Active Directory for Dummies, 2nd Edition
You’ll understand the basics of AD and utilize its structures to simplify your life and secure your digital environment. You’ll discover how to exert fine-grained control over groups, assets, security, permissions, and policies on a Windows network and efficiently configure, manage, and update the network. You’ll find new and updated material on security improvements, significant user interface changes, and updates to the AD scripting engine, password policies, accidental object deletion protection, and more. You will learn how to:
- Navigate the functions and structures of AD
- Understand business and technical requirements and determine goals
- Become familiar with physical components like site links, network services, and site topology
- Manage and monitor new features, AD replication, and schema management
- Maintain AD databases
- Avoid common AD mistakes that can undermine network security
Complete with lists of the ten most important points about AD, and ten cool Web resources, and ten troubleshooting tips, Active Directory For Dummies, 2nd Edition is your one-stop guide to setting up, working with, and making the most of Active Directory.
Marcia Loughry, MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.
Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm’s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.
Table of Contents
Part I: Getting Started.
Chapter 1: Understanding Active Director y.
Chapter 2: Analyzing Requirements for Active Director y.
Chapter 3: Designing an Active Director y Implementation Plan.
Part II: Planning and Deploying with Active Directory Domain Services.
Chapter 4: Playing the Name Game.
Chapter 5: Creating a Logical Structure.
Chapter 6: Getting Physical.
Chapter 7: Ready to Deploy!
Part III: New Active Directory Features.
Chapter 8: AD LDS: Active Directory on a Diet.
Chapter 9: Federating Active Directory.
Chapter 10: AD Certificate Services and Rights Management Services.
Part IV: Managing Active Directory.
Chapter 11: Managing Users, Groups, and Other Objects.
Chapter 12: Managing Active Directory Replication.
Chapter 13: Schema-ing!
Chapter 14: Managing Security with Active Directory Domain Services.
Chapter 15: Maintaining Active Directory.
Part V: The Part of Tens.
Chapter 16: The Ten Most Important Active Directory Design Points.
Chapter 17: Ten Cool Web Sites for Active Directory Info.
Chapter 18: Ten Troubleshooting Tips for Active Directory.
Part VI: Appendixes.
Appendix A: Windows 2008 AD Command Line Tools.
Appendix B: Glossary.
Sign up now »
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTSenior Python Web Applications DeveloperNSW
- FTR&D EngineerSA
- FTOS Web Applications DeveloperNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave
- AusCERT 2013: Home-electronics gear’s UPnP as insecure in Australia as rest of world: Metasploit
- AusCERT 2013: Big data skills help beat the bad guys, says HP
- In pictures: AusCERT 2013 Day One
- Blue Coat Systems to acquire security analytics firm Solera Networks