- 106
- 0
- 0
Скачать книгу в формате:
- fb2
- rtf
- txt
- epub
Аннотация
Get the definitive, in-depth resource for designing, deploying, and maintaining Windows Server 2008 Active Directory in an enterprise environment. Written by experts on directory services and the Active Directory team at Microsoft, this technical resource is packed with concrete, real-world design and implementation guidance. You’ll get in-depth guidance on installation, Active Directory components, replication, security, administration, and more. You also get answers to common questions from network architects, engineers, and administrators about Windows Server 2008 Active Directoryplus scripts, utilities, job aids, and a fully searchable eBook on CD. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
ЕЩЕ
Популярные книги
-
- Читаю
- В архив
- 50931
- 440
- 53
Аннотация:
Макс Ренар, вернувшись в столицу Вестонии Эрувиль, оказывается втянутым в опасную игру придворных и…
В процессе — 67 стр.
-
- Читаю
- В архив
- 133105
- 27
- 40
Аннотация:
Психолог Михаил Лабковский абсолютно уверен, что человек может и имеет право быть счастливым и де…
Фрагмент — 5 стр.
-
- Читаю
- В архив
- 61158
- 24
- 4
Аннотация:
Гэри Чемпен Пять языков любви Перевод Н. Будиной Гэри Чемпен, доктор философии, работает с …
Блок — 6 стр.
Читатель! Мы искренне надеемся, что ты решил читать книгу «Windows Server 2008 Active Directory Resource Kit» Reimer Stan (EN) по зову своего сердца. Темы любви и ненависти, добра и зла, дружбы и вражды, в какое бы время они не затрагивались, всегда остаются актуальными и насущными. Произведение пронизано тонким юмором, и этот юмор, будучи одной из форм, способствует лучшему пониманию и восприятию происходящего. Из-за талантливого и опытного изображения окружающих героев пейзажей, хочется быть среди них и оставаться с ними как можно дольше. В заключении раскрываются все загадки, тайны и намеки, которые были умело расставлены на протяжении всей сюжетной линии. Главный герой моментально вызывает одобрение и сочувствие, с легкостью начинаешь представлять себя не его месте и сопереживаешь вместе с ним. На первый взгляд сочетание любви и дружбы кажется обыденным и приевшимся, но впоследствии приходишь к выводу очевидности выбранной проблематики. Благодаря динамичному и увлекательному сюжету, книга держит читателя в напряжении от начала до конца. Созданные образы открывают целые вселенные невероятно сложные, внутри которых свои законы, идеалы, трагедии. Захватывающая тайна, хитросплетенность событий, неоднозначность фактов и парадоксальность ощущений были гениально вплетены в эту историю. Кажется невероятным, но совершенно отчетливо и в высшей степени успешно передано словами неуловимое, волшебное, редчайшее и крайне доброе настроение. «Windows Server 2008 Active Directory Resource Kit» Reimer Stan (EN) читать бесплатно онлайн невозможно без переживания чувства любви, признательности и благодарности.
Новинки
- 6
- 0
- 0
Аннотация:
Попасть на Большую землю, да запросто! Найти своих «мальчиков»? Двоих уже встретила, и чуть при…
Полный текст — 0 стр.
Попасть на Большую землю, да запросто! Найти своих «мальчиков»? Двоих уже встретила, и чуть при…
- 6
- 0
- 0
Аннотация:
Мальта сбежала от всесильного верховного мага. Впереди тяжелый путь, чтобы помочь спасшему ее черн…
Полный текст — 0 стр.
Мальта сбежала от всесильного верховного мага. Впереди тяжелый путь, чтобы помочь спасшему ее черн…
- 17
- 0
- 0
Аннотация:
Предположим, в меня шандарахнула молния. Допустим, я выжила. Вот только в другом мире. Попала так …
Полный текст — 0 стр.
Предположим, в меня шандарахнула молния. Допустим, я выжила. Вот только в другом мире. Попала так …
- 5
- 0
- 0
Аннотация:
В 1905 году детская писательница Фрэнсис Бёрнетт (1849–1924) написала удивительную историю о необы…
Фрагмент — 11 стр.
В 1905 году детская писательница Фрэнсис Бёрнетт (1849–1924) написала удивительную историю о необы…
- 15
- 0
- 0
Аннотация:
Мой мир рухнул, когда самый близкий для меня человек — отец — так нелепо погиб под колесами машины…
Полный текст — 51 стр.
Мой мир рухнул, когда самый близкий для меня человек — отец — так нелепо погиб под колесами машины…
- 8
- 0
- 0
Аннотация:
Века назад пали Врата, отсекая наш мир от того, откуда родом все Равные народы. Оставляя нас один …
Полный текст — 69 стр.
Века назад пали Врата, отсекая наш мир от того, откуда родом все Равные народы. Оставляя нас один …
- 9
- 0
- 0
Аннотация:
Века назад пали Врата, отсекая наш мир от того, откуда родом все Равные народы. Оставляя нас один …
Полный текст — 71 стр.
Века назад пали Врата, отсекая наш мир от того, откуда родом все Равные народы. Оставляя нас один …
Тут можно читать онлайн книгу Reimer Stan (EN) — Windows Server 2008 Active Directory Resource Kit — бесплатно полную версию (целиком). Жанр книги: Иностранная литература. Вы можете прочесть полную версию (весь текст) онлайн без регистрации и смс на сайте Lib-King.Ru (Либ-Кинг) или прочитать краткое содержание, аннотацию (предисловие), описание и ознакомиться с отзывами (комментариями) о произведении.
Прочитал книгу? Поставь оценку!
Windows Server 2008 Active Directory Resource Kit краткое содержание
Windows Server 2008 Active Directory Resource Kit — описание и краткое содержание, автор Reimer Stan (EN), читать бесплатно онлайн на сайте электронной библиотеки Lib-King.Ru.
Get the definitive, in-depth resource for designing, deploying, and maintaining Windows Server 2008 Active Directory in an enterprise environment. Written by experts on directory services and the Active Directory team at Microsoft, this technical resource is packed with concrete, real-world design and implementation guidance. You’ll get in-depth guidance on installation, Active Directory components, replication, security, administration, and more. You also get answers to common questions from network architects, engineers, and administrators about Windows Server 2008 Active Directoryplus scripts, utilities, job aids, and a fully searchable eBook on CD. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Windows Server 2008 Active Directory Resource Kit — читать онлайн бесплатно полную версию (весь текст целиком)
Windows Server 2008 Active Directory Resource Kit — читать книгу онлайн бесплатно, автор Reimer Stan (EN)
Оставить отзыв
Download the fantastic book titled Windows Server 2008 Active Directory Resource Kit written by Stan Reimer, available in its entirety in both PDF and EPUB formats for online reading. This page includes a concise summary, a preview of the book cover, and detailed information about «Windows Server 2008 Active Directory Resource Kit», which was released on 05 March 2008. We suggest perusing the summary before initiating your download. This book is a top selection for enthusiasts of the Computers genre.
Summary of Windows Server 2008 Active Directory Resource Kit by Stan Reimer PDF
Get the definitive, in-depth resource for designing, deploying, and maintaining Windows Server 2008 Active Directory in an enterprise environment. Written by experts on directory services and the Active Directory team at Microsoft, this technical resource is packed with concrete, real-world design and implementation guidance. You’ll get in-depth guidance on installation, Active Directory components, replication, security, administration, and more. You also get answers to common questions from network architects, engineers, and administrators about Windows Server 2008 Active Directory—plus scripts, utilities, job aids, and a fully searchable eBook on CD. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
- Author : Stan Reimer
- Publisher : Pearson Education
- Genre : Computers
- Total Pages : 864 pages
- ISBN : 0735646392
- Release Date : 05 March 2008
- PDF File Size : 30,8 Mb
- Language : English
- Rating : 4/5 from 21 reviews
Clicking on the GET BOOK button will initiate the downloading process of Windows Server 2008 Active Directory Resource Kit by Stan Reimer. This book is available in ePub and PDF format with a single click unlimited downloads.
GET BOOK
- Publisher : Pearson Education
- File Size : 28,6 Mb
- Release Date : 05 March 2008
GET BOOK
Get the definitive, in-depth resource for designing, deploying, and maintaining Windows Server 2008 Active Directory in an enterprise environment. Written by experts on directory services and the Active Directory team at
- Publisher : Unknown Publisher
- File Size : 23,7 Mb
- Release Date : 09 October 2023
GET BOOK
Featuring six comprehensive volumes—in print and on the CD—this official Microsoft RESOURCE KIT delivers the in-depth information you need to plan, implement, and manage your Windows Server 2008 systems. You get
- Publisher : Unknown Publisher
- File Size : 35,6 Mb
- Release Date : 09 October 2023
GET BOOK
Get the definitive, in-depth resource for designing, deploying, and maintaining Windows Server 2008 Active Directory in an enterprise environment. Written by experts on directory services and the Active Directory team at
- Publisher : Unknown Publisher
- File Size : 30,7 Mb
- Release Date : 09 October 2023
GET BOOK
- Publisher : Unknown Publisher
- File Size : 22,6 Mb
- Release Date : 09 October 2023
GET BOOK
- Publisher : Pearson Education
- File Size : 44,5 Mb
- Release Date : 08 December 2010
GET BOOK
In-depth and comprehensive, this official Microsoft RESOURCE KIT delivers the information you need to plan, deploy, and administer Remote Desktop Services in Windows Server 2008 R2. You get authoritative technical guidance
- Publisher : Pearson Education
- File Size : 28,6 Mb
- Release Date : 05 March 2008
GET BOOK
Get the in-depth information you need to use Group Policy to administer Windows Server 2008 and Windows Vista—direct from a leading Group Policy MVP and the Microsoft Group Policy team.
- Publisher : Unknown Publisher
- File Size : 31,9 Mb
- Release Date : 09 October 2023
GET BOOK
- Publisher : Unknown Publisher
- File Size : 41,7 Mb
- Release Date : 09 October 2023
GET BOOK
Get the definitive, in-depth resource for designing, deploying, and maintaining Windows Server 2008 Active Directory in an enterprise environment. Written by experts on directory services and the Active Directory team at
- Publisher : Unknown Publisher
- File Size : 49,7 Mb
- Release Date : 01 January 2008
GET BOOK
-
PUBLISHED BY Microsoft Press A Division of Microsoft Corporation
One Microsoft Way Redmond, Washington 98052-6399Copyright 2008 by Stan Reimer and Mike Mulcare
All rights reserved. No part of the contents of this book may be
reproduced or transmitted in any form or by any means without the
written permission of the publisher.Library of Congress Control Number: 2008920569
Printed and bound in the United States of America.
1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8
Distributed in Canada by H.B. Fenn and Company Ltd.
A CIP catalogue record for this book is available from the
British Library.Microsoft Press books are available through booksellers and
distributors worldwide. For further infor-mation about
international editions, contact your local Microsoft Corporation
office or contact Microsoft Press International directly at fax
(425) 936-7329. Visit our Web site at www.microsoft.com/mspress.
Send comments to [email protected].Microsoft, Microsoft Press, Active Directory, ActiveX, Excel,
Internet Explorer, Jscript, MS-DOS, Outlook, PowerPoint,
SharePoint, SQL Server, Visio, Visual Basic, Windows, Windows Live,
Windows Media, Windows Mobile, Windows NT, Windows PowerShell,
Windows Server, Windows Server System, and Windows Vista are either
registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries. Other product and company
names mentioned herein may be the trademarks of their respective
owners.The example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein
are fictitious. No association with any real company, organization,
product, domain name, e-mail address, logo, person, place, or event
is intended or should be inferred.This book expresses the authors views and opinions. The
information contained in this book is provided without any express,
statutory, or implied warranties. Neither the authors, Microsoft
Corporation, nor its resellers, or distributors will be held liable
for any damages caused or alleged to be caused either directly or
indirectly by this book.Acquisitions Editor: Martin DelRe Developmental Editor: Karen
SzallProject Editor: Maureen ZimmermanEditorial Production: Custom
Editorial Productions, Inc.Technical Reviewer: Bob Dean, Technical
Review services provided by Content Master, a member of CM Group,
Ltd.Cover: Tom Draper DesignBody Part No. X14-14924
-
To the three wonderful women in my lifeRhonda, Angela, and
Amanda.Your love and encouragement keep me going.
Stan Reimer
I dedicate this book to the love of my life, Rhonda, and our
precious sons,Brennan and Liam. Thank you for your continuous support and
forbeing the reason that I do what I do. I also dedicate this
bookto the rest of my family, who are still trying to figure out
what I actually do for a living.
Conan Kezema
To my familyNancy, James, Sean, and Patrick. Thanks
always for your encouragement and support.
Mike Mulcare
Tracey, Samantha, and Michelle, you are the reason I keep
it going. Darrin, thanks for holding down the fort.
Byron Wright
-
vContents at a Glance
Part I Windows Server 2008 Active Directory Overview1 Whats New
in Active Directory for Windows Server 2008 . . . . . . . . . . .
.32 Active Directory Domain Services Components . . . . . . . . . .
. . . . . . . . . 193 Active Directory Domain Services and Domain
Name System . . . . . . . 634 Active Directory Domain Services
Replication . . . . . . . . . . . . . . . . . . . . 95Part II Designing and Implementing Windows Server 2008 Active
Directory5 Designing the Active Directory Domain Services Structure . . .
. . . . . 1436 Installing Active Directory Domain Services . . . .
. . . . . . . . . . . . . . . . . 2177 Migrating to Active
Directory Domain Services . . . . . . . . . . . . . . . . . .
247Part III Administering Windows Server 2008 Active Directory
8 Active Directory Domain Services Security . . . . . . . . . .
. . . . . . . . . . . . 2739 Delegating the Administration of
Active DirectoryDomain Services. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 32510 Managing Active
Directory Objects . . . . . . . . . . . . . . . . . . . . . . . . .
. . . 35711 Introduction to Group Policy . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 39912 Using Group Policy
to Manage User Desktops . . . . . . . . . . . . . . . . . . . 45513
Using Group Policy to Manage Security. . . . . . . . . . . . . . .
. . . . . . . . . . 513Part IV Maintaining Windows Server 2008 Active Directory14
Monitoring and Maintaining Active Directory . . . . . . . . . . . .
. . . . . . . 55115 Active Directory Disaster Recovery . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 583Part V Identity and Access Management with Active Directory16
Active Directory Lightweight Directory Services . . . . . . . . . .
. . . . . . . 61917 Active Directory Certificate Services. . . . .
. . . . . . . . . . . . . . . . . . . . . . . 66118 Active
Directory Rights Management Services . . . . . . . . . . . . . . .
. . . . 70319 Active Directory Federation Services . . . . . . . .
. . . . . . . . . . . . . . . . . . . 745 -
Table of Contents
Acknowledgments. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xxiIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. xxiiiOverview of Book . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xxiiiPart I Windows Server 2008 Active Directory Overview . . . . . .
. . . . . . . . . . xxiiiPart II Designing and Implementing Windows Server 2008 Active
Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . xxivPart III Administering Windows Server 2008 Active Directory. . .
. . . . . . . . xxivPart IV Maintaining Windows Server 2008 Active Directory . . . .
. . . . . . . . xxvPart V Identity and Access Management with Active Directory . .
. . . . . . . xxvDocument Conventions. . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxviReader Aids . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxviSidebars . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xxviCommand-Line Examples . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . xxviiCompanion CD . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xxviiManagement Scripts . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . xxviiUsing the Scripts. . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . xxviiiFind Additional Content Online . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . xxviiiResource Kit Support Policy . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxixPart I Windows Server 2008 Active Directory Overview
1 Whats New in Active Directory for Windows Server 2008 . . . .
. . . . . . . .3Whats New in Active Directory Domain Services . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Read-Only Domain Controllers (RODC) . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 3Active Directory Domain Services Auditing . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 6Fine-Grained Password Policies . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 7Restartable Active Directory Domain Services. . . . . . . . . .
. . . . . . . . . . . . . . . . . . 9Database Mounting Tool. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 9User Interface Improvements . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 10Microsoft is interested in hearing your feedback so we can
continually improve our books and learning resources for you. To
participate in a brief online survey, please visit:www.microsoft.com/learning/booksurvey/
What do you think of this book? We want to hear from you!vii
-
viii Table of Contents
Additional Active Directory Service Roles . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 11Active Directory Certificate Services Role . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 12Active Directory Federation Services Role . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 13Active Directory Lightweight Directory Services Role . . . . . .
. . . . . . . . . . . . . . 15Active Directory Rights Management Services Role . . . . . . . .
. . . . . . . . . . . . . 16Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . 182 Active Directory Domain Services Components . . . . . . . . .
. . . . . . . . . . 19AD DS Physical Structure . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 19The Directory Data Store . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 20Domain Controllers . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 22Global Catalog Servers . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 23Read-Only Domain Controllers . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 25Operations Masters . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 28Transferring Operations Master Roles . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 32The Schema . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 32AD DS Logical Structure . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
41AD DS Partitions . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 42Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46Forests . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
50Trusts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
52Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
55Organizational Units . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 57Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . 60Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
61Related Tools. . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 61Related Help Topics . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 623 Active Directory Domain Services and Domain Name System. . . .
. . . 63Integration of DNS and AD DS . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64Service Location (SRV) Resource Records . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 64SRV Records Registered by AD DS Domain Controllers . . . . . . .
. . . . . . . . . . . 66DNS Locator Service . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 69Automatic Site Coverage . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 72AD DS Integrated Zones . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74Benefits of Using AD DS Integrated Zones . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 75Default Application Partitions for DNS . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 76Managing AD DS Integrated Zones . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 78 -
Table of Contents ix
Integrating DNS Namespaces and AD DS Domains . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 81DNS Delegation . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 82Forwarders and Root Hints . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 83Troubleshooting DNS and AD DS Integration . . . . . . . . . . .
. . . . . . . . . . . . . . . . 88Troubleshooting DNS. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 89Troubleshooting SRV Record Registration . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 91Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . 92Best Practices. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . 92Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
92Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 92Related Tools . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 94Related Help Topics . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 944 Active Directory Domain Services Replication . . . . . . . . .
. . . . . . . . . . . 95AD DS Replication Model . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 96Replication Process. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
97Update Types . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Replicating Changes . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 99Replicating the SYSVOL Directory . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 105Intrasite and Intersite Replication . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 106Intrasite Replication . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 107Intersite Replication . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 108Replication Latency . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 109Urgent Replication . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 110Replication Topology Generation. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 111Knowledge Consistency Checker . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 112Connection Objects . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 112Intrasite Replication Topology . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 114Global Catalog Replication . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 118Intersite Replication Topology . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 119RODCs and the Replication Topology . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 120Configuring Intersite Replication . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Creating Additional Sites. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 123Site Links . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124Site Link Bridges . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 128Replication Transport Protocols . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 129Configuring Bridgehead Servers . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 130 -
x Table of Contents
Troubleshooting Replication . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Process for Troubleshooting AD DS Replication Failures. . . . .
. . . . . . . . . . . . 133Tools for Troubleshooting AD DS Replication . . . . . . . . . .
. . . . . . . . . . . . . . . . 134Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 137Best Practices . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
137Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
138Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 138Related Tools. . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 140Related Help Topics . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 140Part II Designing and Implementing Windows Server 2008 Active
Directory5 Designing the Active Directory Domain Services Structure . . .
. . . . . 143Defining Directory Service Requirements . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 144Defining Business and Technical Requirements . . . . . . . . . .
. . . . . . . . . . . . . . 145Documenting the Current Environment . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . 150Designing the Forest Structure . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 156Forests and AD DS Design . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 158Single or Multiple Forests. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 159Designing Forests for AD DS Security. . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 161Forest Design Models . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 163Defining Forest Ownership . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 166Forest Change Control Policies . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 167Designing the Integration of Multiple Forests . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 167Designing Inter-Forest Trusts . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 168Designing Directory Integration Between Forests . . . . . . . .
. . . . . . . . . . . . . . 172Designing the Domain Structure . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 172Determining the Number of Domains . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 174Designing the Forest Root Domain. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 176Designing Domain Hierarchies . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 177Domain Trees and Trusts. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 178Changing the Domain Hierarchy After Deployment . . . . . . . . .
. . . . . . . . . . . 180Defining Domain Ownership . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 180Designing Domain and Forest Functional Levels . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 181Features Enabled at Domain Functional Levels . . . . . . . . . .
. . . . . . . . . . . . . . 181Features Enabled at Forest Functional Levels . . . . . . . . . .
. . . . . . . . . . . . . . . . 183Implementing a Domain and Forest
Functional Level . . . . . . . . . . . . . . . . . . . 183 -
Table of Contents xiDesigning the DNS Infrastructure . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . 184Namespace Design. . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 184Designing the Organizational Unit Structure . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 192Organizational Units and AD DS Design . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 192Designing an OU Structure . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 193Creating an OU Design . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 195Designing the Site Topology. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Sites and AD DS Design. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 198Creating a Site Design . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 198Creating a Replication Design . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 202Designing Server Locations . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 206Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 214Best Practices. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 214Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
215Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 215Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 2166 Installing Active Directory Domain Services . . . . . . . . .
. . . . . . . . . . . . 217Prerequisites for Installing AD DS . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 217Hard Disk Space Requirements . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 218Network Connectivity . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 219DNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
220Administrative Permissions . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 220Operating System Compatibility . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 221Understanding AD DS Installation Options . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 222Installation Configuration Tasks and the Add Roles Wizard . . .
. . . . . . . . . . . 222Server Manager . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 223Active Directory Domain Services Installation . . . . . . . . .
. . . . . . . . . . . . . . . . . 224Unattended Installation. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 225Using the Active Directory Domain Services Installation Wizard .
. . . . . . . . . . . . . . . 225Deployment Configuration. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 226Naming the Domain . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 227Setting the Windows Server 2008 Functional Levels . . . . . . .
. . . . . . . . . . . . . 228Additional Domain Controller Options. . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 232File Locations . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 233Completing the Installation . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 234Verifying Installation of AD DS. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 235 -
xii Table of Contents
Performing an Unattended Installation . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 236Installing from Media . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 237Deploying Read-Only Domain Controllers . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 238Server Core Installation Window Server 2008. . . . . . . . . . .
. . . . . . . . . . . . . . . 239Deploying the RODC. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 239Removing AD DS . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
240Removing Additional Domain Controllers. . . . . . . . . . . . .
. . . . . . . . . . . . . . . . 241Removing the Last Domain Controller . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 242Unattended Removal of AD DS . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 243Forced Removal of a Windows Server 2008 Domain Controller . . .
. . . . . . . 243Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 244Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
244Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 244Related Tools. . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2467 Migrating to Active Directory Domain Services . . . . . . . .
. . . . . . . . . . 247Migration Paths . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . 248The Domain Upgrade Migration Path . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 249Domain Restructuring . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 250Determining Your Migration Path . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 252Upgrading the Domain. . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254Upgrading from Windows 2000 Server and Windows Server 2003 . . .
. . . . 255Restructuring the Domain . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Interforest Migration. . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 258Intraforest Migration . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
265Configuring Interforest Trusts . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 266Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 268Best Practices . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
269Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
269Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 269Related Tools. . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 270Part III Administering Windows Server 2008 Active Directory
8 Active Directory Domain Services Security . . . . . . . . . .
. . . . . . . . . . . . 273AD DS Security Basics . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . 274Security Principals . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 274Access Control Lists . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 275 -
Table of Contents xiiiAccess Tokens . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . 278Authentication . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 278Authorization . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 279Kerberos Security . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
280Introduction to Kerberos. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 281Kerberos Authentication . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 283Delegation of Authentication. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 291Configuring Kerberos in Windows Server 2008 . . . . . . . . . .
. . . . . . . . . . . . . . 293Integration with Public Key Infrastructure . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 294Integration with Smart Cards . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 297Interoperability with Other Kerberos Systems . . . . . . . . . .
. . . . . . . . . . . . . . . . 298Troubleshooting Kerberos. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 299NTLM Authentication . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303Implementing Security for Domain Controllers. . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 305Decrease the Domain Controller Attack Surface. . . . . . . . . .
. . . . . . . . . . . . . . 306Configuring the Default Domain Controllers Policy . . . . . . .
. . . . . . . . . . . . . . 308Configuring SYSKEY . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 317Designing Secure Administrative Practices. . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 318Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 321Best Practices. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 321Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
321Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 321Related Tools . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 323Related Help Topics . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 3239 Delegating the Administration of Active Directory Domain
Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . 325Active Directory Administration Tasks. . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 326Accessing Active Directory Objects . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 327Evaluating Deny and Allow ACEs in a DACL . . . . . . . . . . . .
. . . . . . . . . . . . . . . 329Active Directory Object Permissions . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 329Standard Permissions . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 330Special Permissions . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 331Permissions Inheritance. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 336Effective Permissions . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 340Ownership of Active Directory Objects. . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 343 -
xiv Table of Contents
Delegating Administrative Tasks . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 345Auditing the Use of Administrative Permissions . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 348Configuring the Audit Policy for the Domain Controllers. . . . .
. . . . . . . . . . . 348Configuring Auditing on Active Directory Objects . . . . . . . .
. . . . . . . . . . . . . 351Tools for Delegated Administration . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 352Customizing the Microsoft Management Console. . . . . . . . . .
. . . . . . . . . . . . 353Planning for the Delegation of Administration. . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 354Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 355Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
356Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 35610 Managing Active Directory Objects . . . . . . . . . . . . . .
. . . . . . . . . . . . . . 357Managing Users . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . 357User Objects . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 358inetOrgPerson Objects . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 363Contact Objects . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 364Service Accounts . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 365Managing Groups . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
366Group Types . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 366Group Scope. . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 367Default Groups in Active Directory . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 371Special Identities . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 373Creating a Security Group Design. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 374Managing Computers . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377Managing Printer Objects . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 379Publishing Printers in Active Directory. . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 380Printer Location Tracking . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 383Managing Published Shared Folders . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 384Automating Active Directory Object Management . . . . . . . . .
. . . . . . . . . . . . . . . . . . 386Command-Line Tools for Active Directory Management . . . . . . .
. . . . . . . . . 386Using LDIFDE and CSVDE. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 387Using VBScript to Manage Active Directory Objects . . . . . . .
. . . . . . . . . . . . . 389Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 395Best Practices . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
395Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
396Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 396Related Tools. . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 397Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 397 -
Table of Contents xv
11 Introduction to Group Policy . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 399Group Policy Overview . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . 400How Group Policy Works . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 401Whats New in Windows Server 2008 Group Policy? . . . . . . . . .
. . . . . . . . . . . 404Group Policy Components . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 405Overview of the Group Policy Container . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 405Components of the Group Policy Template . . . . . . . . . . . .
. . . . . . . . . . . . . . . . 407Replication of the Group Policy Object Components. . . . . . . .
. . . . . . . . . . . . 409Group Policy Processing . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409How Clients Process GPOs . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 410Initial GPO Processing . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 413Background GPO Refreshes . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 415How GPO History Relates to Group Policy Refresh . . . . . . . .
. . . . . . . . . . . . . . 416Exceptions to Default Background Processing Interval Times. . .
. . . . . . . . . . 418Implementing Group Policy . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 423GPMC Overview . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 424Using the GPMC to Create and Link GPOs. . . . . . . . . . . . .
. . . . . . . . . . . . . . . . 426Modifying the Scope of GPO Processing . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 427Delegating the Administration of GPOs . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 436Implementing Group Policy Between Domains and Forests . . . . .
. . . . . . . . . 438Managing Group Policy Objects . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 439Backing Up and Restoring GPOs . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 439Copying Group Policy Objects . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 441Importing Group Policy Object Settings. . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 441Modeling and Reporting Group Policy Results . . . . . . . . . .
. . . . . . . . . . . . . . . 442Scripting Group Policy Management . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 447Planning a Group Policy Implementation. . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 450Troubleshooting Group Policy . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 451Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 453Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
453Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 45312 Using Group Policy to Manage User Desktops . . . . . . . . .
. . . . . . . . . . 455Desktop Management Using Group Policy . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
456Managing User Data and Profile Settings. . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 459Managing User Profiles . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 459Using Group Policy to Manage Roaming User Profiles . . . . . . .
. . . . . . . . . . . 466Folder Redirection . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 469 -
xvi Table of Contents
Administrative Templates . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
477Understanding Administrative Template Files. . . . . . . . . . .
. . . . . . . . . . . . . . . 478Managing Domain-based Template Files . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . 481Best Practices for Managing ADMX Template Files . . . . . . . .
. . . . . . . . . . . . . 482Using Scripts to Manage the User Environment . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 484Deploying Software Using Group Policy . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 485Windows Installer Technology . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 486Deploying Applications . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 486Using Group Policy to Distribute NonWindows Installer
Applications . . . . 490Configuring Software Package Properties . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 491Using Group Policy to Configure Windows Installer . . . . . . .
. . . . . . . . . . . . . 498Planning for Group Policy Software Installation . . . . . . . .
. . . . . . . . . . . . . . . . 500Limitations to Using Group Policy to Manage Software . . . . . .
. . . . . . . . . . . 501Overview of Group Policy Preferences . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 503Group Policy Preferences vs. Policy Settings . . . . . . . . . .
. . . . . . . . . . . . . . . . . 503Group Policy Preferences Settings . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 504Group Policy Preferences Options . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 507Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 510Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
510Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 510On the Companion CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 51113 Using Group Policy to Manage Security. . . . . . . . . . . .
. . . . . . . . . . . . . 513Configuring Domain Security with Group
Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
513Overview of the Default Domain Policy . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 514Overview of the Default Domain Controllers Policy . . . . . . .
. . . . . . . . . . . . . 519Recreating the Default GPOs for a Domain. . . . . . . . . . . .
. . . . . . . . . . . . . . . . 526Fine-Grained Password Policies . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 527Hardening Server Security Using Group Policy . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 532Software Restriction Policies. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 535Configuring Network Security Using Group Policy . . . . . . . .
. . . . . . . . . . . . . . . . . . . 537Configuring Wired Network Security . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 538Configuring Wireless Network Security . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 541Configuring Windows Firewall and IPsec Security . . . . . . . .
. . . . . . . . . . . . . . 541Configuring Security Settings Using Security Templates . . . . .
. . . . . . . . . . . . . . . . . . 543Deploying Security Templates . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 545 -
Table of Contents xviiSummary . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . 547Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
548Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 548Part IV Maintaining Windows Server 2008 Active Directory14
Monitoring and Maintaining Active Directory . . . . . . . . . . . .
. . . . . . . 551Monitoring Active Directory . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551Why Monitor Active Directory . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 553Monitoring Server Reliability and Performance . . . . . . . . .
. . . . . . . . . . . . . . . 554How to Monitor Active Directory . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 561What to Monitor. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 571Monitoring Replication . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 572Active Directory Database Maintenance. . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 575Garbage Collection . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 575Online Defragmentation . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 576Offline Defragmentation of the Active Directory Database . . . .
. . . . . . . . . . 577Managing the Active Directory Database Using Ntdsutil . . . . .
. . . . . . . . . . . 578Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 580Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
581Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 58115 Active Directory Disaster Recovery . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . 583Planning for a Disaster. . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . 584Active Directory Data Storage . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 585Backing Up Active Directory . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587The Need for Backups . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 589Tombstone Lifetime . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 589Backup Frequency . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 591Restoring Active Directory . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591Restoring Active Directory by Creating a New Domain Controller .
. . . . . . . 592Performing a Nonauthoritative Restore of Active Directory . . .
. . . . . . . . . . . 595Performing an Authoritative Restore of Active Directory . . . .
. . . . . . . . . . . . 599Restoring Group Memberships . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 601Reanimating Tombstone Objects . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 605Using the Active Directory Database Mounting Tool . . . . . . .
. . . . . . . . . . . . . 607Restoring SYSVOL Information. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 610Restoring Operations Masters and Global Catalog Servers . . . .
. . . . . . . . . . . 610 -
xviii Table of Contents
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 614Best Practices . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
614Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
615Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 615Related Tools. . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 615Part V Identity and Access Management with Active Directory16
Active Directory Lightweight Directory Services . . . . . . . . . .
. . . . . . . 619AD LDS Overview. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
620AD LDS Features . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 620AD LDS Deployment Scenarios . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 620AD LDS Architecture and Components . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 622AD LDS Servers. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 622AD LDS Instances . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 623Directory Partitions . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 624AD LDS Replication . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 629AD LDS Security . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 633Implementing AD LDS. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640Configuring Instances and Application Partitions . . . . . . . .
. . . . . . . . . . . . . . 640AD LDS Management Tools . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 643Configuring Replication . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 648Backing Up and Restoring AD LDS . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 651Configuring AD DS and AD LDS Synchronization . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 654Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 657Best Practices . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
657Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
658Related Tools. . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 658Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 659Related Help Topics . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 65917 Active Directory Certificate Services. . . . . . . . . . . .
. . . . . . . . . . . . . . . . 661Active Directory Certificate
Services Overview . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . 661Public Key Infrastructure Components. . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 662Certification Authorities . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 667Certificate Services Deployment Scenarios . . . . . . . . . . .
. . . . . . . . . . . . . . . . . 670Implementing AD CS. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670Installing AD CS Root Certification Authorities. . . . . . . . .
. . . . . . . . . . . . . . . . 671Installing AD CS Subordinate Certification Authorities . . . . .
. . . . . . . . . . . . . 673 -
Table of Contents xix
Configuring Web Enrollment . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 673Configuring Certificate Revocation . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 674Managing Key Archival and Recovery. . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 681Managing Certificates in AD CS . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 685Configuring Certificate Templates . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 685Configuring Certificate Autoenrollment. . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 690Managing Certificate Acceptance with Group Policy . . . . . . .
. . . . . . . . . . . . . 692Configuring Credential Roaming . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 693Designing an AD CS Implementation . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 694Designing a CA Hierarchy . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 694Designing Certificate Templates . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 697Designing Certificate Distribution and Revocation. . . . . . . .
. . . . . . . . . . . . . . 700Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 700Best Practices. . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 701Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
701Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 701Related Tools . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70218 Active Directory Rights Management Services . . . . . . . . .
. . . . . . . . . . 703AD RMS Overview . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . 704AD RMS Features . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 704AD RMS Components . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 706How AD RMS Works . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 709AD RMS Deployment Scenarios . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 713Implementing AD RMS . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714Preinstallation Considerations Before Installing AD RMS . . . .
. . . . . . . . . . . . 714Installing AD RMS Clusters . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 715Configuring the AD RMS Service Connection Point . . . . . . . .
. . . . . . . . . . . . . 720Working with AD RMS Clients . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 721Administering AD RMS . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726Managing Trust Policies. . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 726Managing Rights Policy Templates . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 733Configuring Exclusion Policies . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 738Configuring Security Policies . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . 739Viewing Reports . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 741Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 742Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
742Related Information . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 743 -
xx Table of Contents
19 Active Directory Federation Services . . . . . . . . . . . .
. . . . . . . . . . . . . . . 745AD FS Overview . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . 746Identity Federation . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 746Web Services . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . 747AD FS Components . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . 749AD FS Deployment Designs . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 753Implementing AD FS . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759AD FS Deployment Requirements. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 760Implementing AD FS in a Federation Web SSO Design . . . . . . .
. . . . . . . . . . 767Configuring the Account Partner Federation Service . . . . . . .
. . . . . . . . . . . . 774Configuring Resource Partner AD FS
Components . . . . . . . . . . . . . . . . . . . . . 782Configuring AD FS for Windows NT Token-based Applications . . .
. . . . . . . 787Implementing a Web SSO Design. . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . 789Implementing a Federated Web SSO with Forest Trust Design . . .
. . . . . . . . 790Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 791Best Practices . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
791Additional Resources . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
792Resources on the CD . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . 792Related Help Topics . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . 792Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . 795Microsoft is interested in hearing your feedback so we can
continually improve our books and learning resources for you. To
participate in a brief online survey, please visit:www.microsoft.com/learning/booksurvey/
What do you think of this book? We want to hear from you!
-
xxi
Acknowledgments
by Stan Reimer (for the team):
First of all, I want thank my coauthors for their hard work on
this book. When I was first asked to lead this writing project, I
looked around for the right people to work with me on this book and
I couldnt have picked a better team.Secondly, I want to thank the folks at Microsoft Press. This
team includes Martin DelRe, the program manager, who kept poking us
until we agreed to do this project, Karen Szall, the content
development manager, and Maureen Zimmerman, the content project
manager. I am sure that the problems we had keeping to the schedule
on this book caused a few headaches for this group, but they were
amazingly supportive and encouraging all the way through. Maureen
had an amazing knack for reminding us when materials were due
without making it feel like nagging.Thanks to Bob Dean, the technical reviewer, for his valuable
comments. Production for this book was professionally handled by
Custom Editorial Productions Inc., with Linda Allen as the project
manager, Cecilia Munzenmaier as the copy editor, and many others
who toiled away in the background. As writers, we get to have all
of the fun at the beginning of the process; these folks are still
working on this long after we are done.A Resource Kit doesnt come together without a lot of interaction
with the product groups at Microsoft, as well as other technical
experts, such as Directory Services MVPs. All of the chapters in
this book have been reviewed by these experts and many of these
experts contrib-uted to the Direct from the Source, Direct from the
Field, or How It Works sidebars that you will enjoy reading in this
book. These reviewers and contributors include:James McColl, Mike Stephens, Moon Majumdar, Judith Herman, Mark
Gray, Linda Moore, Greg Robb, Barry Hartman, Christiane Soumahoro,
Gautam Anand, Michael Hunter, Alain Lissoir, Yong Liang, David
Hastie, Teoman Smith, Brian Lich, Matthew Rimer, David Fisher, Bob
Drake, Rob Greene, Andrej Budja, Rob Lane, Gregoire Guetat, Donovan
Follette, Pavan Kompelli, Sanjeev Balarajan, Fatih Colgar, Brian
Desmond, Jose Luis Auricchio, Darol Timberlake, Peter Li, Elbio
Abib, Ashish Sharma, Nick Pierson, Lu Zhao, and Antonio
Calomeni.by Conan Kezema:
Special thanks to my fellow coauthors for their hard work on
this book. I would also like to thank Stan for the many
opportunities he has provided over the years; he is a great friend
and mentor. -
Introduction
Welcome to the Windows Server 2008 Active Directory Resource
Kit, your complete source for the information you need to design
and implement Active Directory in Windows Server 2008.The Windows Server 2008 Active Directory Resource Kit is a
comprehensive technical resource for planning, deploying,
maintaining, and troubleshooting an Active Directory infrastructure
in Windows Server 2008. While the target audience for this Resource
Kit is experienced IT professionals who work in medium-sized and
large-sized organizations, anyone who wants to learn how to
implement and manage Active Directory in Windows Server 2008 will
find this Resource Kit invaluable.One of the new features in Windows Server 2008 Active Directory
is that the term Active Directory now covers a lot more territory
than it did in previous iterations of this directory service. What
was previously called Active Directory in Windows 2000 and Windows
Server 2003 is now called Active Directory Domain Services (AD DS),
and several more direc-tory service components have been included
under the Active Directory umbrella. These include Active Directory
Lightweight Directory Services (AD LDS), Active Directory
Certificate Services (AD CS), Active Directory Rights Management
Services (AD RMS), and Active Directory Federation Services (AD
FS).Within this Resource Kit youll find in-depth technical
information on how Active Directory works in Windows Server 2008.
In addition, you will find detailed task-based guidance for
implementing and maintaining the Active Directory infrastructure.
Youll also find numerous sidebarscontributed by members of the
Active Directory product team, other directory experts at
Microsoft, and directory services MVPsthat provide deep insight
into how Active Directory works, best practices for designing and
implementing Active Directory, and invalu-able troubleshooting
tips. Finally, the companion CD includes deployment tools,
templates, and many sample scripts that you can use and customize
to help you automate various aspects of managing Active Directory
in enterprise environments.Overview of BookThis book is divided into the following five
parts with the following chapters:Part I Windows Server 2008 Active Directory Overview Chapter 1
Whats New in Active Directory for Windows Server 2008 This
chapterprovides an overview of the new features that are available in
Windows Server 2008. If you know Windows Server 2003 Active
Directory, this is a good place for you to get a quick overview of
some of the new material that will be covered in this
book.xxiii -
xxiv Introduction
Chapter 2 Active Directory Domain Services Components This
chapter provides an overview of Active Directory Domain Servicesif
you are somewhat new to Active Directory, this is a great chapter
to get you started on the terms and concepts that make up AD
DS.Chapter 3 Active Directory Domain Services and Domain Name
System One of the most critical components that you need in order
to make AD DS work efficiently is a properly implemented DNS
infrastructure. This chapter provides information on how to do
this.Chapter 4 Active Directory Domain Services Replication In order
to work with AD DS, you will need to understand replication. This
chapter provides all of the details of how AD DS replication works
and how to configure it.Part II Designing and Implementing Windows Server 2008 Active
DirectoryChapter 5 Designing the Active Directory Domain Services
Structure Before deploy-ing AD DS, you need to create a design that
meets your organizations requirements. This chapter provides the
in-depth information that you will need to do that planning.Chapter 6 Installing Active Directory Domain Services Installing
AD DS on a Win-dows Server 2008 computer is pretty easy, but there
several variations on how to per-form the installation. This
chapter describes all of the options and the reasons for choosing
each one.Chapter 7 Migrating to Active Directory Domain Services Many
organizations are already running a previous version of Active
Directory. This chapter provides the details on how to deploy
Windows Server 2008 domain controllers in this environment, and how
to migrate the Active Directory environment to Windows Server
2008.Part III Administering Windows Server 2008 Active Directory
Chapter 8 Active Directory Domain Services Security AD DS provides
the core net-work authentication and authorization services in many
organizations. This chapter describes how AD DS security works and
the steps you can take to secure your AD DS environment.Chapter 9 Delegating the Administration of Active Directory
Domain Services One of the options in implementing AD DS is that
you can delegate many administrative tasks to other administrators
without granting them domain level permissions. This chapter
describes how AD DS permissions work and how to delegate them.Chapter 10 Managing Active Directory Objects Most of your time
as an AD DS administrator will be spent managing AD DS objects like
users, groups and organizational units. This chapter deals with how
to manage these objects individually, but also provides details on
how to manage large numbers of these objects by using scripts. -
Introduction xxv Chapter 11 Introduction to Group Policy A
central component in a Windows Server 2008 network management
system is Group Policy. With Group Policy, you can manage many
desktop settings as well as configure security. This chapter begins
by explaining what Group Policy objects are and shows how to apply
and filter Group Policy objects.Chapter 12 Using Group Policy to Manage User Desktops One of the
important tasks you can perform with Group Policy is configuring
user desktops. In Windows Server 2008 and Windows Vista, there are
several thousand Group Policy settings avail-able. This chapter
describes not only how to apply the policies, but also which
policies are most important to apply.Chapter 13 Using Group Policy to Manage Security Another
important task that you can perform with Group Policy is applying
security settings. This includes settings that will be applied to
all users and computers in the domain as well as settings that can
be applied to individual computers or users. This chapter provides
the details on how to configure security by using Group Policy.Part IV Maintaining Windows Server 2008 Active Directory Chapter
14 Monitoring and Maintaining Active Directory This chapter
prepares youto maintain your Active Directory infrastructure after you
deploy it. This chapter covers how to monitor your AD DS
environment, and how to maintain the AD DS domain controllers.Chapter 15 Active Directory Disaster Recovery Because of the
central role that AD DS has in many corporations, it is critical
that you know how to prepare for and recover from disasters within
your AD DS environment. This chapter details how you can do
this.Part V Identity and Access Management with Active Directory
Chapter 16 Active Directory Lightweight Directory Services AD LDS
is one of thenew server roles that is included under the Active Directory
umbrella in Windows Server 2008. AD LDS is designed to be an
application directorythis chapter describes how you can deploy and
manage your AD LDS environment.Chapter 17 Active Directory Certificate Services AD CS can be
used to provide the public key infrastructure that provides digital
certificates that are so critical for many network security
implementations. This chapter describes how to plan and implement
AD CS.Chapter 18 Active Directory Rights Management Services AD RMS
provides the tools to apply persistent usage policies to
information that stays with the information even as it is moved
around or outside the organization. This chapter details how to
implement AD RMS. -
xxvi Introduction Chapter 19 Active Directory Federation
Services AD FS provides a means to enable users to access multiple
Web-based applications in their organization or in other
organi-zations while only authenticating once. This chapter
describes the AD FS deployment scenarios and how to implement
them.Document ConventionsThe following conventions are used in this
book to highlight special features and usage:Reader Aids
The following reader aids are used throughout this book to point
out useful details:Sidebars
The following sidebars are used throughout this book to provide
added insight, tips, and advice concerning Windows Server 2008
Active Directory:Reader Aid Meaning
Note Underscores the importance of a specific concept or
highlights a special case that might not apply to every
situationImportant Calls attention to essential information that should
not be disregardedCaution Warns you that failure to take or avoid a specified
action can cause serious problems for users, systems, data
integrity, and so onOn the CD Calls attention to a related script, tool, template,
or job aid on the companion CD that helps you perform a task
described in the textMore Info Points out Web sites or other related material that
you can access to get more details about a topic described in the
textSecurity Alert Emphasizes information or tasks that are
essential for maintaining a secure environment or identifies events
that indicate a potential security incidentSidebar Meaning
Direct from the Source Contributed by experts at Microsoft to
provide from-the-source insight into how Active Directory in
Windows Server 2008 works, best practices for planning and
implementing the Active Directory server roles, and troubleshooting
tipsDirect from the Field Contributed by directory service MVPs to
provide real-world insight into best practices for planning and
implementing the Active Directory server roles and troubleshooting
tipsHow It Works Provides unique glimpses of Windows Server 2008
Active Directory features and how they work -
Introduction xxvii
Command-Line ExamplesThe following style conventions are used in
documenting command-line examples through-out this book:Companion CDThe companion CD is a valuable addition to this
book. Many of the tools and resources mentioned in the chapters are
on the CD itself; you can access other tools and resources via
links from the CD.For documentation of the contents and structure of the companion
CD, see the Readme.txt file on the CD.Management Scripts
A set of scripts to manage Active Directory is included on the
CD. Among them are scripts to get information about Active
Directory objects and scripts to create or modify these objects.
These scripts all require Windows PowerShell. The following scripts
are included on the CD:AddUserToGroup.ps1 Adds a user account to a group in the same
OUCreateAndEnableUserFromCSV.ps1 Creates an enabled user account
by reading a .csv fileCreateGroup.ps1 Creates a group in Active Directory in the OU
and domain specifiedCreateObjectInAD.ps1 Creates an object in Active Directory
CreateOU.ps1 Creates an organizational unit in Active
DirectoryCreateUser.ps1 Creates a user account in Active Directory
EnableDisableUserSetPassword.ps1 Enables or disables a user
account and sets the passwordGetDomainPwdSettings.ps1 Obtains the password policy settings
for a domainGetModifiedDateFromAD.ps1 Lists the last modified date of a
specific user onto a local or remote domainStyle Meaning
Bold font Used to indicate user input (characters that you type
exactly as shown)Italic font Used to indicate variables for which you need to
supply a specific value (for example, filename can refer to any
valid file name)Monospace font Used for code samples and command-line output
%SystemRoot% Used for environment variables
-
xxviii Introduction ListUserLastLogon.ps1 Lists the last logon
date of a specific user onto a local or remote domainLocateDisabledUsers.ps1 Locates disabled user accounts in a
local or remote domainLocateLockedOutUsers.ps1 Locates locked out user accounts a
local or remote domainLocateOldComputersNotLogon.ps1 Locates computer accounts in a
local or remote domain that have not logged on for a specified
number of daysLocateOldUsersNotLogOn.ps1 Scans a local or remote domain for
user accounts that have not logged onto the domain for an extended
period of time that is specified in daysModifyUser.ps1 Modifies user attributes in Active Directory
QueryAD.ps1 Queries Active Directory for objects such as users,
groups, computers, and so onUnlockLockedOutUsers.ps1 Unlocks user accounts that are locked
outIn addition to these scripts, many of the chapters contain
references to additional scripts that perform the management tasks
included in that chapter.Full documentation of the contents and structure of the
companion CD can be found in the Readme.txt file on the CD.Using the Scripts
The companion CD includes scripts that are written in VBScript
(with a .vbs file extension) and Windows PowerShell (with a .ps1
file extension).The VBScript scripts on the companion CD are identified with the
.vbs extension. To use those scripts, double-click them or execute
them directly from a command prompt.The Windows PowerShell scripts require that you have Windows
PowerShell installed and that you have configured Windows
PowerShell to run unsigned scripts. You can run the Win-dows
PowerShell scripts on Windows XP SP2, Windows Server 2003 SP1,
Windows Vista, or Windows Server 2008. In order for the scripts to
work, all computers must be members of a Windows Server 2008
domain.Note For information about the system requirements for running
the scripts on the CD, see the System Requirements page at the end
of the book.Find Additional Content OnlineAs new or updated material becomes
available that complements your book, it will be posted online on
the Microsoft Press Online Windows Server and Client Web site.
Based on the final build of Windows Server 2008, the type of
material you might find includes updates to book -
Introduction xxixcontent, articles, links to companion content,
errata, sample chapters, and more. This Web site will be available
soon at
http://www.microsoft.com/learning/books/online/serverclient, and
will be updated periodically.Resource Kit Support PolicyEvery effort has been made to ensure
the accuracy of this book and the companion CD content. Microsoft
Press provides corrections to this book through the Web at the
following location:http://www.microsoft.com/learning/support/search.asp.
If you have comments, questions, or ideas regarding the book or
companion CD content, or if you have questions that are not
answered by querying the Knowledge Base, please send them to
Microsoft Press by using either of the following methods:E-mail:
[email protected]
Postal Mail:
Microsoft Press
Attn: Windows Server 2008 Active Directory Resource Kit
One Microsoft Way
Redmond, WA 98052-6399
Please note that product support is not offered through the
preceding mail addresses. For product support information, please
visit the Microsoft Product Support Web site at the following
address:http://support.microsoft.com
Digital Content for Digital Book Readers: If you bought a
digital-only edition of this book, you can enjoy select content
from the print editions companion CD. Visit
http://go.microsoft.com/fwlink/?LinkId=109208 to get your
downloadable content. This content is always up-to-date and
available to all readers. -
Part IWindows Server 2008 Active Directory Overview
In this part:
Chapter 1: Whats New in Active Directory for Windows Server
2008. . . .3Chapter 2: Active Directory Domain Services Components . . . . .
. . . . . . .19Chapter 3: Active Directory Domain Services and Domain Name
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .63Chapter 4: Active Directory Domain Services Replication . . . .
. . . . . . . . .95 -
Chapter 1
Whats New in Active Directory for Windows Server 2008
In this chapter:
Whats New in Active Directory Domain Services . . . . . . . . .
. . . . . . . . . . . . . . . . . . 3Additional Active Directory Service Roles . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . 11Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18Whats New in Active Directory Domain ServicesAlthough much of
what you will need to know in order to manage an Active Directory
domain remains the same from previous versions of the directory
service implementation, such as Windows 2000 and Windows Server
2003, several new and compelling features will offer the
administrator greater control and security over the domain
environment. This chapter will review six enhancements to the
Active Directory Domain Service (AD DS), as well as four new roles
that Active Directory can and will play in your enterprise.Read-Only Domain Controllers (RODC)
One of the new features in Windows Server 2008 is the option to
deploy a read-only domain controller (RODC). This new type of
domain controller, as its name implies, hosts read-only partitions
of the Active Directory database.An RODC makes it possible for organizations to easily deploy a
domain controller in scenarios where physical security cannot be
guaranteed, such as branch office locations, or in scenarios where
local storage of all domain passwords is considered a primary
threat, such as in an application-facing role, or when used in
conjunction with the Windows 2008 Server Core installation
option.Organizations that can guarantee the physical security of a
branch domain controller might also deploy an RODC because of its
reduced management requirements that are provided by such features
as Administrator Role Separation.Because RODC administration can be delegated to a domain user or
security group, an RODC is well suited for a site that should not
have a user who is a member of the Domain Admins group. RODCs have
the following characteristics.3 -
4 Part I: Windows Server 2008 Active Directory OverviewRead-Only
AD DS DatabaseExcept for account passwords, an RODC holds most of the Active
Directory objects and attributes that a writable domain controller
holds. However, changes cannot be made to the database that is
stored on the RODC. Changes must be made on a writable domain
controller and then replicated back to the RODC.Local applications that request Read access to the directory can
obtain access. Lightweight Directory Application Protocol (LDAP)
applications that request Write access receive an LDAP referral
response. This response directs them to a writable domain
controller, normally in a hub site.RODC Filtered Attribute Set
Only some attributes are replicated to the RODC. You can
dynamically configure a set of attributes, called the RODC filtered
attribute set, so that its attributes are not replicated to an
RODC. Attributes that are defined in the RODC filtered attribute
set are not allowed to replicate to any RODCs in the forest.A malicious user who compromises an RODC can attempt to
configure it in such a way that it tries to replicate attributes
that are defined in the RODC filtered attribute set. If the RODC
tries to replicate those attributes from a domain controller that
is running Windows Server 2008, the replication request is denied.
Therefore, as a security precaution, you should ensure that forest
functional level is Windows Server 2008 if you plan to configure
the RODC filtered attribute set. When the forest functional level
is Windows Server 2008, an RODC that is compromised cannot be
exploited in this manner because domain controllers that are
running Windows Server 2003 are not allowed in the forest.Unidirectional Replication
Because no changes are written directly to the RODC, no changes
originate at the RODC. Accordingly, writable domain controllers
that are replication partners do not have to pull changes from the
RODC. This means that any changes or corruption that a malicious
user might make at branch locations cannot replicate from the RODC
to the rest of the forest. This also reduces the workload of
bridgehead servers in the hub and the effort required to monitor
replication.RODC unidirectional replication applies to both AD DS and
Distributed File System (DFS) Replication. The RODC performs normal
inbound replication for AD DS and DFS Replication changes.Credential Caching
Credential caching is the storage of user or computer
credentials, including the user password expressed as a number of
hashed values. By default, an RODC does not store user or -
Chapter 1: Whats New in Active Directory for Windows Server 2008
5computer credentials. The exceptions are the computer account of
the RODC and a special (and unique) krbtgt account that each RODC
has.You can configure credential caching on the RODC by modifying
the Password Replication Policy for the specific domain controller.
For example, if you want the RODC to cache the credentials for all
users in the branch office who routinely log on in the office
location, you can add all user accounts for users in the branch
office to the Password Replication Policy. In this way, users will
be able to log on to the domain controller even if the wide area
network (WAN) connection to a writable domain controller is
unavailable. Likewise, you can add all of the branch office
computer accounts, so that these accounts can authenticate to the
RODC even when the WAN link is down. In both of the previous
scenarios, the WAN connection to a writable domain controller must
be available during the first logon for the credentials to be
cached to the RODC.Administrator Role Separation
You can delegate local administrative permissions for an RODC to
any domain user without granting that user any user rights for the
domain or other domain controllers. This permits a local branch
user to log on to an RODC and perform maintenance work on the
server, such as upgrading a driver. However, the branch user cannot
log on to any other domain controller or perform any other
administrative task in the domain. In this way, the ability to
effectively manage the RODC in a branch office can be delegated to
a branch user without compromising the security of the rest of the
domain.Read-Only DNS
You can install the DNS Server service on an RODC. An RODC is
able to replicate all applica-tion directory partitions that DNS
uses, including ForestDNSZones and DomainDNSZones. If the DNS
server is installed on an RODC, clients can query it for name
resolution as they query any other DNS server.However, the DNS server on an RODC does not support client
updates directly. Conse-quently, the RODC does not register name
server (NS) resource records for a
Get the definitive, in-depth resource for designing, deploying, and maintaining Windows Server 2008 Active Directory in an enterprise environment. Written by experts on directory services and the Active Directory team at Microsoft, this technical resource is packed with concrete, real-world design and implementation guidance. You’ll get in-depth guidance on installation, Active Directory components, replication, security, administration, and more. You also get answers to common questions from network architects, engineers, and administrators about Windows Server 2008 Active Directory—plus scripts, utilities, job aids, and a fully searchable eBook on CD.
A Note Regarding the CD or DVD
The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O’Reilly Media’s Digital Distribution services. To download this content, please visit O’Reilly’s web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.