Networks Home
Networks Articles
Networks Links
Networks Books
Networks Tools
Networks Keywords


|
Networks
Active Directory Cookbook
|
|
See more Amazon Details
|
|
Contents Listing
Foreword
Preface
1. Getting Started
1.1 Where to Find the Tools
1.2 Getting Familiar with LDIF
1.3 Programming Notes
1.4 Replaceable Text
1.5 Where to Find More Information
2. Forests, Domains, and Trusts
2.1 Creating a Forest
2.2 Removing a Forest
2.3 Creating a Domain
2.4 Removing a Domain
2.5 Removing an Orphaned Domain
2.6 Finding the Domains in a Forest
2.7 Finding the NetBIOS Name of a Domain
2.8 Renaming a Domain
2.9 Changing the Mode of a Domain
2.10 Using ADPrep to Prepare a Domain or Forest for Windows Server 2003
2.11 Determining if ADPrep Has Completed
2.12 Checking Whether a Windows 2000 Domain Controller Can Be Upgraded to Windows Server 2003
2.13 Raising the Functional Level of a Windows Server 2003 Domain
2.14 Raising the Functional Level of a Windows Server 2003 Forest
2.15 Creating a Trust Between a Windows NT Domain and an AD Domain
2.16 Creating a Transitive Trust Between Two AD Forests
2.17 Creating a Shortcut Trust Between Two AD Domains
2.18 Creating a Trust to a Kerberos Realm
2.19 Viewing the Trusts for a Domain
2.20 Verifying a Trust
2.21 Resetting a Trust
2.22 Removing a Trust
2.23 Enabling SID Filtering for a Trust
2.24 Finding Duplicate SIDs in a Domain
3. Domain Controllers, Global Catalogs, and FSMOs
3.1 Promoting a Domain Controller
3.2 Promoting a Domain Controller from Media
3.3 Demoting a Domain Controller
3.4 Automating the Promotion or Demotion of a Domain Controller
3.5 Troubleshooting Domain Controller Promotion or Demotion Problems
3.6 Removing an Unsuccessfully Demoted Domain Controller
3.7 Renaming a Domain Controller
3.8 Finding the Domain Controllers for a Domain
3.9 Finding the Closest Domain Controller
3.10 Finding a Domain Controller's Site
3.11 Moving a Domain Controller to a Different Site
3.12 Finding the Services a Domain Controller Is Advertising
3.13 Configuring a Domain Controller to Use an External Time Source
3.14 Finding the Number of Logon Attempts Made Against a Domain Controller
3.15 Enabling the /3GB Switch to Increase the LSASS Cache
3.16 Cleaning Up Distributed Link Tracking Objects
3.17 Enabling and Disabling the Global Catalog
3.18 Determining if Global Catalog Promotion Is Complete
3.19 Finding the Global Catalog Servers in a Forest
3.20 Finding the Domain Controllers or Global Catalog Servers in a Site
3.21 Finding Domain Controllers and Global Catalogs via DNS
3.22 Changing the Preference for a Domain Controller
3.23 Disabling the Global Catalog Requirement During a Windows 2000 Domain Login
3.24 Disabling the Global Catalog Requirement During a Windows 2003 Domain Login
3.25 Finding the FSMO Role Holders
3.26 Transferring a FSMO Role
3.27 Seizing a FSMO Role
3.28 Finding the PDC Emulator FSMO Role Owner via DNS
4. Searching and Manipulating Objects
4.1 Viewing the RootDSE
4.2 Viewing the Attributes of an Object
4.3 Using LDAP Controls
4.4 Using a Fast or Concurrent Bind
4.5 Searching for Objects in a Domain
4.6 Searching the Global Catalog
4.7 Searching for a Large Number of Objects
4.8 Searching with an Attribute-Scoped Query
4.9 Searching with a Bitwise Filter
4.10 Creating an Object
4.11 Modifying an Object
4.12 Modifying a Bit-Flag Attribute
4.13 Dynamically Linking an Auxiliary Class
4.14 Creating a Dynamic Object
4.15 Refreshing a Dynamic Object
4.16 Modifying the Default TTL Settings for Dynamic Objects
4.17 Moving an Object to a Different OU or Container
4.18 Moving an Object to a Different Domain
4.19 Renaming an Object
4.20 Deleting an Object
4.21 Deleting a Container That Has Child Objects
4.22 Viewing the Created and Last Modified Timestamp of an Object
4.23 Modifying the Default LDAP Query Policy
4.24 Exporting Objects to an LDIF File
4.25 Importing Objects Using an LDIF File
4.26 Exporting Objects to a CSV File
4.27 Importing Objects Using a CSV File
5. Organizational Units
5.1 Creating an OU
5.2 Enumerating the OUs in a Domain
5.3 Enumerating the Objects in an OU
5.4 Deleting the Objects in an OU
5.5 Deleting an OU
5.6 Moving the Objects in an OU to a Different OU
5.7 Moving an OU
5.8 Determining How Many Child Objects an OU Has
5.9 Delegating Control of an OU
5.10 Allowing OUs to Be Created Within Containers
5.11 Linking a GPO to an OU
6. Users
6.1 Creating a User
6.2 Creating a Large Number of Users
6.3 Creating an inetOrgPerson User
6.4 Modifying an Attribute for Several Users at Once
6.5 Moving a User
6.6 Renaming a User
6.7 Copying a User
6.8 Unlocking a User
6.9 Finding Locked Out Users
6.10 Troubleshooting Account Lockout Problems
6.11 Viewing the Account Lockout and Password Policies
6.12 Enabling and Disabling a User
6.13 Finding Disabled Users
6.14 Viewing a User's Group Membership
6.15 Changing a User's Primary Group
6.16 Transferring a User's Group Membership to Another User
6.17 Setting a User's Password
6.18 Setting a User's Password via LDAP
6.19 Setting a User's Password via Kerberos
6.20 Preventing a User from Changing His Password
6.21 Requiring a User to Change Her Password at Next Logon
6.22 Preventing a User's Password from Expiring
6.23 Finding Users Whose Passwords Are About to Expire
6.24 Setting a User's Account Options (userAccountControl)
6.25 Setting a User's Account to Expire in the Future
6.26 Finding Users Whose Accounts Are About to Expire
6.27 Determining a User's Last Logon Time
6.28 Finding Users Who Have Not Logged On Recently
6.29 Setting a User's Profile Attributes
6.30 Viewing a User's Managed Objects
6.31 Modifying the Default Display Name Used When Creating Users in ADUC
6.32 Creating a UPN Suffix for a Forest
7. Groups
7.1 Creating a Group
7.2 Viewing the Direct Members of a Group
7.3 Viewing the Nested Members of a Group
7.4 Adding and Removing Members of a Group
7.5 Moving a Group
7.6 Changing the Scope or Type of a Group
7.7 Delegating Control for Managing Membership of a Group
7.8 Resolving a Primary Group ID
7.9 Enabling Universal Group Membership Caching
8. Computers
8.1 Creating a Computer
8.2 Creating a Computer for a Specific User or Group
8.3 Joining a Computer to a Domain
8.4 Moving a Computer
8.5 Renaming a Computer
8.6 Testing the Secure Channel for a Computer
8.7 Resetting a Computer
8.8 Finding Inactive or Unused Computers
8.9 Changing the Maximum Number of Computers a User Can Join to the Domain
8.10 Finding Computers with a Particular OS
8.11 Binding to the Default Container for Computers
8.12 Changing the Default Container for Computers
9. Group Policy Objects (GPOs)
9.1 Finding the GPOs in a Domain
9.2 Creating a GPO
9.3 Copying a GPO
9.4 Deleting a GPO
9.5 Viewing the Settings of a GPO
9.6 Modifying the Settings of a GPO
9.7 Importing Settings into a GPO
9.8 Assigning Logon/Logoff and Startup/Shutdown Scripts in a GPO
9.9 Installing Applications with a GPO
9.10 Disabling the User or Computer Settings in a GPO
9.11 Listing the Links for GPO
9.12 Creating a GPO Link to an OU
9.13 Blocking Inheritance of GPOs on an OU
9.14 Applying a Security Filter to a GPO
9.15 Creating a WMI Filter
9.16 Applying a WMI Filter to a GPO
9.17 Backing Up a GPO
9.18 Restoring a GPO
9.19 Simulating the RSoP
9.20 Viewing the RSoP
9.21 Refreshing GPO Settings on a Computer
9.22 Restoring a Default GPO
10. Schema
10.1 Registering the Active Directory Schema MMC Snap-in
10.2 Enabling Schema Updates
10.3 Generating an OID to Use for a New Class or Attribute
10.4 Generating a GUID to Use for a New Class or Attribute
10.5 Extending the Schema
10.6 Documenting Schema Extensions
10.7 Adding a New Attribute
10.8 Viewing an Attribute
10.9 Adding a New Class
10.10 Viewing a Class
10.11 Indexing an Attribute
10.12 Modifying the Attributes That Are Copied When Duplicating a User
10.13 Modifying the Attributes Included with Ambiguous Name Resolution
10.14 Adding or Removing an Attribute in the Global Catalog
10.15 Finding the Nonreplicated and Constructed Attributes
10.16 Finding the Linked Attributes
10.17 Finding the Structural, Auxiliary, Abstract, and 88 Classes
10.18 Finding the Mandatory and Optional Attributes of a Class
10.19 Modifying the Default Security of a Class
10.20 Deactivating Classes and Attributes
10.21 Redefining Classes and Attributes
10.22 Reloading the Schema Cache
11. Site Topology
11.1 Creating a Site
11.2 Listing the Sites
11.3 Deleting a Site
11.4 Creating a Subnet
11.5 Listing the Subnets
11.6 Finding Missing Subnets
11.7 Creating a Site Link
11.8 Finding the Site Links for a Site
11.9 Modifying the Sites That Are Part of a Site Link
11.10 Modifying the Cost for a Site Link
11.11 Disabling Site Link Transitivity or Site Link Schedules
11.12 Creating a Site Link Bridge
11.13 Finding the Bridgehead Servers for a Site
11.14 Setting a Preferred Bridgehead Server for a Site
11.15 Listing the Servers
11.16 Moving a Domain Controller to a Different Site
11.17 Configuring a Domain Controller to Cover Multiple Sites
11.18 Viewing the Site Coverage for a Domain Controller
11.19 Disabling Automatic Site Coverage for a Domain Controller
11.20 Finding the Site for a Client
11.21 Forcing a Host to a Particular Site
11.22 Creating a Connection Object
11.23 Listing the Connection Objects for a Server
11.24 Load-Balancing Connection Objects
11.25 Finding the ISTG for a Site
11.26 Transferring the ISTG to Another Server
11.27 Triggering the KCC
11.28 Determining if the KCC Is Completing Successfully
11.29 Disabling the KCC for a Site
11.30 Changing the Interval at Which the KCC Runs
12. Replication
12.1 Determining if Two Domain Controllers Are in Sync
12.2 Viewing the Replication Status of Several Domain Controllers
12.3 Viewing Unreplicated Changes Between Two Domain Controllers
12.4 Forcing Replication from One Domain Controller to Another
12.5 Changing the Intra-Site Replication Interval
12.6 Changing the Intersite Replication Interval
12.7 Disabling Inter-Site Compression of Replication Traffic
12.8 Checking for Potential Replication Problems
12.9 Enabling Enhanced Logging of Replication Events
12.10 Enabling Strict or Loose Replication Consistency
12.11 Finding Conflict Objects
12.12 Viewing Object Metadata
13. Domain Name System (DNS)
13.1 Creating a Forward Lookup Zone
13.2 Creating a Reverse Lookup Zone
13.3 Viewing a Server's Zones
13.4 Converting a Zone to an AD-Integrated Zone
13.5 Moving AD-Integrated Zones into an Application Partition
13.6 Delegating Control of a Zone
13.7 Creating and Deleting Resource Records
13.8 Querying Resource Records
13.9 Modifying the DNS Server Configuration
13.10 Scavenging Old Resource Records
13.11 Clearing the DNS Cache
13.12 Verifying That a Domain Controller Can Register Its Resource Records
13.13 Registering a Domain Controller's Resource Records
13.14 Preventing a Domain Controller from Dynamically Registering All Resource Records
13.15 Preventing a Domain Controller from Dynamically Registering Certain Resource Records
13.16 Deregistering a Domain Controller's Resource Records
13.17 Allowing Computers to Use a Different Domain Suffix from Their AD Domain
14. Security and Authentication
14.1 Enabling SSL/TLS
14.2 Encrypting LDAP Traffic with SSL, TLS, or Signing
14.3 Enabling Anonymous LDAP Access
14.4 Restricting Hosts from Performing LDAP Queries
14.5 Using the Delegation of Control Wizard
14.6 Customizing the Delegation of Control Wizard
14.7 Viewing the ACL for an Object
14.8 Customizing the ACL Editor
14.9 Viewing the Effective Permissions on an Object
14.10 Changing the ACL of an Object
14.11 Changing the Default ACL for an Object Class in the Schema
14.12 Comparing the ACL of an Object to the Default Defined in the Schema
14.13 Resetting an Object's ACL to the Default Defined in the Schema
14.14 Preventing the LM Hash of a Password from Being Stored
14.15 Enabling List Object Access Mode
14.16 Modifying the ACL on Administrator Accounts
14.17 Viewing and Purging Your Kerberos Tickets
14.18 Forcing Kerberos to Use TCP
14.19 Modifying Kerberos Settings
15. Logging, Monitoring, and Quotas
15.1 Enabling Extended dcpromo Logging
15.2 Enabling Diagnostics Logging
15.3 Enabling NetLogon Logging
15.4 Enabling GPO Client Logging
15.5 Enabling Kerberos Logging
15.6 Enabling DNS Server Debug Logging
15.7 Viewing DNS Server Performance Statistics
15.8 Enabling Inefficient and Expensive LDAP Query Logging
15.9 Using the STATS Control to View LDAP Query Statistics
15.10 Using Perfmon to Monitor AD
15.11 Using Perfmon Trace Logs to Monitor AD
15.12 Enabling Auditing of Directory Access
15.13 Creating a Quota
15.14 Finding the Quotas Assigned to a Security Principal
15.15 Changing How Tombstone Objects Count Against Quota Usage
15.16 Setting the Default Quota for All Security Principals in a Partition
15.17 Finding the Quota Usage for a Security Principal
16. Backup, Recovery, DIT Maintenance, and Deleted Objects
16.1 Backing Up Active Directory
16.2 Restarting a Domain Controller in Directory Services Restore Mode
16.3 Resetting the Directory Service Restore Mode Administrator Password
16.4 Performing a Nonauthoritative Restore
16.5 Performing an Authoritative Restore of an Object or Subtree
16.6 Performing a Complete Authoritative Restore
16.7 Checking the DIT File's Integrity
16.8 Moving the DIT Files
16.9 Repairing or Recovering the DIT
16.10 Performing an Online Defrag Manually
16.11 Determining How Much Whitespace Is in the DIT
16.12 Performing an Offline Defrag to Reclaim Space
16.13 Changing the Garbage Collection Interval
16.14 Logging the Number of Expired Tombstone Objects
16.15 Determining the Size of the Active Directory Database
16.16 Searching for Deleted Objects
16.17 Restoring a Deleted Object
16.18 Modifying the Tombstone Lifetime for a Domain
17. Application Partitions
17.1 Creating and Deleting an Application Partition
17.2 Finding the Application Partitions in a Forest
17.3 Adding or Removing a Replica Server for an Application Partition
17.4 Finding the Replica Servers for an Application Partition
17.5 Finding the Application Partitions Hosted by a Server
17.6 Verifying Application Partitions Are Instantiated on a Server Correctly
17.7 Setting the Replication Notification Delay for an Application Partition
17.8 Setting the Reference Domain for an Application Partition
17.9 Delegating Control of Managing an Application Partition
18. Interoperability and Integration
18.1 Accessing AD from a Non-Windows Platform
18.2 Programming with .NET
18.3 Programming with DSML
18.4 Programming with Perl
18.5 Programming with Java
18.6 Programming with Python
18.7 Integrating with MIT Kerberos
18.8 Integrating with Samba
18.9 Integrating with Apache
18.10 Replacing NIS
18.11 Using BIND for DNS
18.12 Authorizing a Microsoft DHCP Server
18.13 Using VMWare for Testing AD
Appendix: Tool List
Index
|
|
Contents
View a contents listing.
Short
Short Description.
Keyword Pages
2000
2003
Active Directory
Active Directory Schema
DNS
Domain Name System
LDAP
replication
system administration
systems administrator
systems adminitstration
Windows 2000
Windows Server
Windows Server 2003
Keyword Bestsellers
2000
2003
Active Directory Schema
DNS
Domain Name System
LDAP
replication
system administration
systems administrator
systems adminitstration
Windows 2000
Windows Server
Windows Server 2003
Active Directory
Networks Bestsellers The bestselling books on Amazon.
Articles
Lucent Offering Vulnerability Scanning
Intel Expands Telecom Offering
Agilent Claims Comprehensive Network Testing
Panavision Global Network
Visit our site of the month Sarbanes-Oxley at www.sarbanesoxleyuk.co.uk
|