Uploaded by padavala naveen kumar

mcsx

advertisement
Active Directory Domain Services
Active Directory Users and Computers
Active Directory Domain and trusts
Active Directory sites and services
Active Directory PowerShell Module
Additional command line tools and snap-ins
1. Active Directory Domains and Trust:a. Implementing Trusts
b. Raising Domain/forest function levels
c. Adding user login suffix
2. Active Directory Sites and Services:1. Configuring Intersite/Intrasite replication
2.Configuring Global Catalog
3.Creation of sites and site links
4. Scheduling replication
3. Active Directory Users and computers
1.Managing users
2.
3.
4.
5.
Managing group policies(Domain Level)
Managing computes
Managing Operation Master
Raising Domain function level.
4. Domain Controller Security Policies:1.Set account, audit and password policies
2.Set User rights
3.Permissions or Policies pretrains to the DC only
5. Domain Security Policy:1. Ser user account, audit and password policies
2. Ser user rights.
3.Permissions or Policies pretrains to the DC only
KCC:- Knowledge Consistency Checker- it is AD service which is responsible for intimating or updating
the changes made on DC or ADC.
Active Directory saved under C:\windows\NTDS\ntds.dit
NTDS.DIT --New Technology Directory Services. Dictionary Information Tree.
It is a file logically divided into Four partitions
1. Schema partition
2. Application Partition
3. Domain Partition
4. Configuration partition
Trust Relationship: Trust is a process of enabling resources of one domain to be
accessed by another domain.
Flexible Single Master Operation ROLES:There are 5 FSMO roles.
Forest level Roles:


Schema Master
Domain naming Master
Domain level Roles: PDC emulator
 RID master
 Infrastructure Master
Flexible means we can transfer
Roles from one DC to another DC
Schema Master:- (Keep tracking and identifies various components of Active Directory.
It is responsible for overall management of entire schema in the forest.
The Fist DC installed acts as schema master for entire forest.
There can be only one Schema master in one Forest.
How to move the Schema Master: Run Cmd in admin mode on your new server
 Type regsev32 schmmgmt.dll and hit enter.

Close command prompt.
Add active Directory Schema from MMC console:1. Open a MMC console on your new Windows Server 2012 R2 computer.
2. Click File > Add/Remove Snap-in...
In the Add or Remove Snap-ins window, select Active Directory
Schema and click the Add > button
Change the Schema Master:3. In the same MMC console, right click Active Directory Schema and select Change
4.
5.
6.
7.
8.
9.
10.
11.
Active Directory Domain Controller... in the sub menu.
In the Change Directory Server window, select This Domain Controller or AD LDS
instance.
Select your new 2012 R2 Windows Server.
Click OK to continue.
A warning will appear stating that the Active Directory Schema snap-in in not
connected. Click OK to continue.
Hover over the Active Directory Schema folder in the folder tree to ensure the new
Windows Server 2012 R2 computer is shown.
Now right click Active Directory Schema and select Operations Master... in the sub
menu.
In the Change Schema Master window, click Change to transfer the schema master
role to the 2012 R2 Windows Server.
When asked if you are sure you wish to transfer the schema master role to a different
computer, click Yes.
Once the schema master is successfully transferred, click OK to continue.
Click Close to close the Change Schema Master window.
In the MMC, click File > Exit.
12.
13.
14.
15. When asked to save the console, click No.
Once completed, open the Active Directory Users and Computers console to verify that
the Active Directory database successfully replicated to your new Windows Server 2012
R2 computer. Be aware that the database replication may take some time depending on
the number of objects in Active Directory.
Schema Master:- (Keep tracking and identifies various components of Active Directory.
It is responsible for overall management of entire schema in the forest.
The Fist DC installed acts as schema master for entire forest.
There can be only one Schema master in one Forest.
How to move the Schema Master: Run Cmd in admin mode on your new server
 Type regsev32 schmmgmt.dll and hit enter.

Close command prompt.
Add active Directory Schema from MMC console:-
1. Open a MMC console on your new Windows Server 2012 R2 computer.
2. Click File > Add/Remove Snap-in...
In the Add or Remove Snap-ins window, select Active Directory
Schema and click the Add > button
Change the Schema Master:3. In the same MMC console, right click Active Directory Schema and select Change
4.
5.
6.
7.
8.
9.
10.
11.
Active Directory Domain Controller... in the sub menu.
In the Change Directory Server window, select This Domain Controller or AD LDS
instance.
Select your new 2012 R2 Windows Server.
Click OK to continue.
A warning will appear stating that the Active Directory Schema snap-in in not
connected. Click OK to continue.
Hover over the Active Directory Schema folder in the folder tree to ensure the new
Windows Server 2012 R2 computer is shown.
Now right click Active Directory Schema and select Operations Master... in the sub
menu.
In the Change Schema Master window, click Change to transfer the schema master
role to the 2012 R2 Windows Server.
When asked if you are sure you wish to transfer the schema master role to a different
computer, click Yes.
Once the schema master is successfully transferred, click OK to continue.
Click Close to close the Change Schema Master window.
In the MMC, click File > Exit.
12.
13.
14.
15. When asked to save the console, click No.
Once completed, open the Active Directory Users and Computers console to verify that
the Active Directory database successfully replicated to your new Windows Server 2012
R2 computer. Be aware that the database replication may take some time depending on
the number of objects in Active Directory.
Global Catalog
It is a service, responsible for maintain information about objects and serving request made by the users
and providing the location of objects
Global catalog runs on the port no.3268
All types of queries are first heard on this port number and forward query to port no.389.
Maintain the complete information of objects within same domain and partial information of other
domains.
Global Catalog communicates to Infrastructure Master
If DC and ADC are located in the same location then one GC enough
If DC and ADC are located remotely, we must configure ADC as GC to avoid traffic.
Infrastructure master contacts the GC for obtaining updates about the users and group membership and
universal group membership
Primary Function:- To maintain the global group membership information, easily locate the objects in
AD.
Shared folders with security Groups
Create a User Ex:- Naveen
Create a security groups with Global scope Ex:- Helpdesk docs
Add the user to security group
Create another security group with domain-level Ex:- helpdesk docs_folder
Add security group to Domain level group
Create a folder and enable the share
Add the domain level security group to shared folder.
Then login as a user and try to access folder.
Profiles are used to provide the basic environments to user.
Basic Environment:1. Desktop Settings
2. Startup applications
3. Network conenctions
Profiles are3 types:1. Local profile
2. Roaming Profile
3. Mandatory Profile
Local profile:- It is a profile created for user and saved in local hard drive when user works
Profile will be saved when user logoff.
Local profile are limited to that machine only when they saved
A user with local profile will not be loaded with a network profile on another machine.
Roaming Profile:- It is a profile which is saved on shared folder on a server.
Hence available on entire network
So when a user login with his account his roaming profile will be loaded.
Creating a Roaming Profile:-
Creating a roaming profile:
On DC
Create a user A/C
Create a folder
And share it and give full control permission for everyone
Start >P>ADUC
Double click the user
Profile
Profile path ex: \\sys1\profile\username
Apply – ok
Move on to member server
Log in as user
My computer
Properties
Advanced-profile settings-you should notice “roaming profile”.
Mandatory Profile:- it is profile used to control the desktop environment settings. Especially, restricted
the users from saving the user data settings, configuration on desktop.
It is a type of Roaming profile but settings are not saved when a user logs off. Changes will be available
only for the session where user is active.
Creating a mandatory profile:
Open the profiles folder you’ve created for roaming
There will be a user folder
Take the ownership of the folder of the user
Right click on the folder properties
Security – ok – advanced
Owner – administrators
Replace owner on sub >apply – ok
Open the folder
Rename the file
Ntuser.dat to ntuser.man
Back
Give back the permission (ownership)
Folder
Properties
Security – advanced
Check the box Allow inheritable
Check - Replace permission entries on all
Apply – ok
Verifying:
Move on to client machine
Login as user
Make some desktop changes
Create a folder or delete a folder
For removing mandatory profile just rename ntuser.man to ntuser.dat
Questions and ANS





What is an active directory:- Active Directory is a centralized database where it contains information
about users, groups, computer and ou and so on. It enables authentication and authorization for a
client in domain. It is used to manage centralized network.
In which location store active directory file? c:/Windows/NTDS/ntds.dit
What is the file name which Active Directory store? ntds.dit
Which protocol is used by active directory? LDAP(lightweight directory access protocol)
How many partitions in Active Directory?
Schema Partition
Configuration Partition
Domain partition
Application partition
 How to check FSMO roles in windows server?
Ans:- Netdom query or net domain query fsmo
 How many files are created in NTDS folder? Brief Describe
Ntds.dit- New technology directory service. Directory information tree
Edb.chk--- the checkpoint file
Edb.log the transaction files
Res1.log and Res2.log - Reserved Transaction logs
 What is a SYSVOL folder?
SysVol means system Volume. It contains all information and shared folder copy of domain and also
group Policy Security.
 What is the logical and physical structure of AD?
Logical Structure:- Domain, Tree, forests and OU
Physical Structure: Domain controller and site
 How to take a back of AD?
Ans:- System states where all the AD file and information store. Utility for back up ntbackup and
wbadmin
 What is stand of DC, CDC, ADC and RODC?
Ans:- Domain controller, Child domain controller, Additional domain controller and Read only domain
controller
 What is object and example of distinguished name?
Ans:- Objects are located within active directory domains according to hierarchical path, which includes
labels of the Active Directory domain name and each level of container objects. The full path to object is
defined by the distinguished name(also know as DN). The name of the object it self, separates from the
path to the object, is defined by the relative distinguished name.
example:- CN= Smith, OU=sales, dc=ABC, DC=com

What is OU?
OU stands for organization unit. It is a collection of users and groups and it gives platform to apply group
policy on users and groups.
 Why do we create OU?
It helps to manage user and group according to department and give us platform to implement group
policy according to department. It makes easy to find out user belong which department.
 What is domain?
Domain is collection of computer, user and group and so on in a network. These objects share a
common directory database, security policies and security relationships with other domains. After
installing Active directory domain service for using centralized security in a domain object .
 What is distinguish between domain and domain controller?
Ans:- Domain controller:- it is used to denote a computer within the domain that controls the rest
of the computers within domain. From the domain controller, a network administrator can access
network computers, create or delete accounts, or manage privileges and security.
 What is Forest?
Ans:- Forest is a collection of Tree in a domain that share a common global catalog, directory schema,
logical structure and directory configuration. At the top forest represents the security boundary within
user, group and other objects are accessible.
 What is a Tree?
Ans:- Tree is a collection of domains which use contiguous name hierarchical in Domain(such as
abc.com>it.abc.com> south.it.abc.com)
 What is different between Role transfer and Seizing?
Ans:- When primary domain controller is going into maintain task and another servicing then FSMO role
transfer task perform with DC to ADC.
Whereas DC dead and it's not usable for future In that case Seize task perform on ADC to become DC.
 How to recover deleted AD users?
Ans:- 2012:- open Run and type dsac.exe then active directory administrative center appear. Click on
domain (abs.com) and click on OU you see the deleted users then recover it
2008:- LDAP is used to restore deleted users.
GPO :We can create a GPO under group policy objects and drag them to respective OU or right click on OU
select create new GPO or link existing group policy
How to stop domain policy to particular single OU:Right click on OU and select block inheritance or right click on OU and create new GPO to allow make
changes.
If we enable the enforcement on GPO, remaining polices are not applicable.
After enabled enforcement, GP applies only users which are added at security filtering.
How to deny the GPO for particular users
Create a security group
Add the users to in Member tab
Go to GPO
Select GP
Go to delegation tab
Click on advanced
Add group to there
And select DENY at apply group policy
How to turn of the windows side bar:Go to GPO
Create a new group policy
Right click and edit
Go to computer configuration
Windows componenets
Windows side bar
Enable the windows side bar
Loop back mode
1. Merge mode
2. Replace mode
Merge Mode:Computer configuration
User configuration
Comptuer's user configuration
Replace Mode:Computer Configuration
Computer's user configuration
How to enable Loopback:Edit GPO
Computer Configuration
Policies
Administrative Template
System
Group policy
User group Policy loopback processing Mode
Enable it
Select the mode either Merge or replace
Deploying Applications to the desktop
Assigning software:1. You can assign a program distribution to users or computers
2. If you assign a program to a user, it is installed when the user logs on to the computer. When the
user first runs the program, the installation is completed.
3. If you assign a program to a computer, it is installed when the computer starts, it is available to all
users who log on to the computer. When a user first runs the program , the installation is
completed.
Publishing Software:1. You can publish a program to users
2. When the user logs on to computer, the published program is displayed in the Add/remove
programs dialog box and it can be installed from there.
Active Directory- is a centralized database where it contains the information about objects like users,
groups, printers and computer, etc.,
Dc - A server where AD installed is called DC(Domain Controller)
Functions of AD:- Its provide single point administration means manage, organize and control
resources.
Purpose of AD:- 1. Provide User logon authentication services.
2. To organize, manage and control user accounts, groups, computers and network resources.
3. Enables authorized users to easily access network resources.
Features of AD:Fully integrated security system with help of Kerberos.
Flexible(install/uninstall)
Scalable to any size network
Extensible (modify schema)
Easy administration with group policy.
New Features:

Data Duplications - makes it possible to store more file data in less space on the volume.
Software Inventory Logging - collects licensing data about software installed on a Windows Server,
and provides remote access to the data so it can be aggregated easily by a datacenter.
 Windows PowerShell- Windows powerShell is a tasked based command line shell scripting.
Power shell version V4.
Evolution of LDAP:
Earlier we had no database standard. ITU & OSI introduced X-500 approved in 1988.
LDAP:- light Weight Directory access protocol. Is used for querying and providing communications
among the object in AD.
Port No:- 389
ADC- Additional Domain Controller(it is a backup server of main DC and it's READ ONLY)
We must specify prefer DNS as server ip
Run DC promo> next> next> select ADC for an existing server
Enter Admin user's password
Enter Domain name of DC
Browse the Domain
Next>next Restore Password.
 ADC is a backup copy of AD. Which will be in the READ ONLY format
 ADC provides fault Tolerance and load balancing.
 There can be no.of ADC for a DC.
 ADC should be maintained and placed at offsite away from the DC.
 ADC maintains same domain name.
VERYFING WHETHER IT IS A DC OR ADC:Open cmd and run as an administrator
Type net accounts
 For DC we will find PRIMARY
 For ADS we will find BACKUP
Active Directory Components:Logical components:Domain:- Domain is a server where AD
installed
Trees:- is a group of domains which shares contiguous name space. If more than one domain exists we
can combine multiple domains into hierarchical tree structure. The first created domain is the root
domain of First Tree, Additional are child domains. A domain immedaitely above the another domain in
the same tree is called Parent domain
Forest:- is a multiple domain trees in a single forest do not form a contiguous name space because they
have non-contiguous name space. Trees in a forest do not share the domain name space.
The forest which doesn't have a single root domain is called forest root domain.
Two forest wide predefined groups are - Enterprise Administrators and Schema Administrators reside in
the domain.
Organization Units:- It is a container that can be used to group most other object classes together for
administrative purpose.
Technically. The object class of choice for building these hierarchies is the class organizational Unit.
PHYSICAL COMPONENTS:Site:- Site is a combination of TCP/IP, subnets, connected with highspeed links. Sites provide
replications
They are:

Intra-site Replication:- It is a replication within the same site. It offers full time replication between
DC and ADC when they are within the same site.
 Inter-site Replication:- It is a replication between two different sites. It is implemented when site are
away from each other.
It requires a site link. Site link is a logical connection b/w sites, which can be created or scheduled.
Site link offers communication only at schedule intervals.
Download