Table of Contents

 

Introduction

Who Is This Book For?

How Is This Book Organized?

How to Stay in Touch?

Chapter 1. Working with Domain User Accounts

Establishing Account Policies

Enforcing Password Policy

Configuring Account Lockout Policy

Setting Kerberos Policy

Using Authentication Policies

Creating Password Settings Objects

Granting Capabilities, Privileges, and Rights

Assigning User Rights

Assigning User Rights for a Domain or OU

Assigning User Rights on a Specific Computer

Chapter 2. Managing User and Service Accounts

Creating and Configuring Domain User Accounts

Configuring Account Options

Configuring Profile Options

Determining Effective Access

Troubleshooting User Accounts

Working with Managed Service Accounts

Managed Service Account Fundamentals

Creating Group Managed Service Accounts

Step 1: Create a Hosting Group

Step 2: Create a KMS Root Key

Step 3: Create the gMSA

Step 4: Install the Account

Step 5: Configure Service to use gMSA

Deleting Managed Service Accounts

Resetting the Account Password

Moving Managed Service Accounts

Using Virtual Accounts

Maintaining User Accounts

Resetting Passwords

Disabling and Enabling User Accounts

Unlocking User Accounts

Renaming User Accounts

Moving User Accounts

Deleting User Accounts

Recovering Deleted Accounts

Enabling Active Directory Recycle Bin

Recovering Accounts from the Recycle Bin

Chapter 3. Managing Groups and Computers

Working with Groups

Creating Groups

Modifying Groups

Adding Members to Groups

Searching for Groups in the Directory

Deleting Groups

Managing Computer Accounts

Creating Computer Accounts in Active Directory

Joining Computers to a Domain

Performing an Offline Domain Join

Moving Computer Accounts

Disabling Computer Accounts

Resetting Computer Accounts

Deleting Computer Accounts

Troubleshooting Computer Accounts

Chapter 4. Active Directory Architecture: The Fundamentals

Active Directory Physical Architecture

A Top-Level View

A View within the Local Security Authority

Decoding the Directory Service Architecture

Navigating Protocols and Client Interfaces

Understanding the Directory Service Component

Understanding the Extensible Storage Engine

Deletion without Recycle Bin

Deletion with Recycle Bin

Data Store Architecture

Active Directory Logical Architecture

Understanding Objects

Navigating Domains, Trees, and Forests

Introducing Trusts

Introducing Namespaces and Partitions

Understanding Replication

Chapter 5. Creating and Updating Active Directory Designs

Planning for Replication

Planning for Search and Global Catalogs

Searching the Directory

Accessing the Global Catalog

Designating Global Catalog Servers

Designating Replication Attributes

Planning for Compatibility

Understanding Domain Functional Levels

Understanding Forest Functional Levels

Managing Functional Levels

Chapter 6. Understanding Authentication and Trusts

Authentication Essentials for Groups

Security Tokens and Membership Caching

User Principal Names

Enabling Membership Caching

Navigating Authentication Options

Understanding NTLM

Understanding Kerberos

Accessing Resources After Authentication

Understanding Domain Trusts

Two-Way Transitive Trusts

Shortcut Trusts

Understanding Forest Trusts

Identifying Existing Trusts

Establishing Trusts

Verifying and Troubleshooting Trusts

Delegating Authentication

Understanding Delegated Authentication

Implementing Delegated Authentication

Chapter 7. Planning Your Infrastructure

Creating an Implementation or Update Plan

Developing a Forest Plan

Selecting the Forest Namespace

Building a Single Forest vs. Multiple Forests

Understanding Forest Administration

Developing a Domain Plan

Creating a Domain Design

Using a Single Domain vs. Multiple Domains

Establishing the Forest Root Domain

Changing Domain Design

Chapter 8. Implementing Domain Services

Preinstallation Considerations for Active Directory

Selecting Your Hardware

Configuring Active Directory for Fast Recovery

Connecting Clients to Active Directory

Installing Active Directory Domain Services

Navigating Installation Options

Adding the Active Directory Role

Adding Domain Controllers to a Domain

Creating New Domains in New Forests

Adding a Domain or Domain Tree to a Forest

Performing an Installation from Media

Cloning Virtualized Domain Controllers

Using Clones of Virtualized Domain Controllers

Creating a Clone Virtualized Domain Controller

Finalizing the Clone Deployment

Troubleshooting the Clone Deployment

Uninstalling Active Directory

Chapter 9. Managing OUs

Working with Organizational Units

Using OUs for Delegation

Using OUs for Group Policy

Creating an OU Design

Using a Division or Business Unit Model

Using a Geographic Model

Using a Cost Center Model

Using an Administration Model

Creating and Managing Organizational Units

Creating an OU

Setting OU Properties

Adding Accounts and Resources to an OU

Delegating Administration of Domains and OUs

Understanding Delegation of Administration

Delegating Administration

Chapter 10. Deploying Read-Only Domain Controllers

Read-Only Domain Controllers: The Essentials

RODC Features

RODC Placement

Installing RODCs

Preparing for an RODC Installation

Installing an RODC

Installing an RODC from Media

Staging an RODC

Managing Password Replication Policy

Understanding Password Replication Policy

Controlling Password Replication

Managing Credentials on an RODC

Verifying Account Access Status

Resetting Credentials

Delegating Administrative Permissions

Chapter 11. Working with Operations Master

Operations Master Roles: The Essentials

Establishing Operations Masters

Identifying Operations Masters

Positioning Operations Masters

Working with Schema Masters

Locating the Schema Master

Transferring the Schema Master Role

Working with Domain Naming Masters

Locating the Domain Naming Master

Transferring the Domain Naming Master Role

Working with Relative ID Masters

Understanding RIDs

Managing RID Availability

Locating the RID Master

Transferring the RID Master Role

Working with PDC Emulators

How the PDC Emulator Manages Time Services

Locating the PDC Emulator

Transferring the PDC Emulator Role

Working with Infrastructure Masters

Locating the Infrastructure Master

Transferring the Infrastructure Master

Forcing Operations Master Role Transfers

Preparing to Seize a FSMO Role

Seizing a FSMO Role

Chapter 12. Planning Active Directory Sites

Active Directory Sites: The Fundamentals

Expanding Your Site Plan

Replication Within and Between Sites

Determining Site Boundaries

Understanding Active Directory Replication

Tracking Replication Changes Over Time

Tracking System Volume Changes Over Time

Replication Architecture: An Overview

Intersite Replication Essentials

Replication Rings and Directory Partitions

Developing or Revising Your Site Design

Mapping Network Infrastructure

Mapping Network Structure to Site Structure

Designing the Individual Sites

Designing the Intersite Replication Topology

Considering the Impact of Site-Link Bridging

Planning the Placement of Servers within Sites

Chapter 13. Active Directory Site Administration

Managing Sites and Subnets

Creating a Site

Creating a Subnet

Managing Domain Controllers within Sites

Managing Site Links and Intersite Replication

Navigating Replication Transport Options

Creating a Site Link

Configuring Replication Schedules for Site Links

Configuring Site-Link Bridges

Determining the ISTG

Configuring Site Bridgehead Servers

Configuring Advanced Site-Link Options

Monitoring and Troubleshooting Replication

Using the Replication Administrator

Using PowerShell to Monitor and Troubleshoot Replication

Using Performance Monitor to Track Replication

Modifying Intersite Replication for Testing

Chapter 14. Implementing Group Policy Infrastructure

Group Policy Fundamentals

Local vs Directory-based Group Policy

Group Policy Settings

Group Policy Architecture

Administrative Templates

Administration Tools

Using Local Group Policy

Configuring Directory-based Policy

Getting Domain Information

Accessing Forests, Domains, and Sites for Management

Creating and Linking a New GPO

Editing a GPO

Linking to a GPO

Working with Starter GPOs

Deleting a GPO

Using the Default GPOs

Managing Group Policy Through Delegation

Assigning GPO Creation Rights

Reviewing Management Privileges

Delegating Management Privileges

Delegating Privileges for Links and RSoP

Chapter 15. Optimizing Group Policy

Managing Group Policy Inheritance

Understanding Policy Application

Changing Link Order and Precedence

Overriding Inheritance

Blocking Inheritance

Enforcing Inheritance

Filtering Group Policy Application

Managing Policy Processing

Modifying Policy Processing

Configuring Loopback Processing

Using Scripts in Group Policy

Configuring Computer Scripts

Configuring User Scripts

Applying Group Policy Through Security Templates

Working with Security Templates

Applying Security Templates

Maintaining and Troubleshooting Group Policy

Understanding Group Policy Refresh

Modifying Group Policy Refresh

Viewing Applicable GPOs and the Last Refresh

Modeling GPOs for Planning

Refreshing Group Policy Manually

Backing Up GPOs

Restoring GPOs

Fixing Default Group Policy