Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Active Directory Field Guide (eBook)

(Autor)

eBook Download: PDF
2006 | 1st ed.
XX, 352 Seiten
Apress (Verlag)
978-1-4302-0030-7 (ISBN)

Lese- und Medienproben

Active Directory Field Guide - Beau Hunter
Systemvoraussetzungen
32,09 inkl. MwSt
(CHF 31,35)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

* Task-based, advanced solutions

* Discusses non-traditional or out-of-band solutions

* Written from real-world knowledge

* Focuses on solutions relevant to consultants



Laura E. Hunter is a senior information technology specialist at the University of Pennsylvania. She has co-authored or technically reviewed 10 books on Microsoft technologies, and she has written numerous articles for TechTarget.com and Microsoft Certified Professional Magazine. For a complete list of her work experience and publications, see www.laurahcomputing.com.
Active Directory Field Guide is ideal for Windows and Active Directory administrators and consultants. It contains valuable descriptions of higher-level skills, tasks, and tools, including migration, large-scale deployment, security, and disaster recovery, and provides bold, nontraditional solutions.Author Laura E. Hunter is a Microsoft "e;Most Valuable Professional,"e; and this book is based on her real-world knowledge. It will help you save time and increase your network efficiency. Full of task-based, advanced solutions, it will also function as an indispensable reference guide.

Laura E. Hunter is a senior information technology specialist at the University of Pennsylvania. She has co-authored or technically reviewed 10 books on Microsoft technologies, and she has written numerous articles for TechTarget.com and Microsoft Certified Professional Magazine. For a complete list of her work experience and publications, see www.laurahcomputing.com.

Contents at a Glance 6
Contents 8
About the Author 12
About the Technical Reviewer 14
Acknowledgments 16
Introduction 18
CHAPTER 1 Installing Active Directory 21
Planning Your Active Directory Installation 22
Creating the Logical Structure 22
Creating the Physical Design 32
Installing Active Directory 40
Automating the Installation Process 44
Scripting the AD Installation 44
Scripting a Bare Metal Install 49
Troubleshooting Active Directory Installations 51
Troubleshooting Network Connectivity 51
Troubleshooting Name Resolution 53
Summary 56
Additional Resources 57
CHAPTER 2 Integrating the Network Infrastructure 59
Deploying DNS 60
Creating the DNS Infrastructure 64
Configuring Forwarders 69
Securing DNS 72
Integrating with Third-Party DNS 76
Using DHCP 77
Installing DHCP 79
Configuring DHCP Scopes 79
Integrating DHCP with DNS 86
Supporting WINS and NetBIOS 88
Installing a WINS Server 89
Specifying Client Options for WINS 91
Configuring WINS Replication 92
Summary 95
Additional Resources 96
CHAPTER 3 Daily Administration 97
Managing Users 98
Creating Users 98
Performing Bulk Operations 101
Configuring User Accounts 104
Delegating Administrative Authority 112
Managing Groups 114
Configuring Groups 115
Leveraging Group Nesting 117
Creating Groups 119
Managing User Files 120
Configuring User Profiles 120
Configuring EFS 128
Recovering Encrypted Files 129
Summary 131
Additional Resources 131
CHAPTER 4 Deploying Group Policy 133
Group Policy Management Console 134
Migrating Group Policy Settings 137
Modeling Group Policy 139
Monitoring Group Policy Results 140
Who Gets What? Deploying Group Policies 140
Using Organizational Units 140
Configuring Policy Inheritance 141
Customizing Policy Inheritance 142
Controlling the Desktop 145
Configuring Lockdown (Kiosk) Workstations 146
Using Software Restriction Policies 147
Securing Client Operating Systems 154
Configuring Software Deployment 161
Creating an Installation Package 161
Understanding Deployment Options 162
Using Advanced Techniques 165
Controlling the Registry and File System 166
Using Restricted Groups 167
Summary 167
Additional Resources 168
CHAPTER 5 Active Directory Security 169
Using IP Security 170
Understanding IP Security Vulnerabilities 170
Creating an IPSec Policy 172
Managing IPSec from the Command Line 177
Strengthening TCP/IP Stack Security 181
Securing Domain Controllers 184
Configuring User Rights 189
Enabling Restricted Groups 191
Configuring Authentication Protocols 193
Controlling Anonymous Access to Active Directory 195
Creating an Audit Policy 196
Monitoring User Activity 200
Collecting Auditing Information 201
Summary 204
Additional Resources 204
CHAPTER 6 Managing Large-Scale Deployments 207
Managing Multiple Domains and Forests 207
Delegating Authority 208
Managing Trust Relationships 213
Managing Active Directory Sites 222
Configuring Replication 225
Using Application Directory Partitions 232
Troubleshooting Replication Issues 234
Summary 237
Additional Resource 238
CHAPTER 7 Active Directory Migrations 239
Upgrading from Windows NT 4.0 240
Performing In-Place Upgrades 241
Restructuring an NT 4.0 Environment 254
Securing the Migration Process 256
Migrating User Profiles 258
Using the Active Directory Migration Tool 259
Migration Scenarios 260
Performing an Interforest Migration 262
Summary 270
Additional Resources 270
CHAPTER 8 Disaster Recovery 271
Troubleshooting System Startup 272
Using Alternate Startup Modes 272
Using the Recovery Console 275
Backing Up and Restoring Active Directory 278
Using Windows Backup 279
Using Automated System Recovery 280
Performing Active Directory Restores 283
Creating a Test Network 295
Summary 300
Additional Resources 300
CHAPTER 9 Scripting and Schem(a)ing 301
So What’s This Schema Business (and Why Do I Care)? 302
Using Active Directory Application Mode 314
A Scripting Primer 319
Getting Started 319
More Scripting Tricks to Make Your Life Better 330
Summary 337
Additional Resources 337
Index 339

Erscheint lt. Verlag 3.11.2006
Zusatzinfo XX, 352 p.
Verlagsort Berkeley
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Software Entwicklung
Schlagworte Active Directory • Administration • Deployment • Installation • Scripting • security • WINDOWS
ISBN-10 1-4302-0030-8 / 1430200308
ISBN-13 978-1-4302-0030-7 / 9781430200307
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Wolfram Langer

eBook Download (2023)
Rheinwerk Computing (Verlag)
CHF 48,75
der Grundkurs für Ausbildung und Praxis

von Ralf Adams

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
CHF 29,30