Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition
- Autorzy:
- Brian Desmond, Joe Richards, Robbie Allen
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 738
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition
Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft’s network directory service by explaining concepts in an easy-to-understand, narrative style.
You’ll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you’ve learned—ideal whether you’re a network administrator for a small business or a multinational enterprise.
- Upgrade Active Directory to Windows Server 2012
- Learn the fundamentals, including how AD stores objects
- Use the AD Administrative Center and other management tools
- Learn to administer AD with Windows PowerShell
- Search and gather AD data, using the LDAP query syntax
- Understand how Group Policy functions
- Design a new Active Directory forest
- Examine the Kerberos security protocol
- Get a detailed look at the AD replication process
Wybrane bestsellery
-
W książce Head First. Sieci komputerowe. Edycja polska znajdziesz nie tylko odpowiedzi na nurtujące Cię pytania dotyczące sieci komputerowych, ale także ich klarowne i szczegółowe objaśnienie. Wyróżniającą cechą tego bogato ilustrowanego podręcznika jest przełożenie wiadomości teoretycznych na pr...(24.90 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł(-50%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
In Practical Ansible, you'll work with the latest release of Ansible and learn to solve complex issues quickly with the help of task-oriented scenarios. You'll start by installing and configuring Ansible to automate monotonous and repetitive IT tasks and get to grips with concepts such as playboo...
Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition
-
This practice book comes with a plethora of practice questions that are designed to condition and prepare you for each domain of the exam. The questions are distributed according to the weightage each domain holds in the exam.
CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt
-
Szkolenie dotyczy sieci VPN opartych na OpenVPN i Wireguard, a także tematów związanych z intranetem, protokołem TLS i DNS. Pozwala na zdobycie wiedzy i umiejętności potrzebnych do tworzenia bezpiecznych połączeń sieciowych i ochrony prywatności. Omawiane narzędzia, takie jak OpenVPN i Wireguard,...
Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce
(39.90 zł najniższa cena z 30 dni)64.35 zł
99.00 zł(-35%) -
Mastering Windows Server 2022 covers all essential information needed to implement and utilize this latest-and-greatest platform as the core of your datacenter computing needs. The information contained in these pages will prepare a fresh IT engineer to step into any environment and start working...
Mastering Windows Server 2022. Comprehensive administration of your Windows Server environment - Fourth Edition Mastering Windows Server 2022. Comprehensive administration of your Windows Server environment - Fourth Edition
-
Ta książka jest przeznaczona dla programistów i administratorów, którzy poszukują wydajnej metody zarządzania systemami. Pokazano w niej, w jaki sposób działa Ansible i jak należy przygotować go do pracy. Omówiono sposoby tworzenia scenariuszy (są to skrypty do zarządzania konfiguracją), zasady z...
Ansible w praktyce. Automatyzacja konfiguracji i proste instalowanie systemów. Wydanie III Ansible w praktyce. Automatyzacja konfiguracji i proste instalowanie systemów. Wydanie III
(59.40 zł najniższa cena z 30 dni)64.35 zł
99.00 zł(-35%)
Brian Desmond, Joe Richards, Robbie Allen - pozostałe książki
-
Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s ...
Active Directory Cookbook. Solutions for Administrators & Developers. 4th Edition Active Directory Cookbook. Solutions for Administrators & Developers. 4th Edition
(186.15 zł najniższa cena z 30 dni)186.15 zł
219.00 zł(-15%) -
To help you take full advantage of Active Directory, this fourth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service. With Active Directory, you'll learn how to design, manage, and maintain an AD infrastructure, whether it's for a small busines...
Active Directory. Designing, Deploying, and Running Active Directory. 4th Edition Active Directory. Designing, Deploying, and Running Active Directory. 4th Edition
(160.65 zł najniższa cena z 30 dni)160.65 zł
189.00 zł(-15%) -
Working with Microsoft's network directory service for the first time can be a headache for system and network administrators, IT professionals, technical project managers, and programmers alike. This authoritative guide is meant to relieve that pain. Instead of going through the graphical user i...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Each year, Windows XP is pre-installed on 30 million PCs sold in the U.S.--and 90 million worldwide--making it the world's most popular operating system, and proving to frustrated users everywhere that preponderance does not equate to ease of use. There are literally thousands of programs, tools,...
Windows XP Cookbook. Solutions and Examples for Power Users & Administrators Windows XP Cookbook. Solutions and Examples for Power Users & Administrators
(143.65 zł najniższa cena z 30 dni)143.65 zł
169.00 zł(-15%) -
This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to sav...
Windows Server Cookbook. For Windows Server 2003 & Windows 2000 Windows Server Cookbook. For Windows Server 2003 & Windows 2000
(143.65 zł najniższa cena z 30 dni)143.65 zł
169.00 zł(-15%) -
While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database that allows us to identify machines by name. DNS does the work of translating domain names into nu...(118.15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%)
Ebooka "Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-6986-6, 9781449369866
- Data wydania ebooka:
- 2013-04-11 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 17.7MB
- Rozmiar pliku Mobi:
- 40.9MB
Spis treści ebooka
- Active Directory
- Preface
- 1. Intended Audience
- 2. Contents of the Book
- 3. Conventions Used in This Book
- Using Code Examples
- Safari Books Online
- How to Contact Us
- 4. Acknowledgments
- For the Fourth and Fifth Editions (Brian)
- For the Third Edition (Joe)
- For the Second Edition (Robbie)
- For the First Edition (Alistair)
- Content Updates
- May 15, 2013
- 1. A Brief Introduction
- 1.1. Evolution of the Microsoft NOS
- A Brief History of Directories
- 1.1. Evolution of the Microsoft NOS
- 1.2. Summary
- 2. Active Directory Fundamentals
- 2.1. How Objects Are Stored and Identified
- Uniquely Identifying Objects
- Distinguished names
- Examples
- Uniquely Identifying Objects
- 2.1. How Objects Are Stored and Identified
- 2.2. Building Blocks
- Domains and Domain Trees
- Forests
- Organizational Units
- The Global Catalog
- Flexible Single Master Operator (FSMO) Roles
- Time Synchronization in Active Directory
- Domain and Forest Functional Levels
- Windows 2000 domain mode
- Groups
- Group membership across domain boundaries
- Converting groups
- 2.3. Summary
- 3. Active Directory Management Tools
- 3.1. Management Tools
- Active Directory Administrative Center
- PowerShell History
- Global Search
- Multiple-domain support
- Extensibility
- Active Directory Administrative Center
- Active Directory Users and Computers
- Advanced Features
- Saved Queries
- Controlling drag-and-drop moves
- Taskpads
- 3.1. Management Tools
- ADSI Edit
- LDP
- 3.2. Customizing the Active Directory Administrative Snap-ins
- Display Specifiers
- Property Pages
- Context Menus
- Icons
- Display Names
- Object Creation Wizard
- 3.3. Active Directory PowerShell Module
- 3.4. Best Practices Analyzer
- 3.5. Active Directory-Based Machine Activation
- 3.6. Summary
- 4. Naming Contexts and Application Partitions
- 4.1. Domain Naming Context
- 4.2. Configuration Naming Context
- 4.3. Schema Naming Context
- 4.4. Application Partitions
- Storing Dynamic Data
- 4.5. Summary
- 5. Active Directory Schema
- 5.1. Structure of the Schema
- X.500 and the OID Namespace
- 5.1. Structure of the Schema
- 5.2. Attributes (attributeSchema Objects)
- Dissecting an Example Active Directory Attribute
- 5.3. Attribute Properties
- Attribute Syntax
- systemFlags
- Constructed attributes
- Category 1 objects
- schemaFlagsEx
- searchFlags
- Indexed attributes
- Ambiguous name resolution
- Preserving attributes in a tombstone
- The subtree index
- The tuple index
- Confidentiality
- Attribute change auditing
- The filtered attribute set
- Property Sets and attributeSecurityGUID
- Linked Attributes
- MAPI IDs
- 5.4. Classes (classSchema Objects)
- Object Class Category and Inheritance
- Dissecting an Example Active Directory Class
- How inheritance affects mustContain, mayContain, possSuperiors, and auxiliaryClass
- Viewing the user class with the Active Directory Schema snap-in
- Dynamically Linked Auxiliary Classes
- 5.5. Summary
- 6. Site Topology and Active Directory Replication
- 6.1. Site Topology
- Site and Replication Management Tools
- Subnets
- Managing subnets
- Troubleshooting subnet data problems
- Sites
- Managing sites
- 6.1. Site Topology
- Site Links
- Managing site links
- Site Link Bridges
- Connection Objects
- Knowledge Consistency Checker
- 6.2. How Replication Works
- A Background to Metadata
- Update sequence numbers (USNs) and highestCommittedUSN
- Originating updates versus replicated updates
- DSA GUIDs and invocation IDs
- High-watermark vector (direct up-to-dateness vector)
- Up-to-dateness vector
- Recap
- A Background to Metadata
- How an Objects Metadata Is Modified During Replication
- Step 1: Initial creation of a user on Server A
- Step 2: Replication of the originating write to DC B
- Step 3: Password change for the user on DC B
- Step 4: Password-change replication to DC A
- The Replication of a Naming Context Between Two Servers
- Step 1: Replication with a partner is initiated
- Step 2: The partner works out what updates to send
- Step 3: The partner sends the updates to the initiating server
- Step 4: The initiating server processes the updates
- Step 5: The initiating server checks whether it is up to date
- Recap
- How Replication Conflicts Are Reconciled
- Conflict due to identical attribute change
- Conflict due to a move or creation of an object under a now-deleted parent
- Conflict due to creation of objects with names that conflict
- Replicating the conflict resolution
- 6.3. Common Replication Problems
- Lingering Objects
- USN Rollback
- 6.4. Summary
- 7. Searching Active Directory
- 7.1. The Directory Information Tree
- Database Structure
- Hidden table
- Data table
- Link table
- Security descriptor table
- Database Structure
- 7.1. The Directory Information Tree
- 7.2. Searching the Database
- Filter Operators
- Connecting Filter Components
- Search Bases
- Modifying Behavior with LDAP Controls
- 7.3. Attribute Data Types
- Dates and Times
- Bit Masks
- The In-Chain Matching Rule
- 7.4. Optimizing Searches
- Efficient Searching
- Using the stats control
- Efficient Searching
- objectClass Versus objectCategory
- 7.5. Summary
- 8. Active Directory and DNS
- 8.1. DNS Fundamentals
- Zones
- Resource Records
- Client Lookup Process
- Dynamic DNS
- Global Names Zones
- 8.1. DNS Fundamentals
- 8.2. DNSSEC
- How Does DNSSEC Work?
- Resource records
- Lookup process
- How Does DNSSEC Work?
- Configuring DNSSEC for Active Directory DNS
- 8.3. DC Locator
- 8.4. Resource Records Used by Active Directory
- Overriding SRV Record Registration
- 8.5. Delegation Options
- Not Delegating the AD DNS Zones
- Political factors
- Initial setup and configuration
- Support and maintenance
- Integration issues
- Not Delegating the AD DNS Zones
- Delegating the AD DNS Zones
- Political factors
- Initial setup and configuration
- Support and maintenance
- Integration issues
- 8.6. Active Directory-Integrated DNS
- Replication Impact
- Background Zone Loading
- 8.7. Using Application Partitions for DNS
- 8.8. Aging and Scavenging
- Configuring Scavenging
- Setting zone-specific options
- Enabling scavenging on the DNS server
- Configuring Scavenging
- 8.9. Managing DNS with Windows PowerShell
- 8.10. Summary
- 9. Domain Controllers
- 9.1. Building Domain Controllers
- Deploying with Server Manager
- Using DCPromo on Earlier Versions of Windows
- Automating the DC Build Process
- 9.1. Building Domain Controllers
- 9.2. Virtualization
- When to Virtualize
- Impact of Virtualization
- USN rollback
- RID pool reuse
- System clock changes
- Virtualization Safe Restore
- Cloning Domain Controllers
- The DC cloning process
- Cloning a domain controller
- 9.3. Read-Only Domain Controllers
- Prerequisites
- Password Replication Policies
- Managing the password replication policy
- Managing the loss of an RODC
- The Client Logon Process
- Populating the password cache
- RODCs and Write Requests
- User password changes
- Computer account password changes
- The lastLogonTimeStampAttribute
- Last-logon statistics
- Logon success/failure information
- NetLogon secure channel updates
- Replication connection objects
- DNS updates
- The W32Time Service
- Application Compatibility
- RODC Placement Considerations
- Administrator Role Separation
- Promoting an RODC
- Prestaging RODC domain controller accounts
- 9.4. Summary
- 10. Authentication and Security Protocols
- 10.1. Kerberos
- User Logon
- Service Access
- Service principal names
- Service tickets
- Application Access
- Logon and Service Access Summary
- Delegation and Protocol Transition
- Delegation
- Protocol Transition
- 10.1. Kerberos
- 10.2. Authentication Mechanism Assurance
- 10.3. Managed Service Accounts
- Preparing for Group Managed Service Accounts
- Using Group Managed Service Accounts
- 10.4. Summary
- 11. Group Policy Primer
- 11.1. Capabilities of Group Policy Objects
- Group Policy Storage
- ADM or ADMX files
- How GPOs are stored in Active Directory
- Group Policy replication
- Group Policy Storage
- 11.1. Capabilities of Group Policy Objects
- 11.2. How Group Policies Work
- GPOs and Active Directory
- Prioritizing the Application of Multiple Policies
- Standard GPO Inheritance Rules in Organizational Units
- Blocking Inheritance and Overriding the Block in Organizational Unit GPOs
- Summary
- When Policies Apply
- Group Policy Refresh Frequency
- Combating Slowdown Due to Group Policy
- Limiting the number of GPOs that apply
- Limiting cross-domain linking
- Limiting use of site policies
- Use simple queries in WMI filters
- Security Filtering and Group Policy Objects
- Loopback Merge Mode and Loopback Replace Mode
- Summarizing Group Policy Application
- WMI Filtering
- Group Policy
- 11.3. Managing Group Policies
- Using the Group Policy Management Console
- Using the Group Policy Management Editor
- Group Policy Preferences
- Deploying group policy preferences
- Item-Level Targeting
- Running Scripts with Group Policy
- Group Policy Modeling
- Delegation and Change Control
- The importance of change-control procedures
- Designing the delegation of GPO administration
- Using Starter GPOs
- Group Policy Backup and Restore
- Scripting Group Policy
- 11.4. Troubleshooting Group Policy
- Group Policy Infrastructure Status
- Group Policy Results Wizard
- Forcing Group Policy Updates
- Enabling Extra Logging
- Group Policy Logging in Windows 2000, Windows XP, and Windows Server 2003
- Group Policy Logging in Windows Vista/Windows Server 2008 and Newer
- Group Policy Diagnostic Best Practices Analyzer
- Third-Party Troubleshooting Tools
- 11.5. Summary
- 12. Fine-Grained Password Policies
- 12.1. Understanding Password Settings Objects
- 12.2. Scenarios for Fine-Grained Password Policies
- Defining Password Settings Objects
- Defining PSO precedence
- Defining Password Settings Objects
- 12.3. Creating Password Settings Objects
- PSO Quick Start
- Building a PSO from Scratch
- Creating a PSO with the Active Directory Administrative Center
- Creating a PSO with PSOMgr
- 12.4. Managing Password Settings Objects
- Strategies for Controlling PSO Application
- Applying PSOs to groups
- Applying PSOs to users
- Mixing group application and user application
- Strategies for Controlling PSO Application
- Managing PSO Application
- Applying a PSO with ADAC
- Applying a PSO with ADSI Edit
- Applying a PSO with ADUC
- Applying a PSO with PSOMgr
- Viewing the effective PSO
- 12.5. Delegating Management of PSOs
- 12.6. Summary
- 13. Designing the Active Directory Structure
- 13.1. The Complexities of a Design
- 13.2. Where to Start
- 13.3. Overview of the Design Process
- 13.4. Domain Namespace Design
- Objectives
- Represent the structure of your business
- Objectives
- Step 1: Decide on the Number of Domains
- Isolated replication
- Unique domain policy
- Final notes
- Step 2: Design and Name the Tree Structure
- Choose the forest root domain
- Design the namespace naming scheme
- Create additional trees
- Create additional forests
- Arrange the subdomain hierarchy
- 13.5. Design of the Internal Domain Structure
- Step 3: Design the Hierarchy of Organizational Units
- Recreating the business model
- Delegating full administration
- Delegating other rights
- Step 3: Design the Hierarchy of Organizational Units
- Step 4: Design the Workstation and Server Naming Conventions
- Step 5: Plan for Users and Groups
- Naming and placing users
- Naming and placing groups
- 13.6. Other Design Considerations
- 13.7. Design Examples
- Tailspin Toys
- Step 1: Decide on the number of domains
- Step 2: Design and name the tree structure
- Step 3: Design the hierarchy of organizational units
- Step 4: Design the workstation and server naming conventions
- Step 5: Plan for users and groups
- Tailspin Toys
- Contoso College
- Step 1: Decide on the number of domains
- Step 2: Design and name the tree structure
- Step 3: Design the hierarchy of organizational units
- Step 4: Design the workstation and server naming conventions
- Step 5: Plan for users and groups
- Fabrikam
- Step 1: Decide on number of domains
- Step 2: Design and name the tree structure
- Step 3: Design the hierarchy of organizational units
- Step 4: Design the workstation and server naming conventions
- Step 5: Plan for users and groups
- 13.8. Recognizing Nirvanas Problems
- 13.9. Summary
- 14. Creating a Site Topology
- 14.1. Intrasite and Intersite Topologies
- The KCC
- Automatic Intrasite Topology Generation by the KCC
- Two servers
- Three servers
- Four servers
- Eight servers
- Now what?
- Site Links: The Basic Building Blocks of Intersite Topologies
- Cost
- Schedule
- Transport
- When the ISTG becomes involved
- 14.1. Intrasite and Intersite Topologies
- Site Link Bridges: The Second Building Blocks of Intersite Topologies
- 14.2. Designing Sites and Links for Replication
- Step 1: Gather Background Data for Your Network
- Step 2: Plan the Domain Controller Locations
- Where to put domain controllers
- How many domain controllers to have
- Placing a domain controller in more than one site
- Step 3: Design the Sites
- Step 4: Create Site Links
- Step 5: Create Site Link Bridges
- 14.3. Design Examples
- Tailspin Toys
- Step 1: Gather background data for your network
- Step 2: Plan the domain controller locations
- Step 3: Design the sites
- Step 4: Create site links
- Tailspin Toys
- Contoso College
- Step 1: Gather background data for your network
- Step 2: Plan the domain controller locations
- Step 3: Design the sites
- Step 4: Create site links
- Fabrikam
- Step 1: Gather background data for your network
- Step 2: Plan the domain controller locations
- Step 3: Design the sites
- Step 4: Create site links
- 14.4. Additional Resources
- 14.5. Summary
- 15. Planning for Group Policy
- 15.1. Using GPOs to Help Design the Organizational Unit Structure
- Identifying Areas of Policy
- Guidelines for Designing GPOs
- 15.1. Using GPOs to Help Design the Organizational Unit Structure
- 15.2. Design Examples
- Tailspin Toys
- Contoso College
- Fabrikam
- 15.3. Summary
- 16. Active Directory Security: Permissions and Auditing
- 16.1. Permission Basics
- Permission ACEs
- Property Sets, Validated Writes, and Extended Rights
- Inherited Versus Explicit Permissions
- Default Security Descriptors
- Permission Lockdown
- The Confidentiality Bit
- Protecting Objects from Accidental Deletion
- 16.1. Permission Basics
- 16.2. Using the GUI to Examine Permissions
- Reverting to the Default Permissions
- Viewing the Effective Permissions for a User or Group
- Using the Delegation of Control Wizard
- 16.3. Using the GUI to Examine Auditing
- 16.4. Designing Permissions Schemes
- The Five Golden Rules of Permissions Design
- Rule 1: Apply permissions to groups whenever possible
- Rule 2: Design group permissions so that you have minimal duplication
- Rule 3: Manage advanced permissions only when absolutely necessary
- Rule 4: Allow inheritance; do not protect sections of the domain tree from inheritance
- Rule 5: Keep a log of changes
- The Five Golden Rules of Permissions Design
- How to Plan Permissions
- Bringing Order out of Chaos
- 16.5. Designing Auditing Schemes
- Implementing Auditing
- Tracking Last Interactive Logon Information
- 16.6. Real-World Active Directory Delegation Examples
- Hiding Specific Personal Details for All Users in an Organizational Unit from a Group
- Allowing Only a Specific Group of Users to Access a New Published Resource
- Restricting Everyone but HR from Viewing National/Regional ID Numbers with the Confidential Bit
- 16.7. The AdminSDHolder Process
- 16.8. Dynamic Access Control
- Configuring Active Directory for DAC
- Configuring claim types
- Configuring central access policies
- Kerberos policies
- Configuring Active Directory for DAC
- Using DAC on the File Server
- Compound expressions with groups
- Using claims in your ACLs
- Auditing
- 16.9. Summary
- 17. Designing and Implementing Schema Extensions
- 17.1. Nominating Responsible People in Your Organization
- 17.2. Thinking of Changing the Schema
- Designing the Data
- To Change or Not to Change
- The Global Picture
- 17.3. Creating Schema Extensions
- Running the AD Schema Management MMC Snap-in for the First Time
- The Schema Cache
- The Schema Master FSMO
- Using LDIF to Extend the Schema
- Checks the System Makes When You Modify the Schema
- Making Classes and Attributes Defunct
- Mitigating a Schema Conflict
- 17.4. Summary
- 18. Backup, Recovery, and Maintenance
- 18.1. Backing Up Active Directory
- Using the NT Backup Utility
- Using Windows Server Backup
- 18.1. Backing Up Active Directory
- 18.2. Restoring a Domain Controller
- Restore from Replication
- Manually removing a domain controller from Active Directory
- Restore from Replication
- Restore from Backup
- Install from Media
- Creating and using IFM media on Windows Server 2003
- Creating and using IFM media on Windows Server 2008 and newer
- 18.3. Restoring Active Directory
- Nonauthoritative Restore
- Restoring with NT Backup
- Restoring with Windows Server Backup
- Nonauthoritative Restore
- Partial Authoritative Restore
- Complete Authoritative Restore
- 18.4. Working with Snapshots
- 18.5. Active Directory Recycle Bin
- Deleted Object Lifecycle
- Enabling the Recycle Bin
- Undeleting Objects
- Using ADAC
- Using PowerShell
- 18.6. FSMO Recovery
- 18.7. Restartable Directory Service
- 18.8. DIT Maintenance
- Checking the Integrity of the DIT
- Reclaiming Space
- Changing the DS Restore Mode Admin Password
- 18.9. Summary
- 19. Upgrading Active Directory
- 19.1. Active Directory Versions
- Windows Server 2003
- New features
- Differences in functionality
- Windows Server 2003
- Windows Server 2008
- New features
- Differences in functionality
- 19.1. Active Directory Versions
- Windows Server 2008 R2
- New features
- Differences in functionality
- Windows Server 2012
- New features
- Differences in functionality
- 19.2. Functional Levels
- Raising the Functional Level
- Functional Level Rollback
- 19.3. Beginning the Upgrade
- 19.4. Known Issues
- 19.5. Summary
- 20. Active Directory Lightweight Directory Services
- 20.1. Common Uses for AD LDS
- 20.2. AD LDS Terms
- 20.3. Differences Between AD and AD LDS
- Standalone Application Service
- Configurable LDAP Ports
- No SRV Records
- No Global Catalog
- Top-Level Application Partition Object Classes
- Group and User Scope
- FSMOs
- Schema
- Service Account
- Configuration/Schema Partition Names
- Default Directory Security
- User Principal Names
- Authentication
- Users in the Configuration Partition
- New and Updated Tools
- 20.4. AD LDS Installation
- Installing the Server Role
- Installing a New AD LDS Instance
- Installing an AD LDS Replica
- Enabling the Recycle Bin
- 20.5. Tools
- ADAM Install
- ADAM Sync
- ADAM Uninstall
- AD Schema Analyzer
- AD Schema MMC Snap-in
- ADSI Edit
- dsdbutil
- dsmgmt
- ldifde
- LDP
- repadmin
- 20.6. The AD LDS Schema
- Default Security Descriptors
- Bindable Objects and Bindable Proxy Objects
- 20.7. Using AD LDS
- Creating Application Partitions
- Creating Containers
- Creating Users
- Creating User Proxies
- Special considerations
- Renaming Users
- Creating Groups
- Adding Members to Groups
- Removing Members from Groups
- Deleting Objects
- Deleting Application Partitions
- Controlling Access to Objects and Attributes
- 20.8. Summary
- 21. Active Directory Federation Services
- 21.1. Introduction to Federated Identity
- How It Works
- SAML
- WS-Federation
- 21.1. Introduction to Federated Identity
- 21.2. Understanding ADFS Components
- The Configuration Database
- Federation Servers
- Federation Server Proxies
- ADFS Topologies
- Single federation server
- Single federation server and federation proxy
- Load-balanced ADFS servers
- Geographically redundant ADFS servers
- 21.3. Deploying ADFS
- Federation Servers
- Certificates
- Configuring ADFS
- Service configuration
- Federation Servers
- Federation Server Proxies
- 21.4. Relying Party Trusts
- 21.5. Claims Rules and the Claims Pipeline
- The Pipeline
- Creating and Sending Claims Through the Pipeline
- 21.6. Customizing ADFS
- Forms-Based Logon Pages
- Attribute Stores
- 21.7. Troubleshooting ADFS
- Event Logs
- Fiddler
- 21.8. Summary
- A. Programming the Directory with the .NET Framework
- A.1. Choosing a .NET Programming Language
- A.2. Choosing a Development Tool
- .NET IDE Options
- .NET Development Without an IDE
- A.3. .NET Framework Versions
- Which .NET Framework Comes with Which OS?
- Directory Programming Features by .NET Framework Release
- Assemblies Versus Namespaces
- Summary of Namespaces, Assemblies, and Framework Versions
- A.4. Directory Services Programming Landscape
- System.DirectoryServices Overview
- Other nice things in System.DirectoryServices
- System.DirectoryServices summary
- System.DirectoryServices Overview
- System.DirectoryServices.ActiveDirectory Overview
- Why use System.DirectoryServices.ActiveDirectory?
- System.DirectoryServices.ActiveDirectory summary
- System.DirectoryServices.Protocols Overview
- Why use System.DirectoryServices.Protocols?
- System.DirectoryServices.Protocols summary
- System.DirectoryServices.AccountManagement Overview
- Why use System.DirectoryServices.AccountManagement?
- System.DirectoryServices.AccountManagement summary
- A.5. .NET Directory Services Programming by Example
- Connecting to the Directory
- Searching the Directory
- Basics of Modifying the Directory
- Basic add example
- Basic remove examples
- Moving and renaming objects
- Modifying existing objects
- Managing Users
- Managing users with System.DirectoryServices.AccountManagement
- Overriding SSL Server Certificate Verification with SDS.P
- A.6. Summary
- Index
- About the Authors
- Colophon
- Copyright
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
What will you learn from this book?If you're a software developer looking for a quick on-ramp to software architecture, this handy guide is a great place to start. From the authors of Fundamentals of Software Architecture, Head First Software Architecture teaches you how to think architecturally ...(245.65 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Active Directory. Designing, Deploying, and Running Active Directory. 5th Edition Brian Desmond, Joe Richards, Robbie Allen (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.