E

E$ shares, Hiding and controlling share access
earthquakes protection, Planning for support structures and facilities
Echo command, Accessing a command prompt during installation
Edit DWORD Value dialog box, Modifying values
Edit Keywords dialog box, Publishing shares in Active Directory
Edit Multi-String dialog box, Modifying values
Edit String dialog box, Modifying values
EFI (Extensible Firmware Interface)–based systems, Preinstallation tasks, Installation on BIOS-based systems, Diagnosing hardware and firmware startup problems, Diagnosing hardware and firmware startup problems, Resolving hardware and firmware startup problems, Resolving hardware and firmware startup problems, Boot environment essentials, Using the MBR and GPT partition styles, Working with GPT disks, Managing GPT disk partitions on basic disks, Hardware-encrypted drives
BCD registry, Boot environment essentials
boot environment, Resolving hardware and firmware startup problems
described, Resolving hardware and firmware startup problems, Working with GPT disks
ESP partitions, Managing GPT disk partitions on basic disks
Hyper-V and, Using the MBR and GPT partition styles
installing, Preinstallation tasks, Installation on BIOS-based systems
startup problems, Diagnosing hardware and firmware startup problems, Diagnosing hardware and firmware startup problems
UEFI and, Hardware-encrypted drives
EFI system partition (ESP), Installation on BIOS-based systems, Resolving hardware and firmware startup problems, Working with GPT disks, Managing GPT disk partitions on basic disks, Mirroring boot and system volumes on GPT disks
creating, Mirroring boot and system volumes on GPT disks
described, Installation on BIOS-based systems
GPT disks, Resolving hardware and firmware startup problems, Working with GPT disks, Managing GPT disk partitions on basic disks
EFI_ STORAGE_ SECURITY_COMMAND_PROTOCOL, Hardware-encrypted drives
EFS (Encrypting File System), TPM and BitLocker Drive Encryption, Understanding Work Folders and sync shares
EIDE (enhanced integrated drive electronics), Choosing internal devices
EIST (Enhanced Intel SpeedStep Technology), Diagnosing hardware and firmware startup problems
elevation (UAC), Elevation, prompts, and the secure desktop, Configuring UAC and Admin Approval Mode, Application access tokens, Application run levels
email notifications, Managing file screening and storage reporting, Configuring email notifications, Configuring email notifications
configuring, Managing file screening and storage reporting
configuring limits, Configuring email notifications
resolving problems, Configuring email notifications
Emergency Management Services (EMS), Working with BCD Editor, Setting BCD entry values
emergency response teams, Planning for day-to-day operations
EMS (Emergency Management Services), Working with BCD Editor, Setting BCD entry values
Enable- cmdlets, Using Windows PowerShell
Enable-MSDSMAutomaticClaim cmdlet, Configuring multipath I/O
Enable-Windowsoptionalfeature cmdlet, Provisioning BitLocker prior to deployment
Encrypting File System (EFS), TPM and BitLocker Drive Encryption, Understanding Work Folders and sync shares
encryption., Booting from SANs and using SANs with clusters, Working with trusted platforms, BitLocker modes, BitLocker changes, Optimizing encryption, Optimizing encryption, Optimizing encryption, Deploying BitLocker Drive Encryption, Deploying BitLocker Drive Encryption, Creating shared folders in Server Manager, Understanding Work Folders and sync shares
(see also BitLocker Drive Encryption)
data access, Creating shared folders in Server Manager
FIPS-compliant algorithms, Deploying BitLocker Drive Encryption
hardware, BitLocker changes
optimizing, Optimizing encryption
setting permitted types, Optimizing encryption
SMB, Booting from SANs and using SANs with clusters
sync shares, Understanding Work Folders and sync shares
TPM, Working with trusted platforms
volumes, Optimizing encryption, Deploying BitLocker Drive Encryption
Endlocal command, Accessing a command prompt during installation
enhanced integrated drive electronics (EIDE), Choosing internal devices
Enhanced Intel SpeedStep Technology (EIST), Diagnosing hardware and firmware startup problems
Enhanced Security Configuration dialog box, Getting to know Server Manager
Enhanced Storage feature, Using roles, role services, and features, Storage-management features and tools, BitLocker changes
Enter-Pssession cmdlet, Enabling remote management
enterprise ID, Understanding Work Folders and sync shares
Enumerate Subkeys permission, Applying permissions to registry keys
enumeration, access-based, Hiding and controlling share access, Creating shared folders in Server Manager
EPTs (extended page tables), Understanding Hyper-V
Erase command, Accessing a command prompt during installation
Error Checking dialog box, Preventing disk-integrity problems
Error event level, Accessing the event logs and viewing events
error events, Tracking the overall reliability of the server, Booting from SANs and using SANs with clusters
eSATA (external SATA), Choosing internal devices, Choosing external devices, Installing new devices
ESP (EFI system partition), Installation on BIOS-based systems, Resolving hardware and firmware startup problems, Working with GPT disks, Managing GPT disk partitions on basic disks, Mirroring boot and system volumes on GPT disks
creating, Mirroring boot and system volumes on GPT disks
described, Installation on BIOS-based systems
GPT disks, Resolving hardware and firmware startup problems, Working with GPT disks, Managing GPT disk partitions on basic disks
Ethernet, Choosing internal devices, Using internal and external storage devices
evaluation licenses, Activation sequence
evaluation period, Performing an upgrade installation
event logs, Enabling remote management, Computer Management system tools, Understanding the event logs, Understanding the event logs, Accessing the event logs and viewing events, Viewing event logs on remote systems, Viewing event logs on remote systems, Filtering the event logs, Filtering the event logs, Filtering the event logs, Archiving event logs, Configuring email notifications
accessing, Understanding the event logs
archiving, Filtering the event logs
as troubleshooting aid, Configuring email notifications
deleting, Archiving event logs
described, Enabling remote management, Understanding the event logs
filtering, Filtering the event logs
Properties dialog box, Filtering the event logs
searching, Viewing event logs on remote systems
sorting, Viewing event logs on remote systems
viewing, Computer Management system tools
viewing on remote systems, Accessing the event logs and viewing events
Event Trace Providers dialog box, Collecting performance trace data
event traces, Creating and managing data collector sets
Event Viewer, Using graphical administrative tools, Using graphical administrative tools, Computer Management system tools, MMC window and startup, MMC tool availability, Understanding the event logs, Understanding the event logs, Accessing the event logs and viewing events, Accessing the event logs and viewing events, Accessing the event logs and viewing events, Accessing the event logs and viewing events, Viewing event logs on remote systems, Viewing event logs on remote systems, Filtering the event logs, Filtering the event logs, Using subscriptions and forwarded events, Monitoring the security logs
accessing event logs, Understanding the event logs
Applications and Services Logs node, Accessing the event logs and viewing events
archiving event logs, Filtering the event logs
described, Using graphical administrative tools, Computer Management system tools, MMC tool availability
filtering event logs, Filtering the event logs
reviewing tracked events, Accessing the event logs and viewing events
searching event logs, Viewing event logs on remote systems
selecting computers to work with, Using graphical administrative tools
sorting event logs, Viewing event logs on remote systems
starting, MMC window and startup
Subscription node, Using subscriptions and forwarded events
viewing event logs on remote systems, Accessing the event logs and viewing events
viewing events, Understanding the event logs
viewing Security log, Monitoring the security logs
Windows Logs node, Accessing the event logs and viewing events
events, Getting information on user and remote user sessions, Understanding the event logs, Understanding the event logs, Accessing the event logs and viewing events, Viewing event logs on remote systems, Viewing event logs on remote systems, Filtering the event logs, Tracking events using Windows PowerShell, Tracking events using Windows PowerShell, Tracking events using Windows PowerShell, Tracking the overall reliability of the server, Booting from SANs and using SANs with clusters
CEIP, Tracking the overall reliability of the server
defined, Getting information on user and remote user sessions
error, Booting from SANs and using SANs with clusters
filtering event logs, Filtering the event logs
forwarded, Tracking events using Windows PowerShell
Properties dialog box, Accessing the event logs and viewing events, Tracking events using Windows PowerShell
searching event logs, Viewing event logs on remote systems
sorting event logs, Viewing event logs on remote systems
tracking via event logs, Understanding the event logs
tracking with PowerShell, Tracking events using Windows PowerShell
viewing, Understanding the event logs
Everyone group, ADMIN$, Creating shares by using Computer Management, Configuring share permissions, Troubleshooting permissions
exception paths, Understanding file screening and storage reporting, Managing file-screen templates
execute disable (XD) bit, Meeting performance, capacity, and availability requirements
Execute File permission, Basic permissions, Special permissions
exFAT file system, Understanding legacy and protective MBRs, Converting FAT or FAT32 to NTFS, Extending partitions, Enabling BitLocker on fixed data drives, Understanding the disk and file-system structure, FAT features, ReFS integrity streams, data scrubbing, and salvage, Preventing disk-integrity problems, Running Check Disk interactively, Preventing fragmentation of disks, File-sharing essentials
Check Disk tool, Preventing disk-integrity problems, Running Check Disk interactively
compression and, ReFS integrity streams, data scrubbing, and salvage
default cluster sizes, Understanding the disk and file-system structure
enabling BitLocker, Enabling BitLocker on fixed data drives
extending volumes, Extending partitions
feature comparisons, FAT features
formatting MBR partitions, Understanding legacy and protective MBRs
formatting removable disks, Converting FAT or FAT32 to NTFS
Optimize Drives utility, Preventing fragmentation of disks
standard file sharing, File-sharing essentials
Exit command, Accessing a command prompt during installation
Exit-Pssession cmdlet, Enabling remote management
Expand utility, Accessing a command prompt during installation, NTFS compression
explicit trust relationships, Designing the Active Directory namespace
Export Quota Settings dialog box, Managing disk quotas after configuration
Export Registry File dialog box, Importing and exporting registry data
exporting, Creating and identifying the BCD store, Modifying the registry of a remote machine, Managing disk quotas after configuration
BCD store, Creating and identifying the BCD store
quota entries, Managing disk quotas after configuration
registry data, Modifying the registry of a remote machine
ExpressCard devices, Installing new devices
Extend Volume Wizard, Extending partitions
extended page tables (EPTs), Understanding Hyper-V
extending partitions, Creating, deleting, and extending disk partitions during installation, Using the MBR and GPT partition styles, Working with basic and dynamic disks, Configuring mount points
Extensible Firmware Interface (EFI)–based systems, Preinstallation tasks, Installation on BIOS-based systems, Diagnosing hardware and firmware startup problems, Diagnosing hardware and firmware startup problems, Resolving hardware and firmware startup problems, Resolving hardware and firmware startup problems, Boot environment essentials, Using the MBR and GPT partition styles, Working with GPT disks, Managing GPT disk partitions on basic disks, Hardware-encrypted drives
BCD registry, Boot environment essentials
boot environment, Resolving hardware and firmware startup problems
described, Resolving hardware and firmware startup problems, Working with GPT disks
ESP partitions, Managing GPT disk partitions on basic disks
Hyper-V and, Using the MBR and GPT partition styles
installing, Preinstallation tasks, Installation on BIOS-based systems
startup problems, Diagnosing hardware and firmware startup problems, Diagnosing hardware and firmware startup problems
UEFI and, Hardware-encrypted drives
Extensible Markup Language (XML), Working with device drivers, Tracking the overall reliability of the server, Preparing and initializing a TPM for first use
extension components, MMC snap-ins
Extensions For dialog box, Step 2: Adding snap-ins to the console
external hardware devices, Choosing internal devices, Installing new devices, Essential storage technologies
external SATA (eSATA), Choosing internal devices, Choosing external devices, Installing new devices
Extraction Wizard, Compressed (zipped) folders
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset