Active directory cookbook:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
2013
|
Ausgabe: | 4th edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Previous edition: published as by Laura E. Hunter and Robbie Allen. 2009. - Includes index |
Beschreibung: | xxiii, 832 Seiten Illustratonen 24 cm |
ISBN: | 9781449361426 1449361420 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043574854 | ||
003 | DE-604 | ||
005 | 20160610 | ||
007 | t | ||
008 | 160530s2013 cc a||| |||| 00||| eng d | ||
010 | |a 013454593 | ||
020 | |a 9781449361426 |9 978-1-4493-6142-6 | ||
020 | |a 1449361420 |9 1-4493-6142-0 | ||
035 | |a (OCoLC)855550279 | ||
035 | |a (DE-599)BVBBV043574854 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a cc |c CN | ||
049 | |a DE-739 | ||
050 | 0 | |a TK5105.595 | |
082 | 0 | |a 005.7/1376 |2 23 | |
084 | |a ST 270 |0 (DE-625)143638: |2 rvk | ||
100 | 1 | |a Svidergol, Brian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Active directory cookbook |c Brian Svidergol and Robbie Allen |
250 | |a 4th edition | ||
264 | 1 | |c 2013 | |
300 | |a xxiii, 832 Seiten |b Illustratonen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Previous edition: published as by Laura E. Hunter and Robbie Allen. 2009. - Includes index | ||
630 | 0 | 4 | |a Microsoft Windows server |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Directory services (Computer network technology) | |
650 | 0 | 7 | |a Windows Server 2003 |0 (DE-588)4717241-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Windows 2000 |0 (DE-588)4547592-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Active Directory |0 (DE-588)4561311-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Windows Server |0 (DE-588)4827986-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Windows 2000 |0 (DE-588)4547592-1 |D s |
689 | 0 | 1 | |a Active Directory |0 (DE-588)4561311-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Windows Server 2003 |0 (DE-588)4717241-1 |D s |
689 | 1 | 1 | |a Active Directory |0 (DE-588)4561311-4 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Windows Server |0 (DE-588)4827986-9 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a Allen, Robbie |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028989629&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-028989629 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176252656943104 |
---|---|
adam_text | Table of Contents
Preface...................................................................xvii
1. Getting Started...................................................... 1
1.1. Approach to the Book 1
1.2. Where to Find the Tools 3
1.3. Getting Familiar with LDIF 4
1.4. Replaceable Text 6
1.5. Where to Find More Information 7
2. Forests, Domains, and Trusts........................................... 11
2.1. Creating a Forest 15
2.2. Removing a Forest 18
2.3. Creating a Domain 19
2.4. Removing a Domain 20
2.5. Removing an Orphaned Domain 22
2.6. Finding the Domains in a Forest 23
2.7. Finding the NetBIOS Name of a Domain 24
2.8. Renaming a Domain 25
2.9. Raising the Domain Functional Level to Windows Server 2012 27
2.10. Raising the Functional Level of a Windows Server 2008 or 2008 R2
Forest 28
2.11. Using AdPrep to Prepare a Domain or Forest for Windows Server 2012 30
2.12. Determining Whether AdPrep Has Completed 31
2.13. Checking Whether a Windows Domain Controller Can Be Upgraded to
Windows Server 2003 or 2008 34
2.14. Creating an External Trust 35
2.15. Creating a Transitive Trust Between Two AD Forests 37
2.16. Creating a Shortcut Trust Between Two AD Domains 38
2.17. Creating a Trust to a Kerberos Realm 40
iii
2.18. Viewing the Trusts for a Domain 41
2.19. Verifying a Trust 43
2.20. Resetting a Trust 45
2.21. Removing a Trust 45
2.22. Enabling SID Filtering for a Trust 47
2.23. Enabling Quarantine for a Trust 48
2.24. Managing Selective Authentication for a Trust 49
2.25. Finding Duplicate SIDs in a Domain 51
2.26. Adding Additional Fields to Active Directory Users and Computers 52
3. Domain Controllers, Global Catalogs, and FSMOs............................ 55
3.1. Promoting a Server to a Domain Controller 58
3.2. Promoting a Server to a Read-Only Domain Controller 59
3.3. Performing a Two-Stage RODC Installation 61
3.4. Modifying the Password Replication Policy 62
3.5. Promoting a Server to a Windows Server 2012 Domain Controller from
Media 64
3.6. Demoting a Domain Controller 66
3.7. Automating the Promotion or Demotion of a Domain Controller 67
3.8. Troubleshooting Domain Controller Promotion or Demotion Problems 68
3.9. Verifying the Promotion of a Domain Controller 70
3.10. Removing an Unsuccessfully Demoted Domain Controller 71
3.11. Renaming a Domain Controller 73
3.12. Finding the Domain Controllers for a Domain 74
3.13. Finding the Closest Domain Controller 75
3.14. Finding a Domain Controller s Site 76
3.15. Moving a Domain Controller to a Different Site 77
3.16. Finding the Services a Domain Controller Is Advertising 79
3.17. Restoring a Deleted Domain Controller in Windows Server 2012 80
3.18. Resetting the TCP/IP Stack on a Domain Controller 82
3.19. Configuring a Domain Controller to Use an External Time Source 83
3.20. Finding the Number of Logon Attempts Made Against a Domain
Controller 85
3.21. Enabling the /3GB Switch to Increase the LSASS Cache 86
3.22. Enabling and Disabling the Global Catalog 86
3.23. Determining Whether Global Catalog Promotion Is Complete 89
3.24. Finding the Global Catalog Servers in a Forest 90
3.25. Finding the Domain Controllers or Global Catalog Servers in a Site 91
3.26. Finding Domain Controllers and Global Catalogs via DNS 92
3.27. Changing the Preference for a Domain Controller 93
3.28. Disabling the Global Catalog Requirement for User Logon 95
3.29. Finding the FSMO Role Holders 95
iv | Table of Contents
3.30. Transferring a FSMO Role
3.31. Seizing a FSMO Role
3.32. Finding the PDC Emulator FSMO Role Owner via DNS
4. Searching and Manipulating Objects.............................
4.1. Viewing the RootDSE
4.2. Viewing the Attributes of an Object
4.3. Counting Objects in Active Directory
4.4. Using LDAP Controls
4.5. Using a Fast or Concurrent Bind
4.6. Connecting to an Object GUID
4.7. Connecting to a Well-Known GUID
4.8. Searching for Objects in a Domain
4.9. Searching the Global Catalog
4.10. Searching for a Large Number of Objects
4.11. Searching with an Attribute-Scoped Query
4.12. Searching with a Bitwise Filter
4.13. Creating an Object
4.14. Modifying an Object
4.15. Modifying a Bit-Flag Attribute
4.16. Dynamically Linking an Auxiliary Class
4.17. Creating a Dynamic Object
4.18. Refreshing a Dynamic Object
4.19. Modifying the Default TTL Settings for Dynamic Objects
4.20. Moving an Object to a Different OU or Container
4.21. Moving an Object to a Different Domain
4.22. Referencing an External Domain
4.23. Renaming an Object
4.24. Deleting an Object
4.25. Deleting a Container That Has Child Objects
4.26. Viewing the Created and Last-Modified Timestamp of an Object
4.27. Modifying the Default LDAP Query Policy
4.28. Exporting Objects to an LDIF File
4.29. Importing Objects Using an LDIF File
4.30. Exporting Objects to a CSV File
4.31. Importing Objects Using PowerShell and a CSV File
r
0 0
0030000000000
0000000000003
5.1. Creating an OU
5.2. Enumerating the OlJs in a Domain
5.3. Finding an OU
5.4. Enumerating the Objects in an OU
000000 0 00 0 40
97
99
100
103
104
106
110
112
114
116
117
120
122
124
126
128
131
134
136
139
140
142
144
145
147
149
150
153
155
156
157
159
160
161
162
16!»
166
168
169
170
fable of Contents | v
5.5. Deleting the Objects in an OU 172
5.6. Deleting an OU 173
5.7. Moving the Objects in an OU to a Different OU 175
5.8. Moving an OU 177
5.9. Renaming an OU 178
5.10. Modifying an OU 179
5.11. Determining Approximately How Many Child Objects an OU Has 181
5.12. Delegating Control of an OU 182
5.13. Assigning or Removing a Manager for an OU 183
5.14. Linking a GPO to an OU 185
5.15. Protecting an OU Against Accidental Deletion 186
6. Users............................................................. 189
6.1. Modifying the Default Display Name Used When Creating Users in
ADUCor ADAC 191
6.2. Creating a User 192
6.3. Creating a Large Number of Users 194
6.4. Creating an inetOrgPerson User 196
6.5. Converting a user Object to an inetOrgPerson Object (or Vice Versa) 198
6.6. Modifying an Attribute for Several Users at Once 200
6.7. Deleting a User 201
6.8. Setting a Users Profile Attributes 202
6.9. Moving a User 203
6.10. Redirecting Users to an Alternative OU 205
6.11. Renaming a User 206
6.12. Copying a User 208
6.13. Finding Locked-Out Users 209
6.14. Unlocking a User 210
6.15. Troubleshooting Account Lockout Problems 211
6.16. Viewing the Domain-Wide Account Lockout and Password Policies 213
6.17. Applying a Fine-Grained Password Policy to a User Object 216
6.18. Viewing the Fine-Grained Password Policy That Is in Effect for a User
Account 217
6.19. Enabling and Disabling a User 218
6.20. Finding Disabled Users 220
6.21. Viewing a Users Group Membership 221
6.22. Removing All Group Memberships from a User 223
6.23. Changing a Users Primary Group 224
6.24. Copying a Users Group Membership to Another User 225
6.25. Setting a Users Password 227
6.26. Preventing a User from Changing a Password 228
6.27. Requiring a User to Change a Password at Next Logon 229
vi | Table of Contents
6.28. Preventing a Users Password from Expiring 231
6.29. Finding Users Whose Passwords Are About to Expire 232
6.30. Viewing the RODCs That Have Cached a User s Password 233
6.31. Setting a Users Account Options (userAccountControl) 234
6.32. Setting a Users Account to Expire 236
6.33. Determining a Users Last Logon Time 238
6.34. Finding Users Who Have Not Logged On Recently 239
6.35. Viewing and Modifying a Users Permitted Logon Hours 241
6.36. Viewing a Users Managed Objects 242
6.37. Creating a UPN Suffix for a Forest 243
6.38. Restoring a Deleted User 245
6.39. Protecting a User Against Accidental Deletion 245
7. Groups............................................................... 247
7.1. Creating a Group 249
7.2. Viewing the Permissions of a Group 251
7.3. Viewing the Direct Members of a Group 252
7.4. Viewing the Nested Members of a Group 253
7.5. Adding and Removing Members of a Group 254
7.6. Moving a Group Within a Domain 256
7.7. Moving a Group to Another Domain 257
7.8. Changing the Scope or Type of a Group 259
7.9. Modifying Group Attributes 260
7.10. Delegating Control for Managing Membership of a Group 263
7.11. Resolving a Primary Group ID 264
7.12. Enabling Universal Group Membership Caching 266
7.13. Restoring a Deleted Group 268
7.14. Protecting a Group Against Accidental Deletion 269
7.15. Applying a Fine-Grained Password Policy to a Group Object 270
8. Computer Objects..................................................... 273
8.1. Creating a Computer 274
8.2. Creating a Computer for a Specific User or Group 276
8.3. Deleting a Computer 278
8.4. Joining a Computer to a Domain 278
8.5. Moving a Computer Within the Same Domain 280
8.6. Moving a Computer to a New Domain 281
8.7. Renaming a Computer 283
8.8. Adding or Removing a Computer Account from a Group 285
8.9. Testing the Secure Channel for a Computer 286
8.10. Resetting a Computer Account 287
8.11. Finding Inactive or ‘Unused Computers 289
Table of Contents j vti
8.12. Changing the Maximum Number of Computers a User Can Join to the
Domain 290
8.13. Modifying the Attributes of a computer Object 292
8.14. Finding Computers with a Particular OS 294
8.15. Binding to the Default Container for Computers 296
8.16. Changing the Default Container for Computers 298
8.17. Listing All the Computer Accounts in a Domain 300
8.18. Identifying a Computer Role 301
8.19. Protecting a Computer Against Accidental Deletion 302
8.20. Viewing the RODCs That Have Cached a Computer’s Password 303
9. Group Policy Objects................................................... 305
9.1. Finding the GPOs in a Domain 307
9.2. Creating a GPO 309
9.3. Copying a GPO 310
9.4. Deleting a GPO 311
9.5. Viewing the Settings of a GPO 312
9.6. Modifying the Settings of a GPO 313
9.7. Importing Settings into a GPO 314
9.8. Creating a Migration Table 316
9.9. Creating Custom Group Policy Settings 318
9.10. Assigning Logon/Logoff and Startup/Shutdown Scripts in a GPO 320
9.11. Installing Applications with a GPO 321
9.12. Disabling the User or Computer Settings in a GPO 322
9.13. Listing the Links for a GPO 323
9.14. Creating a GPO Link to an OU 324
9.15. Blocking Inheritance of GPOs on an OU 325
9.16. Enforcing the Settings of a GPO Link 326
9.17. Applying a Security Filter to a GPO 328
9.18. Delegating Administration of GPOs 329
9.19. Importing a Security Template 331
9.20. Creating a WMI Filter 332
9.21. Applying a WMI Filter to a GPO 333
9.22. Configuring Loopback Processing for a GPO 334
9.23. Backing Up a GPO 335
9.24. Restoring a GPO 337
9.25. Simulating the RSoP 338
9.26. Viewing the RSoP 339
9.27. Refreshing GPO Settings on a Computer 340
9.28. Restoring a Default GPO 341
9.29. Creating a Fine-Grained Password Policy 342
9.30. Editing a Fine-Grained Password Policy 343
viii | Table of Contents
9.31. Viewing the Effective PSO for a User
345
10. Schema................................................................... 347
10.1. Registering the Active Directory Schema MMC Snap-in 349
10.2. Generating an OID to Use for a New Class or Attribute 350
10.3. Extending the Schema 351
10.4. Preparing the Schema for an Active Directory Upgrade 352
10.5. Documenting Schema Extensions 353
10.6. Adding a New Attribute 354
10.7. Viewing an Attribute 358
10.8. Adding a New Class 360
10.9. Viewing a Class 362
10.10. Indexing an Attribute 363
10.11. Modifying the Attributes That Are Copied When Duplicating a User 365
10.12. Modifying the Attributes Included with ANR 367
10.13. Modifying the Set of Attributes Stored on a Global Catalog 369
10.14. Finding Nonreplicated and Constructed Attributes 371
10.15. Finding the Linked Attributes 373
10.16. Finding the Structural, Auxiliary, Abstract, and 88 Classes 375
10.17. Finding the Mandatory and Optional Attributes of a Class 377
10.18. Modifying the Default Security of a Class 378
10.19. Managing the Confidentiality Bit 379
10.20. Adding an Attribute to the Read-Only Filtered Attribute Set (RO-FAS) 381
10.21. Deactivating Classes and Attributes 382
10.22. Redefining Classes and Attributes 383
10.23. Reloading the Schema Cache 384
10.24. Managing the Schema Master FSMO 386
11. Site Topology........................................................... 389
11.1. Creating a Site 393
11.2. Listing Sites in a Domain 395
11.3. Renaming a Site 396
11.4. Deleting a Site 397
11.5. Delegating Control of a Site 398
11.6. Configuring Universal Group Caching for a Site 399
11.7. Creating a Subnet 401
11.8. Listing the Subnets 402
11.9. Finding Missing Subnets 403
11.10. Deleting a Subnet 405
11.11. Changing a Subnets Site Assignment 406
11.12. Creating a Site Link 407
11.13. Finding the Site Links for a Site 409
Table of Contents | ¡k
11.14. Modifying the Sites That Are Part of a Site Link 410
11.15. Modifying the Cost for a Site Link 411
11.16. Enabling Change Notification for a Site Link 412
11.17. Modifying Replication Schedules 414
11.18. Disabling Site Link Transitivity or Site Link Schedules 415
11.19. Creating a Site Link Bridge 417
11.20. Finding the Bridgehead Servers for a Site 418
11.21. Setting a Preferred Bridgehead Server for a Site 419
11.22. Listing the Servers 421
11.23. Moving a Domain Controller to a Different Site 422
11.24. Configuring a Domain Controller to Cover Multiple Sites 423
11.25. Viewing the Site Coverage for a Domain Controller 424
11.26. Disabling Automatic Site Coverage for a Domain Controller 425
11.27. Finding the Site for a Client 426
11.28. Forcing a Host into a Particular Site 427
11.29. Creating a connection Object 428
11.30. Listing the connection Objects for a Server 429
11.31. Finding the ISTG for a Site 429
11.32. Transferring the ISTG to Another Server 431
11.33. Triggering the KCC 432
11.34. Determining Whether the KCC Is Completing Successfully 433
11.35. Disabling the KCC for a Site 434
11.36. Changing the Interval at Which the KCC Runs 436
12. Replication................................................................439
12.1. Determining Whether Two Domain Controllers Are in Sync 439
12.2. Viewing the Replication Status of Several Domain Controllers 440
12.3. Viewing Unreplicated Changes Between Two Domain Controllers 441
12.4. Forcing Replication from One Domain Controller to Another 442
12.5. Enabling and Disabling Replication 444
12.6. Changing the Intra-Site Replication Notification Interval 445
12.7. Changing the Inter-Site Replication Interval 446
12.8. Disabling Inter-Site Compression of Replication Traffic 448
12.9. Checking for Potential Replication Problems 449
12.10. Enabling Enhanced Logging of Replication Events 450
12.11. Enabling Strict or Loose Replication Consistency 450
12.12. Finding conflict Objects 452
12.13. Finding Orphaned Objects 454
12.14. Listing the Replication Partners for a DC 455
12.15. Viewing Object Metadata 456
13, DNS and DHCP,.,
e4*o*»«»«,«o4«oe«9a»o ««o«oa9«4O0O»?oo«9«oo»*ft«4«Q»«o o»e
461
x I Table of Contents
13.1. Creating a Forward Lookup Zone 463
13.2. Creating a Reverse Lookup Zone 464
13.3. Viewing a Server’s Zones 466
13.4. Converting a Zone to an AD Integrated Zone 468
13.5. Moving AD Integrated Zones into an Application Partition 469
13.6. Configuring Zone Transfers 470
13.7. Configuring Forwarding 471
13.8. Configuring Conditional Forwarding 473
13.9. Delegating Control of an Active Directory Integrated Zone 474
13.10. Creating and Deleting Resource Records 475
13.11. Querying Resource Records 478
13.12. Modifying the DNS Server Configuration 479
13.13. Scavenging Old Resource Records 480
13.14. Clearing the DNS Cache 482
13.15. Verifying That a Domain Controller Can Register Its Resource Records 484
13.16. Enabling DNS Server Debug Logging 485
13.17. Registering a Domain Controllers Resource Records 488
13.18. Deregistering a Domain Controller’s Resource Records 488
13.19. Preventing a Domain Controller from Dynamically Registering All
Resource Records 489
13.20. Preventing a Domain Controller from Dynamically Registering Certain
Resource Records 490
13.21. Allowing Computers to Use a Domain Suffix That Is Different from
Their AD Domain 493
13.22. Authorizing a DHCP Server 495
13.23. Restricting DHCP Administrators 497
14. Security and Authentication........................................
14.1. Enabling SSL/TLS
14.2. Securing LDAP Traffic with SSL, TLS, or Signing
14.3. Disabling LDAP Signing
14.4. Enabling Anonymous LDAP Access
14.5. Using the Delegation of Control Wizard
14.6. Customizing the Delegation of Control Wizard
14.7. Revoking Delegated Permissions
14.8. Viewing the ACL for an Object
14.9. Customizing the ACL Editor
14.10. Viewing the Effective Permissions on an Object
14.11. Configuring Permission Inheritance
14.12. Changing the ACL of an Object
14.13. Changing the Default ACL for an Object Class in the Schema
14.14. Comparing the ACL of an Object to the Default Defined in the Schema
501
502
503
504
505
507
509
512
513
514
515
516
518
519
520
fable of Contents
XI
14.15. Resetting an Objects ACL to the Default Defined in the Schema 521
14.16. Enabling Strong Domain Authentication 521
14.17. Enabling List Object Access Mode 523
14.18. Modifying the ACL on Administrator Accounts 525
14.19. Viewing and Purging Your Kerberos Tickets 526
14.20. Forcing Kerberos to Use TCP 527
14.21. Modifying Kerberos Settings 529
14.22. Viewing Access Tokens 530
14.23. Creating a Claim Type 531
14.24. Creating a Resource Property 532
14.25. Configuring a Central Access Rule 533
14.26. Creating a Central Access Policy 534
14.27. Applying a Central Access Policy 535
14.28. Enabling Domain Controller Support for Claims and Compound
Authentication 536
14.29. Enabling Claims for Devices in a Domain 537
15. Logging, Monitoring, and Quotas.......................................... 539
15.1. Enabling Diagnostics Logging 540
15.2. Enabling NetLogon Logging 542
15.3. Enabling GPO Client Logging 543
15.4. Enabling Kerberos Logging 545
15.5. Viewing DNS Server Performance Statistics 546
15.6. Monitoring the Windows Time Service 548
15.7. Enabling Inefficient and Expensive LDAP Query Logging 549
15.8. Using the STATS Control to View LDAP Query Statistics 551
15.9. Monitoring the Performance of Active Directory 554
15.10. Using Perfmon Trace Logs to Monitor Active Directory 557
15.11. Creating an Administrative Alert 559
15.12. Emailing an Administrator on a Performance Alert 560
15.13. Enabling Auditing of Directory Access 561
15.14. Enabling Auditing of Registry Keys 564
15.15. Creating a Quota 565
15.16. Finding the Quotas Assigned to a Security Principal 567
15.17. Changing How Tombstone Objects Count Against Quota Usage 568
15.18. Setting the Default Quota for All Security Principals in a Partition 570
15.19. Finding the Quota Usage for a Security Principal 571
16. Backup, Recovery, DIT Maintenance, and Deleted Objects.. 575
16.1. Backing Up the Active Directory Database 578
16.2. Creating an Active Directory Snapshot 579
16.3. Mounting an Active Directory Snapshot 580
xii j Table of Contents
16.4. Accessing Active Directory Snapshot Data 581
16.5. Restarting a Domain Controller in Directory Services Repair Mode 582
16.6. Resetting the Directory Services Repair Mode Administrator Password 584
16.7. Performing a Nonauthoritative Restore 585
16.8. Performing an Authoritative Restore of an Object or Subtree 586
16.9. Performing a Complete Authoritative Restore 588
16.10. Checking the DIT Files Integrity 589
16.11. Moving the DIT Files 590
16.12. Repairing or Recovering the DIT 591
16.13. Performing an Online Defrag Manually 592
16.14. Performing a Database Recovery 593
16.15. Creating a Reserve File 595
16.16. Determining How Much Whitespace Is in the DIT 596
16.17. Performing an Offline Defrag to Reclaim Space 597
16.18. Changing the Garbage Collection Interval 598
16.19. Logging the Number of Expired Tombstone Objects 600
16.20. Determining the Size of the Active Directory Database 601
16.21. Searching for Deleted Objects 602
16.22. Undeleting a Single Object 603
16.23. Undeleting a Container Object 604
16.24. Modifying the Tombstone Lifetime for a Domain 605
17. Application Partitions....................................................607
17.1. Creating and Deleting an Application Partition 608
17.2. Finding the Application Partitions in a Forest 609
17.3. Adding or Removing a Replica Server for an Application Partition 611
17.4. Finding the Replica Servers for an Application Partition 613
17.5. Finding the Application Partitions Hosted by a Server 615
17.6. Verifying Application Partitions Are Instantiated Correctly on a Server 616
17.7. Setting the Replication Notification Delay for an Application Partition 618
17.8. Setting the Reference Domain for an Application Partition 620
17.9. Delegating Control of Managing an Application Partition 621
18. Active Directory Lightweight Directory Service..............
18.1. Installing AD LDS
18.2. Creating a New AD LDS Instance
18.3. Creating a New Replica of an AD LDS Configuration Set
18.4. Stopping and Starting an AD LDS Instance
18.5. Changing the Ports Used by an AD LDS Instance
18.6. Listing the AD LDS instances Installed on a Computer
18.7. Extending the AD LDS Schema
18.8. Managing AD LDS Application Partitions
00090409000
625
626
627
629
631
633
633
634
636
XIII
Table of Contents
18.9. Managing AD LDS Organizational Units 637
18.10. Managing AD LDS Users 639
18.11. Changing the Password for an AD LDS User 640
18.12. Enabling and Disabling an AD LDS User 641
18.13. Creating AD LDS Groups 643
18.14. Managing AD LDS Group Memberships 644
18.15. Viewing and Modifying AD LDS Object Attributes 646
18.16. Importing Data into an AD LDS Instance 647
18.17. Configuring Intra-Site Replication 649
18.18. Forcing AD LDS Replication 650
18.19. Managing AD LDS Replication Authentication 651
18.20. Managing AD LDS Permissions 652
18.21. Enabling Auditing of AD LDS Access 655
19. Active Directory Federation Services................................. 657
19.1. Installing AD FS Prerequisites 658
19.2. Installing the AD FS Federation Service 660
19.3. Configuring an LDAP Attribute Store 661
19.4. Configuring a Microsoft SQL Server Attribute Store 662
19.5. Creating Claim Descriptions 663
19.6. Creating a Relying Party Trust 664
19.7. Configuring a Claims Provider Trust 665
19.8. Configuring an Alternate UPN Suffix 667
19.9. Configuring AD FS 2.x and AD FS 1.x Interoperability 668
19.10. Configuring Logging for AD FS 671
20. Microsoft Exchange Server 2013........................................... 673
20.1. Exchange Server and Active Directory 673
20.2. Exchange Server 2013 Architecture 674
20.3. Finding Exchange Server Cmdlets 675
20.4. Preparing Active Directory for Exchange 676
20.5. Installing the First Exchange Server 2013 Server in an Organization 679
20.6. Creating Unattended Installation Files for Exchange Server 682
20.7. Installing Exchange Management Tools 683
20.8. Stopping and Starting Exchange Server 684
20.9. Mail-Enabling a User 687
20.10. Mail-Disabling a User 688
20.11. Mailbox-Enabling a User 689
20.12. Deleting a User s Mailbox 691
20.13. Moving a Mailbox 693
20.14. Viewing Mailbox Sizes and Message Counts 695
20.15. Configuring Mailbox Limits 698
xiv | Table of Contents
20.16. Creating an Address List 700
20.17. Creating a Database Availability Group 701
20.18. Creating a Mailbox Database 703
20.19. Enabling or Disabling Anti-Malware Scanning 704
20.20. Enabling Message Tracking 705
21. Microsoft Forefront Identity Manager................................. 707
21.1. Creating a SQL Server Management Agent 722
21.2. Creating an Active Directory Management Agent 724
21.3. Setting Up a Metaverse Object Deletion Rule 726
21.4. Setting Up a Simple Import Attribute Flow 727
21.5. Setting Up a Simple Export Attribute Flow to Active Directory 729
21.6. Defining an Advanced Import Attribute Flow 731
21.7. Implementing an Advanced Attribute Flow Rules Extension 733
21.8. Setting Up Advanced Export Attribute Flow in Active Directory 736
21.9. Configuring a Run Profile to Do an Initial Load of Data from a SQL
Server Management Agent 73 7
21.10. Loading Initial SQL Server Database Data into FIM 2010 R2 Using a
Run Profile 739
21.11. Configuring a Run Profile to Load the Container Structure from Active
Directory 740
21.12. Loading the Initial Active Directory Container Structure into FIM 2010
R2 Using a Run Profile 742
21.13. Setting Up a SQL Server Management Agent to Project Objects to the
Metaverse 743
21.14. Writing a Rules Extension to Provision User Objects 744
21.15. Creating a Run Profile for Provisioning 747
21.16. Executing the Provisioning Rule 749
21.17. Creating a Run Profile to Export Objects from the AD MA to Active
Directory 750
21.18. Exporting Objects to Active Directory Using an Export Run Profile 752
21.19. Creating a Run Profile Script 753
21.20. Creating a Controlling Script 755
21.21. Enabling Directory Synchronization from Active Directory to the FIR
Database 761
21.22. Configuring a Run Profile to Load the telephoneNumber from Active
Directory 762
21.23. Loading telephoneNumber Changes from AD into FIM Using a Delta
Import/Delta Sync Run Profile 765
21.24. Exporting telephoneNumber Data to a SQL Server Database 767
21.25. Using a SQL Server MA Export Run Profile to Export the
telephoneNumber to a SQL Server Database 768
Table of Contents | xv
21.26. Searching Data in the Connector Space 769
21.27. Searching Data in the Metaverse 771
21.28. Deleting Data in the Connector Space and Metaverse 772
21.29. Extending Object Types to Include a New Attribute 773
21.30. Previewing Changes to the FIM Configuration 774
21.31. Committing Changes to Individual Identities Using the Commit
Preview Feature 777
21.32. Passing Data Between Rules Extensions Using Transaction Properties 778
21.33. Using a Single Rules Extension to Affect Multiple Attribute Flows 779
21.34. Flowing a Null Value to a Data Source 780
21.35. Importing and Decoding the accountExpires Attribute 782
21.36. Exporting and Encoding the accountExpires Attribute 784
Index...................................................................... 787
xvi | Table of Contents
|
any_adam_object | 1 |
author | Svidergol, Brian Allen, Robbie |
author_facet | Svidergol, Brian Allen, Robbie |
author_role | aut aut |
author_sort | Svidergol, Brian |
author_variant | b s bs r a ra |
building | Verbundindex |
bvnumber | BV043574854 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.595 |
callnumber-search | TK5105.595 |
callnumber-sort | TK 45105.595 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 270 |
ctrlnum | (OCoLC)855550279 (DE-599)BVBBV043574854 |
dewey-full | 005.7/1376 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.7/1376 |
dewey-search | 005.7/1376 |
dewey-sort | 15.7 41376 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 4th edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02394nam a2200589 c 4500</leader><controlfield tag="001">BV043574854</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160610 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160530s2013 cc a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">013454593</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781449361426</subfield><subfield code="9">978-1-4493-6142-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1449361420</subfield><subfield code="9">1-4493-6142-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)855550279</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043574854</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cc</subfield><subfield code="c">CN</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.595</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.7/1376</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 270</subfield><subfield code="0">(DE-625)143638:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Svidergol, Brian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Active directory cookbook</subfield><subfield code="c">Brian Svidergol and Robbie Allen</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4th edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 832 Seiten</subfield><subfield code="b">Illustratonen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition: published as by Laura E. Hunter and Robbie Allen. 2009. - Includes index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Directory services (Computer network technology)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows Server 2003</subfield><subfield code="0">(DE-588)4717241-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows 2000</subfield><subfield code="0">(DE-588)4547592-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Active Directory</subfield><subfield code="0">(DE-588)4561311-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows Server</subfield><subfield code="0">(DE-588)4827986-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Windows 2000</subfield><subfield code="0">(DE-588)4547592-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Active Directory</subfield><subfield code="0">(DE-588)4561311-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Windows Server 2003</subfield><subfield code="0">(DE-588)4717241-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Active Directory</subfield><subfield code="0">(DE-588)4561311-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Windows Server</subfield><subfield code="0">(DE-588)4827986-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Allen, Robbie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028989629&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028989629</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043574854 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:29:14Z |
institution | BVB |
isbn | 9781449361426 1449361420 |
language | English |
lccn | 013454593 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028989629 |
oclc_num | 855550279 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xxiii, 832 Seiten Illustratonen 24 cm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
record_format | marc |
spelling | Svidergol, Brian Verfasser aut Active directory cookbook Brian Svidergol and Robbie Allen 4th edition 2013 xxiii, 832 Seiten Illustratonen 24 cm txt rdacontent n rdamedia nc rdacarrier Previous edition: published as by Laura E. Hunter and Robbie Allen. 2009. - Includes index Microsoft Windows server Operating systems (Computers) Directory services (Computer network technology) Windows Server 2003 (DE-588)4717241-1 gnd rswk-swf Windows 2000 (DE-588)4547592-1 gnd rswk-swf Active Directory (DE-588)4561311-4 gnd rswk-swf Windows Server (DE-588)4827986-9 gnd rswk-swf Windows 2000 (DE-588)4547592-1 s Active Directory (DE-588)4561311-4 s 1\p DE-604 Windows Server 2003 (DE-588)4717241-1 s 2\p DE-604 Windows Server (DE-588)4827986-9 s 3\p DE-604 Allen, Robbie Verfasser aut Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028989629&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Svidergol, Brian Allen, Robbie Active directory cookbook Microsoft Windows server Operating systems (Computers) Directory services (Computer network technology) Windows Server 2003 (DE-588)4717241-1 gnd Windows 2000 (DE-588)4547592-1 gnd Active Directory (DE-588)4561311-4 gnd Windows Server (DE-588)4827986-9 gnd |
subject_GND | (DE-588)4717241-1 (DE-588)4547592-1 (DE-588)4561311-4 (DE-588)4827986-9 |
title | Active directory cookbook |
title_auth | Active directory cookbook |
title_exact_search | Active directory cookbook |
title_full | Active directory cookbook Brian Svidergol and Robbie Allen |
title_fullStr | Active directory cookbook Brian Svidergol and Robbie Allen |
title_full_unstemmed | Active directory cookbook Brian Svidergol and Robbie Allen |
title_short | Active directory cookbook |
title_sort | active directory cookbook |
topic | Microsoft Windows server Operating systems (Computers) Directory services (Computer network technology) Windows Server 2003 (DE-588)4717241-1 gnd Windows 2000 (DE-588)4547592-1 gnd Active Directory (DE-588)4561311-4 gnd Windows Server (DE-588)4827986-9 gnd |
topic_facet | Microsoft Windows server Operating systems (Computers) Directory services (Computer network technology) Windows Server 2003 Windows 2000 Active Directory Windows Server |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028989629&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT svidergolbrian activedirectorycookbook AT allenrobbie activedirectorycookbook |