Hunter | Active Directory Field Guide | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 352 Seiten

Hunter Active Directory Field Guide


1. ed
ISBN: 978-1-4302-0030-7
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 352 Seiten

ISBN: 978-1-4302-0030-7
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark



* Task-based, advanced solutions * Discusses non-traditional or out-of-band solutions * Written from real-world knowledge * Focuses on solutions relevant to consultants

Laura E. Hunter is a senior information technology specialist at the University of Pennsylvania. She has co-authored or technically reviewed 10 books on Microsoft technologies, and she has written numerous articles for TechTarget.com and Microsoft Certified Professional Magazine. For a complete list of her work experience and publications, see www.laurahcomputing.com.

Hunter Active Directory Field Guide jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Contents at a Glance;6
2;Contents;8
3;About the Author;12
4;About the Technical Reviewer;14
5;Acknowledgments;16
6;Introduction;18
7;CHAPTER 1 Installing Active Directory;21
7.1;Planning Your Active Directory Installation;22
7.1.1;Creating the Logical Structure;22
7.1.2;Creating the Physical Design;32
7.2;Installing Active Directory;40
7.3;Automating the Installation Process;44
7.3.1;Scripting the AD Installation;44
7.3.2;Scripting a Bare Metal Install;49
7.4;Troubleshooting Active Directory Installations;51
7.4.1;Troubleshooting Network Connectivity;51
7.4.2;Troubleshooting Name Resolution;53
7.5;Summary;56
7.6;Additional Resources;57
8;CHAPTER 2 Integrating the Network Infrastructure;59
8.1;Deploying DNS;60
8.1.1;Creating the DNS Infrastructure;64
8.1.2;Configuring Forwarders;69
8.1.3;Securing DNS;72
8.1.4;Integrating with Third-Party DNS;76
8.2;Using DHCP;77
8.2.1;Installing DHCP;79
8.2.2;Configuring DHCP Scopes;79
8.2.3;Integrating DHCP with DNS;86
8.3;Supporting WINS and NetBIOS;88
8.3.1;Installing a WINS Server;89
8.3.2;Specifying Client Options for WINS;91
8.3.3;Configuring WINS Replication;92
8.4;Summary;95
8.5;Additional Resources;96
9;CHAPTER 3 Daily Administration;97
9.1;Managing Users;98
9.1.1;Creating Users;98
9.1.2;Performing Bulk Operations;101
9.1.3;Configuring User Accounts;104
9.1.4;Delegating Administrative Authority;112
9.2;Managing Groups;114
9.2.1;Configuring Groups;115
9.2.2;Leveraging Group Nesting;117
9.2.3;Creating Groups;119
9.3;Managing User Files;120
9.3.1;Configuring User Profiles;120
9.3.2;Configuring EFS;128
9.3.3;Recovering Encrypted Files;129
9.4;Summary;131
9.5;Additional Resources;131
10;CHAPTER 4 Deploying Group Policy;133
10.1;Group Policy Management Console;134
10.1.1;Migrating Group Policy Settings;137
10.1.2;Modeling Group Policy;139
10.1.3;Monitoring Group Policy Results;140
10.2;Who Gets What? Deploying Group Policies;140
10.2.1;Using Organizational Units;140
10.2.2;Configuring Policy Inheritance;141
10.2.3;Customizing Policy Inheritance;142
10.3;Controlling the Desktop;145
10.3.1;Configuring Lockdown (Kiosk) Workstations;146
10.3.2;Using Software Restriction Policies;147
10.3.3;Securing Client Operating Systems;154
10.4;Configuring Software Deployment;161
10.4.1;Creating an Installation Package;161
10.4.2;Understanding Deployment Options;162
10.5;Using Advanced Techniques;165
10.5.1;Controlling the Registry and File System;166
10.5.2;Using Restricted Groups;167
10.6;Summary;167
10.7;Additional Resources;168
11;CHAPTER 5 Active Directory Security;169
11.1;Using IP Security;170
11.1.1;Understanding IP Security Vulnerabilities;170
11.1.2;Creating an IPSec Policy;172
11.1.3;Managing IPSec from the Command Line;177
11.1.4;Strengthening TCP/IP Stack Security;181
11.2;Securing Domain Controllers;184
11.2.1;Configuring User Rights;189
11.2.2;Enabling Restricted Groups;191
11.2.3;Configuring Authentication Protocols;193
11.2.4;Controlling Anonymous Access to Active Directory;195
11.3;Creating an Audit Policy;196
11.3.1;Monitoring User Activity;200
11.3.2;Collecting Auditing Information;201
11.4;Summary;204
11.5;Additional Resources;204
12;CHAPTER 6 Managing Large-Scale Deployments;207
12.1;Managing Multiple Domains and Forests;207
12.1.1;Delegating Authority;208
12.1.2;Managing Trust Relationships;213
12.2;Managing Active Directory Sites;222
12.2.1;Configuring Replication;225
12.2.2;Using Application Directory Partitions;232
12.2.3;Troubleshooting Replication Issues;234
12.3;Summary;237
12.4;Additional Resource;238
13;CHAPTER 7 Active Directory Migrations;239
13.1;Upgrading from Windows NT 4.0;240
13.1.1;Performing In-Place Upgrades;241
13.2;Restructuring an NT 4.0 Environment;254
13.2.1;Securing the Migration Process;256
13.2.2;Migrating User Profiles;258
13.2.3;Using the Active Directory Migration Tool;259
13.3;Migration Scenarios;260
13.3.1;Performing an Interforest Migration;262
13.4;Summary;270
13.5;Additional Resources;270
14;CHAPTER 8 Disaster Recovery;271
14.1;Troubleshooting System Startup;272
14.1.1;Using Alternate Startup Modes;272
14.1.2;Using the Recovery Console;275
14.2;Backing Up and Restoring Active Directory;278
14.2.1;Using Windows Backup;279
14.2.2;Using Automated System Recovery;280
14.2.3;Performing Active Directory Restores;283
14.3;Creating a Test Network;295
14.4;Summary;300
14.5;Additional Resources;300
15;CHAPTER 9 Scripting and Schem(a)ing;301
15.1;So What’s This Schema Business (and Why Do I Care)?;302
15.1.1;Using Active Directory Application Mode;314
15.2;A Scripting Primer;319
15.2.1;Getting Started;319
15.2.2;More Scripting Tricks to Make Your Life Better;330
15.3;Summary;337
15.4;Additional Resources;337
16;Index;339



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.