Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] packages Support Tools packet filters, creating 2nd packet forwarding 2nd Page cannot be found errors (browsers) 2nd paranoid firms parity, striping with 2nd partitions multiple partitions 2nd 3rd PassPol.log passwords 2nd best practices 2nd complexity 2nd 3rd 4th 5th Configure Password Policies Wizard 2nd invalid password characters (OMA) length 2nd policy enforcement patch management listserve patch zones patches 2nd 3rd best practices 2nd compared to service packs 2nd MBSA (Microsoft Baseline Security Analyzer) 2nd Microsoft Security Bulletin notifications Comprehensive edition moderately secure firms notification process 2nd open firms 2nd paranoid firms patch zones 2nd resources 2nd risk analysis 2nd 3rd SBS downloads site 2nd 3rd 4th Shavlik HFNetChk Pro support for testing 2nd 3rd troubleshooting 2nd 3rd 4th version codes 2nd virtualization Windows Update and Automatic Updates 2nd 3rd 4th WSUS (Windows Software Update Services) 2nd 3rd approval process 2nd group policy 2nd 3rd 4th 5th installation 2nd 3rd 4th 5th 6th 7th mirror WSUS servers 2nd OEM (Original Equipment Manufacturer) systems 2nd synchronization 2nd patching resources general security information 2nd WSUS resources 2nd PCAnywhere performance alerts 2nd 3rd 4th acknowledging 2nd 3rd customizing 2nd 3rd event log errors 2nd performance counters 2nd services 2nd 3rd 4th 5th troubleshooting 2nd 3rd reconfiguring and reinstalling monitoring 2nd performance counters alerts 2nd performance reports 2nd 3rd 4th attaching logs/files to 2nd customizing 2nd 3rd Performance Summary section (performance reports) permissions backups 2nd Companyweb intranet sites best practices customizing for Companyweb lists 2nd customizing for Companyweb sites 2nd default permissions 2nd NTFS 2nd Allow/Deny 2nd 3rd applying 2nd best practices 2nd combining with share permissions 2nd Effective Permissions 2nd file permissions 2nd inheritance 2nd ownership 2nd 3rd Special Permissions 2nd 3rd volume/folder permissions 2nd 3rd share permissions 2nd 3rd 4th 5th best practices 2nd Change combining with NTFS permissions 2nd Full Control Read user permissions changing 2nd Permissions tab (RDP-tcp connection properties) personal identity information (PII) personalized pages Companyweb intranet sites physical security 2nd 3rd PII (personal identity information) planning backups GPOs (group policy objects) 2nd 3rd planning backups 2nd planning SBS installations best practices 2nd CALs (Client Access Licenses) 2nd determining number/type of 2nd Device CALs 2nd Terminal Server CALs 2nd 3rd User CALs 2nd 3rd client base, determining 2nd 3rd disk storage backups 2nd fault tolerance 2nd 3rd 4th 5th 6th multiple partitions 2nd 3rd multiple spindles 2nd 3rd networks DHCP (Dynamic Host Configuration Protocol) configuration domain names 2nd 3rd Internet connections 2nd IP address ranges 2nd 3rd 4th NICs (network interface cards) 2nd 3rd 4th subnet masks 2nd switches 2nd wireless access 2nd questions to ask 2nd PocketPC ActiveSync resources 2nd PocketPC Phone Edition ActiveSync Point-to-Point Tunneling Protocol (PPTP) policies Firewall Policy 2nd 3rd components 2nd website access, denying 2nd website access, restricting by time of day and username 2nd password policies password age 2nd password complexity 2nd 3rd password length 2nd policy enforcement recipient policies 2nd policies. 2nd [See also group policy] pop-up blocker POP3 Connector best practices capabilities 2nd configuration 2nd global accounts, routing mail from 2nd 3rd how it works 2nd individual accounts, routing mail from 2nd limitations 2nd troubleshooting 2nd 3rd port 3389 2nd port 4125 2nd port 443 port 444 port 80 ports address translation nonstandard SSL ports opening port 3389 2nd port 4125 2nd port 443 port 444 port 80 RRAS (Routing and Remote Access Service) firewalls 2nd SSL tunnel ports 2nd power protection 2nd power users access to computer management tools 2nd access to user management tools 2nd PPTP (Point-to-Point Tunneling Protocol) Premium edition (OWA) 2nd Premium Edition (SBS 2003) 2nd Premium with ActiveX edition (OWA) 2nd Print Spooler printers adding 2nd Private Computer security configuration (OWA) private domain names 2nd 3rd private IP addresses proactive administration professional services consulting firms CPA firms law firms profiles Domain profiles roaming profiles Standard profiles properties Companyweb Site Directory Security settings 2nd Home Directory settings Web Site settings 2nd Default Web Site 2nd Directory Security settings 2nd 3rd 4th Home Directory settings 2nd Web Site settings 2nd Microsoft SharePoint Adminstration Site 2nd SharePoint Central Adminstration Site 2nd virtual directories 2nd protocol definitions protocols BOOTP DHCP spoof detection 2nd DHCP (Dynamic Host Configuration Protocol) 2nd address exclusions, creating 2nd address reservations, creating 2nd best practices configuration custom settings 2nd 3rd 4th default settings 2nd definition of network settings 2nd troubleshooting 2nd DNS mail routing 2nd 3rd 4th 5th 6th 7th reverse DNS lookups DNS (Domain Name System) aliases best practices definition of 2nd DNS-related Active Directory issues, troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th external lookups, troubleshooting 2nd 3rd 4th 5th 6th forwarders 2nd how it works 2nd internal lookups, troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Management Console name resolution 2nd relationship with Active Directory 2nd 3rd 4th root hints 2nd standard server configuration 2nd standard workstation configuration 2nd 3rd FTP uploads/downloads, enabling 2nd 3rd IP dynamic IP lists IP addresses ranges 2nd 3rd 4th subnet masks 2nd L2TP (Layer 2 Tunneling Protocol) PPTP (Point-to-Point Tunneling Protocol) protocol definitions SMTP logging 2nd tar pitting 2nd SMTP (Simple Mail Transfer Protocol) Provide Remote Assistance command (RWW Administrator view) public domain names 2nd 3rd Public Folder Store Public or Shared Computer security configuration (OWA) publishing websites 2nd 3rd |