P

p-states, Diagnosing hardware and firmware startup problems
PAE (Physical Address Extension), Creating, copying, and deleting BCD entries, Changing Data Execution Prevention and physical address extension options
page file partition/volume, Installing Windows Server 2012 R2
page file partitions/volumes, Installing Windows Server 2012 R2, Working with basic and dynamic disks
page file-backed virtual memory, Tuning virtual memory
paged pool, Resolving performance bottlenecks
paging file, Installing Windows Server 2012 R2, Understanding the registry structure, Tuning virtual memory, Tuning virtual memory, Tuning virtual memory, Other important tuning, memory, and data considerations, Other important tuning, memory, and data considerations, Other important tuning, memory, and data considerations, Using Performance Monitor, Resolving memory bottlenecks
address space limits, Tuning virtual memory
BIOS-based systems and, Installing Windows Server 2012 R2
managing configuration, Other important tuning, memory, and data considerations
memory bottlenecks and, Resolving memory bottlenecks
monitoring performance, Using Performance Monitor
RAID configuration and, Tuning virtual memory
registry structure and, Understanding the registry structure
setting for individual drives, Other important tuning, memory, and data considerations
troubleshooting, Other important tuning, memory, and data considerations
tuning virtual memory, Tuning virtual memory
Paging File performance object, Using Performance Monitor
Paging File\%Usage counter, Resolving memory bottlenecks
Paging File\%Usage Peak counter, Resolving memory bottlenecks
Parallel ATA (PATA), Choosing internal devices
Parallel SCSI (SPI), Choosing internal devices
parity volumes, Creating storage spaces, Creating a standard volume
partitions, Product licensing, Preinstallation tasks, Preinstallation tasks, Installing Windows Server 2012 R2, Installing Windows Server 2012 R2, Installing Windows Server 2012 R2, Installing Windows Server 2012 R2, Installing Windows Server 2012 R2, Installation on BIOS-based systems, Planning partitions, Performing a clean installation, Accessing a command prompt during installation, Creating, deleting, and extending disk partitions during installation, Creating, deleting, and extending disk partitions during installation, Creating, deleting, and extending disk partitions during installation, Postinstallation tasks, Resolving hardware and firmware startup problems, Resolving hardware and firmware startup problems, Configuring disks and storage, Using the Disk Management tools, Using the MBR and GPT partition styles, Using the MBR and GPT partition styles, Working with GPT disks, Working with GPT disks, Understanding legacy and protective MBRs, Working with basic and dynamic disks, Working with basic and dynamic disks, Working with basic and dynamic disks, Working with basic and dynamic disks, Using and converting basic and dynamic disks, Using and converting basic and dynamic disks, Working with removable disks, Creating partitions and simple volumes, Creating partitions and simple volumes, Formatting a partition, logical drive, or volume, Configuring mount points, Configuring mount points, Shrinking partitions, Deleting a partition, logical drive, or volume, ESP, MSR partitions, LDM Metadata and LDM Data partitions, LDM Metadata and LDM Data partitions, Mirroring boot and system volumes on GPT disks, Deploying BitLocker Drive Encryption, Object identifiers
active, Installing Windows Server 2012 R2, Working with basic and dynamic disks, Deploying BitLocker Drive Encryption
BIOS-based systems, Preinstallation tasks, Resolving hardware and firmware startup problems
boot., Using the MBR and GPT partition styles (see boot partitions/volumes)
choosing format, Creating partitions and simple volumes
clean installations, Performing a clean installation
crash dump, Installing Windows Server 2012 R2, Working with basic and dynamic disks
creating, Working with removable disks
creating additional, Planning partitions
creating during installation, Creating, deleting, and extending disk partitions during installation
defined, Configuring disks and storage
deleting, Deleting a partition, logical drive, or volume
deleting during installation, Creating, deleting, and extending disk partitions during installation
EFI-based systems, Installing Windows Server 2012 R2, Resolving hardware and firmware startup problems
extending, Creating, deleting, and extending disk partitions during installation, Using the MBR and GPT partition styles, Working with basic and dynamic disks, Configuring mount points
forcing removal during installation, Accessing a command prompt during installation
formatting, Understanding legacy and protective MBRs, Creating partitions and simple volumes
GPT., Working with GPT disks (see GPT (GUID partition table))
LDM Data, Using and converting basic and dynamic disks, LDM Metadata and LDM Data partitions
LDM Metadata, Using and converting basic and dynamic disks, ESP, LDM Metadata and LDM Data partitions
listing, Using the Disk Management tools
MBR., Working with GPT disks (see MBR (master boot record))
mount points, Configuring mount points, Object identifiers
page file, Installing Windows Server 2012 R2, Working with basic and dynamic disks
planning, Installation on BIOS-based systems
postinstallation tasks, Postinstallation tasks
preinstallation tasks, Product licensing, Preinstallation tasks
primary., MSR partitions (see primary partitions)
shrinking, Shrinking partitions
system., Mirroring boot and system volumes on GPT disks (see system partitions/volumes)
unformatted disk space and, Formatting a partition, logical drive, or volume
volumes and, Installing Windows Server 2012 R2
passive cooling mode, Diagnosing hardware and firmware startup problems
passive screening, Managing file screening and storage reporting
passwords., Performing a clean installation, Elevation, prompts, and the secure desktop, Elevation, prompts, and the secure desktop, Managing TPM owner authorization information, Preparing and initializing a TPM for first use, Clearing the TPM, BitLocker modes, Enabling BitLocker on fixed data drives, Managing and troubleshooting BitLocker, Enabling file sharing
(see also recovery keys or passwords)
Administrator account, Performing a clean installation
BitLocker, Enabling BitLocker on fixed data drives, Managing and troubleshooting BitLocker
password-protected sharing, Enabling file sharing
TPM, Managing TPM owner authorization information, Preparing and initializing a TPM for first use, Clearing the TPM
UAC, Elevation, prompts, and the secure desktop
unlock, BitLocker modes
PATA (Parallel ATA), Choosing internal devices
Path command, Accessing a command prompt during installation
Pathping command, Accessing a command prompt during installation, Utilities to know
Pause command, Accessing a command prompt during installation
payloads, Removing server roles and features
PCI (Peripheral Component Interconnect), Diagnosing hardware and firmware startup problems, Troubleshooting hardware
PCIe devices, Installing new devices
PCRs (Platform Configuration Registers), Preparing BitLocker for startup authentication and secure boot
PE (Preinstallation Environment), Getting a quick start, Accessing a command prompt during installation, Provisioning BitLocker prior to deployment
Peer Name Resolution Protocol (PNRP), Using roles, role services, and features
performance analysis and logging, Comprehensive performance analysis and logging, Comprehensive performance analysis and logging, Tracking the overall reliability of the server, Resolving performance bottlenecks, Resolving network bottlenecks
comprehensive performance monitoring, Tracking the overall reliability of the server
establishing performance baselines, Comprehensive performance analysis and logging
performance logging, Resolving network bottlenecks
resolving performance bottlenecks, Resolving performance bottlenecks
tools and features, Comprehensive performance analysis and logging
performance baselines, Establishing performance baselines, Tracking per-process resource usage, Tracking per-process network utilization
tracking per-process resource usage, Tracking per-process resource usage
tracking server reliability, Tracking per-process network utilization
types of, Establishing performance baselines
performance bottlenecks, Resolving performance bottlenecks, Resolving performance bottlenecks, Resolving memory bottlenecks, Resolving processor bottlenecks, Resolving disk I/O bottlenecks
described, Resolving performance bottlenecks
resolving disk I/O bottlenecks, Resolving processor bottlenecks
resolving memory bottlenecks, Resolving performance bottlenecks
resolving network bottlenecks, Resolving disk I/O bottlenecks
resolving processor bottlenecks, Resolving memory bottlenecks
Performance Counter data collector set type, Creating and managing data collector sets, Using data collector templates
performance counters, Comprehensive performance analysis and logging, Tracking per-process network utilization, Using Performance Monitor, Using Performance Monitor, Selecting performance objects and counters to monitor, Choosing views and controlling the display, Using data collector templates, Configuring performance counter alerts
collecting data, Using data collector templates
configuring alerts, Comprehensive performance analysis and logging, Configuring performance counter alerts
deleting, Selecting performance objects and counters to monitor
described, Tracking per-process network utilization, Using Performance Monitor
selecting to monitor, Using Performance Monitor
tracking on additional computers, Choosing views and controlling the display
Performance Log Users group, Monitoring performance remotely
Performance Monitor, MMC tool availability, Comprehensive performance analysis and logging, Tracking per-process network utilization, Tracking the overall reliability of the server, Using Performance Monitor, Using Performance Monitor, Using Performance Monitor, Selecting performance objects and counters to monitor, Choosing views and controlling the display, Choosing views and controlling the display, Resolving network bottlenecks, Viewing data collector reports, Configuring performance counter alerts
choosing views, Using Performance Monitor
controlling display, Using Performance Monitor
data collector sets and reports, Resolving network bottlenecks
described, MMC tool availability, Comprehensive performance analysis and logging, Tracking the overall reliability of the server
Histogram Bar view, Choosing views and controlling the display
monitoring performance from command line, Configuring performance counter alerts
Properties dialog box, Selecting performance objects and counters to monitor, Viewing data collector reports
Report view, Choosing views and controlling the display
selecting objects and counters to monitor, Using Performance Monitor
tracking server reliability, Tracking per-process network utilization
performance monitoring and tuning, Planning for support structures and facilities, Getting to know Server Manager, MMC tool availability, Performance monitoring and tuning, Tuning processor scheduling, Tuning processor scheduling, Other important tuning, memory, and data considerations, Other important tuning, memory, and data considerations, Getting information on user and remote user sessions, Tracking the overall reliability of the server, Monitoring performance remotely, Configuring performance counter alerts
command-line, Configuring performance counter alerts
comprehensive performance monitoring, Tracking the overall reliability of the server
importance of, Planning for support structures and facilities
MMC and, MMC tool availability
monitoring remotely, Monitoring performance remotely
other considerations, Other important tuning, memory, and data considerations
processor scheduling, Tuning processor scheduling
Server Manager and, Getting to know Server Manager
tracking system health, Other important tuning, memory, and data considerations
tracking using Event Manager, Getting information on user and remote user sessions
virtual memory, Tuning processor scheduling
Windows operating system, Performance monitoring and tuning
performance objects, Tracking the overall reliability of the server, Using Performance Monitor, Monitoring performance remotely
described, Tracking the overall reliability of the server
monitoring remotely, Monitoring performance remotely
selecting to monitor, Using Performance Monitor
Performance Options dialog box, Changing Data Execution Prevention and physical address extension options, Performance monitoring and tuning, Other important tuning, memory, and data considerations
Performance tool, Computer Management system tools
Peripheral Component Interconnect (PCI), Diagnosing hardware and firmware startup problems, Troubleshooting hardware
Permission Entry dialog box, Configuring share permissions, Basic permissions, Special permissions
permissions and privileges., Working with the administration tools, Managing server binaries, Introducing the registry, Introducing the registry, Modifying values, Applying permissions to registry keys, Software and User Account Control administration, Software and User Account Control administration, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Elevation, prompts, and the secure desktop, Elevation, prompts, and the secure desktop, Application access tokens, Application access tokens, Application access tokens, Accessing the event logs and viewing events, Turning an initialized TPM on or off, Clearing the TPM, Hiding and controlling share access, Configuring share permissions, Configuring share permissions, Creating sync shares and enabling SMB access, Creating sync shares and enabling SMB access, File security, access controls, and auditing, Permission inheritance for files and folders, Permission inheritance for files and folders, Resetting and replacing permissions, Configuring access permissions, Basic permissions, Troubleshooting permissions
(see also share permissions)
access, Hiding and controlling share access, File security, access controls, and auditing
administrator, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens
applying to registry keys, Applying permissions to registry keys
audit failures, Accessing the event logs and viewing events
basic permissions, Configuring access permissions
clearing TPM, Clearing the TPM
cumulative, Troubleshooting permissions
elevated, Managing server binaries, Introducing the registry, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens
inherited, Configuring share permissions, Creating sync shares and enabling SMB access, Permission inheritance for files and folders
managing TPM states, Turning an initialized TPM on or off
modifying registry values, Modifying values
resetting and replacing, Resetting and replacing permissions
security tokens and, Introducing the registry
Server Manager, Working with the administration tools
shaded, Permission inheritance for files and folders
software installation and, Software and User Account Control administration, Elevation, prompts, and the secure desktop, Application access tokens
special permissions, Basic permissions
sync shares and, Creating sync shares and enabling SMB access
Permissions For dialog box, Applying permissions to registry keys
Permissions For SAM dialog box, Auditing registry access
personal identification number (PIN), BitLocker modes, Deploying BitLocker Drive Encryption, Configuring and enabling BitLocker Drive Encryption
Physical Address Extension (PAE), Creating, copying, and deleting BCD entries, Changing Data Execution Prevention and physical address extension options
PhysicalDisk performance object, Using Performance Monitor
PhysicalDisk!Avg. Disk Sec/Transfer counter, Resolving memory bottlenecks
PhysicalDisk\%Disk Time counter, Resolving memory bottlenecks, Resolving disk I/O bottlenecks, Resolving network bottlenecks
PhysicalDiskAvg. Disk Queue Length counter, Resolving memory bottlenecks
PhysicalDiskAvg. Disk Read Queue Length counter, Resolving disk I/O bottlenecks
PhysicalDiskAvg. Disk Write Queue Length counter, Resolving disk I/O bottlenecks
PhysicalDiskCurrent Disk Queue Length counter, Resolving disk I/O bottlenecks
PhysicalDiskDisk Reads/Sec counter, Resolving disk I/O bottlenecks
PhysicalDiskDisk Writes/Sec counter, Resolving disk I/O bottlenecks
PID (process ID), Monitoring and troubleshooting processes
PIN (personal identification number), BitLocker modes, Deploying BitLocker Drive Encryption, Configuring and enabling BitLocker Drive Encryption
Ping command, Accessing a command prompt during installation, Utilities to know
planning process, Windows 8.1 and Windows Server 2012 R2, Windows 8.1 and Windows Server 2012 R2, Your plan: The big picture, Your plan: The big picture, Your plan: The big picture, Your plan: The big picture, Your plan: The big picture, Your plan: The big picture, Identifying your organizational teams, Assessing project goals, Predicting network change, Reviewing network administration, Reviewing network administration, Defining objectives and scope, Defining the new network environment, Final considerations for planning and deployment, Final considerations for planning and deployment, Defining Active Directory server roles, Planning for availability, scalability, and manageability, Planning for software needs
analyzing existing networks, Your plan: The big picture, Predicting network change
assessing project goals, Your plan: The big picture, Identifying your organizational teams
big picture plan, Windows 8.1 and Windows Server 2012 R2
compatibility issues, Reviewing network administration
creating documentation, Assessing project goals
defining new network environment, Your plan: The big picture, Defining the new network environment
defining objectives and scope, Your plan: The big picture, Reviewing network administration
final considerations, Your plan: The big picture, Final considerations for planning and deployment
for availability, scalability, and manageability, Defining Active Directory server roles
for hardware needs, Planning for software needs
for software needs, Planning for availability, scalability, and manageability
identifying organizational teams, Windows 8.1 and Windows Server 2012 R2, Your plan: The big picture
scope creep and, Defining objectives and scope
server roles and Active Directory, Final considerations for planning and deployment
Platform Configuration Registers (PCRs), Preparing BitLocker for startup authentication and secure boot
platters (hard disk drives), File system essentials
Plug and Play technology, Setup refuses to install or start, Installing new devices, Working with device drivers, Rolling back drivers, Adding new disks
described, Installing new devices, Working with device drivers, Adding new disks
removing drivers, Rolling back drivers
troubleshooting installation, Setup refuses to install or start
PNRP (Peer Name Resolution Protocol), Using roles, role services, and features
Popd command, Accessing a command prompt during installation
postinstallation baselines, Establishing performance baselines
postinstallation tasks, Continue past lockups and freezes
power-state management, Hardware and firmware power states, Diagnosing hardware and firmware startup problems, Diagnosing hardware and firmware startup problems
described, Hardware and firmware power states
diagnosing startup problems, Diagnosing hardware and firmware startup problems
resolving startup problems, Diagnosing hardware and firmware startup problems
PowerShell (Windows), Postinstallation tasks, Working with the administration tools, Utilities to know, Creating server groups, MMC window and startup, Using roles, role services, and features, Removing server roles and features, Removing server roles and features, Installing components at the prompt, Installing components at the prompt, Installing components at the prompt, Working with the registry from the command line, Monitoring essentials, Tracking events using Windows PowerShell, Monitoring performance from the command line, Storage-management features and tools
accessing registry, Working with the registry from the command line
described, Working with the administration tools, Utilities to know, Using roles, role services, and features
installing components, Installing components at the prompt
managing server binaries, Removing server roles and features
performance monitoring with, Monitoring performance from the command line
postinstallation tasks, Postinstallation tasks
remote management and, Creating server groups
removing components, Installing components at the prompt
Server Manager and, Removing server roles and features
starting console tools, MMC window and startup
storage management, Storage-management features and tools
stored credentials, Installing components at the prompt
Task Manager and, Monitoring essentials
tracking events with, Tracking events using Windows PowerShell
Preinstallation Environment (PE), Getting a quick start, Accessing a command prompt during installation, Provisioning BitLocker prior to deployment
preinstallation tasks, Using Windows Update
primary partitions, Using the MBR and GPT partition styles, Working with GPT disks, Working with basic and dynamic disks, Formatting a partition, logical drive, or volume, MSR partitions, Deploying BitLocker Drive Encryption
basic disks and, Working with basic and dynamic disks
BitLocker requirements, Deploying BitLocker Drive Encryption
creating, MSR partitions
described, Using the MBR and GPT partition styles
formatting, Formatting a partition, logical drive, or volume
redundant tables, Working with GPT disks
primordial pools, Creating storage spaces
Print And Document Services role, Planning for server usage, Using roles, role services, and features
Print command, Accessing a command prompt during installation
Print Management, Using graphical administrative tools, MMC tool availability
Print Queue performance object, Using Performance Monitor
print services, Assessing systems
PRINT$ share, ADMIN$
private virtual memory, Tuning virtual memory
privileges., Configuring share permissions (see permissions and privileges)
Problem Reporting balloon, Adding non–Plug and Play, older hardware
problem-escalation procedures, Planning for day-to-day operations
process ID (PID), Monitoring and troubleshooting processes
Process performance object, Using Performance Monitor
processes, Getting processor and memory usage for troubleshooting, Getting processor and memory usage for troubleshooting, Getting processor and memory usage for troubleshooting, Monitoring and troubleshooting processes, Monitoring and troubleshooting processes, Tracking per-process resource usage, Using Performance Monitor, Working with trusted platforms, Working with trusted platforms, Working with trusted platforms
background, Getting processor and memory usage for troubleshooting
binding, Working with trusted platforms
foreground, Getting processor and memory usage for troubleshooting
isolating, Monitoring and troubleshooting processes
monitoring and troubleshooting, Monitoring and troubleshooting processes
monitoring performance, Using Performance Monitor
sealing, Working with trusted platforms
tracking resource usage, Tracking per-process resource usage
Windows, Getting processor and memory usage for troubleshooting
wrapping, Working with trusted platforms
processor affinity, Resolving memory bottlenecks
Processor object, Resolving processor bottlenecks, Monitoring performance from the command line
Processor performance object, Using Performance Monitor
processor throttling, Diagnosing hardware and firmware startup problems
processors, Setup reports insufficient system resources, Diagnosing hardware and firmware startup problems, Setting BCD entry values, Tuning processor scheduling, Monitoring essentials, Getting an overview of resource utilization, Tracking per-process CPU utilization, Using Performance Monitor, Resolving memory bottlenecks
DEP requirement, Setting BCD entry values
getting usage for troubleshooting, Monitoring essentials
monitoring performance, Using Performance Monitor
power states, Diagnosing hardware and firmware startup problems
resolving bottlenecks, Resolving memory bottlenecks
tracking resource usage, Getting an overview of resource utilization
troubleshooting installation problems, Setup reports insufficient system resources
troubleshooting performance, Tracking per-process CPU utilization
tuning scheduling, Tuning processor scheduling
Processor\%Privileged Time counter, Resolving processor bottlenecks
Processor\%Processor Time counter, Resolving processor bottlenecks, Resolving network bottlenecks
Processor\%User Time counter, Resolving processor bottlenecks
ProcessorInterrupts/Sec counter, Resolving processor bottlenecks
product activation, Product licensing, Performing a clean installation, Performing an upgrade installation, Activation sequence, Activate Windows by telephone, Activate Windows by telephone
activating by phone, Activate Windows by telephone
activating over Internet, Activation sequence
activation sequence, Performing an upgrade installation
clean installations, Performing a clean installation
described, Product licensing
managed activation, Activate Windows by telephone
product ID, Product licensing, Getting to know Server Manager, Adding and removing multipath hardware devices
product keys, Product licensing, Performing a clean installation
product licensing, Assessing systems, Product licensing, Performing a clean installation, Performing an upgrade installation, Activation sequence
cleaning installations, Performing a clean installation
converting evaluation license to retail license, Activation sequence
described, Product licensing
elapsed evaluation period, Performing an upgrade installation
evaluating, Assessing systems
product management teams, Identifying your organizational teams
Program Compatibility Assistant, Software installation essentials
Program Install And Uninstall Troubleshooter, Using the Microsoft Fix It Utility
project goals, assessing, Your plan: The big picture, Identifying your organizational teams
project management teams, Your plan: The big picture
project worksheets, Predicting network change
Prompt command, Accessing a command prompt during installation
prompts, UAC, Elevation, prompts, and the secure desktop
Properties dialog box, Working with the administration tools, Working with Server Manager, Creating navigation tasks, Understanding and troubleshooting driver signing, Restricting device installation by using Group Policy, Troubleshooting hardware, Securing the registry, Configuring run levels, Accessing the event logs and viewing events, Filtering the event logs, Tracking events using Windows PowerShell, Using subscriptions and forwarded events, Tracking the overall reliability of the server, Selecting performance objects and counters to monitor, Viewing data collector reports, Configuring the File And Storage Services role, Adding and removing multipath hardware devices, Moving dynamic disks, Hard links, NTFS compression, NTFS compression, NTFS compression, Configuring disk quotas, Managing disk quotas after configuration, Managing disk quotas after configuration, Preventing disk-integrity problems, Storage Management Essentials, Storage Management Essentials, Diagnosing and resolving problems with storage spaces, Diagnosing and resolving problems with storage spaces, Creating and publishing shared folders, Creating shared folders in Server Manager, Configuring share permissions, Configuring share permissions, Deploying sync shares through Group Policy, Managing access permissions, Permission inheritance for files and folders, Permission inheritance for files and folders, Permission inheritance for files and folders, Configuring access permissions, Configuring access permissions, Enabling advanced auditing, Specifying files and folders to audit, Managing the file groups to which screens are applied
auditing policies, Enabling advanced auditing
devices and device drivers, Understanding and troubleshooting driver signing, Restricting device installation by using Group Policy, Troubleshooting hardware
disks, NTFS compression
event logs, Filtering the event logs
events, Accessing the event logs and viewing events, Tracking events using Windows PowerShell
file groups, Managing the file groups to which screens are applied
file systems, Specifying files and folders to audit
files, Hard links, NTFS compression, Permission inheritance for files and folders, Configuring access permissions
folders, NTFS compression, Creating and publishing shared folders, Deploying sync shares through Group Policy, Permission inheritance for files and folders, Configuring access permissions
Internet, Working with the administration tools
MPIO, Configuring the File And Storage Services role, Adding and removing multipath hardware devices
Performance Monitor, Selecting performance objects and counters to monitor, Viewing data collector reports
RacTask task, Tracking the overall reliability of the server
Registry Editor, Securing the registry
Server Manager, Working with Server Manager
shares, Creating shared folders in Server Manager, Configuring share permissions, Configuring share permissions, Managing access permissions, Permission inheritance for files and folders
software applications, Configuring run levels
storage pools, Storage Management Essentials, Diagnosing and resolving problems with storage spaces
subscriptions, Using subscriptions and forwarded events
taskpads, Creating navigation tasks
virtual disks, Storage Management Essentials, Diagnosing and resolving problems with storage spaces
volumes, Moving dynamic disks, Configuring disk quotas, Managing disk quotas after configuration, Managing disk quotas after configuration, Preventing disk-integrity problems
protocols, networking, Naming computers
public folder sharing, File-sharing essentials
publishing, Publishing and distributing your custom tools, Using and finding shares, Publishing shares in Active Directory
custom tools, Publishing and distributing your custom tools
shared folders, Using and finding shares, Publishing shares in Active Directory
Pushd command, Accessing a command prompt during installation
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset