Special Edition, Using Microsoft BackOffice, Welcome!

Introduction

Special Edition, Using Microsoft BackOffice, a book written by professionals for professionals, is about Microsoft BackOffice 2.0. Authored by a team of senior information system consultants and software engineers, all of whom exhibit their talents for G. A. Sullivan, a premiere software development consulting company and Microsoft Solution Provider based in St. Louis, Missouri, this book is designed to guide you through the complex implementation and administration issues associated with Microsoft BackOffice. As such, it primarily focuses on how to prepare for, install, configure, and administer the various Microsoft BackOffice products.

One of the most alluring features of this book is its up-to-date information. The authors worked hard to produce a time-critical, technically complete "how-to" book that offers in-depth coverage of the most important elements of the BackOffice products, including the newest products of BackOffice - the brand new Internet Information Server 1.0, the just released SQL Server 6.5, and Exchange Server 4.0. This book provides thorough coverage of these BackOffice products and includes sufficient notes, tips, cautions, and troubleshooting annotations to ensure that you can implement and administer even the troublesome features and elements of the individual applications.

Microsoft BackOffice, an integrated suite of server-based products that operate under control of the Windows NT Server operating system, is patterned after the success of Microsoft Office, a suite of client-based personal productivity tools designed for the client side of the client-server environment. BackOffice, designed for the server side of the client-server environment, significantly improves network administrator productivity in much the same way that Microsoft Office improves personal productivity. BackOffice was designed to be portable so that it operates on a variety of hardware platforms and extensible so that new services can easily be added and existing services easily enhanced. Scalability is also a design feature. BackOffice needed to be stable in a growth environment where expansion of application scope could be offset by increasing the hardware's computing capability through additional processors.

Another design goal of BackOffice is that it comply with major open computer standards. Indeed, the BackOffice products do this, in addition to supporting many of the most popular network protocols. Consistency is also an important design consideration for BackOffice. The various products of BackOffice have a consistent graphical user interface, a consistent set of administrative tools, a consistent applications programming interface, and consistent processor features that are available to all processors supported by Windows NT Server. BackOffice is also designed to be easily integrated with other information system components, applications, and technologies. As such, BackOffice products integrate well with Windows NT, other networks, the Internet, and desktop computers.

A critical design goal is that BackOffice address the need to control access to and usage of services and resources. BackOffice does an excellent job of this. Primarily through the use of the Windows NT Server operating system, under which the other BackOffice products must operate, abundant security features and tools are available to secure transmissions, control access, and assign authorizations. Attaining a secure BackOffice environment, however, requires not only that these tools and features simply be available, but that they also be applied intelligently, that management of them be disciplined, and that appropriate controls be established.

BackOffice, like most software systems, also needs to be robust; that is, it needs to be mature in the way it handles hardware and software exceptions, recovers from errors, and contains itself during catastrophic failures and in its level of stability. While this is an obvious and common design goal, most software systems do not achieve it right away. Regardless of the painstaking care given to quality testing, errors will inevitably be present in the initial releases. As these errors are flushed out in subsequent releases, the software system becomes more robust and stable. Because BackOffice is now in its third release, its level of robustness is suitable for even the most critical application environments

Who Should Use This Book?

This book is aimed at administrators (of networks, systems, databases, servers, and so on) who are responsible for deploying the BackOffice suite, information system managers faced with migration issues, and software developers who develop applications and interfaces used with BackOffice products. The readers of this book will learn how to install, configure, and use BackOffice and its individual products. It provides excellent advice for administrators who have the task of implementing the BackOffice suite in a client-server environment. It also provides good advice for managers on how to use BackOffice to improve their business footing and leverage their automated information systems to maximize return on investment. Not only will managers learn what to do with BackOffice, they will also find out how to do it, and most important of all, why they should.

With the variety of material presented in Special Edition Using Microsoft BackOffice, coupled with its high quality of content, up-to-date material, level of detail, and easy to follow "how-to" format guides, this will be the all-encompassing book you will quickly come to depend on to supply answers to your BackOffice installation and administration questions. Although each of the products that make up the BackOffice suite is given a separate part within the book, special attention is paid to integration issues and techniques. Additionally, significant portions of the book are devoted to providing background material to enhance your understanding of critical concepts, and advanced topics explain how to really be effective with BackOffice in the enterprise.

How this Book Is Organized

This book is organized in a logical sequence starting with an in-depth discussion of BackOffice and how it fits into an enterprise environment. Part II focuses on the base operating system, Windows NT Server, upon which all the other BackOffice products must run. The Windows NT Server part establishes a logical progression of chapters that is paralleled throughout the other parts of the book. Each part generally provides an overview of the BackOffice product, presents detailed instructions on how to install and configure the product, and then covers how the server administrator should use the product on a daily basis.

After the base operating system - Windows NT Server - is covered, Part III focuses on the newest addition to the BackOffice product suite, the Internet Information Server (IIS). You learn what it is and how it has changed the way people think of information technology, how to prepare for an IIS installation, how to set up the server and configure services on it, and how to use the Internet Service Manager for managing your enterprise servers. Part IV is devoted to another new addition to Microsoft BackOffice, Microsoft Exchange Server. This part describes how to set up the groupware and messaging subsystem of BackOffice. It surveys the features of Exchange Server and provides an overview of the various Exchange Server elements; describes how to install and configure Exchange Server; how to install the client software and use it to manage your personal messaging and scheduling needs; how to implement, use, and replicate public folders; and how to install and use the advanced security features that complement the security already provided by Windows NT.

In-depth coverage of SQL Server 6.5 comes in Part V. Included in the SQL Server chapters are discussions on relational database management systems, the role of the database administrator, designing databases, SQL Server management tools, selecting appropriate server hardware, recommended installation options, using SQL Enterprise Manager, proactively monitoring SQL Server, data replication, and the new Distributed Transaction Coordinator. Part VI launches you into a thorough discussion of the BackOffice product designed to provide personal computer access to IBM mainframes or AS/400 minicomputers - SNA Server. You learn what the IBM System Network Architecture (SNA) is, how SNA Server integrates with the SNA network structure, the critical preinstallation actions that need to be taken when preparing for SNA Server, how to install and configure SNA Server, and the role of the SNA Server administrator in managing the SNA network.

The last product of BackOffice, Systems Management Server (SMS), is covered in Part VII. This part enhances your understanding of what SMS is and why it is needed; provides details on remote application installation, metering, and hardware and software inventory management; explores the key features of Microsoft SMS and how they can be used to address systems management requirements for an enterprise-wide network; describes how to set up SMS on your network and use it to become more productive as an administrator; describes some of the more advanced features of SMS and how to automate the process of software distribution and installation; and discusses some techniques for monitoring and troubleshooting SMS.

Part VIII deals with the practical perspective of using BackOffice to get work done. Discussion includes valuable information on evaluating your organization's needs and implementing a security system that meets those needs. Real-world application scenarios are examined to aid information system managers and administrators in understanding what BackOffice means to application development and deployment. The concept of proactive versus reactive network administration is also examined. You learn how to develop aggressive network and server management approaches that usually prevent problems from occurring, but when problems do occur, mitigate their severity and correct them before the user community feels any significant impact.

Part I

Part I, "Exploring Microsoft BackOffice," covers what BackOffice is and how you prepare for it in your enterprise.

Chapter 1, "Understanding Microsoft BackOffice," describes the products that make up BackOffice; provides an overview of the client-server process model, the role of BackOffice in this client-server world, and how BackOffice moves you beyond client-server; and discusses the added value BackOffice offers to your computing enterprise.

Chapter 2, "Characteristics of Microsoft BackOffice," details the BackOffice design goals, the role of BackOffice as a network operating system, and the services provided by BackOffice. The chapter concludes with a discussion of why BackOffice is a solid platform for the future and why it is important to you as an administrator, manager, developer, or user.

Chapter 3, "Preparing to Implement Microsoft BackOffice," describes the various steps you should take prior to installing BackOffice. Some of these actions include building the network, establishing the administration team, analyzing the organizational requirements, preparing the facility, establishing policies and procedures, and licensing BackOffice.

Chapter 4, "Becoming Part of the Enterprise," discusses the most important considerations facing an administrator who is involved in creating an enterprise network and setting up servers to operate in such an environment. The chapter attempts to enhance your understanding of how computers on a large network are organized, the basics of network protocols, and Windows NT security.

Part II

Part II, "Windows NT Server," provides an overview of the BackOffice operating system, which supports the operation and management control of the other BackOffice products.

Chapter 5, "Implementing Windows NT Server," covers the installation and use of Windows NT Server. It includes a detailed step-by-step procedure for installing Windows NT Server and describes such related activities as partitioning hard disk space, exploiting the last known good feature, creating the emergency repair disk, logging on and off the server, shutting down and restarting the server, connecting to the network from client workstations, and using Windows NT security.

Chapter 6, "The Role of the Network Administrator," outlines the network administrator's server management tasks. It includes a survey of the tools that come with Windows NT Server and discusses typical administrative tasks such as creating user accounts, sharing resources, and changing permissions.

Chapter 7, "Implementing the Remote Access Service (RAS)," examines the basic capabilities of RAS, describes how to install and configure RAS using the various protocols available, briefly surveys the RAS security features available, and describes how to use RAS with different client configurations.

Chapter 8, "Using TCP/IP With Windows NT Server," describes the Transmission Control Protocol/Internet Protocol, a network protocol and related applications that have gained wide acceptance and use on the Internet as well as on private networks. The chapter includes a brief tutorial on TCP/IP to help you understand some of the terminology and why things are done the way they are.

Part III

Part III, "Internet Information Server," explores how to use Microsoft BackOffice to connect your enterprise to the Internet.

Chapter 9, "Understanding the Internet," provides a brief introduction to the Internet and how it has changed the way people think of information technology. It also provides a basic understanding of what it means to your organization to embrace the Internet, and surveys how BackOffice can make your excursion into the Internet world a success.

Chapter 10, "Preparing for Internet Information Server," discusses the planning steps you must take before installing the Internet Information Server (IIS) to ensure that your Internet connectivity solution is robust, cost-effective, and correct and serves the needs of your organization.

Chapter 11, "Implementing Internet Information Server," provides detailed information to help you set up an IIS server for your enterprise, configure services on your IIS server, and learn to use the Internet Service Manager for managing your enterprise IIS servers. It also discusses IIS security features, how to set up a secure IIS infrastructure, how to create content for your IIS services, and how to publish information for use by your enterprise users and the Internet community.

Part IV

Part IV, "Exchange Server," describes how to set up the groupware and messaging subsystem of BackOffice.

Chapter 12, "Understanding Exchange Server," explores the capabilities of Exchange Server. Discussion focuses on what Exchange Server really is and what you should do with it. The chapter also surveys the features of Exchange Server and provides an overview of the various Exchange Server elements.

Chapter 13, "Implementing Exchange Server," looks at how to size your server, install Exchange Server using the Exchange Setup program, use the Exchange Administrator program to configure your site and set up the mail boxes, and use the Exchange Server security features.

Chapter 14, "Using Exchange Client Applications," explores the client applications that come with Exchange Server, describes how to install the client software and use it to manage your personal messaging and scheduling needs, surveys the features of the Exchange Client that are particularly suited for remote users, and discusses the use of Schedule+ to manage a shared contact list.

Chapter 15, "Managing Information with Exchange Server," explores the techniques used to create public folders, discusses the basics of implementing and using public folders, describes how to replicate them to other servers to balance the user load and make best use of available network bandwidth, and details how to replicate directory information across all servers in your organization.

Chapter 16, "Exchange Server Advanced Topics," details how to install and use the Advanced Security features that compliment the security already provided by Windows NT, how to install and use connectors for sending and receiving messages with Microsoft Mail (PC) users and the vast community attached to the Internet, and how to migrate mailboxes from a Microsoft Mail system.

Part V

Part V, "SQL Server," provides detailed information on understanding, installing, configuring, and tuning the database server portion of BackOffice.

Chapter 17, "Understanding SQL Server," provides background information on SQL Server, relational database management systems (RDBMS), the role of the database administrator (DBA), designing databases, and the tools provided to manage SQL Server. This background information will form a critical foundation as you install SQL Server, create databases, and begin to use SQL Server as an important product for building client-server applications.

Chapter 18, "Building Your SQL Server," provides guidance on selecting appropriate server hardware; describes how SQL Server allocates and uses disk storage; discusses the installation options you must decide on for your installation to be a success; and details procedures for installing SQL Server, defining devices, defining databases, defining various database objects, and using the SQL Enterprise Manager to create login IDs and user names.

Chapter 19, "Maintaining SQL Server," discusses the various things you need to know to keep SQL Server running properly. Included in the discussion are some techniques for monitoring the health of SQL Server and some proactive steps you can take to ensure that no problems arise. Procedures for importing and exporting data are also discussed.

Chapter 20, "SQL Server Advanced Topics," explores data replication, the new Microsoft Distributed Transaction Coordinator, and a few techniques for resolving problems that may occur. Although these advanced topics are not required for every SQL Server installation, they can be powerful additions to your SQL Server Administrator knowledge base.

Part VI

Part VI, "SNA Server," profiles the Systems Network Architecture (SNA) and details procedures for installing, configuring, and managing SNA Server elements.

Chapter 21, "SNA Server Preparation and Installation," provides an overview of IBM's SNA and Microsoft's SNA Server to include a brief survey of some of its more important features. It then acquaints you with the recommended installation preparation actions and details the steps necessary to install SNA Server using SNA Server Setup. Finally, the chapter outlines some common post-installation uses of SNA Server Setup.

Chapter 22, "Building SNA Server," covers the concepts and procedures for configuring the SNA Server and also for configuring the SNA Server-to-host connections. It includes detailed step-by-step procedures for configuring Synchronous Data Link Control (SDLC), 802.2, X.25, and Channel connections.

Chapter 23, "Implementing SNA Server," explores the concepts and procedures necessary to configure the logical units (LUs), group the LUs into pools, assign LU pools to users and groups, and configure downstream connections.

Chapter 24, "The Role of the SNA Server Administrator," explores the SNA Server Administrator functions in detail and, where appropriate, outlines the step-by-step procedures necessary to perform specific tasks associated with them. Functions covered include managing connectivity-to-host computer resources, managing access to SNA Server and host resources, and diagnosing problems.

Part VII

Part VII, "Systems Management Server (SMS)," enhances your understanding of what SMS is and why it is needed, and provides details on remote application installation, metering, and hardware and software inventory management.

Chapter 25, "Preparing for SMS," discusses what is meant by the term "systems management," explores the key features of Microsoft SMS, and describes how this product can be used to address systems management requirements for an enterprise-wide network. It also surveys the various roles servers play in an SMS environment and the work they perform.

Chapter 26, "Implementing SMS," describes how to set up SMS on your network and use it to make you more productive as an administrator. Detailed information is provided to help you set up a primary site server for your central site, install other primary site servers and secondary site servers, and implement the site relationships. It also discusses procedures for adding logon servers and clients to a site and provides an overview of the basics of defining packages and jobs.

Chapter 27, "The Role of the SMS Administrator," describes some of the more advanced features of SMS and how to automate the process of software distribution and installation. SMS Security is reviewed, as well as accessing SMS from remote locations using dial-up lines. The Help Desk features of SMS are explored, and the Network Monitor protocol analysis tool is examined. Some techniques for monitoring and troubleshooting SMS are also discussed.

Part VIII

Part VIII, "Using Microsoft BackOffice to Get Work Done," discusses important real-world BackOffice issues such as security, applications development, and proactive administration of networks.

Chapter 28, "Implementing Real-World Security," provides an overview of the field of security, recommends an approach to evaluating your organization's needs, and describes how to implement a system that meets your requirements. It discusses certain types of products and concepts from a broad perspective rather than from a detailed one because products will change and a targeted focus may invite overlooking other important security areas that may be weak.

Chapter 29, "Building Applications with Microsoft BackOffice," examines how BackOffice is applied to real-world situations. It is intended to aid information systems managers and administrators in understanding what BackOffice means to application development and deployment, and with the help of some application scenarios, highlights some important aspects of BackOffice with respect to application implementation.

Chapter 30, "Proactive Network Administration," discusses how to aggressively work as a network administrator to avoid problems. It helps you to develop an approach to network and server management that will catch most problems before the user community has felt any significant impact.

Part IX

Part IX contains an appendix that provides blank copies of forms that are useful in gathering and organizing SNA Server installation planning data.

Conventions Used in This Book

This book assumes that you are already familiar with the graphical user interface used in Windows-based applications. As such, no attempt has been made to describe "how" to select or choose various options in the dialog boxes discussed throughout this book. Instead, the terms click, select, choose, highlight, activate, disable, and turn on/off have been used to describe the process of positioning the cursor over a dialog box element (radio button, check box, command button, drop-down list arrow, and so on) and clicking a mouse button. Those familiar with using the keyboard to select various dialog box options may relate this selection process to keystrokes instead of mouse clicks. Either method is equally acceptable.

Tips, notes, cautions, warnings, and troubleshooting annotations, used generously throughout the book, appear in specially formatted boxes to make this important information easier to locate. References to paragraph headings that have appeared previously in the book or that will follow later in the book, generally are annotated as cross-references and appear near the text to which they pertain.

At times, you may be required to press keyboard keys in selected combinations to activate a command or cause a selected display window to appear. When these situations occur, you see the key combinations described in a couple of different ways. When two or more keys need to be depressed simultaneously, a plus sign (+) is used to combine the keys. For example, if the Alt and Tab keys need to be pressed simultaneously, you would see the annotation Alt+Tab. Likewise, if the Ctrl and Y keys need to be pressed simultaneously, it would be annotated Ctrl+Y. When keys need to be depressed in a certain sequence with no intervening actions, a comma (,) is used as a separator.


Table of Contents

Welcome!

01 - Understanding Microsoft BackOffice