Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] sales impact 2nd Samba sandboxes SANS.org SBCore Service SBS 2000 2nd 3rd 4th SBS 2003 2nd 3rd Premium Edition 2nd Service Pack 1 2nd Standard Edition 2nd SBS 4.0 2nd 3rd 4th SBS 4.0a 2nd SBS 4.5 2nd 3rd SBS advantages 2nd SBS Backup Wizard 2nd 3rd 4th 5th 6th 7th 8th 9th accessing Backup Data Summary page backup notifications 2nd creating backups 2nd 3rd Define Backup Schedule page excluding data from 2nd 3rd 4th limitations 2nd 3rd restoring databases from backup 2nd settings generated by 2nd Storage Allocation for Deleted Files and Emails page SBS configuration Automatic Updates 2nd 3rd backup 2nd Fax services 2nd Internet connections 2nd completing setup 2nd Exchange configuration 2nd firewall configuration 2nd network configuration 2nd 3rd 4th 5th monitoring printers 2nd remote access Activate Your Server Wizard 2nd Add Additional Licenses Wizard 2nd cautions Configure Remote Access Wizard 2nd To-Do list Automatic Updates 2nd 3rd backup, configuring 2nd Fax services, configuring 2nd monitoring, configuring printers, adding 2nd users and computers, adding 2nd users and computers, adding 2nd SBS downloads site 2nd 3rd 4th SBS installation 2nd 3rd 4th best practices 2nd 3rd 4th component installation 2nd 3rd 4th integrated installation 2nd 3rd 4th Company Information window 2nd Internal Domain Information window 2nd SBS Setup Wizard 2nd Setup Requirements window 2nd troubleshooting 2nd 3rd 4th 5th err.exe tool 2nd eventlog.txt file 2nd 3rd 4th 5th 6th 7th installation log file location Windows 2003 installation 2nd SBS installations, planning best practices 2nd CALs (Client Access Licenses) 2nd determining number/type of 2nd Device CALs 2nd Terminal Server CALs 2nd 3rd User CALs 2nd 3rd client base, determining 2nd 3rd disk storage backups 2nd fault tolerance 2nd 3rd 4th 5th 6th multiple partitions 2nd 3rd multiple spindles 2nd 3rd networks DHCP (Dynamic Host Configuration Protocol) configuration domain names 2nd 3rd Internet connections 2nd IP address ranges 2nd 3rd 4th NICs (network interface cards) 2nd 3rd 4th subnet masks 2nd switches 2nd wireless access 2nd questions to ask 2nd SBS limitations 2nd 3rd SBS Setup Wizard 2nd sbs_wpad.txt file SBSClientApps.log Sbsmig.log SBSNetSetup.log SBSUsers Organizational Unit (OU) scanning tools 2nd Scheduled Task Wizard 2nd scheduling backups 2nd 3rd SCL (Spam Confidence Level) scope GPOs (group policy objects) 2nd group policy 2nd scope (group policy) 2nd Scope tab (GPMC) 2nd scripts blocking websites with scw.log Secunia secure website access 2nd SSL certificates, exporting from SBS 2nd SSL certificates, importing into Macintosh Certificate Store 2nd SecureNat clients 2nd security 2nd 3rd 4th annual security checklist 2nd antivirus tools 2nd 3rd 4th 5th automatic updates backups 2nd best practices 2nd 3rd 4th budget calculation 2nd Cached Exchange Mode (Outlook) DEP (Data Execution Prevention) DHCP spoof detection 2nd educated end users 2nd 3rd 4th 5th 6th electronic patient healthcare information (ePHI) Encrypted File System 2nd fault tolerance hardware versus software 2nd RAID 2nd 3rd firewalls configuration 2nd Internet Explorer ActiveX restrictions 2nd 3rd 4th 5th MIME type handling pop-up blocker intrusion detection 2nd 3rd 4th 5th monthly security checklist 2nd Network Quarantine Control NTFS permissions 2nd Allow/Deny 2nd 3rd applying 2nd best practices 2nd combining with share permissions 2nd Effective Permissions 2nd file permissions 2nd inheritance 2nd ownership 2nd 3rd Special Permissions 2nd 3rd volume/folder permissions 2nd 3rd Office 2nd 3rd Outlook Express OWA (Outlook Web Access) Private Computer security configuration Public or Shared Computer security configuration passwords 2nd age 2nd best practices 2nd complexity 2nd 3rd Configure Password Policies Wizard 2nd invalid password characters (OMA) length 2nd policy enforcement patches 2nd 3rd best practices 2nd compared to service packs 2nd MBSA (Microsoft Baseline Security Analyzer) 2nd Microsoft Security Bulletin notifications Comprehensive edition moderately secure firms notification process 2nd open firms 2nd paranoid firms patch zones 2nd resources 2nd risk analysis 2nd 3rd SBS downloads site 2nd 3rd 4th Shavlik HFNetChk Pro support for testing 2nd 3rd troubleshooting 2nd 3rd 4th version codes 2nd virtualization Windows Update and Automatic Updates 2nd 3rd 4th WSUS (Windows Software Update Services) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd permissions backups 2nd personal identity information (PII) physical security 2nd 3rd remote control software 2nd 3rd resources free antivirus programs 2nd free online scanning tools 2nd general security information 2nd security response toolkit 2nd WSUS resources 2nd restricted users 2nd 3rd 4th 5th 6th 7th 8th reverse NDR attacks risk management 2nd RRAS (Routing and Remote Access Service) firewalls 2nd CEICW (Configure Email and Internet Connection Wizard) 2nd 3rd filtering connections 2nd packet filters, creating 2nd packet forwarding 2nd port address translation ports 2nd testing secure website access 2nd SSL certificates, exporting from SBS 2nd SSL certificates, importing into Macintosh Certificate Store 2nd security bulletins Security Center 2nd Security Configuration Wizard security groups 2nd 3rd 4th 5th 6th security review process 2nd 3rd 4th 5th 6th security toolkits 2nd 3rd 4th 5th 6th share permissions 2nd 3rd 4th 5th best practices 2nd Change combining with NTFS permissions 2nd Full Control Read SMB signing 2nd 3rd spyware antispyware tools 2nd 3rd 4th 5th 6th characteristics of 2nd compared to viruses Microsoft AntiSpyware website symptoms of 2nd SSL certificates 2nd 3rd 4th 5th 6th 7th creating 2nd SSL tunnel ports 2nd troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th common access problems 2nd 3rd effective permissions 2nd unauthorized access, protecting against 2nd user permissions changing 2nd viruses VPNs (virtual private networks) vulnerability 2nd Windows Firewall 2nd Allow Port Exceptions[colon] ENABLED setting 2nd Define Port Exceptions[colon] ENABLED setting 2nd Define Program Exceptions[colon] ENABLED setting 2nd wireless networks Security Accounts Manager security bulletins Security Center 2nd Security Configuration Wizard security groups 2nd security patches. [See patches] security response toolkit 2nd security toolkits 2nd 3rd 4th 5th 6th security. [See also backups] Select ISA Server Services dialog box server security best practices 2nd Encrypted File System 2nd NTFS permissions 2nd Allow/Deny 2nd 3rd applying 2nd best practices 2nd combining with share permissions 2nd Effective Permissions 2nd file permissions 2nd inheritance 2nd ownership 2nd 3rd Special Permissions 2nd 3rd volume/folder permissions 2nd 3rd passwords 2nd age 2nd best practices 2nd complexity 2nd 3rd Configure Password Policies Wizard 2nd length 2nd policy enforcement physical security 2nd 3rd share permissions 2nd 3rd 4th 5th best practices 2nd Change combining with NTFS permissions 2nd Full Control Read troubleshooting common access problems 2nd 3rd effective permissions 2nd Server service Server Specifications section (performance reports) servers accessing with RWW (Remote Web Workplace) 2nd 3rd 4th activating 2nd adding to network domain controllers manually joining servers to domain 2nd Set Up Server Computers Wizard 2nd connecting from Macintosh platforms browse method 2nd Chooser method 2nd Connect to Share method 2nd DHCP servers DNS (Domain Name System) configuration 2nd DNS servers Exchange. [See Exchange] hot spare servers ISA Server. [See ISA Server] remote access configuration 2nd 3rd Terminal Server resources 2nd terminal. [See Terminal Services] Service Pack 1 (SBS 2003) 2nd Service Pack 2. [See SP 2] service packs compared to security patches 2nd Service Unavailable error (browsers) 2nd services Event Log Fax IPSEC Kerberos Key Distribution Center Microsoft Exchange Information Store Microsoft Exchange Management Microsoft Exchange POP3 Microsoft Exchange System Attendant Netlogon 2nd performance alerts 2nd 3rd 4th 5th Print Spooler Recipient Update Service 2nd 3rd Routing and Remote Access RRAS (Routing and Remote Access Service) 2nd 3rd 4th best practices 2nd firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th SBCore Service Security Accounts Manager Server Services for Macintosh 2nd AppleTalk, enabling 2nd configuring 2nd Directory Access 2nd installing 2nd Macintosh UAM, installing 2nd shares, creating 2nd volumes, mounting 2nd 3rd 4th 5th 6th Terminal Services 2nd 3rd Application mode 2nd applications, installing 2nd 3rd best practices 2nd Configuration console 2nd installation 2nd Licensing service 2nd 3rd Manager console 2nd Quick Start guide for Terminal Services Remote Administration mode 2nd TDP-tcp connection properties 2nd troubleshooting 2nd 3rd 4th 5th 6th 7th third-party web services, installing 2nd 3rd VSS (Volume Shadow Copy Service) WINS (Windows Internet Name Service) World Wide Web Publishing WSUS (Windows Software Update Services) 2nd 3rd Services for Macintosh 2nd AppleTalk, enabling 2nd configuring 2nd Directory Access 2nd installing 2nd Macintosh UAM, installing 2nd shares, creating 2nd volumes, mounting browse method 2nd Chooser method 2nd Connect to Share method 2nd services. [See also WSS (Windows SharePoint Services)] Sessions tab (RDP-tcp connection properties) Set Up Client Applications Wizard 2nd Set Up Client Computers Wizard computers, adding to network 2nd 3rd Set Up Server Computers Wizard 2nd Settings tab (GPMC) 2nd Setup Assistant (Entourage 2004) 2nd Setup Requirements window 2nd share permissions 2nd 3rd 4th 5th best practices 2nd Change combining with NTFS permissions 2nd Full Control Read Share Permissions dialog box 2nd SharePoint Central Adminstration Site (IIS) default settings 2nd SharePoint Timer Service starting stopping SharePoint. [See WSS (Windows SharePoint Services)] shares Services for Macintosh 2nd sharing files Macintosh computers. [See Macintosh platforms] Shavlik HFNetChk Pro signatures SMB signing 2nd 3rd Simple Mail Transfer Protocol (SMTP) single loss expectancy (SLE) SLE (single loss expectancy) small business community resources mailing lists 2nd websites/blogs 2nd Small Business Server Auditing GPO 2nd Small Business Server Client Computer GPO 2nd Small Business Server Domain Password Policy GPO 2nd 3rd Small Business Server Internet Connection Firewall GPO 2nd Small Business Server Lockout Policy GPO 2nd Small Business Server Remote Assistance Policy GPO 2nd Small Business Server Windows Firewall GPO Small Business ServerDomain Password Policy object small businesses case studies Calvert Technologies 2nd Correct Solutions Pty Ltd. 2nd HeadNETWORKS, LLC 2nd 3rd Interprom Computer Technologies 2nd JD Fogg Technology 2nd 3rd Norwich Group 2nd Rehab Designs, Inc. 2nd cash flow 2nd definition of 2nd finance 2nd industry niches business valuation consulting firms CPA firms law firms medical offices retail marketing 2nd micro businesses definition of 2nd needs of prioritized list of needs 2nd SBS features to meet those needs 2nd 3rd overlapping needs of enterprise and small business 2nd sales impact 2nd sole proprietary definition of 2nd technology resources 2nd smart hosts mail routing 2nd 3rd 4th 5th 6th 7th 8th SmartPhones ActiveSync SMB .local domain issues 2nd 3rd Active Directory Access, configuring 2nd 3rd 4th 5th SMB signing 2nd 3rd SMS Monitoring and Reporting resources 2nd SMTP logging 2nd tar pitting 2nd SMTP (Simple Mail Transfer Protocol) SMTP Connector setting (Exchange) soft recovery software deployment group policy Software Restriction Policies software settings (group policy) sole proprietary definition of 2nd SP (Service Pack) 2 2nd automatic updates DEP (Data Execution Prevention) Internet Explorer ActiveX restrictions 2nd 3rd 4th 5th MIME type handling pop-up blocker Outlook Express Security Center 2nd Windows Firewall 2nd Allow Port Exceptions[colon] ENABLED setting 2nd Define Port Exceptions[colon] ENABLED setting 2nd Define Program Exceptions[colon] ENABLED setting 2nd SP 1 (SBS 2003) 2nd spam blocking 2nd blacklists dynamic IP lists IMF (Intelligent Message Filter) 2nd 3rd 4th best practices configuration 2nd installation SCL values, setting with Outlook 2nd troubleshooting 2nd 3rd recipient filtering 2nd 3rd reverse DNS lookups SMTP tar pitting 2nd Spam Confidence Level (SCL) Special Permissions (NTFS) 2nd 3rd spell checking OWA (Outlook Web Access) spindles multiple spindles 2nd 3rd spoof detection 2nd spyware antispyware tools 2nd 3rd 4th 5th 6th characteristics of 2nd compared to viruses Microsoft AntiSpyware website symptoms of 2nd SQL Server upgrading database engines to 2nd Srv03_gdr code Srv03_qfe code Srv03_rtm code Srv03_spx code SSL certificates exporting from SBS 2nd importing into Macintosh Certificate Store 2nd nonstandard SSL ports tunnel ports 2nd SSL certificates 2nd 3rd 4th 5th 6th 7th creating 2nd Standard Edition (SBS 2003) 2nd Standard profiles starting SharePoint Timer Service stopping SharePoint Timer Service Storage Allocation for Deleted Files and Emails page (SBS Backup Wizard) storage groups 2nd storage. [See hard disks] striping 2nd subnet masks 2nd subsites (Companyweb site) creating 2nd 3rd Support Tools package switches 2nd synchronization ActiveSync 2nd 3rd 4th 5th WSUS (Windows Software Update Services) 2nd SysInternals system recovery 2nd 3rd 4th 5th |