About the Author |
|
xi | |
About the Technical Reviewer |
|
xiii | |
Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
|
|
1 | (12) |
|
|
1 | (5) |
|
|
1 | (1) |
|
Simple Backup and Recovery |
|
|
2 | (1) |
|
Simple and Effective Security |
|
|
2 | (1) |
|
|
3 | (1) |
|
Improvements to Remote Connectivity |
|
|
3 | (1) |
|
Create a Larger Collaborative Environment |
|
|
4 | (1) |
|
Better Support for Line-of-Business Applications |
|
|
5 | (1) |
|
Improved Configuration Process |
|
|
6 | (1) |
|
Improved Upgrade Path and Remove Encroachments |
|
|
6 | (1) |
|
Improvements for VAPs and Consultants |
|
|
6 | (2) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Frequently Asked Questions |
|
|
11 | (2) |
|
|
13 | (12) |
|
Some Installation Considerations |
|
|
13 | (2) |
|
Installing Windows Server 2003 |
|
|
15 | (2) |
|
Installing the SBS Core Products |
|
|
17 | (6) |
|
A Word About Product Activation |
|
|
22 | (1) |
|
|
23 | (2) |
|
|
25 | (22) |
|
The Server Management Console |
|
|
25 | (3) |
|
The Standard Management Node |
|
|
25 | (3) |
|
The Advanced Management Node |
|
|
28 | (1) |
|
Completing the To Do List |
|
|
28 | (17) |
|
View Security Best Practices |
|
|
29 | (2) |
|
|
31 | (8) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (3) |
|
|
45 | (2) |
|
Exploring Windows Server 2003 |
|
|
47 | (40) |
|
|
47 | (13) |
|
Manually Creating a Share |
|
|
47 | (3) |
|
NTFS File and Folder Permissions |
|
|
50 | (5) |
|
Using Offline Files and Folders |
|
|
55 | (2) |
|
|
57 | (2) |
|
|
59 | (1) |
|
The Active Directory in Windows Server 2003 |
|
|
60 | (5) |
|
Active Directory Objects and Concepts |
|
|
61 | (4) |
|
|
65 | (21) |
|
Group Policy Implementation |
|
|
66 | (5) |
|
|
71 | (15) |
|
|
86 | (1) |
|
Exploring Outlook 2003 and Exchange Server 2003 |
|
|
87 | (18) |
|
|
87 | (10) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (2) |
|
Exchange Server 2003 in General |
|
|
97 | (7) |
|
|
97 | (4) |
|
SBS-Specific Exchange Features |
|
|
101 | (3) |
|
|
104 | (1) |
|
Windows SharePoint Services Techniques |
|
|
105 | (26) |
|
Resources for Learning the Basics |
|
|
105 | (1) |
|
Using Windows SharePoint Services with Access |
|
|
105 | (6) |
|
|
107 | (1) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (4) |
|
|
113 | (2) |
|
Customizing Themes in SharePoint |
|
|
115 | (4) |
|
|
115 | (3) |
|
Advanced Customization: Using Cascading Style Sheets |
|
|
118 | (1) |
|
Backup and Restore Options for Windows SharePoint Services |
|
|
119 | (3) |
|
Using STSADM.EXE for WSS Backup and Restoration |
|
|
120 | (1) |
|
Using the SharePoint Migration Tool for Backup |
|
|
121 | (1) |
|
Using the SQL Server 2000 Tools for Backup |
|
|
122 | (1) |
|
Helpful SharePoint Customizations |
|
|
122 | (5) |
|
Contact and Service Management |
|
|
123 | (1) |
|
Human Resources Management |
|
|
124 | (2) |
|
Sales and Marketing Portals |
|
|
126 | (1) |
|
About Windows SharePoint Services Service Pack 1 |
|
|
127 | (2) |
|
|
129 | (2) |
|
Exploring SBS Standard Security |
|
|
131 | (36) |
|
Understanding Security Considerations |
|
|
131 | (2) |
|
Principles of Server Security |
|
|
132 | (1) |
|
|
133 | (9) |
|
Using Security Policy Templates |
|
|
133 | (3) |
|
Security Configuration and Analysis |
|
|
136 | (3) |
|
Microsoft Baseline Security Analyzer |
|
|
139 | (3) |
|
|
142 | (6) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Windows Component Selection and Installation |
|
|
144 | (1) |
|
|
144 | (3) |
|
Network Options via Group Policy |
|
|
147 | (1) |
|
About Software Update Services |
|
|
148 | (12) |
|
Using SUS: On the Server Side |
|
|
149 | (7) |
|
Using SUS: On the Client Side |
|
|
156 | (3) |
|
Common Problems and Workarounds |
|
|
159 | (1) |
|
Using Auditing and the Event Log |
|
|
160 | (3) |
|
Recommended Items to Audit |
|
|
162 | (1) |
|
|
162 | (1) |
|
Understanding Routing and Remote Access |
|
|
163 | (4) |
|
|
165 | (1) |
|
|
165 | (2) |
|
Using Remote Access Features |
|
|
167 | (12) |
|
|
167 | (1) |
|
How Remote Web Workplace Works |
|
|
167 | (1) |
|
|
168 | (2) |
|
Premium OWA vs. Basic OWA |
|
|
170 | (1) |
|
Using the Full Outlook Client Remotely |
|
|
170 | (3) |
|
Remote Desktop Connection |
|
|
173 | (3) |
|
A Little More In-Depth About RDP |
|
|
175 | (1) |
|
Using Virtual Private Networks |
|
|
176 | (2) |
|
|
178 | (1) |
|
|
179 | (18) |
|
|
179 | (1) |
|
Configuring the Fax Service |
|
|
180 | (10) |
|
|
183 | (7) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (4) |
|
|
191 | (2) |
|
From Within a Business Application |
|
|
193 | (2) |
|
|
195 | (2) |
|
Monitoring SBS Server Health and Performance |
|
|
197 | (16) |
|
|
197 | (5) |
|
Expanding the Scope of the Monitoring Service |
|
|
201 | (1) |
|
Adjusting the Schedule for Outgoing Reports |
|
|
201 | (1) |
|
Analyzing the Server Performance Report |
|
|
202 | (4) |
|
Understanding the Performance Summary |
|
|
202 | (3) |
|
Examining Error Log Activity |
|
|
205 | (1) |
|
Analyzing the Server Usage Report |
|
|
206 | (2) |
|
|
206 | (1) |
|
Determining Available Statistics |
|
|
207 | (1) |
|
Configuring Health Monitor Alerts |
|
|
208 | (2) |
|
Replicating Health Monitoring Settings |
|
|
210 | (3) |
|
|
213 | (18) |
|
How the Indexing Service Works |
|
|
213 | (2) |
|
Performance Considerations |
|
|
214 | (1) |
|
Common Administrative Tasks |
|
|
215 | (14) |
|
|
216 | (11) |
|
Adjusting Performance Options |
|
|
227 | (2) |
|
|
229 | (2) |
Index |
|
231 | |