4620-1 ch12.f.qc 10/28/99 12:04 PM Page 425 Chapter 12 Active Directory, Part II In This Chapter Actively managing the Active Directory Understanding the difference between Active Directory planning and practical uses of Active Directory Optimizing organizational units in Active Directory Configuring and delegating OU permissions in Active Directory Adding and moving common Active Directory objects including users, groups, and computers Understanding Active Directory site and domain management B elieve it or not, you’ve already been working with Active Directory! If you’ve followed many of my examples and steps since the beginning of the book, you’ve installed a domain controller, and thus you have installed Active Directory (see Chapter 2). If you’ve added users, as discussed in Chapter 9, then you have used Active Directory to accomplish a task. I share this with you so that you can minimize if not eliminate any Active Directory anxiety you’ve built up. This chapter is the “yang” to the “yin” of the last chapter. Whereas the last chapter was planning-centric, this chapter focuses on the practical and pragmatic aspects of Active Directory. It’s hands-on, so let’s get going. Optimizing Organizational Units I’ve come to believe the organizational units (OUs) are where the MCSEs and MBAs can find common ground. I talked about this coming together of business and technical perspectives in the last chapter. In this chapter, we make it happen. Ideally, your Active Directory will be, first and foremost, pragmatic. I believe that the OUs can be designed with the underlying organization in mind, be it corporations, not-for-profit organizations, or government agencies. That is, OUs can be created for different functional areas of responsibility, such as marketing, manufacturing, and legal. Another possibility that works for many firms is to create OUs by geographic location: corporate headquarters, branch offices, project sites, and even vendor sites. 4620-1 ch12.f.qc 426 10/28/99 12:04 PM Page 426 Part IV: Active Directory and Security ■ ■ Of course, if you feel the world should be run by MCSEs, you might build a complex Active Directory based on subnets, hardware locations, and other technology-based dimensions. The choice is yours. You can create an Active Directory with a focus on business functions, technology resources, or a combination of the two. Remember that OUs may contain users, groups, and computer accounts. OUs are typically used to delegate administrative control. OUs are best deployed if they define administrative boundaries in your domain. To create an OU, follow these steps. STEPS: Creating an OU Step 1. Select Administrative Tools, Active Directory Users and Computers on the Start menu. The Active Directory Users and Computers MMC will appear. Step 2. Right-click the domain icon in the left pane. The secondary menu will be displayed. Step 3. Select New, Organizational Unit from the secondary menu. Step 4. The Create New Object - (Organizational Unit) dialog box will appear (see Figure 12-1). Name the OU. Step 5. Click OK. The OU will appear in the left pane of the Active Directory Users and Computers MMC (see Figure 12-2). Figure 12-1: Creating an OU 4620-1 ch12.f.qc 10/28/99 12:04 PM Page 427 Chapter 12: Active Directory, Part II 427 ■ ■ Figure 12-2: OU displayed in Active Directory Users and Computers MMC You may recall a secret near the end of Chapter 11 where I suggested you consider creating just one OU and putting everything in it, at least to start with. You would then critically evaluate the need for additional OUs on a case-by-case basis. But be advised that while this advice is valid, it clearly applies to small and medium-sized organizations, not full-scale enterprises. You want to be master of your own destiny with your Active Directory and create at least one OU right away. That’s because the built-in default containers shown in Active Directory Users and Computers are not very useful or practical. First, these containers are not true OUs. Second, you cannot create OUs within these default containers. Finally, you can’t apply group policy to these default containers. Take my advice and create your own OU or OUs as soon as possible. An OU inside an OU There are very important reasons to consider creating an OU within an OU. For example, this might make the best sense if you work in a decentralized or matrix organization. Another reason to have OUs within OUs would be a project management organization, where the embedded OU might be named after a project of limited scope and duration. To create an OU within an OU, follow these steps. 4620-1 ch12.f.qc 428 10/28/99 12:04 PM Page 428 Part IV: Active Directory and Security ■ ■ STEPS: Creating an OU within an OU Step 1. Select the OU in the left pane of the Active Directory Users and Computers MMC. Step 2. Right-click the OU that you selected. The secondary menu will appear. Step 3. Select New ➪ Organizational Unit from the secondary menu. Step 4. The Create New Object - (Organizational Unit) dialog box will appear. Enter the name of the OU in the Name field. Step 5. Click OK and observe that the new, embedded OU appears indented under the original OU (see Figure 12-3). Figure 12-3: OU within an OU OU permissions In order to create an OU within an OU (as you did when creating Northwest inside of Marketing in the previous example), you must have the following permissions in the parent container (for example, Marketing): 4620-1 ch12.f.qc 10/28/99 12:04 PM Page 429 Chapter 12: Active Directory, Part II 429 ■ ■ ■ Create Organizational Unit Objects ■ List Contents ■ Read The List Contents right isn’t truly necessary when creating an OU within an OU. However, if you don’t provide the List Contents correctly, you would not be able to see the embedded OU you just created. Not only is out of sight the same as out of mind, it’s also out of management (can’t be managed). To assign and modify Active Directory permissions, follow these steps. STEPS: Managing Active Directory permissions Step 1. In the Active Directory Users and Computers MMC, select View ➪ Advanced Features. Step 2. Right click an object (for example, the Marketing OU). Select Properties from the secondary menu. Step 3. Select the Security tab on the OU’s Properties sheet. Step 4. You may now grant or deny the Full Control, Read, Write, Create All Child Objects, and Delete All Child Objects permissions. Step 5. If you select the Advanced button, the Access Control Settings appear. You may set advanced permissions such as Special. The Access Control Settings dialog box displays permissions entries in the column-and-row format that many of us have been searching for. Many times, I have wanted to know who has access to what, and wanted the information presented in a columnar report-type format. The Access Control Settings dialog box does exactly that. Step 6. Click OK to return to the Active Directory Users and Computers MMC. You have now modified the permissions for an Active Directory object. On the Security tab of an OU’s properties sheet, you may select the Allow inheritable permissions from the parent to propagate to this object checkbox. Simply stated, this allows this OU to inherit rights from its parent. Likewise, on the Access Control Settings dialog box, selected via the Advanced button from the Security tab of an OU’s properties sheet, you can have the existing OU’s permissions propagate to any existing or future children. This is the last-will-and-testament option. To invoke this option, select the Allow inheritable permissions from the parent to propagate to this object checkbox. 4620-1 ch12.f.qc 430 10/28/99 12:04 PM Page 430 Part IV: Active Directory and Security ■ ■ And in all cases, there is no usurious inheritance tax. Delegating control Another cool Active Directory feature, viewed from the OU perspective, is that it allows you to delegate control of an OU to someone else. This is how you can create mini-administrator, a highly desirable new feature in Windows 2000 Server. The basic reason for delegating control is to make your life easier by having someone help you manage an OU. It is also easier to track permissions at the OU level. Follow these steps to delegate control. STEPS: Delegating control Step 1. Select an OU, right click and select Delegate Control from the secondary menu. The Delegation of Control Wizard will appear (see Figure 12-4). Figure 12-4: Delegation of Control Wizard Step 2. Click Next. The Users or Groups screen appears (see Figure 12-5). Select the group or user that you want to delegate control to via the Add button. Click Next. 4620-1 ch12.f.qc 10/28/99 12:04 PM Page 431 Chapter 12: Active Directory, Part II ■ 431 ■ Figure 12-5: Users or Groups Selection screen Step 3. Select the Tasks to Delegate from the list of common tasks or create a custom task to delegate (see Figure 12-6). Click Next. Figure 12-6: Tasks to delegate 4620-1 ch12.f.qc 432 10/28/99 12:04 PM Page 432 Part IV: Active Directory and Security ■ ■ Step 4. Click Finish at the Completing the Delegation of Control Wizard screen. You have now delegated the OU control you elected to delegate to a user or group. Another approach to delegating control is to create your own Microsoft Management Console (MMC) and then assign permissions that permit a delegate to use the custom MMC. For example, create an MMC with three or four of your favorite snap-ins. In Figure 12-7, I’ve created an MMC with the Computer Management, Event Viewer, Resource Kits, and Performance Logs and Alerts snap-ins. Figure 12-7: Custom MMC Next, select options from the Console menu. The Options dialog box will appear. Select the Console tab and select User mode - full access (see Figure 12-8). Click OK. You have now delegated control to this MMC. Be sure to save your MMC when you exit. 4620-1 ch12.f.qc 10/28/99 12:04 PM Page 433 Chapter 12: Active Directory, Part II 433 ■ ■ Figure 12-8: Console mode You may now distribute this MMC to other users. By setting the MMC console to User mode, the other users may not modify this custom MMC, but rather they may use it to complete system management tasks. You may have noticed that the Console mode field had several selections: ■ Author mode: Allows access to all MMC functionality including adding, creating, and modifying the MMC. You may also navigate the entire MMC tree. ■ User mode - full access: Users have access to all MMC management functionality and the MMC tree. However, users cannot add or remove snap-ins or change console file options. The Save commands are disabled. ■ User mode - limited access, multiple window: This is a more restrictive setting. Users cannot modify the MMC, open new Windows, or see areas of the console tree that weren’t visible when the MMC was last saved. Multiple windows are allowed. ■ User mode: limited access, single window: Same as the multiple window option except that only a single window is displayed. Advanced features A little known secondary menu option, displayed when you right-click the domain object, is View ➪ Advanced Features. When selected, Advanced Features displays several more Active Directory components in the MMC, as seen in Figure 12-9. 4620-1 ch12.f.qc 434 10/28/99 12:04 PM Page 434 Part IV: Active Directory and Security ■ ■ Figure 12-9: Advanced Features For example, one of the objects displayed is LostAndFound. This object is the default container for orphaned objects. Orphaned objects are created when the relationship that ties these objects to other objects is somehow lost or broken. And to be brutally honest, orphaned objects can be created with no mistake on your part. Sometimes computers just hiccup or act in inexplicable ways. Creating Users, Groups, and Computers This section is actually a review for those of you who diligently read Chapter 9. Because of that, I’ll quickly review how you add users, groups, and computers. The first steps are the same. To create a user, group, or computer, simply right-click the domain or OU in the left pane of the Active Directory Users and Computers MMC. From the secondary menu, select New. You would then select User, Group, or Computer depending on the task you want to complete. If you select User, the Create New Object - (User) Wizard will be displayed (see Figure 12-10). Complete each screen to create the user. 4620-1 ch12.f.qc 10/28/99 12:04 PM Page 435 Chapter 12: Active Directory, Part II ■ 435 ■ Figure 12-10: Creating a user If you select Group, the Create New Object - (Group) Wizard appears (see Figure 12-11). Complete each field and click OK to create the group. Figure 12-11: Creating a group 4620-1 ch12.f.qc 436 10/28/99 12:04 PM Page 436 Part IV: Active Directory and Security ■ ■ If you select Computer, the Create New Object - (Computer) Wizard will be displayed (see Figure 12-12). Name the computer and click OK to create the computer. It is very important to select the Allow pre-Windows 2000 computers to use this account checkbox if you are creating a computer account for a Windows NT 4.0 Workstation machine (as an example). Figure 12-12: Creating a computer account You can also create custom objects such as figures. I’ve seen this done in Active Directory where an organization wanted to have a picture of a floor plan showing where each user was located. Good idea when conceived on the whiteboard during planning. Bad idea when fully implemented. Why? Because creating objects such as artwork and figures causes the Active Directory database to grow exponentially in size, resulting in poor performance. Moving Objects If you’ve followed the examples in both Chapter 9 and this chapter, you will notice that the user, group, and computer exist as objects just below the domain in the Active Directory. It would be better to move these to an OU. Be advised about the basic guidelines concerning moving objects such as users, groups, and computers. Object permissions move with the object, but inherited permissions do not move. 4620-1 ch12.f.qc 10/28/99 12:04 PM Page 437 Chapter 12: Active Directory, Part II 437 ■ ■ Follow these steps to move a user, group, and computer to the Marketing OU (again, assuming you’ve created that). STEPS: Moving a user, group and computer Step 1. Select the object you want to move. Right-click the object to display the secondary menu. In this example, I’ve selected Raymond MacMillan, a user. Step 2. Select Move. The Move dialog box appears. Step 3. Select the container that you want to move the object to. In this example, I’ve selected Marketing (see Figure 12-13). Figure 12-13: Move dialog box Step 4. Click OK. Step 5. The object, Raymond MacMillan, has moved to the Marketing OU (see Figure 12-14). Repeat steps 1 to 4 to move a computer or group. 4620-1 ch12.f.qc 438 10/28/99 12:04 PM Page 438 Part IV: Active Directory and Security ■ ■ Figure 12-14: Moving an object Active Directory Sites and Services The Active Directory Sites and Services MMC, launched from the Administrative Tools group, is used to manage the replication of critical Active Directory information, including network services, domain controller, and site information. A site is really just a collection of subnets. One rule of thumb has been that sites are LANs and separate sites represent a WAN. The replication process is managed via the Active Directory Sites and Services MMC (see Figure 12-15). A few facts about replication might be of interest to you. First, configuring replication often means you must choose between accurate data and high performance. If replications are performed frequently, the data contained at each domain controller will be as accurate as possible. That is a good thing. But this data accuracy comes at a price. This frequent replication pattern consumes network bandwidth. The trade-off is this: accurate data versus network traffic issues. When discussing one site, the originating domain controller with a delta change to its Active Directory database is responsible for notifying the replication partners about such changes. This occurs via a communication known as change notification. The replication partner, typically within five 4620-1 ch12.f.qc 10/28/99 12:04 PM Page 439 Chapter 12: Active Directory, Part II ■ 439 ■ minutes of receiving this message, pulls down the delta Active Directory changes. When discussing multiple sites, replication is scheduled manually. Once exception to this change notification process is that security-sensitive updates, defined as security-related attributes, are pulled down by the replication partner immediately. Replication pathways within a single site are created via the Knowledge Consistency Checker (KCC). KCC creates pathways that are feasible within three hops. New domain controllers, when added to the network, are automatically added to the replication pathway by KCC. Figure 12-15: Active Directory Sites and Services MMC All replication traffic, whether within one site or across multiple sites, use Remote Procedure Calls (RPC) as the underlying transport mechanism. With multiple site communications, Simple Mail Transport Protocol (SMTP) may also be used. The RPC communication process is shown in Figure 12-16. Remote Procedures Server Stub Server RPC Runtime Library Windows 2000 Server Domain Controller A Network Transport T Figure 12-16: The RPC communication process Windows 2000 Server Domain Controller B 4620-1 ch12.f.qc 10/28/99 12:05 PM Page 440 Because you are using RPCs in your site replication, you will need to use the RPING utility from Microsoft Exchange to assist in troubleshooting replication problems. RPING is discussed in Chapter 20. Active Directory Domains and Trusts The Active Directory Domains and Trusts MMC (see Figure 12-17) is launched from the Administrative Tools program groups. Its main function is to manage domain trusts and user principal name suffixes and change the domain mode. Domains are administrative units typically created to assist you in organizing and managing your network resources. Trusts create secure pathways between domains. Specifically, you may use Active Directory Domains and Trusts to ■ Support mixed mode domain operations in mixed Windows 2000 and Windows NT domain environments ■ Configure operations to run in strict Windows 2000 native mode ■ Add/remove domain names ■ Change the domain controller that holds the domain naming operations master role ■ Create and modify domain trusts ■ Gather and observe information about domain management Figure 12-17: Active Directory Domains and Trusts 4620-1 ch12.f.qc 10/28/99 12:05 PM Page 441 Chapter 12: Active Directory, Part II ■ 441 ■ Summary This chapter brought a discussed the practical aspects of Active Directory. Implementing Active Directory in your organization Creating and moving objects in Active Directory Understanding which Active Directory MMC to use under what circumstances Delegating OU permissions in Active Directory Understanding Active Directory site and domain management 4620-1 ch12.f.qc 10/28/99 12:05 PM Page 442