- William R Stanek
- Windows Server® 2012 R2 Inside Out: Configuration, Storage, & Essentials
- ixE.html
E
- E$ shares, Hiding and controlling share access
- earthquakes protection, Planning for support structures and
facilities
- Echo command, Accessing a command prompt during
installation
- Edit DWORD Value dialog box, Modifying values
- Edit Keywords dialog box, Publishing shares in Active Directory
- Edit Multi-String dialog box, Modifying values
- Edit String dialog box, Modifying values
- EFI (Extensible Firmware Interface)–based systems, Preinstallation tasks,
Installation on
BIOS-based systems, Diagnosing hardware and firmware startup
problems, Diagnosing hardware and firmware startup
problems, Resolving hardware and firmware startup
problems, Resolving hardware and firmware startup
problems, Boot
environment essentials, Using the MBR and GPT partition styles,
Working with GPT
disks, Managing
GPT disk partitions on basic disks, Hardware-encrypted drives
-
- BCD registry, Boot environment essentials
- boot environment, Resolving hardware and firmware startup
problems
- described, Resolving hardware and firmware startup
problems, Working with GPT disks
- ESP partitions, Managing GPT disk partitions on basic
disks
- Hyper-V and, Using the MBR and GPT partition
styles
- installing, Preinstallation tasks, Installation on BIOS-based
systems
- startup problems, Diagnosing hardware and firmware startup
problems, Diagnosing hardware and firmware startup
problems
- UEFI and, Hardware-encrypted drives
- EFI system partition (ESP), Installation on BIOS-based systems,
Resolving hardware
and firmware startup problems, Working with GPT disks, Managing GPT disk partitions
on basic disks, Mirroring boot and system volumes on GPT
disks
-
- creating, Mirroring boot and system volumes on GPT
disks
- described, Installation on BIOS-based systems
- GPT disks, Resolving hardware and firmware startup
problems, Working with GPT disks, Managing GPT disk partitions
on basic disks
- EFI_ STORAGE_ SECURITY_COMMAND_PROTOCOL, Hardware-encrypted drives
- EFS (Encrypting File System), TPM and BitLocker Drive Encryption,
Understanding Work
Folders and sync shares
- EIDE (enhanced integrated drive electronics), Choosing internal
devices
- EIST (Enhanced Intel SpeedStep Technology), Diagnosing hardware and
firmware startup problems
- elevation (UAC), Elevation, prompts, and the secure
desktop, Configuring UAC and Admin Approval Mode,
Application access
tokens, Application run levels
- email notifications, Managing file screening and storage
reporting, Configuring email notifications, Configuring email
notifications
-
- configuring, Managing file screening and storage
reporting
- configuring limits, Configuring email notifications
- resolving problems, Configuring email notifications
- Emergency Management Services (EMS), Working with BCD Editor, Setting BCD entry
values
- emergency response teams, Planning for day-to-day operations
- EMS (Emergency Management Services), Working with BCD Editor, Setting BCD entry
values
- Enable- cmdlets, Using Windows PowerShell
- Enable-MSDSMAutomaticClaim cmdlet, Configuring multipath I/O
- Enable-Windowsoptionalfeature cmdlet, Provisioning BitLocker prior to
deployment
- Encrypting File System (EFS), TPM and BitLocker Drive Encryption,
Understanding Work
Folders and sync shares
- encryption., Booting from SANs and using SANs with
clusters, Working with trusted platforms, BitLocker modes,
BitLocker
changes, Optimizing encryption, Optimizing encryption,
Optimizing
encryption, Deploying BitLocker Drive Encryption,
Deploying BitLocker
Drive Encryption, Creating shared folders in Server Manager,
Understanding Work
Folders and sync shares
-
- (see also BitLocker Drive Encryption)
- data access, Creating shared folders in Server
Manager
- FIPS-compliant algorithms, Deploying BitLocker Drive Encryption
- hardware, BitLocker changes
- optimizing, Optimizing encryption
- setting permitted types, Optimizing encryption
- SMB, Booting
from SANs and using SANs with clusters
- sync shares, Understanding Work Folders and sync
shares
- TPM, Working
with trusted platforms
- volumes, Optimizing encryption, Deploying BitLocker Drive
Encryption
- Endlocal command, Accessing a command prompt during
installation
- enhanced integrated drive electronics (EIDE), Choosing internal
devices
- Enhanced Intel SpeedStep Technology (EIST), Diagnosing hardware and
firmware startup problems
- Enhanced Security Configuration dialog box, Getting to know Server
Manager
- Enhanced Storage feature, Using roles, role services, and features,
Storage-management
features and tools, BitLocker changes
- Enter-Pssession cmdlet, Enabling remote management
- enterprise ID, Understanding Work Folders and sync
shares
- Enumerate Subkeys permission, Applying permissions to registry keys
- enumeration, access-based, Hiding and controlling share access,
Creating shared
folders in Server Manager
- EPTs (extended page tables), Understanding Hyper-V
- Erase command, Accessing a command prompt during
installation
- Error Checking dialog box, Preventing disk-integrity problems
- Error event level, Accessing the event logs and viewing
events
- error events, Tracking the overall reliability of the
server, Booting
from SANs and using SANs with clusters
- eSATA (external SATA), Choosing internal devices, Choosing external
devices, Installing new devices
- ESP (EFI system partition), Installation on BIOS-based systems,
Resolving hardware
and firmware startup problems, Working with GPT disks, Managing GPT disk partitions
on basic disks, Mirroring boot and system volumes on GPT
disks
-
- creating, Mirroring boot and system volumes on GPT
disks
- described, Installation on BIOS-based systems
- GPT disks, Resolving hardware and firmware startup
problems, Working with GPT disks, Managing GPT disk partitions
on basic disks
- Ethernet, Choosing internal devices, Using internal and external
storage devices
- evaluation licenses, Activation sequence
- evaluation period, Performing an upgrade installation
- event logs, Enabling remote management, Computer Management system
tools, Understanding the event logs, Understanding the event
logs, Accessing
the event logs and viewing events, Viewing event logs on remote systems,
Viewing event logs
on remote systems, Filtering the event logs, Filtering the event logs,
Filtering the event
logs, Archiving
event logs, Configuring email notifications
-
- accessing, Understanding the event logs
- archiving, Filtering the event logs
- as troubleshooting aid, Configuring email notifications
- deleting, Archiving event logs
- described, Enabling remote management, Understanding the event
logs
- filtering, Filtering the event logs
- Properties dialog box, Filtering the event logs
- searching, Viewing event logs on remote systems
- sorting, Viewing
event logs on remote systems
- viewing, Computer Management system tools
- viewing on remote systems, Accessing the event logs and viewing
events
- Event Trace Providers dialog box, Collecting performance trace data
- event traces, Creating and managing data collector
sets
- Event Viewer, Using graphical administrative tools,
Using graphical
administrative tools, Computer Management system tools,
MMC window and
startup, MMC
tool availability, Understanding the event logs, Understanding the event
logs, Accessing
the event logs and viewing events, Accessing the event logs and viewing
events, Accessing the event logs and viewing
events, Accessing the event logs and viewing
events, Viewing
event logs on remote systems, Viewing event logs on remote systems,
Filtering the event
logs, Filtering
the event logs, Using subscriptions and forwarded events,
Monitoring the
security logs
-
- accessing event logs, Understanding the event logs
- Applications and Services Logs node, Accessing the event logs and viewing
events
- archiving event logs, Filtering the event logs
- described, Using
graphical administrative tools, Computer Management system tools,
MMC tool
availability
- filtering event logs, Filtering the event logs
- reviewing tracked events, Accessing the event logs and viewing
events
- searching event logs, Viewing event logs on remote systems
- selecting computers to work with, Using graphical administrative tools
- sorting event logs, Viewing event logs on remote systems
- starting, MMC
window and startup
- Subscription node, Using subscriptions and forwarded
events
- viewing event logs on remote systems, Accessing the event logs and viewing
events
- viewing events, Understanding the event logs
- viewing Security log, Monitoring the security logs
- Windows Logs node, Accessing the event logs and viewing
events
- events, Getting
information on user and remote user sessions, Understanding the event
logs, Understanding the event logs, Accessing the event logs and
viewing events, Viewing event logs on remote systems,
Viewing event logs
on remote systems, Filtering the event logs, Tracking events using Windows
PowerShell, Tracking events using Windows PowerShell,
Tracking events
using Windows PowerShell, Tracking the overall reliability of the
server, Booting
from SANs and using SANs with clusters
-
- CEIP, Tracking
the overall reliability of the server
- defined, Getting
information on user and remote user sessions
- error, Booting
from SANs and using SANs with clusters
- filtering event logs, Filtering the event logs
- forwarded, Tracking events using Windows
PowerShell
- Properties dialog box, Accessing the event logs and viewing
events, Tracking
events using Windows PowerShell
- searching event logs, Viewing event logs on remote systems
- sorting event logs, Viewing event logs on remote systems
- tracking via event logs, Understanding the event logs
- tracking with PowerShell, Tracking events using Windows
PowerShell
- viewing, Understanding the event logs
- Everyone group, ADMIN$, Creating shares by using Computer
Management, Configuring share permissions, Troubleshooting
permissions
- exception paths, Understanding file screening and storage
reporting, Managing file-screen templates
- execute disable (XD) bit, Meeting performance, capacity, and
availability requirements
- Execute File permission, Basic permissions, Special permissions
- exFAT file system, Understanding legacy and protective MBRs,
Converting FAT or
FAT32 to NTFS, Extending partitions, Enabling BitLocker on fixed data
drives, Understanding the disk and file-system
structure, FAT
features, ReFS
integrity streams, data scrubbing, and salvage, Preventing disk-integrity
problems, Running Check Disk interactively,
Preventing
fragmentation of disks, File-sharing essentials
-
- Check Disk tool, Preventing disk-integrity problems,
Running Check Disk
interactively
- compression and, ReFS integrity streams, data scrubbing, and
salvage
- default cluster sizes, Understanding the disk and file-system
structure
- enabling BitLocker, Enabling BitLocker on fixed data
drives
- extending volumes, Extending partitions
- feature comparisons, FAT features
- formatting MBR partitions, Understanding legacy and protective
MBRs
- formatting removable disks, Converting FAT or FAT32 to NTFS
- Optimize Drives utility, Preventing fragmentation of disks
- standard file sharing, File-sharing essentials
- Exit command, Accessing a command prompt during
installation
- Exit-Pssession cmdlet, Enabling remote management
- Expand utility, Accessing a command prompt during
installation, NTFS compression
- explicit trust relationships, Designing the Active Directory
namespace
- Export Quota Settings dialog box, Managing disk quotas after
configuration
- Export Registry File dialog box, Importing and exporting registry data
- exporting, Creating and identifying the BCD store,
Modifying the
registry of a remote machine, Managing disk quotas after
configuration
-
- BCD store, Creating and identifying the BCD
store
- quota entries, Managing disk quotas after
configuration
- registry data, Modifying the registry of a remote
machine
- ExpressCard devices, Installing new devices
- Extend Volume Wizard, Extending partitions
- extended page tables (EPTs), Understanding Hyper-V
- extending partitions, Creating, deleting, and extending disk
partitions during installation, Using the MBR and GPT partition styles,
Working with basic
and dynamic disks, Configuring mount points
- Extensible Firmware Interface (EFI)–based systems, Preinstallation tasks,
Installation on
BIOS-based systems, Diagnosing hardware and firmware startup
problems, Diagnosing hardware and firmware startup
problems, Resolving hardware and firmware startup
problems, Resolving hardware and firmware startup
problems, Boot
environment essentials, Using the MBR and GPT partition styles,
Working with GPT
disks, Managing
GPT disk partitions on basic disks, Hardware-encrypted drives
-
- BCD registry, Boot environment essentials
- boot environment, Resolving hardware and firmware startup
problems
- described, Resolving hardware and firmware startup
problems, Working with GPT disks
- ESP partitions, Managing GPT disk partitions on basic
disks
- Hyper-V and, Using the MBR and GPT partition
styles
- installing, Preinstallation tasks, Installation on BIOS-based
systems
- startup problems, Diagnosing hardware and firmware startup
problems, Diagnosing hardware and firmware startup
problems
- UEFI and, Hardware-encrypted drives
- Extensible Markup Language (XML), Working with device drivers, Tracking the overall
reliability of the server, Preparing and initializing a TPM for first
use
- extension components, MMC snap-ins
- Extensions For dialog box, Step 2: Adding snap-ins to the
console
- external hardware devices, Choosing internal devices, Installing new devices,
Essential storage
technologies
- external SATA (eSATA), Choosing internal devices, Choosing external
devices, Installing new devices
- Extraction Wizard, Compressed (zipped) folders