Preface |
|
xxv | |
Part I: Getting Started |
|
1 | (96) |
|
Introduction to Active Directory |
|
|
3 | (38) |
|
|
4 | (1) |
|
Introduction to Directory Services |
|
|
4 | (11) |
|
Directory Enabled Networks |
|
|
5 | (1) |
|
History of the Directory Service |
|
|
6 | (5) |
|
What Is in a Directory Service? |
|
|
11 | (2) |
|
|
13 | (2) |
|
Directory Service Domino Effect |
|
|
15 | (1) |
|
Introduction to Active Directory |
|
|
15 | (5) |
|
|
16 | (1) |
|
Protocol Interoperability |
|
|
17 | (1) |
|
Single Point of Administration |
|
|
18 | (2) |
|
Active Directory Architecture |
|
|
20 | (12) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Viewing Trust Relationships |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (3) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
Frequently Asked Questions |
|
|
39 | (2) |
|
Assessing Your Environment |
|
|
41 | (32) |
|
|
42 | (1) |
|
Defining Your Business Objectives |
|
|
43 | (9) |
|
Matching Business Objectives to Technology |
|
|
45 | (2) |
|
Business Objectives That Active Directory Will Meet |
|
|
47 | (3) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Assessing Your Current Environment |
|
|
52 | (7) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Peripherals and Mobile Devices |
|
|
57 | (1) |
|
|
58 | (1) |
|
Gathering Information for Your Active Directory Planning and Design |
|
|
59 | (2) |
|
|
59 | (1) |
|
Organizational and Network Infrastructures That Impact Active Directory Planning and Design |
|
|
59 | (2) |
|
Planning for Your Implementation |
|
|
61 | (7) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
Gap Analysis of Business Objectives and Current Environment |
|
|
65 | (1) |
|
|
66 | (2) |
|
|
68 | (1) |
|
|
68 | (2) |
|
Frequently Asked Questions |
|
|
70 | (3) |
|
Active Directory for Windows 2000 JumpStart Tutorial |
|
|
73 | (24) |
|
|
74 | (1) |
|
What Active Directory Is, and Why You Need to Know About It |
|
|
74 | (3) |
|
|
75 | (1) |
|
Policy-Based Administration |
|
|
76 | (1) |
|
Decentralized Administration |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (10) |
|
Scalability of Forests, Domains, Organizational Units, and Sites |
|
|
78 | (2) |
|
Extensibility of the Schema |
|
|
80 | (2) |
|
Multi-Master Domain Controllers |
|
|
82 | (1) |
|
|
82 | (2) |
|
|
84 | (1) |
|
Use of Standard Protocols |
|
|
85 | (1) |
|
Accessibility of Resources |
|
|
86 | (1) |
|
Industries and Companies Affected by Windows 2000 |
|
|
87 | (3) |
|
Technology Vendors and Partners |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
And. . . Microsoft Itself |
|
|
90 | (1) |
|
Advantages and Disadvantages of Active Directory |
|
|
90 | (3) |
|
Advantages with Active Directory |
|
|
90 | (1) |
|
Problems with Active Directory |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
93 | (2) |
|
Frequently Asked Questions |
|
|
95 | (2) |
Part II: Designing the Active Directory |
|
97 | (134) |
|
DNS and Naming Strategies |
|
|
99 | (36) |
|
|
100 | (1) |
|
|
101 | (5) |
|
|
104 | (2) |
|
Active Directory's Integration with DNS |
|
|
106 | (7) |
|
How Active Directory Uses DNS |
|
|
108 | (4) |
|
|
112 | (1) |
|
Planning Active Directory and DNS |
|
|
113 | (10) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (8) |
|
|
125 | (2) |
|
|
127 | (1) |
|
Naming Conventions for Active Directory |
|
|
127 | (2) |
|
Migrating an Existing Exchange Server Design |
|
|
129 | (1) |
|
Migrating an Existing Novell Directory Services Design |
|
|
129 | (2) |
|
|
131 | (1) |
|
|
132 | (1) |
|
Frequently Asked Questions |
|
|
133 | (2) |
|
Designing the Basic Structure |
|
|
135 | (30) |
|
|
136 | (4) |
|
|
136 | (1) |
|
|
136 | (2) |
|
|
138 | (2) |
|
|
140 | (3) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (5) |
|
|
145 | (1) |
|
|
146 | (2) |
|
Designing an Organizational Unit Structure |
|
|
148 | (2) |
|
|
148 | (2) |
|
|
150 | (1) |
|
Designing a Site Topology |
|
|
150 | (4) |
|
|
152 | (1) |
|
|
152 | (2) |
|
Using OUs for Delegating Administration |
|
|
154 | (6) |
|
OU Objects in Active Directory |
|
|
155 | (1) |
|
|
155 | (1) |
|
Delegating Administration |
|
|
155 | (5) |
|
|
160 | (1) |
|
|
161 | (2) |
|
Frequently Asked Questions |
|
|
163 | (2) |
|
Designing a Site Structure |
|
|
165 | (32) |
|
|
166 | (1) |
|
The Function of Sites in Active Directory |
|
|
167 | (4) |
|
|
170 | (1) |
|
Replicated Active Directory Components |
|
|
171 | (3) |
|
|
171 | (1) |
|
|
171 | (2) |
|
Schema and Configuration Containers |
|
|
173 | (1) |
|
Site Replication Components |
|
|
174 | (6) |
|
|
174 | (1) |
|
Knowledge Consistency Checker |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (1) |
|
Replication in Active Directory |
|
|
180 | (7) |
|
|
181 | (6) |
|
Planning a Site Structure |
|
|
187 | (5) |
|
Placing Domain Controllers |
|
|
190 | (1) |
|
Where to Place Global Catalog Servers |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
Frequently Asked Questions |
|
|
194 | (3) |
|
|
197 | (34) |
|
|
198 | (2) |
|
|
198 | (2) |
|
Assessing a Corporate Network |
|
|
200 | (8) |
|
Determining the Business Objectives |
|
|
200 | (1) |
|
Kings Vineyard's Business Objectives |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
204 | (2) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
208 | (2) |
|
Determining Domain and Tree Structure |
|
|
210 | (4) |
|
Planning the OU Structure |
|
|
214 | (8) |
|
|
214 | (1) |
|
|
215 | (2) |
|
|
217 | (5) |
|
|
222 | (1) |
|
Establishing the Initial Sites |
|
|
222 | (5) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (2) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (2) |
|
Frequently Asked Questions |
|
|
229 | (2) |
Part III: Installing Active Directory |
|
231 | (160) |
|
Migrating from NT 3.51 or NT 4 to Active Directory |
|
|
233 | (42) |
|
|
234 | (1) |
|
Server Migration Strategies |
|
|
235 | (14) |
|
Primary Domain Controllers |
|
|
243 | (2) |
|
Changes Required When Upgrading a Domain Controller |
|
|
245 | (1) |
|
Backup Domain Controllers |
|
|
246 | (2) |
|
|
248 | (1) |
|
Promoting Member Servers with Dcpromo |
|
|
248 | (1) |
|
Upgrading with the Windows 2000 Setup Wizard |
|
|
249 | (2) |
|
Installing Active Directory Services |
|
|
251 | (6) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (7) |
|
Using Organizational Units to Create a Hierarchical Structure |
|
|
258 | (2) |
|
|
260 | (1) |
|
|
261 | (1) |
|
Active Directory Migration Tool |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
|
Delegating Administrative Authority |
|
|
264 | (1) |
|
Insert into the Replication Topology |
|
|
265 | (1) |
|
Upgrading Clients to Windows 2000 Professional |
|
|
266 | (3) |
|
|
269 | (2) |
|
|
271 | (2) |
|
Frequently Asked Questions |
|
|
273 | (2) |
|
|
275 | (42) |
|
|
276 | (1) |
|
|
277 | (7) |
|
|
277 | (2) |
|
Windows 2000 DNS Installation |
|
|
279 | (1) |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
282 | (2) |
|
Service Resource Record Registration |
|
|
284 | (1) |
|
Installing Domains in Active Directory |
|
|
284 | (14) |
|
Active Directory Sizer Tool |
|
|
285 | (1) |
|
The First Domain Controller |
|
|
285 | (4) |
|
|
289 | (9) |
|
Integrating DNS into Active Directory |
|
|
298 | (2) |
|
Active Directory Integrated Zones |
|
|
299 | (1) |
|
Managing Objects in Active Directory |
|
|
300 | (8) |
|
Creating Organizational Units |
|
|
300 | (1) |
|
|
301 | (2) |
|
|
303 | (2) |
|
|
305 | (1) |
|
|
306 | (2) |
|
|
308 | (1) |
|
Role-Based Administration |
|
|
308 | (3) |
|
Microsoft Management Console |
|
|
308 | (1) |
|
|
309 | (2) |
|
|
311 | (1) |
|
|
312 | (2) |
|
Frequently Asked Questions |
|
|
314 | (3) |
|
Building Trees and Forests |
|
|
317 | (30) |
|
|
318 | (1) |
|
Understanding the Characteristics of an Active Directory Forest |
|
|
319 | (10) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (2) |
|
|
322 | (1) |
|
|
323 | (1) |
|
Transitive Bidirectional Trust |
|
|
323 | (1) |
|
Trusts That Cross Forests |
|
|
324 | (1) |
|
|
325 | (4) |
|
Implementing the Forest Structure |
|
|
329 | (5) |
|
The Domain Tree Structure |
|
|
331 | (2) |
|
|
333 | (1) |
|
Right-Sizing the Active Directory Storage Space |
|
|
334 | (4) |
|
|
338 | (4) |
|
|
342 | (1) |
|
|
343 | (2) |
|
Frequently Asked Questions |
|
|
345 | (2) |
|
|
347 | (22) |
|
|
348 | (1) |
|
|
348 | (8) |
|
|
348 | (2) |
|
Creating Connection Objects |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (3) |
|
Creating Site Link Bridges |
|
|
355 | (1) |
|
The Knowledge Consistency Checker |
|
|
356 | (1) |
|
Implementing a Site Structure in Active Directory |
|
|
356 | (5) |
|
|
361 | (1) |
|
|
361 | (1) |
|
Replication Administrator |
|
|
362 | (1) |
|
|
362 | (1) |
|
Understanding Time Synchronization |
|
|
362 | (2) |
|
|
364 | (1) |
|
|
365 | (2) |
|
Frequently Asked Questions |
|
|
367 | (2) |
|
Implementing Active Directory: A Case Study |
|
|
369 | (22) |
|
|
370 | (5) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
370 | (3) |
|
|
373 | (1) |
|
|
373 | (2) |
|
|
375 | (2) |
|
Implementing the First Domain Controller |
|
|
377 | (5) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
379 | (2) |
|
Creating an Explicit Trust |
|
|
381 | (1) |
|
|
382 | (2) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (2) |
|
|
386 | (1) |
|
|
386 | (2) |
|
Frequently Asked Questions |
|
|
388 | (3) |
Part IV: Migrating Active Directory |
|
391 | (130) |
|
|
393 | (56) |
|
|
394 | (1) |
|
|
394 | (6) |
|
How Group Policies Are Applied |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (2) |
|
Group Policy Information Storage and Settings |
|
|
400 | (5) |
|
|
400 | (2) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
403 | (2) |
|
Designing a Group Policy Strategy |
|
|
405 | (3) |
|
Group Policy in WAN Environments |
|
|
406 | (2) |
|
Implementing a Group Policy Strategy |
|
|
408 | (8) |
|
Configuring Group Policy Objects |
|
|
409 | (3) |
|
Link a Group Policy Object to a Container |
|
|
412 | (1) |
|
|
413 | (3) |
|
Deploying Applications with Group Policies |
|
|
416 | (10) |
|
|
420 | (3) |
|
Keeping Groups from Growing Over Time |
|
|
423 | (1) |
|
Troubleshooting Group Policies |
|
|
424 | (1) |
|
Policy that Does Not Execute |
|
|
424 | (1) |
|
A Policy that Executes in the Wrong Way |
|
|
425 | (1) |
|
Logging On Takes a Long Time |
|
|
426 | (1) |
|
|
426 | (17) |
|
|
427 | (2) |
|
|
429 | (1) |
|
|
430 | (4) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
IP Security Policies on Active Directory |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
439 | (1) |
|
|
439 | (1) |
|
|
440 | (1) |
|
Public Key Infrastructure |
|
|
440 | (1) |
|
|
441 | (1) |
|
|
441 | (1) |
|
|
441 | (2) |
|
|
443 | (1) |
|
|
444 | (2) |
|
Frequently Asked Questions |
|
|
446 | (3) |
|
|
449 | (24) |
|
|
450 | (1) |
|
|
450 | (10) |
|
|
451 | (1) |
|
Publishing a Folder in Active Directory |
|
|
452 | (2) |
|
Browsing and Querying for Shared Folders |
|
|
454 | (3) |
|
|
457 | (1) |
|
|
457 | (1) |
|
|
458 | (1) |
|
Publishing a Printer in Active Directory |
|
|
459 | (1) |
|
Interfacing with Active Directory |
|
|
460 | (9) |
|
|
460 | (2) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
Exchange Server 5.5 Active Directory Connector |
|
|
463 | (2) |
|
|
465 | (4) |
|
|
469 | (1) |
|
|
469 | (2) |
|
Frequently Asked Questions |
|
|
471 | (2) |
|
|
473 | (28) |
|
|
474 | (1) |
|
About Objects and Attributes |
|
|
474 | (1) |
|
Planning Schema Modifications |
|
|
475 | (6) |
|
|
475 | (1) |
|
When to Modify the Schema |
|
|
476 | (1) |
|
Who Should Modify the Schema? |
|
|
476 | (2) |
|
Schema Management Console |
|
|
478 | (1) |
|
Flexible Single Master Operation |
|
|
479 | (2) |
|
|
481 | (10) |
|
|
481 | (7) |
|
|
488 | (2) |
|
System Checks after Schema Modification |
|
|
490 | (1) |
|
|
491 | (5) |
|
|
491 | (1) |
|
|
492 | (2) |
|
Querying Active Directory |
|
|
494 | (1) |
|
|
494 | (2) |
|
|
496 | (1) |
|
|
497 | (2) |
|
Frequently Asked Questions |
|
|
499 | (2) |
|
Using Active Directory: A Case Study |
|
|
501 | (20) |
|
|
502 | (2) |
|
|
502 | (2) |
|
Planning the Group Policy Solution |
|
|
504 | (3) |
|
|
505 | (1) |
|
Deciding Group Policy Application |
|
|
506 | (1) |
|
Determining What Group Policies Are Needed |
|
|
507 | (1) |
|
Implementing the Group Policy |
|
|
507 | (7) |
|
|
508 | (1) |
|
|
509 | (4) |
|
Creating the Group Policy for an OU |
|
|
513 | (1) |
|
Creating Logon/Logoff Scripts |
|
|
514 | (2) |
|
|
516 | (1) |
|
|
516 | (2) |
|
Frequently Asked Questions |
|
|
518 | (3) |
Part V: Integrating with Active Directory |
|
521 | (50) |
|
Plugging into Active Directory |
|
|
523 | (26) |
|
|
524 | (1) |
|
Microsoft's Metadirectory |
|
|
524 | (5) |
|
|
528 | (1) |
|
|
529 | (1) |
|
Microsoft's Active Directory Deployment Tools |
|
|
529 | (3) |
|
Mission Critical's Active Directory Migration Tool |
|
|
530 | (1) |
|
Deploying Active Directory-Enabled Clients |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
Quest's FastLane Technologies |
|
|
532 | (5) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
537 | (1) |
|
|
537 | (4) |
|
|
538 | (2) |
|
|
540 | (1) |
|
|
541 | (3) |
|
|
542 | (1) |
|
Mobile Information Server |
|
|
542 | (1) |
|
|
543 | (1) |
|
|
544 | (1) |
|
|
545 | (2) |
|
Frequently Asked Questions |
|
|
547 | (2) |
|
Disaster Recovery for Active Directory |
|
|
549 | (22) |
|
|
550 | (1) |
|
Modeling Sites with Disaster Recovery in Mind |
|
|
550 | (4) |
|
|
554 | (4) |
|
Uninterruptible Power Source |
|
|
554 | (1) |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
The Active Directory Database File Structure |
|
|
558 | (2) |
|
|
560 | (2) |
|
Creating an Emergency Repair Disk |
|
|
562 | (1) |
|
Recovering a Failed Domain Controller |
|
|
562 | (5) |
|
Non-Authoritative Restore versus Authoritative Restore |
|
|
563 | (1) |
|
Authoritative Restore of Deleted Objects |
|
|
563 | (1) |
|
|
564 | (2) |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
568 | (2) |
|
Frequently Asked Questions |
|
|
570 | (1) |
Appendix A Migrating from Novell NetWare |
|
571 | (4) |
|
Migrating from Novell Directory Services |
|
|
572 | (2) |
|
|
574 | (1) |
Appendix B Secrets |
|
575 | (20) |
|
Lesser-Known Management Shortcuts |
|
|
576 | (3) |
|
Upgrading DNS and Supporting DNS Dynamic Update Protocol |
|
|
576 | (1) |
|
Creating a Custom Microsoft Management Console |
|
|
576 | (1) |
|
PDC Emulation and Native Mode |
|
|
577 | (1) |
|
How Active Directory Prevents Unnecessary Replication |
|
|
578 | (1) |
|
Under-Documented Functions and Procedures |
|
|
579 | (7) |
|
How an LDAP Query Accesses Active Directory |
|
|
579 | (1) |
|
|
580 | (2) |
|
How to Create and Configure a Dfs Root |
|
|
582 | (1) |
|
|
583 | (1) |
|
|
583 | (1) |
|
Quick Application of an Updated Group Policy |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
586 | (6) |
|
Add a Server to Two Different Sites Simultaneously |
|
|
586 | (1) |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
588 | (4) |
|
|
592 | (3) |
|
Avoiding Errors When Migrating a Domain |
|
|
592 | (1) |
|
Remote Procedure Call Errors |
|
|
592 | (3) |
Index |
|
595 | |