| Foreword |
|
xxiii | |
|
Essentials of Windows Small Business Server 2003 |
|
|
1 | (16) |
|
|
|
2 | (1) |
|
Features of Windows Small Business Server 2003 |
|
|
2 | (3) |
|
Simplified Administration and Management |
|
|
2 | (1) |
|
|
|
3 | (1) |
|
|
|
3 | (1) |
|
|
|
3 | (1) |
|
|
|
3 | (1) |
|
Simplified User Management |
|
|
4 | (1) |
|
|
|
4 | (1) |
|
Components of Windows Small Business Server 2003 |
|
|
5 | (4) |
|
Windows Server 2003 (Standard, Premium) |
|
|
5 | (1) |
|
Exchange Server 2003 (Standard, Premium) |
|
|
6 | (1) |
|
|
|
6 | (1) |
|
Shared Fax Service (Standard, Premium) |
|
|
6 | (1) |
|
Windows SharePoint Services (Standard, Premium) |
|
|
7 | (1) |
|
Internet Security and Acceleration Server (Premium) |
|
|
7 | (1) |
|
SQL Server 2000 (Premium) |
|
|
7 | (1) |
|
Office FrontPage 2003 (Premium) |
|
|
8 | (1) |
|
Restrictions of Windows Small Business Server 2003 |
|
|
9 | (4) |
|
Location of Installed Components |
|
|
9 | (1) |
|
|
|
9 | (1) |
|
|
|
10 | (1) |
|
|
|
11 | (1) |
|
|
|
11 | (2) |
|
Determining Which Operating System Package Is Best For You |
|
|
13 | (1) |
|
|
|
14 | (3) |
|
Understanding and Designing Your Network |
|
|
17 | (30) |
|
|
|
18 | (1) |
|
Understanding Computer Basics |
|
|
18 | (2) |
|
Understanding Network Basics |
|
|
20 | (3) |
|
|
|
21 | (1) |
|
Connecting Computers Together |
|
|
21 | (1) |
|
|
|
22 | (1) |
|
IP Addresses, Firewalls and Network Address Translation |
|
|
23 | (6) |
|
|
|
23 | (1) |
|
|
|
24 | (3) |
|
Public and Private IP Addresses |
|
|
27 | (1) |
|
|
|
28 | (1) |
|
|
|
29 | (15) |
|
|
|
30 | (1) |
|
Hardware and Software Specifications |
|
|
31 | (1) |
|
|
|
31 | (1) |
|
SBS Server Specifications |
|
|
32 | (1) |
|
SBS Client Specifications |
|
|
33 | (1) |
|
|
|
34 | (1) |
|
|
|
34 | (2) |
|
Connecting and Protecting Your Network |
|
|
36 | (2) |
|
Connection, Location, and User Lists |
|
|
38 | (1) |
|
Connections and Locations |
|
|
38 | (2) |
|
|
|
40 | (1) |
|
|
|
40 | (1) |
|
Network Switches and Hubs |
|
|
41 | (1) |
|
|
|
41 | (1) |
|
Wired and Wireless Network Speeds |
|
|
42 | (1) |
|
Domain Naming Conventions |
|
|
43 | (1) |
|
Computer Naming Conventions |
|
|
44 | (1) |
|
|
|
44 | (3) |
|
Installing Small Business Server 2003 |
|
|
47 | (60) |
|
|
|
48 | (1) |
|
Preparing for Installation |
|
|
48 | (14) |
|
|
|
49 | (1) |
|
|
|
50 | (1) |
|
|
|
51 | (1) |
|
Deciding on Your Installation Path |
|
|
52 | (1) |
|
|
|
52 | (1) |
|
Create an Installation and Recovery Plan for Install, Upgrade, or Migration |
|
|
53 | (1) |
|
|
|
54 | (1) |
|
|
|
54 | (3) |
|
|
|
57 | (1) |
|
Verify Network Configuration |
|
|
58 | (1) |
|
|
|
59 | (2) |
|
|
|
61 | (1) |
|
Installing Small Business Server 2003 |
|
|
62 | (10) |
|
Windows Small Business Server 2003 Installation---Phase I |
|
|
63 | (4) |
|
Windows Small Business Server Setup Wizard---Phase II |
|
|
67 | (5) |
|
Upgrading to Small Business Server 2003 |
|
|
72 | (9) |
|
Preparing for the Upgrade |
|
|
72 | (1) |
|
|
|
73 | (3) |
|
Preparing Client Computers |
|
|
76 | (1) |
|
|
|
76 | (2) |
|
|
|
78 | (1) |
|
Windows Small Business Server Setup Wizard---Phase I |
|
|
78 | (2) |
|
Windows Small Business Server Setup Wizard---Phase II |
|
|
80 | (1) |
|
Migrating to Small Business Server 2003 |
|
|
81 | (4) |
|
|
|
82 | (1) |
|
|
|
83 | (2) |
|
Completing the To Do List and Other Post-Installation Tasks |
|
|
85 | (19) |
|
View Security Best Practices |
|
|
86 | (1) |
|
|
|
87 | (1) |
|
Direct Broadband Connection |
|
|
88 | (1) |
|
Broadband with Local Router |
|
|
89 | (2) |
|
Broadband with User Authentication (PPPoE) |
|
|
91 | (1) |
|
|
|
91 | (1) |
|
Configuring Your Firewall |
|
|
92 | (3) |
|
|
|
95 | (1) |
|
Configure Password Policies |
|
|
96 | (1) |
|
Scan for Critical System Updates |
|
|
97 | (1) |
|
|
|
97 | (1) |
|
Remote Access via Virtual Private Networking |
|
|
98 | (1) |
|
Remote Access via Dial-Up Connection |
|
|
99 | (1) |
|
|
|
100 | (1) |
|
|
|
101 | (1) |
|
|
|
102 | (1) |
|
|
|
103 | (1) |
|
|
|
104 | (3) |
|
|
|
107 | (26) |
|
|
|
108 | (1) |
|
Overview of Security in Small Business Server 2003 |
|
|
108 | (2) |
|
|
|
109 | (1) |
|
Review Network Topology and Firewall Configuration |
|
|
110 | (3) |
|
|
|
110 | (2) |
|
|
|
112 | (1) |
|
|
|
113 | (7) |
|
|
|
114 | (1) |
|
|
|
114 | (4) |
|
|
|
118 | (2) |
|
|
|
120 | (1) |
|
|
|
121 | (4) |
|
|
|
121 | (2) |
|
|
|
123 | (1) |
|
Verify Users Have Only Necessary Permissions |
|
|
124 | (1) |
|
|
|
125 | (5) |
|
Configure Monitoring and Reporting |
|
|
125 | (1) |
|
|
|
126 | (1) |
|
Audit for Failed Logon Events |
|
|
126 | (1) |
|
Audit for Account Lockouts |
|
|
126 | (1) |
|
Microsoft Security Guidance Kit |
|
|
127 | (3) |
|
|
|
130 | (3) |
|
|
|
133 | (28) |
|
|
|
134 | (1) |
|
|
|
134 | (3) |
|
|
|
134 | (2) |
|
Storage Connection Terminology |
|
|
136 | (1) |
|
|
|
137 | (8) |
|
|
|
139 | (1) |
|
|
|
140 | (1) |
|
|
|
141 | (1) |
|
Mirrored Volumes (Raid-1) |
|
|
142 | (1) |
|
Striped Volume with Parity (Raid-5) |
|
|
143 | (2) |
|
|
|
145 | (15) |
|
|
|
145 | (1) |
|
|
|
146 | (1) |
|
|
|
146 | (3) |
|
Creating a New Logical Drive on an Extended Partition |
|
|
149 | (1) |
|
Deleting a Partition or Logical Drive |
|
|
149 | (1) |
|
Converting a Basic Disk to a Dynamic Disk |
|
|
150 | (1) |
|
Working with Dynamic Disks |
|
|
151 | (1) |
|
|
|
151 | (1) |
|
|
|
152 | (1) |
|
|
|
152 | (2) |
|
Working with Mirrored Sets |
|
|
154 | (1) |
|
|
|
155 | (1) |
|
|
|
156 | (1) |
|
|
|
156 | (1) |
|
|
|
157 | (1) |
|
|
|
157 | (3) |
|
|
|
160 | (1) |
|
|
|
161 | (22) |
|
|
|
162 | (1) |
|
Configuring and Managing Disk Quotas |
|
|
162 | (7) |
|
Accessing Disk Quota Information |
|
|
163 | (2) |
|
Establishing Quotas for Specific Users |
|
|
165 | (2) |
|
Importing and Exporting Quotas |
|
|
167 | (1) |
|
|
|
168 | (1) |
|
File Encryption Management |
|
|
169 | (4) |
|
File Encryption Recovery Agent |
|
|
171 | (2) |
|
Disk and File Compression |
|
|
173 | (1) |
|
|
|
174 | (6) |
|
Enabling Shadow Copies of Shared Folders |
|
|
175 | (2) |
|
Configuring Clients to Use Shadow Copies |
|
|
177 | (3) |
|
|
|
180 | (3) |
|
Managing Users and Groups |
|
|
183 | (28) |
|
|
|
184 | (1) |
|
Understanding, Creating, and Managing Groups |
|
|
184 | (8) |
|
|
|
184 | (1) |
|
|
|
185 | (3) |
|
|
|
188 | (1) |
|
|
|
188 | (2) |
|
|
|
190 | (2) |
|
Understanding, Creating, and Managing User Accounts |
|
|
192 | (12) |
|
Understanding User Accounts |
|
|
193 | (1) |
|
|
|
194 | (2) |
|
Adding (and Removing) Users to Groups |
|
|
196 | (1) |
|
|
|
197 | (4) |
|
Redirecting My Documents for User Accounts |
|
|
201 | (2) |
|
Removing and Disabling User Accounts |
|
|
203 | (1) |
|
Understanding and Managing User Profiles |
|
|
204 | (4) |
|
Working with the Administrator Account |
|
|
207 | (1) |
|
|
|
208 | (3) |
|
Permissions, Shares and Group Policy |
|
|
211 | (34) |
|
|
|
212 | (1) |
|
|
|
212 | (3) |
|
Access Control Using NTFS Permissions |
|
|
213 | (1) |
|
|
|
214 | (1) |
|
Configuring and Managing Permissions |
|
|
215 | (7) |
|
|
|
215 | (2) |
|
Principles of Inheritance |
|
|
217 | (2) |
|
Determining Effective Permissions |
|
|
219 | (1) |
|
|
|
220 | (1) |
|
|
|
221 | (1) |
|
Understanding Group Policy |
|
|
222 | (3) |
|
Configuring and Managing Group Policy |
|
|
225 | (16) |
|
Creating and Deleting Group Policy Objects |
|
|
226 | (3) |
|
Managing Inheritance Order |
|
|
229 | (1) |
|
Managing Implementation Order |
|
|
230 | (1) |
|
Viewing and Setting GPO Scope |
|
|
231 | (1) |
|
Backing Up and Restoring GPOs |
|
|
232 | (2) |
|
|
|
234 | (3) |
|
Using GPOs to Update Client Computers Automatically |
|
|
237 | (2) |
|
Using GPOs to Audit Events |
|
|
239 | (2) |
|
|
|
241 | (4) |
|
Managing Client Computers |
|
|
245 | (28) |
|
|
|
246 | (1) |
|
Overview of Client Computer Management |
|
|
246 | (1) |
|
Network Address Translation and IP Configuration |
|
|
247 | (7) |
|
NAT/Firewall Configuration |
|
|
247 | (1) |
|
|
|
248 | (2) |
|
|
|
250 | (1) |
|
|
|
251 | (1) |
|
|
|
251 | (1) |
|
|
|
252 | (1) |
|
|
|
252 | (2) |
|
Adding and Connecting Computers to the Network |
|
|
254 | (5) |
|
|
|
254 | (2) |
|
Connecting Client Computers to the Network |
|
|
256 | (2) |
|
Working with Client Computers Running Earlier Versions of Windows |
|
|
258 | (1) |
|
Applying Applications to Network Computers |
|
|
259 | (2) |
|
Using Windows Update and Software Update Services |
|
|
261 | (9) |
|
|
|
261 | (1) |
|
Using Windows Update Manually |
|
|
262 | (1) |
|
Automating Windows Update |
|
|
262 | (2) |
|
Using Windows Update via Group Policy |
|
|
264 | (4) |
|
|
|
268 | (2) |
|
|
|
270 | (3) |
|
Installing and Managing Printers |
|
|
273 | (24) |
|
|
|
274 | (1) |
|
|
|
274 | (2) |
|
Logical and Physical Printers |
|
|
275 | (1) |
|
Installing and Managing Printers |
|
|
276 | (13) |
|
|
|
277 | (1) |
|
|
|
278 | (2) |
|
Managing Installed Printers |
|
|
280 | (2) |
|
Setting Up Printer Auditing |
|
|
282 | (1) |
|
|
|
283 | (1) |
|
Managing Printer Spooling |
|
|
284 | (1) |
|
Managing Printer Priorities with Logical Drivers |
|
|
285 | (1) |
|
Managing the Print Server |
|
|
286 | (3) |
|
Managing Fax Printers and Shared Fax Services |
|
|
289 | (4) |
|
|
|
289 | (1) |
|
|
|
290 | (1) |
|
|
|
291 | (1) |
|
|
|
291 | (1) |
|
|
|
292 | (1) |
|
|
|
292 | (1) |
|
|
|
292 | (1) |
|
Group Policy for Printers |
|
|
293 | (2) |
|
|
|
295 | (2) |
|
Disaster Planning, Backing Up, and Restoring Data |
|
|
297 | (26) |
|
|
|
298 | (1) |
|
|
|
298 | (4) |
|
Risk Assessment and Prioritization |
|
|
299 | (1) |
|
|
|
300 | (1) |
|
|
|
300 | (1) |
|
|
|
301 | (1) |
|
Plan Testing and Maintenance |
|
|
302 | (1) |
|
|
|
302 | (12) |
|
|
|
303 | (2) |
|
|
|
305 | (1) |
|
|
|
305 | (2) |
|
|
|
307 | (2) |
|
Automated System Recovery |
|
|
309 | (2) |
|
|
|
311 | (2) |
|
|
|
313 | (1) |
|
Restoring Your Server and Data |
|
|
314 | (6) |
|
|
|
314 | (1) |
|
Install the Operating System |
|
|
315 | (1) |
|
Restore the Server from Backup |
|
|
316 | (1) |
|
Verify the Success of the Restore |
|
|
317 | (1) |
|
Partial Restore of Files and Folders |
|
|
318 | (1) |
|
Using Shadow Copies on Shared Folders to Restore Folders and Files |
|
|
318 | (1) |
|
Using Backup Media to Restore Folders and Files |
|
|
319 | (1) |
|
|
|
320 | (1) |
|
|
|
320 | (3) |
|
Using Exchange Server and Outlook 2003 |
|
|
323 | (30) |
|
|
|
324 | (1) |
|
Overview of Microsoft Exchange Server |
|
|
324 | (5) |
|
Exchange Server Components |
|
|
325 | (1) |
|
|
|
326 | (1) |
|
|
|
326 | (1) |
|
|
|
327 | (1) |
|
|
|
327 | (1) |
|
|
|
328 | (1) |
|
|
|
328 | (1) |
|
Working with Exchange Server |
|
|
329 | (16) |
|
|
|
330 | (2) |
|
|
|
332 | (2) |
|
|
|
334 | (2) |
|
Setting a POP3 Delivery Schedule |
|
|
336 | (1) |
|
|
|
337 | (1) |
|
|
|
337 | (1) |
|
Enabling E-mail for Users |
|
|
338 | (1) |
|
Managing User Exchange Tasks |
|
|
339 | (1) |
|
|
|
340 | (1) |
|
Monitoring Server and Connectors Status |
|
|
340 | (1) |
|
|
|
341 | (1) |
|
Creating and Managing Public Folders |
|
|
341 | (1) |
|
|
|
342 | (1) |
|
Create a Naming Structure |
|
|
343 | (1) |
|
Create Written Policies About Information Storage |
|
|
343 | (1) |
|
Create Policies On Managing Public Folders |
|
|
344 | (1) |
|
Working with Outlook 2003 |
|
|
345 | (4) |
|
|
|
345 | (1) |
|
Connecting to Outlook Web Access |
|
|
346 | (2) |
|
|
|
348 | (1) |
|
|
|
349 | (1) |
|
|
|
350 | (3) |
|
Managing Remote Connectivity |
|
|
353 | (22) |
|
|
|
354 | (1) |
|
Overview of Remote Connectivity |
|
|
354 | (7) |
|
|
|
355 | (1) |
|
Configuring the Server for Dial-up Access |
|
|
355 | (1) |
|
|
|
356 | (1) |
|
Configuring the Server for VPN Access |
|
|
357 | (1) |
|
Configuring Computers for Remote Access |
|
|
358 | (1) |
|
Computer Currently Connected to the Network |
|
|
358 | (1) |
|
Computers Not Connected to the Network |
|
|
359 | (1) |
|
Downloading Connection Manager from Remote Web Workplace |
|
|
360 | (1) |
|
Configuring Users for Remote Access |
|
|
360 | (1) |
|
Using Remote Web Workplace |
|
|
361 | (5) |
|
Enable and Configure Remote Web Workplace |
|
|
361 | (1) |
|
|
|
362 | (1) |
|
Remote Web Workplace User Features |
|
|
363 | (1) |
|
|
|
363 | (1) |
|
Access the Desktop of My Computer at Work |
|
|
364 | (1) |
|
Use My Company's Shared Application |
|
|
364 | (1) |
|
View My Company's Internal Web Site |
|
|
364 | (1) |
|
|
|
364 | (1) |
|
Connect My Remote Computer to the Network |
|
|
364 | (1) |
|
|
|
365 | (1) |
|
Remote Web Workplace Administrator Features |
|
|
365 | (1) |
|
Understanding Certificates |
|
|
366 | (1) |
|
|
|
367 | (6) |
|
|
|
369 | (1) |
|
Wireless Components in Windows Server |
|
|
369 | (1) |
|
Wireless Security Overview |
|
|
370 | (1) |
|
802.11 Identity Verification and Authentication |
|
|
371 | (1) |
|
802.11 Wired Equivalency Privacy Encryption |
|
|
371 | (1) |
|
802.11 Wi-Fi Protected Access |
|
|
371 | (1) |
|
802.1X Authentication and Security |
|
|
372 | (1) |
|
|
|
373 | (2) |
|
Using SharePoint Services |
|
|
375 | (20) |
|
|
|
376 | (1) |
|
Overview of SharePoint Services |
|
|
376 | (2) |
|
|
|
378 | (6) |
|
|
|
378 | (1) |
|
|
|
379 | (1) |
|
About Site Groups and User Rights |
|
|
380 | (1) |
|
Working with SharePoint Information |
|
|
381 | (1) |
|
|
|
381 | (1) |
|
|
|
382 | (1) |
|
|
|
383 | (1) |
|
|
|
383 | (1) |
|
Discuss Pages and Documents |
|
|
383 | (1) |
|
|
|
383 | (1) |
|
Customizing SharePoint Website |
|
|
384 | (3) |
|
Shared View vs. Personal View |
|
|
385 | (1) |
|
|
|
385 | (1) |
|
|
|
386 | (1) |
|
|
|
387 | (1) |
|
Advanced SharePoint Administration |
|
|
387 | (5) |
|
Virtual Server Configuration |
|
|
388 | (1) |
|
|
|
389 | (1) |
|
|
|
390 | (1) |
|
|
|
391 | (1) |
|
Backing Up and Restoring SharePoint Files |
|
|
392 | (1) |
|
|
|
392 | (3) |
|
Monitoring, Tuning, and Troubleshooting |
|
|
395 | (32) |
|
|
|
396 | (1) |
|
Monitoring the SBS Server |
|
|
396 | (14) |
|
|
|
401 | (1) |
|
|
|
402 | (1) |
|
|
|
403 | (2) |
|
|
|
405 | (1) |
|
|
|
405 | (1) |
|
|
|
405 | (1) |
|
|
|
406 | (1) |
|
The Directory Service Log |
|
|
406 | (1) |
|
|
|
406 | (1) |
|
The File Replication Service Log |
|
|
407 | (1) |
|
|
|
407 | (1) |
|
Change Server Status Report Settings |
|
|
408 | (1) |
|
Change Alert Notifications |
|
|
408 | (2) |
|
Advanced Monitoring Tools |
|
|
410 | (2) |
|
Performance Console: System Monitor and Performance Logs and Alerts |
|
|
410 | (1) |
|
|
|
411 | (1) |
|
|
|
412 | (5) |
|
|
|
412 | (5) |
|
Tuning and Troubleshooting the SBS Server |
|
|
417 | (7) |
|
|
|
418 | (4) |
|
Monitoring Processor Activity |
|
|
422 | (1) |
|
|
|
423 | (1) |
|
|
|
424 | (3) |
|
|
|
427 | (26) |
|
|
|
428 | (1) |
|
Internet Security and Acceleration (ISA) Server 2000 |
|
|
428 | (15) |
|
|
|
431 | (4) |
|
|
|
435 | (1) |
|
Installing the ISA Firewall Client |
|
|
436 | (2) |
|
Restoring Remote Access to SharePoint Web Site |
|
|
438 | (5) |
|
|
|
443 | (6) |
|
|
|
444 | (3) |
|
Backing Up SQL Server Databases |
|
|
447 | (2) |
|
|
|
449 | (1) |
|
|
|
450 | (3) |
| Index |
|
453 | |