Active Directory

Published on June 2016 | Categories: Documents | Downloads: 159 | Comments: 0 | Views: 1344
of 76
Download PDF   Embed   Report

Comments

Content



Outline the step-by-step installation and configuration of Active Directory



A directory service for the efficient management of users, resources and privileges that is based on standard protocols



An efficient directory management service for users, resources and privileges that is based on standard Internet protocols

  

Domains Domain Trees Domain Forests



An object is a distinct named set of attributes that represents a network resource. Typical objects are users, groups, computers and printers. Each object has a number of attributes. For example, the user object has attributes such as password, name, password length and e-mail address.



Objects are typically grouped into classes, such as groups (a number of user accounts), computers and printers. When objects are grouped together, they are placed into a container that holds the objects (its like a desk draw that holds a number of objects).

 





Keep a central list of users and passwords Provide a set of servers to act as “authentication servers” known as a Domain Controller Maintain a searchable index of the things in the domain Allow you to create users with different levers of powers

   

Multiple selection of user objects Drag and Drop functionality Efficient search capabilities Saved Queries

      

The computer must be Windows 2k, 2k3 Server, Advanced Server or Datacenter Server. At least one volume on the computer must be formatted with NTFS. DNS must be active on the network prior to AD installation or be installed during AD installation. DNS must support SRV records and be dynamic. The computer must have IP protocol installed and have a static IP address. The Kerberos v5 authentication protocol must be installed. Time and zone information must be correct



From start menu run DCPROMO



DNS is required for AD to function

◦ Client use DNS to locate ad controllers ◦ Servers and client computers register their names and IP addresses with DNS for IP resolution



From start menu choose administrative tools and then AD tools



Requirements

◦ Existing domain ◦ Member server



Locate and ensure that the domain controller is present to create a child domain





Defines the various components of the users desktop environment that an administrator must manage Applies not only to user and client computers but also to member servers, domain controllers, and other 2003 server in scope of management







Manage registry-based policy with Administrative Templates Assign scripts. This includes scripts such as computer startup, shutdown, logon, and logoff redirect folders, such as My Documents and My Pictures, from the Documents and Settings folder on the local computer to network locations

 

AD users and computers AD users and computers are different from local users and computers



Computers may have to join a domain to be able to access the resources









There are numerous options to configure auditing of usage It allows you to target specific activities, instead of taking a wider sweep of all activity on a computer. with a narrower scope of what you are auditing, will result in smaller logs which make reviewing the logged information more efficient. Finally, reducing the auditing options to just what you need will reduce the load on the computer, allowing it to provide more resources to other activities.

       

Account logon and logon events Object access Account management Directory service access Policy change System events Process tracking Privilege





 

It keeps track of who tried to log on to what server This will audit each time a user is logging on or off from another computer in which the computer performing the auditing is used to validate the account. Example Windows XP logon to DC





This security setting determines whether to audit the event of a user accessing an object Example, a file, folder, registry key, printer, and so forth--that has its own system access control list (SACL) specified





Any changes to user or group accounts get logged here Examples:
◦ ◦ ◦ ◦ Create a user Create a group Modify a group’s membership Change a password



  

Determines whether to audit each instance of a user exercising a user right Too many outputs for every right exercised Be prepared for larger logs files Examples:
◦ Logging on ◦ Shutting down ◦ Changing the system time



 

Determines whether to audit when a user restarts or shuts down the computer or an event has occurred that affects either the system security or the security log Not many entries Logs whenever machine is restarted/shut down

◦ Example: When you clear the security log or resize it



This will audit each event that is related to a user accessing an Active Directory object which has been configured to track user access through the System Access Control List (SACL) of the object

 

Mostly used by programmers Tracks activity between program and the Operating systems

Sponsor Documents

Recommended

No recommend documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close