List of Figures

 < Day Day Up > 



Chapter 2: Networks and Windows Server 2003

Figure 2-1: A peer-to-peer network, which has no central server or management.
Figure 2-2: A client/server network, which has a central management and resource server.

Chapter 3: Designing a Network

Figure 3-1: A network with the Windows Small Business Server computer connected directly to the Internet.
Figure 3-2: Figure 3-2. A more secure network with a wireless access point placed outside the internal network.

Chapter 4: Installing Windows Small Business Server 2003

Figure 4-1: The beginning of the operating system installation.
Figure 4-2: Choosing a disk partition.
Figure 4-3: Specifying regional options.
Figure 4-4: The Windows Small Business Server Setup Wizard lists what remains to be done.
Figure 4-5: What happens when an existing DHCP server is detected.
Figure 4-6: The Component Progress page.
Figure 4-7: The Component Selection page.

Chapter 5: Upgrading or Migrating to Windows Small Business Server 2003

Figure 5-1: The Local Network Adapter Information page of the Microsoft Windows Small Business Server Setup Wizard.
Figure 5-2: The Component Selection page.
Figure 5-3: The Template Selection page of the Change User Permissions Wizard.

Chapter 6: Completing the To Do List and Other Post-Installation Tasks

Figure 6-1: The To Do List, which you can summon easily.
Figure 6-2: The help file that determines what information you’ll need for your connection to the Internet.
Figure 6-3: How the network is connected using two network adapters on your Windows Small Business Server.
Figure 6-4: Hardware arranged for a direct broadband connection.
Figure 6-5: Providing the logon information for your dial-up connection.
Figure 6-6: Selecting the services to pass through the firewall.
Figure 6-7: Selecting the Web services to pass through the firewall.
Figure 6-8: Configuring the automatic removal of e-mail attachments.
Figure 6-9: Save the details of your e-mail and Internet configuration.
Figure 6-10: Supplying the full name of the VPN server.
Figure 6-11: Activating your server.
Figure 6-12: Selecting methods of fax routing.
Figure 6-13: The Outbox tab of the Fax Properties dialog box.
Figure 6-14: Choosing where to store update files.
Figure 6-15: Setting options on the Software Update Services administration Web site.
Figure 6-16: Selecting the updates to be deployed.

Chapter 7: Disk Management

Figure 7-1: The Disk Management snap-in from inside the Server Management console.
Figure 7-2: The first page of the Initialize and Convert Disk Wizard.
Figure 7-3: The Select Disks To Initialize page of the Initialize and Convert Disk Wizard.
Figure 7-4: The Select Disks To Convert page of the Initialize and Convert Disk Wizard.
Figure 7-5: The main Disk Management console, showing the new disk (Disk 3).
Figure 7-6: Select the type of dynamic volume you want to create.
Figure 7-7: Select the dynamic disks that will be part of this volume.
Figure 7-8: Select a drive letter or mount point for the new volume.
Figure 7-9: Set the formatting options for the new volume.
Figure 7-10: The new RAID volume being generated and formatted.
Figure 7-11: The first page of the New Partition Wizard.
Figure 7-12: Select the type of partition you want to create.
Figure 7-13: Specify how much of the disk will be used by this partition.
Figure 7-14: Select a drive letter or a mount point for the new partition.
Figure 7-15: The Select Partition Type page of the New Partition Wizard.
Figure 7-16: Adjusting the size of the logical drive.
Figure 7-17: Assigning a drive letter or mount point for the logical drive.
Figure 7-18: Confirmation message for deleting a partition.
Figure 7-19: You can select more than one disk to convert.
Figure 7-20: Selecting the disks to use to extend the volume.
Figure 7-21: The Add Mirror dialog box.
Figure 7-22: A newly created mirrored disk in the process of regeneration.
Figure 7-23: Failed disk in mirror shown as missing and offline.
Figure 7-24: Balloon opens on the console to warn of a failed drive in a fault tolerant volume.
Figure 7-25: Reactivating a failed disk that’s part of a mirrored volume.
Figure 7-26: Data being regenerated on a reactivated mirrored disk.
Figure 7-27: The Remove Mirror dialog box.
Figure 7-28: The Add Drive Letter Or Path dialog box, used to mount a volume.

Chapter 8: Storage Management

Figure 8-1: The Quota tab of the Properties window for a logical drive.
Figure 8-2: The Quota Entries window.
Figure 8-3: Quota settings and status for a user.
Figure 8-4: Confirmation message for overwriting a quota entry with an imported entry.
Figure 8-5: The Advanced Attributes dialog box.
Figure 8-6: Choosing whether to encrypt the files already in a folder or just new files.
Figure 8-7: Encrypted file is shown in green.
Figure 8-8: Enabling shadow copies on a volume.
Figure 8-9: Setting storage location and limits for shadow copies.
Figure 8-10: The Enable Shadow Copies dialog box.
Figure 8-11: Accessing previous versions of a file.

Chapter 9: Users, Groups, and Security

Figure 9-1: The security groups built in to Windows Small Business Server.
Figure 9-2: Selecting options for a new distribution group.
Figure 9-3: Setting password requirements.
Figure 9-4: Choosing a logon name variation for a user account.
Figure 9-5: Mobile users are members of three groups by default.
Figure 9-6: Options for mobile clients.
Figure 9-7: Creating multiple user accounts.
Figure 9-8: Choosing a template to apply to existing user accounts.
Figure 9-9: Using the Manage Users taskpad to make changes to user accounts.
Figure 9-10: Redirecting the My Documents folder to a shared folder on the network.
Figure 9-11: Setting a path for a roaming profile.

Chapter 10: Shares, Permissions, and Group Policy

Figure 10-1: Specifying a folder to be shared.
Figure 10-2: Setting permissions for a second share of the folder.
Figure 10-3: A shared folder can be shared under more than one name.
Figure 10-4: Selecting a folder for which to set offline files.
Figure 10-5: Choosing how offline users can access this share.
Figure 10-6: Selecting the items to synchronize.
Figure 10-7: A folder with inherited and noninherited permissions.
Figure 10-8: Selecting users and groups.
Figure 10-9: Setting special permissions for a folder.
Figure 10-10: Viewing the NTFS permissions for a new folder.
Figure 10-11: Removing inheritance from a permission entry.
Figure 10-12: The administrator viewing permissions for a folder owned by a user.
Figure 10-13: Changing the ownership of a folder.
Figure 10-14: Reinstating the default inherited permissions.
Figure 10-15: Showing the permissions for Folder Operators on an object.
Figure 10-16: Viewing the order of precedence for the execution of GPOs.
Figure 10-17: Preventing inheritance from overriding settings on a GPO.
Figure 10-18: Blocking inheritance.
Figure 10-19: A check mark shows the link is enabled.
Figure 10-20: Finding GPO links.
Figure 10-21: Selecting the groups or users to which the Group Policy Object applies.
Figure 10-22: Backing up all GPOs in the domain.
Figure 10-23: Selecting the version of the GPO to restore.
Figure 10-24: Simulating a change in group membership.
Figure 10-25: Review the selections for this simulation.
Figure 10-26: On the Computer Selection page, choose whether you want to view only user policy settings.
Figure 10-27: Creating a new GPO (Group Policy Object).
Figure 10-28: Right-clicking the new policy to edit it.
Figure 10-29: Changing the name of the Administrator account.
Figure 10-30: Configure Automatic Updates in the Group Policy Object Editor.
Figure 10-31: Setting folder redirection.
Figure 10-32: The Monitoring Configuration Wizard finishes setup.
Figure 10-33: Auditing categories in the GPO for domain controllers.
Figure 10-34: Viewing the security log.
Figure 10-35: Filtering for specific types of events in a log.

Chapter 11: Installing and Managing Printers

Figure 11-1: The Local Or Network Printer page of the Add Printer Wizard.
Figure 11-2: The Select A Printer Port page of the Add Printer Wizard.
Figure 11-3: The Select A Printer Port page of the Add Printer Wizard.
Figure 11-4: The Add Port page of the Add Standard TCP/IP Printer Port Wizard.
Figure 11-5: The Additional Port Information Required page.
Figure 11-6: The Configure Standard TCP/IP Port Monitor dialog box.
Figure 11-7: The Add LPR Compatible Printer dialog box.
Figure 11-8: The Sharing tab of a printer’s Properties dialog box.
Figure 11-9: The Advanced tab of a printer’s Properties dialog box.
Figure 11-10: Print spool settings can be modified on the Advanced tab of a printer’s Properties dialog box.
Figure 11-11: The Forms tab of the Print Server Properties dialog box.
Figure 11-12: The print queue window.
Figure 11-13: The Document List page for a printer.
Figure 11-14: The Printer Migrator utility.
Figure 11-15: The Print Spooler service in Computer Management.

Chapter 12: Managing Computers on the Network

Figure 12-1: The Client Computer Names page of the Set Up Computer Wizard.
Figure 12-2: The Client Applications page of the Set Up Computer Wizard.
Figure 12-3: The IP Address Configuration page of the Set Up Server Wizard.
Figure 12-4: The General tab of the Internet Protocol (TCP/IP) Properties dialog box.
Figure 12-5: The General tab of the Internet Protocol (TCP/IP) Properties dialog box.
Figure 12-6: The Wireless Network Connection dialog box.
Figure 12-7: The Assign Users To This Computer And Migrate Their Profiles page.
Figure 12-8: The Assigned Applications page of the Client Setup Wizard.
Figure 12-9: The Network dialog box of a Windows 98 client.
Figure 12-10: The Client For Microsoft Networks Properties dialog box of a Windows 98 client.
Figure 12-11: The Identification Changes dialog box of a Windows NT 4.0 client.
Figure 12-12: Connecting to a Windows file share.
Figure 12-13: Connecting to a Windows print server using an LPR connection on a Mac OS X 10.2.x system.
Figure 12-14: The Linked Group Policy Objects tab showing the Disable SMB Signing GPO processed last (and thus having the highest priority).
Figure 12-15: The Security Options container of the Group Policy Objects Editor window.
Figure 12-16: The Remote Web Workplace logon page.
Figure 12-17: The Remote Web Workplace page.
Figure 12-18: Outlook Web Access.
Figure 12-19: The Client Computers container of the Server Management console.
Figure 12-20: The Client Applications page of the Assign Applications Wizard.
Figure 12-21: The Application Information dialog box.
Figure 12-22: The Connect To Small Business Server window.
Figure 12-23: The View Or Change Client Computers Settings dialog box.
Figure 12-24: The Computer Name Changes dialog box.

Chapter 13: Backing Up and Restoring Data

Figure 13-1: The Backup Utility in Server Management console, before configuring.
Figure 13-2: The Backup Configuration Wizard.
Figure 13-3: The Backup Location page.
Figure 13-4: The Exclude Folders dialog box.
Figure 13-5: The Define Backup Schedule page.
Figure 13-6: The Onsite Tape Changer page.
Figure 13-7: The Storage Allocation For Deleted Files And E-Mail page.
Figure 13-8: The Advanced Mode of the Windows Small Business Server 2003 Backup Utility.
Figure 13-9: Choosing files and folders to back up.
Figure 13-10: The Backup Job Information dialog box.
Figure 13-11: The Manage Small Business Server Backup pane.
Figure 13-12: The Restore And Manage Media tab of the Backup Utility.
Figure 13-13: Selecting the files and folders to restore using the Backup Utility.
Figure 13-14: The Confirm Restore dialog box.
Figure 13-15: The Previous Versions client.

Chapter 14: Using Exchange Server

Figure 14-1: Enabling Internet e-mail as part of the Configure E-Mail and Internet Connection Wizard.
Figure 14-2: Choosing between DNS e-mail routing or forwarding through your ISP’s server.
Figure 14-3: Configuring how your e-mail gets delivered to your server.
Figure 14-4: The TURN authentication information used to ensure that only your Exchange server can retrieve your e-mail.
Figure 14-5: The E-Mail Domain Name page of the Configure E-Mail and Internet Connection Wizard.
Figure 14-6: Removing potentially hazardous attachments is one way to help protect your network.
Figure 14-7: The POP3 Connector Manager, before any mailboxes have been created.
Figure 14-8: The POP3 Mailbox dialog box for a new mailbox.
Figure 14-9: Setting the download schedule for POP3 e-mail boxes.
Figure 14-10: A custom POP3 download schedule for a business that doesn’t work much on the weekends.
Figure 14-11: The Routing Rules dialog box.
Figure 14-12: Determining how specific text in the To and Cc fields will be routed.
Figure 14-13: The Troubleshooting tab of the POP3 Connector Manager.
Figure 14-14: Exchange Server Advanced Management.
Figure 14-15: Changing the e-mail password for an Exchange server that uses TURN After Authentication.
Figure 14-16: Specifying the information for a new distribution group.
Figure 14-17: Add members to the new distribution group.
Figure 14-18: The Group Manager page of the Add Distribution Group Wizard.
Figure 14-19: Setting options for a new distribution group.
Figure 14-20: The Distribution List dialog box.
Figure 14-21: The properties of the Technical Services distribution list.
Figure 14-22: The Distribution List Membership dialog box lets you add or remove members from a distribution list.
Figure 14-23: The Manage Distribution Groups pane of the Server Management console.
Figure 14-24: The Properties dialog box for the Technical Services distribution group.
Figure 14-25: Deleting a distribution group, as well as its public folder archive.
Figure 14-26: Default Policy controls the SMTP Reply To address for all users.
Figure 14-27: Adding a new SMTP address that Exchange will receive.
Figure 14-28: Changing the e-mail address of user William Wallace.
Figure 14-29: Adding an SMTP address type.
Figure 14-30: Adding a new address for user William Wallace.
Figure 14-31: Managing message defaults and delivery options in the Message Delivery Properties dialog box.
Figure 14-32: The Exchange General tab for user Charlie.
Figure 14-33: Setting user Charlie’s maximum message sending size to 1MB.
Figure 14-34: Setting the delivery options for an Exchange user.
Figure 14-35: Automatically block messages from known bad senders.
Figure 14-36: Blocking the entire contoso.com domain.
Figure 14-37: Warning indicating that filtering must be manually enabled.
Figure 14-38: Connection filtering can include block lists and specific blocks of IP addresses.
Figure 14-39: Using recipient filtering to catch e-mail sent to addresses that get only spam sent to them.
Figure 14-40: The Queue Viewer for Exchange Server.
Figure 14-41: The Queue Viewer, with the SMTP connector to Contoso.com highlighted.
Figure 14-42: The Find Messages dialog box for an SMTP connector.
Figure 14-43: The message properties of a message in the Contoso.com SMTP connector queue.
Figure 14-44: You can freeze, unfreeze, or delete a message, with or without a non-delivery report from the queue.

Chapter 15: Managing Connectivity

Figure 15-1: Viewing assigned IP addresses.
Figure 15-2: The Add Exclusion dialog box.
Figure 15-3: DNS records in the DNS console.
Figure 15-4: WINS records in the WINS console.
Figure 15-5: Remote Access Clients.
Figure 15-6: The Ports Properties dialog box.
Figure 15-7: The Internet Authentication Service console.
Figure 15-8: The Encryption tab of the Edit Dial-In Profile dialog box.
Figure 15-9: The CA Type page of the Windows Components Wizard.
Figure 15-10: The CA Identifying Information page of the Windows Components Wizard.
Figure 15-11: The Certificates Snap-In dialog box.
Figure 15-12: Requesting a new certificate for the local computer.
Figure 15-13: Requesting a new certificate for a user.
Figure 15-14: The Select EAP Providers dialog box.
Figure 15-15: The Services And Ports tab of Network Connection Properties dialog box.
Figure 15-16: The Authentication Methods dialog box.
Figure 15-17: The Networking tab.
Figure 15-18: The Advanced Security Settings dialog box.
Figure 15-19: The Smart Card Or Other Certificate Properties dialog box.
Figure 15-20: The New RADIUS Client Wizard.
Figure 15-21: The Access Method page of the New Remote Access Policy Wizard.
Figure 15-22: The User Or Group Access page of the New Remote Access Policy Wizard.
Figure 15-23: The Certificate dialog box.
Figure 15-24: The Wireless Network Connection Properties dialog box on a computer running Windows XP Service Pack 1.
Figure 15-25: The Wireless Network Properties dialog box on a computer running Windows XP Service Pack 1.
Figure 15-26: The Authentication tab of the Wireless Network Properties dialog box.
Figure 15-27: The Authentication tab of the Edit Dial-In Profile dialog box.
Figure 15-28: The Select EAP Providers dialog box.
Figure 15-29: The Wireless Network Connection Properties dialog box.
Figure 15-30: The Authentication tab of the Wireless Network Properties dialog box.
Figure 15-31: The Group Policy Objects container and the Group Policy Management console.
Figure 15-32: The Group Policy Object Editor displaying the Public Key Policies container.
Figure 15-33: The New Preferred Settings Properties dialog box.

Chapter 16: Using ISA Server 2000

Figure 16-1: The Security page for the Clients folder.
Figure 16-2: Default permissions for Domain Users.
Figure 16-3: The Client Computers page of the Assign Applications Wizard.
Figure 16-4: The Client Applications page of the Assign Applications Wizard.
Figure 16-5: Setting the application information for the Firewall client.
Figure 16-6: The New Installation Location warning.
Figure 16-7: The Configure E-Mail and Internet Connection Wizard disables any custom packet filters you defined, including L2TP VPN connections.
Figure 16-8: The Services Configuration page of the Configure E-Mail and Internet Connection Wizard.
Figure 16-9: Adding or editing a custom service allows it to be used through the ISA Server.
Figure 16-10: Confirmation message showing that the Configure E-Mail and Internet Connection Wizard completed successfully.
Figure 16-11: The Web Services Configuration page of the Configure E-Mail and Internet Connection Wizard.
Figure 16-12: Protocol Definitions in the ISA Management console.
Figure 16-13: The Protocol Connection Information page of the New Protocol Definition Wizard.
Figure 16-14: Protocol Rules in the ISA Management console.
Figure 16-15: The Protocols page of the New Protocol Rule Wizard.
Figure 16-16: For Windows Small Business Server, you should choose Specific Users And Groups.
Figure 16-17: The Internet Users group, consisting of all SBS Domain Users permitted to use the Internet.
Figure 16-18: Schedules in the ISA Management console.
Figure 16-19: Creating a new Evenings schedule to use with protocol rules.
Figure 16-20: Never delete a schedule without checking whether it is being used somewhere.
Figure 16-21: Configuring the cache size for SBSSRV server.
Figure 16-22: Changes in cache size require a restart of the Web Proxy service.
Figure 16-23: Backing up the ISA Server configuration to disk.
Figure 16-24: Specifying IP addresses on the Address Mapping page.
Figure 16-25: Selecting the protocol for the rule.
Figure 16-26: Internet Information Services (IIS) Manager console.
Figure 16-27: The Server Certificate page of the IIS Certificate Wizard.
Figure 16-28: The Available Certificates page.
Figure 16-29: The SSL Port page.
Figure 16-30: The Edit DWORD Value dialog box for KWLinks.
Figure 16-31: The General page of the Report Job Properties dialog box.
Figure 16-32: Selecting Generate Every Day for a daily report.
Figure 16-33: A daily Summary report for SBSSRV showing the protocols used in the last 24 hours.
Figure 16-34: Monitoring the ISA sessions of server SBSSRV.
Figure 16-35: The current ISA Server alerts on SBSSRV.
Figure 16-36: The cached object’s discarded alert, currently disabled.
Figure 16-37: Adding an event and the additional conditions that trigger the alert.
Figure 16-38: Selecting the actions that will be triggered by the alert.
Figure 16-39: Specifying the SMTP server and the accounts to use for the e-mail event.
Figure 16-40: The Running A Program page of the New Alert Wizard.
Figure 16-41: Changing the details of which and how many events trigger an alert.

Chapter 17: Customizing a SharePoint Web Site

Figure 17-1: The default SharePoint Web site created by Windows Small Business Server.
Figure 17-2: The General Documents page.
Figure 17-3: The General Discussion page.
Figure 17-4: The Company Photos page in Details view.
Figure 17-5: The General Documents page showing a comment and the Discussions toolbar, which appears at the bottom of the page.
Figure 17-6: The main Site Settings page.
Figure 17-7: The Add Web Parts tool pane.
Figure 17-8: Modifying a Web Part.
Figure 17-9: The Customization page for the General Documents library.
Figure 17-10: The Change General Settings page for the General Documents library.
Figure 17-11: The Top-Level Site Administration page.
Figure 17-12: The Add Users page.
Figure 17-13: The Change Anonymous Access Settings page.
Figure 17-14: The Sites And Workspaces page.
Figure 17-15: The Central Administration page.
Figure 17-16: The http://companyweb site in FrontPage 2003.
Figure 17-17: The Page Options dialog box.
Figure 17-18: The http://companyweb Home page in FrontPage.
Figure 17-19: The Link Bar Properties dialog box.
Figure 17-20: A Web Part in a newly created Web Part zone.
Figure 17-21: The Web Site Templates dialog box.

Chapter 18: Managing an Intranet Web Server

Figure 18-1: The Server Management console showing the Web Sites container.
Figure 18-2: The Web Sharing tab.
Figure 18-3: The Edit Alias dialog box.
Figure 18-4: The Web Site tab of the Properties dialog box.
Figure 18-5: The IP Address And Domain Name Restrictions dialog box.
Figure 18-6: The Grant Access dialog box.
Figure 18-7: The Authentication Methods dialog box.
Figure 18-8: The Advanced Security Settings dialog box.
Figure 18-9: The Modify The Current Certificate Assignment page of the IIS Certificate Wizard.
Figure 18-10: The Server Certificate page of the IIS Certificate Wizard.
Figure 18-11: The Performance tab of the Default Web Site Properties dialog box.
Figure 18-12: The Server Management console showing the Indexing Service container.

Chapter 19: Using SQL Server

Figure 19-1: The SQL Server Service Manager lets you start, stop, and pause the services for both local and remote databases.
Figure 19-2: The Backup utility of the SQL Server Enterprise Manager.
Figure 19-3: Assigning both a logical and a physical name to the backup file.
Figure 19-4: The SQL Server Backup dialog box.
Figure 19-5: The Edit Schedule dialog box.
Figure 19-6: The Backup Device Properties of the Default device, a file system backup.
Figure 19-7: The contents of the Default backup device on SBSSRV.
Figure 19-8: The Choose A Data Source page of the DTS Import/Export Wizard.
Figure 19-9: The Choose A Destination page of the DTS Import/Export Wizard.
Figure 19-10: The Specify Table Copy Or Query page of the DTS Import/ Export Wizard.
Figure 19-11: The Source Tables And Views page of the DTS Import/Export Wizard.
Figure 19-12: The Save, Schedule, And Replicate Package page of the DTS Import/Export Wizard.
Figure 19-13: The Save DTS Package page, which appears if you’ve selected SQL Server as your storage mechanism.
Figure 19-14: The Choose A Data Source page with an Oracle ODBC source.
Figure 19-15: The SQL Query Analyzer.

Chapter 20: Monitoring and Fine-Tuning Performance

Figure 20-1: System Monitor toolbar.
Figure 20-2: The Add Counters dialog box.
Figure 20-3: Using the Highlight option to make a graph line more visible.
Figure 20-4: The System Monitor Properties dialog box.
Figure 20-5: Displaying system information in histogram view.
Figure 20-6: Viewing system information in report view.
Figure 20-7: Changing color, background, and font used for System Monitor.
Figure 20-8: Creating new log settings.
Figure 20-9: The General tab of a log’s Properties dialog box.
Figure 20-10: Specifying events logged by the system provider.
Figure 20-11: The Log Files tab of a trace log’s Properties dialog box.
Figure 20-12: The Add Counters dialog box for new alert settings.
Figure 20-13: Specifying actions to take when a threshold is crossed.
Figure 20-14: Adding arguments to the alert to produce additional information.
Figure 20-15: The Core Server Alerts in Health Monitor.
Figure 20-16: Display of the Memory Available alert.
Figure 20-17: Settings to generate an alert.
Figure 20-18: Opening an alert threshold Properties page.
Figure 20-19: Setting command-line options.
Figure 20-20: Selecting a type of data collector to create.
Figure 20-21: Selecting an object to monitor.

Chapter 21: Disaster Planning and Fault Tolerance

Figure 21-1: The Advanced mode of the Windows Small Business Server Backup utility.
Figure 21-2: The Backup Destination page of the Automated System Recovery Preparation Wizard.
Figure 21-3: The Backup Progress window during Automated System Recovery Preparation.
Figure 21-4: The Create Automated System Recovery Disk prompt.
Figure 21-5: Always carefully label each ASR disk exactly as requested.
Figure 21-6: The Windows Setup window, installing the Recovery Console.
Figure 21-7: The Startup And Recovery dialog box.

Appendix A: Partially Automating Installation

Figure A-1: The Setup Manager Product page.
Figure A-2: The Setup Manager User Interaction page.
Figure A-3: Specifying display settings.
Figure A-4: The Setup Manager Computer Names page.
Figure A-5: Setting the Administrator password.
Figure A-6: Running Sysprep.

Appendix B: Installing ISA Server 2000 and SQL Server 2000

Figure B-1: Choosing which mode of ISA Server to use.
Figure B-2: Specifying on which drives to store the Web cache.
Figure B-3: The Local Address Table dialog box.
Figure B-4: The Installation Selection page.
Figure B-5: The Setup Type page.
Figure B-6: The Services Accounts page.
Figure B-7: The Instance Name page.
Figure B-8: The Select A SQL Server page of the Register SQL Server Wizard.
Figure B-9: SHAREPOINT added to the SQL Server Enterprise Manager console.



 < Day Day Up > 



Microsoft Windows Small Business Server 2003 Administrator's Companion
Microsoft Windows Small Business Server 2003 Administrators Companion (Pro-Administrators Companion)
ISBN: 0735620202
EAN: 2147483647
Year: 2004
Pages: 224

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net