Atjaunināt sīkdatņu piekrišanu

E-grāmata: Best Damn Exchange, SQL and IIS Book Period

(Senior Microsoft Server Consultant, Copenhagen, Denmark), (A+, Net+, Security+, MCSE+I, MCSD, MCAD, MCDBA, MCTS, MCITP, MCPD, President of Haverford Consultants, Adjunct Professor, Kaplan University, Havertown, PA, USA), (IIS Program M)
  • Formāts: PDF+DRM
  • Izdošanas datums: 31-Aug-2011
  • Izdevniecība: Syngress Media,U.S.
  • Valoda: eng
  • ISBN-13: 9780080556888
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 46,38 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 31-Aug-2011
  • Izdevniecība: Syngress Media,U.S.
  • Valoda: eng
  • ISBN-13: 9780080556888
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management.

The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers.

Key Features:

* All-in-one coverage includes Exchange, SQL, and IIS Servers
* Integrated coverage on all key security features
* Bonus coverage includes analyzing server logs and integrating Communicator 2007

Papildus informācija

Fully integrated coverage of Microsoft's core server products in a single volume
Introducing Exchange Server 2007
1(24)
Introduction
2(1)
What Is Exchange Server 2007?
2(1)
Exchange 2007 Themes
2(1)
IT Pro Situation
2(1)
Info Worker Situation
2(1)
Organizationwide Situation
3(1)
Architectural Goals with Exchange Server 2007
3(1)
Scalability
3(1)
Role-Based Deployment and Server Roles
3(5)
Mailbox Server Role
5(1)
Client Access Server Role
5(1)
Hub Transport Server Role
6(1)
Unified Messaging Server Role
6(1)
Auto Attendant
7(1)
Call Answering
7(1)
Fax Receiving
7(1)
Subscriber Access
7(1)
Edge Transport Server Role
8(1)
New Management Approach
8(7)
EMC Console
8(1)
Console Tree
9(1)
Work Pane
9(1)
Result Pane
9(1)
Action Pane
10(1)
Four New Work Centers
10(1)
Organization Configuration Work Station
10(1)
Exchange Server Best Practices Analyzer
11(1)
Database Recovery Management
12(1)
Database Troubleshooter
12(1)
Mail Flow Troubleshooter
12(1)
Message Tracking
12(1)
Queue Viewer
12(1)
Performance Monitor
12(1)
Performance Troubleshooter
12(1)
New Wizards
12(1)
Exposed CMDlet Code
13(1)
EMS
14(1)
HA Improvements
15(1)
LCR
16(1)
CCR
16(1)
Exchange Server 2007 Services
16(2)
Exchange Server Permissions
18(2)
Exchange Organization Administrators Group
18(1)
Exchange Recipient Administrators Group
18(1)
Exchange Server Administrators
18(1)
Exchange View-Only Administrators Group
19(1)
64-Bit Support Only
20(1)
Active Directory-Based Routing Tiopology
20(1)
De-emphasized Features
21(1)
Discontinued Features
21(3)
Architecture Features
21(1)
Recipient-related Features
22(1)
Mobile Features
22(1)
Outlook Web Access Features
22(1)
Public Folder Features
22(1)
Protocol Features
22(1)
Connector Features
23(1)
HA Features
23(1)
Exchange 5.5-related Features
23(1)
APIs and Development Features
23(1)
Tools and Management Features
23(1)
Summary
24(1)
Installing Exchange Server 2007
25(54)
Introduction
26(1)
Exchange 2007 Server Editions and CAL Types
26(2)
Standard Edition
26(1)
Enterprise Edition
27(1)
Exchange Server 2007 Client Access Licensing
27(1)
Standard CAL
27(1)
Enterprise CAL
27(1)
Exchange 2007 Prerequisites
28(12)
Hardware Requirements
29(1)
Processor
29(1)
Memory
29(1)
Disk Space
29(1)
Drives
30(1)
Software Requirements
30(1)
Operating System
30(1)
File Format
30(1)
Software Required
31(1)
Required Windows Components
31(1)
Mailbox Server
31(1)
Client Access Server
31(1)
Hub Transport Server
32(1)
Edge Transport Server
32(1)
Unified Messaging Server
33(1)
Server Requirements
33(1)
Active Directory Requirements
33(3)
Preparing the Active Directory Schema
36(2)
Preparing the Active Directory
38(1)
Preparing Any Additional Active Directory Domains in a forest
39(1)
Installing Exchange 2007 Using the Setup Wizard
40(13)
Installing Exchange 2007 Using Unattended Setup
53(2)
Verifying the Installation of Exchange Server 2007
55(2)
Licensing an Exchange 2007 Server
57(5)
Finalizing Deployment of Exchange Server 2007
62(2)
Adding and Removing Exchange 2007 Server Roles
64(6)
Uninstalling Exchange Server 2007
70(2)
Summary
72(1)
Solutions Fast Track
72(4)
Frequently Asked Questions
76(3)
Managing Recipients in Exchange 2007
79(76)
Introduction
80(1)
Managing Recipients Using the Exchange 2007 Management Console
80(70)
Managing Mailbox
82(2)
Creating a User Mailbox
84(5)
Manipulating Mailboxes in Exchange 2007
89(2)
Moving a Mailbox
91(5)
Enabling Unified Messaging for a Mailbox
96(13)
Creating a Room or Equipment Mailbox
109(2)
Creating a Linked Mailbox
111(1)
Managing Distribution Groups
112(6)
Creating a New Distribution Group
118(3)
Creating a New Dynamic Distribution Group
121(6)
Managing Mail Contacts and Mail Users
127(2)
Creating a Mail Contact
129(2)
Managing Disconnected Mailboxes
131(5)
Managing Recipients in an Exchange Coexistence Environment
136(1)
Managing Exchange 2000/2003 and 2007 Mailbox-Enabled
User Objects in a Coexistence Environment
136(1)
Managing Exchange 2000/2003 and 2007 Mail-Enabled
Objects in a Coexistence Environment
137(1)
The Recipient Update Service in a Coexistence Environment
137(1)
Granting Access and/or SendAs Permissions to a Mailbox
137(3)
Creating a Custom Recipient Management Console
140(7)
Recipient Filtering in Exchange 2007
147(3)
Summary
150(1)
Solutions Fast Track
150(3)
Frequently Asked Questions
153(2)
Managing the Exchange 2007 Mailbox Server Role
155(82)
Introduction
156(1)
Managing the Exchange 2007 Mailbox Server
156(1)
Exchange 2007 Storage Groups
157(7)
Local and Cluster Continuous Replication
158(1)
Creating a New Storage Group
158(4)
Moving a Storage Group
162(1)
Removing a Storage Group
163(1)
Managing the Exchange 2007 Mailbox Databases
164(8)
Saying Goodbye to the Streaming Media File (.STM)
164(1)
What about Support for Single-Instance Storage?
165(1)
New Size for Transaction Log Files
165(1)
Creating a New Mailbox Database
166(6)
Exchange 2007 Public Folder Databases
172(8)
Creating a New Public Folder Database
172(4)
Creating a Public Folder
176(4)
Administering Public Folder Permission Settings
180(8)
Managing Public Folder Replica Settings
188(1)
Mail-Enabling a Public Folder
188(4)
Moving a Mailbox or Public Folder Database
192(1)
Removing a Mailbox or Public Folder Database
193(1)
Managing Organizationwide Mailbox Server Configuration Settings
194(1)
Address Lists
195(8)
Managed Default Folders
203(6)
Managed Custom Folders
209(3)
Managed Folder Mailbox Policies
212(10)
Offline Address Books
222(4)
Creating a New Offline Address Books
226(6)
Summary
232(1)
Solutions Fast Track
232(3)
Frequently Asked Questions
235(2)
Managing the Client Access Server
237(78)
Introduction
238(1)
Managing the Exchange 2007 Client Access Server
238(1)
The AutoDiscover Service
239(2)
The Availability Service
241(2)
Client Access Servers and the SSL Certificate Dilemma
243(6)
Managing Outlook Anywhere
249(11)
Installing a Third-Party SSL Certificate
249(6)
Adding the RPC over HTTP Proxy Component
255(1)
Enabling Outlook Anywhere
256(2)
Configuring the Outlook Client
258(2)
Managing Outlook Web Access 2007
260(26)
Configuring Outlook Web Access Server-Side
261(9)
Outlook Web Access Client-Side Features
270(4)
Mailbox Limit Notification
274(1)
Open Other Mailbox
274(1)
View Message Header
275(1)
Creating Multiple Calendars
276(1)
Meeting and Appointment Reminders
276(1)
Change Password Option
277(1)
Direct Link Access
278(1)
Compose Messages in HTML
279(1)
Junk E-Mail Lists
279(1)
Improved signature Editor
279(1)
WebReady Document Viewing Feature (Open as Webpage)
280(1)
Mark All as Read
281(1)
Simplifying the URL to Outlook Web Access
282(4)
Managing Exchange ActiveSync
286(17)
Configuring the Exchange ActiveSync Virtual Directory
290(3)
Configuring ActiveSync Policies
293(5)
Assigning an Exchange ActiveSync Policy to a User
298(2)
Managing Mobile Devices
300(3)
Managing POP3/IMAP4
303(5)
Enabling the POP3 and IMAP4 Services
304(2)
Configuring the POP3 or IMAP4 Services
306(1)
Limiting Access to the POP3 and IMAP4 Service
306(2)
Summary
308(1)
Solutions Fast Track
308(4)
Frequently Asked Questions
312(3)
Managing the Hub Transport Server Role
315(62)
Introduction
316(1)
Message Transport and Routing Architecture in Exchange 2007
316(2)
Managing the Hub Transport Server
318(38)
Remote Domains
318(4)
Creating a New Remote Domains Entry
322(2)
Accepted Domains
324(1)
Creating a New Accepted Domain
325(2)
E-mail Address Policies
327(2)
Creating a New E-mail Address Policy
329(5)
Transport Rules
334(5)
Journaling
339(2)
Send Connectors
341(7)
Configuring DNS Lookups
348(1)
Configuring Outbound Message Limits
349(1)
Receive Connectors
350(1)
Creating a Receive Connector
351(3)
Managing Message Size and Recipient Limits
354(1)
Configuring Global Limits
354(1)
Configuring Server Limits
355(1)
Configuring Connector Limits
355(1)
Send Connectors
355(1)
Receive Connectors
355(1)
Configuring Per-User Limits
356(1)
Message Tracking with Exchange Server 2007
356(3)
Using the Exchange 2007 Queue Viewer
359(3)
Submission Queue
359(1)
Mailbox Delivery Queue
359(1)
Remote Delivery Queue
359(1)
Poison Message Queue
360(1)
Unreachable Queue
360(2)
Introduction to the Exchange Mail Flow Troubleshooter Tool
362(1)
Configuring the Hub Transport Server as an Internet-Facing Transport Server
363(8)
Changing the SMTP Banner
367(1)
Disabling the EdgeSync Service
368(1)
Pointing the MX Record to the Hub Transport Server
369(1)
Missed Features
370(1)
Attachment Filter
370(1)
Address Rewrite Agent
370(1)
Summary
371(1)
Solutions Fast Track
371(4)
Frequently Asked Questions
375(2)
Managing the Edge Transport Server
377(96)
Introduction
378(1)
Deploying the Edge Transport Server Role
378(4)
Prerequisites
380(1)
Creating a DNS Suffix
380(2)
Enabling Name Resolution Lookups between the Edge Transport and Hub Transport Servers Suffix
382(5)
Configuring DNS Settings
386(1)
Installing the ADAM Component
387(12)
Installing .NET Framework 2.0 and Windows PowerShell
389(1)
Saying Goodbye to the Windows SMTP and NNTP Protocol Stacks
389(1)
Installing the Edge Transport Server Role
389(3)
Verifying Deployment
392(1)
Creating a Importing an Edge Subscription File
392(7)
Verifying That the EdgeSynch Service Works As Expected
399(3)
Creating a Postmaster Mailbox
400(2)
Manually Configuring the Required Connectors
402(50)
Manually Configuring Accepted Domains
408(2)
Configuring and Managing the Antispam Filtering Agents
410(2)
Connection Filtering
412(5)
Sender Filtering
417(1)
Recipient Filtering
418(3)
Sender ID Filtering
421(4)
Content Filtering
425(3)
Safelist Aggregation
428(3)
Outlook E-mail Postmark Validation
431(1)
Attachment Filtering
432(5)
Sender Reputation
437(4)
Antivirus Scanning
441(1)
Outlook JunkE-Mail Filtering
442(1)
Securing the Edge Server Using the Windows 2003
Security Configuration Wizard (SCW)
442(10)
Pointing Your MX Records to the Edge Transport Server
452(1)
Deploying Multiple Edge Transport Servers in the Organization
453(16)
The Edge Transport Rules Agent
455(6)
Creating Transport Rule
461(5)
The Address Rewrite Agent
466(2)
Monitoring the Edge Transport Server
468(1)
Summary
469(1)
Solutions Fast Track
469(3)
Frequently Asked Questions
472(1)
High Availability for Exchange 2007 Mailbox Servers
473(100)
Introduction
474(1)
Managing the Local Continuous Replication Feature
475(29)
Local Continuous Replication under the Hood
475(2)
Enabling Local Continuous Replication on a Storage Group
477(6)
Viewing the Status for a Local Continuous Replication Copy
483(3)
Switching to the Passive Storage Group Copy When Disaster Strikes
486(5)
Suspending Local Continuous Replication
491(2)
Resuming Local Continuous Replication
493(1)
Manually Seeding a Database Copy
494(1)
Performing an Integrity Check of the Passive Copy Using Eseutil
495(3)
Disabling Local Continuous Replication on a Storage Group
498(2)
Local Continuous Replication Performance Objects and Counters
500(4)
Managing a Cluster Continuous Replication-Based Setup
504(48)
Prerquisites
505(2)
Configuring the Network Interface for Each Node
507(5)
Adding the Servers to the Active Directory Domain
512(2)
Creating a Cluster Service Account
514(3)
Creating and Configuring the Windows 2003 Server Cluster
517(15)
Installing the Necessary Windows Components
532(1)
Configuring the Majority Node Set Quorum with File Share Witness
533(7)
Configuring the Transport Dumpster
540(1)
Installing Exchange 2007 on the Active Node
541(5)
Installing Exchange 2007 on the Passive Node
546(1)
Testing the Functionality of the Clustered Mailbox Server
547(2)
Viewing the Clustered Mailbox Server From Within the Exchange Management Console
549(1)
Simulating a Failover from One Node to the Other
549(2)
Backup Choices in a CCR Setup
551(1)
Managing a Single Copy Cluster-Based Setup
552(16)
Prerequisites
553(1)
Configuring the Network Settings for each Network Interface
554(1)
Creating the Shared Cluster Disks
554(5)
Creating the Windows Server 2003 cluster
559(3)
Installing the Necessary Windows Components
562(1)
Installing Exchange Server 2007 on the Active Node
563(2)
Testing the Functionality of the Single Copy Cluster
565(3)
Summary
568(1)
Solutions Fast Track
568(3)
Frequently Asked Questions
571(2)
Disaster Recovery with Exchange Server 2007
573(50)
Introduction
574(1)
Backing Up Exchange 2007 Using Windows 2003 Backup
574(9)
Backing Up an Exchange 2007 Mailbox Server
574(4)
Backing Up an Exchange 2007 Hub Transport Server
578(1)
Backing Up an Exchange 2007 Client Access Server
579(3)
Backing Up an Exchange 2007 Unified Messaging Server
582(1)
Backing Up an Exchange 2007 Edge Transport Server
583(1)
Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup
583(1)
Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil
583(25)
Restoring Mailbox Data Using the Recovery Storage Group Feature
594(1)
Managing Recovery Storage Groups Using the Exchange Troubleshooting Assistant
595(10)
Managing Recovery Storage Groups Using the Exchange Management Shell
605(3)
Recovering an Exchange 2007 Server Using the RecoverServer Switch
608(4)
Restoring a Configuring the Operating System
609(1)
Installing Exchange 2007 Using the RecoverServer Switch
610(2)
Recovering an Exchange 2007 Cluster Using the RecoverCMS Switch
612(5)
Restoring Mailbox Databases Using the Improved Database Portability Feature
614(3)
Summary
617(1)
Solutions Fast Track
617(4)
Frequently Asked Questions
621(2)
Transitioning from Exchange 2000 or 2003 to Exchange 2007
623(38)
Introduction
624(1)
Preparing the Environment for a Transition to Exchange Server 2007
624(13)
Preparing the Active Directory Forest
624(2)
Preparing the Legacy Exchange Organization
626(3)
Suppressing Link State Updates
629(1)
Extending the Active Directory
630(1)
Prepare Legacy Exchange Permissions
630(1)
Prepare Schema
631(1)
Prepare AD
632(2)
Prepare Domain and Prepare ALLDomains
634(1)
Preparing the Exchange 2007 Server
635(2)
Exchange 2003 and Exchange 2007 Coexistence
637(1)
Replicating Public Folders to Exchange 2007
638(4)
Pointing Internet Clients to the Client Access Server
642(1)
Moving Legacy Mailboxes to Exchange 2007
643(3)
Redirecting Inbound Mail to the Exchange 2007
646(3)
Decommissioning the Legacy Exchange Server
649(6)
Summary
655(1)
Solutions Fast Track
655(3)
Frequently Asked Questions
658(3)
Introduction to Exchange Server 2007 Unified Messaging
661(16)
Introduction
662(1)
What Is Exchange 2007 Unified Messaging?
662(2)
Exchange 2007 Unified Messaging Features
664(3)
Call Answering
664(1)
Fax Receiving
665(1)
Outlook Voice Access
665(2)
The Unified Messaging Infrastructure
667(4)
The Unified Messaging Mailbox Policies
671(3)
Summary
674(1)
Solutions Fast Track
674(1)
Frequently Asked Questions
675(2)
Getting Started with IIS 7.0
677(30)
Introduction
678(1)
Inside the Changes in IIS 7.0
678(14)
Installing IIS 6.0
679(2)
Installing IIS 6.0 via the User Interface
681(1)
Installing IIS 6.0 Using Unattended Installation
682(2)
IIS 6.0 Core Server
684(1)
HTTP.sys
684(1)
Worker Processes
685(1)
Web Service Administration and Monitoring
686(1)
Inetinfo.exe
687(1)
Where the Metabase Took Us ... and Fell Short
687(2)
Administration: A Review
689(1)
Troubleshooting Failed Requests with IIS 6.0
690(2)
IIS 6.0 versus IIS 7.0: The Delta
692(11)
Modular Core Server
692(3)
Delegation: Less Is Often Better
695(1)
Improved User Interface for Users, Partners, and Microsoft
696(1)
WMI with Logical Layout, Strong Support for PowerShell
697(3)
AppCmd: Swiss Army Knife for IIS Administrators and Developers
700(1)
Diagnostics 101
700(1)
Runtime State and Control API (RSCA)
701(1)
FREB
701(2)
Summary
703(1)
Solutions Fast Track
703(2)
Frequently Asked Questions
705(2)
Installation of IIS 7.0
707(40)
Introduction
708(1)
Install Types Available in IIS 7.0
708(25)
Vista's Programs and Features
709(5)
Longhorn's Server Manager
714(11)
Installing with PKGMGR.EXE
725(3)
Unattended Installation
728(5)
Installation Feature Sets
733(5)
The FTP Publishing Service
734(1)
Web Management Tools
735(2)
World Wide Web Services
737(1)
IIS 7.0 Modules
738(6)
The Runtime Core ``Bits''
739(1)
Application Development Features
740(1)
Common HTTP Features
741(1)
Health and Diagnostics
742(1)
Performance Features
742(1)
Security
743(1)
Summary
744(1)
Solutions Fast Track
744(2)
Frequently Asked Questions
746(1)
The Extensible Core Server
747(28)
Introduction
748(1)
Understanding Development Advantages inIIS 7.0
748(3)
Inside the Unified Pipeline
749(2)
Extending IIS 7.0 with Native (C\C++) Modules
751(12)
Building Native Modules
751(4)
Adding Native Modules to IIS 7.0
755(1)
Using APPCMD.exe To Deploy Native Modules
756(2)
Deploying Native Modules with IIS Manager
758(5)
Manually Installing a Native Module
763(1)
Enabling Managed Code (ASP.NET) in IIS 7.0
763(9)
iHttpModule Interface Support
764(6)
Integrated Mode
770(1)
Classic Mode
771(1)
Summary
772(1)
Solutions Fast Track
772(2)
Frequently Asked Questions
774(1)
Get Started with IIS 7.0's Configuration
775(32)
Introduction
776(1)
Introducing ApplicationHost.config
776(17)
XML 101: The Basics of Configuration in IIS 7.0
778(6)
The System ApplicationHost Section Group Purpose
784(2)
Understanding system.webserver
786(3)
The IIS Schema: Your Cheat Sheet for Success
789(1)
What Is a Schema?
790(1)
How to Read the Schema
790(1)
Section Schema
790(1)
Attribute Schema
790(2)
Element Schema
792(1)
Collection Schema
792(1)
Enum Schema
792(1)
Flags Schema
792(1)
Enabling Delegated Administration in IIS 7.0
793(11)
Delegation Basics
793(1)
How It Works
794(1)
Unlocking system.webServer Section Groups
794(1)
Section and Attribute locking in IIS 7.0
795(1)
Unlocking Configuration Sections
796(8)
Summary
804(1)
Solutions Fast Track
804(1)
Frequently Asked Questions
805(2)
Administration of an IIS 7.0 Web Server
807(42)
Introduction
808(1)
Accomplishing Tasks Using IIS Manager
808(15)
IIS Manager: Getting Started
809(1)
The IIS Manager Overview
809(4)
Adding Connections
813(1)
Sorting IIS Manager
814(1)
Accomplishing the Most Common Tasks Using IIS Manager
815(1)
Creating Web Sites
816(1)
Creating Virtual Directories
816(1)
Creating Applications
817(1)
Creating Application Pools
817(1)
Changing Authentication Settings
818(1)
Authenticationin IIS 7.0
819(1)
Enabling Basic Authentication
819(1)
Enabling Windows Authentication
820(1)
Enabling Digest Authentication
820(1)
Enabling Forms Authentication
820(1)
Viewing Worker Process Details
820(1)
Changing Diagnostic Settings
821(1)
Selecting Rules for Failed Request Tracing
821(2)
Accessing Information Using AppCmd.exe
823(9)
An Introduction to App Cmd. exe
824(1)
Server Management Objects and Commands
825(1)
Creating Web Sites
826(1)
Creating Virtual Directories
826(1)
Creating Application Pools
826(1)
Managing Backups
827(1)
Creating a Backup
828(1)
Managing Existing Backups
828(1)
Making Configuration Changes with AppCmd.exe
828(1)
Modifying Sections Using AppCmd.exe
828(2)
Modifying Attributes Using AppCmd.exe
830(1)
Moving ASP.NET 2.0 Applications to IIS 7.0 Using AppCmd
831(1)
Viewing IIS 7.0 Runtime Data Using AppCmd
831(1)
Viewing Currently Executing Requests with AppCmd
831(1)
Configuring and using Trace Log Data with AppCmd
832(1)
Enabling or Disabling Failed Request Tracing
832(1)
Viewing Trace Log Files Using AppCmd
832(1)
Writing Scripts Using the New WMI Provider
833(3)
Getting Started with WMI
833(1)
Starting Fresh withWMI in IIS 7.0
833(1)
Creating Web Sites Using WMI
834(1)
Creating Virtual Directories Using WMI
834(1)
Using WMI to Create Application Pools
834(1)
Setting Authentication Using WMI
835(1)
Enabling Failed Request Tracing Using WMI
835(1)
Managed Code Administration: Inside Microsoft. Web. Administration
836(9)
The Microsoft.Web.Administration Object Model
836(1)
Getting Started with MWA
837(1)
Using C# Express to Create a Console Application
837(2)
Accessing Runtime Information with MWA
839(1)
Creating a Web Site Using MWA
839(2)
Creating Virtual Directories Using MWA
841(1)
Adding Application Pools Using MWA
841(2)
Changing the Authentication Type for a Web Site Using MWA
843(1)
Viewing Currently Executing Requests Using MWA
844(1)
Summary
845(1)
Solutions Fast Track
845(2)
Frequently Asked Questions
847(2)
Troubleshooting 101: Diagnostics in IIS 7.0
849(42)
Introduction
850(1)
Using IIS 7.0's Custom Detailed Errors
850(15)
Configuring Custom Error Messages Using IIS Manager
850(2)
Configuring Custom Error Messages Using IIS Manager
852(2)
>httpErrors< Configuration
854(4)
Overriding for a Site
858(2)
Understanding and Reading Custom Error Messages in IIS 7.0
860(1)
Delegating Custom Errors
861(1)
Custom Error Module
862(3)
Inside IIS 7.0's Failed Request Tracing
865(9)
Failed Request Tracing Architecture
865(1)
Configuring IIS 7.0's Failed Request Tracing
865(1)
Enable Tracing for IIS 7.0
866(1)
Using IIS Manager
867(1)
Centralized Tracing for ASP.NET and IIS 7.0
867(6)
Modify the XML
873(1)
Breakpoints: Extending IIS 7.0's Tracing
874(7)
How Developers Extend Their Module to Support
Failed Request Tracing
874(2)
Create and Compile
876(2)
Add Managed Module to IIS 7.0
878(1)
Enabling Trace
879(2)
Reality: Inside What Tracing Can't Do in IIS 7.0
881(8)
Identifying That You Have a Memory Leak
882(1)
Downloading Debug Diagnostics and Enable Leak Tracker
883(1)
Capturing Memory Links
884(5)
Summary
889(1)
Solutions Fast Track
889(1)
Frequently Asked Questions
890(1)
Putting It All Together
891(20)
Introduction
892(1)
Migrating to IIS 7.0
892(14)
Migration Considerations
892(1)
Upgrading Paths by OS Version
893(1)
Upgrade versus Clean Install
894(1)
Upgrade Steps
894(1)
Detect and Gather
894(1)
Image Copy and Unpacking
894(2)
Restore Settings
896(1)
After the Upgrade
896(1)
Fitting and Finishing Work in IIS 7.0
896(1)
Using Tracing to Isolate Your Server Features
897(2)
Static HTML Requests
899(1)
Classic ASP Requests
900(2)
ISAPI-based Extension Requests
902(1)
ASP.NET Requests
903(2)
Centralizing Your Log File to Reduce Clutter
905(1)
Getting a Backup of Your Configuration
906(1)
The Developer's Call to Arms
906(2)
Downloading the Native C\C++ Starter Kit
907(1)
Downloading the Managed Code Starter Kit
907(1)
Building IIS Manager Extensions for Your Modules
907(1)
Adding Tracing to Your Modules
907(1)
Summary
908(1)
Solutions Fast Track
908(1)
Frequently Asked Questions
909(2)
Introduction to SQL Server Security
911(18)
Introduction
912(1)
Multifaceted SQL Server Security
912(1)
Security: Why Worry About It?
912(1)
The Principle of Least Access
913(1)
Installing SQL Server
913(9)
Features off by Default
916(1)
Services off by Default
917(3)
Microsoft's Baseline Security Analyzer
920(2)
Building Security into Your Application
922(1)
Managed Code
923(1)
Summary
924(1)
Solutions Fast Track
924(2)
Frequently Asked Questions
926(3)
Surface Area Reduction
929(22)
Introduction
930(1)
SQL Server Surface Area
930(18)
What Is Surface Area?
930(1)
The Surface Area Configuration Tool
931(1)
The Surface Area Configuration Tool GUI
931(4)
The Surface Area Configuration for Services and Connections
935(3)
Database Engine Service
938(1)
Database Engine Remote Connections
938(1)
Analysis Services Remote Connections
938(1)
Analysis Services Remote Connections
938(1)
Reporting Services Service
938(1)
SQL Server Agent Service
939(1)
Full-Text Search Service
939(1)
Notification Services Instance Services
939(1)
Integration Services Service
939(1)
SQL Server Browser Service
939(1)
The Surface Area Configuration for Features
940(1)
Surface Area Configuration---Features
941(1)
The Surface Area Configuration Tool Command Line Utility
942(2)
Practical Applications for the Surface Area Configuration Tool
944(1)
Scenario 1
945(1)
Scenario 2: Auditing an Existing Installation
946(1)
Scenario 3: Fixing an Issue
946(2)
Summary
948(1)
Solutions Fast Track
948(1)
Frequently Asked Questions
949(2)
Roles
951(16)
Introduction
952(1)
Roles
952(10)
Using Roles
952(1)
Role Types
953(1)
User-Defined Standard Roles
953(1)
User-Defined Application Roles
954(1)
Predefined Database Roles
954(3)
Fixed Server Roles
957(1)
Administering Roles
958(4)
Situational Examples
962(2)
Summary
964(1)
Solutions Fast Track
964(2)
Frequently Asked Questions
966(1)
Authentication and Granular Access
967(32)
Introduction
968(1)
Understanding the SQL Server Authentication Modes
968(4)
Changing the Authentication Mode
970(1)
Finding the Authentication Mode by Using xp_loginconfig
971(1)
Finding the Authentication Mode in the Registry
971(1)
Endpoint Security
972(8)
Endpoint Authentication Types
974(1)
HTTP Endpoints
974(1)
Basic Authentication
974(1)
Digest Authentication
975(1)
NTLM Authentication
975(1)
Kerberos Authentication
976(1)
Integrated Authentication
976(1)
TCP Endpoints
977(1)
Negotiate Authentication
978(1)
Certificate Authentication
978(1)
Dedicated Administrator Connection
979(1)
Configuring Kerberos Support for Your SQL Server
980(5)
Basic Concepts of Kerberos Support
981(1)
SQL Server Service Account
981(1)
SQL Server TCP Port
982(1)
The SETSPN.EXE Utility
983(1)
Configuring Kerberos for an HTTP Endpoint
984(1)
Configuring Kerberos for a TCP Endpoint
984(1)
Extra Steps with Clustered Instances of SQL Server
985(1)
Auditing Authentication Attempts
985(1)
Understanding Granular Access
986(9)
Principals
987(1)
Securables
987(1)
Permissions
988(1)
CONTROL
989(1)
ALTER
989(1)
ALTER ANY
990(1)
TAKE OWNERSHIP
990(1)
IMPERSONATE
990(1)
CREATE
990(1)
VIEW DEFINITION
991(1)
BACKUP
991(1)
RESTORE
991(1)
Managing Granular Access
991(1)
Understanding Implied Permissions
992(1)
Assigning Permissions
992(3)
Summary
995(1)
Solutions Fast Track
995(2)
Frequently Asked Questions
997(2)
Schemas
999(42)
Introduction
1000(1)
Understanding Schemas
1000(8)
The Schema as a Container
1000(2)
Schemas in Previous SQL Server Versions
1002(1)
Problems That Arise
1003(2)
What about Your Security Perimeters?
1005(1)
Schemas in SQL Server 2005
1006(1)
Built-in Schemas
1006(2)
Changes Due to the User-Schema Separation
1008(4)
New Flexibility with Ownership
1008(1)
Using Default Schemas
1008(1)
Changes to the Functionality of Familiar Concepts
1009(1)
Ownership Chaining
1009(1)
Checking Permissions in an Ownership Chain
1009(2)
Ownership Chains Gain Complexity in SQL Server 2005
1011(1)
Upgrading Existing Servers to SQL Server 2005
1011(1)
Designing Schemas
1012(2)
Designing the Namespace
1012(1)
Designing Schemas for Security
1013(1)
Considering Security throughout the System Development Life Cycle
1013(1)
Are You Rewriting Your SDLC Due to This New SQL Server Release Then?
1013(1)
Managing Schemas
1014(22)
Viewing Schema Information
1015(1)
Using SQL Server Management Studio
1016(1)
using T-SQL
1016(4)
Creating a Schema
1020(1)
Using SQL Server Management Studio
1020(4)
Using T-SQL
1024(1)
Moving Objects
1025(1)
Using SQL Server Management Studio
1025(2)
Using T-SQL
1027(1)
Dropping Schemas
1027(1)
Using SQL Server Management Studio
1028(1)
Using T-SQL
1029(1)
Changing Ownership
1029(1)
Using SQL Server Management Studio
1030(1)
Using T-SQL
1030(1)
Setting Permissions on Schemas
1031(1)
Using SQL Server Management Studio
1032(2)
Using T-SQL
1034(1)
Setting the Default Schema for a User
1034(1)
Using SQL Server Management Studio
1035(1)
Using T-SQL
1035(1)
Summary
1036(1)
Solutions Fast Track
1036(2)
Frequently Asked Questions
1038(3)
Password Policies
1041(28)
Introduction
1042(1)
Password Policies in SQL Server 2005
1042(13)
Password Policies Explained
1042(1)
Using the Group Policies Console
1042(5)
Password Policies
1047(4)
Account Lockout Policies
1051(1)
Why Use Password Policies?
1052(1)
Operating System Requirements
1053(1)
Using Password Policies
1053(2)
SQL Server Scenarios
1055(12)
Scenario 1
1055(1)
The Solution
1055(1)
An Example
1055(2)
Scenario 2
1057(1)
The Solution
1057(2)
Scenario 3
1059(1)
The Solution
1059(8)
Summary
1067(1)
Solutions Fast Track
1067(1)
Frequently Asked Questions
1068(1)
DDL Triggers
1069(30)
Introduction
1070(1)
DDL Triggers Explained
1070(4)
Techniques in Older Versions of SQL Server
1071(1)
Using SCHEMABINDING
1071(1)
DDL Triggers Scope and Permissions
1072(1)
Events and Event Groups
1072(1)
DDL Triggers and Temporary Objects
1073(1)
Multiple DDL Triggers
1073(1)
Differences from DML Triggers
1074(1)
Using CLR for DDL Triggers
1074(1)
Implementing DDL Triggers
1074(9)
Basic Syntax
1074(2)
DDL Triggers Options
1076(1)
ENCRYPTION
1076(1)
EXECUTE AS
1077(1)
Getting Event Information
1077(1)
Using XQuery
1078(1)
Important Techniques for DDL Triggers
1078(1)
Rolling Back a DDL Statements
1079(1)
Auditing DDL Statements
1079(2)
Sending an E-mail Alert
1081(2)
Managing DDL Triggers
1083(3)
Impact of DDL Triggers on System Stored Procedures and SSMS
1083(1)
Enabling and Disabling DDL Triggers
1083(1)
Enabling and Disabling All the DDL Triggers of a Given Scope
1084(1)
Getting Metadata on DDL Triggers
1085(1)
Scenarios for Deploying DDL Triggers
1086(8)
Preventing Endpoint Creation
1086(1)
Preventing Database Ownership Changes
1087(1)
Preventing DDL Changes to Objects
1087(1)
Preventing DDL Changes Except During a Maintenance Window
1088(1)
Auditing Changes to Specific/Deletion
1089(2)
Auditing Changes to Specific Logins
1091(1)
Auditing User Creation/Deletion
1092(2)
Summary
1094(1)
Solutions Fast Track
1094(2)
Frequently Asked Questions
1096(3)
Data Encryption
1099(38)
Introduction
1100(1)
Data Encryption Explained
1100(34)
Why Secure Data?
1102(1)
Performing Encryption
1103(1)
EFS Encryption
1103(1)
Working with EFS Encrypted Data
1104(1)
Hierarchal Encryption
1104(5)
Using Keys to Encryption Data
1109(1)
Symmetric Key Encryption
1109(7)
Asymmetric Encryption
1116(5)
Using Certificates to Encrypt Data
1121(5)
Using Pass Phrases to Encrypt Data
1126(1)
Encrypting Stored Procedures, Functions, Views, and Triggers
1127(2)
Working with Data Encrypted by Native SQL Server 2005 Encryption
1129(1)
Indexing Encrypted Data
1129(1)
Replicating Encrypted Data
1129(1)
Symmetric Key Usage Tracking
1129(1)
Replicating Encrypted Stored Procedures, Views, Functions and Triggers
1130(1)
Using Endpoint Encryption
1130(1)
Service Broker
1130(1)
Transport Level Encryption
1130(1)
Dialog Encryption
1131(1)
Mirroring
1132(1)
HTTP
1132(1)
Third-Party Encryption
1133(1)
Summary
1134(1)
Solutions Fast Track
1134(1)
Frequently Asked Questions
1135(2)
Reporting Services, Analysis Services, and Integration Services
1137(36)
Introduction
1138(1)
General SQL Server Best Security Practices
1138(1)
Securing Reporting Services
1139(22)
Architecture
1140(1)
Role-Based Security
1140(2)
Report Management
1142(3)
SSL Data Encryption
1145(1)
Administration
1146(1)
Managing Service Accounts
1146(1)
Default Accounts and Initial Configuration
1146(2)
Setting Up Data Sources
1148(1)
Providing Credentials for Data Sources
1148(2)
Making Connections
1150(1)
Installing Reporting Services
1151(1)
Procedure to Install and Configure Reporting Services Using Default Security
1151(4)
Using SQL Server 2005 Management Studio
1155(1)
Performing Common Tasks Using SQL Server 2005
Management Studio
1155(1)
Create a Role Assignment Using Management Studio
1156(1)
Delete A Role Assignment Using Managemetn Studio
1156(1)
Modify a Role Assignment Using Management Studio
1156(1)
Using the Report Server Web Service
1157(1)
Example Code: Programmatic Report Deployment and Setting Policies
1157(2)
Impersonating Users
1159(1)
Filtering Data
1159(1)
Hiding Data
1159(1)
Securing Reporting Services in SharePoint Integrated Mode
1160(1)
SSL Requirements
1160(1)
Securing Analysis Services
1161(4)
Architecture
1161(1)
Understanding the Security Architecture of Analysis Services
1162(1)
Supporting Unauthenticated Clients
1162(1)
Modifying Encryption Settings
1162(1)
Configuring the Logon Account
1162(1)
Selecting an Appropriate Logon Account
1163(1)
Securing an Instance OF Analysis Service
1163(1)
Configuring Access
1164(1)
Securing Integration Services
1165(4)
Architectures
1165(1)
Protecting Packages
1165(1)
Database Roles
1166(1)
Storing Packages
1166(1)
Package Configurations
1167(1)
Integration Services Folders
1168(1)
Package Files
1168(1)
Digital Signatures
1168(1)
Signing a Package with a Digital Signature
1168(1)
Summary
1169(1)
Solutions Fast Track
1169(2)
Frequently Asked Questions
1171(2)
Index 1173
Henrik Walther is a Senior Microsoft Server Consultant working for an IT outsourcing services company in Copenhagen, Denmark. Henrik has over 10 years of experience in the industry. He specializes in migrating, implementing, and supporting Microsoft Windows Active Directory and Microsoft Exchange environments.Henrik is a Microsoft Exchange MVP (Most Valuable Professional). He runs thewww.exchange-faq.dk website and writes Exchange-related articles for both www.msexchange.org and www.outlookexchange.com. He also spends time helping his peers in the Exchange community via forums, newsgroups, and mailing lists. Mark Horninger , A+, Net+, Security+, MCSE+I, MCSD, MCAD,MCDBA, MCTS, MCITP, MCPD is President and founder of Haverford Consultants Inc.( http://www.haverford-consultants.com/ ), located in the suburbs of Philadelphia, PA. He develops custom applications and system engineering solutions, specializing primarily in Microsoft operating systems and Microsoft BackOffice products. He is also an adjunct professor at Kaplan University in the Web department. He has over 15 years of computer consulting experience and has passed 50+ Microsoft Certified Exams. During his career Mark has worked on many extensive and diverse projects including database development, application development, training, embedded systems development and Windows NT and 200x project rollout planning and implementations. Mark lives with his wife Debbie and two children in Havertown, PA. He is the author of Configuring and Troubleshooting Windows XP Professional MCSE Windows 2000 Professional Study Guide and Designing SQL Server 2000 Databases for .NET Enterprise Servers. Chris Adams is IIS Program Manager for Microsoft. Chris spends his time building and reviewing technical content for IIS, working with IIS Most Valuable Professionals (MVP), and spear-heading programs to best reach customers for the IIS team. Chris was formally a Microsoft Product Support Services (PSS) engineer, technical lead, and supportability lead for the IIS product and has deep, technical experience in the usage and functionality of IIS 4.0, 5.0, 5.1, 6.0, and 7.0. Chris is currently Microsoft certified as a MCP, MCSA, and MCSE.