Microsoft Small Business Server 2003 Unleashed

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packages

     Support Tools

packet filters, creating 2nd

packet forwarding 2nd

Page cannot be found errors (browsers) 2nd

paranoid firms

parity, striping with 2nd

partitions

     multiple partitions 2nd 3rd

PassPol.log

passwords 2nd

     best practices 2nd

     complexity 2nd 3rd 4th 5th

     Configure Password Policies Wizard 2nd

     invalid password characters (OMA)

     length 2nd

     policy enforcement

patch management listserve

patch zones

patches 2nd 3rd

     best practices 2nd

     compared to service packs 2nd

     MBSA (Microsoft Baseline Security Analyzer) 2nd

     Microsoft Security Bulletin notifications Comprehensive edition

     moderately secure firms

     notification process 2nd

     open firms 2nd

     paranoid firms

     patch zones 2nd

     resources 2nd

     risk analysis 2nd 3rd

     SBS downloads site 2nd 3rd 4th

     Shavlik HFNetChk Pro

     support for

     testing 2nd 3rd

     troubleshooting 2nd 3rd 4th

     version codes 2nd

     virtualization

     Windows Update and Automatic Updates 2nd 3rd 4th

     WSUS (Windows Software Update Services) 2nd 3rd

         approval process 2nd

         group policy 2nd 3rd 4th 5th

         installation 2nd 3rd 4th 5th 6th 7th

         mirror WSUS servers 2nd

         OEM (Original Equipment Manufacturer) systems 2nd

         synchronization 2nd

patching resources

     general security information 2nd

     WSUS resources 2nd

PCAnywhere

performance alerts 2nd 3rd 4th

     acknowledging 2nd 3rd

     customizing 2nd 3rd

     event log errors 2nd

     performance counters 2nd

     services 2nd 3rd 4th 5th

     troubleshooting 2nd 3rd

         reconfiguring and reinstalling monitoring 2nd

performance counters

     alerts 2nd

performance reports 2nd 3rd 4th

     attaching logs/files to 2nd

     customizing 2nd 3rd

Performance Summary section (performance reports)

permissions

     backups 2nd

    Companyweb intranet sites

         best practices

         customizing for Companyweb lists 2nd

         customizing for Companyweb sites 2nd

         default permissions 2nd

     NTFS 2nd

         Allow/Deny 2nd 3rd

         applying 2nd

         best practices 2nd

         combining with share permissions 2nd

         Effective Permissions 2nd

         file permissions 2nd

         inheritance 2nd

         ownership 2nd 3rd

         Special Permissions 2nd 3rd

         volume/folder permissions 2nd 3rd

     share permissions 2nd 3rd 4th 5th

         best practices 2nd

         Change

         combining with NTFS permissions 2nd

         Full Control

         Read

    user permissions

         changing 2nd

Permissions tab (RDP-tcp connection properties)

personal identity information (PII)

personalized pages

     Companyweb intranet sites

physical security 2nd 3rd

PII (personal identity information)

planning

     backups

     GPOs (group policy objects) 2nd 3rd

planning backups 2nd

planning SBS installations

     best practices 2nd

     CALs (Client Access Licenses) 2nd

         determining number/type of 2nd

         Device CALs 2nd

         Terminal Server CALs 2nd 3rd

         User CALs 2nd 3rd

     client base, determining 2nd 3rd

    disk storage

         backups 2nd

         fault tolerance 2nd 3rd 4th 5th 6th

         multiple partitions 2nd 3rd

         multiple spindles 2nd 3rd

     networks

         DHCP (Dynamic Host Configuration Protocol) configuration

         domain names 2nd 3rd

         Internet connections 2nd

         IP address ranges 2nd 3rd 4th

         NICs (network interface cards) 2nd 3rd 4th

         subnet masks 2nd

         switches 2nd

         wireless access 2nd

     questions to ask 2nd

PocketPC

     ActiveSync

     resources 2nd

PocketPC Phone Edition

     ActiveSync

Point-to-Point Tunneling Protocol (PPTP)

policies

     Firewall Policy 2nd 3rd

         components 2nd

         website access, denying 2nd

         website access, restricting by time of day and username 2nd

     password policies

         password age 2nd

         password complexity 2nd 3rd

         password length 2nd

         policy enforcement

     recipient policies 2nd

policies. 2nd [See also group policy]

pop-up blocker

POP3 Connector

     best practices

     capabilities 2nd

     configuration 2nd

     global accounts, routing mail from 2nd 3rd

     how it works 2nd

     individual accounts, routing mail from 2nd

     limitations 2nd

     troubleshooting 2nd 3rd

port 3389 2nd

port 4125 2nd

port 443

port 444

port 80

ports

     address translation

     nonstandard SSL ports

     opening

     port 3389 2nd

     port 4125 2nd

     port 443

     port 444

     port 80

     RRAS (Routing and Remote Access Service) firewalls 2nd

     SSL tunnel ports 2nd

power protection 2nd

power users

     access to computer management tools 2nd

     access to user management tools 2nd

PPTP (Point-to-Point Tunneling Protocol)

Premium edition (OWA) 2nd

Premium Edition (SBS 2003) 2nd

Premium with ActiveX edition (OWA) 2nd

Print Spooler

printers

     adding 2nd

Private Computer security configuration (OWA)

private domain names 2nd 3rd

private IP addresses

proactive administration

professional services

     consulting firms

     CPA firms

     law firms

profiles

     Domain profiles

     roaming profiles

     Standard profiles

properties

    Companyweb Site

         Directory Security settings 2nd

         Home Directory settings

         Web Site settings 2nd

     Default Web Site 2nd

         Directory Security settings 2nd 3rd 4th

         Home Directory settings 2nd

         Web Site settings 2nd

     Microsoft SharePoint Adminstration Site 2nd

     SharePoint Central Adminstration Site 2nd

     virtual directories 2nd

protocol definitions

protocols

     BOOTP

    DHCP

         spoof detection 2nd

     DHCP (Dynamic Host Configuration Protocol) 2nd

         address exclusions, creating 2nd

         address reservations, creating 2nd

         best practices

         configuration

         custom settings 2nd 3rd 4th

         default settings 2nd

         definition of

         network settings 2nd

         troubleshooting 2nd

    DNS

         mail routing 2nd 3rd 4th 5th 6th 7th

         reverse DNS lookups

    DNS (Domain Name System)

         aliases

         best practices

         definition of 2nd

         DNS-related Active Directory issues, troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th

         external lookups, troubleshooting 2nd 3rd 4th 5th 6th

         forwarders 2nd

         how it works 2nd

         internal lookups, troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         Management Console

         name resolution 2nd

         relationship with Active Directory 2nd 3rd 4th

         root hints 2nd

         standard server configuration 2nd

         standard workstation configuration 2nd 3rd

    FTP

         uploads/downloads, enabling 2nd 3rd

    IP

         dynamic IP lists

    IP addresses

         ranges 2nd 3rd 4th

         subnet masks 2nd

     L2TP (Layer 2 Tunneling Protocol)

     PPTP (Point-to-Point Tunneling Protocol)

     protocol definitions

    SMTP

         logging 2nd

         tar pitting 2nd

     SMTP (Simple Mail Transfer Protocol)

Provide Remote Assistance command (RWW Administrator view)

public domain names 2nd 3rd

Public Folder Store

Public or Shared Computer security configuration (OWA)

publishing

     websites 2nd 3rd

Категории