Hands-On Microsoft Windows Server 2003 Active Directory

by ; ;
Edition: 1st
Format: Paperback
Pub. Date: 2003-07-15
Publisher(s): Course Technology
List Price: $145.00

Buy New

Usually ships in 2 to 3 business days.
$144.86

Rent Textbook

Select for Price
There was a problem. Please try again later.

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The Hands-on Windows XP Professional and Server 2003 Networking Series is designed for the instructors and students interested in the new Microsoft Windows XP Professional and Server 2003 networking technology, but not immediately interested covering the MCSE/MCSA Exam objectives. These practical books provide complete coverage of Windows XP Professional and Server 2003 networking concepts in a concise manner, and include ample opportunity for students to get practical experience with hands-on exercises and real-world scenarios distributed throughout the chapters.

Table of Contents

Introduction xi
Active Directory: The Directory Service for Microsoft Windows Networks
1(28)
Introducing Active Directory
2(8)
Active Directory as the Directory Service for the Operating System
2(5)
Active Directory as a Directory Service for Applications
7(2)
Active Directory Is an Application Itself
9(1)
The Power of Active Directory
9(1)
Introduction to Multinational Mega Corporation and Heartland Hospital
10(1)
The Building Blocks of Active Directory
10(13)
Windows Domains
10(4)
Forests and Trees
14(1)
The Active Directory Schema
15(1)
Active Directory Classes, Objects, and Attributes
16(3)
Replication and Partitions
19(2)
Searching and Global Catalog Servers
21(2)
Chapter Summary
23(1)
Key Terms
24(1)
Review Questions
25(2)
MNC/Heartland Hospital Case Projects
27(2)
Case Project Background
27(2)
Installing Active Directory
29(38)
Understanding the Domain Name System
30(11)
DNS Structure
30(1)
DNS Names
30(3)
DNS Servers
33(3)
The DNS Name Resolution Process
36(4)
Common Errors and Misconceptions About DNS
40(1)
Using DNS with Active Directory
41(7)
Defining the Namespace
41(1)
Locating Services
41(1)
Resolving Names to IP Addresses
42(1)
Installing Microsoft DNS Server in Windows Server 2003
42(6)
Installing Active Directory
48(13)
Exploring Available Options in the Active Directory Installation Wizard
48(1)
Gathering the Required Information
48(2)
Running the Active Directory Installation Wizard
50(11)
Chapter Summary
61(1)
Key Terms
62(1)
Review Questions
62(2)
Multinational Mega Corporation Case Projects
64(3)
An Active Directory Design Philosophy
67(16)
Introducing Design Philosophy
68(1)
Ownership Roles
69(2)
A Question of Trust
71(1)
Making Active Directory Design Decisions
72(2)
Design to Support the Organization's Goals
72(1)
Gaining Executive Sponsorship with Documented Value
72(1)
Designing for the Future and the Present
73(1)
Designing to Support the Delegation of Authority
73(1)
Designing to Support the Application of Group Policy
74(1)
Justifying the Design
74(1)
Starting a Design Project
74(3)
Microsoft Solutions Framework (MSF)
75(1)
Microsoft Operations Framework (MOF)
76(1)
The Need for a Vision
77(1)
Chapter Summary
78(1)
Key Terms
79(1)
Review Questions
80(2)
Case Projects
82(1)
Practical Active Directory Design Decisions
83(34)
Choosing a DNS Name
84(9)
What Makes a Good DNS Name?
84(2)
Choosing How DNS Names for Internet and Active Directory Will Be Related
86(5)
Best Practices for Choosing a DNS Name
91(2)
Designing a Forest
93(1)
Characteristics of a Forest
93(1)
How Many Forests?
93(1)
Understanding and Implementing Trust Relationships
94(7)
Two-Way, Transitive Trusts
94(2)
Shortcut Trusts
96(2)
Explicit Inter-Forest Trusts
98(3)
Designing Domains
101(4)
Functions of a Domain
102(1)
The Forest Root Domain
103(1)
Is It a Security Boundary?
104(1)
Which Works Better: Single or Multiple Domains?
104(1)
Using a Dedicated Forest Root
104(1)
Designing Organizational Units
105(1)
Best Practices for Designing OUs
106(2)
Chapter Summary
108(1)
Key Terms
109(1)
Review Questions
110(2)
Heartland Hospital Case Projects
112(5)
Managing Directory Objects: Users, Groups, and Resources
117(44)
Creating and Managing User Objects
118(21)
User Classes, Properties, and Schema
118(1)
Creating Users with Active Directory Users and Computers
118(5)
Setting Additonal Attributes
123(14)
Resetting Passwords
137(2)
Creating Users Programmatically
139(1)
Working with Groups
139(10)
Group Types
139(1)
Group Scopes
140(4)
Groups as Members of Other Groups
144(1)
Creating Groups
145(1)
Changing Groups
146(3)
Creating Resource Objects
149(2)
Shared Folder
149(1)
Printers
150(1)
Other Resources
150(1)
Organizing Objects in the Directory
151(3)
Organizing and Controlling with OUs
151(2)
Moving Objects between OUs
153(1)
Moving Objects between Domains
153(1)
Chapter Summary
154(1)
Key Terms
154(1)
Review Questions
155(2)
Heartland Hospital Case Projects
157(4)
Securing and Protecting the Network
161(42)
Security Concepts in Active Directory
162(8)
Security Principals
163(2)
Kerberos Tickets and Access Tokens
165(1)
Discretionary Access Control Lists (DACL)
166(1)
System Access Control Lists (SACL)
166(1)
ACEs that Allow or Deny
166(2)
Inheritance
168(1)
Groups in Security
168(2)
Protecting Objects in Active Directory
170(6)
Delegation of Control
170(2)
Granular Control
172(4)
Protecting Network Resources
176(10)
The NT File System (NTFS)
176(5)
Printers
181(1)
File Shares
181(1)
Registry Keys
182(3)
Other Applications
185(1)
Understanding the User Authentication Process
186(9)
Kerberos Version 5
186(1)
Kerberos in Action
187(3)
NTLM Authentication
190(1)
Down-Level Client Authentication
191(1)
Two-Factor Authentication
192(1)
Public Key Infrastructure for Authentication with Smart Cards
193(2)
Chapter Summary
195(1)
Key Terms
196(1)
Review Questions
197(2)
Heartland Hospital Case Projects
199(4)
Active Directory Sites
203(32)
Understanding Sites
204(1)
Active Directory Objects Related to Sites
204(14)
Naming Contexts (Partitions)
204(5)
Site Objects
209(1)
Subnet Objects
210(1)
Domain Controllers
211(1)
Bridgehead Servers
212(4)
Connection Objects
216(1)
Global Catalog
217(1)
Planning and Designing Sites
218(4)
Physical Network
218(1)
Site Topology
219(3)
Creating and Managing Sites
222(5)
Assigning Computers to Sites
223(1)
Creating Sites
223(2)
Modifying the Default-First-Site-Name Site
225(1)
Configuring Site Links
225(1)
Configuring Site Link Bridges
226(1)
Chapter Summary
227(1)
Key Terms
227(1)
Review Questions
228(2)
Heartland Hospital Case Projects
230(5)
Active Directory Replication
235(22)
The Replication Process
236(2)
Tracking Replication
236(1)
Replication Timing
236(2)
Replication Topology
238(2)
Active Directory Partitions
238(1)
Intra-site Replication
238(1)
Inter-site Replication
239(1)
Replication Updates
240(1)
Replication Conflicts
240(1)
Managing Active Directory Replication
240(5)
Using Sites
241(2)
Site Links
243(2)
Monitoring Active Directory Replication
245(3)
Operations Masters
248(2)
Schema Master
248(1)
Domain Naming Master
249(1)
RID Master
249(1)
PDC Emulator
249(1)
Infrastructure Master
250(1)
Troubleshooting Active Directory Replication
250(1)
Chapter Summary
251(1)
Key Terms
251(2)
Review Questions
253(3)
Heartland Hospital Case Project
256(1)
Active Directory Maintenance and Data Recovery
257(26)
Active Directory File Structure
258(1)
NTDS.DIT
258(1)
EDB.LOG
259(1)
EDBXXXXX.LOG
259(1)
EDB.CHK
259(1)
RES1.LOG and RES2.LOG
259(1)
TEMP.EDB
259(1)
How Data is Written to Active Directory
259(1)
Managing Deleted Objects
260(1)
Defragmenting the Database
260(3)
Online Defragmentation
261(1)
Offline Defragmentation
261(2)
Moving the Active Directory Database
263(1)
Backing up Active Directory
263(2)
Recovering Active Directory
265(6)
Soft Recovery
265(1)
Repairing Active Directory
265(1)
Restoring Active Directory
266(5)
Reinstalling Active Directory
271(1)
Operations Master Roles
271(6)
Changing the Holder of Operations Master Roles
273(4)
Chapter Summary
277(1)
Key Terms
277(1)
Review Questions
278(3)
Heartland Hospital Case Projects
281(2)
Using Active Directory as a Tool to Enforce Corporate Policy
283(36)
Group Policy
284(4)
Administrative Templates
284(1)
Group Policy Storage
285(3)
Group Policy Application
288(9)
Group Policy Priority
288(3)
Modifying Group Policy Priority
291(4)
Controlling Group Policy Application with Permissions
295(1)
Windows Management Instrumentation Filters
296(1)
Desktop Management with Group Policy
297(4)
Restricting Windows
297(1)
Folder Redirection
297(3)
Scripts
300(1)
Application Distribution with Group Policy
301(4)
Application Types
301(2)
Maintaining Applications
303(2)
Security Management with Group Policy
305(5)
Account Policies
305(1)
Local Policies
306(1)
Restricted Groups
306(1)
System Services
306(1)
Registry Settings
306(1)
File System
306(1)
Wireless Network Policies
306(1)
IP Security Policies
307(1)
Security Templates
307(1)
Analyzing Security
308(2)
Troubleshooting Group Policy
310(2)
Troubleshooting Tools
310(2)
Chapter Summary
312(1)
Key Terms
312(2)
Review Questions
314(3)
Heartland Hospital Case Projects
317(2)
Interoperability Between Active Directory and Other Directories
319(18)
Lightweight Directory Access Protocol
320(6)
A Common Protocol for Directory Access
320(1)
LDAP and Active Directory
321(1)
LDAP Naming
322(1)
Lightweight Directory Interchange Format
323(1)
Querying Active Directory Using LDAP
324(2)
Active Directory Services Interface
326(3)
A Common Programming Mechanism for Directory Access
326(1)
Administrative Uses for ADSI
326(3)
Microsoft Metadirectory Services
329(1)
Management Agents
329(1)
Active Directory Connector
330(1)
Installing ADC
330(1)
Configuring Connection Agreements
330(1)
Chapter Summary
331(1)
Key Terms
331(1)
Review Questions
332(2)
Heartland Hospital Case Projects
334(3)
Upgrading a Windows NT or Windows 2000 Domain
337(24)
Active Directory Functionality Levels
338(11)
Windows 2000 Mixed Domains
339(1)
Windows 2000 Native Domains
340(2)
Windows 2003 Interim Domains
342(1)
Windows 2003 Native Domains
342(3)
Windows 2000 Forests
345(1)
Windows 2003 Interim Forests
346(1)
Windows 2003 Forests
346(3)
Upgrading Windows NT Domains
349(4)
Domain Structure
349(1)
Keeping the Existing Domain Structure
350(2)
Creating a New Domain Structure
352(1)
PDC Overloading
352(1)
Upgrading Windows 2000 Domains
353(1)
Adding Windows Server 2003 Domain Controllers
353(1)
Restructuring Existing Domains
353(1)
Chapter Summary
354(1)
Key Terms
355(1)
Review Questions
356(2)
Sacred Heart Hospital Case Projects
358(3)
Glossary 361(10)
Index 371

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.