E-Book, Englisch, 352 Seiten
Hunter Active Directory Field Guide
1. ed
ISBN: 978-1-4302-0030-7
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 352 Seiten
ISBN: 978-1-4302-0030-7
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
* Task-based, advanced solutions * Discusses non-traditional or out-of-band solutions * Written from real-world knowledge * Focuses on solutions relevant to consultants
Laura E. Hunter is a senior information technology specialist at the University of Pennsylvania. She has co-authored or technically reviewed 10 books on Microsoft technologies, and she has written numerous articles for TechTarget.com and Microsoft Certified Professional Magazine. For a complete list of her work experience and publications, see www.laurahcomputing.com.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents at a Glance;6
2;Contents;8
3;About the Author;12
4;About the Technical Reviewer;14
5;Acknowledgments;16
6;Introduction;18
7;CHAPTER 1 Installing Active Directory;21
7.1;Planning Your Active Directory Installation;22
7.1.1;Creating the Logical Structure;22
7.1.2;Creating the Physical Design;32
7.2;Installing Active Directory;40
7.3;Automating the Installation Process;44
7.3.1;Scripting the AD Installation;44
7.3.2;Scripting a Bare Metal Install;49
7.4;Troubleshooting Active Directory Installations;51
7.4.1;Troubleshooting Network Connectivity;51
7.4.2;Troubleshooting Name Resolution;53
7.5;Summary;56
7.6;Additional Resources;57
8;CHAPTER 2 Integrating the Network Infrastructure;59
8.1;Deploying DNS;60
8.1.1;Creating the DNS Infrastructure;64
8.1.2;Configuring Forwarders;69
8.1.3;Securing DNS;72
8.1.4;Integrating with Third-Party DNS;76
8.2;Using DHCP;77
8.2.1;Installing DHCP;79
8.2.2;Configuring DHCP Scopes;79
8.2.3;Integrating DHCP with DNS;86
8.3;Supporting WINS and NetBIOS;88
8.3.1;Installing a WINS Server;89
8.3.2;Specifying Client Options for WINS;91
8.3.3;Configuring WINS Replication;92
8.4;Summary;95
8.5;Additional Resources;96
9;CHAPTER 3 Daily Administration;97
9.1;Managing Users;98
9.1.1;Creating Users;98
9.1.2;Performing Bulk Operations;101
9.1.3;Configuring User Accounts;104
9.1.4;Delegating Administrative Authority;112
9.2;Managing Groups;114
9.2.1;Configuring Groups;115
9.2.2;Leveraging Group Nesting;117
9.2.3;Creating Groups;119
9.3;Managing User Files;120
9.3.1;Configuring User Profiles;120
9.3.2;Configuring EFS;128
9.3.3;Recovering Encrypted Files;129
9.4;Summary;131
9.5;Additional Resources;131
10;CHAPTER 4 Deploying Group Policy;133
10.1;Group Policy Management Console;134
10.1.1;Migrating Group Policy Settings;137
10.1.2;Modeling Group Policy;139
10.1.3;Monitoring Group Policy Results;140
10.2;Who Gets What? Deploying Group Policies;140
10.2.1;Using Organizational Units;140
10.2.2;Configuring Policy Inheritance;141
10.2.3;Customizing Policy Inheritance;142
10.3;Controlling the Desktop;145
10.3.1;Configuring Lockdown (Kiosk) Workstations;146
10.3.2;Using Software Restriction Policies;147
10.3.3;Securing Client Operating Systems;154
10.4;Configuring Software Deployment;161
10.4.1;Creating an Installation Package;161
10.4.2;Understanding Deployment Options;162
10.5;Using Advanced Techniques;165
10.5.1;Controlling the Registry and File System;166
10.5.2;Using Restricted Groups;167
10.6;Summary;167
10.7;Additional Resources;168
11;CHAPTER 5 Active Directory Security;169
11.1;Using IP Security;170
11.1.1;Understanding IP Security Vulnerabilities;170
11.1.2;Creating an IPSec Policy;172
11.1.3;Managing IPSec from the Command Line;177
11.1.4;Strengthening TCP/IP Stack Security;181
11.2;Securing Domain Controllers;184
11.2.1;Configuring User Rights;189
11.2.2;Enabling Restricted Groups;191
11.2.3;Configuring Authentication Protocols;193
11.2.4;Controlling Anonymous Access to Active Directory;195
11.3;Creating an Audit Policy;196
11.3.1;Monitoring User Activity;200
11.3.2;Collecting Auditing Information;201
11.4;Summary;204
11.5;Additional Resources;204
12;CHAPTER 6 Managing Large-Scale Deployments;207
12.1;Managing Multiple Domains and Forests;207
12.1.1;Delegating Authority;208
12.1.2;Managing Trust Relationships;213
12.2;Managing Active Directory Sites;222
12.2.1;Configuring Replication;225
12.2.2;Using Application Directory Partitions;232
12.2.3;Troubleshooting Replication Issues;234
12.3;Summary;237
12.4;Additional Resource;238
13;CHAPTER 7 Active Directory Migrations;239
13.1;Upgrading from Windows NT 4.0;240
13.1.1;Performing In-Place Upgrades;241
13.2;Restructuring an NT 4.0 Environment;254
13.2.1;Securing the Migration Process;256
13.2.2;Migrating User Profiles;258
13.2.3;Using the Active Directory Migration Tool;259
13.3;Migration Scenarios;260
13.3.1;Performing an Interforest Migration;262
13.4;Summary;270
13.5;Additional Resources;270
14;CHAPTER 8 Disaster Recovery;271
14.1;Troubleshooting System Startup;272
14.1.1;Using Alternate Startup Modes;272
14.1.2;Using the Recovery Console;275
14.2;Backing Up and Restoring Active Directory;278
14.2.1;Using Windows Backup;279
14.2.2;Using Automated System Recovery;280
14.2.3;Performing Active Directory Restores;283
14.3;Creating a Test Network;295
14.4;Summary;300
14.5;Additional Resources;300
15;CHAPTER 9 Scripting and Schem(a)ing;301
15.1;So What’s This Schema Business (and Why Do I Care)?;302
15.1.1;Using Active Directory Application Mode;314
15.2;A Scripting Primer;319
15.2.1;Getting Started;319
15.2.2;More Scripting Tricks to Make Your Life Better;330
15.3;Summary;337
15.4;Additional Resources;337
16;Index;339




