Preface |
|
xv | |
1 A Brief Introduction |
|
1 | (4) |
|
Evolution of the Microsoft NOS |
|
|
2 | (1) |
|
A Brief History of Directories |
|
|
2 | (1) |
|
|
3 | (2) |
2 Active Directory Fundamentals |
|
5 | (28) |
|
How Objects Are Stored and Identified |
|
|
5 | (4) |
|
Uniquely Identifying Objects |
|
|
6 | (3) |
|
|
9 | (22) |
|
|
9 | (2) |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Flexible Single Master Operator (FSMO) Roles |
|
|
14 | (8) |
|
Time Synchronization in Active Directory |
|
|
22 | (2) |
|
Domain and Forest Functional Levels |
|
|
24 | (3) |
|
|
27 | (4) |
|
|
31 | (2) |
3 Active Directory Management Tools |
|
33 | (30) |
|
|
33 | (19) |
|
Active Directory Administrative Center |
|
|
34 | (3) |
|
Active Directory Users and Computers |
|
|
37 | (8) |
|
|
45 | (2) |
|
|
47 | (5) |
|
Customizing the Active Directory Administrative Snap-ins |
|
|
52 | (6) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
Active Directory PowerShell Module |
|
|
58 | (1) |
|
|
59 | (2) |
|
Active Directory-Based Machine Activation |
|
|
61 | (1) |
|
|
61 | (2) |
4 Naming Contexts and Application Partitions |
|
63 | (10) |
|
|
66 | (1) |
|
Configuration Naming Context |
|
|
67 | (1) |
|
|
67 | (2) |
|
|
69 | (3) |
|
|
71 | (1) |
|
|
72 | (1) |
5 Active Directory Schema |
|
73 | (34) |
|
|
74 | (5) |
|
X.500 and the OID Namespace |
|
|
75 | (4) |
|
Attributes (attributeSchema Objects) |
|
|
79 | (2) |
|
Dissecting an Example Active Directory Attribute |
|
|
80 | (1) |
|
|
81 | (14) |
|
|
82 | (2) |
|
|
84 | (2) |
|
|
86 | (1) |
|
|
86 | (8) |
|
Property Sets and attributeSecurityGUID |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Classes (classSchema Objects) |
|
|
95 | (10) |
|
Object Class Category and Inheritance |
|
|
96 | (3) |
|
Dissecting an Example Active Directory Class |
|
|
99 | (4) |
|
Dynamically Linked Auxiliary Classes |
|
|
103 | (2) |
|
|
105 | (2) |
6 Site Topology and Active Directory Replication |
|
107 | (44) |
|
|
107 | (16) |
|
Site and Replication Management Tools |
|
|
108 | (1) |
|
|
108 | (6) |
|
|
114 | (2) |
|
|
116 | (5) |
|
|
121 | (1) |
|
|
121 | (1) |
|
Knowledge Consistency Checker |
|
|
122 | (1) |
|
|
123 | (21) |
|
|
123 | (7) |
|
How an Object's Metadata Is Modified During Replication |
|
|
130 | (5) |
|
The Replication of a Naming Context Between Two Servers |
|
|
135 | (6) |
|
How Replication Conflicts Are Reconciled |
|
|
141 | (3) |
|
Common Replication Problems |
|
|
144 | (5) |
|
|
145 | (1) |
|
|
146 | (3) |
|
|
149 | (2) |
7 Searching Active Directory |
|
151 | (18) |
|
The Directory Information Tree |
|
|
151 | (4) |
|
|
151 | (4) |
|
|
155 | (7) |
|
|
155 | (1) |
|
Connecting Filter Components |
|
|
156 | (2) |
|
|
158 | (1) |
|
Modifying Behavior with LDAP Controls |
|
|
159 | (3) |
|
|
162 | (3) |
|
|
162 | (1) |
|
|
163 | (1) |
|
The In-Chain Matching Rule |
|
|
164 | (1) |
|
|
165 | (3) |
|
|
165 | (2) |
|
objectClass Versus object Category |
|
|
167 | (1) |
|
|
168 | (1) |
8 Active Directory and DNS |
|
169 | (36) |
|
|
170 | (5) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
175 | (11) |
|
|
176 | (4) |
|
Configuring DNSSEC for Active Directory DNS |
|
|
180 | (6) |
|
|
186 | (1) |
|
Resource Records Used by Active Directory |
|
|
187 | (5) |
|
Overriding SRV Record Registration |
|
|
191 | (1) |
|
|
192 | (4) |
|
Not Delegating the AD DNS Zones |
|
|
192 | (2) |
|
Delegating the AD DNS Zones |
|
|
194 | (2) |
|
Active Directory-Integrated DNS |
|
|
196 | (3) |
|
|
198 | (1) |
|
|
199 | (1) |
|
Using Application Partitions for DNS |
|
|
199 | (2) |
|
|
201 | (2) |
|
|
201 | (2) |
|
Managing DNS with Windows PowerShell |
|
|
203 | (1) |
|
|
204 | (1) |
9 Domain Controllers |
|
205 | (56) |
|
Building Domain Controllers |
|
|
205 | (11) |
|
Deploying with Server Manager |
|
|
206 | (8) |
|
Using DCPromo on Earlier Versions of Windows |
|
|
214 | (1) |
|
Automating the DC Build Process |
|
|
214 | (2) |
|
|
216 | (13) |
|
|
216 | (1) |
|
|
217 | (4) |
|
Virtualization Safe Restore |
|
|
221 | (1) |
|
Cloning Domain Controllers |
|
|
222 | (7) |
|
Read-Only Domain Controllers |
|
|
229 | (30) |
|
|
231 | (1) |
|
Password Replication Policies |
|
|
232 | (6) |
|
|
238 | (5) |
|
|
243 | (5) |
|
|
248 | (2) |
|
Application Compatibility |
|
|
250 | (2) |
|
RODC Placement Considerations |
|
|
252 | (1) |
|
Administrator Role Separation |
|
|
253 | (3) |
|
|
256 | (3) |
|
|
259 | (2) |
10 Authentication and Security Protocols |
|
261 | (22) |
|
|
261 | (15) |
|
|
262 | (2) |
|
|
264 | (5) |
|
|
269 | (1) |
|
Logon and Service Access Summary |
|
|
269 | (1) |
|
Delegation and Protocol Transition |
|
|
270 | (6) |
|
Authentication Mechanism Assurance |
|
|
276 | (1) |
|
|
276 | (5) |
|
Preparing for Group Managed Service Accounts |
|
|
277 | (1) |
|
Using Group Managed Service Accounts |
|
|
277 | (4) |
|
|
281 | (2) |
11 Group Policy Primer |
|
283 | (56) |
|
Capabilities of Group Policy Objects |
|
|
284 | (5) |
|
|
284 | (5) |
|
|
289 | (18) |
|
GPOs and Active Directory |
|
|
290 | (1) |
|
Prioritizing the Application of Multiple Policies |
|
|
291 | (2) |
|
Standard GPO Inheritance Rules in Organizational Units |
|
|
293 | (1) |
|
Blocking Inheritance and Overriding the Block in Organizational Unit GPOs |
|
|
294 | (3) |
|
|
297 | (1) |
|
Combating Slowdown Due to Group Policy |
|
|
298 | (3) |
|
Security Filtering and Group Policy Objects |
|
|
301 | (2) |
|
Loopback Merge Mode and Loopback Replace Mode |
|
|
303 | (1) |
|
Summarizing Group Policy Application |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
307 | (22) |
|
|
308 | (1) |
|
Using the Group Policy Management Console |
|
|
309 | (1) |
|
Using the Group Policy Management Editor |
|
|
310 | (3) |
|
|
313 | (5) |
|
Running Scripts with Group Policy |
|
|
318 | (2) |
|
|
320 | (2) |
|
Delegation and Change Control |
|
|
322 | (3) |
|
|
325 | (1) |
|
Group Policy Backup and Restore |
|
|
326 | (1) |
|
|
327 | (2) |
|
Troubleshooting Group Policy |
|
|
329 | (8) |
|
Group Policy Infrastructure Status |
|
|
329 | (1) |
|
Group Policy Results Wizard |
|
|
330 | (3) |
|
Forcing Group Policy Updates |
|
|
333 | (1) |
|
|
334 | (2) |
|
Group Policy Diagnostic Best Practices Analyzer |
|
|
336 | (1) |
|
Third-Party Troubleshooting Tools |
|
|
336 | (1) |
|
|
337 | (2) |
12 Fine-Grained Password Policies |
|
339 | (16) |
|
Understanding Password Settings Objects |
|
|
339 | (1) |
|
Scenarios for Fine-Grained Password Policies |
|
|
340 | (2) |
|
Defining Password Settings Objects |
|
|
340 | (2) |
|
Creating Password Settings Objects |
|
|
342 | (4) |
|
|
342 | (1) |
|
Building a PSO from Scratch |
|
|
342 | (4) |
|
Managing Password Settings Objects |
|
|
346 | (6) |
|
Strategies for Controlling PSO Application |
|
|
346 | (1) |
|
|
347 | (5) |
|
Delegating Management of PSOs |
|
|
352 | (1) |
|
|
353 | (2) |
13 Designing the Active Directory Structure |
|
355 | (40) |
|
The Complexities of a Design |
|
|
356 | (1) |
|
|
357 | (1) |
|
Overview of the Design Process |
|
|
357 | (2) |
|
|
359 | (8) |
|
|
359 | (1) |
|
Step 1: Decide on the Number of Domains |
|
|
360 | (3) |
|
Step 2: Design and Name the Tree Structure |
|
|
363 | (4) |
|
Design of the Internal Domain Structure |
|
|
367 | (9) |
|
Step 3: Design the Hierarchy of Organizational Units |
|
|
368 | (4) |
|
Step 4: Design the Workstation and Server Naming Conventions |
|
|
372 | (1) |
|
Step 5: Plan for Users and Groups |
|
|
373 | (3) |
|
Other Design Considerations |
|
|
376 | (1) |
|
|
377 | (16) |
|
|
377 | (6) |
|
|
383 | (5) |
|
|
388 | (5) |
|
Recognizing Nirvana's Problems |
|
|
393 | (1) |
|
|
394 | (1) |
14 Creating a Site Topology |
|
395 | (22) |
|
Intrasite and Intersite Topologies |
|
|
395 | (10) |
|
|
396 | (1) |
|
Automatic Intrasite Topology Generation by the KCC |
|
|
397 | (4) |
|
Site Links: The Basic Building Blocks of Intersite Topologies |
|
|
401 | (3) |
|
Site Link Bridges: The Second Building Blocks of Intersite Topologies |
|
|
404 | (1) |
|
Designing Sites and Links for Replication |
|
|
405 | (4) |
|
Step 1: Gather Background Data for Your Network |
|
|
405 | (1) |
|
Step 2: Plan the Domain Controller Locations |
|
|
405 | (2) |
|
|
407 | (1) |
|
Step 4: Create Site Links |
|
|
408 | (1) |
|
Step 5: Create Site Link Bridges |
|
|
409 | (1) |
|
|
409 | (5) |
|
|
409 | (3) |
|
|
412 | (1) |
|
|
412 | (2) |
|
|
414 | (1) |
|
|
414 | (3) |
15 Planning for Group Policy |
|
417 | (10) |
|
Using GPOs to Help Design the Organizational Unit Structure |
|
|
417 | (4) |
|
Identifying Areas of Policy |
|
|
418 | (1) |
|
Guidelines for Designing GPOs |
|
|
419 | (2) |
|
|
421 | (5) |
|
|
421 | (3) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
16 Active Directory Security: Permissions and Auditing |
|
427 | (54) |
|
|
428 | (10) |
|
|
429 | (1) |
|
Property Sets, Validated Writes, and Extended Rights |
|
|
430 | (1) |
|
Inherited Versus Explicit Permissions |
|
|
431 | (1) |
|
Default Security Descriptors |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
Protecting Objects from Accidental Deletion |
|
|
435 | (3) |
|
Using the GUI to Examine Permissions |
|
|
438 | (8) |
|
Reverting to the Default Permissions |
|
|
441 | (1) |
|
Viewing the Effective Permissions for a User or Group |
|
|
442 | (1) |
|
Using the Delegation of Control Wizard |
|
|
443 | (3) |
|
Using the GUI to Examine Auditing |
|
|
446 | (1) |
|
Designing Permissions Schemes |
|
|
446 | (9) |
|
The Five Golden Rules of Permissions Design |
|
|
446 | (6) |
|
|
452 | (2) |
|
Bringing Order out of Chaos |
|
|
454 | (1) |
|
Designing Auditing Schemes |
|
|
455 | (7) |
|
|
457 | (2) |
|
Tracking Last Interactive Logon Information |
|
|
459 | (3) |
|
Real-World Active Directory Delegation Examples |
|
|
462 | (3) |
|
Hiding Specific Personal Details for All Users in an Organizational Unit from a Group |
|
|
462 | (2) |
|
Allowing Only a Specific Group of Users to Access a New Published Resource |
|
|
464 | (1) |
|
Restricting Everyone but HR from Viewing National/Regional ID Numbers with the Confidential Bit |
|
|
465 | (1) |
|
The AdminSDHolder Process |
|
|
465 | (4) |
|
|
469 | (11) |
|
Configuring Active Directory for DAC |
|
|
470 | (7) |
|
Using DAC on the File Server |
|
|
477 | (3) |
|
|
480 | (1) |
17 Designing and Implementing Schema Extensions |
|
481 | (18) |
|
Nominating Responsible People in Your Organization |
|
|
482 | (1) |
|
Thinking of Changing the Schema |
|
|
483 | (5) |
|
|
483 | (1) |
|
To Change or Not to Change |
|
|
484 | (2) |
|
|
486 | (2) |
|
Creating Schema Extensions |
|
|
488 | (9) |
|
Running the AD Schema Management MMC Snap-in for the First Time |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
490 | (2) |
|
Using LDIF to Extend the Schema |
|
|
492 | (2) |
|
Checks the System Makes When You Modify the Schema |
|
|
494 | (1) |
|
Making Classes and Attributes Defunct |
|
|
495 | (1) |
|
Mitigating a Schema Conflict |
|
|
496 | (1) |
|
|
497 | (2) |
18 Backup, Recovery, and Maintenance |
|
499 | (48) |
|
Backing Up Active Directory |
|
|
499 | (8) |
|
Using the NT Backup Utility |
|
|
502 | (2) |
|
Using Windows Server Backup |
|
|
504 | (3) |
|
Restoring a Domain Controller |
|
|
507 | (9) |
|
|
508 | (3) |
|
|
511 | (1) |
|
|
512 | (4) |
|
Restoring Active Directory |
|
|
516 | (9) |
|
|
517 | (4) |
|
Partial Authoritative Restore |
|
|
521 | (3) |
|
Complete Authoritative Restore |
|
|
524 | (1) |
|
|
525 | (2) |
|
Active Directory Recycle Bin |
|
|
527 | (6) |
|
|
528 | (1) |
|
|
529 | (2) |
|
|
531 | (2) |
|
|
533 | (3) |
|
Restartable Directory Service |
|
|
536 | (1) |
|
|
537 | (8) |
|
Checking the Integrity of the DIT |
|
|
538 | (2) |
|
|
540 | (2) |
|
Changing the DS Restore Mode Admin Password |
|
|
542 | (3) |
|
|
545 | (2) |
19 Upgrading Active Directory |
|
547 | (20) |
|
Active Directory Versions |
|
|
547 | (11) |
|
|
549 | (4) |
|
|
553 | (2) |
|
|
555 | (1) |
|
|
556 | (2) |
|
|
558 | (5) |
|
Raising the Functional Level |
|
|
559 | (3) |
|
Functional Level Rollback |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
565 | (2) |
20 Active Directory Lightweight Directory Services |
|
567 | (42) |
|
|
568 | (1) |
|
|
569 | (1) |
|
Differences Between AD and AD LDS |
|
|
570 | (7) |
|
Standalone Application Service |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
570 | (2) |
|
|
572 | (1) |
|
Top-Level Application Partition Object Classes |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (2) |
|
|
575 | (1) |
|
|
575 | (1) |
|
Configuration/Schema Partition Names |
|
|
576 | (1) |
|
Default Directory Security |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
576 | (1) |
|
Users in the Configuration Partition |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
577 | (14) |
|
Installing the Server Role |
|
|
577 | (1) |
|
Installing a New AD LDS Instance |
|
|
578 | (7) |
|
Installing an AD LDS Replica |
|
|
585 | (5) |
|
|
590 | (1) |
|
|
591 | (4) |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
592 | (1) |
|
|
592 | (1) |
|
|
592 | (2) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
595 | (1) |
|
Default Security Descriptors |
|
|
595 | (1) |
|
Bindable Objects and Bindable Proxy Objects |
|
|
595 | (1) |
|
|
596 | (11) |
|
Creating Application Partitions |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
598 | (1) |
|
|
599 | (2) |
|
|
601 | (1) |
|
|
602 | (1) |
|
|
602 | (1) |
|
Removing Members from Groups |
|
|
603 | (1) |
|
|
604 | (1) |
|
Deleting Application Partitions |
|
|
604 | (1) |
|
Controlling Access to Objects and Attributes |
|
|
605 | (2) |
|
|
607 | (2) |
21 Active Directory Federation Services |
|
609 | (48) |
|
Introduction to Federated Identity |
|
|
609 | (5) |
|
|
610 | (3) |
|
|
613 | (1) |
|
|
613 | (1) |
|
Understanding ADFS Components |
|
|
614 | (5) |
|
The Configuration Database |
|
|
614 | (1) |
|
|
615 | (1) |
|
Federation Server Proxies |
|
|
615 | (1) |
|
|
615 | (4) |
|
|
619 | (14) |
|
|
621 | (8) |
|
Federation Server Proxies |
|
|
629 | (4) |
|
|
633 | (4) |
|
Claims Rules and the Claims Pipeline |
|
|
637 | (8) |
|
|
637 | (2) |
|
Creating and Sending Claims Through the Pipeline |
|
|
639 | (6) |
|
|
645 | (2) |
|
|
647 | (1) |
|
|
647 | (1) |
|
|
647 | (7) |
|
|
648 | (1) |
|
|
649 | (5) |
|
|
654 | (3) |
A Programming the Directory with the .NET Framework |
|
657 | (30) |
Index |
|
687 | |