Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

How to cheat at managing windows small business server 2003
PREMIUM
Số trang
497
Kích thước
7.9 MB
Định dạng
PDF
Lượt xem
1800

How to cheat at managing windows small business server 2003

Nội dung xem thử

Mô tả chi tiết

[email protected]

Over the last few years, Syngress has published many best-selling and

critically acclaimed books, including Tom Shinder’s Configuring ISA

Server 2000, Brian Caswell and Jay Beale’s Snort 2.0 Intrusion

Detection, and Angela Orebaugh and Gilbert Ramirez’s Ethereal

Packet Sniffing. One of the reasons for the success of these books has

been our unique [email protected] program. Through this

site, we’ve been able to provide readers a real time extension to the

printed book.

As a registered owner of this book, you will qualify for free access to

our members-only [email protected] program. Once you have

registered, you will enjoy several benefits, including:

■ Four downloadable e-booklets on topics related to the book.

Each booklet is approximately 20-30 pages in Adobe PDF

format. They have been selected by our editors from other

best-selling Syngress books as providing topic coverage that

is directly related to the coverage in this book.

■ A comprehensive FAQ page that consolidates all of the key

points of this book into an easy to search web page, pro￾viding you with the concise, easy to access data you need to

perform your job.

■ A “From the Author” Forum that allows the authors of this

book to post timely updates links to related sites, or addi￾tional topic coverage that may have been requested by

readers.

Just visit us at www.syngress.com/solutions and follow the simple

registration process. You will need to have this book with you when

you register.

Thank you for giving us the opportunity to serve your needs. And be

sure to let us know if there is anything else we can do to make your

job easier.

Register for Free Membership to

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page i

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page ii

Windows

Small Business

Server 2003

How to Cheat at

Managing

Susan Snedaker

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page iii

Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc￾tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be

obtained from the Work.

There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is

sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to

state.

In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other

incidental or consequential damages arising out from the Work or its contents. Because some states do not

allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation

may not apply to you.

You should always use reasonable care, including backup and other appropriate precautions, when working

with computers, networks, data, and files.

Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author

UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The

Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is

to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned

in this book are trademarks or service marks of their respective companies.

KEY SERIAL NUMBER

001 HJV764VBB8

002 PO5FGVB623

003 829KM8NJH2

004 87655GHVBN

005 CVP3JFDW33

006 VBP5JMLLP9

007 HJWD3E3288

008 298MKNMCC6

009 62TVBHWAS7

010 I5T6TVBJ93

PUBLISHED BY

Syngress Publishing, Inc.

800 Hingham Street

Rockland, MA 02370

How to Cheat at Managing Windows Small Business Server 2003

Copyright © 2004 by Syngress Publishing, Inc.All rights reserved. Printed in the United States of

America. Except as permitted under the Copyright Act of 1976, no part of this publication may be repro￾duced or distributed in any form or by any means, or stored in a database or retrieval system, without the

prior written permission of the publisher, with the exception that the program listings may be entered,

stored, and executed in a computer system, but they may not be reproduced for publication.

Printed in the United States of America

1 2 3 4 5 6 7 8 9 0

ISBN: 1-932266-80-1

Publisher:Andrew Williams Page Layout and Art: Patricia Lupien

Acquisitions Editor: Jaime Quigley Copy Editor:Amy Thomson

Technical Editor: Daniel H. Bendell Indexer: Julie Kawabata

Cover Designer: Michael Kavish

Distributed by O’Reilly Media, Inc. in the United States and Canada.

For information on rights and translations, contact Matt Pedersen, Director of Sales and Rights, at

Syngress Publishing; email [email protected] or fax to 781-681-3585.

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page iv

Acknowledgments

v

We would like to acknowledge the following people for their kindness and support in

making this book possible.

Syngress books are now distributed in the United States and Canada by O’Reilly

Media, Inc.The enthusiasm and work ethic at O’Reilly is incredible and we would

like to thank everyone there for their time and efforts to bring Syngress books to

market:Tim O’Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko,

Bonnie Sheehan, Cindy Davis, Grant Kikkert, Opol Matsutaro, Steve Hazelwood, Mark

Wilson, Rick Brown, Leslie Becker, Jill Lothrop,Tim Hinton, Kyle Hart, Sara Winge,

C. J. Rayhill, Peter Pardo, Leslie Crandell, Valerie Dow, Regina Aggio, Pascal Honscher,

Preston Paull, Susan Thompson, Bruce Stewart, Laura Schmier, Sue Willing, Mark

Jacobsen, Betsy Waliszewski, Dawn Mann, Kathryn Barrett, John Chodacki, and Rob

Bullington.

The incredibly hard working team at Elsevier Science, including Jonathan Bunkell, Ian

Seager, Duncan Enright, David Burton, Rosanna Ramacciotti, Robert Fairbrother,

Miguel Sanchez, Klaus Beran, Emma Wyatt, Rosie Moss, Chris Hossack, Mark Hunt,

and Krista Leppiko, for making certain that our vision remains worldwide in scope.

David Buckland, Marie Chieng, Lucy Chong, Leslie Lim,Audrey Gan, Pang Ai Hua,

and Joseph Chan of STP Distributors for the enthusiasm with which they receive our

books.

Kwon Sung June at Acorn Publishing for his support.

David Scott, Tricia Wilden, Marilla Burgess, Annette Scott, Andrew Swaffer, Stephen

O’Donoghue, Bec Lowe, and Mark Langley of Woodslane for distributing our books

throughout Australia, New Zealand, Papua New Guinea, Fiji Tonga, Solomon Islands,

and the Cook Islands.

Winston Lim of Global Publishing for his help and support with distribution of Syngress

books in the Philippines.

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page v

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page vi

vii

Author

Susan Snedaker (MBA, BA, MCSE, MCT, PM) is Principal

Consultant and founder of VirtualTeam Consulting, LLC, a con￾sulting firm specializing in start-ups and companies in transition,

particularly technology firms. VirtualTeam works with technology

start–ups to develop viable business plans in preparation for

debt/equity funding or due diligence with venture capital firms.

VirtualTeam also provides IT consulting, design, and implementa￾tion services to companies of all sizes.The firm assists companies

with strategic planning, operations improvement and project man￾agement.Through its team of subject matter experts, VirtualTeam

also offers financial analysis, change management and operations

improvement services.

Prior to founding VirtualTeam Consulting in May 2000, Susan

held various executive and technical positions with companies

including Microsoft, Honeywell, Keane, and Apta Software.As

Director of Service Delivery for Keane, she managed a division with

1200+ technical support staff delivering phone and email support

for various Microsoft products including Windows Server operating

systems. She has contributed technical chapters to six Syngress

Publishing books on Windows (including The Best Damn Windows

Server 2003 Book Period, ISBN: 1-931836-12-4) and security tech￾nologies, and has written and edited technical content for a variety

of publications. Susan has also developed and delivered technical

content from security to telephony,TCP/IP to wi-fi and just about

everything in between (she admits a particular fondness for anything

related to TCP/IP).

Susan holds a master’s degree in business administration and a

bachelor’s degree in management from the University of Phoenix;

she also holds a certificate in project management from Stanford

University. She is a member of the Information Technology

Association of Southern Arizona (ITASA).

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page vii

viii

Daniel H. Bendell (BA, CNE) is the founder and President of

Assurance Technology Management, Inc. (ATM), a full-service con￾sulting practice specializing in providing complete business tech￾nology guidance to small and medium companies.ATM’s unique

consulting approach takes a company’s technology systems into con￾sideration, combined with a clear understanding of the client’s busi￾ness goals and practices.

With over twenty years of experience in the IT industry, Daniel

combines his breadth of technical knowledge with an ability to

understand his clients’ business needs. He is widely published on a

number of topics, including technical systems documentation and

remote systems management. He also delivers customized presenta￾tions and educational seminars to organizations and groups of small

business owners on how to better manage the technology systems

they have invested in.

Prior to founding ATM, Daniel worked as a senior-level consul￾tant for CSC Consulting, where he specialized in client/server tech￾nologies, and as a Healthcare Information Systems Consultant with

Superior Consultant Company.

Daniel lives in Framingham, MA with his wife Phyllis and

daughters Melissa and Jessica.

Technical Editor

307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page viii

ix

Contents

Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxiii

Chapter 1 Essentials of Windows Small

Business Server 2003 . . . . . . . . . . . . . . . . . . . . . . . . .1

The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2

Features of Windows Small Business Server 2003 . . . . . . . . .2

Simplified Administration and Management . . . . . . . . . .2

Enhanced Security . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Easy Internet and E-mail . . . . . . . . . . . . . . . . . . . . . . .3

Instant Intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Painless Remote Access . . . . . . . . . . . . . . . . . . . . . . . .3

Simplified User Management . . . . . . . . . . . . . . . . . . . .4

Manage Data More Easily . . . . . . . . . . . . . . . . . . . . . .4

Components of Windows Small Business Server 2003 . . . . .5

Windows Server 2003 (Standard, Premium) . . . . . . . . . .5

Exchange Server 2003 (Standard, Premium) . . . . . . . . . .6

Outlook 2003 (Premium) . . . . . . . . . . . . . . . . . . . . . .6

Shared Fax Service (Standard, Premium) . . . . . . . . . . . .6

Windows SharePoint Services (Standard, Premium) . . . . .7

Internet Security and Acceleration Server (Premium) . . .7

SQL Server 2000 (Premium) . . . . . . . . . . . . . . . . . . . .7

Office FrontPage 2003 (Premium) . . . . . . . . . . . . . . . .8

Restrictions of Windows Small Business Server 2003 . . . . . .9

Location of Installed Components . . . . . . . . . . . . . . . .9

Client Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

Client Access Licenses . . . . . . . . . . . . . . . . . . . . . . . .10

Client Operating Systems . . . . . . . . . . . . . . . . . . . . . .11

Single Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page ix

x Contents

Determining Which Operating System Package Is

Best For You . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Chapter 2 Understanding and Designing

Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18

Understanding Computer Basics . . . . . . . . . . . . . . . . . . .18

Understanding Network Basics . . . . . . . . . . . . . . . . . . . .20

Who’s In Charge? . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Connecting Computers Together . . . . . . . . . . . . . . . .21

Network Communications . . . . . . . . . . . . . . . . . . . . .22

IP Addresses, Firewalls and Network Address Translation . . .23

IP Addressing Basics . . . . . . . . . . . . . . . . . . . . . . . . .23

Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

Public and Private IP Addresses . . . . . . . . . . . . . . . . . .27

Firewalls and NAT . . . . . . . . . . . . . . . . . . . . . . . . . .28

Designing Your Network . . . . . . . . . . . . . . . . . . . . . . . . .29

Inventory Equipment . . . . . . . . . . . . . . . . . . . . . . . .30

Hardware and Software Specifications . . . . . . . . . . . . .31

Server Hardware . . . . . . . . . . . . . . . . . . . . . . . . . .31

SBS Server Specifications . . . . . . . . . . . . . . . . . . . .32

SBS Client Specifications . . . . . . . . . . . . . . . . . . . .33

Other Network Devices . . . . . . . . . . . . . . . . . . . .34

Create a Network Diagram . . . . . . . . . . . . . . . . . . . .34

Connecting and Protecting Your Network . . . . . . . . . .36

Connection, Location, and User Lists . . . . . . . . . . . . . .38

Connections and Locations . . . . . . . . . . . . . . . . . .38

User lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

Network Switches and Hubs . . . . . . . . . . . . . . . . .41

Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41

Wired and Wireless Network Speeds . . . . . . . . . . . .42

Domain Naming Conventions . . . . . . . . . . . . . . . . . .43

Computer Naming Conventions . . . . . . . . . . . . . . . . .44

One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page x

Contents xi

Chapter 3 Installing Small Business Server 2003 . . . . .47

The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48

Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . .48

Clean Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

Deciding on Your Installation Path . . . . . . . . . . . . . . .52

Pre-Installation Tasks . . . . . . . . . . . . . . . . . . . . . . . . .52

Create an Installation and Recovery Plan for Install,

Upgrade, or Migration . . . . . . . . . . . . . . . . . . . .53

Back Up Your Data . . . . . . . . . . . . . . . . . . . . . . . .54

Plan Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . .54

Prepare Your Server . . . . . . . . . . . . . . . . . . . . . . . .57

Verify Network Configuration . . . . . . . . . . . . . . . .58

IP Address Configuration . . . . . . . . . . . . . . . . . . . .59

One Last Check . . . . . . . . . . . . . . . . . . . . . . . . . . . .61

Installing Small Business Server 2003 . . . . . . . . . . . . . . . .62

Windows Small Business Server 2003 Installation—

Phase I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63

Windows Small Business Server Setup Wizard—Phase II 67

Upgrading to Small Business Server 2003 . . . . . . . . . . . . .72

Preparing for the Upgrade . . . . . . . . . . . . . . . . . . . . .72

Prepare the Server . . . . . . . . . . . . . . . . . . . . . . . . .73

Preparing Client Computers . . . . . . . . . . . . . . . . .76

Preparing Users . . . . . . . . . . . . . . . . . . . . . . . . . .76

Upgrading Your Server . . . . . . . . . . . . . . . . . . . . . . . .78

Windows Small Business Server Setup Wizard—

Phase I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78

Windows Small Business Server Setup Wizard—

Phase II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80

Migrating to Small Business Server 2003 . . . . . . . . . . . . . .81

Preparing for Migration . . . . . . . . . . . . . . . . . . . . . . .82

Migrating to SBS . . . . . . . . . . . . . . . . . . . . . . . . . . .83

Completing the To Do List and Other Post-Installation Tasks 85

View Security Best Practices . . . . . . . . . . . . . . . . . . . .86

Connect to the Internet . . . . . . . . . . . . . . . . . . . . . . .87

307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xi

xii Contents

Direct Broadband Connection . . . . . . . . . . . . . . . .88

Broadband with Local Router . . . . . . . . . . . . . . . .89

Broadband with User Authentication (PPPoE) . . . . .91

Dial-Up Connection . . . . . . . . . . . . . . . . . . . . . . .91

Configuring Your Firewall . . . . . . . . . . . . . . . . . . .92

Configuring E-Mail . . . . . . . . . . . . . . . . . . . . . . .95

Configure Password Policies . . . . . . . . . . . . . . . . .96

Scan for Critical System Updates . . . . . . . . . . . . . .97

Configure Remote Access . . . . . . . . . . . . . . . . . . . . .97

Remote Access via Virtual Private Networking . . . .98

Remote Access via Dial-Up Connection . . . . . . . . .99

Activate Your Server . . . . . . . . . . . . . . . . . . . . . . . . .100

Add Client Licenses . . . . . . . . . . . . . . . . . . . . . . . . .101

Migrate User Permissions . . . . . . . . . . . . . . . . . . . . .102

Management Tasks . . . . . . . . . . . . . . . . . . . . . . . . . .103

One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104

Chapter 4 Security . . . . . . . . . . . . . . . . . . . . . . . . . .107

The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108

Overview of Security in Small Business Server 2003 . . . . .108

Types of Security . . . . . . . . . . . . . . . . . . . . . . . . . .109

Review Network Topology and Firewall Configuration . . .110

Network Connections . . . . . . . . . . . . . . . . . . . . . . .110

Wireless Access Security . . . . . . . . . . . . . . . . . . . .112

Secure the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113

Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . .114

Configuration Security . . . . . . . . . . . . . . . . . . . . . . .114

Software Security . . . . . . . . . . . . . . . . . . . . . . . . . .118

Secure the Workstations . . . . . . . . . . . . . . . . . . . . . . . . .120

Secure the User Accounts . . . . . . . . . . . . . . . . . . . . . . .121

Educate Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121

Require Strong Passwords . . . . . . . . . . . . . . . . . . . . .123

Verify Users Have Only Necessary Permissions . . . . . .124

Monitor, Log, and Audit . . . . . . . . . . . . . . . . . . . . . . . .125

Configure Monitoring and Reporting . . . . . . . . . . . .125

Audit Key Events . . . . . . . . . . . . . . . . . . . . . . . . . .126

Audit for Failed Logon Events . . . . . . . . . . . . . . .126

307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xii

Contents xiii

Audit for Account Lockouts . . . . . . . . . . . . . . . . .126

Microsoft Security Guidance Kit . . . . . . . . . . . . . .127

One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130

Chapter 5 Disk Management . . . . . . . . . . . . . . . . . .133

The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134

Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134

Disk Terminology . . . . . . . . . . . . . . . . . . . . . . . . . .134

Storage Connection Terminology . . . . . . . . . . . . . . .136

Dynamic Disk Concepts . . . . . . . . . . . . . . . . . . . . . . . .137

Simple Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . .139

Spanned Volumes . . . . . . . . . . . . . . . . . . . . . . . . . .140

Striped Volumes (RAID-0) . . . . . . . . . . . . . . . . . . . .141

Mirrored Volumes (RAID-1) . . . . . . . . . . . . . . . . . .142

Striped Volume with Parity (RAID-5) . . . . . . . . . . . .143

Managing Server Disks . . . . . . . . . . . . . . . . . . . . . . . . .145

Using Disk Management . . . . . . . . . . . . . . . . . . . . .145

Working with Partitions . . . . . . . . . . . . . . . . . . . . . .146

Creating a Partition . . . . . . . . . . . . . . . . . . . . . . .146

Creating a New Logical Drive on an Extended

Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149

Deleting a Partition or Logical Drive . . . . . . . . . . .149

Converting a Basic Disk to a Dynamic Disk . . . . . . . .150

Working with Dynamic Disks . . . . . . . . . . . . . . . . . .151

Creating a Volume . . . . . . . . . . . . . . . . . . . . . . .151

Deleting a Volume . . . . . . . . . . . . . . . . . . . . . . .152

Mounting a Volume . . . . . . . . . . . . . . . . . . . . . .152

Working with Mirrored Sets . . . . . . . . . . . . . . . . . . .154

Creating a Mirrored Set . . . . . . . . . . . . . . . . . . . .155

Removing a Mirrored Set . . . . . . . . . . . . . . . . . .156

Breaking a Mirrored Set . . . . . . . . . . . . . . . . . . .156

RAID-5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157

Disk Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . .157

One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160

307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xiii

xiv Contents

Chapter 6 Managing File Storage . . . . . . . . . . . . . . .161

The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162

Configuring and Managing Disk Quotas . . . . . . . . . . . . .162

Accessing Disk Quota Information . . . . . . . . . . . . . .163

Establishing Quotas for Specific Users . . . . . . . . . . . .165

Importing and Exporting Quotas . . . . . . . . . . . . . . .167

Quota Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . .168

File Encryption Management . . . . . . . . . . . . . . . . . . . . .169

File Encryption Recovery Agent . . . . . . . . . . . . . . . .171

Disk and File Compression . . . . . . . . . . . . . . . . . . . . . .173

Shadow Copy Concepts . . . . . . . . . . . . . . . . . . . . . . . .174

Enabling Shadow Copies of Shared Folders . . . . . . . .175

Configuring Clients to Use Shadow Copies . . . . . . . .177

One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180

Chapter 7 Managing Users and Groups . . . . . . . . . .183

The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184

Understanding, Creating, and Managing Groups . . . . . . . .184

Understanding Groups . . . . . . . . . . . . . . . . . . . . . .184

Built-in Groups . . . . . . . . . . . . . . . . . . . . . . . . .185

Managing Groups . . . . . . . . . . . . . . . . . . . . . . . . . .188

Security Groups . . . . . . . . . . . . . . . . . . . . . . . . .188

Distribution Groups . . . . . . . . . . . . . . . . . . . . . .190

Understanding, Creating, and Managing User Accounts . . .192

Understanding User Accounts . . . . . . . . . . . . . . . . . .193

Creating User Accounts . . . . . . . . . . . . . . . . . . . .194

Adding (and Removing) Users to Groups . . . . . . .196

Managing User Templates . . . . . . . . . . . . . . . . . .197

Redirecting My Documents for User Accounts . . .201

Removing and Disabling User Accounts . . . . . . . .203

Understanding and Managing User Profiles . . . . . . . . . . .204

Working with the Administrator Account . . . . . . .207

One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .208

307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xiv

Tải ngay đi em, còn do dự, trời tối mất!