Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Networks and Windows Server 2003
Figure 2-1: A peer-to-peer network, which has no central server or management.
Figure 2-2: A client/server network, which has a central management and resource server.
Chapter 3: Designing a Network
Figure 3-1: A network with the Windows Small Business Server computer connected directly to the Internet.
Figure 3-2: Figure 3-2. A more secure network with a wireless access point placed outside the internal network.
Chapter 4: Installing Windows Small Business Server 2003
Figure 4-1: The beginning of the operating system installation.
Figure 4-2: Choosing a disk partition.
Figure 4-3: Specifying regional options.
Figure 4-4: The Windows Small Business Server Setup Wizard lists what remains to be done.
Figure 4-5: What happens when an existing DHCP server is detected.
Figure 4-6: The Component Progress page.
Figure 4-7: The Component Selection page.
Chapter 5: Upgrading or Migrating to Windows Small Business Server 2003
Figure 5-1: The Local Network Adapter Information page of the Microsoft Windows Small Business Server Setup Wizard.
Figure 5-2: The Component Selection page.
Figure 5-3: The Template Selection page of the Change User Permissions Wizard.
Chapter 6: Completing the To Do List and Other Post-Installation Tasks
Figure 6-1: The To Do List, which you can summon easily.
Figure 6-2: The help file that determines what information you’ll need for your connection to the Internet.
Figure 6-3: How the network is connected using two network adapters on your Windows Small Business Server.
Figure 6-4: Hardware arranged for a direct broadband connection.
Figure 6-5: Providing the logon information for your dial-up connection.
Figure 6-6: Selecting the services to pass through the firewall.
Figure 6-7: Selecting the Web services to pass through the firewall.
Figure 6-8: Configuring the automatic removal of e-mail attachments.
Figure 6-9: Save the details of your e-mail and Internet configuration.
Figure 6-10: Supplying the full name of the VPN server.
Figure 6-11: Activating your server.
Figure 6-12: Selecting methods of fax routing.
Figure 6-13: The Outbox tab of the Fax Properties dialog box.
Figure 6-14: Choosing where to store update files.
Figure 6-15: Setting options on the Software Update Services administration Web site.
Figure 6-16: Selecting the updates to be deployed.
Chapter 7: Disk Management
Figure 7-1: The Disk Management snap-in from inside the Server Management console.
Figure 7-2: The first page of the Initialize and Convert Disk Wizard.
Figure 7-3: The Select Disks To Initialize page of the Initialize and Convert Disk Wizard.
Figure 7-4: The Select Disks To Convert page of the Initialize and Convert Disk Wizard.
Figure 7-5: The main Disk Management console, showing the new disk (Disk 3).
Figure 7-6: Select the type of dynamic volume you want to create.
Figure 7-7: Select the dynamic disks that will be part of this volume.
Figure 7-8: Select a drive letter or mount point for the new volume.
Figure 7-9: Set the formatting options for the new volume.
Figure 7-10: The new RAID volume being generated and formatted.
Figure 7-11: The first page of the New Partition Wizard.
Figure 7-12: Select the type of partition you want to create.
Figure 7-13: Specify how much of the disk will be used by this partition.
Figure 7-14: Select a drive letter or a mount point for the new partition.
Figure 7-15: The Select Partition Type page of the New Partition Wizard.
Figure 7-16: Adjusting the size of the logical drive.
Figure 7-17: Assigning a drive letter or mount point for the logical drive.
Figure 7-18: Confirmation message for deleting a partition.
Figure 7-19: You can select more than one disk to convert.
Figure 7-20: Selecting the disks to use to extend the volume.
Figure 7-21: The Add Mirror dialog box.
Figure 7-22: A newly created mirrored disk in the process of regeneration.
Figure 7-23: Failed disk in mirror shown as missing and offline.
Figure 7-24: Balloon opens on the console to warn of a failed drive in a fault tolerant volume.
Figure 7-25: Reactivating a failed disk that’s part of a mirrored volume.
Figure 7-26: Data being regenerated on a reactivated mirrored disk.
Figure 7-27: The Remove Mirror dialog box.
Figure 7-28: The Add Drive Letter Or Path dialog box, used to mount a volume.
Chapter 8: Storage Management
Figure 8-1: The Quota tab of the Properties window for a logical drive.
Figure 8-2: The Quota Entries window.
Figure 8-3: Quota settings and status for a user.
Figure 8-4: Confirmation message for overwriting a quota entry with an imported entry.
Figure 8-5: The Advanced Attributes dialog box.
Figure 8-6: Choosing whether to encrypt the files already in a folder or just new files.
Figure 8-7: Encrypted file is shown in green.
Figure 8-8: Enabling shadow copies on a volume.
Figure 8-9: Setting storage location and limits for shadow copies.
Figure 8-10: The Enable Shadow Copies dialog box.
Figure 8-11: Accessing previous versions of a file.
Chapter 9: Users, Groups, and Security
Figure 9-1: The security groups built in to Windows Small Business Server.
Figure 9-2: Selecting options for a new distribution group.
Figure 9-3: Setting password requirements.
Figure 9-4: Choosing a logon name variation for a user account.
Figure 9-5: Mobile users are members of three groups by default.
Figure 9-6: Options for mobile clients.
Figure 9-7: Creating multiple user accounts.
Figure 9-8: Choosing a template to apply to existing user accounts.
Figure 9-9: Using the Manage Users taskpad to make changes to user accounts.
Figure 9-10: Redirecting the My Documents folder to a shared folder on the network.
Figure 9-11: Setting a path for a roaming profile.
Chapter 10: Shares, Permissions, and Group Policy
Figure 10-1: Specifying a folder to be shared.
Figure 10-2: Setting permissions for a second share of the folder.
Figure 10-3: A shared folder can be shared under more than one name.
Figure 10-4: Selecting a folder for which to set offline files.
Figure 10-5: Choosing how offline users can access this share.
Figure 10-6: Selecting the items to synchronize.
Figure 10-7: A folder with inherited and noninherited permissions.
Figure 10-8: Selecting users and groups.
Figure 10-9: Setting special permissions for a folder.
Figure 10-10: Viewing the NTFS permissions for a new folder.
Figure 10-11: Removing inheritance from a permission entry.
Figure 10-12: The administrator viewing permissions for a folder owned by a user.
Figure 10-13: Changing the ownership of a folder.
Figure 10-14: Reinstating the default inherited permissions.
Figure 10-15: Showing the permissions for Folder Operators on an object.
Figure 10-16: Viewing the order of precedence for the execution of GPOs.
Figure 10-17: Preventing inheritance from overriding settings on a GPO.
Figure 10-18: Blocking inheritance.
Figure 10-19: A check mark shows the link is enabled.
Figure 10-20: Finding GPO links.
Figure 10-21: Selecting the groups or users to which the Group Policy Object applies.
Figure 10-22: Backing up all GPOs in the domain.
Figure 10-23: Selecting the version of the GPO to restore.
Figure 10-24: Simulating a change in group membership.
Figure 10-25: Review the selections for this simulation.
Figure 10-26: On the Computer Selection page, choose whether you want to view only user policy settings.
Figure 10-27: Creating a new GPO (Group Policy Object).
Figure 10-28: Right-clicking the new policy to edit it.
Figure 10-29: Changing the name of the Administrator account.
Figure 10-30: Configure Automatic Updates in the Group Policy Object Editor.
Figure 10-31: Setting folder redirection.
Figure 10-32: The Monitoring Configuration Wizard finishes setup.
Figure 10-33: Auditing categories in the GPO for domain controllers.
Figure 10-34: Viewing the security log.
Figure 10-35: Filtering for specific types of events in a log.
Chapter 11: Installing and Managing Printers
Figure 11-1: The Local Or Network Printer page of the Add Printer Wizard.
Figure 11-2: The Select A Printer Port page of the Add Printer Wizard.
Figure 11-3: The Select A Printer Port page of the Add Printer Wizard.
Figure 11-4: The Add Port page of the Add Standard TCP/IP Printer Port Wizard.
Figure 11-5: The Additional Port Information Required page.
Figure 11-6: The Configure Standard TCP/IP Port Monitor dialog box.
Figure 11-7: The Add LPR Compatible Printer dialog box.
Figure 11-8: The Sharing tab of a printer’s Properties dialog box.
Figure 11-9: The Advanced tab of a printer’s Properties dialog box.
Figure 11-10: Print spool settings can be modified on the Advanced tab of a printer’s Properties dialog box.
Figure 11-11: The Forms tab of the Print Server Properties dialog box.
Figure 11-12: The print queue window.
Figure 11-13: The Document List page for a printer.
Figure 11-14: The Printer Migrator utility.
Figure 11-15: The Print Spooler service in Computer Management.
Chapter 12: Managing Computers on the Network
Figure 12-1: The Client Computer Names page of the Set Up Computer Wizard.
Figure 12-2: The Client Applications page of the Set Up Computer Wizard.
Figure 12-3: The IP Address Configuration page of the Set Up Server Wizard.
Figure 12-4: The General tab of the Internet Protocol (TCP/IP) Properties dialog box.
Figure 12-5: The General tab of the Internet Protocol (TCP/IP) Properties dialog box.
Figure 12-6: The Wireless Network Connection dialog box.
Figure 12-7: The Assign Users To This Computer And Migrate Their Profiles page.
Figure 12-8: The Assigned Applications page of the Client Setup Wizard.
Figure 12-9: The Network dialog box of a Windows 98 client.
Figure 12-10: The Client For Microsoft Networks Properties dialog box of a Windows 98 client.
Figure 12-11: The Identification Changes dialog box of a Windows NT 4.0 client.
Figure 12-12: Connecting to a Windows file share.
Figure 12-13: Connecting to a Windows print server using an LPR connection on a Mac OS X 10.2.x system.
Figure 12-14: The Linked Group Policy Objects tab showing the Disable SMB Signing GPO processed last (and thus having the highest priority).
Figure 12-15: The Security Options container of the Group Policy Objects Editor window.
Figure 12-16: The Remote Web Workplace logon page.
Figure 12-17: The Remote Web Workplace page.
Figure 12-18: Outlook Web Access.
Figure 12-19: The Client Computers container of the Server Management console.
Figure 12-20: The Client Applications page of the Assign Applications Wizard.
Figure 12-21: The Application Information dialog box.
Figure 12-22: The Connect To Small Business Server window.
Figure 12-23: The View Or Change Client Computers Settings dialog box.
Figure 12-24: The Computer Name Changes dialog box.
Chapter 13: Backing Up and Restoring Data
Figure 13-1: The Backup Utility in Server Management console, before configuring.
Figure 13-2: The Backup Configuration Wizard.
Figure 13-3: The Backup Location page.
Figure 13-4: The Exclude Folders dialog box.
Figure 13-5: The Define Backup Schedule page.
Figure 13-6: The Onsite Tape Changer page.
Figure 13-7: The Storage Allocation For Deleted Files And E-Mail page.
Figure 13-8: The Advanced Mode of the Windows Small Business Server 2003 Backup Utility.
Figure 13-9: Choosing files and folders to back up.
Figure 13-10: The Backup Job Information dialog box.
Figure 13-11: The Manage Small Business Server Backup pane.
Figure 13-12: The Restore And Manage Media tab of the Backup Utility.
Figure 13-13: Selecting the files and folders to restore using the Backup Utility.
Figure 13-14: The Confirm Restore dialog box.
Figure 13-15: The Previous Versions client.
Chapter 14: Using Exchange Server
Figure 14-1: Enabling Internet e-mail as part of the Configure E-Mail and Internet Connection Wizard.
Figure 14-2: Choosing between DNS e-mail routing or forwarding through your ISP’s server.
Figure 14-3: Configuring how your e-mail gets delivered to your server.
Figure 14-4: The TURN authentication information used to ensure that only your Exchange server can retrieve your e-mail.
Figure 14-5: The E-Mail Domain Name page of the Configure E-Mail and Internet Connection Wizard.
Figure 14-6: Removing potentially hazardous attachments is one way to help protect your network.
Figure 14-7: The POP3 Connector Manager, before any mailboxes have been created.
Figure 14-8: The POP3 Mailbox dialog box for a new mailbox.
Figure 14-9: Setting the download schedule for POP3 e-mail boxes.
Figure 14-10: A custom POP3 download schedule for a business that doesn’t work much on the weekends.
Figure 14-11: The Routing Rules dialog box.
Figure 14-12: Determining how specific text in the To and Cc fields will be routed.
Figure 14-13: The Troubleshooting tab of the POP3 Connector Manager.
Figure 14-14: Exchange Server Advanced Management.
Figure 14-15: Changing the e-mail password for an Exchange server that uses TURN After Authentication.
Figure 14-16: Specifying the information for a new distribution group.
Figure 14-17: Add members to the new distribution group.
Figure 14-18: The Group Manager page of the Add Distribution Group Wizard.
Figure 14-19: Setting options for a new distribution group.
Figure 14-20: The Distribution List dialog box.
Figure 14-21: The properties of the Technical Services distribution list.
Figure 14-22: The Distribution List Membership dialog box lets you add or remove members from a distribution list.
Figure 14-23: The Manage Distribution Groups pane of the Server Management console.
Figure 14-24: The Properties dialog box for the Technical Services distribution group.
Figure 14-25: Deleting a distribution group, as well as its public folder archive.
Figure 14-26: Default Policy controls the SMTP Reply To address for all users.
Figure 14-27: Adding a new SMTP address that Exchange will receive.
Figure 14-28: Changing the e-mail address of user William Wallace.
Figure 14-29: Adding an SMTP address type.
Figure 14-30: Adding a new address for user William Wallace.
Figure 14-31: Managing message defaults and delivery options in the Message Delivery Properties dialog box.
Figure 14-32: The Exchange General tab for user Charlie.
Figure 14-33: Setting user Charlie’s maximum message sending size to 1MB.
Figure 14-34: Setting the delivery options for an Exchange user.
Figure 14-35: Automatically block messages from known bad senders.
Figure 14-36: Blocking the entire contoso.com domain.
Figure 14-37: Warning indicating that filtering must be manually enabled.
Figure 14-38: Connection filtering can include block lists and specific blocks of IP addresses.
Figure 14-39: Using recipient filtering to catch e-mail sent to addresses that get only spam sent to them.
Figure 14-40: The Queue Viewer for Exchange Server.
Figure 14-41: The Queue Viewer, with the SMTP connector to Contoso.com highlighted.
Figure 14-42: The Find Messages dialog box for an SMTP connector.
Figure 14-43: The message properties of a message in the Contoso.com SMTP connector queue.
Figure 14-44: You can freeze, unfreeze, or delete a message, with or without a non-delivery report from the queue.
Chapter 15: Managing Connectivity
Figure 15-1: Viewing assigned IP addresses.
Figure 15-2: The Add Exclusion dialog box.
Figure 15-3: DNS records in the DNS console.
Figure 15-4: WINS records in the WINS console.
Figure 15-5: Remote Access Clients.
Figure 15-6: The Ports Properties dialog box.
Figure 15-7: The Internet Authentication Service console.
Figure 15-8: The Encryption tab of the Edit Dial-In Profile dialog box.
Figure 15-9: The CA Type page of the Windows Components Wizard.
Figure 15-10: The CA Identifying Information page of the Windows Components Wizard.
Figure 15-11: The Certificates Snap-In dialog box.
Figure 15-12: Requesting a new certificate for the local computer.
Figure 15-13: Requesting a new certificate for a user.
Figure 15-14: The Select EAP Providers dialog box.
Figure 15-15: The Services And Ports tab of Network Connection Properties dialog box.
Figure 15-16: The Authentication Methods dialog box.
Figure 15-17: The Networking tab.
Figure 15-18: The Advanced Security Settings dialog box.
Figure 15-19: The Smart Card Or Other Certificate Properties dialog box.
Figure 15-20: The New RADIUS Client Wizard.
Figure 15-21: The Access Method page of the New Remote Access Policy Wizard.
Figure 15-22: The User Or Group Access page of the New Remote Access Policy Wizard.
Figure 15-23: The Certificate dialog box.
Figure 15-24: The Wireless Network Connection Properties dialog box on a computer running Windows XP Service Pack 1.
Figure 15-25: The Wireless Network Properties dialog box on a computer running Windows XP Service Pack 1.
Figure 15-26: The Authentication tab of the Wireless Network Properties dialog box.
Figure 15-27: The Authentication tab of the Edit Dial-In Profile dialog box.
Figure 15-28: The Select EAP Providers dialog box.
Figure 15-29: The Wireless Network Connection Properties dialog box.
Figure 15-30: The Authentication tab of the Wireless Network Properties dialog box.
Figure 15-31: The Group Policy Objects container and the Group Policy Management console.
Figure 15-32: The Group Policy Object Editor displaying the Public Key Policies container.
Figure 15-33: The New Preferred Settings Properties dialog box.
Chapter 16: Using ISA Server 2000
Figure 16-1: The Security page for the Clients folder.
Figure 16-2: Default permissions for Domain Users.
Figure 16-3: The Client Computers page of the Assign Applications Wizard.
Figure 16-4: The Client Applications page of the Assign Applications Wizard.
Figure 16-5: Setting the application information for the Firewall client.
Figure 16-6: The New Installation Location warning.
Figure 16-7: The Configure E-Mail and Internet Connection Wizard disables any custom packet filters you defined, including L2TP VPN connections.
Figure 16-8: The Services Configuration page of the Configure E-Mail and Internet Connection Wizard.
Figure 16-9: Adding or editing a custom service allows it to be used through the ISA Server.
Figure 16-10: Confirmation message showing that the Configure E-Mail and Internet Connection Wizard completed successfully.
Figure 16-11: The Web Services Configuration page of the Configure E-Mail and Internet Connection Wizard.
Figure 16-12: Protocol Definitions in the ISA Management console.
Figure 16-13: The Protocol Connection Information page of the New Protocol Definition Wizard.
Figure 16-14: Protocol Rules in the ISA Management console.
Figure 16-15: The Protocols page of the New Protocol Rule Wizard.
Figure 16-16: For Windows Small Business Server, you should choose Specific Users And Groups.
Figure 16-17: The Internet Users group, consisting of all SBS Domain Users permitted to use the Internet.
Figure 16-18: Schedules in the ISA Management console.
Figure 16-19: Creating a new Evenings schedule to use with protocol rules.
Figure 16-20: Never delete a schedule without checking whether it is being used somewhere.
Figure 16-21: Configuring the cache size for SBSSRV server.
Figure 16-22: Changes in cache size require a restart of the Web Proxy service.
Figure 16-23: Backing up the ISA Server configuration to disk.
Figure 16-24: Specifying IP addresses on the Address Mapping page.
Figure 16-25: Selecting the protocol for the rule.
Figure 16-26: Internet Information Services (IIS) Manager console.
Figure 16-27: The Server Certificate page of the IIS Certificate Wizard.
Figure 16-28: The Available Certificates page.
Figure 16-29: The SSL Port page.
Figure 16-30: The Edit DWORD Value dialog box for KWLinks.
Figure 16-31: The General page of the Report Job Properties dialog box.
Figure 16-32: Selecting Generate Every Day for a daily report.
Figure 16-33: A daily Summary report for SBSSRV showing the protocols used in the last 24 hours.
Figure 16-34: Monitoring the ISA sessions of server SBSSRV.
Figure 16-35: The current ISA Server alerts on SBSSRV.
Figure 16-36: The cached object’s discarded alert, currently disabled.
Figure 16-37: Adding an event and the additional conditions that trigger the alert.
Figure 16-38: Selecting the actions that will be triggered by the alert.
Figure 16-39: Specifying the SMTP server and the accounts to use for the e-mail event.
Figure 16-40: The Running A Program page of the New Alert Wizard.
Figure 16-41: Changing the details of which and how many events trigger an alert.
Chapter 17: Customizing a SharePoint Web Site
Figure 17-1: The default SharePoint Web site created by Windows Small Business Server.
Figure 17-2: The General Documents page.
Figure 17-3: The General Discussion page.
Figure 17-4: The Company Photos page in Details view.
Figure 17-5: The General Documents page showing a comment and the Discussions toolbar, which appears at the bottom of the page.
Figure 17-6: The main Site Settings page.
Figure 17-7: The Add Web Parts tool pane.
Figure 17-8: Modifying a Web Part.
Figure 17-9: The Customization page for the General Documents library.
Figure 17-10: The Change General Settings page for the General Documents library.
Figure 17-11: The Top-Level Site Administration page.
Figure 17-12: The Add Users page.
Figure 17-13: The Change Anonymous Access Settings page.
Figure 17-14: The Sites And Workspaces page.
Figure 17-15: The Central Administration page.
Figure 17-16: The http://companyweb site in FrontPage 2003.
Figure 17-17: The Page Options dialog box.
Figure 17-18: The http://companyweb Home page in FrontPage.
Figure 17-19: The Link Bar Properties dialog box.
Figure 17-20: A Web Part in a newly created Web Part zone.
Figure 17-21: The Web Site Templates dialog box.
Chapter 18: Managing an Intranet Web Server
Figure 18-1: The Server Management console showing the Web Sites container.
Figure 18-2: The Web Sharing tab.
Figure 18-3: The Edit Alias dialog box.
Figure 18-4: The Web Site tab of the Properties dialog box.
Figure 18-5: The IP Address And Domain Name Restrictions dialog box.
Figure 18-6: The Grant Access dialog box.
Figure 18-7: The Authentication Methods dialog box.
Figure 18-8: The Advanced Security Settings dialog box.
Figure 18-9: The Modify The Current Certificate Assignment page of the IIS Certificate Wizard.
Figure 18-10: The Server Certificate page of the IIS Certificate Wizard.
Figure 18-11: The Performance tab of the Default Web Site Properties dialog box.
Figure 18-12: The Server Management console showing the Indexing Service container.
Chapter 19: Using SQL Server
Figure 19-1: The SQL Server Service Manager lets you start, stop, and pause the services for both local and remote databases.
Figure 19-2: The Backup utility of the SQL Server Enterprise Manager.
Figure 19-3: Assigning both a logical and a physical name to the backup file.
Figure 19-4: The SQL Server Backup dialog box.
Figure 19-5: The Edit Schedule dialog box.
Figure 19-6: The Backup Device Properties of the Default device, a file system backup.
Figure 19-7: The contents of the Default backup device on SBSSRV.
Figure 19-8: The Choose A Data Source page of the DTS Import/Export Wizard.
Figure 19-9: The Choose A Destination page of the DTS Import/Export Wizard.
Figure 19-10: The Specify Table Copy Or Query page of the DTS Import/ Export Wizard.
Figure 19-11: The Source Tables And Views page of the DTS Import/Export Wizard.
Figure 19-12: The Save, Schedule, And Replicate Package page of the DTS Import/Export Wizard.
Figure 19-13: The Save DTS Package page, which appears if you’ve selected SQL Server as your storage mechanism.
Figure 19-14: The Choose A Data Source page with an Oracle ODBC source.
Figure 19-15: The SQL Query Analyzer.
Chapter 20: Monitoring and Fine-Tuning Performance
Figure 20-1: System Monitor toolbar.
Figure 20-2: The Add Counters dialog box.
Figure 20-3: Using the Highlight option to make a graph line more visible.
Figure 20-4: The System Monitor Properties dialog box.
Figure 20-5: Displaying system information in histogram view.
Figure 20-6: Viewing system information in report view.
Figure 20-7: Changing color, background, and font used for System Monitor.
Figure 20-8: Creating new log settings.
Figure 20-9: The General tab of a log’s Properties dialog box.
Figure 20-10: Specifying events logged by the system provider.
Figure 20-11: The Log Files tab of a trace log’s Properties dialog box.
Figure 20-12: The Add Counters dialog box for new alert settings.
Figure 20-13: Specifying actions to take when a threshold is crossed.
Figure 20-14: Adding arguments to the alert to produce additional information.
Figure 20-15: The Core Server Alerts in Health Monitor.
Figure 20-16: Display of the Memory Available alert.
Figure 20-17: Settings to generate an alert.
Figure 20-18: Opening an alert threshold Properties page.
Figure 20-19: Setting command-line options.
Figure 20-20: Selecting a type of data collector to create.
Figure 20-21: Selecting an object to monitor.
Chapter 21: Disaster Planning and Fault Tolerance
Figure 21-1: The Advanced mode of the Windows Small Business Server Backup utility.
Figure 21-2: The Backup Destination page of the Automated System Recovery Preparation Wizard.
Figure 21-3: The Backup Progress window during Automated System Recovery Preparation.
Figure 21-4: The Create Automated System Recovery Disk prompt.
Figure 21-5: Always carefully label each ASR disk exactly as requested.
Figure 21-6: The Windows Setup window, installing the Recovery Console.
Figure 21-7: The Startup And Recovery dialog box.
Appendix A: Partially Automating Installation
Figure A-1: The Setup Manager Product page.
Figure A-2: The Setup Manager User Interaction page.
Figure A-3: Specifying display settings.
Figure A-4: The Setup Manager Computer Names page.
Figure A-5: Setting the Administrator password.
Figure A-6: Running Sysprep.
Appendix B: Installing ISA Server 2000 and SQL Server 2000
Figure B-1: Choosing which mode of ISA Server to use.
Figure B-2: Specifying on which drives to store the Web cache.
Figure B-3: The Local Address Table dialog box.
Figure B-4: The Installation Selection page.
Figure B-5: The Setup Type page.
Figure B-6: The Services Accounts page.
Figure B-7: The Instance Name page.
Figure B-8: The Select A SQL Server page of the Register SQL Server Wizard.
Figure B-9: SHAREPOINT added to the SQL Server Enterprise Manager console.
< Day Day Up >
Previous page
Table of content
Next page
Microsoft Windows Small Business Server 2003 Administrators Companion (Pro-Administrators Companion)
ISBN: 0735620202
EAN: 2147483647
Year: 2004
Pages: 224
Authors:
Charlie Russel
,
Sharon Crawford
,
Jason Gerend
BUY ON AMAZON
MySQL Stored Procedure Programming
MySQL Stored Programming Tutorial
Transactional Support in MySQL
Conclusion
Execution Mode Options for Stored Programs
Stored Programs and Code Injection
ERP and Data Warehousing in Organizations: Issues and Challenges
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Context Management of ERP Processes in Virtual Communities
Distributed Data Warehouse for Geo-spatial Services
Healthcare Information: From Administrative to Practice Databases
Development of Interactive Web Sites to Enhance Police/Community Relations
Oracle Developer Forms Techniques
Creating a Customized Sign-on Form
Special Tips for Working with Multi-form Applications
Summary
Error-Message Handling
Normal Trigger Intelligence
Java for RPG Programmers, 2nd Edition
The World Of Java
Javas Language And Syntax
An Object Orientation
Exceptions
Threads
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Case Studies
Web Services and Primitive SOA
Application service design (a step-by-step process)
You mustUnderstand this
SOA support in J2EE
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Cause and Effect
Scale and Speed
Color, Light, and Focus
Custom Scene Transitions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies