S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

sales impact 2nd
Samba
sandboxes
SANS.org
SBCore Service
SBS 2000 2nd 3rd 4th
SBS 2003 2nd 3rd
     Premium Edition 2nd
     Service Pack 1 2nd
     Standard Edition 2nd
SBS 4.0 2nd 3rd 4th
SBS 4.0a 2nd
SBS 4.5 2nd 3rd
SBS advantages 2nd
SBS Backup Wizard 2nd 3rd 4th 5th 6th 7th 8th 9th
     accessing
     Backup Data Summary page
     backup notifications 2nd
     creating backups 2nd 3rd
     Define Backup Schedule page
     excluding data from 2nd 3rd 4th
     limitations 2nd 3rd
     restoring databases from backup 2nd
     settings generated by 2nd
     Storage Allocation for Deleted Files and Emails page
SBS configuration
     Automatic Updates 2nd 3rd
     backup 2nd
     Fax services 2nd
     Internet connections 2nd
         completing setup 2nd
         Exchange configuration 2nd
         firewall configuration 2nd
         network configuration 2nd 3rd 4th 5th
     monitoring
     printers 2nd
    remote access
         Activate Your Server Wizard 2nd
         Add Additional Licenses Wizard 2nd
         cautions
         Configure Remote Access Wizard 2nd
     To-Do list
         Automatic Updates 2nd 3rd
         backup, configuring 2nd
         Fax services, configuring 2nd
         monitoring, configuring
         printers, adding 2nd
         users and computers, adding 2nd
     users and computers, adding 2nd
SBS downloads site 2nd 3rd 4th
SBS installation 2nd 3rd 4th
     best practices 2nd 3rd 4th
     component installation 2nd 3rd 4th
     integrated installation 2nd 3rd 4th
         Company Information window 2nd
         Internal Domain Information window 2nd
         SBS Setup Wizard 2nd
         Setup Requirements window 2nd
     troubleshooting 2nd 3rd 4th 5th
         err.exe tool 2nd
         eventlog.txt file 2nd 3rd 4th 5th 6th 7th
         installation log file location
     Windows 2003 installation 2nd
SBS installations, planning
     best practices 2nd
     CALs (Client Access Licenses) 2nd
         determining number/type of 2nd
         Device CALs 2nd
         Terminal Server CALs 2nd 3rd
         User CALs 2nd 3rd
     client base, determining 2nd 3rd
    disk storage
         backups 2nd
         fault tolerance 2nd 3rd 4th 5th 6th
         multiple partitions 2nd 3rd
         multiple spindles 2nd 3rd
     networks
         DHCP (Dynamic Host Configuration Protocol) configuration
         domain names 2nd 3rd
         Internet connections 2nd
         IP address ranges 2nd 3rd 4th
         NICs (network interface cards) 2nd 3rd 4th
         subnet masks 2nd
         switches 2nd
         wireless access 2nd
     questions to ask 2nd
SBS limitations 2nd 3rd
SBS Setup Wizard 2nd
sbs_wpad.txt file
SBSClientApps.log
Sbsmig.log
SBSNetSetup.log
SBSUsers Organizational Unit (OU)
scanning tools 2nd
Scheduled Task Wizard 2nd
scheduling backups 2nd 3rd
SCL (Spam Confidence Level)
scope
     GPOs (group policy objects) 2nd
     group policy 2nd
scope (group policy) 2nd
Scope tab (GPMC) 2nd
scripts
     blocking websites with
scw.log
Secunia
secure website access 2nd
     SSL certificates, exporting from SBS 2nd
     SSL certificates, importing into Macintosh Certificate Store 2nd
SecureNat clients 2nd
security 2nd 3rd 4th
     annual security checklist 2nd
     antivirus tools 2nd 3rd 4th 5th
     automatic updates
     backups 2nd
     best practices 2nd 3rd 4th
     budget calculation 2nd
     Cached Exchange Mode (Outlook)
     DEP (Data Execution Prevention)
     DHCP spoof detection 2nd
     educated end users 2nd 3rd 4th 5th 6th
     electronic patient healthcare information (ePHI)
     Encrypted File System 2nd
     fault tolerance
         hardware versus software 2nd
         RAID 2nd 3rd
    firewalls
         configuration 2nd
     Internet Explorer
         ActiveX restrictions 2nd 3rd 4th 5th
         MIME type handling
         pop-up blocker
     intrusion detection 2nd 3rd 4th 5th
     monthly security checklist 2nd
     Network Quarantine Control
     NTFS permissions 2nd
         Allow/Deny 2nd 3rd
         applying 2nd
         best practices 2nd
         combining with share permissions 2nd
         Effective Permissions 2nd
         file permissions 2nd
         inheritance 2nd
         ownership 2nd 3rd
         Special Permissions 2nd 3rd
         volume/folder permissions 2nd 3rd
     Office 2nd 3rd
     Outlook Express
    OWA (Outlook Web Access)
         Private Computer security configuration
         Public or Shared Computer security configuration
     passwords 2nd
         age 2nd
         best practices 2nd
         complexity 2nd 3rd
         Configure Password Policies Wizard 2nd
         invalid password characters (OMA)
         length 2nd
         policy enforcement
     patches 2nd 3rd
         best practices 2nd
         compared to service packs 2nd
         MBSA (Microsoft Baseline Security Analyzer) 2nd
         Microsoft Security Bulletin notifications Comprehensive edition
         moderately secure firms
         notification process 2nd
         open firms 2nd
         paranoid firms
         patch zones 2nd
         resources 2nd
         risk analysis 2nd 3rd
         SBS downloads site 2nd 3rd 4th
         Shavlik HFNetChk Pro
         support for
         testing 2nd 3rd
         troubleshooting 2nd 3rd 4th
         version codes 2nd
         virtualization
         Windows Update and Automatic Updates 2nd 3rd 4th
         WSUS (Windows Software Update Services) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
    permissions
         backups 2nd
     personal identity information (PII)
     physical security 2nd 3rd
     remote control software 2nd 3rd
    resources
         free antivirus programs 2nd
         free online scanning tools 2nd
         general security information 2nd
         security response toolkit 2nd
         WSUS resources 2nd
     restricted users 2nd 3rd 4th 5th 6th 7th 8th
     reverse NDR attacks
     risk management 2nd
     RRAS (Routing and Remote Access Service) firewalls 2nd
         CEICW (Configure Email and Internet Connection Wizard) 2nd 3rd
         filtering connections 2nd
         packet filters, creating 2nd
         packet forwarding 2nd
         port address translation
         ports 2nd
         testing
     secure website access 2nd
         SSL certificates, exporting from SBS 2nd
         SSL certificates, importing into Macintosh Certificate Store 2nd
     security bulletins
     Security Center 2nd
     Security Configuration Wizard
     security groups 2nd 3rd 4th 5th 6th
     security review process 2nd 3rd 4th 5th 6th
     security toolkits 2nd 3rd 4th 5th 6th
     share permissions 2nd 3rd 4th 5th
         best practices 2nd
         Change
         combining with NTFS permissions 2nd
         Full Control
         Read
     SMB signing 2nd 3rd
    spyware
         antispyware tools 2nd 3rd 4th 5th 6th
         characteristics of 2nd
         compared to viruses
         Microsoft AntiSpyware website
         symptoms of 2nd
     SSL certificates 2nd 3rd 4th 5th 6th 7th
         creating 2nd
     SSL tunnel ports 2nd
     troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         common access problems 2nd 3rd
         effective permissions 2nd
     unauthorized access, protecting against 2nd
    user permissions
         changing 2nd
     viruses
     VPNs (virtual private networks)
     vulnerability 2nd
     Windows Firewall 2nd
         Allow Port Exceptions[colon] ENABLED setting 2nd
         Define Port Exceptions[colon] ENABLED setting 2nd
         Define Program Exceptions[colon] ENABLED setting 2nd
     wireless networks
Security Accounts Manager
security bulletins
Security Center 2nd
Security Configuration Wizard
security groups 2nd
security patches. [See patches]
security response toolkit 2nd
security toolkits 2nd 3rd 4th 5th 6th
security. [See also backups]
Select ISA Server Services dialog box
server security
     best practices 2nd
     Encrypted File System 2nd
     NTFS permissions 2nd
         Allow/Deny 2nd 3rd
         applying 2nd
         best practices 2nd
         combining with share permissions 2nd
         Effective Permissions 2nd
         file permissions 2nd
         inheritance 2nd
         ownership 2nd 3rd
         Special Permissions 2nd 3rd
         volume/folder permissions 2nd 3rd
     passwords 2nd
         age 2nd
         best practices 2nd
         complexity 2nd 3rd
         Configure Password Policies Wizard 2nd
         length 2nd
         policy enforcement
     physical security 2nd 3rd
     share permissions 2nd 3rd 4th 5th
         best practices 2nd
         Change
         combining with NTFS permissions 2nd
         Full Control
         Read
     troubleshooting
         common access problems 2nd 3rd
         effective permissions 2nd
Server service
Server Specifications section (performance reports)
servers
     accessing with RWW (Remote Web Workplace) 2nd 3rd 4th
     activating 2nd
    adding to network
         domain controllers
         manually joining servers to domain 2nd
         Set Up Server Computers Wizard 2nd
    connecting from Macintosh platforms
         browse method 2nd
         Chooser method 2nd
         Connect to Share method 2nd
     DHCP servers
    DNS (Domain Name System)
         configuration 2nd
     DNS servers
    Exchange. [See Exchange]
     hot spare servers
    ISA Server. [See ISA Server]
     remote access configuration 2nd 3rd
    Terminal Server
         resources 2nd
    terminal. [See Terminal Services]
Service Pack 1 (SBS 2003) 2nd
Service Pack 2. [See SP 2]
service packs
     compared to security patches 2nd
Service Unavailable error (browsers) 2nd
services
     Event Log
     Fax
     IPSEC
     Kerberos Key Distribution Center
     Microsoft Exchange Information Store
     Microsoft Exchange Management
     Microsoft Exchange POP3
     Microsoft Exchange System Attendant
     Netlogon 2nd
     performance alerts 2nd 3rd 4th 5th
     Print Spooler
     Recipient Update Service 2nd 3rd
     Routing and Remote Access
     RRAS (Routing and Remote Access Service) 2nd 3rd 4th
         best practices 2nd
         firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
         troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
     SBCore Service
     Security Accounts Manager
     Server
     Services for Macintosh 2nd
         AppleTalk, enabling 2nd
         configuring 2nd
         Directory Access 2nd
         installing 2nd
         Macintosh UAM, installing 2nd
         shares, creating 2nd
         volumes, mounting 2nd 3rd 4th 5th 6th
     Terminal Services 2nd 3rd
         Application mode 2nd
         applications, installing 2nd 3rd
         best practices 2nd
         Configuration console 2nd
         installation 2nd
         Licensing service 2nd 3rd
         Manager console 2nd
         Quick Start guide for Terminal Services
         Remote Administration mode 2nd
         TDP-tcp connection properties 2nd
         troubleshooting 2nd 3rd 4th 5th 6th 7th
     third-party web services, installing 2nd 3rd
     VSS (Volume Shadow Copy Service)
     WINS (Windows Internet Name Service)
     World Wide Web Publishing
     WSUS (Windows Software Update Services) 2nd 3rd
Services for Macintosh 2nd
     AppleTalk, enabling 2nd
     configuring 2nd
     Directory Access 2nd
     installing 2nd
     Macintosh UAM, installing 2nd
     shares, creating 2nd
    volumes, mounting
         browse method 2nd
         Chooser method 2nd
         Connect to Share method 2nd
services. [See also WSS (Windows SharePoint Services)]
Sessions tab (RDP-tcp connection properties)
Set Up Client Applications Wizard 2nd
Set Up Client Computers Wizard
     computers, adding to network 2nd 3rd
Set Up Server Computers Wizard 2nd
Settings tab (GPMC) 2nd
Setup Assistant (Entourage 2004) 2nd
Setup Requirements window 2nd
share permissions 2nd 3rd 4th 5th
     best practices 2nd
     Change
     combining with NTFS permissions 2nd
     Full Control
     Read
Share Permissions dialog box 2nd
SharePoint Central Adminstration Site (IIS)
     default settings 2nd
SharePoint Timer Service
     starting
     stopping
SharePoint. [See WSS (Windows SharePoint Services)]
shares
     Services for Macintosh 2nd
sharing files
    Macintosh computers. [See Macintosh platforms]
Shavlik HFNetChk Pro
signatures
     SMB signing 2nd 3rd
Simple Mail Transfer Protocol (SMTP)
single loss expectancy (SLE)
SLE (single loss expectancy)
small business community resources
     mailing lists 2nd
     websites/blogs 2nd
Small Business Server Auditing GPO 2nd
Small Business Server Client Computer GPO 2nd
Small Business Server Domain Password Policy GPO 2nd 3rd
Small Business Server Internet Connection Firewall GPO 2nd
Small Business Server Lockout Policy GPO 2nd
Small Business Server Remote Assistance Policy GPO 2nd
Small Business Server Windows Firewall GPO
Small Business ServerDomain Password Policy object
small businesses
     case studies
         Calvert Technologies 2nd
         Correct Solutions Pty Ltd. 2nd
         HeadNETWORKS, LLC 2nd 3rd
         Interprom Computer Technologies 2nd
         JD Fogg Technology 2nd 3rd
         Norwich Group 2nd
         Rehab Designs, Inc. 2nd
     cash flow 2nd
     definition of 2nd
     finance 2nd
     industry niches
         business valuation
         consulting firms
         CPA firms
         law firms
         medical offices
         retail
     marketing 2nd
    micro businesses
         definition of 2nd
    needs of
         prioritized list of needs 2nd
         SBS features to meet those needs 2nd 3rd
     overlapping needs of enterprise and small business 2nd
     sales impact 2nd
    sole proprietary
         definition of 2nd
     technology resources 2nd
smart hosts
     mail routing 2nd 3rd 4th 5th 6th 7th 8th
SmartPhones
     ActiveSync
SMB
     .local domain issues 2nd 3rd
     Active Directory Access, configuring 2nd 3rd 4th 5th
     SMB signing 2nd 3rd
SMS Monitoring and Reporting
     resources 2nd
SMTP
     logging 2nd
     tar pitting 2nd
SMTP (Simple Mail Transfer Protocol)
SMTP Connector setting (Exchange)
soft recovery
software deployment
     group policy
Software Restriction Policies
software settings (group policy)
sole proprietary
     definition of 2nd
SP (Service Pack) 2 2nd
     automatic updates
     DEP (Data Execution Prevention)
     Internet Explorer
         ActiveX restrictions 2nd 3rd 4th 5th
         MIME type handling
         pop-up blocker
     Outlook Express
     Security Center 2nd
     Windows Firewall 2nd
         Allow Port Exceptions[colon] ENABLED setting 2nd
         Define Port Exceptions[colon] ENABLED setting 2nd
         Define Program Exceptions[colon] ENABLED setting 2nd
SP 1 (SBS 2003) 2nd
spam blocking 2nd
     blacklists
     dynamic IP lists
     IMF (Intelligent Message Filter) 2nd 3rd 4th
         best practices
         configuration 2nd
         installation
         SCL values, setting with Outlook 2nd
         troubleshooting 2nd 3rd
     recipient filtering 2nd 3rd
     reverse DNS lookups
     SMTP tar pitting 2nd
Spam Confidence Level (SCL)
Special Permissions (NTFS) 2nd 3rd
spell checking
     OWA (Outlook Web Access)
spindles
     multiple spindles 2nd 3rd
spoof detection 2nd
spyware
     antispyware tools 2nd 3rd 4th 5th 6th
     characteristics of 2nd
     compared to viruses
     Microsoft AntiSpyware website
     symptoms of 2nd
SQL Server
     upgrading database engines to 2nd
Srv03_gdr code
Srv03_qfe code
Srv03_rtm code
Srv03_spx code
SSL
    certificates
         exporting from SBS 2nd
         importing into Macintosh Certificate Store 2nd
     nonstandard SSL ports
     tunnel ports 2nd
SSL certificates 2nd 3rd 4th 5th 6th 7th
     creating 2nd
Standard Edition (SBS 2003) 2nd
Standard profiles
starting
     SharePoint Timer Service
stopping
     SharePoint Timer Service
Storage Allocation for Deleted Files and Emails page (SBS Backup Wizard)
storage groups 2nd
storage. [See hard disks]
striping 2nd
subnet masks 2nd
subsites (Companyweb site)
     creating 2nd 3rd
Support Tools package
switches 2nd
synchronization
     ActiveSync 2nd 3rd 4th 5th
     WSUS (Windows Software Update Services) 2nd
SysInternals
system recovery 2nd 3rd 4th 5th




Microsoft Small Business Server 2003 Unleashed
Microsoft Small Business Server 2003 Unleashed
ISBN: 0672328054
EAN: 2147483647
Year: 2005
Pages: 253

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net