P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packages
     Support Tools
packet filters, creating 2nd
packet forwarding 2nd
Page cannot be found errors (browsers) 2nd
paranoid firms
parity, striping with 2nd
partitions
     multiple partitions 2nd 3rd
PassPol.log
passwords 2nd
     best practices 2nd
     complexity 2nd 3rd 4th 5th
     Configure Password Policies Wizard 2nd
     invalid password characters (OMA)
     length 2nd
     policy enforcement
patch management listserve
patch zones
patches 2nd 3rd
     best practices 2nd
     compared to service packs 2nd
     MBSA (Microsoft Baseline Security Analyzer) 2nd
     Microsoft Security Bulletin notifications Comprehensive edition
     moderately secure firms
     notification process 2nd
     open firms 2nd
     paranoid firms
     patch zones 2nd
     resources 2nd
     risk analysis 2nd 3rd
     SBS downloads site 2nd 3rd 4th
     Shavlik HFNetChk Pro
     support for
     testing 2nd 3rd
     troubleshooting 2nd 3rd 4th
     version codes 2nd
     virtualization
     Windows Update and Automatic Updates 2nd 3rd 4th
     WSUS (Windows Software Update Services) 2nd 3rd
         approval process 2nd
         group policy 2nd 3rd 4th 5th
         installation 2nd 3rd 4th 5th 6th 7th
         mirror WSUS servers 2nd
         OEM (Original Equipment Manufacturer) systems 2nd
         synchronization 2nd
patching resources
     general security information 2nd
     WSUS resources 2nd
PCAnywhere
performance alerts 2nd 3rd 4th
     acknowledging 2nd 3rd
     customizing 2nd 3rd
     event log errors 2nd
     performance counters 2nd
     services 2nd 3rd 4th 5th
     troubleshooting 2nd 3rd
         reconfiguring and reinstalling monitoring 2nd
performance counters
     alerts 2nd
performance reports 2nd 3rd 4th
     attaching logs/files to 2nd
     customizing 2nd 3rd
Performance Summary section (performance reports)
permissions
     backups 2nd
    Companyweb intranet sites
         best practices
         customizing for Companyweb lists 2nd
         customizing for Companyweb sites 2nd
         default permissions 2nd
     NTFS 2nd
         Allow/Deny 2nd 3rd
         applying 2nd
         best practices 2nd
         combining with share permissions 2nd
         Effective Permissions 2nd
         file permissions 2nd
         inheritance 2nd
         ownership 2nd 3rd
         Special Permissions 2nd 3rd
         volume/folder permissions 2nd 3rd
     share permissions 2nd 3rd 4th 5th
         best practices 2nd
         Change
         combining with NTFS permissions 2nd
         Full Control
         Read
    user permissions
         changing 2nd
Permissions tab (RDP-tcp connection properties)
personal identity information (PII)
personalized pages
     Companyweb intranet sites
physical security 2nd 3rd
PII (personal identity information)
planning
     backups
     GPOs (group policy objects) 2nd 3rd
planning backups 2nd
planning SBS installations
     best practices 2nd
     CALs (Client Access Licenses) 2nd
         determining number/type of 2nd
         Device CALs 2nd
         Terminal Server CALs 2nd 3rd
         User CALs 2nd 3rd
     client base, determining 2nd 3rd
    disk storage
         backups 2nd
         fault tolerance 2nd 3rd 4th 5th 6th
         multiple partitions 2nd 3rd
         multiple spindles 2nd 3rd
     networks
         DHCP (Dynamic Host Configuration Protocol) configuration
         domain names 2nd 3rd
         Internet connections 2nd
         IP address ranges 2nd 3rd 4th
         NICs (network interface cards) 2nd 3rd 4th
         subnet masks 2nd
         switches 2nd
         wireless access 2nd
     questions to ask 2nd
PocketPC
     ActiveSync
     resources 2nd
PocketPC Phone Edition
     ActiveSync
Point-to-Point Tunneling Protocol (PPTP)
policies
     Firewall Policy 2nd 3rd
         components 2nd
         website access, denying 2nd
         website access, restricting by time of day and username 2nd
     password policies
         password age 2nd
         password complexity 2nd 3rd
         password length 2nd
         policy enforcement
     recipient policies 2nd
policies. 2nd [See also group policy]
pop-up blocker
POP3 Connector
     best practices
     capabilities 2nd
     configuration 2nd
     global accounts, routing mail from 2nd 3rd
     how it works 2nd
     individual accounts, routing mail from 2nd
     limitations 2nd
     troubleshooting 2nd 3rd
port 3389 2nd
port 4125 2nd
port 443
port 444
port 80
ports
     address translation
     nonstandard SSL ports
     opening
     port 3389 2nd
     port 4125 2nd
     port 443
     port 444
     port 80
     RRAS (Routing and Remote Access Service) firewalls 2nd
     SSL tunnel ports 2nd
power protection 2nd
power users
     access to computer management tools 2nd
     access to user management tools 2nd
PPTP (Point-to-Point Tunneling Protocol)
Premium edition (OWA) 2nd
Premium Edition (SBS 2003) 2nd
Premium with ActiveX edition (OWA) 2nd
Print Spooler
printers
     adding 2nd
Private Computer security configuration (OWA)
private domain names 2nd 3rd
private IP addresses
proactive administration
professional services
     consulting firms
     CPA firms
     law firms
profiles
     Domain profiles
     roaming profiles
     Standard profiles
properties
    Companyweb Site
         Directory Security settings 2nd
         Home Directory settings
         Web Site settings 2nd
     Default Web Site 2nd
         Directory Security settings 2nd 3rd 4th
         Home Directory settings 2nd
         Web Site settings 2nd
     Microsoft SharePoint Adminstration Site 2nd
     SharePoint Central Adminstration Site 2nd
     virtual directories 2nd
protocol definitions
protocols
     BOOTP
    DHCP
         spoof detection 2nd
     DHCP (Dynamic Host Configuration Protocol) 2nd
         address exclusions, creating 2nd
         address reservations, creating 2nd
         best practices
         configuration
         custom settings 2nd 3rd 4th
         default settings 2nd
         definition of
         network settings 2nd
         troubleshooting 2nd
    DNS
         mail routing 2nd 3rd 4th 5th 6th 7th
         reverse DNS lookups
    DNS (Domain Name System)
         aliases
         best practices
         definition of 2nd
         DNS-related Active Directory issues, troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th
         external lookups, troubleshooting 2nd 3rd 4th 5th 6th
         forwarders 2nd
         how it works 2nd
         internal lookups, troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         Management Console
         name resolution 2nd
         relationship with Active Directory 2nd 3rd 4th
         root hints 2nd
         standard server configuration 2nd
         standard workstation configuration 2nd 3rd
    FTP
         uploads/downloads, enabling 2nd 3rd
    IP
         dynamic IP lists
    IP addresses
         ranges 2nd 3rd 4th
         subnet masks 2nd
     L2TP (Layer 2 Tunneling Protocol)
     PPTP (Point-to-Point Tunneling Protocol)
     protocol definitions
    SMTP
         logging 2nd
         tar pitting 2nd
     SMTP (Simple Mail Transfer Protocol)
Provide Remote Assistance command (RWW Administrator view)
public domain names 2nd 3rd
Public Folder Store
Public or Shared Computer security configuration (OWA)
publishing
     websites 2nd 3rd




Microsoft Small Business Server 2003 Unleashed
Microsoft Small Business Server 2003 Unleashed
ISBN: 0672328054
EAN: 2147483647
Year: 2005
Pages: 253

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net