| |
| |
Preface | |
| |
| |
About the Authors | |
| |
| |
Acknowledgments | |
| |
| |
| |
Background Skills | |
| |
| |
| |
Active Directory: The Big Picture | |
| |
| |
Introduction to Active Directory | |
| |
| |
Basic Building Blocks | |
| |
| |
Hierarchies | |
| |
| |
DNS Integration | |
| |
| |
Security and Policies | |
| |
| |
Architecture | |
| |
| |
Other Features | |
| |
| |
Conclusion | |
| |
| |
| |
Active Directory Installation | |
| |
| |
Domain and Forest Functional Levels | |
| |
| |
Installing Active Directory | |
| |
| |
After Active Directory Installation | |
| |
| |
Automating Active Directory Installation | |
| |
| |
Problems with Active Directory Installation | |
| |
| |
Uninstalling Active Directory | |
| |
| |
Conclusion | |
| |
| |
| |
Core Skills | |
| |
| |
| |
Managing OUs, Users, and Groups | |
| |
| |
Active Directory after Installation | |
| |
| |
Administering Ous | |
| |
| |
Administering Users, InetOrgPersons, and Contacts | |
| |
| |
Administering Computer Objects | |
| |
| |
Administering Groups | |
| |
| |
Tips on Tools | |
| |
| |
Conclusion | |
| |
| |
| |
Securing Active Directory | |
| |
| |
Introduction to Windows Security | |
| |
| |
Background for Active Directory Access Control | |
| |
| |
Managing Active Directory Permissions | |
| |
| |
Delegation of Control Wizard | |
| |
| |
Default Permissions for Objects | |
| |
| |
Usage Scenarios for Active Directory Permissions | |
| |
| |
Auditing Active Directory Access | |
| |
| |
Access Control Architecture | |
| |
| |
Domain Controller Access | |
| |
| |
User Rights | |
| |
| |
Conclusion | |
| |
| |
| |
Sites and Replication | |
| |
| |
Concepts of the Physical Structure | |
| |
| |
Managing the Physical Structure | |
| |
| |
Advanced Topics | |
| |
| |
Conclusion | |
| |
| |
| |
Domains and Forests | |
| |
| |
Domain Controller Placement | |
| |
| |
Designing Domains and Forests | |
| |
| |
Managing Domains and Forests | |
| |
| |
LDAP and Searches | |
| |
| |
Conclusion | |
| |
| |
| |
Group Policy | |
| |
| |
Group Policy Concepts | |
| |
| |
Group Policy Contents | |
| |
| |
Group Policy Objects and Links | |
| |
| |
Processing Group Policy | |
| |
| |
Managing Group Policies | |
| |
| |
Software Management with Group Policy | |
| |
| |
Troubleshooting Group Policy | |
| |
| |
Advanced Topics | |
| |
| |
Conclusion | |
| |
| |
| |
Advanced Skills | |
| |
| |
| |
Active Directory Schema | |
| |
| |
Overview of the Active Directory Data Model | |
| |
| |
Schema | |
| |
| |
Classes | |
| |
| |
Attributes and Syntaxes | |
| |
| |
Conclusion | |
| |
| |
| |
Extending the Schema | |
| |
| |
When and Why to Modify | |
| |
| |
Planning the Modifications | |
| |
| |
The Modification Process | |
| |
| |
Bringing the Extensions to the User Interface | |
| |
| |
Extending the User Class | |
| |
| |
Conclusion | |
| |
| |
| |
Administration Scripts: Concepts | |
| |
| |
Getting Started | |
| |
| |
VBScript Language | |
| |
| |
ADSI Concepts | |
| |
| |
Additional Techniques | |
| |
| |
Conclusion | |
| |
| |
| |
Administration Scripts: Examples | |
| |
| |
ADSI Examples | |
| |
| |
User Management | |
| |
| |
Schema Access | |
| |
| |
Configuration Information | |
| |
| |
Access Control Lists | |
| |
| |
OU, Group, and Computer Management | |
| |
| |
ADSI without Active Directory | |
| |
| |
Additional Techniques | |
| |
| |
Using ADO | |
| |
| |
Conclusion | |
| |
| |
Bibliography | |
| |
| |
Index | |