WINS Name Registration and Cache
viewing current, Configuring Burst Handling
WINS postinstallation tasks and, Installing WINS
ReplMon (Replication Monitor), Configuring Site Bridgehead Servers, Using the Replication Monitor
report view, System Monitor, Choosing Views and Controlling the Display
Report Wizard, Generating Migration Reports
reports, migration, Generating Migration Reports
requests, removable media, Using the Operator Requests Queue
reservation options, TCP/IP, Levels of Options and Their Uses
reservations, DHCP, DHCP Essentials, Using Exclusions
Reset Disk, Password, Unlocking User Accounts
RESET SESSION command, Gathering Terminal Services Information
resizing taskbar, Configuring the Taskbar
resolver cache, DNS Client service, Check the Client's TCP/IP Configuration
resource groups, server clusters, Server Cluster Configurations, Cluster Resource Types, Controlling Failover and Failback, Creating and Managing Resource Groups
assigning cluster-aware applications to, Server Cluster Configurations
creating, Controlling Failover and Failback
managing, Creating and Managing Resource Groups
planning, Cluster Resource Types
resource records, Public and Private Namespaces, Name Resolution Using DNS, Secondary Zones, Stub Zones, and Conditional Forwarding, DNS Queries and Security, Configuring Subdomains and Delegating Authority, Configuring Secondary Notification, Configuring Default Application Directory Partitions and Replication Scope
adding, Configuring Secondary Notification
aging /scavenging options, Configuring Default Application Directory Partitions and Replication Scope
DNS name resolution and, Public and Private Namespaces
DNSSEC, DNS Queries and Security
overview of, Name Resolution Using DNS
stub zones and, Secondary Zones, Stub Zones, and Conditional Forwarding
subdomains and, Configuring Subdomains and Delegating Authority
resources, Resolving Common Device Errors, Task Manager and Process Resource Monitor Essentials, Implementing Shadow Copies for Shared Folders, Domain Design Considerations
domain plan for access to, Domain Design Considerations
Pmon reducing usage of, Task Manager and Process Resource Monitor Essentials
resolving device conflicts, Resolving Common Device Errors
shadow copying and, Implementing Shadow Copies for Shared Folders
resources, server clusters, The Cluster Heartbeat, Add a Node to a Cluster, Add a Node to a Cluster, Creating and Managing Resource Groups, Creating and Managing Resource Groups
creating, Add a Node to a Cluster, Creating and Managing Resource Groups
managing, Creating and Managing Resource Groups
quorum resource, The Cluster Heartbeat
types of, Add a Node to a Cluster
response procedures, disaster planning, Developing Contingency Procedures
response, NTLM authentication, NTLM and Kerberos Authentication
Restore and Manage Media tab, Backup, Recovering Your Data
Restore Wizard, Backing Up Your Data
restore., Creating Domain Controllers in a New Domain (see )
reverse lookup queries, DNS, Architecting DNS Infrastructure
reverse lookup zones, DNS Zones and Zone Transfers, Using DNS with Active Directory, Configuring a Large Network Using the Configure A DNS Server Wizard, Configuring a Large Network Using the Configure A DNS Server Wizard, Creating Forward Lookup Zones, Configuring Forwarders and Conditional Forwarding, Configuring Secondary Notification
creating, Creating Forward Lookup Zones
defined, DNS Zones and Zone Transfers
large networks, Configuring a Large Network Using the Configure A DNS Server Wizard, Configuring a Large Network Using the Configure A DNS Server Wizard
resource records, Configuring Secondary Notification
subdomains, Configuring Forwarders and Conditional Forwarding
using DNS without Active Directory, Using DNS with Active Directory
RIBF (remote installation boot floppy) disk, Using Remote Installation Services, Configuring RIS Settings in Group Policy
RID (relative ID) master role, Configuring the Delegated Service or Computer Account, Using, Locating, and Transferring the Domain Naming Master Role
RIDs (relative identifiers), Defining Active Directory Server Roles
rights, Understanding User Account Capabilities, Privileges, and Rights, Assigning User Rights
group, Understanding User Account Capabilities, Privileges, and Rights
user, Assigning User Rights
ring topology model, Intrasite Replication Essentials
rings, replication, Intersite Replication Essentials
RIPrep (Remote Installation Preparation Wizard), Winnt32 Command-Line Parameters, Prestaging Clients in Active Directory, Installed (File-System-Based) Image by RIPrep, Installed (File-System-Based) Image by RIPrep, Installed (File-System-Based) Image by RIPrep, System Settings Stored in RIPrep Images, HAL Compatibility and RIPrep Images, HAL Compatibility and RIPrep Images, Creating the Master Installation, Using RIPrep to Create an OS Image, The RIPrep.sif file
answer file for, The RIPrep.sif file
automating setup with, Winnt32 Command-Line Parameters
defined, Prestaging Clients in Active Directory
HAL compatibility and, HAL Compatibility and RIPrep Images
master installation, HAL Compatibility and RIPrep Images
OS image with, Creating the Master Installation
overview of, Installed (File-System-Based) Image by RIPrep
recovering from inadvertently running, Using RIPrep to Create an OS Image
requirements, System Settings Stored in RIPrep Images
system settings stored in images, Installed (File-System-Based) Image by RIPrep
RIPrep.sif file, The RIPrep.sif file
RIS (Remote Installation Services), Changes for Terminal Services, Preparing for the Installation and Getting Started, Types of Answer Files, Using Remote Installation Services, Services and Protocols Used by RIS, Services and Protocols Used by RIS, Services and Protocols Used by RIS, Operating Systems Installable by Using RIS, Operating Systems Installable by Using RIS, Designing the RIS Environment, Designing the RIS Environment, RIS Server Requirements, Preparing and Installing RIS, Controlling Access to RIS Servers, Adding Members to the RISInstallers Group, Restricting Access to RIS Images, Restricting Access to RIS Images, Installed (File-System-Based) Image by RIPrep, Using RIPrep to Create an OS Image, RIS Answer Files, The Remboot.sif File, Installing Windows Using RIS
access control, Controlling Access to RIS Servers
answer files for, RIS Answer Files
client configuration, Adding Members to the RISInstallers Group
Client Installation Wizard configuration, The Remboot.sif File
configuring, Preparing and Installing RIS
enhancements, Changes for Terminal Services, Using Remote Installation Services
environment design, Operating Systems Installable by Using RIS
features, Preparing for the Installation and Getting Started
flat or CD-ROM images, Using RIPrep to Create an OS Image
installation with, RIS Server Requirements
limitations, Services and Protocols Used by RIS
operating systems installable with, Operating Systems Installable by Using RIS
OS image with RIPrep, Installed (File-System-Based) Image by RIPrep
OS image with RISetup, Restricting Access to RIS Images
protocols used by, Services and Protocols Used by RIS
restricting access to images, Restricting Access to RIS Images
RIS.sif file, Types of Answer Files
server requirements, Designing the RIS Environment
services used by, Services and Protocols Used by RIS
troubleshooting, Installing Windows Using RIS
RIS (Remote Installation Services), automated, Setup Methods, Determining the Method of Automation, Establishing the Distribution Folders, Creating the Answer File, Examining Answer Files, Configuring the CIW
choosing, Determining the Method of Automation, Creating the Answer File
defined, Setup Methods
establishing distribution folders, Establishing the Distribution Folders
examining, Examining Answer Files
overview of, Configuring the CIW
RISetup (Remote Installation Setup Wizard), Winnt32 Command-Line Parameters, Prestaging Clients in Active Directory, Restricting Access to RIS Images, Using RIPrep to Create an OS Image, RIS Answer Files
answer file for, RIS Answer Files
automating setup with, Winnt32 Command-Line Parameters
defined, Prestaging Clients in Active Directory
master installation template, Using RIPrep to Create an OS Image
OS image configuration, Restricting Access to RIS Images
Ristndrd.sif file, Prestaging Clients in Active Directory, RIS Answer Files
roaming user profiles, Configuring Profile Options, Profile Changes and New Features, Configuring Local User Profiles, Configuring Roaming User Profiles, Implementing Mandatory User Profiles
defined, Configuring Profile Options
group policy, Profile Changes and New Features
mandatory user profiles, Configuring Roaming User Profiles
overview of, Configuring Local User Profiles
switching between local and, Implementing Mandatory User Profiles
rogue DHCP servers, DHCP Security Considerations
roles, operations master, Configuring the Delegated Service or Computer Account
roles, server, Defining Active Directory Server Roles
Roll Back Driver, Viewing Advanced, Resources, and Other Settings, Updating a Device Driver
rollout, Your Plan: The Big Picture
root domains, Active Directory Domains, Trees, and Forests, Active Directory Trusts
root hints file, DNS Dynamic Updates and Security
root keys, Registry, Understanding the Registry Structure, Understanding the Registry Structure, Registry Root Keys, Registry Root Keys, Registry Root Keys, HKLMSYSTEM, HKEY_CLASSES_ROOT, HKEY_CLASSES_ROOT, HKEY_CLASSES_ROOT, Working with the Registry from the Command Line
backups of, Working with the Registry from the Command Line
defined, Understanding the Registry Structure
HKEY_CLASSES_ROOT, HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG, HKEY_CLASSES_ROOT
HKEY_CURRENT_USER, HKEY_CLASSES_ROOT
HKEY_LOCAL_MACHINE, Registry Root Keys
HKEY_USER, HKLMSYSTEM
on 64-bit systems, Registry Root Keys
subtrees, Registry Root Keys
rootDSE, Active Directory Trusts
round robin load balancing, Host Address (A) and Pointer (PTR) Records
routing, Active Directory and Global Catalog Are Optimized, Network Load Balancing Configuration, Special IP Addressing Rules
enhancements to Active Directory, Active Directory and Global Catalog Are Optimized
Network Load Balancing and, Network Load Balancing Configuration
routers, Special IP Addressing Rules
Routing and Remote Access Service., Using Userand Vendor-Specific TCP/IP Options (see )
RPCs (Remote Procedure Calls), Protocols and Client Interfaces, Using, Locating, and Transferring the Schema Master Role
domain naming master role and, Using, Locating, and Transferring the Schema Master Role
messaging clients and, Protocols and Client Interfaces
RRAS (Routing and Remote Access Service), DHCP Essentials, Using Userand Vendor-Specific TCP/IP Options, Settings Options for Routing and Remote Access Clients Only, Repairing the DHCP Database
default user class for using TCP/IP options, Using Userand Vendor-Specific TCP/IP Options
DHCP integration with, DHCP Essentials
DHCP relay agent, Repairing the DHCP Database
TCP/IP options for clients, Settings Options for Routing and Remote Access Clients Only
RUN AS command, Running Programs Using the Secondary Logon, Running a Temporary Administrator's Desktop
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset