Index

A note on the digital index

A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.

Symbols

128-bit encryption, File security and sharing options
512b drives, Disk management essentials, Working with basic and dynamic disks
512e drives, Disk management essentials
802.11 specifications, Wireless network devices and technologiesInstalling and configuring a wireless adapter, Wireless network devices and technologies, Installing and configuring a wireless adapter, Installing and configuring a wireless adapter
{badmemory} identifier, Viewing BCD entries
{bootloadersettings} identifier, Viewing BCD entries
{bootmgr} identifier, Viewing BCD entries
{current} identifier, Viewing BCD entries
{dbgsettings} identifier, Viewing BCD entries
{default} identifier, Viewing BCD entries
{emssettings} identifier, Viewing BCD entries
{fwbootmgr} identifier, Viewing BCD entries
{globalsettings} identifier, Viewing BCD entries
{hypervisorsettings} identifier, Viewing BCD entries
{memdiag} identifier, Viewing BCD entries
{ntldr} identifier, Viewing BCD entries
{ramdiskoptions} identifier, Viewing BCD entries
{resumeloadersettings} identifier, Viewing BCD entries

A

Ability To Change Properties Of An All User Remote Access Connection policy, Configuring network policies
access controls, claims-based, Assigning claims-based permissionsFile ownership and permission assignment, Assigning claims-based permissions, Assigning claims-based permissions, Assigning claims-based permissions, File ownership and permission assignment
access permissions, File security and sharing options
access points
connecting to, Connecting to wireless networks
wireless technologies and, Wireless network devices and technologies, Wireless network devices and technologies
access types, Working with Network And Sharing Center
Access-Denied Assistance policies, Troubleshooting file sharing
ACPI (Advanced Configuration and Power Interface)
power states and, Power states and power managementDiagnosing and resolving startup problems, Power states and power management, Power states and power management, Diagnosing and resolving startup problems, Diagnosing and resolving startup problems
active boot partition, Troubleshooting startup phase 3
Active Directory
BitLocker recovery extensions, Deploying BitLocker Drive Encryption
TPM recovery extensions, Deploying BitLocker Drive Encryption
Active Directory-based Group Policy, Group Policy essentials, Accessing and using site, domain, and OU policies
active partitions, Preparing basic and dynamic disks, Marking a partition as active, Marking a partition as active, Marking a partition as active
ad hoc mode, Installing and configuring a wireless adapter
adaptive query timeout, Working with TCP/IP and the Dual TCP/IP stack
Address Resolution Protocol (ARP), UEFI
Address Resolution Protocol Service Binding Protocol (ARPSBP), UEFI
ADM files, Configuring policies
ADMIN$ share, Using and accessing shared folders for administration
administrative shares, Using and accessing shared folders for administrationTroubleshooting file sharing, Using and accessing shared folders for administration, Troubleshooting file sharing
administrative templates
Access Denied Errors, Troubleshooting file sharing
adding and removing, Adding or removing templates
disk quota policies, Configuring disk quota policiesConfiguring System Restore policies, Configuring disk quota policies, Configuring System Restore policies, Configuring System Restore policies
File Explorer, Setting Group Policy for File Explorer and folder views, Setting Group Policy for File Explorer and folder views
KDC, Assigning claims-based permissions
network policies, Configuring network policies
Offline File policies, Configuring Offline File policiesConfiguring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies
process described, Enabling, disabling, and configuring policies
Remote Assistance policies, Configuring Remote Assistance policiesControlling script behavior through policy, Controlling script behavior through policy
script policies, Working with computer and user script policiesAssigning user logon and logoff scripts, Assigning user logon and logoff scripts
sharing, File security and sharing options
startup policies, Working with logon and startup policiesDisabling run lists through policy, Setting policy-based startup programs, Disabling run lists through policy
System Restore policies, Configuring System Restore policies
Work Folders policies, Configuring policy for Work Folders
Administrators and Non-Administrators local Group Policy, Accessing and using local group policies
ADMX files, Configuring policies
Advanced Boot Options menu, Managing startup and boot configuration
Advanced Encryption Standard (AES) encryption, Understanding BitLocker Drive Encryption, Wireless security
advanced sharing
vs. basic sharing, Sharing a resource and setting share permissions in File Explorer
AdvancedOptions option, Setting BCD entry values
AES encryption, Understanding BitLocker Drive Encryption, Wireless security
Airplane Mode, Working with mobility settings
allocating storage, Creating a storage pool and allocating storageAdding drives to a storage space, Creating a storage pool and allocating storage, Creating a storage pool and allocating storage, Creating a storage pool and allocating storage, Adding drives to a storage space
Allow Only Per User Or Approved Shell Extensions policy, Setting Group Policy for File Explorer and folder views
Allow Or Disallow Use Of The Offline Files Feature policy, Configuring Offline File policies
Allow Users To Select When A Password Is Required When Resuming policy, Working with logon and startup policies
alternate IP addressing, Configuring dynamic IP addresses and alternate IP addressing, Configuring dynamic IP addresses and alternate IP addressing
alternate phone numbers, Configuring primary and alternate phone numbers
alternate private IP addresses, Configuring network connections, Configuring alternate private IP addresses, Configuring alternate private IP addresses
Always Offline mode, Using and accessing shared resources
Always Use Classic Logon policy, Working with logon and startup policies
Always Wait For The Network At Computer Startup And Logon policy, Working with logon and startup policies
analog phone lines, Creating a dial-up Internet connection to an ISP
Anonymous Logon special identity, Special identities and best practices for assigning permissions
APIPA (Automatic Private IP Addressing), Resolving IP addressing problems, Configuring alternate private IP addresses
Apply Policy To Removable Media policy, Configuring disk quota policies
ARM processor architecture, Navigating and understanding firmware options
assigning
computer startup and shutdown scripts, Assigning computer startup and shutdown scripts
special permissions, Assigning special permissionsAssigning claims-based permissions, Assigning special permissions, Assigning special permissions, Assigning special permissions, Assigning special permissions, Assigning claims-based permissions
user logon and logoff scripts, Assigning user logon and logoff scripts
Audit Object Access policy, Understanding work folders
auditing
file and folder access, Auditing file and folder accessConfiguring and tracking auditing, Configuring and tracking auditing, Configuring and tracking auditing, Configuring and tracking auditing, Configuring and tracking auditing
Work Folders, Understanding work folders
Authenticated Users special identity, Special identities and best practices for assigning permissions
automated
defragmentation, Defragmenting disks, Defragmenting disks
maintenance, Checking for disk errors, Defragmenting disks
automatic
black hole router detection, Working with TCP/IP and the Dual TCP/IP stack
connections, Configuring connection properties
dead gateway retry, Working with TCP/IP and the Dual TCP/IP stack
disconnection, Configuring automatic disconnection
proxy configuration, Configuring proxy settings for mobile connections
Automatic connection type, Configuring networking protocols and components
Automatic Private IP Addressing (APIPA), Resolving IP addressing problems, Configuring alternate private IP addresses
AutoPlay, Burning mastered discs

B

background processes
disk maintenance tools, Troubleshooting common disk problems
background sync, Configuring Offline File policies, Configuring Offline File policies, Using and accessing shared resources
Backup Operators group, File ownership and permission assignment
BadMemoryAccess option, Setting BCD entry values
BadMemoryList option, Setting BCD entry values
basic
drives, Creating partitions, logical drives, and simple volumes
partitions, Creating mirrored volumes
permissions, Understanding and using basic permissionsAssigning special permissions, Working with and setting basic permissions, Working with and setting basic permissions, Working with and setting basic permissions, Special identities and best practices for assigning permissions, Special identities and best practices for assigning permissionsAssigning claims-based permissions, Assigning special permissions, Assigning claims-based permissions
sharing, Creating a shared resource
volumes, Disk management essentials, Shrinking or extending volumes
basic disks
changing to dynamic, Disk management essentials, Converting a basic disk to a dynamic disk or vice versa, Converting a basic disk to a dynamic disk or vice versa
vs. dynamic disks, Working with basic and dynamic disks, Moving a dynamic disk to a new system
basic input/output system (BIOS), Firmware interface types and boot data
batch scripts, Working with computer and user script policies
battery status, Working with mobility settings
BaudRate option, Setting BCD entry values
BCD Editor (Bcdedit.exe)
commands, Using the BCD Editor
creating, copying and deleting BCD entries, Creating and deleting BCD entries
default operating system, Changing the default operating system entry
importing and exporting BCD store, Importing and exporting the BCD store, Importing and exporting the BCD store
mirrored system volumes and, Repairing a mirrored system volume to enable boot
nonsystem store, creating, Creating and identifying the BCD store
operating system display order, Changing the operating system display order, Changing the operating system display order
startup process and, Navigating startup and power states
system BCD store and, Viewing BCD entries
BCD store
commands, Using the BCD Editor
copying entries, Importing and exporting the BCD store
creating entries, Creating and deleting BCD entries
creating new, Using the BCD Editor
GUIDs, Viewing BCD entries
importing and exporting, Importing and exporting the BCD store
multiple instances of Windows, Viewing BCD entries
properties, of entries, Viewing BCD entries
risk of modifying, Managing the BCD store
sample entries, Viewing BCD entries
setting entry values, Setting BCD entry values
viewing entries, Viewing BCD entriesImporting and exporting the BCD store, Viewing BCD entries, Viewing BCD entries, Viewing BCD entries, Importing and exporting the BCD store
well-known identifiers, Viewing BCD entries
Windows Boot Loader, Using the BCD Editor, Viewing BCD entries, Viewing BCD entries
Windows Boot Manager, Using the BCD Editor, Viewing BCD entries, Viewing BCD entries
binding keys, TPM Services and, TPM: the essentials
BIOS-based firmware, validation profile settings, Hardware encryption, secure boot, and network unlock
BitLocker Drive Encryption, Power states and power management
boot file integrity and, Understanding BitLocker Drive Encryption, Understanding BitLocker Drive Encryption
changes since first release, Understanding BitLocker Drive Encryption
checking status, Managing and troubleshooting BitLockerDisabling or turning off BitLocker Drive Encryption, Disabling or turning off BitLocker Drive Encryption
defined, Creating trusted platforms
deploying, Deploying BitLocker Drive Encryption
disk compression and, Managing disk compression and file encryption
file encryption and, Managing disk compression and file encryption
installing, Managing BitLocker Drive Encryption
managing, Managing and troubleshooting BitLockerDisabling or turning off BitLocker Drive Encryption, Disabling or turning off BitLocker Drive Encryption
options, Managing and troubleshooting BitLocker
partitioning requirements, Deploying BitLocker Drive Encryption
passwords, Understanding BitLocker Drive Encryption
TPM modes, Understanding BitLocker Drive Encryption
TPM Services and, TPM: the essentials
troubleshooting, Managing and troubleshooting BitLockerDisabling or turning off BitLocker Drive Encryption, Disabling or turning off BitLocker Drive Encryption
USB flash drives, Enabling BitLocker on USB flash drivesEnabling BitLocker on system volumes, Enabling BitLocker on USB flash drives, Enabling BitLocker on system volumes, Enabling BitLocker on system volumes
versions, Preparing for BitLocker Drive Encryption
vs. BitLocker To Go, BitLocker Drive Encryption: the essentials
BitLocker To Go
defined, Creating trusted platforms
vs. BitLocker Drive Encryption, BitLocker Drive Encryption: the essentials
boot applications, Firmware interface types and boot data
boot environment, Firmware interface types and boot data, Managing the BCD store
boot file integrity, Understanding BitLocker Drive Encryption, Understanding BitLocker Drive Encryption
Boot Integrity Services (BIS), UEFI
boot loader
BCD store and, Viewing BCD entries
sequence of startup events, Diagnosing and resolving startup problems
startup problems and, Troubleshooting startup phase 4
boot manager
BCD store and, Using the BCD Editor
default, Firmware interface types and boot data
timeout value, Using the BCD Editor
tools menu, Using the BCD Editor
boot partition or volume, Understanding drive designations
boot priority order
changing temporarily, Changing the boot sequence temporarily
setting, Examining firmware interfaces
boot services
UEFI, UEFI
boot settings, Power states and power management, Power states and power management, Troubleshooting startup phase 2, Troubleshooting startup phase 2
/bootdebug command, Using the BCD Editor
BootDebug option, Setting BCD entry values
/bootems command, Using the BCD Editor
BootEMS option, Setting BCD entry values
BootLog option, Setting BCD entry values
Bootmgfw.efi, Navigating startup and power states, Troubleshooting startup phase 3
Bootsector, Using the BCD Editor, Creating and deleting BCD entries
/bootsequence command, Using the BCD Editor, Changing the boot sequence temporarily
BootStatusPolicy option, Setting BCD entry values
branch caching, Using branch cachingUsing branch caching, Using branch caching, Using branch caching, Using branch caching, Using branch caching
breaking a mirrored set, Breaking a mirrored set
brightness, mobile devices and, Working with mobility settings
broadband
connections, Creating a dial-up connection to a workplace, Establishing a broadband connection, Establishing a broadband connection
browsing computers in a domain, Performing basic network tests
burning
default options, Changing the default burning options
discs with live file systems, Burning discs with live file systems, Changing the default burning options
discs, Burn A Disc Wizard and, Working with data discs
ISO to disc, Mounting ISO images
mastered discs, Burning mastered discs

C

C$ share, Using and accessing shared folders for administration
caching
offline files, Making files or folders available offlineManaging offline file synchronization, Step 2: Make folders available for offline use, Managing offline file synchronization, Managing offline file synchronization
persistent, Working with TCP/IP and the Dual TCP/IP stack
policies for offline files, Configuring Offline File policies
redirected folders, Understanding offline files
calling cards, Creating Dialing Locations
CD File System (CDFS), Disc burning: the essentials
central access policies, File security and sharing options, Special identities and best practices for assigning permissions, Assigning claims-based permissions, Assigning claims-based permissions
certificates
encryption, TPM: the essentials, Understanding BitLocker Drive Encryption, Encrypting drives and data
network unlock, Hardware encryption, secure boot, and network unlock
public key, Understanding encryption and EFS, Understanding encryption and EFS
recovery, Preparing for BitLocker Drive Encryption, Configuring recovery policy
smart card, Understanding BitLocker Drive Encryption, Understanding BitLocker Drive Encryption
Change Permissions special permission, Assigning special permissions
Channel option, Setting BCD entry values
Check Disk (Chkdsk.exe)
options and switches, list of, Running Check Disk from the command line, Running Check Disk from the command line
repairing disk errors and inconsistencies, Checking for disk errors
running from the command line, Running Check Disk from the command line
syntax, Running Check Disk from the command line
vs. legacy scan and repair, Checking for disk errors
vs. self-healing NTFS, Repairing disk errors and inconsistencies
chipsets, Navigating and understanding firmware options
Cipher utility, Understanding BitLocker Drive Encryption
claims-based access controls, File security and sharing options
claims-based permissions, Assigning claims-based permissionsFile ownership and permission assignment, Assigning claims-based permissions, Assigning claims-based permissions, File ownership and permission assignment, File ownership and permission assignment
cleanmgr, Troubleshooting common disk problems
clearing the TPM, Turning an initialized TPM on or off, Clearing the TPM
Client For Microsoft Networks, Creating a dial-up connection, Configuring networking protocols and components
cluster size, Working with basic and dynamic disks, Working with basic and dynamic disks, Working with basic and dynamic disks, Creating partitions, logical drives, and simple volumes
ClusterModeAddressing option, Setting BCD entry values
Compact.exe, Expanding compressed directories and files
compound authentication, Assigning claims-based permissions
compound TCP, Working with TCP/IP and the Dual TCP/IP stack
compressed
directories and files, Compressing directories and files, Expanding compressed directories and files, Expanding compressed directories and files
drives, Compressing drives and data, Expanding compressed drives
Computer Browser service, Performing basic network tests
Computer Management
automated defragmentation, Defragmenting disks
Check Disk, Running Check Disk from the command line
disk quotas, Using disk quotasUsing branch caching, Viewing disk quota entries, Creating disk quota entries, Exporting and importing disk quota settings, Disabling disk quotas, Disabling disk quotas, Using branch caching
offline files, Making files or folders available offline
shared folders, making unavailable for offline use, Making offline files unavailable
shared resources, Creating a shared resource, Changing or stopping sharing, Sharing a folder and setting share permissions in Computer Management, Sharing a folder and setting share permissions in Computer Management
special shares, Using and accessing shared folders for administration, Using and accessing shared folders for administration
volume labels, Creating mirrored volumes
computer policies
administrative templates, Viewing policies and templates, Enabling, disabling, and configuring policies
logon and startup, Working with logon and startup policiesDisabling run lists through policy, Working with logon and startup policies, Disabling run lists through policy
network, Working with access and connectivity policies, Configuring network policies
offline files, Configuring Offline File policiesConfiguring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies
remote assistance, Configuring Remote Assistance policiesControlling script behavior through policy, Configuring Remote Assistance policies, Configuring Remote Assistance policies, Controlling script behavior through policy
computer shutdown scripts, Working with computer and user script policiesAssigning user logon and logoff scripts, Controlling script behavior through policy, Assigning computer startup and shutdown scripts, Assigning user logon and logoff scripts, Assigning user logon and logoff scripts
computer startup scripts, Working with computer and user script policiesAssigning computer startup and shutdown scripts, Controlling script behavior through policy, Assigning computer startup and shutdown scripts, Assigning computer startup and shutdown scripts
ConfigAccessPolicy option, Setting BCD entry values
ConfigFlags option, Setting BCD entry values
configuration scripts, Configuring proxy settings for mobile connections
Configure Background Sync policy, Configuring Offline File policies, Configuring Offline File policies
Configure Slow-Link Mode policy, Configuring Offline File policies, Configuring Offline File policies
conflicts in offline file synchronization, Resolving synchronization conflicts and errors
connections
automatic, Configuring automatic or manual connections, Configuring automatic or manual connections
broadband, Creating a broadband connection to the InternetCreating a VPN connection, Creating a broadband connection to the Internet, Creating a VPN connection, Creating a VPN connection
dial-up, Creating connections for remote accessCreating a broadband connection to the Internet, Creating Dialing Locations, Creating a dial-up Internet connection to an ISP, Creating a dial-up Internet connection to an ISP, Creating a dial-up Internet connection to an ISP, Creating a dial-up connection to a workplace, Creating a broadband connection to the Internet
establishing, Establishing connectionsWireless network devices and technologies, Establishing a broadband connection, Establishing a VPN connection, Establishing a VPN connection, Wireless network devices and technologies
logon information, Configuring connection logon information
VPN, Creating a VPN connectionJoining a device to a workplace, Creating a VPN connection, Joining a device to a workplace, Configuring connection properties
wireless, Wireless networkingManaging and troubleshooting wireless networking, Wireless network devices and technologies, Wireless network devices and technologies, Wireless security, Wireless security, Installing and configuring a wireless adapter, Working with wireless networks and wireless connections, Working with wireless networks and wireless connections, Connecting to wireless networks, Managing and troubleshooting wireless networking
Control Panel, opening, Using the This PC console
ControlSet subkey, Troubleshooting startup phase 4
converting
basic disks to dynamic disks, Disk management essentials, Working with basic and dynamic disks, Converting a basic disk to a dynamic disk or vice versa, Converting a basic disk to a dynamic disk or vice versa
volumes to NTFS, Creating mirrored volumes
/copy command, Using the BCD Editor
corruptions, detecting, Checking for disk errors
costed networks, Configuring Offline File policies
crash dump partitions, Understanding drive designations
/create command, Using the BCD Editor
Create Files/Write Data special permission, Assigning special permissions
Create Folders/Append Data special permission, Assigning special permissions
/createstore command, Using the BCD Editor
Creator Owner special identity, Special identities and best practices for assigning permissions
credentials
connecting to a network share with, Using and accessing shared resources
file sharing issues and, Troubleshooting file sharing
Csrss.exe, Diagnosing and resolving startup problems, Troubleshooting startup phase 5

D

D$ share, Using and accessing shared folders for administration
data discs, Working with data discsChanging the default burning options, Disc burning: the essentials, Burning mastered discs, Burning mastered discs, Burning discs with live file systems, Changing the default burning options
Data Execution Prevention (DEP), Changing Data Execution Prevention and Physical Address Extension options, Changing Data Execution Prevention and Physical Address Extension options
Data Incomplete volume status, Troubleshooting common disk problems
data management policies, Working with file and data management policiesConfiguring network policies, Configuring disk quota policies, Configuring System Restore policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring policy for Work Folders, Configuring network policies
Data Not Redundant volume status, Troubleshooting common disk problems
data recovery, encryption and, Understanding encryption and EFS
data transfer
offloading to storage devices, Understanding offline files
rates, Working with removable storage devices
data volumes, decrypting, Disabling or turning off BitLocker Drive Encryption
data-recovery agents, Understanding BitLocker Drive Encryption
date, setting through firmware interface, Examining firmware interfaces
/dbgsettings command, Using the BCD Editor
DbgTransport option, Setting BCD entry values
dead gateways, Working with TCP/IP and the Dual TCP/IP stack
/debug command, Using the BCD Editor
DebugAddress option, Setting BCD entry values
debugging
boot applications, Using the BCD Editor
booting, Setting BCD entry values
kernel, Using the BCD Editor
options, Setting BCD entry values, Setting BCD entry values
decrypting
files and directories, Decrypting files and directories
/default command, Using the BCD Editor, Changing the default operating system entry
default dialing location, Viewing and Setting the Default Dialing Location, Viewing and Setting the Default Dialing Location
Default Domain Controllers Policy GPO, Assigning claims-based permissions
default gateways, Configuring a static IPv4 or IPv6 address, Configuring multiple gateways, Configuring multiple gateways
defragmenting disks, Defragmenting disksResynchronizing and repairing a mirrored set, Defragmenting disks, Resynchronizing and repairing a mirrored set
/delete command, Using the BCD Editor
Delete special permission, Assigning special permissions
Delete Subfolders And Files special permission, Assigning special permissions
/deletevalue command, Using the BCD Editor
deleting
partitions, volumes, and logical drives, Creating mirrored volumes
scripts, Assigning computer startup and shutdown scripts
storage pools, Deleting a storage pool
storage spaces, Changing the storage configuration
denying permissions, Understanding and using basic permissions, Working with and setting basic permissions, File ownership and permission assignment, Controlling access to network shares, Controlling access to network shares
DEP, Changing Data Execution Prevention and Physical Address Extension options, Changing Data Execution Prevention and Physical Address Extension options
device drivers, startup process and, Diagnosing and resolving startup problems
Device Registration Service (DRS), Joining a device to a workplace
DHCP
dual TCP/IP stack and, Working with TCP/IP and the Dual TCP/IP stack
dynamic IP addresses and, Configuring dynamic IP addresses
leases, Releasing and renewing DHCP settings
mobile devices and, Managing Mobile Networking and Remote Access, Working with mobility settings
releasing and renewing settings, Releasing and renewing DHCP settings
resolver cache and, Registering and flushing DNS
DHCPv4, UEFI, Configuring network connections, Viewing network configuration information
DHCPv6, UEFI
DHCPv6-capable DHCP client, Working with TCP/IP and the Dual TCP/IP stack
diagnostic startup, Managing system boot configuration, Managing system boot configuration
dial-up connections
automatic disconnection, Configuring automatic disconnection
creating, Creating a dial-up connectionCreating a broadband connection to the Internet, Creating Dialing Locations, Creating Dialing Locations, Creating a dial-up connection to a workplace, Creating a broadband connection to the Internet, Creating a broadband connection to the Internet
establishing, Establishing connectionsEstablishing a broadband connection, Establishing a broadband connection, Establishing a broadband connection
Group Policy and, Creating a dial-up connection to a workplace
networking, Managing Mobile Networking and Remote Access, Understanding mobile networking and remote access
networking protocols, Configuring networking protocols and components
troubleshooting, Establishing a dial-up connection
dialing locations, Creating Dialing Locations, Deleting Dialing Locations
dialing rules, Creating a dial-up connection, Viewing and Setting the Default Dialing Location, Viewing and Setting the Default Dialing Location, Creating a dial-up Internet connection to an ISP, Setting a connection to use dialing rules
Dialup special identity, Special identities and best practices for assigning permissions
DirectAccess
mobile networking and, Understanding mobile networking and remote access
network policies, Configuring network policies
directories and files
compressing, Compressing drives and data
encrypting, Encrypting directories and files
expanding compressed, Expanding compressed drives
disabling
disk quotas, Disabling disk quotas, Disabling disk quotas
inherited permissions, Stopping inheritance
network connections, Managing network connections
network discovery, Understanding network discovery and network categories
offline files, Managing encryption for offline files
run-once lists, Disabling run lists through policy
Windows Firewall, Enabling and disabling Windows Firewall for network connections
disc burning
ISO images, Burning ISO images to disc, Burning mastered discs
live file systems, discs with, Changing the default burning options
disconnecting
from a network, Enabling and disabling network connections, Checking the status, speed, and activity for network connections, Connecting to wireless networks
network drives, Using the This PC console, Using and accessing shared resources
open files, Using and accessing shared folders for administration
user sessions, Using and accessing shared folders for administration
Disk Cleanup tool, Troubleshooting common disk problems
disk compression, Managing disk compression and file encryption, Managing disk compression and file encryption, Compressing directories and files, Expanding compressed directories and files
Disk Defragmenter, as background process, Understanding and using Windows SuperFetch
disk errors
checking for, Checking for disk errorsRunning Check Disk interactively, Running Check Disk from the command line, Running Check Disk interactively, Running Check Disk interactively
repairing, Repairing disk errors and inconsistencies
Disk Management
converting basic disks to dynamic, Converting a basic disk to a dynamic disk or vice versa
deleting partitions, volumes, and logical drives, Creating mirrored volumes
drive letters and paths, Assigning, changing, or removing drive letters and paths
formatting partitions and volumes, Formatting partitions and volumes
logical drives, creating, Creating partitions, logical drives, and simple volumesCreating spanned and striped volumes, Creating partitions, logical drives, and simple volumes, Creating partitions, logical drives, and simple volumes, Creating spanned and striped volumes
mirrored volumes, Creating mirrored volumes, Creating mirrored volumes
moving dynamic disks to another system, Moving a dynamic disk to a new system
partitioning disks, Partitioning disks and preparing them for useCreating spanned and striped volumes, Creating partitions, logical drives, and simple volumes, Creating spanned and striped volumes, Creating spanned and striped volumes
reactivating volumes, Defragmenting disks
removable disks, Working with removable storage devices
removing a mirrored set, Removing a mirrored set
repairing mirrored system volumes, Repairing a mirrored system volume to enable boot
rescanning disks, Resynchronizing and repairing a mirrored set
rescanning missing drives, Creating mirrored volumes
simple volumes, creating, Creating partitions, logical drives, and simple volumesCreating spanned and striped volumes, Creating partitions, logical drives, and simple volumes, Creating spanned and striped volumes, Creating spanned and striped volumes
status, Troubleshooting common disk problems, Troubleshooting common disk problems
switching table styles, Changing a disk’s partition table style
disk quotas
creating entries, Viewing disk quota entries, Creating disk quota entries
deleting entries, Deleting disk quota entries, Deleting disk quota entries
disabling, Disabling disk quotas
enabling on NTFS volumes, Enabling disk quotas on NTFS volumesCreating disk quota entries, Viewing disk quota entries, Creating disk quota entries
exporting and importing settings, Exporting and importing disk quota settings, Exporting and importing disk quota settings
policies, Working with file and data management policiesConfiguring System Restore policies, Configuring System Restore policies, Configuring System Restore policies
process described, Configuring disk quotas
updating and customizing entries, Updating and customizing disk quota entries
viewing entries, Viewing disk quota entries
disk space usage
Disk Cleanup tool and, Troubleshooting common disk problems
disk quotas and, Configuring disk quotasUsing branch caching, Using disk quotas, Viewing disk quota entries, Creating disk quota entries, Exporting and importing disk quota settings, Disabling disk quotas, Disabling disk quotas, Using branch caching
for offline files, Configuring Offline File policies, Configuring disk usage limits for offline files
DiskPart
setting active partition, Marking a partition as active
Diskpart.efi, Navigating startup and power states
disks
checking for errors, Checking for disk errorsRunning Check Disk interactively, Running Check Disk interactively, Running Check Disk interactively
initializing, Installing and initializing new physical disks, Installing and initializing new physical disks
installing, Installing and initializing new physical disks
logical structure, Working with basic and dynamic disks
mirroring, Working with basic and dynamic disks, Creating mirrored volumes, Repairing a mirrored system volume to enable boot
performance, Improving disk performanceWorking with basic and dynamic disks, Understanding and using Windows ReadyBoost, Enabling and configuring Windows ReadyBoost, Understanding and using Windows ReadyDrive, Understanding and using Windows SuperFetch, Understanding and using Windows SuperFetch, Working with basic and dynamic disks
spanned, Working with basic and dynamic disks, Working with basic and dynamic disks
statuses, list of, Troubleshooting common disk problems
striping, Working with basic and dynamic disks
tools, Disk management essentials
types, Disk management essentials
dismounting volumes for repair, Checking for disk errors
display
mobile device settings, Working with mobility settings
startup problems and, Troubleshooting startup phase 5
Display Confirmation Dialog When Deleting Files policy, Setting Group Policy for File Explorer and folder views
Display Instructions In Logoff Scripts As They Run policy, Controlling script behavior through policy
Display Instructions In Logon Scripts As They Run policy, Controlling script behavior through policy
Display Instructions In Shutdown Scripts As They Run policy, Controlling script behavior through policy
Display Instructions In Startup Scripts As They Run policy, Controlling script behavior through policy
display order of boot managers, Changing the operating system display order
/displayorder command, Using the BCD Editor
distributed branch caching, Using branch caching
distributed cache mode, Using branch caching
DNS
adaptive query timeout, Working with TCP/IP and the Dual TCP/IP stack
parallel queries, Working with TCP/IP and the Dual TCP/IP stack
persistent cache, Working with TCP/IP and the Dual TCP/IP stack
query coalescing, Working with TCP/IP and the Dual TCP/IP stack
resolution, Configuring DNS resolution, Configuring WINS resolution
resolver cache, Registering and flushing DNS, Registering and flushing DNS
DNS64, Understanding mobile networking and remote access
Do Not Enumerate Connected Users On Domain-Joined Computers policy, Working with logon and startup policies
Do Not Process The Legacy Run List policy, Working with logon and startup policies
Do Not Process The Run Once List policy, Working with logon and startup policies
dollar sign ($), hidden shares and, Using and accessing shared folders for administration
domain controllers
claims-based permissions and, Assigning claims-based permissions
default policy, Assigning claims-based permissions
Network Unlock servers, Hardware encryption, secure boot, and network unlock
domain networks, Understanding network discovery and network categories
domains
administrative templates and, Viewing policies and templates, Enabling, disabling, and configuring policies
GPMC and, Accessing and using site, domain, and OU policies
double-colon notation, Working with TCP/IP and the Dual TCP/IP stack
drive letters, Working with disks, partitions, and volumes, Creating partitions, logical drives, and simple volumes, Assigning, changing, or removing drive letters and paths, Assigning, changing, or removing drive letters and paths, Moving a dynamic disk to a new system, Customizing File Explorer
drive paths, Working with disks, partitions, and volumes, Assigning, changing, or removing drive letters and paths, Assigning, changing, or removing drive letters and paths
drivers, loading during startup, Diagnosing and resolving startup problems
drives
512b vs. 512e, Disk management essentials
adding to storage spaces, Adding drives to a storage space
Advanced Format, Disk management essentials
compressing, Compressing drives and data
designations, Preparing basic and dynamic disks
Disk Management and, Using Disk ManagementUsing FSUtil and DiskPart, Using Disk Management, Using FSUtil and DiskPart, Using FSUtil and DiskPart
disk types, Disk management essentials
encrypted, Disk management essentials
hiding, Setting Group Policy for File Explorer and folder views
network, Using the This PC console
optimizing, Troubleshooting common disk problems
Standard Format, Disk management essentials
volume labels, Assigning, changing, or deleting a volume label
dual TCP/IP stack, Working with TCP/IP and the Dual TCP/IP stack, Working with TCP/IP and the Dual TCP/IP stack
dynamic disks
changing to basic, Disk management essentials, Converting a basic disk to a dynamic disk or vice versa
laptops and, Working with basic and dynamic disks
moving to another system, Moving a dynamic disk to a new system, Moving a dynamic disk to a new system
volume types, Understanding drive designations
vs. basic disks, Working with basic and dynamic disks
dynamic IP addresses
configuring, Configuring network connections, Configuring a static IPv4 or IPv6 address, Configuring dynamic IP addresses and alternate IP addressing, Configuring dynamic IP addresses, Configuring alternate private IP addresses
troubleshooting, Resolving IP addressing problems
dynamic volumes, Disk management essentials

E

E$ share, Using and accessing shared folders for administration
editing permissions, Working with and setting basic permissions
EEPROM (Electronically Erasable Programmable Read-Only Memory), Troubleshooting startup phase 1
effective permissions, Determining the effective permissions and troubleshootingDetermining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting
EFI
boot manager, Troubleshooting startup phase 3
booting into the operating system and, Navigating startup and power states
creating BCD store, Creating and identifying the BCD store
device drivers, UEFI and, UEFI
system store device, Using the BCD Editor
EFS (Encrypting File System)
encrypting and decrypting automatically, Encrypting drives and data
Work Folders, Understanding work folders
EIST, Power states and power management
ejecting removable storage, Using the This PC console
Electronically Erasable Programmable Read-Only Memory (EEPROM), Troubleshooting startup phase 1
email invitations for Remote Assistance, Configuring Remote Assistance policies
EMS
settings, Setting BCD entry values
/ems command, Using the BCD Editor
Ems option, Setting BCD entry values
EMSBaudRate option, Setting BCD entry values
EMSPort option, Setting BCD entry values
/emssettings command, Using the BCD Editor
Enable Disk Quotas policy, Configuring disk quota policies
Enable File Screens policy, Configuring Offline File policies, Configuring Offline File policies
Enable File Synchronization On Costed Networks policy, Configuring Offline File policies, Configuring Offline File policies
Enable Transparent Caching policy, Configuring Offline File policies
enabling
BitLocker, on nonsystem volumes, Preparing for BitLocker Drive Encryption
BitLocker, on system volumes, Enabling BitLocker on USB flash drivesEnabling BitLocker on system volumes, Enabling BitLocker on system volumes, Enabling BitLocker on system volumes, Enabling BitLocker on system volumes, Enabling BitLocker on system volumes
BitLocker, on USB flash drives, Enabling BitLocker on USB flash drivesEnabling BitLocker on system volumes, Enabling BitLocker on USB flash drives, Enabling BitLocker on system volumes, Enabling BitLocker on system volumes
branch caching, Using branch caching
disk quotas, on NTFS volumes, Using disk quotasCreating disk quota entries, Enabling disk quotas on NTFS volumes, Viewing disk quota entries, Creating disk quota entries
network connections, Managing network connections, Enabling and disabling network connections
network discovery, Understanding network discovery and network categories, Working with Network Explorer, Performing basic network tests
network sharing, File security and sharing options, File security and sharing options
offline files, Managing encryption for offline files
TPM, TPM: management and policies, Enabling TPM
Windows Firewall, Enabling and disabling Windows Firewall for network connections
Windows ReadyBoost, Enabling and configuring Windows ReadyBoost
Encrypt The Offline Files Cache policy, Configuring Offline File policies
encrypted files, color coding, Customizing File Explorer
encrypting
drives and data, Encrypting drives and dataDecrypting files and directories, Understanding encryption and EFS, Encrypting directories and files, Working with encrypted files and folders, Decrypting files and directories, Troubleshooting common disk problems
offline files, Configuring Offline File policies, Managing encryption for offline files
Work Folders, Understanding work folders
encryption
BitLocker Drive Encryption vs. BitLocker To Go, BitLocker Drive Encryption: the essentials
data recovery and, Understanding encryption and EFS
directories and files, Encrypting directories and filesDecrypting files and directories, Encrypting directories and files, Configuring recovery policy, Decrypting files and directories, Decrypting files and directories
full volumes vs. used space only, Hardware encryption, secure boot, and network unlock
hardware-based, Hardware encryption, secure boot, and network unlock
SMB, Sharing files and folders over the network
software-based, Hardware encryption, secure boot, and network unlock
system volumes, Enabling BitLocker on system volumesEnabling BitLocker on system volumes, Enabling BitLocker on system volumes
USB flash drives, Enabling BitLocker on USB flash drivesEnabling BitLocker on system volumes, Enabling BitLocker on system volumes, Enabling BitLocker on system volumes
VPN and, Understanding mobile networking and remote access
vs. disk compression, Managing disk compression and file encryption
wireless, Wireless security
end-of-file (EOF) markers, Working with basic and dynamic disks
enforcing disk quotas, Configuring disk quota policies, Configuring disk quotas
enterprise encryption keys, Understanding work folders
/enum command, Using the BCD Editor
Enumerate Local Users On Domain-Joined Computers policy, Working with logon and startup policies
environment variables, Creating and managing shared folders in Group Policy, Using and accessing shared resources
eSATA, removable storage and, Working with removable storage devices
ESE databases, Using branch caching
event logging, disk quotas and, Enabling disk quotas on NTFS volumes
event messages from Group Policy, Group Policy essentials
Everyone special identity, Special identities and best practices for assigning permissions
exceptions, Windows Firewall, File security and sharing options
exFAT file system, Disk management essentials, Working with basic and dynamic disks, Working with disks, partitions, and volumes
Expand.exe, Expanding compressed directories and files
expanding
compressed directories and files, Expanding compressed drives
compressed drives, Compressing directories and files
explicit permissions, Stopping inheritance
/export command, Using the BCD Editor
exporting
BCD store, Viewing BCD entries, Creating and deleting BCD entries
disk quota settings, Exporting and importing disk quota settings, Disabling disk quotas
extended partitions, Disk management essentials, Disk management essentials, Working with basic and dynamic disks
extended selective acknowledgments, Working with TCP/IP and the Dual TCP/IP stack
extending volumes, Shrinking or extending volumes, Formatting partitions and volumes
Extensible Storage Engine (ESE) data-bases, Using branch caching
external displays for mobile devices, Working with mobility settings

F

Failed drive status, Creating mirrored volumes
Failed Redundancy drive status, Creating mirrored volumes
Failed Redundancy volume status, Troubleshooting common disk problems, Troubleshooting common disk problems, Resynchronizing and repairing a mirrored set
Failed volume status, Troubleshooting common disk problems
failed volumes, recovering, Creating mirrored volumes
FAT volumes
file security options, File security and sharing options
FAT12 file system, Working with basic and dynamic disks
FAT16 file system, Disk management essentials, Working with basic and dynamic disks, Working with disks, partitions, and volumes
FAT32 file system, Disk management essentials, Working with disks, partitions, and volumes
fault tolerance
failed redundancy and, Troubleshooting common disk problems
RAID levels and, Working with basic and dynamic disks, Creating spanned and striped volumes
Federal Information Processing Standard (FIPS) compliance, Deploying BitLocker Drive Encryption
File And Printer Sharing
default component configuration, Configuring networking protocols and components
turning on and off, Sharing files and folders over the network
Windows Firewall exceptions, File security and sharing options
File Explorer, configuring options, Maintaining Data Access and AvailabilityUnderstanding offline files, Customizing File Explorer, Customizing File Explorer, Customizing File Explorer, Setting Group Policy for File Explorer and folder views, Setting Group Policy for File Explorer and folder views, Setting Group Policy for File Explorer and folder views, Managing offline files, Understanding offline files
file name extensions, Customizing File Explorer, Customizing File Explorer
file ownership, File ownership and permission assignment
file sharing
homegroups and, File security and sharing options
models, File security and sharing options, File security and sharing options
offline availability, Understanding offline filesManaging offline file synchronization, Making files or folders available offline, Step 2: Make folders available for offline use, Step 3: Specify the offline files and folders to use, Managing offline file synchronization
permissions, File security and sharing options
restrictions, File security and sharing options
vs. file security, Optimizing File Security
with specific people, File security and sharing options
file systems
disc options, Working with data discs
FAT types, Working with basic and dynamic disks
primary partitions and, Disk management essentials
Files Not Cached policy, Configuring Offline File policies
Filter Manager, Understanding and using Windows SuperFetch
FireWire, removable storage and, Working with removable storage devices, Working with removable storage devices
firmware
digital signatures, Hardware encryption, secure boot, and network unlock
initializing TPM and, Initializing and preparing a TPM for first use
TCG compliant, Creating trusted platforms
Firmware Boot Manager, Using the BCD Editor
firmware interfaces
examining, Examining firmware interfacesPower states and power management, Power states and power management
types, Firmware interface types and boot data
working with, Working with firmware interfaces
FirstMegaBytePolicy option, Setting BCD entry values
fixed data drives, policies for, Deploying BitLocker Drive Encryption, Enabling BitLocker on nonsystem volumes
Fixmbr command, Troubleshooting common disk problems
flushing DNS, Registering and flushing DNS, Registering and flushing DNS
folder sharing
public vs. standard, File security and sharing options, Managing File Sharing and Auditing
folders, inheritance and, Applying permissions through inheritanceDetermining the effective permissions and troubleshooting, Inheritance essentials, Stopping inheritance, Determining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting
Foreign disk status, Troubleshooting common disk problems
formatting
data discs, Disc burning: the essentials
partitions, Formatting partitions and volumes
Formatting volume status, Troubleshooting common disk problems
forward lookups, Registering and flushing DNS
FSUtil
bytes per physical sector, Disk management essentials
Full Control permissions, Working with and setting basic permissions
Fwbootmgr, Using the BCD Editor

G

get-help smbshare command, Creating a shared resource
Get-WindowsOptionalFeature cmdlet, Hardware encryption, secure boot, and network unlock
ghost entries, offline files and, Understanding offline files
gpedit.msc, Accessing and using local group policies
GPMC (Group Policy Management Console), Accessing and using site, domain, and OU policies, Accessing and using site, domain, and OU policies
GPME (Group Policy Management Editor)
administrative templates, Viewing policies and templates, Adding or removing templates
nodes described, Accessing and using site, domain, and OU policies
GPOs (Group Policy objects)
editing, Accessing and using site, domain, and OU policies
local, Accessing and using local group policies
resolving conflicts, Accessing and using local group policies
GPT (GUID partition table), Boot services, run-time services, and beyond, UEFI, Disk management essentials, Disk management essentials, Disk management essentials, Changing a disk’s partition table style
Gpupdate.exe, Group Policy essentials
GraphicsModeDisabled option, Setting BCD entry values
GraphicsResolution option, Setting BCD entry values
Group Policy
administrative templates, Accessing and using site, domain, and OU policiesAdding or removing templates, Viewing policies and templates, Adding or removing templates, Adding or removing templates
auditing policies, Enabling auditing for files and foldersConfiguring and tracking auditing, Configuring and tracking auditing
BitLocker, Deploying BitLocker Drive Encryption, Deploying BitLocker Drive Encryption, Preparing for BitLocker Drive Encryption
branch caching, Using branch caching
computer and user scripts, Working with computer and user script policiesAssigning user logon and logoff scripts, Controlling script behavior through policy, Assigning computer startup and shutdown scripts, Assigning user logon and logoff scripts
computer startup and shutdown scripts, Controlling script behavior through policyAssigning user logon and logoff scripts, Assigning computer startup and shutdown scripts, Assigning user logon and logoff scripts
Default Domain Controllers GPO, Assigning claims-based permissions
dial-up connections, Creating a dial-up connection
disabling run lists, Disabling run lists through policy
disk quota policies, Configuring disk quota policiesConfiguring System Restore policies, Configuring System Restore policies
drive maps, Using and accessing shared resources, Using and accessing shared resources
File Explorer policies, Customizing File ExplorerSetting Group Policy for File Explorer and folder views, Setting Group Policy for File Explorer and folder views, Setting Group Policy for File Explorer and folder views
local, Group Policy essentialsAccessing and using site, domain, and OU policies, Accessing and using local group policies, Accessing and using local group policies, Accessing and using local group policies, Accessing and using site, domain, and OU policies
logon and logoff scripts, Controlling script behavior through policyAssigning user logon and logoff scripts, Controlling script behavior through policy, Assigning user logon and logoff scripts
network policies, Configuring network policies
Offline File policies, Configuring Offline File policiesConfiguring Offline File policies, Configuring Offline File policies, Configuring Offline File policies
recovery agents, Configuring recovery policy
Remote Assistance, Configuring Remote Assistance policiesControlling script behavior through policy, Configuring Remote Assistance policies, Configuring Remote Assistance policies, Controlling script behavior through policy
restricting file sharing, File security and sharing options, File security and sharing options
shared folders, Creating and managing shared folders in Group PolicyUsing and accessing shared resources, Creating and managing shared folders in Group Policy, Using and accessing shared resources, Using and accessing shared resources
startup applications, Setting policy-based startup programs
System Restore policies, Configuring System Restore policies
TPM Services, Deploying BitLocker Drive Encryption
VPN connections, Creating connections for remote access, Creating a VPN connection
Work Folders, Configuring policy for Work Folders
Group Policy Management Editor (GPME)
administrative templates, Viewing policies and templates, Adding or removing templates
Group Policy Modeling Wizard, Accessing and using site, domain, and OU policies
Group Policy Object Editor
creating and accessing local GPOs, Accessing and using local group policies
Group Policy Results Wizard, Accessing and using site, domain, and OU policies
GUID partition table (GPT), Boot services, run-time services, and beyond, Boot services, run-time services, and beyond, Disk management essentials, Disk management essentials, Disk management essentials, Changing a disk’s partition table style

H

Hal option, Setting BCD entry values
Hal.dll, Diagnosing and resolving startup problems, Troubleshooting startup phase 4
HalBreakPoint option, Setting BCD entry values
hard disks, sealing with TPM, TPM: the essentials
hardware abstraction layer (HAL)
loading, Diagnosing and resolving startup problems
hardware encryption, Hardware encryption, secure boot, and network unlock
hardware failure, Diagnosing and resolving startup problems
Healthy (At Risk) volume status, Troubleshooting common disk problems
Healthy status, Troubleshooting common disk problems, Resynchronizing and repairing a mirrored set, Resynchronizing and repairing a mirrored set
Hiberfil.sys file, Setting BCD entry values
Hibernate power state, Power states and power management
hidden items, viewing, Customizing File Explorer, Customizing File Explorer, Customizing File Explorer
hidden shares, creating, Using and accessing shared folders for administration
Hide These Specified Drives In My Computer policy, Setting Group Policy for File Explorer and folder views
Hides The Manage Item On The File Explorer Context Menu policy, Setting Group Policy for File Explorer and folder views
hiding drives, Managing drive access in File Explorer
HKEY_LOCAL_MACHINE
administrative templates, Viewing policies and templates
run lists and, Disabling run lists through policy
shell extensions, Setting Group Policy for File Explorer and folder views
startup process, Troubleshooting startup phase 3
HKEY_USER
administrative templates, Viewing policies and templates
HomeGroup Troubleshooter, Understanding network discovery and network categories
homegroups
password protected sharing, File security and sharing options
preventing computers from joining, File security and sharing options
host ID, IPv4 addresses and, Working with TCP/IP and the Dual TCP/IP stack
host name resolution, Configuring DNS resolutionConfiguring WINS resolution, Advanced DNS settings, Advanced DNS settings, Configuring WINS resolution
hosted cache mode, Using branch cachingUsing branch caching, Using branch caching, Using branch caching, Using branch caching
Human Interface Infrastructure support, UEFI
Hypervisor settings, Using the BCD Editor, Setting BCD entry values
HypervisorLaunchType option, Setting BCD entry values

I

I/O errors, Troubleshooting common disk problems, Troubleshooting common disk problems
Ia64ldr.efi, Navigating startup and power states
identifier entries, Creating and deleting BCD entries
identity validation, Configuring identity validation, Configuring identity validation
IEEE 1394, Working with removable storage devices
IEEE 802.11 specification, Wireless network devices and technologies
IIS hostable web core, Understanding work folders
IKEv2 connection protocol, Configuring networking protocols and components
/import command, Using the BCD Editor
importing
BCD store, Viewing BCD entries, Creating and deleting BCD entries
disk quota settings, Exporting and importing disk quota settings
Include In Library option, File security and sharing options
IncreaseUserVA option, Setting BCD entry values
infrastructure mode, Installing and configuring a wireless adapter
inherited permissions
restoring, Restoring inherited permissions
sync shares and, Creating sync shares and enabling SMB access
initial startup, troubleshooting, Diagnosing and resolving startup problems, Troubleshooting startup phase 2, Troubleshooting startup phase 3
initializing
disks, Understanding drive designations, Changing a disk’s partition table style, Troubleshooting common disk problems
TPM (Trusted Platform Module) Services, Initializing and preparing a TPM for first useInitializing and preparing a TPM for first use, Initializing and preparing a TPM for first use, Initializing and preparing a TPM for first use, Initializing and preparing a TPM for first use
Initializing volume status, Troubleshooting common disk problems
installing
BitLocker Drive Encryption, Managing BitLocker Drive Encryption
network adapters, Installing network adapters
new physical disks, Installing and initializing new physical disks, Changing a disk’s partition table style
installing (continued)
TCP/IP, Installing networking services and TCP/IP
wireless adapters, Installing and configuring a wireless adapter
integrity checks, Enabling BitLocker on system volumes
Intel Multiple Monitor, Examining firmware interfaces
Intel Quick Resume Technology Driver (QRTD), Power states and power management
Intel SpeedStep, Examining firmware interfaces
Intel Turbo Boost, Examining firmware interfaces
Intel Virtualization, Examining firmware interfaces
Interactive special identity, Special identities and best practices for assigning permissions
Internet connections, resolving problems with, Diagnosing and resolving Internet connection problems
Internet Group Management Protocol version 3 (IGMPv3), Working with TCP/IP and the Dual TCP/IP stack
Internet Key Exchange (IKE), Working with TCP/IP and the Dual TCP/IP stack
Internet small computer system interface (iSCSI), UEFI
IP addresses
alternate private, Configuring dynamic IP addresses
configuration information, viewing, Viewing network configuration information
dynamic, Configuring network connections, Configuring dynamic IP addresses and alternate IP addressing, Configuring dynamic IP addresses and alternate IP addressing, Configuring dynamic IP addresses
resolving using DNS, Basic DNS settingsConfiguring WINS resolution, Advanced DNS settings, Configuring WINS resolution, Configuring WINS resolution
resolving using WINS, Configuring WINS resolution, Configuring WINS resolution
static, Configuring network connectionsConfiguring dynamic IP addresses and alternate IP addressing, Using the Ping command to check an address, Configuring dynamic IP addresses and alternate IP addressing
troubleshooting, Resolving IP addressing problems
IP security, Working with TCP/IP and the Dual TCP/IP stack
IPC$ share, Using and accessing shared folders for administration
Ipconfig command, Viewing network configuration information, Releasing and renewing DHCP settings, Registering and flushing DNS
IPsec, L2TP and, Understanding mobile networking and remote access
IPv4
alternate IP addressing, Configuring alternate private IP addresses
connection status, Enabling and disabling network connections
dynamic IP addresses, Configuring dynamic IP addresses
installing, Installing networking services and TCP/IP
name resolution enhancements, Working with TCP/IP and the Dual TCP/IP stack
static addresses, configuring, Using the Ping command to check an address, Configuring dynamic IP addresses and alternate IP addressing
TCP/IP and, Working with TCP/IP and the Dual TCP/IP stack
viewing address, Viewing network configuration information
WINS and, Configuring WINS resolutionEnabling and disabling network connections, Configuring WINS resolution, Configuring WINS resolution, Enabling and disabling network connections
IPv6
DirectAccess and, Understanding mobile networking and remote access
dynamic IP addresses, Configuring dynamic IP addresses
installing, Installing networking services and TCP/IP
TCP/IP and, Working with TCP/IP and the Dual TCP/IP stack
IPv6 over IPsec connection protocol, Configuring networking protocols and components
ISO images
burning to disc, Working with data discs, Disc burning: the essentials
mounting, Mounting ISO images

J

joining devices to workplaces, Joining a device to a workplace

L

L2TP IPsec VPN connection protocol, Configuring networking protocols and components
last known good configuration, Troubleshooting startup phase 4, Setting BCD entry values
latency, as branch caching trigger, Using branch caching
Layer 2 Tunneling Protocol (L2TP), Understanding mobile networking and remote access
leases, DHCP, Releasing and renewing DHCP settings, Releasing and renewing DHCP settings
legacy run lists, disabling, Disabling run lists through policy
link-local multicast name resolution (LLMNR), Working with TCP/IP and the Dual TCP/IP stack, Working with TCP/IP and the Dual TCP/IP stack
List Folder Contents (folders only) permissions, Working with and setting basic permissions
List Folder Contents permission, Managing drive access in File Explorer
List Folder/Read Data special permission, Assigning special permissions
LMHOSTS, Configuring WINS resolution, Configuring WINS resolution, Configuring WINS resolution
local disk shares, Using and accessing shared folders for administration
local Group Policy
accessing and using, Accessing and using local group policiesAccessing and using site, domain, and OU policies, Accessing and using local group policies, Accessing and using local group policies, Accessing and using site, domain, and OU policies, Accessing and using site, domain, and OU policies
local Group Policy objects (GPOs), Accessing and using local group policies
Local Security Authority
startup process and, Diagnosing and resolving startup problems
Locale option, Setting BCD entry values
Location Where All Default Library Definition Files For Users/Machines Reside policy, Setting Group Policy for File Explorer and folder views
lock screens, Work Folders and, Understanding work folders, Creating sync shares and enabling SMB access
lockout, TPM, TPM: management and policies
Log Event When Quota Limit Is Exceeded policy, Configuring disk quota policies
Log Event When Quota Warning Is Level Is Exceeded policy, Configuring disk quota policies
logical drives
creating, Creating partitions, logical drives, and simple volumesCreating spanned and striped volumes, Creating spanned and striped volumes, Creating spanned and striped volumes
deleting, Creating mirrored volumes
logoff scripts, Controlling script behavior through policyAssigning user logon and logoff scripts, Controlling script behavior through policy, Controlling script behavior through policy, Assigning user logon and logoff scripts, Assigning user logon and logoff scripts
logon information, Configuring connection logon information
logon policies, Working with logon and startup policiesDisabling run lists through policy, Working with logon and startup policies, Disabling run lists through policy
logon scripts, Working with computer and user script policiesAssigning user logon and logoff scripts, Controlling script behavior through policy, Controlling script behavior through policy, Assigning user logon and logoff scripts, Assigning user logon and logoff scripts
Lsass.exe, Diagnosing and resolving startup problems, Troubleshooting startup phase 5

M

Managed Network Protocol (MNP), UEFI
Managed Network Service Binding Protocol (MNSBP), UEFI
manual Internet connections, Configuring automatic or manual connections
mapping network drives, Using the This PC console
Group Policy and, Using and accessing shared resources, Using and accessing shared resources
shared folders and, Managing File Sharing and Auditing
shared resources, Using and accessing shared resourcesUsing and accessing shared resources, Using and accessing shared resources, Using and accessing shared resources, Using and accessing shared resources
master boot code, Disk management essentials
master boot record (MBR)
partitions, Boot services, run-time services, and beyond, Boot services, run-time services, and beyond
switching to GPT, Changing a disk’s partition table style
Unknown volume status and, Troubleshooting common disk problems
master file table (MFT), Working with disks, partitions, and volumes, Creating mirrored volumes
mastering discs, Disc burning: the essentialsBurning discs with live file systems, Disc burning: the essentials, Burning mastered discs, Burning discs with live file systems, Burning discs with live file systems
MaxProc option, Setting BCD entry values
measured boot, Hardware encryption, secure boot, and network unlock
media access control (MAC) address, Viewing network configuration information
media state, Checking the status, speed, and activity for network connections
media streaming, File security and sharing options
memory
buffer, Working with TCP/IP and the Dual TCP/IP stack
paging, Diagnosing and resolving startup problems
protecting with DEP, Changing Data Execution Prevention and Physical Address Extension options
specifying maximum usable amount, Managing system boot configuration
SuperFetch and, Understanding and using Windows SuperFetch
metered connections, Managing and troubleshooting wireless networking
MFT (master file table), Working with disks, partitions, and volumes, Creating mirrored volumes
/mirror command, Using the BCD Editor
mirrored sets
resynchronizing and repairing, Resynchronizing and repairing a mirrored set
mirrored system volumes, Repairing a mirrored system volume to enable boot, Repairing a mirrored system volume to enable boot
mirroring disks, Troubleshooting startup phase 2, Working with basic and dynamic disks, Creating mirrored volumes, Breaking a mirrored set
Missing drive status, Creating mirrored volumes
Missing status, Troubleshooting common disk problems, Resynchronizing and repairing a mirrored set
mobile devices
Airplane Mode, Working with mobility settings
DirectAccess and, Understanding mobile networking and remote access
display settings, Working with mobility settings
network components, Configuring networking protocols and components
presentation mode, Working with mobility settings
Sync Center and, Working with mobility settings
VPN and, Understanding mobile networking and remote access
Windows Mobility Center and, Working with mobility settings, Working with mobility settings
modeling Group Policy, Accessing and using site, domain, and OU policies
modem pools, Understanding mobile networking and remote access
modems, establishing a dial-up connection, Establishing a dial-up connection
modified fast recovery algorithm, Working with TCP/IP and the Dual TCP/IP stack
Modify permissions, Working with and setting basic permissions
motherboard-chipsets
platform firmware and, Managing Firmware, Boot Configuration, and Startup
mounting
ISO images, Burning ISO images to disc
volumes, Creating partitions, logical drives, and simple volumes
ms-TPM-OwnerInformation, Deploying BitLocker Drive Encryption
Msconfig.exe, Managing system boot configuration
Msi option, Setting BCD entry values
multiboot menu, Using the BCD Editor
multicast listener discovery version 2 (MLDv2), Working with TCP/IP and the Dual TCP/IP stack
multiprocessor configurations, Managing system boot configuration

N

name resolution
DNS, Configuring DNS resolution, Advanced DNS settings, Advanced DNS settings, Registering and flushing DNS, Registering and flushing DNS
WINS, Configuring WINS resolutionEnabling and disabling network connections, Configuring WINS resolution, Configuring WINS resolution, Enabling and disabling network connections
NAT64, Understanding mobile networking and remote access
net share command, Creating a shared resource, Using and accessing shared folders for administration
NetBIOS name resolution, Configuring WINS resolution, Configuring WINS resolution, Configuring WINS resolution
network adapters
installing, Installing network adapters
network connections and, Configuring network connections
network address translators, Working with TCP/IP and the Dual TCP/IP stack
Network and Sharing Center
broadband connections, Creating a broadband connection to the Internet
default gateways, Configuring multiple gateways
Network and Sharing Center (continued)
diagnosing connection problems, Diagnosing and resolving Internet connection problems
dial-up connections, Creating a dial-up Internet connection to an ISP
DNS, configuring, Configuring DNS resolution
dynamic IP addresses, Configuring dynamic IP addresses
VPN connections, Creating a VPN connection
wireless connections, Connecting to wireless networks
network categories, Understanding network discovery and network categories, Understanding network discovery and network categories
network connections
disabling, Enabling and disabling network connections
enabling, Enabling and disabling network connections
network adapters and, Configuring network connections
Network and Sharing Center and, Working with Network And Sharing Center
resolving problems, Troubleshooting and testing network settings
status, Checking the status, speed, and activity for network connections
Network Diagnostics, Navigating Windows 8.1 networking features, Working with TCP/IP and the Dual TCP/IP stack
network discovery
defined, Understanding network discovery and network categories
Network Explorer and, Working with Network Explorer
Network Explorer
network discovery and, Working with Network Explorer
network ID, Working with TCP/IP and the Dual TCP/IP stack
network interface, Working with TCP/IP and the Dual TCP/IP stack
network interface cards (NICs), Installing network adapters
network keys, Installing and configuring a wireless adapter
network latency, as branch caching trigger, Using branch caching
Network Location Awareness, Group Policy essentials
network masks, Resolving IP addressing problems
network policies, Configuring network policies, Configuring network policies
network projectors, Connecting to networked projectors
network sharing
enabling, File security and sharing options
permissions, Controlling access to network shares
Network special identity, Special identities and best practices for assigning permissions
network unlock, Understanding BitLocker Drive Encryption, Hardware encryption, secure boot, and network unlock, Deploying BitLocker Drive Encryption, Enabling BitLocker on system volumes
networking
components, Configuring networking protocols and componentsEstablishing a dial-up connection, Configuring networking protocols and components, Establishing a dial-up connection
mobile devices, configuring for, Configuring networking for mobile devices, Working with mobility settings, Working with mobility settings, Configuring alternate private IP addresses, Connecting to networked projectors
protocols, Configuring identity validation
No Media disk status, Troubleshooting common disk problems
no-execute (NX) policy, Viewing BCD entries, Setting BCD entry values, Changing Data Execution Prevention and Physical Address Extension options
/nocleanup command, Creating and deleting BCD entries
NoCrashAutoReboot option, Setting BCD entry values
NoLowMem option, Setting BCD entry values
non-metered connections, Managing and troubleshooting wireless networking
nonsystem BCD store, Creating and identifying the BCD store
nonsystem volumes, enabling BitLocker on, Enabling BitLocker on nonsystem volumes
nonvolatile memory, Troubleshooting startup phase 1
Not Initialized disk status, Troubleshooting common disk problems
Noumex option, Setting BCD entry values
NoVESA option, Setting BCD entry values
NTFS
converting volumes to, Creating mirrored volumes
extending volumes and, Shrinking or extending volumes
file security options, File security and sharing options
permissions, Working with disks, partitions, and volumes, File security and sharing options
ReFS and, File security and sharing options
self-healing, Repairing disk errors and inconsistencies
transactional, Repairing disk errors and inconsistencies
versions, Working with disks, partitions, and volumes
volumes, encrypting, Understanding BitLocker Drive Encryption
Ntoskrnl.exe, Diagnosing and resolving startup problems, Troubleshooting startup phase 4
NumProc option, Setting BCD entry values
Nvrboot.efi, Navigating startup and power statesPower states and power management, Power states and power management
nx option, Setting BCD entry values, Changing Data Execution Prevention and Physical Address Extension options, Changing Data Execution Prevention and Physical Address Extension options

O

octets, Working with TCP/IP and the Dual TCP/IP stack
Off (disabled) state, Understanding network discovery and network categories
Off power state, Power states and power management
Offline disk status, Troubleshooting common disk problems
Offline drive status, Creating mirrored volumes
offline files
disk usage limits, Configuring disk usage limits for offline files
encryption, Managing encryption for offline files
policies, Configuring Offline File policiesConfiguring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies
settings, Sharing a folder and setting share permissions in Computer Management
synchronizing, Using and accessing shared resources, Managing offline file synchronizationResolving synchronization conflicts and errors, Resolving synchronization conflicts and errors
Offline status, Resynchronizing and repairing a mirrored set
On (enabled) state, Understanding network discovery and network categories
On power state, Power states and power management
OneCPU option, Setting BCD entry values
Online (Errors) status
disks, Troubleshooting common disk problems
drives, Creating mirrored volumes
Online disk status, Troubleshooting common disk problems
operating system
default BCD entry, Changing the default operating system entry
display order, Changing the operating system display order
drive policies, Deploying BitLocker Drive Encryption
loaders, Boot services, run-time services, and beyond
operational log, Group Policy essentials
optimizing drives, Defragmenting disks
OptionsEdit option, Setting BCD entry values
OSDevice option, Setting BCD entry values
Osloader, Using the BCD Editor, Creating and deleting BCD entries, Setting BCD entry valuesChanging Data Execution Prevention and Physical Address Extension options, Changing Data Execution Prevention and Physical Address Extension options
owner authorization, TPM, TPM: management and policies, TPM: management and policies
ownership of a file or folder, assigning, File ownership and permission assignment

P

PAE option, Setting BCD entry values, Changing Data Execution Prevention and Physical Address Extension options
page file partition or volume, Understanding drive designations
parallel queries, Working with TCP/IP and the Dual TCP/IP stack
parallelism, Managing system boot configuration
parity volumes, storage spaces and, Creating redundant data sets
partitioning, Boot services, run-time services, and beyond, Boot services, run-time services, and beyond
partitions
active, Marking a partition as active, Marking a partition as active
creating, Creating partitions, logical drives, and simple volumesCreating spanned and striped volumes, Creating spanned and striped volumes, Creating spanned and striped volumes
deleting, Creating mirrored volumes
Healthy (Unknown Partition) volume status and, Troubleshooting common disk problems
MBR vs. GUID, Disk management essentials
switching table styles, Disk management essentials
password protected sharing, File security and sharing options
passwords
BitLocker Drive Encryption, Understanding BitLocker Drive Encryption
firmware interface, Examining firmware interfaces
recovery, Preparing for BitLocker Drive Encryption
TPM, TPM: management and policies, TPM: management and policies, Enabling TPM, Initializing and preparing a TPM for first use, Initializing and preparing a TPM for first use, Initializing and preparing a TPM for first use, Changing the TPM owner password
USB flash drives, Enabling BitLocker on USB flash drives, Enabling BitLocker on system volumes
PC cards, Installing and configuring a wireless adapter
PCI cards, Installing and configuring a wireless adapter
PCRs (Platform Configuration Registers), Hardware encryption, secure boot, and network unlock
PerfMem option, Setting BCD entry values
performance
disk space usage and, Troubleshooting common disk problems
Windows ReadyBoost and, Understanding and using Windows ReadyBoostUnderstanding and using Windows SuperFetch, Enabling and configuring Windows ReadyBoost, Understanding and using Windows SuperFetch
Peripheral Component Interconnect (PCI), UEFI
permissions
advanced sharing, Sharing a resource and setting share permissions in File Explorer
assigning, Special identities and best practices for assigning permissionsAssigning special permissions, Special identities and best practices for assigning permissions, Special identities and best practices for assigning permissions, Assigning special permissions
basic, Understanding and using basic permissionsAssigning special permissions, Working with and setting basic permissions, Working with and setting basic permissions, Special identities and best practices for assigning permissions, Assigning special permissions, Assigning special permissions
basic sharing, Sharing a resource and setting share permissions in File Explorer
claims-based, Assigning claims-based permissionsFile ownership and permission assignment, File ownership and permission assignment
default, for sharing, File security and sharing options
effective, Determining the effective permissions and troubleshootingDetermining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting
encrypted files and, Understanding encryption and EFS, Working with encrypted files and folders
file ownership and, File ownership and permission assignment
network shares, Controlling access to network shares, Creating a shared resource, Sharing a folder and setting share permissions in Computer Management, Creating and managing shared folders in Group Policy, Troubleshooting file sharing
NTFS, Working with disks, partitions, and volumes, Optimizing File Security
offline files, Managing offline file synchronization
public folder sharing, Using public folder sharing
share vs. access, File security and sharing options
special, Assigning special permissionsAssigning claims-based permissions, Assigning special permissions, Assigning special permissions, Assigning special permissions, Assigning special permissions, Assigning claims-based permissions
persistent caching, Working with TCP/IP and the Dual TCP/IP stack
phone numbers
alternate, Configuring primary and alternate phone numbers
primary, Configuring primary and alternate phone numbers
Physical Address Extension (PAE) option, Changing Data Execution Prevention and Physical Address Extension options
Ping command, Using the Ping command to check an address, Performing basic network tests
Platform Configuration Registers (PCRs), Hardware encryption, secure boot, and network unlock
platform firmware, Navigating and understanding firmware options
Point-to-Point Tunneling Protocol (L2TP), Understanding mobile networking and remote access
policies
BitLocker Drive Encryption, Deploying BitLocker Drive Encryption
computer and user scripts, Working with computer and user script policiesAssigning user logon and logoff scripts, Assigning user logon and logoff scripts
configuring, Configuring policies, Enabling, disabling, and configuring policies
disk quota, Configuring disk quota policiesConfiguring System Restore policies, Configuring disk quota policies, Configuring System Restore policies
logon, Working with logon and startup policiesDisabling run lists through policy, Setting policy-based startup programs, Disabling run lists through policy
network, Working with access and connectivity policies, Configuring network policies
offline files, Configuring Offline File policiesConfiguring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies
operating system drive, Deploying BitLocker Drive Encryption
order of application, Group Policy essentials
recovery, Configuring recovery policy
Remote Assistance, Configuring Remote Assistance policiesControlling script behavior through policy, Configuring Remote Assistance policies, Configuring Remote Assistance policies, Controlling script behavior through policy
removable data drives, Deploying BitLocker Drive Encryption, Enabling BitLocker on USB flash drives
startup, Working with logon and startup policiesDisabling run lists through policy, Setting policy-based startup programs, Disabling run lists through policy
System Restore, Configuring System Restore policies
TPM Services, Deploying BitLocker Drive Encryption
Work Folders, Configuring policy for Work Folders
policy preferences, Configuring User and Computer Policies
policy settings
Work Folders, Configuring policy for Work Folders
power plans for mobile devices, Working with mobility settings
power settings, Power states and power management, Power states and power management, Power states and power management
power states, Power states and power managementDiagnosing and resolving startup problems, Power states and power management, Power states and power management, Diagnosing and resolving startup problems, Diagnosing and resolving startup problems
power-on self-test (POST), Diagnosing and resolving startup problems, Diagnosing and resolving startup problems
PPP, Configuring networking protocols and components
PPPoE, Configuring networking protocols and components
PPPv6, Working with TCP/IP and the Dual TCP/IP stack
PPTP VPN connection protocol, Configuring networking protocols and components
pre-operating system environment, TPM: the essentials
Preboot Execution Environment (PXE), UEFI
precedence of policies, Group Policy essentials
preconfiguring wireless network connections, Working with wireless networks and wireless connections
prefetch data, Understanding and using Windows SuperFetch
presentation mode, Working with mobility settings
Prevent Access To Drives From My Computer policy, Setting Group Policy for File Explorer and folder views
primary partitions
basic disks and, Working with basic and dynamic disks
marking as active, Marking a partition as active
MBR partitioning style, Disk management essentials
principle of least privilege, Special identities and best practices for assigning permissions
PRINT$ share, Using and accessing shared folders for administration
private network IPv4 addresses, Configuring static IP addresses, Configuring static IP addresses
private networks
changing from public, Understanding network discovery and network categories
defined, Understanding network discovery and network categories
ProactiveScan task, Checking for disk errors
processes, Windows SuperFetch and, Understanding and using Windows SuperFetch
processors, specifying number of, Managing system boot configuration
Prohibit Deletion Of Remote Access Connections policy, Configuring network policies
Prohibit Installation And Configuration Of Network Bridge On Your DNS Domain Network policy, Configuring network policies
projectors, connecting to, Connecting to networked projectors
propagating permissions, Inheritance essentials
protective MBR, Boot services, run-time services, and beyond
proxy server settings, mobile connections and, Configuring proxy settings for mobile connectionsConfiguring connection logon information, Configuring proxy settings for mobile connections, Configuring proxy settings for mobile connections, Configuring proxy settings for mobile connections, Configuring connection logon information
public folder sharing
configuring, Using public folder sharing
permissions, Using public folder sharing
turning on or off, File security and sharing options
vs. standard folder sharing, File security and sharing options
public folders, File security and sharing options, File security and sharing options
public networks
changing to private, Understanding network discovery and network categories
defined, Understanding network discovery and network categories

R

RAID 0, Creating spanned and striped volumes, Creating spanned and striped volumes
RAID 5, Creating spanned and striped volumes, Creating spanned and striped volumes, Creating mirrored volumes
RAID controller cards, Troubleshooting startup phase 2
RAID levels, Working with basic and dynamic disks
random interface IDs, Working with TCP/IP and the Dual TCP/IP stack
reactivating
disks, Troubleshooting common disk problems, Troubleshooting common disk problems
volumes, Troubleshooting common disk problems, Resynchronizing and repairing a mirrored set, Resynchronizing and repairing a mirrored set
Read & Execute permissions, Working with and setting basic permissions
Read Attributes special permission, Assigning special permissions
Read Extended Attributes special permission, Assigning special permissions
Read permissions, Working with and setting basic permissions
Read Permissions special permission, Assigning special permissions
read-only, sharing folders and, File security and sharing options
read-write, sharing folders and, File security and sharing options
ReadyBoost, Improving disk performanceUnderstanding and using Windows SuperFetch, Understanding and using Windows ReadyBoost, Enabling and configuring Windows ReadyBoost, Enabling and configuring Windows ReadyBoost, Understanding and using Windows SuperFetch
ReadyDrive, Understanding and using Windows ReadyDrive
receive window auto tuning, Working with TCP/IP and the Dual TCP/IP stack
recovering data protected by BitLocker Drive Encryption, Recovering data protected by BitLocker Drive Encryption
recovery agents, Understanding encryption and EFS
recovery keys
FIPS compliance and, Deploying BitLocker Drive Encryption
USB flash drives, Enabling BitLocker on USB flash drives, Enabling BitLocker on system volumes
Windows Live SkyDrive and, Managing BitLocker Drive Encryption
Recovery mode, Understanding BitLocker Drive Encryption, Understanding BitLocker Drive Encryption, Managing BitLocker Drive Encryption, Recovering data protected by BitLocker Drive Encryption
recovery options, Setting startup and recovery options
recovery policy, Configuring recovery policy
RecoveryEnabled option, Setting BCD entry values
RecoverySequence option, Setting BCD entry values
Recycle Bin, File Explorer policies and, Setting Group Policy for File Explorer and folder views
redirected folders, Understanding work folders, Understanding offline files
redundancy, storage spaces and, Troubleshooting storage spaces
ReFS (Resilient File System)
data integrity and, Checking for disk errors
file security options, File security and sharing options
NTFS and, File security and sharing options
Regenerating status, Resynchronizing and repairing a mirrored set
regenerating striped with parity volumes, Creating mirrored volumes
registry hive, loading, Diagnosing and resolving startup problems, Troubleshooting startup phase 4
releasing DHCP settings, Releasing and renewing DHCP settings
remote access
DirectAccess and, Understanding mobile networking and remote access
file sharing permissions, File security and sharing options
Remote Assistance policies, Configuring Remote Assistance policiesControlling script behavior through policy, Configuring Remote Assistance policies, Configuring Remote Assistance policies, Controlling script behavior through policy
removable data drive policies, Deploying BitLocker Drive Encryption, Enabling BitLocker on USB flash drives
removable storage devices, Using the This PC console, Configuring and Maintaining Storage, Working with removable storage devices, Working with removable storage devices
Remove CD Burning Features policy, Setting Group Policy for File Explorer and folder views
Remove DFS Tab policy, Setting Group Policy for File Explorer and folder views
Remove File Explorer’s Default Context Menu policy, Setting Group Policy for File Explorer and folder views
Remove Hardware Tab policy, Setting Group Policy for File Explorer and folder views
Remove Security Tab policy, Setting Group Policy for File Explorer and folder views
Remove “Make Available Offline” Command policy, Configuring Offline File policies, Configuring Offline File policies
Remove “Map Network Drive” And “Disconnect Network Drive” policy, Setting Group Policy for File Explorer and folder views
Remove “Work Offline” Command policy, Configuring Offline File policies, Configuring Offline File policies
RemoveMemory option, Setting BCD entry values
removing
administrative templates, Adding or removing templates
sharing, File security and sharing options
renaming network connections, Renaming network connections
renewing DHCP settings, Releasing and renewing DHCP settings
repairing
disk errors, Repairing disk errors and inconsistencies, Checking for disk errors
mirrored sets, Resynchronizing and repairing a mirrored set
Require Domain Users To Elevate When Setting A Network’s Location policy, Configuring network policies
reregistering DNS, Registering and flushing DNS
rescanning
disks, Creating mirrored volumes, Troubleshooting common disk problems, Troubleshooting common disk problems, Repairing a mirrored system volume to enable boot
resiliency
type, Creating a storage pool and allocating storage
Resilient File System (ReFS), Disk management essentials, Repairing disk errors and inconsistencies, File security and sharing options
resolving
computer names to IPv4 addresses, Configuring WINS resolution
host names using DNS, Configuring DNS resolutionConfiguring WINS resolution, Advanced DNS settings, Advanced DNS settings, Configuring WINS resolution
IP addressing problems, Resolving IP addressing problems
synchronization conflicts, Resolving synchronization conflicts and errors
resources, creating shared, Creating a shared resourceCreating and managing shared folders in Group Policy, Sharing a folder and setting share permissions in Computer Management, Creating and managing shared folders in Group Policy, Creating and managing shared folders in Group Policy
Restore Operators group, File ownership and permission assignment
restoring
inherited permissions, Stopping inheritance, Restoring inherited permissions
system, configuring policies for, Configuring System Restore policies
RestrictAPICCluster option, Setting BCD entry values
restricting
drive access, Setting Group Policy for File Explorer and folder views
file sharing, File security and sharing options, File security and sharing options
Resume BCD entry, Creating and deleting BCD entries
Resume From Hibernate entry, Setting BCD entry values
ResumeObject option, Setting BCD entry values
Resynching volume status, Troubleshooting common disk problems
resynchronizing mirrored sets, Resynchronizing and repairing a mirrored set, Repairing a mirrored system volume to enable boot
retransmissions, Working with TCP/IP and the Dual TCP/IP stack
reverse lookups, Registering and flushing DNS
roaming profiles, Understanding encryption and EFS
Robust Security Network (RSN), Wireless security
Route All Traffic Through The Internal Network policy, Configuring network policies
Routing And Remote Access Service (RRAS), Understanding mobile networking and remote access, Understanding mobile networking and remote access
routing compartments, Working with TCP/IP and the Dual TCP/IP stack
RSN (Robust Security Network), Wireless security
Run Legacy Logon Scripts Hidden policy, Controlling script behavior through policy
Run Logon Scripts Synchronously policy, Controlling script behavior through policy
Run Startup Scripts Asynchronously policy, Controlling script behavior through policy
Run These Programs At User Logon policy, Setting policy-based startup programs
Run Windows PowerShell Scripts First At Computer Startup, Shutdown policy, Controlling script behavior through policy
Run Windows PowerShell Scripts First At User Logon, Logoff policy, Controlling script behavior through policy
run-once lists, disabling, Working with logon and startup policies, Disabling run lists through policy
run-time services, Boot services, run-time services, and beyond, UEFI

S

SACK-based loss recovery, Working with TCP/IP and the Dual TCP/IP stack
Safe Boot modes, Managing system boot configuration
SafeBoot option, Setting BCD entry values
scheduling
automated maintenance, Checking for disk errors
synchronization of offline files, Managing offline file synchronizationSyncing on an event or action, Scheduling syncing, Syncing on an event or action, Syncing on an event or action
script policies, Working with computer and user script policiesAssigning user logon and logoff scripts, Controlling script behavior through policy, Controlling script behavior through policy, Assigning computer startup and shutdown scripts, Assigning user logon and logoff scripts
sealing
boot manager and boot files, TPM: the essentials
keys, TPM: the essentials
searching Active Directory, Working with Network Explorer
secondary display, for mobile devices, Working with mobility settings
secure boot, Hardware encryption, secure boot, and network unlock, Hardware encryption, secure boot, and network unlock
security
802.11i standard, Wireless network devices and technologies
auditing policies, Enabling auditing for files and folders, Configuring and tracking auditing, Configuring and tracking auditing, Configuring and tracking auditing, Configuring and tracking auditing
disk format options, File security and sharing optionsControlling access to files and folders with NTFS permissions, File security and sharing options, File security and sharing options, File security and sharing options, File security and sharing options, Controlling access to files and folders with NTFS permissions
files, options for, Optimizing File SecurityControlling access to files and folders with NTFS permissions, File security and sharing options, File security and sharing options, File security and sharing options, File security and sharing options, File security and sharing options, Controlling access to files and folders with NTFS permissions
firmware interfaces and, Examining firmware interfaces
offline files, Managing encryption for offline files
wireless networks, Wireless network devices and technologies, Wireless security, Wireless security, Connecting to wireless networks
Work Folders, Creating sync shares and enabling SMB access
security identifiers (SIDs), Using disk quotas
Security Policy Editor, Deploying BitLocker Drive Encryption
Select subkey, Troubleshooting startup phase 4
Selective Acknowledgments (SACKs), Working with TCP/IP and the Dual TCP/IP stack
self-healing NTFS, Repairing disk errors and inconsistencies
Server Manager, creating sync shares in, Creating sync shares and enabling SMB accessAccessing Work Folders on clients, Creating sync shares and enabling SMB access, Creating sync shares and enabling SMB access, Accessing Work Folders on clients
Server Message Block (SMB), File security and sharing options, Sharing files and folders over the network
Server service, Troubleshooting file sharing
Services for system management BIOS (SMBIOS), Boot services, run-time services, and beyond
services, startup problems and, Managing system boot configuration
Services.exe, Diagnosing and resolving startup problems, Troubleshooting startup phase 5
sessions
burning data discs in, Disc burning: the essentials
shared folders, Using and accessing shared folders for administration
/set command, Using the BCD Editor
Set-SyncServerSetting cmdlet, Understanding work folders
setup, startup problems and, Diagnosing and resolving startup problemsTroubleshooting startup phase 3, Troubleshooting startup phase 2, Troubleshooting startup phase 3, Troubleshooting startup phase 3
Share With option, File security and sharing options
shared resources
accessing, Using and accessing shared resourcesUsing and accessing shared folders for administration, Using and accessing shared folders for administration, Using and accessing shared folders for administration, Using and accessing shared folders for administration
creating, Creating a shared resourceCreating and managing shared folders in Group Policy, Creating and managing shared folders in Group Policy
sharing files and folders
default configuration, File security and sharing options
models for, File security and sharing options, Sharing files and folders over the network
open files, Using and accessing shared folders for administration
password protection, File security and sharing options
permissions, File security and sharing options, Controlling access to network shares, Controlling access to network shares, Sharing a folder and setting share permissions in Computer Management, Sharing a folder and setting share permissions in Computer Management
public folder sharing, Using and configuring public folder sharingUnderstanding work folders, Using public folder sharing, Configuring public folder sharing, Understanding work folders
stopping, Changing or stopping sharing
sync shares, Understanding work folders, Understanding work folders
troubleshooting, Troubleshooting file sharing, Troubleshooting file sharing
user sessions, Using and accessing shared folders for administration
Work Folders, Implementing synced sharingEnabling auditing for files and folders, Understanding work folders, Understanding work folders, Creating sync shares and enabling SMB access, Enabling auditing for files and folders
shell extensions, Setting Group Policy for File Explorer and folder views
Show First Sign-in Animation policy, Working with logon and startup policies
shrinking volumes, Shrinking or extending volumes
shrpubw command, Sharing a folder and setting share permissions in Computer Management
shutdown scripts, Controlling script behavior through policyAssigning user logon and logoff scripts, Controlling script behavior through policy, Assigning user logon and logoff scripts
SIDs (security identifiers), Using disk quotas
Simple Network Protocol (SNP), UEFI
simple volumes
creating, Creating partitions, logical drives, and simple volumesCreating spanned and striped volumes, Creating spanned and striped volumes, Creating spanned and striped volumes
recovering from failures, Creating mirrored volumes
sleep power transition, Power states and power management
Sleep state, Power states and power management
SLIP, Configuring networking protocols and components
slow-link mode, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Using and accessing shared resources, Understanding offline files
small computer system interface (SCSI), UEFI
Smart Card Certificate Only mode, Understanding BitLocker Drive Encryption
smart cards with BitLocker
starting service, Managing and troubleshooting BitLocker
USB flash drives, Enabling BitLocker on USB flash drives
SMB (Server Message Block), Sharing files and folders over the network, Understanding work folders, Understanding work folders
SmbShare module, Creating a shared resource
Smss.exe, Diagnosing and resolving startup problems, Troubleshooting startup phase 5
software-based encryption, Hardware encryption, secure boot, and network unlock
Sos option, Setting BCD entry values
sound settings for mobile devices, Working with mobility settings
spanned disks, Working with basic and dynamic disks
spanned volumes, Disk management essentials, Creating spanned and striped volumes, Creating spanned and striped volumes
Data Incomplete volume status and, Troubleshooting common disk problems
special
identities, Special identities and best practices for assigning permissionsAssigning special permissions, Special identities and best practices for assigning permissions, Assigning special permissions
permissions, Special identities and best practices for assigning permissions, Assigning special permissions, Assigning special permissions, Assigning special permissions, Assigning special permissions
shares, Using and accessing shared folders for administrationTroubleshooting file sharing, Using and accessing shared folders for administration, Troubleshooting file sharing
Specify Administratively Assigned Offline Files policy, Configuring Offline File policies, Configuring Offline File policies
Specify Default Quota Limit And Warning Level policy, Configuring disk quota policies
Specify Maximum Wait Time For Group Policy Scripts policy, Controlling script behavior through policy
SpeedStep, Power states and power management
spurious retransmission timeout detection, Working with TCP/IP and the Dual TCP/IP stack
SRK (storage root key), TPM: the essentials
SSL, Work Folders and, Configuring policy for Work Folders
SSTP connection protocol, Configuring networking protocols and components
Stale Data volume status, Troubleshooting common disk problems
standard folder sharing
vs. public folder sharing, Sharing files and folders over the network
Start File Explorer With Ribbon Minimized policy, Setting Group Policy for File Explorer and folder views
Start subkey, Troubleshooting startup phase 4
startup
applications, configuring through Group Policy, Working with logon and startup policies
diagnostic, Managing system boot configuration
keys, Preparing for BitLocker Drive Encryption
modes, Firmware interface types and boot data
options, Setting startup and recovery options
policies, Working with logon and startup policiesDisabling run lists through policy, Setting policy-based startup programs, Disabling run lists through policy
process, Managing Firmware, Boot Configuration, and Startup, Firmware interface types and boot data, Power states and power management
scripts, Working with computer and user script policiesAssigning user logon and logoff scripts, Controlling script behavior through policy, Controlling script behavior through policy, Assigning computer startup and shutdown scripts, Assigning user logon and logoff scripts
troubleshooting, Diagnosing and resolving startup problems, Troubleshooting startup phase 2, Troubleshooting startup phase 3, Troubleshooting startup phase 4, Troubleshooting startup phase 5
Startup And Recovery dialog box, Managing startup and boot configuration
Startup BCD entry, Creating and deleting BCD entries
Startup Repair tool, Troubleshooting startup phase 3
static IP addresses, configuring, Configuring network connectionsConfiguring dynamic IP addresses and alternate IP addressing, Configuring a static IPv4 or IPv6 address, Configuring dynamic IP addresses and alternate IP addressing, Configuring dynamic IP addresses and alternate IP addressing
Static Root of Trust Measurement, Creating trusted platforms
status
BitLocker, Managing and troubleshooting BitLocker
Computer Browser service, Performing basic network tests
disks, Using Disk Management, Troubleshooting common disk problems, Troubleshooting common disk problems
encryption, Decrypting files and directories
file synchronization, Working with mobility settings
fragmentation, Defragmenting disks
mirrored volumes, Creating mirrored volumes, Resynchronizing and repairing a mirrored set, Repairing a mirrored system volume to enable boot
mobile device batteries, Configuring networking for mobile devices
network connections, Enabling and disabling network connections
networks, Working with Network And Sharing Center
recovering volumes and, Creating mirrored volumes
regenerating striped sets with parity, Creating mirrored volumes
removable media disks, Understanding drive designations
TPM, TPM: the essentials, TPM: management and policies
volumes, Troubleshooting common disk problems
wireless connections, Working with wireless networks and wireless connections, Working with wireless networks and wireless connections
storage
pools, Getting started with storage spaces, Working with storage pools, Creating a storage pool and allocating storage
spaces, Using storage spacesTroubleshooting storage spaces, Creating redundant data sets, Creating a storage pool and allocating storage, Creating a storage pool and allocating storage, Creating a storage pool and allocating storage, Changing the storage configuration, Deleting a storage pool, Troubleshooting storage spaces
types, Disk management essentials
storage root key (SRK), TPM: the essentials
/store command, Using the BCD Editor
striped volumes, Creating spanned and striped volumes, Creating spanned and striped volumes, Creating mirrored volumes
striping disks, Working with basic and dynamic disks
striping with parity, Creating spanned and striped volumes, Creating mirrored volumes, Creating redundant data sets
strong invitation encryption, Configuring Remote Assistance policies, Configuring Remote Assistance policies
SuperFetch, Understanding and using Windows SuperFetchWorking with basic and dynamic disks, Understanding and using Windows SuperFetch, Understanding and using Windows SuperFetch, Working with basic and dynamic disks
suspend mode, Power states and power management
symmetric network address translators, Working with TCP/IP and the Dual TCP/IP stack
Sync Center
disabling offline files, Managing encryption for offline files
disk usage limits, Configuring disk usage limits for offline files
encrypting offline files, Managing encryption for offline files
synchronizing offline files, Managing offline file synchronizationResolving synchronization conflicts and errors, Managing offline file synchronization, Scheduling syncing, Syncing on an event or action, Resolving synchronization conflicts and errors, Resolving synchronization conflicts and errors
sync partnerships, Step 3: Specify the offline files and folders to use
sync shares, Managing File Sharing and Auditing, Implementing synced sharing, Understanding work folders, Understanding work folders, Creating sync shares and enabling SMB access, Creating sync shares and enabling SMB access, Creating sync shares and enabling SMB access, Accessing Work Folders on clients
synchronizing devices, Work Folders and, Configuring policy for Work Folders
synchronizing offline files
background sync, Using and accessing shared resources
changes only, Understanding offline files
managing, Step 3: Specify the offline files and folders to useResolving synchronization conflicts and errors, Resolving synchronization conflicts and errors
on costed networks, Understanding offline files
policies, Configuring Offline File policies, Configuring Offline File policies
slow-link mode, Configuring Offline File policies
/sysstore command, Using the BCD Editor
system
boot configuration, Managing system boot configurationUsing the BCD Editor, Managing system boot configuration, Managing system boot configuration, Using the BCD Editor
cache, Understanding and using Windows ReadyBoost
log, Group Policy essentials
partitions, Understanding drive designations
properties, Using the This PC console
volumes, Enabling BitLocker on system volumes, Resynchronizing and repairing a mirrored set
system abstraction layer (SAL), UEFI
System Configuration utility, Managing system boot configuration
System on a Chip (SoC), Navigating and understanding firmware options
System Restore policies, Configuring System Restore policies
SystemRoot option, Setting BCD entry values

T

taking ownership of files and folders, Working with and setting basic permissions, Assigning special permissions, File ownership and permission assignment, File ownership and permission assignment
TargetName option, Setting BCD entry values
Task Scheduler, Defragmenting disks
TCP extended statistics, Working with TCP/IP and the Dual TCP/IP stack
TCP port 139, File security and sharing options
TCP/IP networking
alternate private IP addresses, Configuring alternate private IP addresses
default component configuration, Configuring networking protocols and components
default gateways, configuring multiple, Configuring multiple gateways
DNS settings, Basic DNS settingsConfiguring WINS resolution, Advanced DNS settings, Advanced DNS settings, Configuring WINS resolution
dynamic IP addresses, configuring, Configuring dynamic IP addresses
features, list of, Working with TCP/IP and the Dual TCP/IP stack
installing, Installing networking services and TCP/IP
IPv4 and IPv6 and, Working with TCP/IP and the Dual TCP/IP stack
protocols described, Working with TCP/IP and the Dual TCP/IP stack
WINS, Configuring WINS resolutionEnabling and disabling network connections, Configuring WINS resolution, Configuring WINS resolution, Enabling and disabling network connections
TestSigning option, Setting BCD entry values
This PC console
removable disks, Working with removable storage devices
thumbnails, File Explorer and, Customizing File Explorer
Time to Live (TTL) values, Registering and flushing DNS, Registering and flushing DNS
time, setting through firmware interface, Examining firmware interfaces
/timeout command, Using the BCD Editor, Changing the default timeout
/toolsdisplayorder command, Using the BCD Editor
TPM (Trusted Platform Module) Management console
initializing TPM, Initializing and preparing a TPM for first use
managing TPM with, TPM: management and policies
TPM (Trusted Platform Module) Services
administrative delegation blob, TPM: management and policies
authentication methods, Preparing for BitLocker Drive Encryption
BitLocker Drive Encryption and, TPM: the essentials, TPM: the essentials
clearing, Clearing the TPM
defined, Creating trusted platforms
enabling, Enabling TPM
initializing, Initializing and preparing a TPM for first useInitializing and preparing a TPM for first use, Initializing and preparing a TPM for first use
keys, TPM: the essentials
lockout, TPM: management and policies
modes, Understanding BitLocker Drive Encryption
owner authorization, TPM: management and policies, Deploying BitLocker Drive Encryption
owner passwords, TPM: management and policies, TPM: management and policies, Enabling TPM, Initializing and preparing a TPM for first use, Initializing and preparing a TPM for first use, Changing the TPM owner password
process, TPM: the essentials
states, TPM: management and policies
status, TPM: management and policies
turning off, Turning an initialized TPM on or off
user delegation blob, TPM: management and policies
validation profile settings, Hardware encryption, secure boot, and network unlock
TPM Security Hardware Wizard, Initializing and preparing a TPM for first use
Transactional NTFS, Repairing disk errors and inconsistencies
transfer rates, Working with removable storage devices, Working with removable storage devices
transferring ownership of a file, File ownership and permission assignment
transparent caching, Configuring Offline File policies
Traverse Folder/Execute File special permission, Assigning special permissions
troubleshooting
BitLocker Drive Encryption, Managing and troubleshooting BitLockerDisabling or turning off BitLocker Drive Encryption, Recovering data protected by BitLocker Drive Encryption, Disabling or turning off BitLocker Drive Encryption
broadband connections, Establishing a broadband connection
dial-up connections, Establishing a dial-up connection
disk problems, Troubleshooting common disk problems, Troubleshooting common disk problems, Troubleshooting common disk problems, Troubleshooting common disk problems, Troubleshooting common disk problems, Troubleshooting common disk problems
Group Policy, Group Policy essentials
network connections, Working with Network And Sharing Center, Working with TCP/IP and the Dual TCP/IP stack
permissions, Restoring inherited permissionsDetermining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting, Determining the effective permissions and troubleshooting
startup, Diagnosing and resolving startup problemsTroubleshooting startup phase 5, Diagnosing and resolving startup problems, Diagnosing and resolving startup problems, Troubleshooting startup phase 2, Troubleshooting startup phase 4, Troubleshooting startup phase 4, Troubleshooting startup phase 5
storage spaces, Deleting a storage pool
TCP/IP, Troubleshooting and testing network settingsRegistering and flushing DNS, Performing basic network tests, Registering and flushing DNS, Registering and flushing DNS
VPN connections, Establishing a VPN connection
wireless connections, Working with wireless networks and wireless connections
wireless networks, Connecting to wireless networks
TruncateMemory option, Setting BCD entry values
trusted boot, Hardware encryption, secure boot, and network unlock
Trusted Computing Group (TCG)-compliant firmware, Creating trusted platforms
Turn Off App Notifications On the Lock Screen policy, Working with logon and startup policies
Turn Off Caching Of Thumbnail Pictures policy, Setting Group Policy for File Explorer and folder views
Turn Off Configuration policy, Configuring System Restore policies
Turn Off Picture Password Sign-in policy, Working with logon and startup policies
Turn Off System Restore policy, Configuring System Restore policies
Turn Off The Display Of Thumbnails And Only Display Icons On Network Folders policy, Setting Group Policy for File Explorer and folder views
Turn Off The Display Of Thumbnails And Only Display Icons policy, Setting Group Policy for File Explorer and folder views
Turn Off Windows Libraries Features That Rely On Indexed File Data, Setting Group Policy for File Explorer and folder views
Turn On Economical Application Of Administratively Assigned Offline Files policy, Configuring Offline File policies
Turn On PIN Sign-In policy, Working with logon and startup policies
turning off
TPM, Turning an initialized TPM on or off
two-way mirrors, storage spaces and, Creating redundant data sets

U

UDF (Universal Disc Format), Disc burning: the essentials
UDP port 137, File security and sharing options
UDP port 138, File security and sharing options
UEFI (Unified Extensible Firmware Interface), Firmware interface types and boot data, Boot services, run-time services, and beyond, UEFI, UEFI, Hardware encryption, secure boot, and network unlock, Hardware encryption, secure boot, and network unlock
UNC path, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Sharing a resource and setting share permissions in File Explorer
unicast IPv4 addresses, Working with TCP/IP and the Dual TCP/IP stack
unicast IPv6 addresses, Working with TCP/IP and the Dual TCP/IP stack
uninstalling programs, Using the This PC console
Universal Disc Format (UDF), Disc burning: the essentials
Unknown volume status, Troubleshooting common disk problems
unlocking
from Recovery mode, Managing and troubleshooting BitLocker
operating system drive, Hardware encryption, secure boot, and network unlock
USB flash drives, Enabling BitLocker on USB flash drives
Unreadable status
disks, Troubleshooting common disk problems
drives, Creating mirrored volumes, Resynchronizing and repairing a mirrored set
Unrecognized disk status, Troubleshooting common disk problems
updating firmware interfaces, Working with firmware interfaces
USB Emulation, Examining firmware interfaces
USB flash drives
BitLocker To Go and, BitLocker Drive Encryption: the essentials
encrypting, Enabling BitLocker on USB flash drivesEnabling BitLocker on system volumes, Enabling BitLocker on USB flash drives, Enabling BitLocker on system volumes
Windows ReadyBoost and, Enabling and configuring Windows ReadyBoost, Enabling and configuring Windows ReadyBoost
USB PowerShare, Examining firmware interfaces
USB Wake Support, Examining firmware interfaces
UseFirmwarePCISettings option, Setting BCD entry values
user logoff scripts, Working with computer and user script policiesAssigning user logon and logoff scripts, Controlling script behavior through policy, Controlling script behavior through policy, Assigning user logon and logoff scripts, Assigning user logon and logoff scripts
user logon scripts, Working with computer and user script policiesAssigning user logon and logoff scripts, Controlling script behavior through policy, Controlling script behavior through policy, Assigning user logon and logoff scripts, Assigning user logon and logoff scripts
user policies
administrative templates, Viewing policies and templates, Adding or removing templates
network, Working with access and connectivity policies, Configuring network policies
offline files, Configuring Offline File policiesConfiguring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies, Configuring Offline File policies
user processes, Windows SuperFetch and, Understanding and using Windows SuperFetch
User-specific local Group Policy, Accessing and using local group policies
Userinit.exe, Diagnosing and resolving startup problems, Troubleshooting startup phase 5
Users special identity, Special identities and best practices for assigning permissions

V

/v command, Using the BCD Editor
validating platform configuration registers, Hardware encryption, secure boot, and network unlock
verbose mode, Using the BCD Editor
Vga option, Setting BCD entry values
viewing inherited permissions, Viewing inherited permissions
virtual discs, ISO images and, Mounting ISO images
virtual private network (VPN), Managing Mobile Networking and Remote Access
volumes
basic, Disk management essentials
basic drives and, Creating partitions, logical drives, and simple volumes
deleting, Creating mirrored volumes
dynamic disks and, Disk management essentials
formatting, Creating partitions, logical drives, and simple volumes, Formatting partitions and volumes
mirroring, Creating mirrored volumes
mobile devices, settings for, Working with mobility settings
partitions, Formatting partitions and volumes
simple, Creating partitions, logical drives, and simple volumesCreating spanned and striped volumes, Creating partitions, logical drives, and simple volumes, Creating spanned and striped volumes
spanned, Creating spanned and striped volumes, Creating spanned and striped volumes
striped, Creating spanned and striped volumes, Creating spanned and striped volumes
striped with parity, Creating spanned and striped volumes, Creating spanned and striped volumes
VPN connections
broadband connections and, Understanding mobile networking and remote access
creating, Creating a VPN connectionJoining a device to a workplace, Joining a device to a workplace, Configuring connection properties
dial-up connections and, Understanding mobile networking and remote access
establishing, Establishing a VPN connection

W

wake power transition, Power states and power management
well-known identifiers, BCD store and, Viewing BCD entries, Creating and deleting BCD entries
WEP (Wireless Equivalent Privacy), Wireless securityWorking with wireless networks and wireless connections, Installing and configuring a wireless adapter, Working with wireless networks and wireless connections
Wi-Fi connections, Working with wireless networks and wireless connectionsConnecting to wireless networks, Working with wireless networks and wireless connections, Working with wireless networks and wireless connections, Connecting to wireless networks
Wi-Fi Protected Access 2 (WPA2), Wireless network devices and technologiesInstalling and configuring a wireless adapter, Wireless security, Wireless security, Installing and configuring a wireless adapter
Win32 subsystem, Diagnosing and resolving startup problems, Troubleshooting startup phase 5
Windows Boot Loader
startup process and, Troubleshooting startup phase 3, Troubleshooting startup phase 4
Windows Boot Manager
as default, Firmware interface types and boot data
Windows Boot Sector Application, Using the BCD Editor
Windows BranchCache, Using branch cachingUsing branch caching, Using branch caching, Using branch caching, Using branch caching, Using branch caching
Windows executive, Diagnosing and resolving startup problems, Diagnosing and resolving startup problems, Diagnosing and resolving startup problems
Windows Filtering Platform, Working with TCP/IP and the Dual TCP/IP stack
Windows Firewall
connections, enabling and disabling for, Configuring networking protocols and components
File and Printer Sharing exception, File security and sharing options
network categories and, Understanding network discovery and network categories
network discovery and, Understanding network discovery and network categories
network projectors and, Connecting to networked projectors
Windows Live SkyDrive, recovery keys and, Managing BitLocker Drive Encryption
Windows Logon user interface, Working with logon and startup policies
Windows Memory Tester, Setting BCD entry values
Windows Mobility Center, Working with mobility settings, Working with mobility settings
Windows Network Diagnostics, Diagnosing and resolving network connection problems
Windows OS Loader, Setting BCD entry values, Setting BCD entry values, Setting BCD entry values
Windows Phone operating system, as Windows On Arm, Navigating and understanding firmware options
Windows PowerShell scripts, Working with computer and user script policiesAssigning computer startup and shutdown scripts, Controlling script behavior through policy, Controlling script behavior through policy, Assigning computer startup and shutdown scripts
Windows PreInstallation Environment (Windows PE), Hardware encryption, secure boot, and network unlock
Windows ReadyBoost, Understanding and using Windows ReadyBoostUnderstanding and using Windows SuperFetch, Understanding and using Windows ReadyBoost, Enabling and configuring Windows ReadyBoost, Enabling and configuring Windows ReadyBoost, Understanding and using Windows SuperFetch
Windows ReadyDrive, Understanding and using Windows ReadyDrive
Windows Recovery Environment (Windows RE), Deploying BitLocker Drive Encryption
Windows Resume Loader, Using the BCD Editor
Windows RT, as Windows On Arm, Navigating and understanding firmware options
Windows SuperFetch, Understanding and using Windows SuperFetch, Working with basic and dynamic disks, Working with basic and dynamic disks
WinPE option, Setting BCD entry values
Winresume.exe, Setting BCD entry values
WINS resolution, configuring, Configuring WINS resolutionEnabling and disabling network connections, Configuring WINS resolution, Configuring WINS resolution, Enabling and disabling network connections
Wired Equivalent Privacy (WEP), Wireless security
wireless access points
connecting to, Connecting to wireless networks
wireless network adapters
standards, Wireless network devices and technologies, Wireless network devices and technologies
wireless networks
access points, Wireless network devices and technologies, Wireless network devices and technologies, Wireless network devices and technologies
adapters, Wireless network devices and technologies, Wireless network devices and technologies, Wireless network devices and technologies, Installing and configuring a wireless adapter
connecting to, Connecting to wireless networks
connections, Working with wireless networks and wireless connectionsConnecting to wireless networks, Working with wireless networks and wireless connections, Working with wireless networks and wireless connections, Connecting to wireless networks
disconnecting from, Connecting to wireless networks
managing, Managing and troubleshooting wireless networking
security, Wireless network devices and technologiesInstalling and configuring a wireless adapter, Wireless security, Wireless security, Installing and configuring a wireless adapter
settings, Working with wireless networks and wireless connections
technologies, list of, Wireless network devices and technologies
troubleshooting, Managing and troubleshooting wireless networking
WOA (Windows On Arm)
ACPI and, UEFI
UEFI and, UEFI
Work Folders, Configuring policy for Work Folders, Configuring policy for Work Folders, Implementing synced sharing, Understanding work folders, Understanding work folders, Creating sync shares and enabling SMB access, Creating sync shares and enabling SMB access, Creating sync shares and enabling SMB access, Accessing Work Folders on clients
workgroups, password protected sharing and, File security and sharing options
workplaces
connecting to, Connecting to a workplace
dial-up connections to, Creating a dial-up Internet connection to an ISP
WPA2, Wireless network devices and technologiesInstalling and configuring a wireless adapter, Wireless security, Wireless security, Installing and configuring a wireless adapter
wrapping keys, TPM Services and, TPM: the essentials
Write Attributes special permission, Assigning special permissions
Write Extended Attributes special permission, Assigning special permissions
Write permissions, Working with and setting basic permissions
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset