Acknowledgments |
|
x | |
Introduction |
|
xi | |
PART I Understanding Active Directory Services |
|
|
Understanding Directory Services |
|
|
3 | (20) |
|
Network History and the Need for Directory Services |
|
|
3 | (3) |
|
|
4 | (1) |
|
The Expansion of the Enterprise Network |
|
|
4 | (1) |
|
Administration Needs in the Small Company |
|
|
5 | (1) |
|
|
6 | (3) |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
9 | (3) |
|
|
10 | (1) |
|
What Is a Directory Service? |
|
|
10 | (2) |
|
The Enterprise Directory Service Shopping List |
|
|
12 | (5) |
|
Enterprise Directory Service Requirements |
|
|
13 | (1) |
|
How Active Directory Services Meets Enterprise Directory Service Requirements |
|
|
14 | (3) |
|
Real-Life Directory Examples |
|
|
17 | (4) |
|
The Simple Directory Example |
|
|
17 | (1) |
|
The Advanced Directory Service Example |
|
|
18 | (3) |
|
Directory Service vs. Relational Database |
|
|
21 | (1) |
|
|
21 | (2) |
|
Active Directory Services as a Directory Service Implementation |
|
|
23 | (14) |
|
Active Directory Technical Specifications |
|
|
24 | (4) |
|
Centralization and Scalability |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Interoperability and Standardization |
|
|
27 | (1) |
|
Active Directory Features |
|
|
28 | (3) |
|
Administration Delegation |
|
|
28 | (1) |
|
Automated Software Distribution |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Printer Search Capabilities |
|
|
31 | (1) |
|
Required Authentication Mechanism |
|
|
31 | (1) |
|
Where Is Active Directory Services? |
|
|
31 | (5) |
|
Departure from the Windows NT 4 Approach |
|
|
32 | (4) |
|
|
36 | (1) |
|
Windows 2000 Domains and Active Directory Services |
|
|
37 | (18) |
|
|
37 | (10) |
|
|
38 | (7) |
|
Administrative Boundaries |
|
|
45 | (2) |
|
Active Directory Services Interaction |
|
|
47 | (5) |
|
Emulating the Domain Hierarchy |
|
|
47 | (1) |
|
Cataloging the Domain (the Directory Partition) |
|
|
47 | (5) |
|
Cataloging the Enterprise (the Global Catalog) |
|
|
52 | (1) |
|
|
52 | (3) |
|
Active Directory Services Scalability Architecture |
|
|
55 | (16) |
|
The Importance of Scalability |
|
|
55 | (1) |
|
|
56 | (2) |
|
Catalog Services (the Global Catalog) |
|
|
58 | (6) |
|
|
59 | (1) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
61 | (1) |
|
How the Global Catalog Operates |
|
|
62 | (2) |
|
|
64 | (4) |
|
Replication Process Overview |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (2) |
|
|
68 | (2) |
|
|
70 | (1) |
|
More Active Directory Services Architecture |
|
|
71 | (10) |
|
Achieving Ease of Administration |
|
|
71 | (2) |
|
Easing Administration with Centralization |
|
|
72 | (1) |
|
Easing Administration with Standards Compliance |
|
|
72 | (1) |
|
Administration Building Blocks |
|
|
72 | (1) |
|
|
73 | (1) |
|
Achieving Application Integration |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Achieving Standardization and Openness |
|
|
75 | (2) |
|
|
77 | (4) |
|
Centralized Administrative Interface |
|
|
77 | (1) |
|
|
77 | (2) |
|
Active Directory Connectors |
|
|
79 | (1) |
|
|
79 | (2) |
|
Active Directory Services and DNS |
|
|
81 | (36) |
|
|
82 | (17) |
|
Computer Names, Host Names, FQDNs, and Relative Distinguished Names |
|
|
83 | (1) |
|
|
84 | (3) |
|
|
87 | (12) |
|
DNS Name-Resolution Operations |
|
|
99 | (4) |
|
|
100 | (1) |
|
|
101 | (2) |
|
How Active Directory Services Uses DNS |
|
|
103 | (9) |
|
Domain Controller Registration |
|
|
103 | (1) |
|
SRV Resource Record Registration |
|
|
104 | (5) |
|
Locating a Domain Controller |
|
|
109 | (3) |
|
Integrating DNS with Active Directory Services |
|
|
112 | (5) |
PART II Deploying Active Directory Services |
|
|
Planning an Active Directory Services Deployment |
|
|
117 | (32) |
|
Overview of Planning Decisions |
|
|
118 | (6) |
|
Components of Your Active Directory Services Plan |
|
|
118 | (2) |
|
Understanding Windows 2000 Groups |
|
|
120 | (3) |
|
Noteworthy Built-In Windows 2000 Groups |
|
|
123 | (1) |
|
Active Directory Services Planning Recommendations |
|
|
124 | (24) |
|
|
124 | (3) |
|
|
127 | (13) |
|
Planning Organizational Units |
|
|
140 | (3) |
|
Planning Sites: Getting Tight with the Network |
|
|
143 | (5) |
|
|
148 | (1) |
|
Active Directory Services and Security |
|
|
149 | (40) |
|
|
149 | (3) |
|
Windows 2000 Security Primitives |
|
|
149 | (2) |
|
Security Implementation vs. Security Protocols |
|
|
151 | (1) |
|
Active Directory Security |
|
|
152 | (4) |
|
Object and Attribute Security |
|
|
153 | (2) |
|
Directory Database Security |
|
|
155 | (1) |
|
Understanding the Windows 2000 Security Infrastructure |
|
|
156 | (27) |
|
Logon, Authentication, and Authorization |
|
|
157 | (2) |
|
Understanding the Kerberos Protocol |
|
|
159 | (11) |
|
Understanding Public Key Infrastructure |
|
|
170 | (11) |
|
|
181 | (2) |
|
Security and Active Directory Deployments |
|
|
183 | (6) |
|
Security and Domain Trusts |
|
|
183 | (2) |
|
|
185 | (4) |
|
Managing Active Directory Services |
|
|
189 | (96) |
|
|
190 | (64) |
|
Mapping Windows NT Tasks to Windows 2000 Interfaces |
|
|
192 | (1) |
|
Promoting Windows 2000 Servers to Domain Controllers |
|
|
193 | (10) |
|
Using Active Directory Services Snap-Ins |
|
|
203 | (38) |
|
Delegating Administration |
|
|
241 | (5) |
|
Performing Active Directory Services Backups and Restores |
|
|
246 | (8) |
|
|
254 | (16) |
|
Managing Replication Strategies |
|
|
255 | (6) |
|
Windows 2000 Group Policy |
|
|
261 | (4) |
|
|
265 | (5) |
|
|
270 | (14) |
|
Getting the Most out of the Command Line |
|
|
271 | (6) |
|
Active Directory Services Command-Line Utilities |
|
|
277 | (7) |
|
|
284 | (1) |
|
Working with the Active Directory Services Schema |
|
|
285 | (34) |
|
|
285 | (10) |
|
|
286 | (1) |
|
Content and Structure Enforcement |
|
|
287 | (4) |
|
Object Interaction Clarified |
|
|
291 | (4) |
|
|
295 | (2) |
|
|
295 | (1) |
|
|
295 | (1) |
|
Base DIT Attribute Listing |
|
|
296 | (1) |
|
|
297 | (20) |
|
classSchema Configuration Parameters |
|
|
298 | (2) |
|
Creating New Schema Class Objects |
|
|
300 | (8) |
|
attributeSchema Object Configuration Parameters |
|
|
308 | (6) |
|
Creating New Schema Attribute Objects |
|
|
314 | (1) |
|
Deactivating Classes and Attributes |
|
|
315 | (1) |
|
Resurrecting Classes and Attributes |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (2) |
|
Upgrading to Active Directory Services |
|
|
319 | (20) |
|
Understanding Your Upgrade Options |
|
|
320 | (4) |
|
Upgrade or Restructure: Choosing the Right Path |
|
|
321 | (3) |
|
Upgrading from a Windows NT Environment |
|
|
324 | (9) |
|
|
324 | (7) |
|
Upgrading Additional Domains |
|
|
331 | (1) |
|
Transitioning LAN Manager Replication to File Replication Services (FRS) |
|
|
331 | (1) |
|
Transitioning Routing and Remote Access Service (RRAS) Servers |
|
|
332 | (1) |
|
Restructuring a Windows NT Environment |
|
|
333 | (4) |
|
Understanding Restructuring |
|
|
333 | (3) |
|
Transitioning Resource Domains into OUs |
|
|
336 | (1) |
|
|
337 | (2) |
|
Migrating to Active Directory Services |
|
|
339 | (16) |
|
Migrating from Novell NDS |
|
|
340 | (1) |
|
Migrating from Exchange Server |
|
|
340 | (3) |
|
Active Directory Services and Exchange Server 5.5 |
|
|
341 | (2) |
|
Authentication Methods and Their Security |
|
|
343 | (5) |
|
Integration of Exchange Server Platinum and Active Directory Services |
|
|
345 | (3) |
|
Migrating from Other Directory Services |
|
|
348 | (4) |
|
|
348 | (1) |
|
The LDIFDE Command-Line Utility |
|
|
349 | (2) |
|
|
351 | (1) |
|
|
352 | (3) |
|
Making Postdeployment Organizational Changes |
|
|
355 | (20) |
|
|
356 | (3) |
|
|
357 | (2) |
|
|
359 | (1) |
|
|
359 | (9) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (2) |
|
|
364 | (3) |
|
|
367 | (1) |
|
|
368 | (4) |
|
|
368 | (3) |
|
What You Cannot Do with OUs |
|
|
371 | (1) |
|
|
372 | (1) |
|
What You Can Do with Sites |
|
|
372 | (1) |
|
|
373 | (2) |
|
Administratively Leveraging Active Directory Services |
|
|
375 | (70) |
|
|
376 | (3) |
|
What Change and Configuration Management Enables |
|
|
377 | (2) |
|
|
379 | (19) |
|
Technologies That Enable IntelliMirror |
|
|
382 | (1) |
|
|
383 | (1) |
|
Software Installation and Maintenance |
|
|
384 | (3) |
|
|
387 | (1) |
|
Implementing IntelliMirror |
|
|
388 | (10) |
|
Life Without IntelliMirror |
|
|
398 | (1) |
|
Using Remote OS Installation |
|
|
398 | (14) |
|
Technologies That Enable Remote OS Installation |
|
|
400 | (2) |
|
Implementing Remote OS Installation |
|
|
402 | (9) |
|
Living Without Remote OS Installation |
|
|
411 | (1) |
|
Using Distributed File System |
|
|
412 | (12) |
|
Technologies That Enable Dfs |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
415 | (9) |
|
|
424 | (5) |
PART III Appendixes |
|
|
A Windows 2000 DIT Classes |
|
|
429 | (2) |
|
B Base DIT Class Hierarchy |
|
|
431 | (4) |
|
C Windows 2000 Base DIT attributeSchema Objects |
|
|
435 | (10) |
Index |
|
445 | |