Microsoft Small Business Server 2003 Unleashed

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

sales impact 2nd

Samba

sandboxes

SANS.org

SBCore Service

SBS 2000 2nd 3rd 4th

SBS 2003 2nd 3rd

     Premium Edition 2nd

     Service Pack 1 2nd

     Standard Edition 2nd

SBS 4.0 2nd 3rd 4th

SBS 4.0a 2nd

SBS 4.5 2nd 3rd

SBS advantages 2nd

SBS Backup Wizard 2nd 3rd 4th 5th 6th 7th 8th 9th

     accessing

     Backup Data Summary page

     backup notifications 2nd

     creating backups 2nd 3rd

     Define Backup Schedule page

     excluding data from 2nd 3rd 4th

     limitations 2nd 3rd

     restoring databases from backup 2nd

     settings generated by 2nd

     Storage Allocation for Deleted Files and Emails page

SBS configuration

     Automatic Updates 2nd 3rd

     backup 2nd

     Fax services 2nd

     Internet connections 2nd

         completing setup 2nd

         Exchange configuration 2nd

         firewall configuration 2nd

         network configuration 2nd 3rd 4th 5th

     monitoring

     printers 2nd

    remote access

         Activate Your Server Wizard 2nd

         Add Additional Licenses Wizard 2nd

         cautions

         Configure Remote Access Wizard 2nd

     To-Do list

         Automatic Updates 2nd 3rd

         backup, configuring 2nd

         Fax services, configuring 2nd

         monitoring, configuring

         printers, adding 2nd

         users and computers, adding 2nd

     users and computers, adding 2nd

SBS downloads site 2nd 3rd 4th

SBS installation 2nd 3rd 4th

     best practices 2nd 3rd 4th

     component installation 2nd 3rd 4th

     integrated installation 2nd 3rd 4th

         Company Information window 2nd

         Internal Domain Information window 2nd

         SBS Setup Wizard 2nd

         Setup Requirements window 2nd

     troubleshooting 2nd 3rd 4th 5th

         err.exe tool 2nd

         eventlog.txt file 2nd 3rd 4th 5th 6th 7th

         installation log file location

     Windows 2003 installation 2nd

SBS installations, planning

     best practices 2nd

     CALs (Client Access Licenses) 2nd

         determining number/type of 2nd

         Device CALs 2nd

         Terminal Server CALs 2nd 3rd

         User CALs 2nd 3rd

     client base, determining 2nd 3rd

    disk storage

         backups 2nd

         fault tolerance 2nd 3rd 4th 5th 6th

         multiple partitions 2nd 3rd

         multiple spindles 2nd 3rd

     networks

         DHCP (Dynamic Host Configuration Protocol) configuration

         domain names 2nd 3rd

         Internet connections 2nd

         IP address ranges 2nd 3rd 4th

         NICs (network interface cards) 2nd 3rd 4th

         subnet masks 2nd

         switches 2nd

         wireless access 2nd

     questions to ask 2nd

SBS limitations 2nd 3rd

SBS Setup Wizard 2nd

sbs_wpad.txt file

SBSClientApps.log

Sbsmig.log

SBSNetSetup.log

SBSUsers Organizational Unit (OU)

scanning tools 2nd

Scheduled Task Wizard 2nd

scheduling backups 2nd 3rd

SCL (Spam Confidence Level)

scope

     GPOs (group policy objects) 2nd

     group policy 2nd

scope (group policy) 2nd

Scope tab (GPMC) 2nd

scripts

     blocking websites with

scw.log

Secunia

secure website access 2nd

     SSL certificates, exporting from SBS 2nd

     SSL certificates, importing into Macintosh Certificate Store 2nd

SecureNat clients 2nd

security 2nd 3rd 4th

     annual security checklist 2nd

     antivirus tools 2nd 3rd 4th 5th

     automatic updates

     backups 2nd

     best practices 2nd 3rd 4th

     budget calculation 2nd

     Cached Exchange Mode (Outlook)

     DEP (Data Execution Prevention)

     DHCP spoof detection 2nd

     educated end users 2nd 3rd 4th 5th 6th

     electronic patient healthcare information (ePHI)

     Encrypted File System 2nd

     fault tolerance

         hardware versus software 2nd

         RAID 2nd 3rd

    firewalls

         configuration 2nd

     Internet Explorer

         ActiveX restrictions 2nd 3rd 4th 5th

         MIME type handling

         pop-up blocker

     intrusion detection 2nd 3rd 4th 5th

     monthly security checklist 2nd

     Network Quarantine Control

     NTFS permissions 2nd

         Allow/Deny 2nd 3rd

         applying 2nd

         best practices 2nd

         combining with share permissions 2nd

         Effective Permissions 2nd

         file permissions 2nd

         inheritance 2nd

         ownership 2nd 3rd

         Special Permissions 2nd 3rd

         volume/folder permissions 2nd 3rd

     Office 2nd 3rd

     Outlook Express

    OWA (Outlook Web Access)

         Private Computer security configuration

         Public or Shared Computer security configuration

     passwords 2nd

         age 2nd

         best practices 2nd

         complexity 2nd 3rd

         Configure Password Policies Wizard 2nd

         invalid password characters (OMA)

         length 2nd

         policy enforcement

     patches 2nd 3rd

         best practices 2nd

         compared to service packs 2nd

         MBSA (Microsoft Baseline Security Analyzer) 2nd

         Microsoft Security Bulletin notifications Comprehensive edition

         moderately secure firms

         notification process 2nd

         open firms 2nd

         paranoid firms

         patch zones 2nd

         resources 2nd

         risk analysis 2nd 3rd

         SBS downloads site 2nd 3rd 4th

         Shavlik HFNetChk Pro

         support for

         testing 2nd 3rd

         troubleshooting 2nd 3rd 4th

         version codes 2nd

         virtualization

         Windows Update and Automatic Updates 2nd 3rd 4th

         WSUS (Windows Software Update Services) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

    permissions

         backups 2nd

     personal identity information (PII)

     physical security 2nd 3rd

     remote control software 2nd 3rd

    resources

         free antivirus programs 2nd

         free online scanning tools 2nd

         general security information 2nd

         security response toolkit 2nd

         WSUS resources 2nd

     restricted users 2nd 3rd 4th 5th 6th 7th 8th

     reverse NDR attacks

     risk management 2nd

     RRAS (Routing and Remote Access Service) firewalls 2nd

         CEICW (Configure Email and Internet Connection Wizard) 2nd 3rd

         filtering connections 2nd

         packet filters, creating 2nd

         packet forwarding 2nd

         port address translation

         ports 2nd

         testing

     secure website access 2nd

         SSL certificates, exporting from SBS 2nd

         SSL certificates, importing into Macintosh Certificate Store 2nd

     security bulletins

     Security Center 2nd

     Security Configuration Wizard

     security groups 2nd 3rd 4th 5th 6th

     security review process 2nd 3rd 4th 5th 6th

     security toolkits 2nd 3rd 4th 5th 6th

     share permissions 2nd 3rd 4th 5th

         best practices 2nd

         Change

         combining with NTFS permissions 2nd

         Full Control

         Read

     SMB signing 2nd 3rd

    spyware

         antispyware tools 2nd 3rd 4th 5th 6th

         characteristics of 2nd

         compared to viruses

         Microsoft AntiSpyware website

         symptoms of 2nd

     SSL certificates 2nd 3rd 4th 5th 6th 7th

         creating 2nd

     SSL tunnel ports 2nd

     troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

         common access problems 2nd 3rd

         effective permissions 2nd

     unauthorized access, protecting against 2nd

    user permissions

         changing 2nd

     viruses

     VPNs (virtual private networks)

     vulnerability 2nd

     Windows Firewall 2nd

         Allow Port Exceptions[colon] ENABLED setting 2nd

         Define Port Exceptions[colon] ENABLED setting 2nd

         Define Program Exceptions[colon] ENABLED setting 2nd

     wireless networks

Security Accounts Manager

security bulletins

Security Center 2nd

Security Configuration Wizard

security groups 2nd

security patches. [See patches]

security response toolkit 2nd

security toolkits 2nd 3rd 4th 5th 6th

security. [See also backups]

Select ISA Server Services dialog box

server security

     best practices 2nd

     Encrypted File System 2nd

     NTFS permissions 2nd

         Allow/Deny 2nd 3rd

         applying 2nd

         best practices 2nd

         combining with share permissions 2nd

         Effective Permissions 2nd

         file permissions 2nd

         inheritance 2nd

         ownership 2nd 3rd

         Special Permissions 2nd 3rd

         volume/folder permissions 2nd 3rd

     passwords 2nd

         age 2nd

         best practices 2nd

         complexity 2nd 3rd

         Configure Password Policies Wizard 2nd

         length 2nd

         policy enforcement

     physical security 2nd 3rd

     share permissions 2nd 3rd 4th 5th

         best practices 2nd

         Change

         combining with NTFS permissions 2nd

         Full Control

         Read

     troubleshooting

         common access problems 2nd 3rd

         effective permissions 2nd

Server service

Server Specifications section (performance reports)

servers

     accessing with RWW (Remote Web Workplace) 2nd 3rd 4th

     activating 2nd

    adding to network

         domain controllers

         manually joining servers to domain 2nd

         Set Up Server Computers Wizard 2nd

    connecting from Macintosh platforms

         browse method 2nd

         Chooser method 2nd

         Connect to Share method 2nd

     DHCP servers

    DNS (Domain Name System)

         configuration 2nd

     DNS servers

    Exchange. [See Exchange]

     hot spare servers

    ISA Server. [See ISA Server]

     remote access configuration 2nd 3rd

    Terminal Server

         resources 2nd

    terminal. [See Terminal Services]

Service Pack 1 (SBS 2003) 2nd

Service Pack 2. [See SP 2]

service packs

     compared to security patches 2nd

Service Unavailable error (browsers) 2nd

services

     Event Log

     Fax

     IPSEC

     Kerberos Key Distribution Center

     Microsoft Exchange Information Store

     Microsoft Exchange Management

     Microsoft Exchange POP3

     Microsoft Exchange System Attendant

     Netlogon 2nd

     performance alerts 2nd 3rd 4th 5th

     Print Spooler

     Recipient Update Service 2nd 3rd

     Routing and Remote Access

     RRAS (Routing and Remote Access Service) 2nd 3rd 4th

         best practices 2nd

         firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

         troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

     SBCore Service

     Security Accounts Manager

     Server

     Services for Macintosh 2nd

         AppleTalk, enabling 2nd

         configuring 2nd

         Directory Access 2nd

         installing 2nd

         Macintosh UAM, installing 2nd

         shares, creating 2nd

         volumes, mounting 2nd 3rd 4th 5th 6th

     Terminal Services 2nd 3rd

         Application mode 2nd

         applications, installing 2nd 3rd

         best practices 2nd

         Configuration console 2nd

         installation 2nd

         Licensing service 2nd 3rd

         Manager console 2nd

         Quick Start guide for Terminal Services

         Remote Administration mode 2nd

         TDP-tcp connection properties 2nd

         troubleshooting 2nd 3rd 4th 5th 6th 7th

     third-party web services, installing 2nd 3rd

     VSS (Volume Shadow Copy Service)

     WINS (Windows Internet Name Service)

     World Wide Web Publishing

     WSUS (Windows Software Update Services) 2nd 3rd

Services for Macintosh 2nd

     AppleTalk, enabling 2nd

     configuring 2nd

     Directory Access 2nd

     installing 2nd

     Macintosh UAM, installing 2nd

     shares, creating 2nd

    volumes, mounting

         browse method 2nd

         Chooser method 2nd

         Connect to Share method 2nd

services. [See also WSS (Windows SharePoint Services)]

Sessions tab (RDP-tcp connection properties)

Set Up Client Applications Wizard 2nd

Set Up Client Computers Wizard

     computers, adding to network 2nd 3rd

Set Up Server Computers Wizard 2nd

Settings tab (GPMC) 2nd

Setup Assistant (Entourage 2004) 2nd

Setup Requirements window 2nd

share permissions 2nd 3rd 4th 5th

     best practices 2nd

     Change

     combining with NTFS permissions 2nd

     Full Control

     Read

Share Permissions dialog box 2nd

SharePoint Central Adminstration Site (IIS)

     default settings 2nd

SharePoint Timer Service

     starting

     stopping

SharePoint. [See WSS (Windows SharePoint Services)]

shares

     Services for Macintosh 2nd

sharing files

    Macintosh computers. [See Macintosh platforms]

Shavlik HFNetChk Pro

signatures

     SMB signing 2nd 3rd

Simple Mail Transfer Protocol (SMTP)

single loss expectancy (SLE)

SLE (single loss expectancy)

small business community resources

     mailing lists 2nd

     websites/blogs 2nd

Small Business Server Auditing GPO 2nd

Small Business Server Client Computer GPO 2nd

Small Business Server Domain Password Policy GPO 2nd 3rd

Small Business Server Internet Connection Firewall GPO 2nd

Small Business Server Lockout Policy GPO 2nd

Small Business Server Remote Assistance Policy GPO 2nd

Small Business Server Windows Firewall GPO

Small Business ServerDomain Password Policy object

small businesses

     case studies

         Calvert Technologies 2nd

         Correct Solutions Pty Ltd. 2nd

         HeadNETWORKS, LLC 2nd 3rd

         Interprom Computer Technologies 2nd

         JD Fogg Technology 2nd 3rd

         Norwich Group 2nd

         Rehab Designs, Inc. 2nd

     cash flow 2nd

     definition of 2nd

     finance 2nd

     industry niches

         business valuation

         consulting firms

         CPA firms

         law firms

         medical offices

         retail

     marketing 2nd

    micro businesses

         definition of 2nd

    needs of

         prioritized list of needs 2nd

         SBS features to meet those needs 2nd 3rd

     overlapping needs of enterprise and small business 2nd

     sales impact 2nd

    sole proprietary

         definition of 2nd

     technology resources 2nd

smart hosts

     mail routing 2nd 3rd 4th 5th 6th 7th 8th

SmartPhones

     ActiveSync

SMB

     .local domain issues 2nd 3rd

     Active Directory Access, configuring 2nd 3rd 4th 5th

     SMB signing 2nd 3rd

SMS Monitoring and Reporting

     resources 2nd

SMTP

     logging 2nd

     tar pitting 2nd

SMTP (Simple Mail Transfer Protocol)

SMTP Connector setting (Exchange)

soft recovery

software deployment

     group policy

Software Restriction Policies

software settings (group policy)

sole proprietary

     definition of 2nd

SP (Service Pack) 2 2nd

     automatic updates

     DEP (Data Execution Prevention)

     Internet Explorer

         ActiveX restrictions 2nd 3rd 4th 5th

         MIME type handling

         pop-up blocker

     Outlook Express

     Security Center 2nd

     Windows Firewall 2nd

         Allow Port Exceptions[colon] ENABLED setting 2nd

         Define Port Exceptions[colon] ENABLED setting 2nd

         Define Program Exceptions[colon] ENABLED setting 2nd

SP 1 (SBS 2003) 2nd

spam blocking 2nd

     blacklists

     dynamic IP lists

     IMF (Intelligent Message Filter) 2nd 3rd 4th

         best practices

         configuration 2nd

         installation

         SCL values, setting with Outlook 2nd

         troubleshooting 2nd 3rd

     recipient filtering 2nd 3rd

     reverse DNS lookups

     SMTP tar pitting 2nd

Spam Confidence Level (SCL)

Special Permissions (NTFS) 2nd 3rd

spell checking

     OWA (Outlook Web Access)

spindles

     multiple spindles 2nd 3rd

spoof detection 2nd

spyware

     antispyware tools 2nd 3rd 4th 5th 6th

     characteristics of 2nd

     compared to viruses

     Microsoft AntiSpyware website

     symptoms of 2nd

SQL Server

     upgrading database engines to 2nd

Srv03_gdr code

Srv03_qfe code

Srv03_rtm code

Srv03_spx code

SSL

    certificates

         exporting from SBS 2nd

         importing into Macintosh Certificate Store 2nd

     nonstandard SSL ports

     tunnel ports 2nd

SSL certificates 2nd 3rd 4th 5th 6th 7th

     creating 2nd

Standard Edition (SBS 2003) 2nd

Standard profiles

starting

     SharePoint Timer Service

stopping

     SharePoint Timer Service

Storage Allocation for Deleted Files and Emails page (SBS Backup Wizard)

storage groups 2nd

storage. [See hard disks]

striping 2nd

subnet masks 2nd

subsites (Companyweb site)

     creating 2nd 3rd

Support Tools package

switches 2nd

synchronization

     ActiveSync 2nd 3rd 4th 5th

     WSUS (Windows Software Update Services) 2nd

SysInternals

system recovery 2nd 3rd 4th 5th

Категории