Active Directory

Published on June 2016 | Categories: Documents | Downloads: 163 | Comments: 0 | Views: 1413
of 76
Download PDF   Embed   Report



Outline the step-by-step installation and configuration of Active Directory

A directory service for the efficient management of users, resources and privileges that is based on standard protocols

An efficient directory management service for users, resources and privileges that is based on standard Internet protocols

  

Domains Domain Trees Domain Forests

An object is a distinct named set of attributes that represents a network resource. Typical objects are users, groups, computers and printers. Each object has a number of attributes. For example, the user object has attributes such as password, name, password length and e-mail address.

Objects are typically grouped into classes, such as groups (a number of user accounts), computers and printers. When objects are grouped together, they are placed into a container that holds the objects (its like a desk draw that holds a number of objects).

 

Keep a central list of users and passwords Provide a set of servers to act as “authentication servers” known as a Domain Controller Maintain a searchable index of the things in the domain Allow you to create users with different levers of powers

   

Multiple selection of user objects Drag and Drop functionality Efficient search capabilities Saved Queries

      

The computer must be Windows 2k, 2k3 Server, Advanced Server or Datacenter Server. At least one volume on the computer must be formatted with NTFS. DNS must be active on the network prior to AD installation or be installed during AD installation. DNS must support SRV records and be dynamic. The computer must have IP protocol installed and have a static IP address. The Kerberos v5 authentication protocol must be installed. Time and zone information must be correct

From start menu run DCPROMO

DNS is required for AD to function

◦ Client use DNS to locate ad controllers ◦ Servers and client computers register their names and IP addresses with DNS for IP resolution

From start menu choose administrative tools and then AD tools


◦ Existing domain ◦ Member server

Locate and ensure that the domain controller is present to create a child domain

Defines the various components of the users desktop environment that an administrator must manage Applies not only to user and client computers but also to member servers, domain controllers, and other 2003 server in scope of management

Manage registry-based policy with Administrative Templates Assign scripts. This includes scripts such as computer startup, shutdown, logon, and logoff redirect folders, such as My Documents and My Pictures, from the Documents and Settings folder on the local computer to network locations

 

AD users and computers AD users and computers are different from local users and computers

Computers may have to join a domain to be able to access the resources

There are numerous options to configure auditing of usage It allows you to target specific activities, instead of taking a wider sweep of all activity on a computer. with a narrower scope of what you are auditing, will result in smaller logs which make reviewing the logged information more efficient. Finally, reducing the auditing options to just what you need will reduce the load on the computer, allowing it to provide more resources to other activities.

       

Account logon and logon events Object access Account management Directory service access Policy change System events Process tracking Privilege

 

It keeps track of who tried to log on to what server This will audit each time a user is logging on or off from another computer in which the computer performing the auditing is used to validate the account. Example Windows XP logon to DC

This security setting determines whether to audit the event of a user accessing an object Example, a file, folder, registry key, printer, and so forth--that has its own system access control list (SACL) specified

Any changes to user or group accounts get logged here Examples:
◦ ◦ ◦ ◦ Create a user Create a group Modify a group’s membership Change a password

  

Determines whether to audit each instance of a user exercising a user right Too many outputs for every right exercised Be prepared for larger logs files Examples:
◦ Logging on ◦ Shutting down ◦ Changing the system time

 

Determines whether to audit when a user restarts or shuts down the computer or an event has occurred that affects either the system security or the security log Not many entries Logs whenever machine is restarted/shut down

◦ Example: When you clear the security log or resize it

This will audit each event that is related to a user accessing an Active Directory object which has been configured to track user access through the System Access Control List (SACL) of the object

 

Mostly used by programmers Tracks activity between program and the Operating systems

Sponsor Documents

Or use your account on


Forgot your password?

Or register your new account on


Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in