Unlicensed-196-200_7-PDF_Windows Server 2008 R2 Unleashed

advertisement
Best Practices
173
the changes and automatically reboot. You then must establish a method of rebooting all
member servers, workstations, and other client machines and then reboot them all a
second time to ensure that all services receive the domain-naming change.
Step 6: Post-Rename Tasks
The final step in the Rendom task is to run the rendom /clean operation, which will
remove temporary files created on the domain controller and return the domain to a
normal operating state.
In addition to the cleanup tasks, you need to effectively rename each domain controller,
to change its primary DNS suffix. Each domain controller needs to go through this operation, which you run via the netdom command-line utility. The following steps outline the
renaming of a domain controller:
1. Open a Command Prompt window (choose Start, Run, and then type cmd.exe).
2. Type netdom computername OldServerName /add:NewServerName.
3. Type netdom computername OldServerName /makeprimary:NewServerName.
5. Type netdom computername NewServerName /remove:OldServerName.
You run all the preceding commands from the command line. Replace the generic designators OldServerName and NewServerName with the entire DNS name of the old server
and the new server, such as server1.companyabc.com and server1.companyxyz.com.
Summary
With the advent of technologies such as domain rename, fine-grained password policies,
and cross-forest trusts, mistakes in AD DS design have become more forgiving than they
were in the past. However, it is still important to thoroughly examine the political and
technical aspects of any organization to design an infrastructure that aligns with its needs.
AD DS is very flexible in these regards and can be matched with the needs of almost any
organization.
Best Practices
The following are best practices from this chapter:
 Fully understand the structure of AD DS before designing.
 Implement fine-grained password policies and the Active Directory Recycle Bin to
reduce the need for additional domains.
 Secure any external namespace chosen by registering it so that it cannot be used
anywhere on the Internet.
5
4. Restart the server.
174
CHAPTER 5
Designing a Windows Server 2008 R2 Active Directory
 Start a domain design by considering the single domain model first.
 Consider using multiple domains for specific reasons only.
 Consider using the federated forest design model when uniting two disparate AD DS
structures.
 Control and optimize replication traffic by using sites.
 Upgrade any down-level clients to reduce administration and maintenance.
 Use domain rename sparingly, and only when faced with no other alternative.
CHAPTER
6
Designing
Organizational Unit and
Group Structure
The organization of users, computers, and other objects
within the Windows Server 2008 R2 Active Directory
Domain Services (AD DS) structure gives administrators
great flexibility and control over their environments. Both
organizational unit (OU) and group structure design can be
tailored to fit virtually any business need. There is, however,
a great bit of confusion among administrators in the design
and use of OUs and groups. Often, OUs are indiscriminately
used without reason, and group structure is ineffectual and
confusing. With the proper preparation and advance knowledge of their use, however, a functional OU and group
design can do wonders to simplify a Windows Server 2008
R2 AD DS environment.
In addition to the lessons learned from OU and group use
in Windows 2000 Server and Windows Server 2003,
Windows Server 2008 R2 introduced functionality such as
the Active Directory Recycle Bin, which reduces the risk of
OU deletion, and Active Directory Web Services and an
Active Directory Module for Windows PowerShell, which
makes it easier to administer OUs. In addition, AD DS builds
upon the improvements to OU structure and design introduced with the release of Windows Server 2008, such as OU
Deletion Protection, universal group membership caching,
incremental group replication, and other enhancements
that have increased the flexibility of OU and group design
and have given administrators greater tools to work with.
This chapter defines organizational units and groups
within Windows Server 2008 R2’s AD DS and describes
methods of integrating them into various AD DS designs.
Specific step-by-step instructions and “best practice” design
IN THIS CHAPTER
 Defining Organizational Units in
AD DS
 Defining AD Groups
 Examining OU and Group Design
 Starting an OU Design
 Using OUs to Delegate
Administration
 Group Policies and OU Design
 Understanding Group Design
 Exploring Sample Design
Models
CHAPTER 6
176
Designing Organizational Unit and Group Structure
advice are given as well. In addition, functional OU and group design models are detailed
and compared.
Defining Organizational Units in AD DS
An organizational unit is an administrative-level container, depicted in Figure 6.1, that is
used to logically organize objects in AD DS. The concept of the organizational unit is
derived from the Lightweight Directory Access Protocol (LDAP) standard upon which AD DS
was built, although there are some conceptual differences between pure LDAP and AD DS.
Organizational Units
Los Angeles
Chicago
New York
FIGURE 6.1 Examining AD DS organizational unit structure.
Objects within Active Directory can be logically placed into OUs as defined by the administrator. Although all user objects are placed in the Users container by default and
computer objects are placed in the Computers container, they can be moved at any time.
NOTE
The default Users and Computers folders in AD DS are not technically organizational
units. Rather, they are technically defined as Container class objects. It is important
to understand this point because these Container class objects do not behave in the
same way as organizational units. To be able to properly utilize services such as
Group Policies, which depend on the functionality of OUs, it is recommended that you
move your user and computer objects from their default container locations into an
OU structure.
Each object in the AD DS structure can be referenced via LDAP queries that point to its
specific location in the OU structure. You will often see objects referenced in this format
when you’re writing scripts to modify or create users in AD DS or simply running LDAP
queries against AD DS. For example, in Figure 6.2, a user named Paul Cochrane in the SF
sub-OU of the Locations OU would be represented by the following LDAP string:
CN=Paul Cochrane,OU=SF,OU=Locations,DC=companyabc,DC=com
Defining Organizational Units in AD DS
177
companyabc.com
Locations
Syndey
London
Paul
Cochrane
SF
FIGURE 6.2 Viewing the LDAP structure of a user object in AD.
NOTE
The OU structure can be nested, or include sub-OUs that are many layers deep. Keep
OUs primarily satisfy the need to delegate administration to separate groups of administrators. Although there are other possibilities for the use of OUs, this type of administration
delegation is, in reality, the primary factor that exists for the creation of OUs in an AD
environment. See the “Starting an OU Design” section of this chapter for more details on
this concept.
THE NEED FOR ORGANIZATIONAL UNITS
Although there is a tendency to use organizational units to structure the design of AD
DS, OUs should not be created to just document the organizational chart of the
company. The fact that the organization has a Sales department, a Manufacturing
department, and a Marketing department doesn’t suggest that there should be these
three AD DS OUs. An administrator should create OUs if the departments will be
administered separately and/or policies will be applied differently to the various departments. However, if the departments will all be administered by the same IT team, and
the policies being applied will also be the same, having multiple OUs is not necessary.
Additionally, OUs are not exposed to the directory, meaning that if a user wants to send
an email to the members of an OU, he would not see the OU structure nor the
members in the OU grouping.
6
in mind, however, that the more complex the OU structure, the more difficult it becomes
to administer and the more time consuming directory queries become. Microsoft recommends not nesting more than 10 layers deep. However, it would be wise to keep the
complexity significantly shorter than that number to maintain the responsiveness of
directory queries.
Download