Active directory cookbook: [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2003
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXVI, 593 S. Ill. |
ISBN: | 0596004648 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV016549109 | ||
003 | DE-604 | ||
005 | 20050923 | ||
007 | t| | ||
008 | 030225s2003 gw a||| |||| 00||| eng d | ||
016 | 7 | |a 966286731 |2 DE-101 | |
020 | |a 0596004648 |9 0-596-00464-8 | ||
035 | |a (OCoLC)633410096 | ||
035 | |a (DE-599)BVBBV016549109 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-706 | ||
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
100 | 1 | |a Allen, Robbie |e Verfasser |4 aut | |
245 | 1 | 0 | |a Active directory cookbook |b [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] |c Robbie Allen |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2003 | |
300 | |a XXVI, 593 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Active Directory |0 (DE-588)4561311-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Windows Server 2003 |0 (DE-588)4717241-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Windows Server |0 (DE-588)4827986-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Windows 2000 |0 (DE-588)4547592-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Windows Server 2003 |0 (DE-588)4717241-1 |D s |
689 | 0 | 1 | |a Active Directory |0 (DE-588)4561311-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Windows 2000 |0 (DE-588)4547592-1 |D s |
689 | 1 | 1 | |a Active Directory |0 (DE-588)4561311-4 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Windows Server |0 (DE-588)4827986-9 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010224671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-010224671 |
Datensatz im Suchindex
_version_ | 1826204883796099072 |
---|---|
adam_text |
TABLE
OF
CONTENTS
FOREWORD
.
XVII
PREFACE
.
XXI
1.
GETTING
STARTED
.
1
1.1
WHERE
TO
FIND
THE
TOOLS
2
1.2
GETTING
FAMILIAR
WITH
LDIF
4
1.3
PROGRAMMING
NOTES
5
1.4
REPLACEABLE
TEXT
9
1.5
WHERE
TO
FIND
MORE
INFORMATION
10
2.
FORESTS,
DOMAINS,
AND
TRUSTS
.
13
2.1
CREATING
A
FOREST
17
2.2
REMOVING
A
FOREST
18
2.3
CREATING
A
DOMAIN
19
2.4
REMOVING
A
DOMAIN
20
2.5
REMOVING
AN
ORPHANED
DOMAIN
22
2.6
FINDING
THE
DOMAINS
IN
A
FOREST
23
2.7
FINDING
THE
NETBIOS
NAME
OF
A
DOMAIN
25
2.8
RENAMING
A
DOMAIN
26
2.9
CHANGING
THE
MODE
OF
A
DOMAIN
27
2.10
USING
ADPREP
TO
PREPARE
A
DOMAIN
OR
FOREST
FOR
WINDOWS
SERVER
2003
29
2.11
DETERMINING
IF
ADPREP
HAS
COMPLETED
30
2.12
CHECKING
WHETHER
A
WINDOWS
2000
DOMAIN
CONTROLLER
CAN
BE
UPGRADED
TO
WINDOWS
SERVER
2003
32
2.13
RAISING
THE
FUNCTIONAL
LEVEL
OF
A
WINDOWS
SERVER
2003
DOMAIN
33
2.14
RAISING
THE
FUNCTIONAL
LEVEL
OF
A
WINDOWS
SERVER
2003
FOREST
35
2.15
CREATING
A
TRUST
BETWEEN
A
WINDOWS
NT
DOMAIN
AND
AN
AD
DOMAIN
38
2.16
CREATING
A
TRANSITIVE
TRUST
BETWEEN
TWO
AD
FORESTS
39
2.17
CREATING
A
SHORTCUT
TRUST
BETWEEN
TWO
AD
DOMAINS
41
2.18
CREATING
A
TRUST
TO
A
KERBEROS
REALM
42
2.19
VIEWING
THE
TRUSTS
FOR
A
DOMAIN
44
2.20
VERIFYING
A
TRUST
46
2.21
RESETTING
A
TRUST
48
2.22
REMOVING
A
TRUST
50
2.23
ENABLING
SID
FILTERING
FOR
A
TRUST
51
2.24
FINDING
DUPLICATE
SIDS
IN
A
DOMAIN
51
DOMAIN
CONTROLLERS,
GLOBAL
CATALOGS,
AND
FSMOS
.
.
53
3.1
PROMOTING
A
DOMAIN
CONTROLLER
55
3.2
PROMOTING
A
DOMAIN
CONTROLLER
FROM
MEDIA
55
3.3
DEMOTING
A
DOMAIN
CONTROLLER
57
3.4
AUTOMATING
THE
PROMOTION
OR
DEMOTION
OF
A
DOMAIN
CONTROLLER
58
3.5
TROUBLESHOOTING DOMAIN
CONTROLLER
PROMOTION
OR
DEMOTION
PROBLEMS
59
3.6
REMOVING
AN
UNSUCCESSFULLY
DEMOTED
DOMAIN
CONTROLLER
60
3.7
RENAMING
A
DOMAIN
CONTROLLER
63
3.8
FINDING
THE
DOMAIN
CONTROLLERS
FOR
A
DOMAIN
64
3.9
FINDING
THE
CLOSEST
DOMAIN
CONTROLLER
65
3.10
FINDING
A
DOMAIN
CONTROLLER
'
S
SITE
67
3.11
MOVING
A
DOMAIN
CONTROLLER
TO
A
DIFFERENT
SITE
68
3.12
FINDING
THE
SERVICES
A
DOMAIN
CONTROLLER
IS
ADVERTISING
71
3.13
CONFIGURING
A
DOMAIN
CONTROLLER
TO
USE
AN
EXTERNAL
TIME
SOURCE
72
3.14
FINDING
THE
NUMBER
OF
LOGON
ATTEMPTS
MADE
AGAINST
A
DOMAIN
CONTROLLER
73
3.15
ENABLING
THE
/3GB
SWITCH
TO
INCREASE
THE
LSASS
CACHE
74
3.16
CLEANING
UP
DISTRIBUTED
LINK
TRACKING
OBJECTS
75
3.17
ENABLING
AND
DISABLING
THE
GLOBAL
CATALOG
76
3.18
DETERMINING
IF
GLOBAL
CATALOG
PROMOTION
IS
COMPLETE
78
3.19
FINDING
THE
GLOBAL
CATALOG
SERVERS
IN
A
FOREST
79
3.20
FINDING
THE
DOMAIN CONTROLLERS
OR
GLOBAL
CATALOG
SERVERS
IN
A
SITE
80
3.21
FINDING
DOMAIN
CONTROLLERS
AND
GLOBAL
CATALOGS
VIA
DNS
82
3.22
CHANGING
THE
PREFERENCE
FOR
A
DOMAIN
CONTROLLER
83
3.23
DISABLING
THE
GLOBAL
CATALOG
REQUIREMENT DURING
A
WINDOWS
2000
DOMAIN
LOGIN
85
VI
|
TABLE
OF
CONTENTS
3.24
DISABLING
THE
GLOBAL
CATALOG
REQUIREMENT
DURING
A
WINDOWS
2003
DOMAIN
LOGIN
86
3.25
FINDING
THE
FSMO
ROLE
HOLDERS
87
3.26
TRANSFERRING
A
FSMO
ROLE
89
3.27
SEIZING
A
FSMO
ROLE
91
3.28
FINDING
THE
PDC
EMULATOR
FSMO
ROLE
OWNER
VIA
DNS
92
SEARCHING
AND
MANIPULATING
OBJECTS
.
.
94
4.1
VIEWING
THE
ROOTDSE
95
4.2
VIEWING
THE
ATTRIBUTES
OF
AN
OBJECT
98
4.3
USING
LDAP
CONTROLS
101
4.4
USING
A
FAST
OR
CONCURRENT
BIND
104
4.5
SEARCHING
FOR
OBJECTS
IN
A
DOMAIN
105
4.6
SEARCHING
THE
GLOBAL
CATALOG
108
4.7
SEARCHING
FOR
A
LARGE
NUMBER
OF
OBJECTS
110
4.8
SEARCHING
WITH
AN
ATTRIBUTE-SCOPED
QUERY
112
4.9
SEARCHING
WITH
A
BITWISE
FILTER
114
4.10
CREATING
AN
OBJECT
116
4.11
MODIFYING
AN
OBJECT
118
4.12
MODIFYING
A
BIT-FLAG
ATTRIBUTE
121
4.13
DYNAMICALLY
LINKING
AN
AUXILIARY
CLASS
123
4.14
CREATING
A
DYNAMIC
OBJECT
125
4.15
REFRESHING
A
DYNAMIC
OBJECT
126
4.16
MODIFYING
THE
DEFAULT
TTL
SETTINGS
FOR
DYNAMIC
OBJECTS
128
4.17
MOVING
AN
OBJECT
TO
A
DIFFERENT
OU
OR
CONTAINER
130
4.18
MOVING
AN
OBJECT
TO
A
DIFFERENT
DOMAIN
132
4.19
RENAMING
AN
OBJECT
133
4.20
DELETING
AN
OBJECT
135
4.21
DELETING
A
CONTAINER
THAT
HAS
CHILD
OBJECTS
136
4.22
VIEWING
THE
CREATED
AND
LAST
MODIFIED
TIMESTAMP
OF
AN
OBJECT
137
4.23
MODIFYING
THE
DEFAULT
LDAP
QUERY
POLICY
139
4.24
EXPORTING
OBJECTS
TO
AN
LDIF
FILE
141
4.25
IMPORTING
OBJECTS
USING
AN
LDIF
FILE
142
4.26
EXPORTING
OBJECTS
TO
A
CSV
FILE
144
4.27
IMPORTING
OBJECTS
USING
A
CSV
FILE
144
5.
ORGANIZATIONAL
UNITS
.
146
5.1
CREATING
AN
OU
147
5.2
ENUMERATING
THE
OUS
IN
A
DOMAIN
148
TABLE
OF
CONTENTS
|
VII
VIII
|
TABLE
OF
CONTENTS
5.3
ENUMERATING
THE
OBJECTS
IN
AN
OU
150
5.4
DELETING
THE
OBJECTS
IN
AN
OU
151
5.5
DELETING
AN
OU
152
5.6
MOVING
THE
OBJECTS
IN
AN
OU
TO
A
DIFFERENT
OU
154
5.7
MOVING
AN
OU
155
5.8
DETERMINING
HOW
MANY
CHILD
OBJECTS
AN
OU
HAS
156
5.9
DELEGATING
CONTROL
OF
AN
OU
158
5.10
ALLOWING
OUS
TO
BE
CREATED
WITHIN
CONTAINERS
159
5.11
LINKING
A
GPO
TO
AN
OU
160
6.
USERS
.
.
163
6.1
CREATING
A
USER
164
6.2
CREATING
A
LARGE
NUMBER
OF
USERS
166
6.3
CREATING
AN
INETORGPERSON
USER
167
6.4
MODIFYING
AN
ATTRIBUTE
FOR
SEVERAL
USERS
AT
ONCE
169
6.5
MOVING
A
USER
171
6.6
RENAMING
A
USER
172
6.7
COPYING
A
USER
173
6.8
UNLOCKING
A
USER
175
6.9
FINDING
LOCKED
OUT
USERS
176
6.10
TROUBLESHOOTING
ACCOUNT
LOCKOUT
PROBLEMS
177
6.11
VIEWING
THE
ACCOUNT
LOCKOUT
AND
PASSWORD
POLICIES
179
6.12
ENABLING
AND
DISABLING
A
USER
182
6.13
FINDING
DISABLED
USERS
184
6.14
VIEWING
A
USER
'
S
GROUP
MEMBERSHIP
185
6.15
CHANGING
A
USER
'
S
PRIMARY
GROUP
187
6.16
TRANSFERRING
A
USER
'
S
GROUP
MEMBERSHIP
TO
ANOTHER
USER
189
6.17
SETTING
A
USER
'
S
PASSWORD
191
6.18
SETTING
A
USER
'
S
PASSWORD
VIA
LDAP
192
6.19
SETTING
A
USER
'
S
PASSWORD
VIA
KERBEROS
193
6.20
PREVENTING
A
USER
FROM
CHANGING
HIS
PASSWORD
193
6.21
REQUIRING
A
USER
TO
CHANGE
HER
PASSWORD
AT
NEXT
LOGON
195
6.22
PREVENTING
A
USER
'
S
PASSWORD
FROM
EXPIRING
196
6.23
FINDING
USERS
WHOSE
PASSWORDS
ARE
ABOUT
TO
EXPIRE
197
6.24
SETTING
A
USER
'
S
ACCOUNT
OPTIONS
(USERACCOUNTCONTROL)
201
6.25
SETTING
A
USER
'
S
ACCOUNT
TO
EXPIRE
IN
THE
FUTURE
203
6.26
FINDING
USERS
WHOSE
ACCOUNTS
ARE
ABOUT
TO
EXPIRE
205
6.27
DETERMINING
A
USER
'
S
LAST
LOGON
TIME
207
6.28
FINDING
USERS
WHO
HAVE
NOT
LOGGED
ON
RECENTLY
209
6.29
SETTING
A
USER
'
S
PROFILE
ATTRIBUTES
211
6.30
VIEWING
A
USER
'
S
MANAGED
OBJECTS
212
6.31
MODIFYING
THE
DEFAULT
DISPLAY
NAME
USED
WHEN
CREATING
USERS
IN
ADUC
213
6.32
CREATING
A
UPN
SUFFIX
FOR
A
FOREST
215
7.
GROUPS
.
217
7.1
CREATING
A
GROUP
218
7.2
VIEWING
THE
DIRECT
MEMBERS
OF
A
GROUP
220
7.3
VIEWING
THE
NESTED
MEMBERS
OF
A
GROUP
221
7.4
ADDING
AND
REMOVING
MEMBERS
OF
A
GROUP
222
7.5
MOVING
A
GROUP
224
7.6
CHANGING
THE
SCOPE
OR
TYPE
OF
A
GROUP
225
7.7
DELEGATING
CONTROL
FOR
MANAGING
MEMBERSHIP
OF
A
GROUP
226
7.8
RESOLVING
A
PRIMARY
GROUP
ID
228
7.9
ENABLING
UNIVERSAL
GROUP
MEMBERSHIP
CACHING
231
8.
COMPUTERS
.
233
8.1
CREATING
A
COMPUTER
234
8.2
CREATING
A
COMPUTER
FOR
A
SPECIFIC
USER
OR
GROUP
236
8.3
JOINING
A
COMPUTER
TO
A
DOMAIN
241
8.4
MOVING
A
COMPUTER
244
8.5
RENAMING
A
COMPUTER
245
8.6
TESTING
THE
SECURE
CHANNEL
FOR
A
COMPUTER
247
8.7
RESETTING
A
COMPUTER
248
8.8
FINDING
INACTIVE
OR UNUSED
COMPUTERS
249
8.9
CHANGING
THE
MAXIMUM
NUMBER
OF
COMPUTERS
A
USER
CAN
JOIN
TO
THE
DOMAIN
253
8.10
FINDING
COMPUTERS
WITH
A
PARTICULAR
OS
254
8.11
BINDING
TO
THE
DEFAULT
CONTAINER
FOR
COMPUTERS
256
8.12
CHANGING
THE
DEFAULT
CONTAINER
FOR
COMPUTERS
258
9.
GROUP
POLICY
OBJECTS
(GPOS)
.
261
9.1
FINDING
THE
GPOS
IN
A
DOMAIN
263
9.2
CREATING
A
GPO
264
9.3
COPYING
A
GPO
265
9.4
DELETING
A
GPO
268
9.5
VIEWING
THE
SETTINGS
OF
A
GPO
269
9.6
MODIFYING
THE
SETTINGS
OF
A
GPO
272
TABLE
OF
CONTENTS
|
IX
9.7
IMPORTING
SETTINGS
INTO
A
GPO
272
9.8
ASSIGNING
LOGON/LOGOFF
AND
STARTUP/SHUTDOWN
SCRIPTS
IN
A
GPO
275
9.9
INSTALLING
APPLICATIONS
WITH
A
GPO
276
9.10
DISABLING
THE
USER
OR
COMPUTER
SETTINGS
IN
A
GPO
277
9.11
LISTING
THE
LINKS
FOR
GPO
279
9.12
CREATING
A
GPO
LINK
TO
AN
OU
281
9.13
BLOCKING
INHERITANCE
OF
GPOS
ON
AN
OU
283
9.14
APPLYING
A
SECURITY
FILTER
TO
A
GPO
285
9.15
CREATING
A
WMI
FILTER
288
9.16
APPLYING
A
WMI
FILTER
TO
A
GPO
289
9.17
BACKING
UP
A
GPO
291
9.18
RESTORING
A
GPO
294
9.19
SIMULATING
THE
RSOP
296
9.20
VIEWING
THE
RSOP
297
9.21
REFRESHING
GPO
SETTINGS
ON
A
COMPUTER
299
9.22
RESTORING
A
DEFAULT
GPO
299
10.
SCHEMA
.
301
10.1
REGISTERING
THE
ACTIVE
DIRECTORY
SCHEMA
MMC
SNAP-IN
303
10.2
ENABLING
SCHEMA
UPDATES
304
10.3
GENERATING
AN
OID
TO
USE
FOR
A
NEW
CLASS
OR
ATTRIBUTE
306
10.4
GENERATING
A
GUID
TO
USE
FOR
A
NEW
CLASS
OR
ATTRIBUTE
307
10.5
EXTENDING
THE
SCHEMA
308
10.6
DOCUMENTING
SCHEMA
EXTENSIONS
309
10.7
ADDING
A
NEW
ATTRIBUTE
310
10.8
VIEWING
AN
ATTRIBUTE
313
10.9
ADDING
A
NEW
CLASS
315
10.10
VIEWING
A
CLASS
317
10.11
INDEXING
AN
ATTRIBUTE
318
10.12
MODIFYING
THE
ATTRIBUTES
THAT
ARE
COPIED
WHEN
DUPLICATING
A
USER
320
10.13
MODIFYING
THE
ATTRIBUTES
INCLUDED
WITH
AMBIGUOUS
NAME
RESOLUTION
322
10.14
ADDING
OR
REMOVING
AN
ATTRIBUTE
IN
THE
GLOBAL
CATALOG
324
10.15
FINDING
THE
NONREPLICATED
AND
CONSTRUCTED
ATTRIBUTES
326
10.16
FINDING
THE
LINKED
ATTRIBUTES
329
10.17
FINDING
THE
STRUCTURAL,
AUXILIARY,
ABSTRACT,
AND
88
CLASSES
330
10.18
FINDING
THE
MANDATORY
AND
OPTIONAL
ATTRIBUTES
OF
A
CLASS
332
X
|
TABLE
OF
CONTENTS
10.19
MODIFYING
THE
DEFAULT
SECURITY
OF
A
CLASS
334
10.20
DEACTIVATING
CLASSES
AND
ATTRIBUTES
335
10.21
REDEFINING
CLASSES
AND
ATTRIBUTES
336
10.22
RELOADING
THE
SCHEMA
CACHE
337
11.
SITE
TOPOLOGY
.
.
340
11.1
CREATING
A
SITE
343
11.2
LISTING
THE
SITES
345
11.3
DELETING
A
SITE
346
11.4
CREATING
A
SUBNET
347
11.5
LISTING
THE
SUBNETS
349
11.6
FINDING
MISSING
SUBNETS
350
11.7
CREATING
A
SITE
LINK
352
11.8
FINDING
THE
SITE
LINKS
FOR
A
SITE
353
11.9
MODIFYING
THE
SITES
THAT
ARE
PART
OF
A
SITE
LINK
355
11.10
MODIFYING
THE
COST
FOR
A
SITE
LINK
356
11.11
DISABLING
SITE
LINK
TRANSITIVITY
OR
SITE
LINK
SCHEDULES
357
11.12
CREATING
A
SITE
LINK
BRIDGE
359
11.13
FINDING
THE
BRIDGEHEAD
SERVERS
FOR
A
SITE
361
11.14
SETTING
A
PREFERRED
BRIDGEHEAD
SERVER
FOR
A
SITE
362
11.15
LISTING
THE
SERVERS
364
11.16
MOVING
A
DOMAIN
CONTROLLER
TO
A
DIFFERENT
SITE
365
11.17
CONFIGURING
A
DOMAIN
CONTROLLER
TO
COVER
MULTIPLE
SITES
366
11.18
VIEWING
THE
SITE
COVERAGE
FOR
A
DOMAIN
CONTROLLER
368
11.19
DISABLING
AUTOMATIC
SITE
COVERAGE
FOR
A
DOMAIN
CONTROLLER
368
11.20
FINDING
THE
SITE
FOR
A
CLIENT
369
11.21
FORCING
A
HOST
TO
A
PARTICULAR
SITE
370
11.22
CREATING
A
CONNECTION
OBJECT
372
11.23
LISTING
THE
CONNECTION
OBJECTS
FOR
A
SERVER
373
11.24
LOAD-BALANCING
CONNECTION
OBJECTS
374
11.25
FINDING
THE
ISTG
FOR
A
SITE
375
11.26
TRANSFERRING
THE
ISTG
TO
ANOTHER
SERVER
376
11.27
TRIGGERING
THE
KCC
378
11.28
DETERMINING
IF
THE
KCC
IS
COMPLETING
SUCCESSFULLY
379
11.29
DISABLING
THE
KCC
FOR
A
SITE
380
11.30
CHANGING
THE
INTERVAL
AT
WHICH
THE
KCC
RUNS
382
TABLE
OF
CONTENTS
|
XI
12.
REPLICATION
.
384
12.1
DETERMINING
IF
TWO
DOMAIN
CONTROLLERS
ARE
IN
SYNC
384
12.2
VIEWING
THE
REPLICATION
STATUS
OF
SEVERAL
DOMAIN
CONTROLLERS
386
12.3
VIEWING
UNREPLICATED
CHANGES
BETWEEN
TWO
DOMAIN
CONTROLLERS
386
12.4
FORCING
REPLICATION
FROM
ONE
DOMAIN
CONTROLLER
TO
ANOTHER
390
12.5
CHANGING
THE
INTRA-SITE
REPLICATION
INTERVAL
391
12.6
CHANGING
THE
INTERSITE
REPLICATION
INTERVAL
393
12.7
DISABLING
INTER-SITE
COMPRESSION
OF
REPLICATION
TRAFFIC
394
12.8
CHECKING
FOR
POTENTIAL
REPLICATION
PROBLEMS
395
12.9
ENABLING
ENHANCED
LOGGING
OF
REPLICATION
EVENTS
395
12.10
ENABLING
STRICT
OR
LOOSE
REPLICATION
CONSISTENCY
396
12.11
FINDING
CONFLICT
OBJECTS
397
12.12
VIEWING
OBJECT
METADATA
399
13.
DOMAIN
NAME
SYSTEM
(DNS)
.
402
13.1
CREATING
A
FORWARD
LOOKUP
ZONE
404
13.2
CREATING
A
REVERSE
LOOKUP
ZONE
405
13.3
VIEWING
A
SERVER
'
S
ZONES
406
13.4
CONVERTING
A
ZONE
TO
AN
AD-INTEGRATED
ZONE
408
13.5
MOVING
AD-INTEGRATED
ZONES
INTO
AN
APPLICATION
PARTITION
409
13.6
DELEGATING
CONTROL
OF
A
ZONE
411
13.7
CREATING
AND
DELETING
RESOURCE
RECORDS
413
13.8
QUERYING
RESOURCE
RECORDS
415
13.9
MODIFYING
THE
DNS
SERVER
CONFIGURATION
417
13.10
SCAVENGING
OLD
RESOURCE
RECORDS
418
13.11
CLEARING
THE
DNS
CACHE
420
13.12
VERIFYING
THAT
A
DOMAIN
CONTROLLER
CAN
REGISTER
ITS
RESOURCE
RECORDS
422
13.13
REGISTERING
A
DOMAIN
CONTROLLER
'
S
RESOURCE
RECORDS
423
13.14
PREVENTING
A
DOMAIN
CONTROLLER
FROM
DYNAMICALLY
REGISTERING
ALL
RESOURCE
RECORDS
424
13.15
PREVENTING
A
DOMAIN
CONTROLLER
FROM
DYNAMICALLY
REGISTERING
CERTAIN
RESOURCE
RECORDS
426
13.16
DEREGISTERING
A
DOMAIN
CONTROLLER
'
S
RESOURCE
RECORDS
429
13.17
ALLOWING
COMPUTERS
TO
USE
A
DIFFERENT
DOMAIN
SUFFIX
FROM
THEIR
AD
DOMAIN
429
14.
SECURITY
AND
AUTHENTICATION
.
432
14.1
ENABLING
SSL/TLS
433
14.2
ENCRYPTING
LDAP
TRAFFIC
WITH
SSL,
TLS,
OR
SIGNING
434
XII
|
TABLE
OF
CONTENTS
14.3
ENABLING
ANONYMOUS
LDAP
ACCESS
436
14.4
RESTRICTING
HOSTS
FROM
PERFORMING
LDAP
QUERIES
438
14.5
USING
THE
DELEGATION
OF
CONTROL
WIZARD
439
14.6
CUSTOMIZING
THE
DELEGATION
OF
CONTROL
WIZARD
440
14.7
VIEWING
THE
ACL
FOR
AN
OBJECT
443
14.8
CUSTOMIZING
THE
ACL
EDITOR
444
14.9
VIEWING
THE
EFFECTIVE
PERMISSIONS
ON
AN
OBJECT
445
14.10
CHANGING
THE
ACL
OF
AN
OBJECT
446
14.11
CHANGING
THE
DEFAULT
ACL
FOR
AN
OBJECT
CLASS
IN
THE
SCHEMA
447
14.12
COMPARING
THE
ACL
OF
AN
OBJECT
TO
THE
DEFAULT
DEFINED
IN
THE
SCHEMA
448
14.13
RESETTING
AN
OBJECT
'
S
ACL
TO
THE
DEFAULT
DEFINED
IN
THE
SCHEMA
448
14.14
PREVENTING
THE
LM
HASH
OF
A
PASSWORD
FROM
BEING
STORED
449
14.15
ENABLING
LIST
OBJECT
ACCESS
MODE
450
14.16
MODIFYING
THE
ACL
ON
ADMINISTRATOR
ACCOUNTS
452
14.17
VIEWING
AND
PURGING
YOUR
KERBEROS
TICKETS
453
14.18
FORCING
KERBEROS
TO
USE
TCP
455
14.19
MODIFYING
KERBEROS
SETTINGS
456
15.
LOGGING,
MONITORING,
AND
QUOTAS
.
458
15.1
ENABLING
EXTENDED
DCPROMO
LOGGING
459
15.2
ENABLING
DIAGNOSTICS
LOGGING
461
15.3
ENABLING
NETLOGON
LOGGING
463
15.4
ENABLING
GPO
CLIENT
LOGGING
464
15.5
ENABLING
KERBEROS
LOGGING
465
15.6
ENABLING
DNS
SERVER
DEBUG
LOGGING
467
15.7
VIEWING
DNS
SERVER
PERFORMANCE
STATISTICS
469
15.8
ENABLING
INEFFICIENT
AND
EXPENSIVE
LDAP
QUERY
LOGGING
472
15.9
USING
THE
STATS
CONTROL
TO
VIEW
LDAP
QUERY
STATISTICS
474
15.10
USING
PERFMON
TO
MONITOR
AD
476
15.11
USING
PERFMON
TRACE
LOGS
TO
MONITOR
AD
478
15.12
ENABLING
AUDITING
OF
DIRECTORY
ACCESS
481
15.13
CREATING
A
QUOTA
482
15.14
FINDING
THE
QUOTAS
ASSIGNED
TO
A
SECURITY
PRINCIPAL
484
15.15
CHANGING
HOW
TOMBSTONE
OBJECTS
COUNT
AGAINST
QUOTA
USAGE
485
15.16
SETTING
THE
DEFAULT
QUOTA
FOR
ALL
SECURITY
PRINCIPALS
IN
A
PARTITION
487
15.17
FINDING
THE
QUOTA
USAGE
FOR
A
SECURITY
PRINCIPAL
488
TABLE
OF
CONTENTS
|
XIII
16.
BACKUP,
RECOVERY,
DIT
MAINTENANCE,
AND
DELETED
OBJECTS
.
491
16.1
BACKING
UP
ACTIVE
DIRECTORY
493
16.2
RESTARTING
A
DOMAIN
CONTROLLER
IN
DIRECTORY
SERVICES
RESTORE
MODE
494
16.3
RESETTING
THE
DIRECTORY
SERVICE
RESTORE
MODE
ADMINISTRATOR
PASSWORD
496
16.4
PERFORMING
A
NONAUTHORITATIVE
RESTORE
497
16.5
PERFORMING
AN
AUTHORITATIVE
RESTORE
OF
AN
OBJECT
OR
SUBTREE
498
16.6
PERFORMING
A
COMPLETE
AUTHORITATIVE
RESTORE
500
16.7
CHECKING
THE
DIT
FILE
'
S
INTEGRITY
501
16.8
MOVING
THE
DIT
FILES
502
16.9
REPAIRING
OR
RECOVERING
THE
DIT
502
16.10
PERFORMING
AN
ONLINE
DEFRAG
MANUALLY
503
16.11
DETERMINING
HOW
MUCH
WHITESPACE
IS
IN
THE
DIT
505
16.12
PERFORMING
AN
OFFLINE
DEFRAG
TO
RECLAIM
SPACE
506
16.13
CHANGING
THE
GARBAGE
COLLECTION
INTERVAL
508
16.14
LOGGING
THE
NUMBER
OF
EXPIRED
TOMBSTONE
OBJECTS
509
16.15
DETERMINING
THE
SIZE
OF
THE
ACTIVE
DIRECTORY
DATABASE
511
16.16
SEARCHING
FOR
DELETED
OBJECTS
512
16.17
RESTORING
A
DELETED
OBJECT
513
16.18
MODIFYING
THE
TOMBSTONE
LIFETIME
FOR
A
DOMAIN
515
17.
APPLICATION
PARTITIONS
.
517
17.1
CREATING
AND
DELETING
AN
APPLICATION
PARTITION
518
17.2
FINDING
THE
APPLICATION
PARTITIONS
IN
A
FOREST
521
17.3
ADDING
OR
REMOVING
A
REPLICA
SERVER
FOR
AN
APPLICATION
PARTITION
523
17.4
FINDING
THE
REPLICA
SERVERS
FOR
AN
APPLICATION
PARTITION
525
17.5
FINDING
THE
APPLICATION
PARTITIONS
HOSTED
BY
A
SERVER
527
17.6
VERIFYING
APPLICATION
PARTITIONS
ARE
INSTANTIATED
ON
A
SERVER
CORRECTLY
529
17.7
SETTING
THE
REPLICATION
NOTIFICATION
DELAY
FOR
AN
APPLICATION
PARTITION
530
17.8
SETTING
THE
REFERENCE
DOMAIN
FOR
AN
APPLICATION
PARTITION
532
17.9
DELEGATING
CONTROL
OF
MANAGING
AN
APPLICATION
PARTITION
534
18.
INTEROPERABILITY
AND
INTEGRATION
.
539
18.1
ACCESSING
AD
FROM
A
NON-WINDOWS
PLATFORM
539
18.2
PROGRAMMING
WITH
.NET
540
18.3
PROGRAMMING
WITH
DSML
542
18.4
PROGRAMMING
WITH
PERL
543
XIV
|
TABLE
OF
CONTENTS
18.5
PROGRAMMING
WITH
JAVA
544
18.6
PROGRAMMING
WITH
PYTHON
546
18.7
INTEGRATING
WITH
MIT
KERBEROS
547
18.8
INTEGRATING
WITH
SAMBA
548
18.9
INTEGRATING
WITH
APACHE
549
18.10
REPLACING
NIS
550
18.11
USING
BIND
FOR
DNS
551
18.12
AUTHORIZING
A
MICROSOFT
DHCP
SERVER
552
18.13
USING
VMWARE
FOR
TESTING
AD
553
APPENDIX:
TOOL
LIST
.
557
INDEX
.
575
TABLE
OF
CONTENTS
|
XV |
any_adam_object | 1 |
author | Allen, Robbie |
author_facet | Allen, Robbie |
author_role | aut |
author_sort | Allen, Robbie |
author_variant | r a ra |
building | Verbundindex |
bvnumber | BV016549109 |
classification_rvk | ST 261 |
ctrlnum | (OCoLC)633410096 (DE-599)BVBBV016549109 |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV016549109</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20050923</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">030225s2003 gw a||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">966286731</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596004648</subfield><subfield code="9">0-596-00464-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)633410096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV016549109</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Allen, Robbie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Active directory cookbook</subfield><subfield code="b">[for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes]</subfield><subfield code="c">Robbie Allen</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVI, 593 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Active Directory</subfield><subfield code="0">(DE-588)4561311-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows Server 2003</subfield><subfield code="0">(DE-588)4717241-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows Server</subfield><subfield code="0">(DE-588)4827986-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows 2000</subfield><subfield code="0">(DE-588)4547592-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Windows Server 2003</subfield><subfield code="0">(DE-588)4717241-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Active Directory</subfield><subfield code="0">(DE-588)4561311-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Windows 2000</subfield><subfield code="0">(DE-588)4547592-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Active Directory</subfield><subfield code="0">(DE-588)4561311-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Windows Server</subfield><subfield code="0">(DE-588)4827986-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010224671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010224671</subfield></datafield></record></collection> |
id | DE-604.BV016549109 |
illustrated | Illustrated |
indexdate | 2025-03-10T11:04:53Z |
institution | BVB |
isbn | 0596004648 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010224671 |
oclc_num | 633410096 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | XXVI, 593 S. Ill. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | O'Reilly |
record_format | marc |
spelling | Allen, Robbie Verfasser aut Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] Robbie Allen 1. ed. Beijing [u.a.] O'Reilly 2003 XXVI, 593 S. Ill. txt rdacontent n rdamedia nc rdacarrier Active Directory (DE-588)4561311-4 gnd rswk-swf Windows Server 2003 (DE-588)4717241-1 gnd rswk-swf Windows Server (DE-588)4827986-9 gnd rswk-swf Windows 2000 (DE-588)4547592-1 gnd rswk-swf Windows Server 2003 (DE-588)4717241-1 s Active Directory (DE-588)4561311-4 s DE-604 Windows 2000 (DE-588)4547592-1 s Windows Server (DE-588)4827986-9 s 1\p DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010224671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Allen, Robbie Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] Active Directory (DE-588)4561311-4 gnd Windows Server 2003 (DE-588)4717241-1 gnd Windows Server (DE-588)4827986-9 gnd Windows 2000 (DE-588)4547592-1 gnd |
subject_GND | (DE-588)4561311-4 (DE-588)4717241-1 (DE-588)4827986-9 (DE-588)4547592-1 |
title | Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] |
title_auth | Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] |
title_exact_search | Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] |
title_full | Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] Robbie Allen |
title_fullStr | Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] Robbie Allen |
title_full_unstemmed | Active directory cookbook [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] Robbie Allen |
title_short | Active directory cookbook |
title_sort | active directory cookbook for windows server 2003 windows 2000 solutions for administrators developers over 325 recipes |
title_sub | [for Windows Server 2003 & Windows 2000 ; solutions for administrators & developers ; over 325 recipes] |
topic | Active Directory (DE-588)4561311-4 gnd Windows Server 2003 (DE-588)4717241-1 gnd Windows Server (DE-588)4827986-9 gnd Windows 2000 (DE-588)4547592-1 gnd |
topic_facet | Active Directory Windows Server 2003 Windows Server Windows 2000 |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010224671&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT allenrobbie activedirectorycookbookforwindowsserver2003windows2000solutionsforadministratorsdevelopersover325recipes |