You are previewing Microsoft® Windows® Small Business Server 2003 R2 Administrator's Companion.
O'Reilly logo
Microsoft® Windows® Small Business Server 2003 R2 Administrator's Companion

Book Description

This comprehensive administrator’s reference delivers the details you need to successfully deploy, manage, and support Microsoft Windows Small Business Server 2003 R2. The authors, experts and MVPs in Microsoft operating systems and server technologies, provide easy-to-follow procedures, practical workarounds, and key troubleshooting tactics for everyday, on-the-job results. Delve into system features and capabilities—and get hands-on insights for implementing messaging and collaboration, Internet access, data storage, printing, faxing, support for line-of-business applications, and end-to-end network administration for your small business. This book covers all Small Business Server 2003 R2 components, including Microsoft Windows Server™ 2003 R2, Microsoft Exchange Server 2003 technology, Microsoft SQL Server™ 2005, Microsoft Internet Security and Acceleration Server 2004, Microsoft Office Outlook® 2003, and Windows SharePoint® technologies, in a single volume, along with time-saving tools, scripts, and a complete eBook on CD.

Table of Contents

  1. Microsoft® Windows® Small Business Server 2003 R2: Administrator’s Companion
  2. A Note Regarding Supplemental Files
  3. Acknowledgments
  4. Introduction
    1. How to Use this Book
    2. What’s in This Book
    3. System Requirements
    4. About the Companion CD
    5. Support
    6. Talk to Us
  5. I. Preparation and Planning
    1. 1. Looking at the Big Picture
      1. Features of Windows Small Business Server
        1. Internet and E-Mail Made Easy
        2. Ready-Made Intranet
        3. Quickly Add Users and Computers to the Network
        4. Effortless Remote Access
        5. Services for Mobile Devices
        6. Simple Administration and Management
        7. Fax with Fewer Phone Lines
        8. Enhanced Security
        9. Manage Data Effectively
        10. Manage Storage Resources
        11. Create Advanced Web Pages
        12. Online Licensing
        13. Growth Is Good
      2. Restrictions on Windows Small Business Server
        1. A Single Domain Controller
        2. A Single Domain
        3. Client Limit
      3. Summary
    2. 2. Planning Your SBS Network
      1. Planning the Network Infrastructure
        1. Determining Your Needs
        2. Choosing an Internet Connection
          1. Determining Bandwidth Needs
          2. Types of Internet Connections
          3. Choosing ISPs
        3. Choosing a Network Type
          1. Choosing the Right Network Cable
          2. Choosing a Wireless Standard: 802.11a/b/g
        4. Choosing Network Devices
          1. Diagramming the Network
          2. Choosing a Network Switch
          3. Choosing Wireless Access Points
          4. Choosing a Firewall Device or Router
        5. Choosing Server Hardware
        6. Choosing Client Hardware and Software
      2. Choosing Naming Conventions
        1. Choosing a Domain Name for the Network
        2. Naming Computers
      3. Planning for Security
        1. Ensuring Physical Security
        2. Securing Client Computers
        3. Securing Wireless Networks
        4. Securing Internet Firewalls
      4. Summary
  6. II. Installation and Setup
    1. 3. Installing Windows Small Business Server 2003
      1. Planning Partitions
      2. Preparing the Server
      3. Installing Windows Small Business Server
        1. Installing the Operating System
        2. Using the Windows Small Business Server Setup Wizard
      4. Summary
    2. 4. Upgrading or Migrating to Windows Small Business Server 2003
      1. Choosing Between Upgrading and Migrating
      2. What’s Involved in a Conventional Migration
      3. What’s Involved in a Swing Migration
        1. Advantages of Swing Migration
      4. Preparing for an Upgrade
        1. Checking for Compatibility Issues
        2. Preparing for the Worst
        3. Preparing the Server
        4. Preparing Client Computers
        5. Final Preparation
      5. Performing the Upgrade
      6. Migrating User Permissions
      7. Summary
    3. 5. Completing the To Do List and Other Post-Installation Tasks
      1. Security Best Practices
      2. Connecting to the Internet
        1. Setting Up a Broadband Connection with a Local Router
        2. Setting Up a Direct Broadband Connection
        3. Setting Up a Broadband Connection with User Authentication (PPPoE)
        4. Setting Up a Dial-Up Connection
        5. Configuring the Firewall
      3. Configuring Remote Access
        1. Remote Access via Virtual Private Networking
        2. Remote Access via Dial-Up
      4. Activating Your Server
      5. Adding Client Access Licenses
      6. Adding Printers
      7. Adding Users and Computers
      8. Configuring Fax Services
        1. Changing Fax Sending and Receiving
        2. Setting Fax Service Properties
      9. Configuring Monitoring
      10. Configuring Backup
      11. Security Basics
      12. Updating Windows Small Business Server
        1. Updating Client Computers
      13. Summary
  7. III. Performing the Basic Tasks
    1. 6. Disk Management
      1. The Search for Disaster Protection
      2. Understanding Disk Terminology
      3. Choosing the Storage Solution for Your Network
        1. Storage Connection Technologies
      4. Managing Disks
      5. Using Disk Management
        1. Dynamic Disks
        2. Adding a Partition or Volume
          1. Adding a New Disk Using the Initialize and Convert Disk Wizard
          2. Creating a Volume
          3. Creating a Partition
          4. Creating Logical Drives in an Extended Partition
          5. Deleting a Partition, Volume, or Logical Drive
        3. Converting a Disk to a Dynamic Disk
        4. Extending a Volume
        5. Adding a Mirror
        6. Drive Failure in a Mirrored Volume
        7. Removing a Mirror
        8. Breaking a Mirror
        9. RAID-5 Volumes
        10. Mounting a Volume
      6. Summary
    2. 7. Storage Management
      1. Disk Quotas
        1. Enabling Disk Quotas
        2. Setting Quota Entries for Users
        3. Exporting and Importing Quotas
        4. Creating Quota Reports
      2. Encrypting Files
        1. Enabling Encryption
      3. Shadow Copies of Shared Folders
        1. Configuring Shadow Copies
        2. Enabling Shadow Copies
        3. Setting Up Clients to Use Shadow Copies
        4. Accessing Shadow Copies
        5. Disabling Shadow Copies
      4. Summary
    3. 8. Managing Users and Groups
      1. Understanding Groups
        1. Assigning Group Scopes
          1. Global Scope
          2. Domain Local Scope
          3. Universal Scope
      2. Managing Built-in Groups
        1. Built-in Universal Groups
        2. Built-in Local Groups
        3. Built-in Domain Local Groups
        4. Built-in Global Groups
      3. Creating Security Groups
      4. Creating Distribution Groups
      5. Understanding User Accounts
        1. Creating User Accounts
          1. Adding a Single User
          2. Adding Multiple Users
        2. Configuring Password Policy
      6. Managing User Templates
        1. Creating a New User Template
        2. Applying a Template to Existing Users
      7. Managing User Accounts
        1. Redirecting My Documents to the Default Server Folder
        2. Redirecting My Documents to a Network Folder
      8. Maintaining User Profiles
        1. Local Profiles
        2. Roaming Profiles
          1. Setting Up Roaming Profiles
          2. Creating Customized Roaming Profiles
        3. Assigning a Logon Script to a User Profile
      9. Using the Run As Command
        1. Making Shortcuts to Run As
      10. Summary
    4. 9. Shares and Permissions
      1. Sharing Resources
        1. Folder Sharing
        2. Removing a Share
        3. Moving or Renaming a Shared Folder
        4. Creating a New Share for a Shared Folder
      2. Setting Offline File Rules
        1. Synchronizing Offline Files
        2. Making Shares Available Offline
      3. Share Permissions vs. File Permissions
        1. How Permissions Work
        2. Working with NTFS File and Folder Permissions
        3. Considering Inheritance
        4. Configuring NTFS Folder Permissions
        5. Assigning NTFS Permissions to Files
      4. Configuring Special Permissions
      5. Ownership and How It Works
      6. Determining Effective Permissions
      7. Privileges and Logon Rights
      8. Encrypting Sensitive Data
        1. Creating a Recovery Policy
        2. Encrypting Files and Folders
        3. Decrypting Files and Folders
        4. Sharing Encrypted Files
        5. Recovering Files
      9. Summary
    5. 10. Installing and Managing Printers
      1. Understanding Print Servers
      2. Choosing Printers
      3. Installing Printers
        1. Adding Locally Attached Printers
        2. Adding Printers with Network Interfaces
          1. Adding Printers on a Standard TCP/IP Printer Port
          2. Adding Printers on an LPR Printer Port
      4. Changing Printer Driver Settings
        1. Sharing a Printer and Adding Client Drivers
        2. Specifying a Color Profile
        3. Changing Printer Availability and Priorities
        4. Determining Group Printer Priorities
        5. Setting Up Printer Pools and Changing Port Settings
        6. Changing Spool Settings
      5. Setting Print Server Options
      6. Managing Printers
        1. Managing Printers from Windows
        2. Managing Printers from a Web Browser
        3. Managing Printers from a Command Line
        4. Using Printer Migrator to Back Up or Migrate Print Servers
      7. Troubleshooting Printing Problems
        1. Document Fails to Print
        2. Document Prints Incorrectly
        3. Deleting Stuck Documents
      8. Summary
    6. 11. Managing Computers on the Network
      1. Connecting Computers to the Network
        1. Creating Computer Accounts for Client Computers
        2. Creating Computer Accounts for Server Computers
        3. Establishing Basic Network Connectivity
          1. Configuring Windows XP and Windows Server 2003 to Use DHCP
          2. Configuring Windows 2000 to Use DHCP
          3. Associating with a Wireless Access Point
        4. Using the Small Business Server Network Configuration Wizard
        5. Connecting Alternate Clients
          1. Connecting Older Windows Clients
          2. Connecting Mac OS X Clients
            1. Connecting to Windows File Shares
            2. Connecting to Networked Printers
            3. Disabling SMB Signing
      2. Using the Remote Web Workplace
      3. Managing Computers from the Server
        1. Assigning Applications to Client Computers
        2. Creating a Remote Connection Disk
        3. Viewing and Modifying Client Computer Settings
        4. Remotely Managing Computers and Viewing Event Logs
        5. Removing Computers from the Network
      4. Summary
    7. 12. Patch Management
      1. Why Patching Is Important
      2. The Patching Cycle
        1. Assess
          1. SBS Version
        2. Identify
          1. SBS Version
        3. Evaluate and Plan
          1. SBS Version
        4. Deploy
          1. SBS Version
        5. Repeat
      3. Installing SBS 2003 R2 WSUS
      4. Using WSUS
        1. Reviewing Errors
        2. Review Pending Updates
        3. Review Status of Updates Installation
        4. Change Update Services Settings
      5. Third-Party Solutions
      6. Summary
    8. 13. Backing Up and Restoring Data
      1. Backup Terminology and Methods
        1. Backup Devices
        2. Backup Media
      2. Designing a Backup Strategy
        1. Backup Schedules
          1. Frequency
          2. Reusing Tapes
          3. Archive and Off-Site Storage
        2. Using Shadow Copies to Supplement Backups
      3. Backing Up Your Data
        1. Configuring the Backup Utility
        2. Running a Backup Manually
          1. Full Manual Backup
          2. Back Up Selected Files and Folders
            1. Creating Selection Scripts
            2. Accessing Files and Folders for Backup
            3. Selecting the Backup Target
        3. Modifying the Backup Configuration
      4. Restoring Data
        1. Using the Backup Utility to Restore Files and Folders
        2. Using the Previous Versions Client to Restore Files and Folders
      5. Summary
  8. IV. Performing Advanced Tasks
    1. 14. Using Exchange Server
      1. Basic E-Mail Configuration
      2. POP3 E-Mail
        1. Configuring POP3 E-Mail
        2. Adding, Removing, and Editing POP3 E-Mail Boxes
          1. Adding a POP3 E-Mail Box
          2. Removing a POP3 E-Mail Box
          3. Editing an Existing POP3 E-Mail Box
        3. Setting a POP3 Delivery Schedule
        4. Routing POP3 E-Mail
          1. Adding a Routing Rule
          2. Changing a Routing Rule
          3. Removing a Routing Rule
        5. Troubleshooting POP3
          1. Microsoft Connector for POP3 Mailboxes Service Status
          2. Configuring Logging
          3. Configuring Undeliverable POP3 E-Mail
      3. Advanced E-Mail Configuration and Management
        1. Changing E-Mail Password
        2. Synchronize E-Mail
        3. Managing E-Mail Distribution Lists
          1. Creating a New Distribution Group (List)
          2. Modifying a Distribution Group (List)
            1. Modifying Group Membership with Outlook 2003
            2. Modifying Group Membership with the Server Management Console
          3. Deleting A Distribution Group (List)
        4. Setting the Reply To Address
          1. Changing the Reply To Address for All Users
          2. Changing the Reply To Address for a Specific User
      4. Managing E-Mail Delivery
        1. Setting an Individual User’s Message Properties
        2. SMTP Filtering
          1. Sender Filtering
          2. Connection Filtering
          3. Recipient Filtering
          4. Intelligent Message Filtering
          5. Sender ID Filtering
          6. Enabling the Filters
        3. Managing Queues
          1. Viewing and Monitoring Queues
          2. Finding the Messages In a Queue
          3. Shutting Down All Outgoing Queues Immediately
      5. Exchange 2003 SP2
      6. Summary
    2. 15. Managing Connectivity
      1. Administering TCP/IP Services
        1. Managing DHCP
          1. Viewing Current DHCP Address Leases
          2. Creating Exclusions in DHCP
          3. Adding a DHCP Reservation
          4. Enabling DNS Updates
        2. Viewing DNS Records
      2. Administering Routing and Remote Access
        1. Viewing Remote Access Clients
        2. Configuring Ports
      3. Advanced Network Security
        1. Using Internet Authentication Service to Increase VPN Security
        2. Deploying Certificate Services
          1. Installing Certificate Services
          2. Creating a Local Computer and Current User Certificates Console
          3. Requesting Computer and User Certificates
          4. Requesting a Certificate for the SBS Server
        3. Creating L2TP VPN Connections
          1. Deploying Certificates
          2. Modifying the Small Business Remote Access Policy
          3. Opening Ports in Routing and Remote Access
          4. Enabling EAP in Routing and Remote Access
          5. Creating the VPN Connection
        4. Using 802.1X Authentication for Wireless Security
          1. Choosing Authentication Protocols
          2. Deploying Certificates
          3. Adding Wireless Access Points as RADIUS Clients
          4. Creating a Remote Access Policy
          5. Configuring Wireless Access Points
          6. Configuring Clients to Use PEAP
        5. Using Group Policy to Automatically Configure 802.11 and Certificate Settings
          1. Creating and Linking a New Group Policy Object
          2. Modifying Certificate Settings
          3. Creating a Wireless Network Policy
      4. Summary
    3. 16. Using ISA Server 2004
      1. Concepts
        1. Network Address Translation
        2. Packet Filtering and Application Layer Filtering
        3. Caching
        4. Client Types
        5. ISA Server Firewall Policies
      2. Installing ISA Server 2004
      3. Installing the Firewall Client
        1. Adding the Firewall Client to Client Applications
        2. Deploying the Firewall Client
      4. Administering ISA Server 2004
        1. Changing Your Broadband or Dial-Up Connection
        2. Enabling or Disabling Services Through the ISA Server
        3. Enabling or Disabling Web Services
        4. Enabling L2TP With ISA Server 2004
      5. Advanced Configuration
        1. Create Firewall Policy Rules
        2. Recommended Initial Configuration Steps
        3. Backing Up the ISA Server Configuration
      6. Import, Export, Backup, and Restore
      7. Monitoring ISA Server
      8. Summary
    4. 17. Using Group Policy
      1. Group Policy Objects
      2. Managing Group Policies
        1. Order of Inheritance
        2. Overriding Inheritance
          1. Enforcing a GPO Link in the GPMC
          2. Setting Block Inheritance
        3. Order of Implementation
      3. Creating a Group Policy Object
      4. Deleting a Group Policy Object
      5. Managing Group Policy Links
        1. Setting the Scope of the GPO
        2. Enabling and Disabling GPO Links
        3. Disabling a Branch of a GPO
      6. Refreshing Group Policy
      7. Backing Up a Group Policy Object
      8. Restoring a Group Policy Object
      9. Delegating Permissions on a GPO
        1. Delegating Permission to Create
        2. Delegating Permission to Link
        3. Delegating Permission to Edit, Delete, or Modify Security
      10. Predicting Group Policy Outcomes
        1. Group Policy Modeling
        2. Group Policy Results
      11. Summary
    5. 18. Customizing a SharePoint Web Site
      1. Getting Familiar with Windows SharePoint Services
        1. Understanding SharePoint Items
        2. Interacting with a SharePoint Site
      2. Changing the Appearance of the Site
      3. Changing Home Page Content
      4. Customizing Pages
      5. Administering a SharePoint Web Site
        1. Managing Site Users
        2. Managing Site Groups and Access Permissions
        3. Managing Templates, Usage Data, and Other Settings
      6. Administering SharePoint Virtual Servers
      7. Using FrontPage 2003 to Customize Windows SharePoint Services
        1. Customizing Existing SharePoint Sites
          1. Opening the SharePoint Site And Getting Comfortable
          2. Adding Links and Customizing the Link Bar
          3. Adding Web Parts
        2. Creating New SharePoint Web Sites
      8. Backup and Restore of a SharePoint Site
        1. Using Stsadm
        2. Using Smigrate
      9. Summary
    6. 19. Managing an Intranet Web Server
      1. Creating New Virtual Directories
      2. Using Web Sharing
      3. Changing Security Settings
        1. Changing Which Sites Are Externally Accessible
        2. Enabling or Disabling Anonymous Access
        3. Changing Server Certificates and SSL Settings
      4. Limiting Network Usage by Web Sites
      5. Setting Up an FTP Server
        1. Installing FTP
        2. Configuring FTP
      6. Configuring the Indexing Service
      7. Backing Up and Restoring the IIS Configuration
      8. Reinstalling IIS
      9. Summary
    7. 20. Using SQL Server 2005
      1. Installing SQL Server 2005
      2. Upgrading Windows SharePoint Services to SQL Server 2005
        1. Before You Upgrade
        2. Upgrading Companyweb to SQL Server 2005
      3. Architecture
      4. Administration
        1. Start, Stop, and Pause
        2. Backup
          1. Defining a Backup Device
          2. Backing Up a Database
          3. Viewing the Contents of a Backup Device
      5. Summary
  9. V. Maintenance and Troubleshooting
    1. 21. Monitoring and Fine-Tuning Performance
      1. Enabling Auditing And Monitoring
        1. Predefined Performance and Usage Reports
        2. Auditing Events
          1. Customizing Auditing
        3. Viewing Event Logs
        4. Searching Event Logs
        5. Setting the Size of Event Logs
      2. Selecting A Monitoring Method
      3. Using System Monitor
        1. System Monitor Items
        2. Running System Monitor
          1. Adding Counters
          2. Selecting Counters
          3. Matching Counters to Graph Lines
          4. Deleting Counters
          5. Determining How Often to Monitor
          6. Modifying the Display
          7. Choosing a View
          8. Choosing Display Elements
          9. Choosing the Time Interval for Monitoring
          10. Selecting Additional Properties
        3. Monitoring Another Computer
      4. Performance Logs and Alerts
        1. Counter Logs
        2. Trace Logs
        3. Creating Counter and Trace Logs
          1. Adding Counters to Counter Logs
          2. Saving Log and Alert File Settings
          3. Selecting System and Nonsystem Providers for Trace Logs
          4. Setting File Parameters for Counter and Trace Logs
          5. Understanding the Log File Parameters
      5. Using Alerts
        1. Creating an Alert
        2. Configuring an Alert
      6. Permissions for Counter Logs, Trace Logs, and Alerts
      7. Monitoring Memory Usage
        1. Recommended Counters
      8. Monitoring Processor Activity
        1. Minimum Recommended Counters
      9. Monitoring Disk Activity
        1. Minimum Recommended Counters
      10. Using Health Monitor
        1. Modifying an Existing Threshold
        2. Adding a Threshold
        3. Configuring Actions
          1. Command-Line Action
          2. E-Mail Action
          3. Text Log Action
          4. Windows Event Log Action
          5. Script Action
        4. Using Data Collectors
          1. Creating a Data Collector
          2. Performance Monitor
          3. Service Monitor
          4. Process Monitor
          5. Windows Event Log Monitor
          6. Other Monitors
      11. Summary
    2. 22. Disaster Planning
      1. Planning for Disaster
        1. Identifying the Risks
        2. Identifying the Resources
        3. Developing the Responses
          1. Standard Operating Procedures
          2. Standard Escalation Procedures
        4. Testing the Responses
        5. Iterating
      2. Preparing for a Disaster
        1. Setting Up a Fault-Tolerant System
        2. Backing Up the System
        3. Creating an Automated System Recovery Disk
        4. Creating a Boot Disk
        5. Installing the Recovery Console
        6. Specifying Recovery Options
        7. Creating and Using a Recovery Drive
      3. Summary
    3. 23. Planning Fault Tolerance and Avoidance
      1. Mean Time to Failure and Mean Time to Recover
      2. Protecting the Power Supply
        1. Local Power Supply Failure
        2. Voltage Variations
          1. Spikes
          2. Surges
          3. Sags
          4. Brownouts
        3. Short-Term Power Outages
        4. Long-Term Power Outages
      3. Disk Arrays
        1. Hardware vs. Software
        2. RAID Levels for Fault Tolerance
          1. Intended Use
          2. Fault Tolerance
          3. Availability
          4. Performance
          5. Cost
        3. Hot-Swap and Hot-Spare Disk Systems
      4. Other Spare Parts
      5. Summary
  10. VI. Appendices
    1. A. Introduction to Networks
      1. Servers
      2. Clients
      3. Media Connecting Servers and Clients
      4. Features of the Windows Operating System
      5. Domains and Workgroups
        1. Do Workgroups Work?
        2. Defining Domains
          1. Additional Users
          2. Access Control
        3. Domain Components
          1. Domain Controller
          2. Member Servers
          3. Workstations or Clients
    2. B. Partially Automating Installation
      1. Automating CD-Based Installations
      2. Using the System Preparation Tool to Image Windows Server 2003
    3. C. Using the Transition Pack
      1. What’s in a Transition Pack?
      2. Why Convert?
        1. Handling Business Growth
        2. Handling Multiple Domains
        3. Will I Lose RWW?
      3. Preparing to Run the Transition Pack
      4. Performing the Transition
      5. Post-Transition
        1. Post-Transition Tasks
    4. D. Using File Server Resource Manager
      1. Installing FSRM
      2. Setting Global Options
      3. Using Folder Quotas
        1. Creating Quotas
        2. Creating and Editing Quota Templates
      4. Screening Files
        1. Creating File Screens
      5. Scheduling Storage Reports
  11. Glossary
  12. Inside Back Cover
  13. Index
  14. About the Authors
  15. Copyright