Organize With Office 365
WSUS supports updating the Microsoft Office suite of products, beginning with Office 2000, which includes all of the following products This is a huge improvement over WSUS' predecessor, SUS. Before WSUS, you either made sure your client community was familiar with the public online Office Update Web site, you purchased a costly third-party patch deployment product, or you simply did not update your Microsoft Office line of products. The sheer number of Help Desk calls that are fixed with an Office Update or Service Pack installation is reason enough to use the free WSUS server functionality, ultimately reducing the total cost of ownership (TCO) for your company.
The Configure HTML Viewer link leads to a page that you can use to enable on-the-fly, high-quality translations of .doc, .xls, .ppt, and .pps files in the Windows SharePoint Services site to .HTML files for clients who don't have appropriate Microsoft Office viewers installed. However, this nifty feature requires the use of a separate, dedicated HTML Viewer server running on Microsoft Windows XP Professional. This server runs Office 2003 and the Microsoft Office HTML Viewer Service. The good news is that because the HTML Viewer computer services only the SharePoint server, a server operating system is not required. The Microsoft Office HTML Viewer Service won't work properly when installed on the SBS server, and doing so can cause significant security vulnerabilities and performance issues. For more information, download the Microsoft Office HTML Viewer from the Microsoft Office 2003 Resource Kit Web site
Users At Contoso Ltd. Use Microsoft Office Applications To Access Resources On Server01. Your Job Is To Monitor
Users at Contoso, Ltd. use Microsoft Office applications to access resources on Server01. Your job is to monitor Server01 to ensure that permissions are not too restrictive so that users are not prevented from achieving their assignments. Which log, and which type of event, will provide the information you require
Application licensing in a terminal server environment is simpler than you might think whatever licensing that is applied to a product in a single-user environment applies to the terminal server environment. For example, Microsoft Office 97 is licensed on a per-seat basis. If you install Microsoft Office onto the terminal server, then every computer that will ever run a Microsoft Office application will need to have an Office license, even if the application only runs once a year. However, because Office is licensed on a per-seat basis, if you already have a licensed copy of MS Office installed on a PC client running terminal services, that client may use Office in the terminal session (perhaps when dialing into the terminal server from home) without purchasing an additional Office license, because that computer is already licensed to run the application suite. Be sure to get familiar with the licensing a given application requires so you can see how it will work in the multiuser...
The Marketing department is complaining about print quality on the MarketingPrinter. When they print from their Windows XP desktops using Microsoft Office applications, documents print perfectly. But when they print from Adobe applications, the documents do not always reflect the desired results. The Sales department, which uses a mix of Windows 2000 and Windows XP workstations, Microsoft Office, and Microsoft Customer Relationship Management (CRM), does not report any problems with the SalesPrinter.
ISA Server 2000 and SQL Server 2000 are included with Microsoft Windows Small Business Server 2003, Premium Edition, but aren't installed along with the rest of the operating system. To install these programs, use the Premium Technologies CD, as described in this appendix. Microsoft Office FrontPage 2003 is also included with Windows Small Business Server 2003, Premium Edition, but is self-explanatory to install, so we don't discuss it here.
Microsoft Office FrontPage has long been the preferred application for easy Web page creation. It has been offered as a standalone application and as part of Microsoft Office, adding ever more sophisticated capabilities with each version. A single copy of Microsoft Office FrontPage 2003 is included in the Premium Edition of SBS.
Before launching into the application test process, it is important to have a controllable list of applications targeted for production. The list should be as small as possible but still have representative applications in any category that your company needs to use. What must be avoided is a lack of standardization within a category. For example, u large organization may be using both Microsoft Office 2000 and Office XP. Maks every effort to choose ose application (or suite, in this case) for deployment in the SBC environment. It will reduce complexity, ease support, and cause less confusion to the user community.
FrontPage 2003 is a full-featured Web page editor that you can use to edit or create sophisticated Windows SharePoint Services sites as well as normal Web pages. Although entire books have been written about FrontPage, the coverage here focuses on accomplishing some select tasks on your SharePoint site. For a thorough grounding in FrontPage, see Microsoft Office FrontPage 2003 Inside Out (Microsoft Press).
Can you more easily locate the event that marked Danielle's deletion of the Report file Open the event and look at its contents. The description indicates the user and the file and the action. You could not filter for contents of the description in Event Viewer, but you could do so by exporting the file to a log analysis tool or to Microsoft Office Excel. 9. (Optional) If you have access to Microsoft Office Excel, right-click the Security log node and choose Save Log File As. Enter a name and select Comma-Delimited as the file type. Open the file in Office Excel.
RMS-enabled applications allow content authors to use published licenses to protect digital data, which may includes email messages, Microsoft Office documents, financial reports, contacts, employees' performance reviews, project-related documents, customer data, business intelligence, planning and vision documents, product research, personal records, and other sensitive data. RMS-enabled applications also allow a user to view RMS-protected contents by using a valid use license. Microsoft Office 2003 and 2007 (Enterprise Edition) are RMS-enabled applications. If your application is not RMS-aware or if there is no native RMS functionality available for your application, you may have to use add-ons to make your application RMS-enabled. One significant feature of the RMS system is that it allows users to view a document in Microsoft Internet Explorer when an intended application is not available however, anyone attempting to view the data must download and install the Rights Management...
Sometimes an application creates a path pointer to a common location for all users. For example, the Microsoft Office 97 installation program sets a document template pointer to C Program Files Microsoft Office Template. When multiple users try to update or open the same file, errors will occur. To address this situation, the administrator needs to search the registry and change the pointer to each user's home folder, such as H Office 97 Template, then create the correct directory structure for each user in the logon script SysfemRoof System32 usrlogn2.cmd. This file is called by the usrlogon.cmd (if this file does not exist, create it using a text editor) and add the following simple statement to accomplish this task Note Most of the Microsoft Office installation issues discussed here have been resolved with Office 2000 and XP, or are easily resolved with the Office Resource Kit. These discussions still serve as an example of how to resolve similar problems with other applications.
You can create software categories to arrange different applications under a specific heading. Instead of relying on a single alphabetical list of applications that is available by default, you can organize software into categories, such as Graphics, Microsoft Office, and Accounting categories. Users can then choose which applications from the categories to install in Add or Remove Programs.
Two SMS 2.0 Software Update Services Feature Pack tools (Security Update Inventory Tool and the Microsoft Office Inventory Tool for Updates) are not installed with SMS 2003. Because these tools are updated regularly to add new detection capabilities and product types, they are available for SMS 2003 as Web downloads only. See Table 1.4 for more information about these tools. Microsoft Office Inventory Tool for Updates Scans a client computer for installed software updates to Microsoft Office. Matches the installed updates against the current catalog of software updates available from Microsoft.
LooF over the list or all application, to eliminate obvious duplications. For instance, if1 90 percent of protected SBC users run Microsoft Office and 10 percent run Corel WordPerfect Offine, you can reasonably assume that MS Office will win out as the new corporate standard under serveo-based confuting.
There are many different ways to configure AU clients for WSUS updates. If you were an administrator of the predecessor to WSUS called Software Update Services (SUS) or the more popular online WindowsUpdate.com site, you know that both of these update mechanisms only allow you to update Windows-specific software updates. What is unique and possibly the biggest change in the release of Microsoft's WSUS, is its ability to update not only the Windows OS, but also specific Microsoft product line suites. The following sections briefly discuss and show how to update your Windows clients, and also touches on some specifics that deal with updating products such as Microsoft Office, Exchange, and SQL Server.
Everyone needs e-mail today and a business without Internet connectivity is viewed as absolutely antiquated. Unfortunately, under normal circumstances, setting up e-mail and an Internet connection is just about as daunting as it ever was. SBS changes all that with tools to make both processes quite painless. For example, the Configure E-mail and Internet Connection Wizard (known hereafter as the CEICW) allows you to easily configure the network, set up a shared Internet broadband or dial-up connection, configure firewall services, and customize Exchange Server for e-mail. Use Exchange Server 2003 with Microsoft Office Outlook 2003 and add numerous features, including the ability to schedule meetings and hold online conferences.
Users at Contoso, Ltd use Microsoft Office applications to access resources on Server01. Your job is to monitor Server01 to ensure that permissions are not too restrictive so that users are not prevented from achieving their assignments. Which log, and which type of event, will provide the information you require
Microsoft's first effort to create a centralized technology for managing software updates was Software Update Services (SUS). SUS addressed the demands of Microsoft customers for easier deployment of security updates but lacked key features, including the capability to update applications such as Microsoft Office and to easily report the status of patched systems on the network.
SSL can also be used to secure traffic between a Web server on a perimeter network (also known as DMZ, demilitarized zone, and screened subnet) and a Microsoft SQL Server computer located on an internal LAN. Similarly, SSL can be used to secure traffic from a client workstation to an Active Directory server in addition to e-mail traffic between Microsoft Office Outlook 2003 and a Microsoft Exchange Server computer.
Many common applications, such as the Microsoft Office XP Suite, have features that are not appropriate for an SBC environment. An example of this type of feature is the Office Assistant that represents the help interface in the Office XP product line. The Office Assistant utilizes unnecessary resources and, because of the animated graphic, does not perform well in a MetaFrame XP environment. Many common applications have compatible template files for Group Policy. The Office XP template file is officel O.adm and the Office 2003 template file is officel 1 .adm. These template files can be added to the Group Policy by right-clicking one of the Administrative Template areas in the Group Policy Management Console and clicking Add Remove Templates. By clicking the Add button, an administrator can browse to the appropriate template file and add it to the Group Policy Management Console. The template files are located in the systemroot inf directory if the application has been installed on...
Microsoft releases information about software updates in the form of catalogs and Web downloads. The security update catalog and the Microsoft Office update catalog are periodically updated as new software updates and are released. Update Inventory tool, the Microsoft Office Inventory Tool for Updates, or both.
Note Remote Desktop for Administration isn't designed for application serving. Most productivity applications such as Microsoft Office Word, Outlook, and Excel require specific environment settings that are not available through this feature. If you want to work with these types of applications (rather than server applications), you should install and use Terminal Server.
Note Windows SharePoint Services is an update and revision to Microsoft SharePoint Team Services version 1.0. Windows SharePoint Services, or Share-Point, is an outgrowth of the Microsoft Office Server Extensions, which are themselves a superset of the Microsoft FrontPage Server Extensions.
Perform an administrative installation of the desired program to a new folder in the C ClientApps folder on the SBS server, or copy the setup files to a new folder in the C ClientApps folder (assuming the ClientApps folder is located on the C drive). To perform an administrative installation of Microsoft Office, for example, use the setup.exe a command.
This chapter gives you an overview of the default Windows SharePoint Services Web site, and then shows you how to edit, manage, and customize the site using Microsoft Office FrontPage 2003. For more sophisticated design work, you'll probably want to hire a professional developer.
Thus, mapped drives supported administrative tasks such as replacing servers and moving shared folders. They were not without problems, though. For example, ever since version 97, Microsoft Office tracks the UNC behind the mapped drive, making it difficult to use conventional drive mappings. With the advent of Windows Installer compatible software, the UNC is becoming more and more important. For self-healing purposes, Windows Installer must remember the original installation source of a program. It prefers a UNC format to a mapped drive for this function. This is why Microsoft has developed two technologies that support fault tolerance for UNC shares. These two technologies are Distributed Link Tracking and the Distributed File System. Both can be used individually or together to provide many of the same administrative advantages of mapped drives.
The Active Directory Rights Management Service (AD RMS) is designed to protect against inadvertent or intentional information disclosure, and ensure complete control of sensitive or secret content. RMS aims to achieve this through a web service that would be deployed as part of the RMS root server installation. RMS only works with applications that are integrated with this technology the obvious first example of such an application would be the Microsoft Office suite.
No matter how much hard disk space you think you need, it will never be enough. An insatiable appetite for space is common to users, applications, and operating systems. Just compare the current average size of a user's profile or home folder with those of a few years ago, or consider the space requirements of Microsoft Office 2003 and Windows XP.
Assigning the application to the computer will ensure that all users who access the workstation will have access to Microsoft Office XP. You cannot publish to computers, and assigning or publishing the application to users would mean that only those users could use the application and they would be able to access it from any machine on the network. 4. B. Assigning the application to the user ensures that the user will have access to Microsoft Office XP, regardless of the computer they use. The other options would mean that the user either wouldn't have access to the application at all, or would need to log on to a specific computer. 16. A. One way to avoid problems such as these is to enforce standard configurations for applications. For example, we may choose to create a basic and an advanced package for Microsoft Office XP. The Basic package would include the most-used applications, such as Microsoft Word, Outlook, and Excel. The advanced package would include these applications...
If you're running virus-checking software or indexing, these applications read files, and those read actions count as recalls. The Findfast tool that is installed by default with Microsoft Office is a classic example. Either stop using the tools (eliminating Findfast is a good idea even if you're not using RSS) or raise the recall limit.
Csvde is a command-line utility that allows you to import or export objects in Active Directory from (or to) a comma-delimited text file (also known as a comma-separated value or CSV file), which is, of course, a common format easily read and saved using Notepad and Microsoft Office Excel.
RMS client software is included with Windows Vista and Windows Server 2008 out of the box and is available as a separate download for earlier Windows platforms. Please note that clients running Windows Vista SP1 or later, and Windows Server 2008, will be able to read the policy templates from the RMS server, automatically, through what is called a template distribution pipeline. Before this automatic download is enabled, Vista SP1 or Windows Server 2008 clients will need to enable the AD RMS Rights Policy Template Management (Automated) scheduled task that runs the update, and will also need to configure a Registry setting in (this is applicable to Microsoft Office 2007), adding an AdminTemplatePath value of type expandable string value. Set the path to where templates should be read from, which by default is localappdata Microsoft DRM Templates, or C Users username AppData Local Microsoft DRM Templates.
0 D is incorrect because the GPM Edit console does not really have OK or Apply buttons, which are applicable to policies and not to their properties or specific settings. Only clients can request and apply policy objects. Forced update from a central location would grind the network to a halt if it triggers, say, a few dozen concurrent installations of Microsoft Office.
Click the Microsoft Office button Prepare Restrict Permission, and then click Restricted Access. 4. The following message appears Permission to this document is currently restricted. Microsoft Office must connect to http ADRMSSERVER 443 _wmcs licensing to verify your credentials and download your permission. Click OK. 5. The following message appears Verifying your credentials for opening content with restricted permissions When the document opens, click the Microsoft Office button. You will notice that the Print option is not available. Click View Permission in the message bar. You should see that your AD RMS rights policy template has been applied to the document.
You are in charge of application and server support at a large multinational company named Contoso, Ltd., which is made up of two divisions. Within those divisions are two distinct network environments that you need to deal with. Division one is made up of a Windows 2000 Server native mode domain. Clients in division two all use Windows 2000 Professional and Microsoft Office 2000. Division two is made up of a Windows 2000 mixed-mode domain, with workstations running Windows NT 4.0 and Office 97. The workstations running Windows NT 4.0 have Internet Explorer 5.01 installed. Division two also hosts a server running Exchange 5.5 and computer running SQL Server 6.5. Each division has its own Systems Management Server (SMS). The SMS 2.0 servers have the MBSA-enabled Software Update Services Feature Pack installed. The feature pack is used to automatically scan each division's workstations and servers to generate a report from which you can deploy appropriate updates to each division's...
A web part pack is a CAB file that contains all the files needed to support the web part. This includes any .dll and .dwp files. This allows a developer to create a web part and then deploy the web part in a consistent manner. For example, Microsoft will ship the Microsoft Office Web Parts and Components as a set of Web Part Packs. The setup package will include a web part pack that installs the Office Web Parts (pivot table, pivot view, spreadsheet, datasheet, chart, and web capture), QuickQuote web part, and a Great Plains site template. When you install the Office Web Parts and Component setup, they are added to the Default Web Site by default. If you want to add them to another web site or install a web part pack shipped by another vendor that may not install to the Default Web Site, you will need to add the web part pack to the web site using the following stsadm.exe command-line
A policy template specifies the AD RMS settings for applications to which it is required. However, you can configure additional permissions and settings to a specific application or group of applications (for example, Microsoft Office applications). You can specify, for example, which users have changed permission to a document and which can only read it. How you access the Permissions dialog for a specific application depends on the application. For example, for Microsoft Office 2007 applications, you click the Office button, point to Prepare, and then point to Restrict Permission. This lets you select a template and opens the Permissions dialog box. If you click the More Options button, you can specify additional settings and options for a policy template as described in Table 6-2.
In addition, since the Windows Installer installation file is in fact a database, it can be modified at will for different installation types. These are called transform files and have the .msp extension. For example, you can create a global MSI file that includes all of the Microsoft Office program files and use custom transform files to install only Access, or install only Word, Excel, PowerPoint, and Outlook, or install only FrontPage, or FrontPage and Access, and so on. Finally, MSI files also support patching. Patch files have an .msp extension and allow the application of hot fixes and service packs to installed software.
As terminal services become more widespread, it's probable that more applications will come with multiuser installation packages. Microsoft Office 2000 is one that presently does. If you try to run the normal installation program on a terminal server, you'll see a nag screen telling you that you can't do that and prompting you to use the installation files provided with the Office 2000 Resource Kit.
Example Installation Instructions Installing Micosoft Office XP on Windows Server for Use in a Terminal Services
For the purposes of providing an example of a common application installation in a Terminal Services environment, we will utilize our fictional case study, CME Corp introduced in Chapter 10, as an example. CME Corp, a medical device manufacturer with 3000 employees worldwide, will be deploying Microsoft Office XP. In order to install Office XP in the Terminal Services environment, a Microsoft Transform file (MST) will be used for installation. The MST file allows for full customization of the install, including configuration of the Outlook profile with a user-specific profile. 2. Install the Microsoft Office XP Resource Kit. The ORK can be downloaded from www.microsoft. co m office ork xp appndx appa04.htm. 4. Execute the Microsoft Office XP installation program to install Microsoft Office XP. (CME Corp will use Installation Manager as described later in this chapter, and thus will need to add the package to the CMC.) To create and configure a custom Microsoft Office XP Terminal...
An easier way to manage multiple sets of applications may be to create separate GPOs for specific groups of applications. For example, one GPO could provide all end-user productivity applications (such as Microsoft Office XP and Adobe Acrobat Reader), whereas another GPO could provide tools for users in the Engineering department. Now, whenever the software requirements for a group changes, systems administrators can just enable or disable specific GPOs for the OU that contains these users. Enforce consistency using MSI options. One of the problems with applications and application suites (such as Microsoft Office XP) is that end users can choose to specify which options are available during installation. Although this might be useful for some users, it can cause compatibility and management problems. For example, suppose a manager sends a spreadsheet One way to avoid problems such as these is to enforce standard configurations for applications. For example, we may choose to create a...
The functional model's main objective is to group computer or user objects according to the similarities of business functions they perform. For example, it is reasonable to expect that the Microsoft Office suite will be required on all desktops, so its deployment and configuration can be effected at a higher level using a single GPO. Another application specific to finance and accounting groups may only be needed within those groups having an OU for that group of objects would allow an easy and intuitive way of deploying software and configurations that is specific to the group.
Over the past year, Lucerne Publishing has been hit by several macro viruses. The primary cause of the virus outbreaks is users opening unauthorized macros in Microsoft Office documents. To restrict the macros that can be executed, you decide to start digitally signing all VBA projects created by your development team.
With WSS, knowledge worker team members can create a team intranet site, and then upload files using a browser. With Microsoft's new Office suite, interaction with WSS can also be conducted directly through the Office programs used to create and modify the shared documents. Microsoft Office Word 2003, Microsoft Office Excel 2003, or Microsoft Office PowerPoint 2003 are each integrated with Microsoft Windows SharePoint Services. Key areas where this integration can simplify file sharing between knowledge workers Document Workspaces, the Shared Workspace task pane, and shared attachments.
As a general rule turn off all features that are not needed for the end user to complete his tasks. Server-side resources can also be optimized by the effective use of the terminal server connections. Limiting users to one session, limiting the number of sessions per terminal server, and logging off disconnected or idle sessions are all things you can do to conserve server-side resources and thus increase the overall performance of the system as a whole. It is also important to look at the application(s) being delivered via Terminal Services and tweak them for maximum performance. Microsoft Office is a great example of this. Turning off the Office Assistant, spell and grammar check as you type, automated windows, and things of that sort can greatly reduce the amount of network traffic and CPU consumed.
Software packages must be in the format of an .msi package. Any format other than an .msi cannot be pushed using Group Policy. Third-party applications can help you create customized .msi packages to deploy any type of software as well as software with customized installation choices. Also, many software packages (such as Microsoft Office) come with default .msi packages with default configuration choices available.
When a computer manufacturer delivers a new computer to an organization, the operating system is generally configured to provide the greatest flexibility to the typical user. Many organizations have additional software installed on top of the operating system, such as Microsoft Office. This provides power users with the tools they need to do their jobs.
Other than using IPSec, you could suggest using digital rights management (DRM). Microsoft Office 2003 and the Rights Management Services add-on to Windows Server 2003 encrypt Office documents and enable the document owners to specify granular permissions to documents. DRM would protect documents even after they left your network, restricting whether customers could forward, print, or even copy and paste a document's contents.
Incorrect This particular server only requires update 824145 and update 815495. Update 824146 is required for Windows Server 2003. Update 815495 is required for SQL Server 2000. Update 822715 is designed for systems running Microsoft Office, Visio, Project, and Publisher.
Contains all updates currently available from Microsoft for Microsoft Office Office Update is an online catalog of all updates currently available from Microsoft for Microsoft Office. Users connect to Office Update by using Microsoft Internet Explorer to navigate to the URL
The Windows Server 2003 System Monitor itself is an ActiveX control that can be placed within other applications. Examples of applications that can host the System Monitor control include web browsers and client programs like Microsoft Office's Word XP or Excel XP. This functionality can make it very easy for applications developers and systems administrators to incorporate the System Monitor into their own tools and applications.
If you've installed newer application programs (such as Microsoft Office XP), you probably noticed the updated setup and installation routines. Applications that comply with the updated standard use the Windows Installer specification and MSI software packages for deployment. Each package contains information about various setup options and the files required for installation. Although the benefits may not seem dramatic on the surface, there's a lot of new functionality under the hood.
Exercise 9.1 walks you through the process of creating a software distribution share point. In this exercise, you will prepare for software deployment by creating a directory share and placing certain types of files in this directory. In order to complete the steps in this exercise, you must have access to the Microsoft Office XP installation files (via CD-ROM or through a network share) and have 600MB of free disk space.
Uninstall The Applications When They Fall Out Of The Scope Of Management So far, you have seen how applications can be assigned and published to users or computers. But what happens when effective GPOs change For example, suppose that User A is currently located within the Sales OU. A GPO that assigns the Microsoft Office XP suite of applications is linked to the Sales OU. Now, I decide to move User A to the Engineering OU, which has no software deployment settings. Should the application be uninstalled, or should it remain
When an application is assigned to a computer, the program is made available to any users of the computer. For example, all users who log on to a computer that has been assigned Microsoft Office XP will have access to the components of the application. If the user did not previously install Microsoft Office, they will be prompted for any required setup information when the program first runs.
Our case study, CME, has 200 local and remote UNIX desktops used by engineers for Computer Aided De as 100 Linux desktops utilized by the software development teams. CME utilizes both a MetaFrame Web In scripts stored on the main file server, pathed from the UNIX and Linux machines, to run a full desktop pub lis desktop provides Microsoft Office applications, Microsoft Outlook, MathCAD, and other PC-based engineeri agplicanions to the enginenrs and developers.
MBSA is a free graphical security tool that scans Windows computers for common security misconfigurations and generates a security report for each computer that it scans. MBSA runs on Windows Server 2003, Windows 2000, and Windows XP computers. It only scans for security vulnerabilities on Windows Server 2003, Windows NT 4, Windows 2000, and Windows XP computers. MBSA scans for common security misconfigurations in Microsoft Windows, Microsoft IIS, Microsoft SQL Server, Microsoft Internet Explorer (IE), and Microsoft Office. MBSA also scans for missing security updates in Microsoft Windows, IIS, SQL Server, IE, Windows Media Player (WMP), Exchange Server, and Exchange 2000 Server. It requires Administrative privileges to run a security scan against a machine.
Project is small enough, a supervisor can probably plan and manage a simple file-share cluster solution. Again, this all depends on the size and scope of the solution. You should also keep the plan on paper or in a ledger that can be passed down. My preference is to use Project 2000 (a Microsoft Office application), but if you don't own a license for it, a ledger or a book will work.
WSUS updates are separated by product family, product, and update classification. A product family is a grouping of products (e.g., Microsoft Office). Products are the different versions of an application or operating system within a given product family (e.g., Microsoft Office 2003 and Microsoft Office XP are separate products within the Microsoft Office product family). Update classifications define the type of update. Each product has many different classifications of updates. For example, the Microsoft Windows XP product includes critical updates, service packs, and security updates classifications (to name a few).Table 6.3 explains the different products and product families supported by WSUS.Table 6.4 explains all of the update classifications.
Even after you deploy a Windows Server 2003 domain, it's likely you'll continue to need WINS for some time. This is not only an issue of downlevel clients that require NetBIOS name resolution, it's probably also the fact that you're running applications that make WINS calls. (Microsoft Office springs to mind I love irony.)
Once you select the package you want to upgrade, you need to determine if you should remove the application first before you install the new package, or whether you should upgrade the existing application without removing it first. The choice will depend on the application. For example, if you are upgrading Microsoft Office 97 to Microsoft Office 2000, you should upgrade the application without uninstalling the application first. This way, the new version of Office 2000 can use the settings that are already configured in the existing version of Office 97.
For each user, you need to create another list that specifies what software and hardware that user requires to perform his or her functions. You create two lists. The first is for basic users who need no more than the standard applications adopted by the enterprise. If your company has adopted Microsoft Exchange 2003, for example, Outlook 2003 and later is on that list, as is MS Word, Excel, and other applications (if, of course, the company has standardized on Microsoft Office components, which is very common).
Another consideration is the number of applications that are assigned per user. It might be advisable to have the most frequently used or critical applications install immediately, and the less frequently used applications be advertised with Desktop or Start menu shortcuts. Assigning too many applications for automatic installation may cause a long delay in the login process because the user's desktop will not be made available by default until all applications are installed. Installation of several large software packages, such as Microsoft Office, could delay the user's login by a half hour or more.
GAC, configuring, 103-104 GC facility, 102 JVM versus, 102 security, 99-100 64-bit platform support, 95 Web services, administering authentication methods, 107 directory security, 106-107 Internet Information Services MMC, 105 methods, 104 Microsoft Office 2003, 1111 Microsoft Operations Manager, 804-805 Microsoft Passport authentication, 1039 Microsoft Risk Management Process (RMP), 127 Microsoft SQL Server, 177-178, 382 Microsoft SQL Server 2000 Bible (Nielsen), 382 Microsoft Transaction Service (MTS), 861 Microsoft Windows Authorization Access Group, 386 Microsoft Windows clients, configuring described, 568-569 DNS options, 569 Microsoft Windows Firewall changes, 195 configuring, 541-544 improvements over ICF, 539-541 managing from console, 545 managing with Group Policy, 544 Microsoft Windows Internet Name Service. See WINS Microsoft Windows NT availability rating, 14 domains, cleaning up old account domains, 146 resource domains, consolidating, 146 service packs, upgrading to,...
To use e-mail to send an RA invitation, you must first have a default mail client configured on the Windows Server 2003 computer. This mail client can be Microsoft Outlook Express, which is installed with Windows, Outlook (installed as a separate application or with Microsoft Office), or a third-party mail application. To create an RA invitation using email, follow these steps
HKEY_CURRENT_USER, abbreviated as HKCU, contains information about the user currently logged on. This key has a pointer to HKEY_USER UserSID, where UserSID is the security identifier for the current user as well as for the default profile discussed previously. Microsoft requires that applications store user-specific preferences under this key. For example, Microsoft Office settings for individual users are stored under this key. Additionally, as discussed previously, HKEY_CURRENT_USER SOFTWARE Classes stores the user-specific settings for file associations.
HKEY_CLASSES_ROOT, abbreviated as HKCR, stores all file associations that tell the computer which document file types are associated with which applications, as well as which action to take for various tasks, such as open, edit, close, or play, based on a specified document type. For example, if you double-click a .doc file, the document typically is opened for editing in Microsoft Office Word. This file association is added to HKCR when you install Microsoft Office. If Microsoft Office isn't installed, a .doc file is opened instead in WordPad because of a default file association created when the operating system is installed.
Once you create a named data stream and associate it with a file, any applications that know how to work with named data streams can access the streams by their name and read the additional details. Many applications support named data streams, including Microsoft Office, Adobe Acrobat, and other productivity applications. This is how you can set summary properties for a Microsoft Word document, such as Title, Subject, and Author, and save that information with the file. In fact, if you were to right-click any file on an NTFS volume and select Properties and then click the Summary tab, you can view or set this same information as shown in Figure 20-4.
One important change I suggest is to associate the .vbs extension with Notepad. This is a good way to avoid viruses that arrive embedded in Microsoft Office macros. Even if your company is using a word processor or spreadsheet program that doesn't present any danger from macro viruses (such as WordPerfect), it's a sure bet that some of your e-mail correspondents are using Microsoft Office and could inadvertently send you a macro virus.
The terminal server role is used in some environments in which multiple users need or desire access to a common work platform utilizing the same consistent applications throughout. For example, an organization that wants to have a centralized installation of the Microsoft Office suite could utilize the capabilities ofTerminal Services by installing the Office applications on the terminal server with appropriate licensing, and they'd have better control over the use and maintenance of the component applications.
The first thing you need to do is to download and install the Custom Installation Wizard if you don't already have it. To download the wizard, go to www.microsoft.com office ork 2000 appndx toolbox.htm and download the ORKTools.exe. Once you've extracted and installed the Office Resource Kit Tools, you can start the Custom Installation Wizard by selecting Start Programs Microsoft Office Tools Microsoft Office 200 Resource Kit Tools Custom Installation Tools.
But Automatic Updates and the server-side Windows Update still had two major faults. First, they provided updates to only the Windows operating system. Users had to visit the Office Updates site to receive patches for Microsoft Office applications, and those patches could not be scheduled or installed without user interaction. There was no mechanism for automatically detecting updates to any other major Microsoft platform, server, or application. The second weakness of Automatic Updates and Windows Updates was that there was not a way to control exactly which updates were applied, leading to a risk that an update would break another system component or application. Administrators wanted a more centralized solution that would assure more direct control over updates that are installed on their clients. Subscription to updates A WSUS administrator subscribes to updates based on category (for example, security updates and service packs), technology (for example, Windows Server 2003,...
It's important to note the distinctions between fragmentation at different levels of data storage. Individual applications, such as Microsoft Office, and database servers, such as Oracle, have fragmentation issues within their own data storage. These issues are present regardless of the file system or operating system.