Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] name resolution (DNS) DNS forwarders 2nd root hints 2nd names domain names 2nd 3rd names. [See also DNS (Domain Name System)] NAT (network address translation) needs of small businesses prioritized list of needs 2nd SBS features to meet those needs 2nd 3rd netdiag tool 2nd Netlogon service 2nd Network Adapter tab (RDP-tcp connection properties) network address translation (NAT) network interface cards (NICs) 2nd 3rd 4th Network Quarantine Control network sets networks computers, adding. [See client computers] DHCP (Dynamic Host Configuration Protocol) configuration domain controllers, adding domain names 2nd 3rd Internet connections 2nd IP address ranges 2nd 3rd 4th ISA Server 2nd 3rd NAT (network address translation) NICs (network interface cards) 2nd 3rd 4th servers, adding manually joining servers to domain 2nd Set Up Server Computers Wizard 2nd subnet masks 2nd switches 2nd VPNs (virtual private networks) alternatives to 2nd cautions guidelines 2nd Internet access sluggish or blocked multiple simultaneous VPN connections 2nd risks of 2nd 3rd security VPN connection disconnecting after period of inactivity wireless access 2nd wireless access points 2nd 3rd networks. 2nd 3rd [See also Internet] [See also firewalls] [See also protocols] New Website Creation Wizard 2nd newsgroups Macintosh resources 2nd Microsoft community resources niches business valuation consulting firms CPA firms law firms medical offices retail NICs (network interface cards) 2nd 3rd 4th No Action (IMF) nonauthoritative zones, routing mail for 2nd nonstandard SSL ports normal (full) backups 2nd Norwich Group case study 2nd notification process (security patches) 2nd notifications Backup Wizard 2nd nslookup 2nd nslookup tool 2nd 3rd 4th 5th NT File System. [See NTFS] NTBackup 2nd 3rd accessing creating backups 2nd 3rd creating backups with 2nd limitations 2nd restoring databases from backup 2nd 3rd NTFS (NT File System) Encrypted File System 2nd permissions 2nd Allow/Deny 2nd 3rd applying 2nd best practices 2nd combining with share permissions 2nd Effective Permissions 2nd file permissions 2nd inheritance 2nd ownership 2nd 3rd Special Permissions 2nd 3rd volume/folder permissions 2nd 3rd |