Download 2| 1. Windows 2000 Active Directory

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Chapter 1, Introduction to Active Directory
|1|
1.
Chapter Overview
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
Explain the purpose of Active Directory.
Identify the components of Active Directory.
Describe the function of Active Directory components.
Explain the purpose of the schema in Active Directory.
Explain the purpose of the global catalog in Active Directory.
Explain Active Directory replication.
Explain the security relationship between domains in a tree (trusts).
Explain the purpose and function of group policy.
Describe the DNS namespace used by Active Directory.
Describe the naming conventions used by Active Directory.
Chapter 1, Lesson 1
Active Directory Overview
|2|
1.
Windows 2000 Active Directory
A.
B.
|3|
2.
Active Directory Objects
A.
B.
C.
|4|
3.
Directory
1.
Stores information related to the network resources
2.
Facilitates locating and managing network resources
Directory service
1.
Identifies all resources on a network
2.
Makes network resources available to users and applications
3.
Includes the source of the information and the service making the
information available
Active Directory objects are distinct named sets of attributes that
represent a network resource.
Object attributes are characteristics of an object.
1.
The attributes of a user account might include the user’s first name,
middle initial, last name, and logon name.
2.
The attributes of a computer account might include the computer name
and description.
Containers are objects that can contain other objects.
1.
A domain is a container object that can contain users, computers, and
other types of objects.
2.
The Users folder is a container object that contains users.
Active Directory Schema
A.
B.
Defines the objects that can be stored in Active Directory
Consists of a list of definitions
1.
The definitions determine the kinds of objects that can be stored in the
directory.
2.
C.
|5|
D.
|6|
E.
|7|
|8|
|9|
|10|
2
4.
The definitions determine the types of information about those objects
that can be stored in the directory.
Stores schema definitions as objects so that they can be administered
in the same manner as any other object in Active Directory
Contains two types of definition objects
1.
Schema class objects
a.
Describe the possible Active Directory objects that can be created
b.
Function as templates to create new Active Directory objects
c.
Consist of a collection of schema attribute objects
2.
Schema attribute objects
a.
Define the schema class objects with which they are associated
b.
Are defined only once, but can be used in multiple schema classes
Allows you to extend the set of basic schema classes and attributes
that ship with Windows 2000.
1.
Experienced developers and network administrators can define new
classes.
2.
Experienced developers and network administrators can define new
attributes for existing classes.
3.
Schema extension is an advanced operation requiring careful planning
and preparation.
4.
Schema object classes and attributes cannot be deleted, only deactivated.
Active Directory Components
A.
Logical structures
1.
Overview of logical structures
a.
Organize resources to mirror the logical structure of an organization
b.
Find resources by name rather than physical location
2.
Domains
a.
A domain is the core unit of the logical structure in Active Directory.
b.
All network objects exist within a domain.
c.
A domain stores information about only the objects it contains.
d.
A domain directory can theoretically store up to 10 million objects.
e.
A domain directory can realistically store up to 1 million objects.
f.
A domain is a security boundary, so no security policies or settings
such as administrative rights, security policies, and ACLs can cross
from one domain to another.
g.
The domain administrator has absolute rights to set policies only
within that domain.
3.
Organizational units (OUs)
a.
OUs are containers used to organize objects within a domain into a
logical administrative group.
b.
OUs can contain user accounts, groups, computers, printers,
applications, file shares, and other OUs from within the same
domain.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
c.
d.
e.
4.
|11|
|12|
|13|
By default, child objects within Active Directory, such as the Orders
OU and the Disp OU, inherit permissions from their parents, in this
case the US OU.
The OU hierarchy within a domain is independent of the OU
hierarchy structure in other domains.
OUs are the smallest scope to which you can delegate administrative
authority.
B.
Trees
a.
Introduction
(1) Trees are groupings or hierarchical arrangements of one or
more Windows 2000 domains.
(2) Trees are created by adding one or more child domains to an
existing parent domain.
(3) Domains in a tree share a contiguous namespace and a
hierarchical naming structure.
b.
Characteristics
(1) The domain name of a child domain is the relative name of
that child domain appended with the name of the parent
domain.
(2) All domains within a single tree share a common schema.
(3) All domains within a tree share a common global catalog.
5.
Forests
a.
Hierarchical arrangement of one or more separate, completely
independent domain trees
b.
Characteristics
(1) All trees in a forest share a common schema.
(2) All domains in a forest share a common global catalog.
(3) Domains in a forest operate independently, but the forest
enables communication across the entire organization.
(4) Implicit two-way transitive trusts exist between domains and
domain trees.
Physical structures
1.
Active Directory completely separates the physical structure from the
logical structure.
2.
Physical structure is composed of sites and domain controllers.
3.
Sites
a.
Combinations of one or more Internet Protocol (IP) subnets
connected by a highly reliable and fast link to localize as much
network traffic as possible
(1) Network connections should be at least 512 kilobits per second
(Kbps).
(2) Available bandwidth should be at least 128 Kbps.
b.
Typically have the same boundaries as local area networks (LANs)
c.
Are not part of the namespace
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
3
d.
4.
|14|
|15|
|16|
|17|
4
Contain only computer objects and connection objects used to
configure replication between sites
e.
Can include user accounts and computers belonging to multiple
domains, and a single domain can span one or more geographical
sites
Domain controllers
a.
Introduction
(1) A computer running one of the Windows 2000 Server family
of products and configured as a domain controller.
(2) A computer that stores a replica of the domain directory (local
domain database).
(3) Every domain has at least one domain controller.
(4) Fault Tolerance is achieved by having more than one domain
controller in a domain.
(5) Fault Tolerance ensures all required Active Directory
functions are performed, even if one domain controller is
down.
b.
Function
(1) Store a complete copy of all Active Directory information for
that domain
(2) Manage changes to all Active Directory information for that
domain
(3) Replicate changes to the Active Directory information to all
other domain controllers in the domain
c.
Replication
(1) Occurs automatically for objects in the domain from one
domain controller to all the other domain controllers in the
domain
(2) Begins at the domain controller at which a change to the
Active Directory information occurs and is replicated to all the
other domain controllers in the domain
(3) Occurs immediately for certain important updates, such as the
disabling of a user
(4) Is configurable both for how often replication occurs and the
amount of data replicated at one time
(5) Uses multimaster replication, so all domain controllers are
peers
d.
Collisions
(1) Occur when an attribute is modified on a domain controller
before a change to the same attribute on another domain
controller is completely propagated
(2) Are detected by comparing each attribute’s property version
number
(3) Are resolved by Active Directory by replicating the changed
attribute with the higher property version number
e.
Modes
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
(1)
|18|
|19|
|20|
5.
Mixed mode allows a Windows 2000 domain controller to
interact with any domain controllers in the domain that are
running previous versions of Windows NT.
(2) Native mode does not allow any domain controller in the
domain to run previous versions of Windows NT.
Catalog services: the global catalog
a.
Introduction
(1) The global catalog is the catalog service provided by Active
Directory.
(2) The global catalog is created automatically on the first domain
controller in a forest.
(3) The server containing the global catalog is known as the global
catalog server.
b.
Function
(1) The global catalog contains selected information about every
object in all domains in the enterprise.
(2) The global catalog allows all the domains in the enterprise to
act as one entity so that global searches across the enterprise
can be performed.
c.
Replication
(1) The global catalog uses Active Directory services multimaster
replication to replicate the global catalog information between
global catalog servers in other domains.
(2) The global catalog stores a full replica of all object attributes
in the directory for its host domain.
(3) The global catalog stores a partial replica of all object
attributes contained in the directory for every domain in the
forest.
(4) The partial replica stores attributes most frequently used in
search operations.
(5) Attributes are marked or unmarked for replication in the global
catalog when they are defined in the Active Directory schema.
(6) Object attributes replicated to the global catalog inherit the
same permissions as in source domains, ensuring that data in
the global catalog is secure.
d.
Global catalog roles
(1) The global catalog enables network logon by providing
universal group membership information to a domain
controller when a logon process is initiated.
(2) The global catalog enables finding directory information
regardless of which domain in the forest actually contains the
data.
e.
Query resolution
(1) The client queries its DNS server for the location of the global
catalog server.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
5
(2)
|21|
6
f.
The DNS server searches for the global catalog server location
and returns the IP address of the domain controller designated
as the global catalog server.
(3) The client queries the IP address of the domain controller
designated as the global catalog server. The query is sent to
port 3268 on the domain controller; standard Active Directory
queries are sent to port 389.
(4) The global catalog server processes the query. If the global
catalog contains the attribute of the object being searched for,
the global catalog server provides a response to the client. If
the global catalog server does not contain the attribute of the
object being searched for, the query is referred to Active
Directory.
Multiple global catalog servers
(1) Any domain controller can be configured to be a global catalog
server.
(2) The ability of a network structure to handle replication and
query traffic should be considered when determining which
domain controllers to designate as catalog servers.
(3) Additional catalog servers can provide quicker responses to
user inquiries.
(4) Additional catalog servers can provide redundancy.
(5) Every major site in your enterprise should have at least one
catalog server.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
Chapter 1, Lesson 2
Understanding Active Directory Concepts
|22|
1.
Replication
A.
B.
|23|
Overview
1.
Users and services should be able to access directory information at any
time from any computer in the domain tree or forest.
2.
Replication ensures that changes to a domain controller are reflected in
all domain controllers within a domain.
3.
Directory information is replicated to domain controllers both within and
among sites.
What information is replicated
1.
The information stored in the directory is partitioned into three
categories.
2.
Each of these information categories is referred to as a directory
partition.
3.
These directory partitions are the units of replication.
4.
The following information is contained in each directory:
a.
Schema information
(1) Defines the objects that can be created in the directory
(2) Defines the attributes that objects can have
(3) Is common to all domains in the domain tree or forest
(4) Is replicated to all domain controllers in the domain tree or
forest
b.
Configuration information
(1) Describes the logical structure of the deployment, including
domain structure and replication topology
(2) Is common to all domains in the domain tree or forest
(3) Is replicated to all domain controllers in the domain tree or
forest
c.
Domain data
(1) Describes all of the objects in a domain
(2) Is domain-specific and is not distributed to any other domains
5.
Domain controller replication
a.
A domain controller stores and replicates the schema information for
the domain tree or forest.
b.
A domain controller stores and replicates the configuration
information for all domains in the domain tree or forest.
c.
A domain controller stores and replicates all directory objects and
properties for its domain to any additional domain controllers in the
domain.
d.
A domain controller stores and replicates all directory objects and a
subset of the properties of all objects in the domain to the global
catalog.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
7
6.
|24|
C.
|25|
|26|
8
Global catalog server replication
a.
A global catalog stores and replicates the schema information for a
forest.
b.
A global catalog stores and replicates the configuration information
for all domains in the forest.
c.
A global catalog stores and replicates selected attributes for all
directory objects in the forest but only between global catalog
servers.
d.
A global catalog stores and replicates all directory objects and all
their properties for the domain in which the global catalog is located.
How replication works
1.
Intrasite replication
a.
KCC is a Windows 2000 service.
(1) Automatically generates a topology for the replication among
domain controllers in the same domain using a ring structure
(2) Analyzes the replication topology within a site every 15
minutes to ensure that it still works and is efficient
(3) Reconfigures the topology when a domain controller is added
or removed from the network or a site
b.
Replication topology
(1) Defines the path for directory updates to flow
(2) Updates flow from one domain controller to another
(3) All domain controllers in the site receive the update.
c.
Ring structure
(1) Ensures that there are at least two replication paths from one
domain controller to another.
(2) Ensures replication to all other domain controllers even if one
domain controller is down temporarily.
2.
Intersite replication
a.
You must manually connect sites by creating site links to ensure
replication between sites occurs.
b.
Site links represent network connections and allow replication to
occur.
c.
Active Directory uses the network connection information to generate
connection objects that provide efficient replication and fault
tolerance.
d.
You provide information about the replication transport used, cost of
a site link, times when the link is available for use, and how often the
link should be used.
e.
Active Directory uses this information to determine which site link
will be used to replicate information.
f.
You can customize replication schedules so that replication occurs
during specific times, such as when network traffic is light, to make
replication more efficient.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
|27|
2.
Trust Relationships
A.
|28|
B.
|29|
C.
|30|
3.
Overview
1.
A trust relationship is a link between two domains in which the trusting
domain honors the logon authentication of the trusted domain.
2.
Active Directory supports two forms of trust relationships: implicit twoway trusts and explicit one-way nontransitive trusts.
Implicit two-way transitive trusts
1.
An implicit two-way transitive trust is a relationship between parent and
child domains within a tree and between the top-level domains in a
forest.
2.
These default trust relationships among domains in a tree are established
and maintained implicitly (automatically).
3.
They are a feature of the Kerberos authentication protocol.
a.
The Kerberos authentication protocol provides the distributed
authentication and authorization in Windows 2000.
b.
A Kerberos transitive trust means that if Domain A trusts Domain B,
and Domain B trusts Domain C, then Domain A trusts Domain C.
4.
A domain joining a tree immediately has trust relationships established
with every domain in the tree.
5.
These trust relationships make all objects in the domains of the tree
available to all other domains in the tree.
6.
Domains that are members of the same tree automatically participate in a
transitive bi-directional trust relationship with the parent domain so that
users in one domain can access resources to which they have been
granted permission in all other domains in a tree.
Explicit one-way nontransitive trusts
1.
Overview
a.
An explicit one-way nontransitive trust is a relationship between
domains that are not part of the same tree.
b.
A nontransitive trust is bounded by the two domains in the trust
relationship and does not flow to any other domains in the forest.
c.
In most cases, you must explicitly (manually) create nontransitive
trusts.
2.
If there is a one-way nontransitive trust where Domain C trusts Domain
1, users in Domain 1 can access resources in Domain C.
3.
It is the only form of trust available in certain cases, such as:
a.
Between a Windows 2000 domain and a Windows NT domain
b.
Between a Windows 2000 domain in one forest and a Windows 2000
domain in another forest
c.
Between a Windows 2000 domain and an MIT Kerberos V5 realm,
allowing a client in a Kerberos realm to authenticate to an Active
Directory domain to access network resources in that domain
Group Policy
A.
Overview
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
9
1.
|31|
B.
C.
|32|
10
Group policies are collections of user and computer configuration
settings.
2.
Group policies can be linked to computers, sites, domains, and OUs to
specify the behavior of users’ desktops.
3.
Group policy allows you to control the users’ desktop by
a.
Determining the programs that are available to users
b.
Determining the programs that appear on the users’ desktop
c.
Determining the Start menu options
4.
Group policy settings are contained within group policy objects.
Group policy objects (GPOs)
1.
GPOs are collections of group policy settings used to create a specific
desktop configuration for a particular group of users.
2.
Each Windows 2000 computer has one local GPO and may, in addition,
be subject to any number of nonlocal (Active Directory–based) GPOs.
3.
Nonlocal GPOs override local GPOs.
4.
Nonlocal GPOs are linked to Active Directory objects (sites, domains, or
OUs) and can be applied to either users or computers.
5.
Nonlocal GPOs are applied hierarchically from the least restrictive
group (site) to the most restrictive group (OU) and are cumulative.
How group policy is applied
1.
The local GPO stored on the computer is applied first.
2.
Any site GPOs are applied synchronously in the order specified by the
group policy administrator after the local GPO is applied.
3.
Domain GPOs are applied synchronously in the order specified by the
group policy administrator after all site GPOs are applied.
4.
GPOs linked to the OU highest in the Active Directory hierarchy are
applied first, followed by GPOs linked to its child OU, and so on.
5.
The GPOs linked to the OU that contains the user or computer are
applied.
6.
If multiple GPOs are linked to an OU, they are applied synchronously in
an order specified by the group policy administrator.
7.
Example: Applying Group Policy to the Servers OU.
a.
The Servers OU has A3 applied first because it is a site GPO.
b.
The Servers OU has A1 applied second because it is the domain GPO
specified to be applied first.
c.
The Servers OU has A2 applied third because it is the domain GPO
specified to be applied second.
d.
The Servers OU has A4 applied fourth because it is applied to the OU
that is the parent to the Servers OU and therefore higher in the Active
Directory hierarchy.
e.
Finally the Servers OU has A6 applied because it is linked to the
Servers OU.
8.
Example: Applying Group Policy to the Marketing OU.
a.
The Marketing OU has A3 applied first because it is a site GPO.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
b.
|33|
D.
The Marketing OU has A1 applied second because it is the domain
GPO specified to be applied first.
c.
The Marketing OU has A2 applied third because it is the domain
GPO specified to be applied second.
d.
Finally the Marketing OU has A5 applied because it is linked to the
Marketing OU.
Exceptions to how group policy is applied
1.
A computer that is a member of a workgroup processes only the local
GPO.
2.
No Override
a.
Any GPO linked to a site, domain, or OU (not the local GPO) can be
set to No Override with respect to that site, domain, or OU so that
none of its policy settings can be overridden.
b.
When more than one GPO has been set to No Override, the one
highest in the Active Directory hierarchy (or higher in the hierarchy
specified by the administrator at each fixed level in Active Directory)
takes precedence.
c.
No Override is applied to the GPO link.
3.
Block Policy Inheritance
a.
At any site, domain, or OU, group policy inheritance can be
selectively marked as Block Policy Inheritance.
b.
GPO links set to No Override are always applied and cannot be
blocked.
c.
Block Policy Inheritance is applied directly to the site, domain, or
OU; it is not applied to GPOs, nor is it applied to GPO links.
d.
Block Policy Inheritance deflects all group policy settings that reach
the site, domain, or OU from above (by way of linkage to parents in
the Active Directory hierarchy) no matter what GPOs those settings
originate from.
4.
Loopback setting
a.
Loopback is an advanced group policy setting that is useful on
computers in certain closely managed environments such as kiosks,
laboratories, classrooms, and reception areas.
b.
Loopback provides alternatives to the default method of obtaining the
ordered list of GPOs whose user configuration settings affect a user.
c.
By default, a user’s settings come from a GPO list that depends on
the user’s location in Active Directory.
d.
The ordered list goes from site-linked to domain-linked to OU-linked
GPOs, with inheritance determined by the location of the user in
Active Directory and in an order specified by the administrator at
each level.
e.
Loopback can be Not Configured, Enabled, or Disabled, as can any
other group policy setting.
(1) If the Enabled state is chosen, it can be set to Replace or
Merge.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
11
(2)
(3)
|34|
4.
DNS Namespace
A.
B.
C.
|35|
|36|
12
If set to Replace, the GPO list for the user is replaced in its
entirety by the GPO list already obtained for the local
computer at startup. The computer’s GPOs replace the user
GPOs normally applied to the user.
If set to Merge, the GPO list is concatenated. The GPO list
obtained for the local computer at startup is appended to the
GPO list obtained for the user at logon. Because the GPO list
obtained for the computer is applied later, it has precedence if
it conflicts with settings in the user’s list.
D.
Overview
1.
Active Directory, like all directory services, is primarily a namespace.
2.
A namespace is any bounded area in which a name can be resolved.
3.
Name resolution is the process of translating a name into some object or
information that the name represents.
4.
The Active Directory namespace is based on the DNS naming scheme,
which allows for interoperability with Internet technologies.
5.
Private networks use DNS extensively to resolve computer names and to
locate computers within their local network and the Internet.
DNS benefits
1.
DNS names are user friendly.
2.
DNS names remain more constant than the IP addresses.
3.
DNS allows users to connect to local servers using the same naming
convention as the Internet.
Dynamic DNS
1.
Allows clients with dynamically assigned addresses to register with a
server running the DNS Service and update the DNS table dynamically
2.
Eliminates the need for other Internet naming services, such as Windows
Internet Naming System (WINS), in a homogeneous environment
Domain namespace
1.
The domain namespace is the naming scheme that provides the
hierarchical structure for the DNS database.
2.
Each node represents a partition of the DNS database.
3.
These nodes are referred to as domains.
4.
Each domain must have a name.
5.
The name of the parent domain is appended to its child domain.
6.
There are two types of namespaces.
a.
Contiguous namespace
(1) The name of the child object in an object hierarchy always
contains the name of the parent domain.
(2) A tree is a contiguous namespace.
b.
Disjointed namespace
(1) The names of a parent object and a child of the same parent
object are not directly related to one another.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
|37|
|38|
E.
(3) A forest is a disjointed namespace.
7.
Hierarchical structure
a.
Root domain
(1) Located at the top of the hierarchy
(2) Represented by a period (.)
(3) Managed by several organizations, including Network
Solutions, Inc.
b.
Top-level domains
(1) Arranged by organization type or geographical location
(2) edu—Educational institutions
(3) com—Commercial organizations
(4) gov—Government organizations
(5) org—Noncommercial organizations
(6) net—Commercial sites or networks
c.
Second-level domains
(1) Organizations, such as Network Solutions, Inc., and others,
assign and register second-level domains to individuals and
organizations for the Internet.
(2) Second-level domain names have two parts: a top-level name
and a unique second-level name.
(3) Examples of second-level domains include ed.gov, for the
United States Department of Education, microsoft.com, for
Microsoft Corporation, and stanford.edu, for Stanford
University.
d.
Host names
(1) Refer to specific computers on the Internet or a private
network
(2) Are the leftmost portion of an FQDN, which describes the
exact position of a host within the domain hierarchy
e.
Zones
(1) Are databases containing the resource records for a portion of
a DNS name
(2) Provide a way to partition the domain namespace into
manageable sections
(3) Are used to distribute administrative tasks to different groups.
(4) Encompass a contiguous domain namespace
(5) Store the name-to-IP-address mappings in the zone database
(6) Are anchored to specific domains, referred to as the zone’s
root domain
Name servers
1.
Overview of name servers
a.
Store the zone database file
b.
Use the zone database file to handle the DNS name resolution
process
c.
Can store data for one zone or multiple zones
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
13
|39|
|40|
|41|
|42|
|43|
14
F.
d.
Have authority for the domain namespace that the zone encompasses
2.
Name server responses to DNS queries
a.
Return the requested name or IP resolution information
b.
Return a pointer to another DNS name server
c.
Indicate that the information is not available
3.
Three main types of name servers
a.
Primary name server
(1) Gets data from the local zone
(2) The authoritative server (performs administrative tasks) for the
zone
b.
Secondary name server
(1) Is a backup DNS server
(2) Receives data from another name server
(3) A zone can have multiple secondary name servers.
(4) A zone should have at least one secondary name server to
perform zone transfers, provide redundancy, improve access
speed, and reduce the load on the primary name server.
c.
Master name server
(1) A primary or secondary name server for a zone
(2) Designated to provide updated DNS information to a
secondary server
Naming conventions
1.
Distinguished names (DNs)
a.
Uniquely identify every object in Active Directory
b.
Contain sufficient information for a client to retrieve the object from
the Directory
c.
Include the name of the domain that holds the object and the
complete path through the container hierarchy to the object
d.
Must be unique
2.
Relative distinguished names (RDNs)
a.
An RDN is the part of the name that is an attribute of the object itself.
b.
There can be duplicate RDNs for Active Directory objects, but not in
the same OU.
3.
Globally unique identifiers (GUIDs)
a.
GUIDs are 128-bit numbers that are guaranteed to be unique within
the enterprise.
b.
GUIDs are assigned to objects when the objects are created.
c.
GUIDs never change, even if you move or rename the objects.
d.
GUIDs can be stored and used by applications to retrieve objects
regardless of their current DN.
4.
User principal names (UPNs)
a.
Are “friendly” names
b.
Are composed of a shorthand name for the user account and the DNS
name for the tree where the user account object resides
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
c.
|44|
5.
Example: [email protected]
Chapter Summary
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
Explain the purpose of Active Directory.
Explain the purpose of the schema in Active Directory.
Identify the components of Active Directory.
Describe the function of Active Directory components.
Explain the purpose of the global catalog in Active Directory.
Explain Active Directory replication.
Explain the security relationship between domains in a tree (trusts).
Explain the purpose and function of group policy.
Describe the DNS namespace used by Active Directory.
Describe the naming conventions used by Active Directory.
Outline, Chapter 1
Designing a Microsoft Windows 2000 Directory Infrastructure
15