- William R Stanek
- Windows Server® 2012 R2 Inside Out: Configuration, Storage, & Essentials
- ixR.html
R
- RacTask task, Tracking the overall reliability of the
server
- RAID technology, Installation on BIOS-based systems,
Computer Management
system tools, Tuning virtual memory, Managing and maintaining
MPIO, Meeting
performance, capacity, and availability requirements, Using the MBR and GPT
partition styles, Working with basic and dynamic disks,
Using and converting
basic and dynamic disks, Configuring RAID 0: Striping, Configuring RAID 0:
Striping, Moving
dynamic disks, Mirroring boot and system volumes on GPT
disks, Configuring RAID 5: Disk striping with
parity, Understanding the disk and file-system
structure, Managing storage spaces, Storage Management
Essentials
-
- configuring striping, Configuring RAID 0: Striping
- converting disks and, Using and converting basic and dynamic
disks
- described, Installation on BIOS-based systems
- disk mirroring, Moving dynamic disks, Configuring RAID 5: Disk striping with
parity
- disk striping, Configuring RAID 0: Striping
- disk striping with parity, Mirroring boot and system volumes on GPT
disks
- dynamic disks, Using the MBR and GPT partition
styles
- paging file location and, Tuning virtual memory
- SSDs and, Understanding the disk and file-system
structure
- storage availability, Managing and maintaining MPIO
- storage management and, Managing storage spaces
- Storage Spaces and, Computer Management system tools,
Meeting performance,
capacity, and availability requirements, Storage Management Essentials
- striped volumes, Working with basic and dynamic disks
- RAID-5 volumes, Managing volumes on dynamic disks,
Moving dynamic
disks, Mirroring
boot and system volumes on GPT disks, Rebuilding mirrored system volumes on GPT
disks
- Rapid Virtualization Indexing (RVI), Understanding Hyper-V
- RAS Connection Manager Administration Kit, Using roles, role services, and
features
- RAW file system type, Formatting a partition, logical drive, or
volume
- Rd command, Accessing a command prompt during
installation
- RD Gateway Manager, MMC tool availability
- RD Licensing Diagnoser, MMC tool availability
- RDC (Remote Differential Compression), Using roles, role services, and
features, Storage-management role services,
Selecting data for
deduplication
- RDMA (Remote Direct Memory Access), Booting from SANs and using SANs with
clusters
- RDP-TCP, Getting
information on user and remote user sessions
- Read & Execute permission, Understanding file-sharing models,
Creating shares by
using File Explorer, Basic permissions
- Read Attributes permission, Special permissions
- Read Control permission, Applying permissions to registry keys
- Read Data permission, Special permissions
- Read Extended Attributes permission, Special permissions
- Read permission, Understanding file-sharing models,
ADMIN$,
Creating shares by
using Computer Management, Understanding share permissions, Basic permissions
-
- described, Understanding share permissions, Basic permissions
- Everyone group, ADMIN$
- public folder sharing, Understanding file-sharing models
- security considerations, Creating shares by using Computer
Management
- Read permission level, Creating shares by using File
Explorer
- Read Permissions permission, Special permissions
- Read-Only attribute, Managing access permissions
- Read/Write permission level, Creating shares by using File
Explorer
- rebooting, as postinstallation task, Postinstallation tasks
- Recover command, Accessing a command prompt during
installation
- recovery keys or passwords, Introducing BitLocker Drive Encryption,
BitLocker modes,
Deploying BitLocker
Drive Encryption, Deploying BitLocker Drive Encryption,
Setting up and
managing BitLocker Drive Encryption, Configuring and enabling BitLocker Drive
Encryption, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on fixed data drives, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on fixed data drives, Enabling BitLocker on removable data
drives, Enabling
BitLocker on operating-system volumes, Enabling BitLocker on operating-system
volumes, Enabling BitLocker on operating-system
volumes, Enabling BitLocker on operating-system
volumes, Enabling BitLocker on operating-system
volumes, Managing and troubleshooting BitLocker,
Managing and
troubleshooting BitLocker, Managing and troubleshooting BitLocker,
Recovering data
protected by BitLocker Drive Encryption
-
- BitLocker requirements, BitLocker modes, Deploying BitLocker Drive
Encryption
- creating duplicates, Managing and troubleshooting
BitLocker
- described, Introducing BitLocker Drive Encryption,
Enabling BitLocker
on operating-system volumes
- FIPS compliance, Deploying BitLocker Drive Encryption
- generating, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on operating-system volumes
- looking up, Managing and troubleshooting
BitLocker
- printing, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on operating-system volumes, Managing and troubleshooting
BitLocker
- saving, Setting
up and managing BitLocker Drive Encryption, Enabling BitLocker on fixed
data drives, Enabling BitLocker on operating-system
volumes
- storing, Configuring and enabling BitLocker Drive
Encryption, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on operating-system volumes
- using, Enabling
BitLocker on removable data drives, Recovering data protected by BitLocker Drive
Encryption
- Recovery mode, Introducing BitLocker Drive Encryption,
Deploying BitLocker
Drive Encryption, Enabling BitLocker on operating-system
volumes, Recovering data protected by BitLocker Drive
Encryption
- recovery., Reviewing network administration (see
disaster recovery)
- RECURSE_FLAG flag, Working with the registry from the command
line
- redirected keys (WOW64), Registry root keys
- redundancy, Planning for hardware needs, Working with GPT disks,
Managing storage
spaces, Diagnosing and resolving problems with storage
spaces
-
- data, Managing
storage spaces
- hardware, Planning for hardware needs, Diagnosing and resolving
problems with storage spaces
- primary partition tables, Working with GPT disks
- ReFS (Resilient File System), Storage-management role services,
Understanding legacy
and protective MBRs, Extending partitions, BitLocker modes, Enabling BitLocker on fixed data
drives, Enabling
BitLocker on fixed data drives, Understanding the disk and file-system
structure, NTFS
structure, Transactional NTFS, Transactional NTFS, Transactional NTFS,
ReFS features,
ReFS features,
ReFS features,
ReFS structures,
ReFS structures,
ReFS advantages,
ReFS advantages,
ReFS integrity
streams, data scrubbing, and salvage, ReFS integrity streams, data scrubbing,
and salvage, ReFS integrity streams, data scrubbing, and
salvage, ReFS
integrity streams, data scrubbing, and salvage, Preventing disk-integrity
problems, Preventing fragmentation of disks,
Creating a standard
volume, Managing
file sharing, File-sharing essentials, File security, access
controls, and auditing, Managing access permissions, Enabling advanced
auditing
-
- access permissions, File security, access controls, and
auditing
- advantages, ReFS
structures
- auditing support, Enabling advanced auditing
- BitLocker Driver Encryption and, BitLocker modes
- change journals, NTFS structure
- Check Disk tool and, Preventing disk-integrity problems
- compression and, ReFS integrity streams, data scrubbing, and
salvage
- data scrubbing, ReFS integrity streams, data scrubbing, and
salvage
- default cluster sizes, Understanding the disk and file-system
structure
- described, Transactional NTFS
- enabling BitLocker, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on fixed data drives
- extending volumes, Extending partitions
- features, Transactional NTFS
- formatting MBR and GPT disks, Understanding legacy and protective
MBRs
- integrity streams, ReFS structures, ReFS advantages
- metadata, ReFS
features, ReFS
integrity streams, data scrubbing, and salvage
- network-attached storage, Storage-management role services
- NTFS comparison, Transactional NTFS
- Optimize Drives utility, Preventing fragmentation of disks
- Read-Only attribute, Managing access permissions
- salvage operation, ReFS integrity streams, data scrubbing, and
salvage
- shadow copies and, Managing file sharing
- standard file sharing, File-sharing essentials
- Storage Spaces and, ReFS features, ReFS advantages
- structural overview, ReFS features
- timestamp updates, Creating a standard volume
- REFS.SYS store engine, ReFS features
- RefsDisableLastAccessUpdate registry value, Creating a standard
volume
- Reg Add command, Accessing a command prompt during
installation
- REG command, Accessing a command prompt during
installation, Accessing a command prompt during
installation, Accessing a command prompt during
installation, Accessing a command prompt during
installation, Accessing a command prompt during
installation, Accessing a command prompt during
installation, Loading and unloading hive files,
Working with the
registry from the command line, Working with the registry from the command
line, Working
with the registry from the command line, Working with the registry from the
command line, Working with the registry from the command
line, Working
with the registry from the command line, Working with the registry from the
command line, Working with the registry from the command
line, Working
with the registry from the command line, Working with the registry from the
command line, Working with the registry from the command
line, Working
with the registry from the command line, Securing the registry
-
- ADD subcommand, Working with the registry from the command
line
- COMPARE subcommand, Accessing a command prompt during
installation, Working with the registry from the command
line
- COPY subcommand, Accessing a command prompt during
installation, Working with the registry from the command
line
- DELETE subcommand, Accessing a command prompt during
installation, Working with the registry from the command
line
- described, Loading and unloading hive files
- EXPORT subcommand, Working with the registry from the command
line
- FLAGS subcommand, Working with the registry from the command
line
- IMPORT subcommand, Working with the registry from the command
line
- LOAD subcommand, Working with the registry from the command
line
- modifying permissions, Securing the registry
- QUERY subcommand, Accessing a command prompt during
installation, Working with the registry from the command
line
- RESTORE subcommand, Accessing a command prompt during
installation, Working with the registry from the command
line
- SAVE subcommand, Accessing a command prompt during
installation, Working with the registry from the command
line
- UNLOAD subcommand, Working with the registry from the command
line
- Regedit.exe, Understanding the registry structure,
Types of registry
data available, Preventing access to the registry
utilities
- Regedit32.exe, Understanding the registry structure,
Types of registry
data available, Preventing access to the registry
utilities
- regeneration process, Mirroring boot and system volumes on GPT
disks
- registry, Managing the registry, Introducing the registry,
Introducing the
registry, Introducing the registry, Introducing the registry,
Understanding the
registry structure, Understanding the registry structure,
Understanding the
registry structure, Understanding the registry structure,
Understanding the
registry structure, Understanding the registry structure,
HKLM\BCD00000000, HKEY_USERS, HKEY_CURRENT_USER, HKEY_CURRENT_USER,
Where registry data
comes from, Where registry data comes from, Types of registry data
available, Searching the registry, Modifying values,
Modifying
values, Modifying the registry of a remote
machine, Modifying the registry of a remote
machine, Modifying the registry of a remote
machine, Modifying the registry of a remote
machine, Importing and exporting registry data,
Loading and
unloading hive files, Loading and unloading hive files,
Working with the
registry from the command line, Working with the registry from the command
line, Working
with the registry from the command line, Backing up and restoring the
registry, Securing the registry, Controlling remote registry
access, Controlling remote registry access,
Accessing the event
logs and viewing events
-
- accessing in PowerShell, Working with the registry from the command
line
- backing up, Introducing the registry, Working with the registry
from the command line
- described, Managing the registry
- distributing changes, Importing and exporting registry data
- exporting data, Modifying the registry of a remote
machine
- from command line, Loading and unloading hive files
- hive files, Understanding the registry structure,
HKEY_CURRENT_USER, Modifying the registry of a remote
machine, Loading
and unloading hive files
- importing data, Modifying the registry of a remote
machine
- maintaining, Backing up and restoring the registry
- managing size, Understanding the registry structure
- managing with preferences, Modifying the registry of a remote
machine
- modifying, Searching the registry
- resetting to clean install, Where registry data comes from
- restoring the, Introducing the registry, Working with the registry
from the command line
- root keys, Understanding the registry structure,
Controlling remote
registry access
- searching, Types
of registry data available
- securing, Securing the registry
- storing and using data, HKEY_CURRENT_USER
- structural overview, Accessing the event logs and viewing
events
- subkeys, Understanding the registry structure,
HKLM\BCD00000000, Modifying values, Controlling remote registry
access
- subtrees, Understanding the registry structure,
HKEY_USERS,
Where registry data
comes from
- tools for managing changes, Introducing the registry
- Transactional Registry, Introducing the registry
- value entries, Understanding the registry structure,
Modifying
values
- Registry Editor, Understanding the registry structure,
Types of registry
data available, Types of registry data available,
Modifying
values, Modifying the registry of a remote
machine, Modifying the registry of a remote
machine, Modifying the registry of a remote
machine, Loading
and unloading hive files, Loading and unloading hive files,
Securing the
registry, Securing the registry, Applying permissions to
registry keys, Auditing registry access
-
- .reg file extension, Modifying the registry of a remote
machine
- applying permissions to registry keys, Applying permissions to registry
keys
- auditing registry access, Auditing registry access
- described, Understanding the registry structure,
Types of registry
data available
- loading hive files, Modifying the registry of a remote
machine, Loading
and unloading hive files
- modifying permissions, Securing the registry
- Properties dialog box, Securing the registry
- registry administration, Types of registry data available
- unloading hive files, Modifying the registry of a remote
machine, Loading
and unloading hive files
- Windows Clipboard and, Modifying values
- Regsvr32 command, Accessing a command prompt during
installation
- REG_BINARY data type, Types of registry data available,
Adding keys and
values
- REG_DWORD data type, Types of registry data available,
Modifying
values
- REG_EXPAND_SZ data type, Types of registry data available,
Adding keys and
values
- REG_FULL_RESOURCE_DESCRIPTOR data type, Types of registry data available
- REG_LINK data type, Types of registry data available
- REG_MULTI_SZ data type, Types of registry data available,
Modifying
values, Adding
keys and values, Controlling remote registry access
- REG_NONE data type, Types of registry data available
- REG_QWORD data type, Types of registry data available,
Adding keys and
values
- REG_RESOURCE_LIST data type, Types of registry data available
- REG_RESOURCE_REQUIREMENTS_LIST data type, Types of registry data available
- REG_SZ data type, Types of registry data available,
Modifying
values
- reinstalling device drivers, Uninstalling, reinstalling, and disabling
device drivers
- relative identifiers (RIDs), Defining Active Directory server
roles
- release management teams, Identifying your organizational teams
- Reliability Monitor, Troubleshooting hardware, Comprehensive performance
analysis and logging, Tracking the overall reliability of the
server
- Rem command, Accessing a command prompt during
installation
- Remote Access Management, Using graphical administrative tools
- Remote Access role, Using roles, role services, and
features
- Remote Assistance feature, Windows 8.1 and Windows Server 2012 R2,
Using roles, role
services, and features, Configuring UAC and Admin Approval
Mode
- Remote Desktop, Windows 8.1 and Windows Server 2012 R2,
Getting to know
Server Manager, Enabling remote management
- Remote Desktop Connection utility, Windows 8.1 and Windows Server 2012 R2,
Getting network
usage information
- Remote Desktop Licensing Manager, MMC tool availability
- Remote Desktop Services role, Planning for server usage, Using roles, role services,
and features, Getting network usage information
- Remote Differential Compression (RDC), Using roles, role services, and
features, Storage-management role services,
Selecting data for
deduplication
- Remote Direct Memory Access (RDMA), Booting from SANs and using SANs with
clusters
- remote management, Getting to know Server Manager, Creating server groups,
MMC and remote
computers, Adding keys and values, Applying permissions to
registry keys, Getting network usage information,
Accessing the event
logs and viewing events, Viewing event logs on remote systems,
Monitoring
performance remotely
-
- controlling remote registry access, Applying permissions to registry keys
- described, Getting to know Server Manager
- enabling, Creating server groups
- getting information on user and remote user sessions, Getting network usage
information
- MMC and, MMC and
remote computers
- modifying registry of remote machines, Adding keys and values
- monitoring performance remotely, Monitoring performance remotely
- setting remote computers as focus, Viewing event logs on remote systems
- viewing event logs on remote systems, Accessing the event logs and viewing
events
- remote procedure calls (RPCs), Enabling remote management
- Remote Registry service, Controlling remote registry access,
Monitoring and
troubleshooting services
- Remote Server Administration Tools (RSAT), Using graphical administrative tools,
Using roles, role
services, and features
- Remote Storage, reparse points and, Reparse points
- removable disks, Working with basic and dynamic disks,
Converting FAT or
FAT32 to NTFS, Deploying BitLocker Drive Encryption,
Enabling BitLocker
on fixed data drives
-
- BitLocker policies, Deploying BitLocker Drive Encryption
- described, Working with basic and dynamic disks,
Converting FAT or
FAT32 to NTFS
- enabling BitLocker on, Enabling BitLocker on fixed data
drives
- Remove Mirror dialog box, Configuring RAID 5: Disk striping with
parity
- Remove Roles And Features Wizard, Assessing systems, Postinstallation tasks, Adding server roles and
features, Adding
server roles and features, Adding server roles and features,
Adding server roles
and features, Removing server roles and features,
Removing server
roles and features, Removing server roles and features
-
- Before You Begin page, Adding server roles and features
- Confirm Removal Selections page, Removing server roles and features
- Removal Progress page, Removing server roles and features
- Remove Features page, Removing server roles and features
- Remove Server Roles page, Adding server roles and features
- Select Destination Server page, Adding server roles and features
- Server Graphical Shell, Postinstallation tasks
- starting, Adding
server roles and features
- WINS services, Assessing systems
- Remove- cmdlets, Using Windows PowerShell
- Remove-MSDSMSupportedHw cmdlet, Adding and removing multipath hardware
devices
- Ren command, Accessing a command prompt during
installation
- reparse points, Object identifiers
- Replace command, Accessing a command prompt during
installation
- Report view (Performance Monitor), Choosing views and controlling the
display
- Require Additional Authentication At Startup dialog box,
Configuring and
enabling BitLocker Drive Encryption
- reserved virtual memory, Tuning virtual memory
- resident attributes, NTFS structure
- Resilient File System (ReFS), Storage-management role services,
Understanding legacy
and protective MBRs, Extending partitions, BitLocker modes, Enabling BitLocker on fixed data
drives, Enabling
BitLocker on fixed data drives, Understanding the disk and file-system
structure, NTFS
structure, Transactional NTFS, Transactional NTFS, Transactional NTFS,
ReFS features,
ReFS features,
ReFS features,
ReFS structures,
ReFS structures,
ReFS advantages,
ReFS advantages,
ReFS integrity
streams, data scrubbing, and salvage, ReFS integrity streams, data scrubbing,
and salvage, ReFS integrity streams, data scrubbing, and
salvage, ReFS
integrity streams, data scrubbing, and salvage, Preventing disk-integrity
problems, Preventing fragmentation of disks,
Creating a standard
volume, Managing
file sharing, File-sharing essentials, File security, access
controls, and auditing, Managing access permissions, Enabling advanced
auditing
-
- access permissions, File security, access controls, and
auditing
- advantages, ReFS
structures
- auditing support, Enabling advanced auditing
- BitLocker Driver Encryption and, BitLocker modes
- change journals, NTFS structure
- Check Disk tool and, Preventing disk-integrity problems
- compression and, ReFS integrity streams, data scrubbing, and
salvage
- data scrubbing, ReFS integrity streams, data scrubbing, and
salvage
- default cluster sizes, Understanding the disk and file-system
structure
- described, Transactional NTFS
- enabling BitLocker, Enabling BitLocker on fixed data drives,
Enabling BitLocker
on fixed data drives
- extending volumes, Extending partitions
- features, Transactional NTFS
- formatting MBR and GPT disks, Understanding legacy and protective
MBRs
- integrity streams, ReFS structures, ReFS advantages
- metadata, ReFS
features, ReFS
integrity streams, data scrubbing, and salvage
- network-attached storage, Storage-management role services
- NTFS comparison, Transactional NTFS
- Optimize Drives utility, Preventing fragmentation of disks
- Read-Only attribute, Managing access permissions
- salvage operation, ReFS integrity streams, data scrubbing, and
salvage
- shadow copies and, Managing file sharing
- standard file sharing, File-sharing essentials
- Storage Spaces and, ReFS features, ReFS advantages
- structural overview, ReFS features
- timestamp updates, Creating a standard volume
- resource conflicts, Troubleshooting hardware
- Resource Monitor, Other important tuning, memory, and data
considerations, Comprehensive performance analysis and
logging, Tracking per-process resource usage,
Getting an overview
of resource utilization, Getting an overview of resource
utilization, Getting an overview of resource
utilization, Getting an overview of resource
utilization, Getting an overview of resource
utilization, Getting an overview of resource
utilization, Tracking per-process CPU utilization,
Tracking per-process
memory utilization, Tracking per-process network
utilization
-
- CPU tab, Getting
an overview of resource utilization
- described, Comprehensive performance analysis and
logging
- Disk tab, Getting an overview of resource
utilization, Tracking per-process memory
utilization
- Memory tab, Getting an overview of resource
utilization, Tracking per-process CPU utilization
- Network tab, Getting an overview of resource
utilization, Tracking per-process network
utilization
- Overview tab, Getting an overview of resource
utilization
- Task Manager and, Getting an overview of resource
utilization
- tracking resource usage, Tracking per-process resource usage
- tracking system health, Other important tuning, memory, and data
considerations
- resource properties, Understanding central access policies
- Restart-Service cmdlet, Monitoring and troubleshooting
services
- restoring, Introducing the registry, Introducing the registry,
Working with the
registry from the command line, Using internal and external storage
devices
-
- software applications, Introducing the registry
- the registry, Introducing the registry, Working with the registry
from the command line
- VSS and, Using
internal and external storage devices
- Resultant Set of Policy, MMC tool availability
- Resume-Service cmdlet, Monitoring and troubleshooting
services
- RIDs (relative identifiers), Defining Active Directory server
roles
- Rmdir command, Accessing a command prompt during
installation
- role services, Using graphical administrative tools,
Configuring roles,
role services, and features, Using roles, role services, and features,
Installing
components with Server Manager, Going to the prompt for Server Management,
Going to the prompt
for Server Management, Understanding component names, Tracking installed roles,
role services, and features, Installing components at the prompt,
Storage-management
features and tools, Configuring the File And Storage Services
role
-
- adding to file servers, Configuring the File And Storage Services
role
- described, Configuring roles, role services, and
features
- installing, Tracking installed roles, role services, and
features
- list of component names, Going to the prompt for Server
Management
- list of primary, Using roles, role services, and
features
- managing, Going
to the prompt for Server Management
- removing binary source files, Using graphical administrative tools
- storage management, Storage-management features and tools
- tracking installed, Understanding component names
- uninstalling, Installing components at the prompt
- viewing, Installing components with Server
Manager
- roles., Installing components at the prompt (see
server roles)
- Rollback key (registry), Using the Microsoft Fix It Utility
- Rollback Wizard, Performing a clean installation
- rolling back, Restricting device installation by using Group
Policy, Introducing the registry, Software installation
essentials
-
- device drivers, Restricting device installation by using Group
Policy
- software installations, Software installation essentials
- transactions, Introducing the registry
- root keys (registry), Understanding the registry structure,
Modifying
values, Controlling remote registry access
- Route command, Accessing a command prompt during
installation, Utilities to know
- Routing And Remote Access, Using graphical administrative tools,
MMC tool
availability, Controlling remote registry access
- RPC over HTTP Proxy, Using roles, role services, and
features
- RPCs (remote procedure calls), Enabling remote management
- RSAT (Remote Server Administration Tools), Using graphical administrative tools,
Using roles, role
services, and features
- Run As permissions, Viewing device and driver details
- run levels (application), Application access tokens
- RunAsAdmin run level, Application run levels
- RunAsHighest run level, Application run levels
- RunAsInvoker run level, Application access tokens
- RVI (Rapid Virtualization Indexing), Understanding Hyper-V