Table of Contents xvii
Troubleshooting by using Health Analyzer ................................. 676
Timer jobs ............................................................. 676
Search diagnostics ......................................................678
Developer Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
Usage and storage monitoring tools at the site-collection level...............683
Additional troubleshooting tools ...............................................684
MIISClient..............................................................685
Wireshark..............................................................686
Fiddler.................................................................687
SharePoint Manager 2013 ...............................................687
Feature Admin Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Klist and Kerbtray .......................................................689
Summary....................................................................691
Chapter 19: Understanding and conguring security 693
Overview of SharePoint 2013 security...........................................694
Security and least privileges..............................................694
Farm security ................................................................695
Managed accounts......................................................699
Unmanaged accounts ................................................... 701
Auditing farm-level changes ............................................. 701
Farm-level user-license enforcement ...................................... 702
Designing extranet farm security ......................................... 702
Designing SharePoint Online security .....................................704
Network security .............................................................705
Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Internet Protocol security ................................................706
Request Management ...................................................707
Database security ............................................................707
Database roles .........................................................707
Web application pool account security .................................... 708
Database administrator security .......................................... 708
Backup security......................................................... 709
Database and le encryption .............................................709
Service application security....................................................711
Search security ......................................................... 711
Secure Store............................................................712
BCS ...................................................................712
User Prole services .....................................................712
Web application security ......................................................713
Authentication providers ................................................ 713
Claims-based authentication ............................................. 714
ADFS 2.0............................................................... 715
Web application access policies........................................... 715
SSL.................................................................... 716
App Model security .......................................................... 717
OAuth 2.0.............................................................. 717