Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

How to cheat at managing windows small business server 2003
Nội dung xem thử
Mô tả chi tiết
Over the last few years, Syngress has published many best-selling and
critically acclaimed books, including Tom Shinder’s Configuring ISA
Server 2000, Brian Caswell and Jay Beale’s Snort 2.0 Intrusion
Detection, and Angela Orebaugh and Gilbert Ramirez’s Ethereal
Packet Sniffing. One of the reasons for the success of these books has
been our unique [email protected] program. Through this
site, we’ve been able to provide readers a real time extension to the
printed book.
As a registered owner of this book, you will qualify for free access to
our members-only [email protected] program. Once you have
registered, you will enjoy several benefits, including:
■ Four downloadable e-booklets on topics related to the book.
Each booklet is approximately 20-30 pages in Adobe PDF
format. They have been selected by our editors from other
best-selling Syngress books as providing topic coverage that
is directly related to the coverage in this book.
■ A comprehensive FAQ page that consolidates all of the key
points of this book into an easy to search web page, providing you with the concise, easy to access data you need to
perform your job.
■ A “From the Author” Forum that allows the authors of this
book to post timely updates links to related sites, or additional topic coverage that may have been requested by
readers.
Just visit us at www.syngress.com/solutions and follow the simple
registration process. You will need to have this book with you when
you register.
Thank you for giving us the opportunity to serve your needs. And be
sure to let us know if there is anything else we can do to make your
job easier.
Register for Free Membership to
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page i
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page ii
Windows
Small Business
Server 2003
How to Cheat at
Managing
Susan Snedaker
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page iii
Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be
obtained from the Work.
There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is
sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to
state.
In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other
incidental or consequential damages arising out from the Work or its contents. Because some states do not
allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation
may not apply to you.
You should always use reasonable care, including backup and other appropriate precautions, when working
with computers, networks, data, and files.
Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author
UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The
Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is
to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned
in this book are trademarks or service marks of their respective companies.
KEY SERIAL NUMBER
001 HJV764VBB8
002 PO5FGVB623
003 829KM8NJH2
004 87655GHVBN
005 CVP3JFDW33
006 VBP5JMLLP9
007 HJWD3E3288
008 298MKNMCC6
009 62TVBHWAS7
010 I5T6TVBJ93
PUBLISHED BY
Syngress Publishing, Inc.
800 Hingham Street
Rockland, MA 02370
How to Cheat at Managing Windows Small Business Server 2003
Copyright © 2004 by Syngress Publishing, Inc.All rights reserved. Printed in the United States of
America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the
prior written permission of the publisher, with the exception that the program listings may be entered,
stored, and executed in a computer system, but they may not be reproduced for publication.
Printed in the United States of America
1 2 3 4 5 6 7 8 9 0
ISBN: 1-932266-80-1
Publisher:Andrew Williams Page Layout and Art: Patricia Lupien
Acquisitions Editor: Jaime Quigley Copy Editor:Amy Thomson
Technical Editor: Daniel H. Bendell Indexer: Julie Kawabata
Cover Designer: Michael Kavish
Distributed by O’Reilly Media, Inc. in the United States and Canada.
For information on rights and translations, contact Matt Pedersen, Director of Sales and Rights, at
Syngress Publishing; email [email protected] or fax to 781-681-3585.
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page iv
Acknowledgments
v
We would like to acknowledge the following people for their kindness and support in
making this book possible.
Syngress books are now distributed in the United States and Canada by O’Reilly
Media, Inc.The enthusiasm and work ethic at O’Reilly is incredible and we would
like to thank everyone there for their time and efforts to bring Syngress books to
market:Tim O’Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko,
Bonnie Sheehan, Cindy Davis, Grant Kikkert, Opol Matsutaro, Steve Hazelwood, Mark
Wilson, Rick Brown, Leslie Becker, Jill Lothrop,Tim Hinton, Kyle Hart, Sara Winge,
C. J. Rayhill, Peter Pardo, Leslie Crandell, Valerie Dow, Regina Aggio, Pascal Honscher,
Preston Paull, Susan Thompson, Bruce Stewart, Laura Schmier, Sue Willing, Mark
Jacobsen, Betsy Waliszewski, Dawn Mann, Kathryn Barrett, John Chodacki, and Rob
Bullington.
The incredibly hard working team at Elsevier Science, including Jonathan Bunkell, Ian
Seager, Duncan Enright, David Burton, Rosanna Ramacciotti, Robert Fairbrother,
Miguel Sanchez, Klaus Beran, Emma Wyatt, Rosie Moss, Chris Hossack, Mark Hunt,
and Krista Leppiko, for making certain that our vision remains worldwide in scope.
David Buckland, Marie Chieng, Lucy Chong, Leslie Lim,Audrey Gan, Pang Ai Hua,
and Joseph Chan of STP Distributors for the enthusiasm with which they receive our
books.
Kwon Sung June at Acorn Publishing for his support.
David Scott, Tricia Wilden, Marilla Burgess, Annette Scott, Andrew Swaffer, Stephen
O’Donoghue, Bec Lowe, and Mark Langley of Woodslane for distributing our books
throughout Australia, New Zealand, Papua New Guinea, Fiji Tonga, Solomon Islands,
and the Cook Islands.
Winston Lim of Global Publishing for his help and support with distribution of Syngress
books in the Philippines.
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page v
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page vi
vii
Author
Susan Snedaker (MBA, BA, MCSE, MCT, PM) is Principal
Consultant and founder of VirtualTeam Consulting, LLC, a consulting firm specializing in start-ups and companies in transition,
particularly technology firms. VirtualTeam works with technology
start–ups to develop viable business plans in preparation for
debt/equity funding or due diligence with venture capital firms.
VirtualTeam also provides IT consulting, design, and implementation services to companies of all sizes.The firm assists companies
with strategic planning, operations improvement and project management.Through its team of subject matter experts, VirtualTeam
also offers financial analysis, change management and operations
improvement services.
Prior to founding VirtualTeam Consulting in May 2000, Susan
held various executive and technical positions with companies
including Microsoft, Honeywell, Keane, and Apta Software.As
Director of Service Delivery for Keane, she managed a division with
1200+ technical support staff delivering phone and email support
for various Microsoft products including Windows Server operating
systems. She has contributed technical chapters to six Syngress
Publishing books on Windows (including The Best Damn Windows
Server 2003 Book Period, ISBN: 1-931836-12-4) and security technologies, and has written and edited technical content for a variety
of publications. Susan has also developed and delivered technical
content from security to telephony,TCP/IP to wi-fi and just about
everything in between (she admits a particular fondness for anything
related to TCP/IP).
Susan holds a master’s degree in business administration and a
bachelor’s degree in management from the University of Phoenix;
she also holds a certificate in project management from Stanford
University. She is a member of the Information Technology
Association of Southern Arizona (ITASA).
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page vii
viii
Daniel H. Bendell (BA, CNE) is the founder and President of
Assurance Technology Management, Inc. (ATM), a full-service consulting practice specializing in providing complete business technology guidance to small and medium companies.ATM’s unique
consulting approach takes a company’s technology systems into consideration, combined with a clear understanding of the client’s business goals and practices.
With over twenty years of experience in the IT industry, Daniel
combines his breadth of technical knowledge with an ability to
understand his clients’ business needs. He is widely published on a
number of topics, including technical systems documentation and
remote systems management. He also delivers customized presentations and educational seminars to organizations and groups of small
business owners on how to better manage the technology systems
they have invested in.
Prior to founding ATM, Daniel worked as a senior-level consultant for CSC Consulting, where he specialized in client/server technologies, and as a Healthcare Information Systems Consultant with
Superior Consultant Company.
Daniel lives in Framingham, MA with his wife Phyllis and
daughters Melissa and Jessica.
Technical Editor
307_HowtoCheat_FM.qxd 8/25/04 3:01 PM Page viii
ix
Contents
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxiii
Chapter 1 Essentials of Windows Small
Business Server 2003 . . . . . . . . . . . . . . . . . . . . . . . . .1
The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Features of Windows Small Business Server 2003 . . . . . . . . .2
Simplified Administration and Management . . . . . . . . . .2
Enhanced Security . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Easy Internet and E-mail . . . . . . . . . . . . . . . . . . . . . . .3
Instant Intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Painless Remote Access . . . . . . . . . . . . . . . . . . . . . . . .3
Simplified User Management . . . . . . . . . . . . . . . . . . . .4
Manage Data More Easily . . . . . . . . . . . . . . . . . . . . . .4
Components of Windows Small Business Server 2003 . . . . .5
Windows Server 2003 (Standard, Premium) . . . . . . . . . .5
Exchange Server 2003 (Standard, Premium) . . . . . . . . . .6
Outlook 2003 (Premium) . . . . . . . . . . . . . . . . . . . . . .6
Shared Fax Service (Standard, Premium) . . . . . . . . . . . .6
Windows SharePoint Services (Standard, Premium) . . . . .7
Internet Security and Acceleration Server (Premium) . . .7
SQL Server 2000 (Premium) . . . . . . . . . . . . . . . . . . . .7
Office FrontPage 2003 (Premium) . . . . . . . . . . . . . . . .8
Restrictions of Windows Small Business Server 2003 . . . . . .9
Location of Installed Components . . . . . . . . . . . . . . . .9
Client Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Client Access Licenses . . . . . . . . . . . . . . . . . . . . . . . .10
Client Operating Systems . . . . . . . . . . . . . . . . . . . . . .11
Single Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page ix
x Contents
Determining Which Operating System Package Is
Best For You . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Chapter 2 Understanding and Designing
Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Understanding Computer Basics . . . . . . . . . . . . . . . . . . .18
Understanding Network Basics . . . . . . . . . . . . . . . . . . . .20
Who’s In Charge? . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Connecting Computers Together . . . . . . . . . . . . . . . .21
Network Communications . . . . . . . . . . . . . . . . . . . . .22
IP Addresses, Firewalls and Network Address Translation . . .23
IP Addressing Basics . . . . . . . . . . . . . . . . . . . . . . . . .23
Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
Public and Private IP Addresses . . . . . . . . . . . . . . . . . .27
Firewalls and NAT . . . . . . . . . . . . . . . . . . . . . . . . . .28
Designing Your Network . . . . . . . . . . . . . . . . . . . . . . . . .29
Inventory Equipment . . . . . . . . . . . . . . . . . . . . . . . .30
Hardware and Software Specifications . . . . . . . . . . . . .31
Server Hardware . . . . . . . . . . . . . . . . . . . . . . . . . .31
SBS Server Specifications . . . . . . . . . . . . . . . . . . . .32
SBS Client Specifications . . . . . . . . . . . . . . . . . . . .33
Other Network Devices . . . . . . . . . . . . . . . . . . . .34
Create a Network Diagram . . . . . . . . . . . . . . . . . . . .34
Connecting and Protecting Your Network . . . . . . . . . .36
Connection, Location, and User Lists . . . . . . . . . . . . . .38
Connections and Locations . . . . . . . . . . . . . . . . . .38
User lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Network Switches and Hubs . . . . . . . . . . . . . . . . .41
Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
Wired and Wireless Network Speeds . . . . . . . . . . . .42
Domain Naming Conventions . . . . . . . . . . . . . . . . . .43
Computer Naming Conventions . . . . . . . . . . . . . . . . .44
One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page x
Contents xi
Chapter 3 Installing Small Business Server 2003 . . . . .47
The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . .48
Clean Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Deciding on Your Installation Path . . . . . . . . . . . . . . .52
Pre-Installation Tasks . . . . . . . . . . . . . . . . . . . . . . . . .52
Create an Installation and Recovery Plan for Install,
Upgrade, or Migration . . . . . . . . . . . . . . . . . . . .53
Back Up Your Data . . . . . . . . . . . . . . . . . . . . . . . .54
Plan Disk Partitions . . . . . . . . . . . . . . . . . . . . . . . .54
Prepare Your Server . . . . . . . . . . . . . . . . . . . . . . . .57
Verify Network Configuration . . . . . . . . . . . . . . . .58
IP Address Configuration . . . . . . . . . . . . . . . . . . . .59
One Last Check . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Installing Small Business Server 2003 . . . . . . . . . . . . . . . .62
Windows Small Business Server 2003 Installation—
Phase I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Windows Small Business Server Setup Wizard—Phase II 67
Upgrading to Small Business Server 2003 . . . . . . . . . . . . .72
Preparing for the Upgrade . . . . . . . . . . . . . . . . . . . . .72
Prepare the Server . . . . . . . . . . . . . . . . . . . . . . . . .73
Preparing Client Computers . . . . . . . . . . . . . . . . .76
Preparing Users . . . . . . . . . . . . . . . . . . . . . . . . . .76
Upgrading Your Server . . . . . . . . . . . . . . . . . . . . . . . .78
Windows Small Business Server Setup Wizard—
Phase I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Windows Small Business Server Setup Wizard—
Phase II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
Migrating to Small Business Server 2003 . . . . . . . . . . . . . .81
Preparing for Migration . . . . . . . . . . . . . . . . . . . . . . .82
Migrating to SBS . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Completing the To Do List and Other Post-Installation Tasks 85
View Security Best Practices . . . . . . . . . . . . . . . . . . . .86
Connect to the Internet . . . . . . . . . . . . . . . . . . . . . . .87
307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xi
xii Contents
Direct Broadband Connection . . . . . . . . . . . . . . . .88
Broadband with Local Router . . . . . . . . . . . . . . . .89
Broadband with User Authentication (PPPoE) . . . . .91
Dial-Up Connection . . . . . . . . . . . . . . . . . . . . . . .91
Configuring Your Firewall . . . . . . . . . . . . . . . . . . .92
Configuring E-Mail . . . . . . . . . . . . . . . . . . . . . . .95
Configure Password Policies . . . . . . . . . . . . . . . . .96
Scan for Critical System Updates . . . . . . . . . . . . . .97
Configure Remote Access . . . . . . . . . . . . . . . . . . . . .97
Remote Access via Virtual Private Networking . . . .98
Remote Access via Dial-Up Connection . . . . . . . . .99
Activate Your Server . . . . . . . . . . . . . . . . . . . . . . . . .100
Add Client Licenses . . . . . . . . . . . . . . . . . . . . . . . . .101
Migrate User Permissions . . . . . . . . . . . . . . . . . . . . .102
Management Tasks . . . . . . . . . . . . . . . . . . . . . . . . . .103
One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104
Chapter 4 Security . . . . . . . . . . . . . . . . . . . . . . . . . .107
The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108
Overview of Security in Small Business Server 2003 . . . . .108
Types of Security . . . . . . . . . . . . . . . . . . . . . . . . . .109
Review Network Topology and Firewall Configuration . . .110
Network Connections . . . . . . . . . . . . . . . . . . . . . . .110
Wireless Access Security . . . . . . . . . . . . . . . . . . . .112
Secure the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . .114
Configuration Security . . . . . . . . . . . . . . . . . . . . . . .114
Software Security . . . . . . . . . . . . . . . . . . . . . . . . . .118
Secure the Workstations . . . . . . . . . . . . . . . . . . . . . . . . .120
Secure the User Accounts . . . . . . . . . . . . . . . . . . . . . . .121
Educate Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Require Strong Passwords . . . . . . . . . . . . . . . . . . . . .123
Verify Users Have Only Necessary Permissions . . . . . .124
Monitor, Log, and Audit . . . . . . . . . . . . . . . . . . . . . . . .125
Configure Monitoring and Reporting . . . . . . . . . . . .125
Audit Key Events . . . . . . . . . . . . . . . . . . . . . . . . . .126
Audit for Failed Logon Events . . . . . . . . . . . . . . .126
307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xii
Contents xiii
Audit for Account Lockouts . . . . . . . . . . . . . . . . .126
Microsoft Security Guidance Kit . . . . . . . . . . . . . .127
One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130
Chapter 5 Disk Management . . . . . . . . . . . . . . . . . .133
The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134
Disk Terminology . . . . . . . . . . . . . . . . . . . . . . . . . .134
Storage Connection Terminology . . . . . . . . . . . . . . .136
Dynamic Disk Concepts . . . . . . . . . . . . . . . . . . . . . . . .137
Simple Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . .139
Spanned Volumes . . . . . . . . . . . . . . . . . . . . . . . . . .140
Striped Volumes (RAID-0) . . . . . . . . . . . . . . . . . . . .141
Mirrored Volumes (RAID-1) . . . . . . . . . . . . . . . . . .142
Striped Volume with Parity (RAID-5) . . . . . . . . . . . .143
Managing Server Disks . . . . . . . . . . . . . . . . . . . . . . . . .145
Using Disk Management . . . . . . . . . . . . . . . . . . . . .145
Working with Partitions . . . . . . . . . . . . . . . . . . . . . .146
Creating a Partition . . . . . . . . . . . . . . . . . . . . . . .146
Creating a New Logical Drive on an Extended
Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149
Deleting a Partition or Logical Drive . . . . . . . . . . .149
Converting a Basic Disk to a Dynamic Disk . . . . . . . .150
Working with Dynamic Disks . . . . . . . . . . . . . . . . . .151
Creating a Volume . . . . . . . . . . . . . . . . . . . . . . .151
Deleting a Volume . . . . . . . . . . . . . . . . . . . . . . .152
Mounting a Volume . . . . . . . . . . . . . . . . . . . . . .152
Working with Mirrored Sets . . . . . . . . . . . . . . . . . . .154
Creating a Mirrored Set . . . . . . . . . . . . . . . . . . . .155
Removing a Mirrored Set . . . . . . . . . . . . . . . . . .156
Breaking a Mirrored Set . . . . . . . . . . . . . . . . . . .156
RAID-5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157
Disk Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . .157
One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160
307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xiii
xiv Contents
Chapter 6 Managing File Storage . . . . . . . . . . . . . . .161
The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162
Configuring and Managing Disk Quotas . . . . . . . . . . . . .162
Accessing Disk Quota Information . . . . . . . . . . . . . .163
Establishing Quotas for Specific Users . . . . . . . . . . . .165
Importing and Exporting Quotas . . . . . . . . . . . . . . .167
Quota Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . .168
File Encryption Management . . . . . . . . . . . . . . . . . . . . .169
File Encryption Recovery Agent . . . . . . . . . . . . . . . .171
Disk and File Compression . . . . . . . . . . . . . . . . . . . . . .173
Shadow Copy Concepts . . . . . . . . . . . . . . . . . . . . . . . .174
Enabling Shadow Copies of Shared Folders . . . . . . . .175
Configuring Clients to Use Shadow Copies . . . . . . . .177
One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
Chapter 7 Managing Users and Groups . . . . . . . . . .183
The End Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184
Understanding, Creating, and Managing Groups . . . . . . . .184
Understanding Groups . . . . . . . . . . . . . . . . . . . . . .184
Built-in Groups . . . . . . . . . . . . . . . . . . . . . . . . .185
Managing Groups . . . . . . . . . . . . . . . . . . . . . . . . . .188
Security Groups . . . . . . . . . . . . . . . . . . . . . . . . .188
Distribution Groups . . . . . . . . . . . . . . . . . . . . . .190
Understanding, Creating, and Managing User Accounts . . .192
Understanding User Accounts . . . . . . . . . . . . . . . . . .193
Creating User Accounts . . . . . . . . . . . . . . . . . . . .194
Adding (and Removing) Users to Groups . . . . . . .196
Managing User Templates . . . . . . . . . . . . . . . . . .197
Redirecting My Documents for User Accounts . . .201
Removing and Disabling User Accounts . . . . . . . .203
Understanding and Managing User Profiles . . . . . . . . . . .204
Working with the Administrator Account . . . . . . .207
One More Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .208
307_HowtoCheat_TOC.qxd 8/25/04 3:07 PM Page xiv