Figure Reinstating the default inherited permissions

Adv-anced Security Settings for My Private Stuff Pernms-iioriv Editing Ownei EHective P-erimiiiiani T viev.1 rno e riicwnatian -at01 it Special pErmissinns, select a pemission efitiy, and Ihen ckck Ed . rj Nihil i frtm p-aierit the ptHROII entries that apply lo chid objects. Include tlieie wih entries eupbciily defiled here. V Replace permission entnei on ill child objects witti entries shown bae that appty to cNd objects 6. Click OK twice to close the dialog boxes. When Wally logs on the next...

Recovering Files

When you encrypt files to protect them from prying eyes, you run the risk of protecting them from yourself and ultimately losing the data. EFS requires the user's private key (associated with the user's EFS public-key certificate) to decrypt a file. As long as this key is available, EFS-protected files are accessed just like a normal file. In the event of key loss, however, a secondary means of retrieving the data is necessary. Another kind of key loss occurs with the voluntary or involuntary...

Encrypting Sensitive Data

It's deceptively simple to encrypt and decrypt files in Windows Small Business Server 2003. Of course, anything that's sensitive enough to be encrypted should be treated very carefully, so take time to plan before implementing file and folder encryption. You need to have a clear and well-understood recovery policy, as described in this section, to prevent irreversible data loss. Make sure also that your vendors for any affected line of business applications will fully support encryption....

Server general properties

Configure multiple identities for this virtual server. Address Configure multiple identities for this virtual server. Address 5. Highlight the IP address to configure (the default is All Unassigned) and click Edit to open the Identification dialog box, shown in Figure 14-43. Figure 14-43. Choosing the filtering options to enable on the Default Figure 14-43. Choosing the filtering options to enable on the Default 6. Check the boxes for each type of filtering you want enable on your SBS server,...

The Search for Disaster Protection

Traditionally, large businesses have used a variety of techniques to ensure that files stored on a server were both secure and safe. These solutions tend to be expensive, but, when spread across all the supported workstations and buried in a large MIS budget, they are feasible. The same solutions would not be feasible or acceptable in most small businesses, but that doesn't change our very real need to protect ourselves from disaster. Fortunately, there are both hardware and software solutions...

Real World WPA and WPA Authentication

The initial security method for wireless authentication was Wired Equivalent Privacy (WEP). Unfortunately, WEP has been shown to be woefully insecure, and can no longer be considered adequate protection for even the most casual users. The initial replacement for WEP was WiFi Protected Access (WPA), which is now being superseded by WPA2. WPA2 is also known as Institute of Electrical and Electronics Engineers (IEEE) 802.11i. To use WPA for wireless authentication, clients must run Windows Server...

Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z SAN See Storage Area Network (SAN). SAS See Serially Attached SCSI (SAS). SATA See Serial ATA (SATA). SATA controller driver SATA RAID Satellite Save Items As Template link Schedule dialog box Scheduled Tasks folder Schema master SCIS See Small Computer System (or Serial) Interface (SCSI). SCL See Spam confidence level (SCL). Scope page Screening files controlling types of files on SBS Server create file screens file screens are flexible...

Choosing the Storage Solution for Your Network

The first decision you need to make when planning your storage solution for Windows Small Business Server is really made when you specify your main server. If your budget can afford it, you should definitely consider choosing a hardware RAID solution that lets you add disks on the fly and reconfigure the array without powering down the server or rebooting. This is absolutely the best and most flexible storage solution for protecting your data, and could take the form of hot-swappable SCSI hard...

Figure Specifying regional options

On the Personalize Your Software page, type the name and organization under which the computer should be registered. 11. On the Your Product Key page, type the product key from the Windows Small Business Server 2003 packaging, and then click Next. 12. On the Computer Name And Administrator Password page, type the name for the computer in the Computer Name text box.

Using Smigrate

Stsadm.exe is good, and it does restore all the security settings during the backup. Smigrate.exe is much more flexible, allowing you to restore to a different computer entirely, which makes Smigrate.exe an excellent tool for using one SharePoint Web site as a template for additional sites. The one thing Smigrate.exe doesn't do, however, is restore all of the security settings for a site, so if you've customized those, you'll need to go back and make any necessary changes. The beauty of using...