rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780072127225

Administering Active Directory

  • ISBN13:

    9780072127225

  • ISBN10:

    0072127228

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2001-01-01
  • Publisher: MCGRAW HILL BOOK COMPANY
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $44.99 Save up to $0.04
  • Buy New
    $44.95
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-3 BUSINESS DAYS

Summary

A must-have for busy administrators this comprehensive guide is organized in a task-at-a-glance fashion, making it easy to find the topic you need.

Table of Contents

Understanding Active Directory
1(28)
In the Beginning: Before Directory Services
2(1)
Novell NetWare and NDS
3(1)
Active Directory Structure
4(1)
Active Directory Provides Central Control
4(1)
Improved Fault Tolerance
5(1)
Industry Support
5(1)
Application Software and Active Directory
6(1)
Active Directory Features
6(5)
Group Policy
6(2)
Folder Redirection
8(1)
Terminal Services
9(1)
Active Directory Services Interface (ADSI)
9(1)
Distributed File System
10(1)
The Metadirectory: The Present and the Future
10(1)
Under the Hood: Active Directory Structure
11(3)
Active Directory Single Point of Access
12(1)
Scalability
13(1)
Integration
13(1)
Open Standards
13(1)
Multi-Master Replication
14(1)
The Parts of the Active Directory Database
14(1)
Objects and Attributes
15(1)
What's X.500?
16(1)
Lightweight Directory Access Protocol
17(5)
LDAP Components
18(1)
LDAP and Data Retrieval
18(2)
The LDAP Functional Model
20(1)
The Naming Model
20(1)
The Security Model
21(1)
The Replication Model
21(1)
The Management Model
22(1)
Active Directory Interoperability
22(1)
Application Programming Interface
22(1)
ADSI
22(1)
LDAP C API
23(1)
Synchronization
23(1)
Backward Compatibility
23(1)
Microsoft Management Console (MMC)
24(1)
Administrative Solutions: Creating Custom MMCs
25(4)
Creating an MMC for Local Administration
25(1)
Creating Custom MMCs
26(3)
Active Directory Architecture
29(30)
Active Directory Architecture
30(5)
Security Subsystem
31(2)
Directory Service Architecture
33(2)
How Do We Access Active Directory?
35(2)
LDAP
35(1)
Messaging API (MAPI)
36(1)
Security Accounts Manager (SAM)
36(1)
Replication (REPL)
36(1)
How Does Active Directory Function as a Directory Service?
37(1)
Active Directory Components: Objects and Attributes
37(5)
Attributes
39(1)
Active Directory Physical and Logical Components
39(1)
Containers
40(2)
Delegation of Administration
42(1)
Logical Structure: Domains
42(2)
Domains Aid Administration
44(1)
Logical Structure: Domain Trees
44(1)
Domain Tree Rules
44(1)
Logical Structure: Forests
45(2)
Root Domain Rules
46(1)
Domain Concepts: Brain Twisters
46(1)
The Schema
47(1)
Editing the Schema
47(1)
Physical Structure: Domain Controllers
48(1)
Replication and Domains
48(1)
Fault Tolerance
48(1)
Trusts
49(1)
Physical Structure: Sites
49(1)
The Global Catalog
50(1)
Replication Details
51(1)
Directory Partitions
51(1)
Naming Conventions Used with Active Directory
52(3)
Fully Qualified Domain Name (FQDN)
53(1)
Relative Distinguished Name (RDN)
53(1)
Distinguished Name (DN)
53(1)
User Principle Name (UPN)
54(1)
Globally Unique Identifier (GUID)
55(1)
Domain Component (DC)
56(1)
LDAP ADPaths
57(2)
Configuring Network Services
59(40)
Future Planning
60(1)
TCP/IP and Networking Services
60(9)
Windows 2000 TCP/IP Features
61(1)
Transmission Control Protocol (TCP)
62(1)
Internet Protocol (IP)
63(1)
User Datagram Protocol (UDP)
63(1)
Network-Layer Addressing
64(1)
Installing TCP/IP
65(1)
TCP/IP and Non-Routable Addresses
66(1)
Subnets and Subnet Masks
66(1)
NetBIOS Over TCP/IP
67(1)
Domain Name System (DNS)
68(1)
Static Host Files
69(1)
DNS Root Servers
69(3)
DNS Details
70(1)
Domain Name Details
71(1)
Understanding DNS and Windows 2000
72(1)
Fully Qualified Domain Name (FQDN)
72(1)
DNS Service Components
73(7)
DNS Servers
74(1)
DNS Resolvers
74(1)
Resource Records
74(1)
Zones
74(1)
Zone Files
74(1)
DNS and Name Resolution
75(1)
DNS and UDP
75(1)
Lookup Queries
76(1)
What Is a Zone?
76(1)
Forward Lookup Queries
77(1)
Reverse Lookup Queries
78(1)
Name Server Caching
79(1)
Dynamic DNS
80(1)
Configuring the DNS Service
80(2)
Installing the DNS Service
81(1)
Configuring the DNS Service
82(3)
Configuring Zones
82(3)
Benefits of Active Directory Integrated Zones
85(1)
Zone Replication and Active Directory
86(1)
Faster Replication
86(1)
Fault Tolerance Issues
87(1)
Additional DNS Servers
87(1)
Incremental Zone Transfers
87(1)
Secondary Servers
88(1)
DNS and Resource Records
88(4)
Start of Authority (SOA)
88(1)
Resource Records (NS)
88(4)
Dynamic Host Configuration Protocol (DHCP)
92(4)
IP Address Management
92(1)
DHCP States
93(1)
DHCP and Dynamic DNS
93(2)
Installing DHCP
95(1)
Windows Internet Name Service (WINS)
96(3)
WINS Integration with DHCP and DDNS
97(1)
Name Resolution Using WINS
97(2)
Designing Active Directory Topology
99(22)
Corporate Networks and Active Directory
100(1)
Documenting Your Network Infrastructure
101(6)
Hardware and Software Components
101(1)
Network Stability
102(1)
Physical Network Documentation
102(1)
Documenting Logical Network Structure
103(1)
Hardware and Software Inventory
104(1)
Documentation
105(1)
Security Review
106(1)
Planning Your Active Directory Structure
107(14)
Planning with Organizational Units (OU)
107(5)
Planning for Domains
112(5)
Planning for Forests
117(4)
Installing and Removing Active Directory
121(38)
Using Dcpromo to Install Active Directory
122(1)
Before Promotion Starts
123(2)
The First Domain Controller is the Boss
125(10)
The First Domain Controller in a Domain
126(1)
Promoting the First Domain Controller
126(1)
Tree or Child Domain
127(1)
New or Existing Forest
127(1)
Naming Your Domain
128(1)
NetBIOS Naming
129(1)
Database and Log Locations
129(1)
Shared System Volume
130(1)
Calling DNS
131(1)
Deciding on Permissions
132(1)
Directory Services Restore Mode Password
132(1)
Finalizing Before Promoting
133(1)
Promotion Details
134(1)
Successful Promotion
135(1)
Adding a Domain Controller to an Existing Domain
135(1)
Network Credentials
136(2)
Database and Log Locations
136(1)
Shared System Volume
137(1)
Permission Choices
137(1)
Directory Services Restore Mode Password
138(1)
Finalizing before Promoting
138(1)
Monitoring the Promotion Process
138(2)
Successful Promotion
139(1)
Adding Domains to an Existing Tree
140(2)
Network Credentials
140(1)
Naming the Child Domain
141(1)
Finishing the Promotion
142(1)
Creating New Domain Trees in Existing Forests
142(3)
New Domain Tree Concepts
142(1)
DNS Naming for the New Tree
143(1)
Finishing the Promotion
144(1)
Summary
144(1)
Dcpromo Creates a New Domain Structure
145(3)
Dcpromo Logs
145(1)
Active Directory Database Files
145(1)
SYSVOL
146(1)
DNS Structure
147(1)
The Registry
147(1)
Default Containers
148(3)
Builtin
149(1)
Computers
149(1)
ForeignSecurityPrinciples
149(1)
Users
150(1)
Domain Controllers OU
150(1)
Lost and Found
150(1)
System
150(1)
Demoting a Domain Controller with Dcpromo
151(2)
Metadata Cleanup
153(1)
Using Ntdsutil
153(2)
Administrative Solutions: Getting Ready for Promotion
155(1)
Installing Active Directory Creating a Child Domain
156(1)
Use DCPROMO to Remove a Domain
157(1)
Promote an Additional Domain Controller for an Existing Domain
158(1)
Domain Structure
159(32)
Windows 2000 Domains
160(8)
Domains and Trees
161(3)
Domain Controllers are Physical
164(1)
Directory Partitions
164(2)
Domain Creation Rules
166(1)
Domain Names and the DNS Namespace
166(1)
NetBIOS Domain Names are Still Needed
166(2)
Resource Records are Used to Find Resources
168(4)
Domain Operating Modes: Mixed and Native Mode
170(1)
Changing to Native Mode
171(1)
FSMO Roles
172(5)
Schema Operations Master (Forestwide)
173(1)
Domain Naming Master (Forestwide)
173(2)
Domain FSMO Roles
175(2)
Changing FSMO Roles
177(1)
Domain Trust Relationships
177(4)
One-Way Trust
177(1)
Transitive Two-Way Trusts
178(1)
Nontransitive Trust
179(1)
Shortcut Trusts
179(2)
Inside the Domain: Designing Organizational Unit Structure
181(7)
Comparing OUs to Domains
181(1)
OU Design Notes
182(1)
Geographical Model
182(1)
Departmental Model
182(1)
Business Unit Model
183(1)
Project Based Model
184(1)
Administrative Model
184(1)
Object-based Model
185(2)
Active Directory Design for a Small Company
187(1)
Provincial or State Government
187(1)
Administrative Tasks: Verifying SRV Records
188(2)
Changing your Domain from Mixed to Native Mode
190(1)
Directory Structure and the Global Catalog
191(18)
Tree and Domain Structure
192(1)
Forest Structure and the Global Catalog
193(1)
Global Catalog Servers (GC)
194(1)
Global Catalog Architecture
195(1)
Global Catalog and Domain User Logons
196(2)
UPN and Global Catalog Support
198(1)
Universal Group Membership is Stored in the GC
198(1)
Searches that Use the GC by Default
199(2)
Searching the Global Catalog
199(2)
Who Decides What's in the Global Catalog?
201(2)
Designating Additional Global Catalog Servers
203(1)
Increasing Replication Traffic
204(1)
Exchange 2000 Requirements
204(1)
The GC and the Infrastructure Master FSMO Role
205(1)
Removing the Global Catalog
206(1)
SRV Resource Records and the Global Catalog
206(2)
Administrative Tasks
208(1)
Add Global Catalog Duties to a Domain Controller
208(1)
Enable Additional Attributes to be Replicated to the Global Catalog
208(1)
Replication Fundamentals
209(24)
Goals of Active Directory Replication
210(3)
Replication Details
210(1)
Windows 2000 and Exchange 5.5 Comparison
211(1)
Defining the Naming Contexts
212(1)
Naming Context in the Domain Namespace
213(1)
Replication Fundamentals
214(2)
NT Used Single-Master Replication
214(1)
What Triggers the Replication Process?
215(1)
Replication is Now Transitive
215(1)
Creating Replication Topology
216(1)
State-Based Replication
216(1)
Domain Controller Failure
216(1)
Replication Architecture: Update Sequence Numbers (USN)
216(1)
USN Details
217(1)
User Object Creation
217(1)
The Replication Process: Step 2
218(1)
Modifying an Object
219(1)
Changes Replicated: Step 2
220(1)
What's a High-Watermark Vector?
220(1)
Preparing for a Replication Cycle
221(1)
Up-to-Dateness Vector
222(1)
Following the Replication Process: Step 1
223(1)
Following the Replication Process: Step 2
224(1)
Following the Replication Process: Step 3
224(2)
Following the Replication Process: Step 4
226(1)
Following the Replication Process: Step 5
226(1)
Following the Replication Process: Step 6
227(1)
Following the Replication Process: Step 7
228(1)
Solving Conflict Resolution
229(1)
Attribute Value Conflict
229(1)
Urgent Replication
230(1)
Password Replication
230(1)
Administrative Solutions: Using Repadmin to Trace Replication
230(3)
Use Repadmin.exe to Get All Changes that Have Been Replicated
231(1)
Check the High Watermark with Repadmin
231(1)
Use Repadmin to View the Up-to-Dateness Vector
232(1)
Sites and Replication Administration
233(38)
Planning Sites
234(1)
What is the Role of Sites in Active Directory?
234(4)
To Control Replication Traffic
235(2)
Isolating Network Logon Traffic
237(1)
To Identify Network Resources by Immediacy
238(1)
Sites Host Network Services
238(1)
Controlling Network Queries
239(1)
Planning for Site Deployment
240(1)
Site Identification
240(1)
Creating a Site
241(1)
Creating a Subnet
242(1)
What if There Is No Domain Controller?
242(2)
Sites and Replication
244(1)
Replication Transport
244(1)
Replication Topology
245(1)
Replication Schedule
245(1)
The Process of Replication
245(1)
Compression of Replication Data
245(1)
How is Replication Topology Created?
246(2)
The KCC Monitors the Replication Topology
246(1)
Replication Topology: Intra-Site
246(2)
Constructing the Inter-Site Replication Ring
248(1)
Connection Objects
249(2)
How are Intra-Site Connection Objects Created?
249(1)
Rings of Replication within one Domain
250(1)
Rings of Replication with Two Domains
250(1)
Inter-Site Replication
251(1)
Bridgehead Servers (BH)
252(1)
Inter-Site Topology Generation
253(1)
Site Links
254(2)
Site-Link Schedule
254(2)
Controlling Topology and Scheduling
256(1)
Assigning a Cost Value
256(2)
Global Catalog Server Replication
258(1)
Site-Link Bridges
258(2)
Disabling Transitive Site Links
258(2)
Inter-Site Topology Creation: Summary
260(1)
Putting the KCC to Work
260(1)
Evaluate Your Company's Physical Environment
261(1)
Case Study: Saint Mary's of the Lake Group
262(4)
Defining the Network Areas to be Created as Individual Sites
262(1)
Identify the Network Links between Sites
263(1)
Assigning a Cost and Schedule to Site Links
264(1)
Configuring Site Link Bridges
265(1)
Employing a Secondary Link with Site-Link Bridges
265(1)
Replication Partner Failure
266(1)
Administrative Tasks: Analyze Your Default-First-Site
267(1)
Create Sites with Active Directory Sites and Services (ADSS)
268(1)
Create a New Site
268(1)
Move Your Server into Your Site
269(1)
Define a Subnet for a Your Site
269(1)
Create a Site Link
269(1)
Configuring Inter-site Replication and Site-Link Attributes
270(1)
Manually Configure Replication Objects
270(1)
User and Group Accounts
271(24)
Managing User Accounts
272(1)
Windows 2000 Groups
272(1)
Domain User Accounts
273(1)
Security Principle Details
273(2)
Access Tokens
274(1)
Security Identifier (SID)
274(1)
Security Descriptor Details
275(4)
The Access Control List (ACL)
275(1)
The Access Control Entry
275(1)
Rules for Creating User Accounts
276(1)
Naming User Accounts
277(1)
The Local User Profile
278(1)
Roaming User Profiles
279(3)
Roaming User Profiles for Groups
280(1)
Mandatory User Profiles
281(1)
Home Directories
282(1)
Group Account Administration
283(5)
Groups: Types and Scope
283(1)
Local Groups
284(1)
Domain Local Groups
284(1)
Global Groups
285(1)
Universal Groups
285(2)
Default Group Types: Predefined Global Groups
287(1)
Built-in Groups--Domain Local Groups
287(1)
Built-In Local Groups
288(1)
Changing Group Type
288(1)
Nesting Groups in Native Mode
289(1)
Planning Group Membership
289(1)
Planning for Universal Groups
290(1)
Switching between User Contexts
290(1)
How Do I Use Run As?
291(1)
Administrator Tasks: Sample Scripting
292(3)
Group Policy
295(38)
Group Policy
296(2)
Before Group Policy
296(1)
Applying Group Policy
297(1)
Predefined Group Policy Objects
298(1)
Group Policy Objects (GPO)
299(1)
Group Policy Architecture
300(1)
When does Group Policy Get Applied?
301(1)
Does Group Policy Affect Startup and Logon?
301(1)
How and Where Is Group Policy Applied?
302(1)
The Processing Steps of Group Policy
303(1)
Reapplying Group Policy
304(1)
Creating Group Policy Objects
305(1)
Group Policy Options
305(2)
Exceptions to Group Policy Processing Order: No Override
307(1)
Block Inheritance
308(1)
Loopback Processing
308(1)
Defining the Refresh Cycle of Group Policy
309(1)
Multiple GPOs: Who Goes First?
310(1)
Disabling GPO Components
311(1)
Linking Group Policy throughout the Forest
311(2)
Access Control Lists and Group Policy Objects
313(1)
Delegation of Control
314(1)
Software Settings (Computer and User)
314(1)
Assigning Applications for Computers and Users
315(1)
Publishing Applications for Users and Computers
316(1)
Using Group Policy Software Installation
316(4)
Planning the Location and Focus
317(1)
Define Your Software Distribution Point
317(1)
Software Installation Defaults
317(1)
Schedule the Deployment
318(1)
Defining Software Application Properties
319(1)
Windows Settings for Computers
320(1)
Administrative Templates for Computers
321(2)
Logon\Maximum Wait Time for Group Policy Scripts
321(1)
Logon\Delete Cached Copies of Roaming Profiles
322(1)
Disk Quotas\Enable Disk Quotas
322(1)
Disk Quotas\Enforce Disk Quota Limit
322(1)
Disk Quotas\Log Event when Quota Limit Exceeded
322(1)
Group Policy\Group Policy Refresh Interval for Computers
322(1)
Group Policy\Loopback Processing Mode
323(1)
Group Policy\Registry Policy Processing
323(1)
Group Policy\Software Installation Policy Processing
323(1)
Windows Settings for Users
323(2)
Internet Explorer
324(1)
Scripts
324(1)
Folder Redirection
324(1)
Administrative Templates for the User
325(1)
Administrative Templates\System Settings
325(1)
Administrative Templates\System\Group Policy Settings
326(1)
Offline Files
326(1)
Planning and Designing Group Policy Objects
327(6)
Separate Policy Design--A GPO with Subject-Specific Settings
327(2)
Multiple Policy Type--A Single GPO with Multiple Types of Settings
329(1)
Dedicated Policy Type--GPOs with Dedicated User and Computer Settings
329(1)
Layered GPO Design
329(2)
Monolithic GPOs
331(1)
Central Control
331(2)
Backing Up and Restoring Active Directory
333(24)
Planning for Failure
334(1)
Active Directory File Structure
334(1)
Database Transaction Steps
335(3)
Transaction Log Details
336(1)
Automated Database Cleanup
337(1)
Granting Backup and Restore Rights
338(1)
What is the System State?
338(2)
What Does a System State Backup Contain?
340(1)
Using the Backup Wizard
340(9)
Creating a Emergency Repair Disk
341(2)
Performing a Nonauthoritative Restore
343(1)
Verifying the Nonauthoritative Restore Process
344(1)
Performing an Authoritative Restore
345(1)
Completing Authoritative Restore with Ntdsutil
346(2)
Checking Authoritative Restore
348(1)
Tombstone Lifetime
348(1)
Restoring Trust and Member Server Passwords
349(1)
Primary Restore
349(2)
Recovery without Restore
351(1)
Administrative Solutions: Create an Emergency Repair Disk
351(1)
Backing up the System State
351(1)
Nonauthoritative Restore of the System State
352(1)
Authoritative Restore of Deleted Objects
353(1)
Performing Offline Defragmentation
354(1)
Using ADSI Edit to Change the Tombstone
354(3)
Schema Fundamentals
357(20)
What Is the Schema?
358(1)
Schema Basics
358(3)
Schema Details in English
359(1)
Schema Location
360(1)
Object Classes Defined
361(6)
Schema Objects
363(2)
attributeSchema Objects
365(2)
Syntax
367(2)
Modifying the Schema
369(2)
Using Ntdsutil to Change the Schema Master
371(1)
Order of Processing When Extending the Schema
372(1)
Adding Object and Attributes to the Schema
373(1)
Creating a New Attribute
373(4)
OIDGEN Notes
374(1)
Add Your New Attribute
375(1)
Entering New Attribute Parameters
375(1)
Creating a New Class
375(2)
Managing Users and User Services
377(44)
Windows 2000 Object Types
378(1)
NTFS Standard Folder Permissions
379(1)
NTFS Standard File Permissions
380(2)
Assigning NTFS Permissions
382(4)
Effective Permissions Define Access
386(1)
Deny Means Deny
387(1)
Change Permissions and Take Ownership
387(1)
Copying Files and Folders
388(1)
Moving Files and Folders
389(1)
Using Shared Folders
389(3)
Application Folders
390(1)
Public Data Folders
391(1)
Working Data Folders
391(1)
Combining Shared Folder and NTFS Permissions
392(1)
Publishing Resources in Active Directory
392(2)
Users and Computers
393(1)
Folders and Files
393(1)
Printers
393(1)
Network Services
394(1)
Using the Distributed File System (DFS)
394(1)
DFS Provides Transparent Access to Resources
395(1)
Deploying DFS
396(2)
Creating the DFS Root
396(1)
Creating a DFS Link
396(1)
Adding DFS Shared Folders
397(1)
Setting the Replication Policy
397(1)
Controlling Access to Active Directory Objects
398(1)
Access Control Lists
399(1)
Using ADUC to Manage Permissions
400(1)
Standard and Special Object Permissions
401(2)
Inheritable Object Permissions
403(1)
Assigning Special Permissions
404(1)
Object and Property Permission Entries
404(1)
Object and Attribute Types
405(1)
Delegating Administrative Control
405(2)
Auditing
407(4)
Defining an Audit Policy
408(1)
Events Audited by Windows 2000
408(1)
File and Folder Auditing
409(1)
Auditing Active Directory Objects
410(1)
Auditing Printer Access
410(1)
Remote OS Installation
411(8)
Remote Install Server Software Components
413(1)
RIS Server and Client Requirements
413(1)
Installing RIS
414(1)
Authorizing RIS Servers
415(1)
Setting RIS Server Properties
416(1)
Creating an RIPrep Image
416(1)
Creating a RIS Boot Disher
417(1)
Prestaging RIS Client Computers
418(1)
The Remote OS Installation Process
419(2)
Troubleshooting Active Directory
421(26)
Why Has My Network Stopped Working?
422(1)
Name Resolution
422(2)
Network Connectivity
424(3)
Testing Client Network Connectivity with NetDiag
426(1)
Troubleshooting Domain Controllers with DcDiag
427(1)
Using Ntdsutil for FSMO Maintenance
428(4)
Viewing FSMO Roles
429(1)
Using Ntdsutil to Transfer or Seize FSMO Roles
429(3)
Troubleshooting Replication Problems
432(4)
Using the Event Viewer
432(2)
What Do the Event Logs Monitor?
434(1)
Changing the Amount of Detail Sent to the Event Viewer
434(2)
Using the Windows 2000 Support Tools
436(2)
Using the AD Replication Monitor
437(1)
Using Resource Kit Utilities for Troubleshooting
438(3)
Using Repadmin
438(1)
Log Files used for Active Directory Troubleshooting
439(2)
Monitoring NTDS.DIT with Performance Monitor
441(1)
Using the Recovery Console's Advanced Features
442(3)
Changing the Recovery Console's Default Operation
443(2)
Administrator Tasks
445(2)
Creating a Counter Log
445(1)
Creating an Alert
446(1)
Database Sizing and Replication Traffic
447(22)
Calculating the Database Size
448(2)
AD Write Operation
449(1)
Database and Log Files: Performance
449(1)
Hardware Minimums
450(1)
Garbage Collection
451(1)
Online Defragmentation
451(1)
Database Sizing: Adding Users
452(2)
Database Sizing Steps
452(1)
Database Sizing: Adding OUs
452(1)
OU Database Sizing
453(1)
Forecasting a Company's Database Size
453(1)
Database Sizing Example
453(1)
How Do You Use this Information?
454(1)
Global Catalog and Replication Size
454(2)
Deleting Objects Creates Replication
455(1)
Scalability Testing
456(1)
Domain Controller Hardware Selection
456(1)
Extensible Storage Engine I/O Patterns
457(1)
Case Study
457(1)
RAID Decisions: Database and Log File Considerations
458(1)
RAID Details
458(1)
Intra-Site Replication Traffic
459(4)
Replicating Users with Additional Attributes
459(1)
Group Replication within a Site
460(1)
Replicating Password Changes
461(1)
Intra-Site Global Catalog Replication
462(1)
Intra-Site Global Catalog and Universal Group Replication
462(1)
Inter-Site Domain Replication
463(2)
Inter-Site and Intra-Site Domain Replication
463(2)
Inter-Site GC RPC Replication
465(1)
Replication Traffic Summary
465(1)
Administrative Tasks: Using the Active Directory Sizer (ADSIZER)
466(3)
Using ADSI Edit to Change the Default Tombstone
468(1)
Using ADSI Edit to Change the Default Garbage Collection
468(1)
A Acronyms 469(4)
B Active Directory Command-Line Utilities 473(2)
C Administrative Tasks: Verifying SRV Records 475(10)
D Knowledge Base Articles 485(4)
Index 489

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program