| < Day Day Up > |
|
EAP (Extensible Authentication Protocol)
EAP-TLS protocol, 389, 398–401
enabling for Routing and Remote Access, 383
editing POP3 e-mail boxes , 334
effective permissions, determining , 197
EFS (Encrypting File System) , 229–230
e-mail , 4
backing up, settings for, 313
Configure E-Mail and Internet Connection wizard, 74–86
DNS for delivering, 81
enabling and disabling through firewalls, 416–418
securing, 42
spam prevention strategies, 292, 355–359
e-mail, Exchange Server
advanced configuration and management, 341–352
changing passwords, 341
distribution groups (lists), 342–348
Reply-To address, 348–352
synchronization, 342
basic configuration, 325–331
DNS routing, 326
retrieval methods, 327–329
delivery management, 352–362
message properties, 353–354
queue management, 359–362
SMTP filtering, 355–359
logging configuration, 340
POP3 e-mail, 331–340
adding, removing, and editing mailboxes, 331–334
delivery schedule, 335–336
routing, 336–338
troubleshooting, 338–340
e-mail actions, Health Monitor , 534
emergency preparedness. See disaster protection
emergency repair disks (ERDs) , 551
employees, threats from , 41
Enable This Group To Receive E-Mail... option , 158
enabling user accounts , 167
encryption , 138–141 , 229–230
WEP (Wired Equivalent Privacy), 388
WPA (Wi-Fi Protected Access), 388
Enforce option (GPOs) , 204
Enterprise Management console, SQL Server , 491
ERDs (emergency repair disks) , 551
Error option (filtering event logs) , 228
errors. See troubleshooting
escalation procedures, disaster recovery , 548–549
Ethernet connections , 26 , 27
built into firewalls, 36
ETRN command , 328
event auditing , 224–229
customized, 225–226
disk activity, 529–530
log size, setting, 229
memory usage, 524–526
methods for, selecting, 507
Performance Logs and Alerts, 515–523
alert notifications, 520–523
counter and trace logs, 515–520
permissions, 523
predefined reports, 224–225
processor activity, 527–528
searching/filtering logs, 227–228
System Monitor, 508–515
counters, using, 509–511
displays and views, 511–513
how often to monitor, 511
launching, 509
monitoring remote computers, 514
viewing logs, 227, 300–301
which events are auditable, 226
Event ID option (filtering event logs) , 228
Event Source option (filtering event logs) , 228
Everyone group , 156
Excel, porting ISA Server reports to , 436
Exchange Server 2003 , 325–363
advanced configuration and management, 341–352
changing passwords, 341
distribution groups (lists), 342–348
Reply-To address, 348–352
synchronization, 342
basic configuration, 325–331
DNS routing, 326
retrieval methods, 327–329
delivery management, 352–362
message properties, 353–354
queue management, 359–362
SMTP filtering, 355–359
logging configuration, 340
POP3 e-mail, 331–340
adding, removing, and editing mailboxes, 331–334
delivery schedule, 335–336
routing, 336–338
troubleshooting, 338–340
ExMerge tool , 61
expiration, downloaded objects , 428
expiration, passwords , 160
explicit permissions , 189 , 206
exporting data to databases, SQL Server , 497–503
exporting disk quotas , 137
exporting files, SharePoint , 449
extended partition , 102 , 105
Extended Turn (ETRN) command , 328
extended volumes , 102 , 122–124
Extensible Authentication Protocol (EAP)
EAP-TLS protocol, 389, 398–401
enabling for Routing and Remote Access, 383
external access to Web sites , 475–478
| < Day Day Up > |
|