Top Banner
Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries
37

Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Dec 30, 2015

Download

Documents

Mavis Craig
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Active Directory Boundaries - Purpose

Replication Boundaries

Security Boundaries

Page 2: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Active Directory Boundaries - Types

Geographic vs Organizational

Contiguous vs Discontigous namespace

i.e. oldcompany1.newcompany.com and oldcompany2.newcompany.com are 2 contiguous namespaces

Page 3: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Prestaging

forestprep and domainprep

Removal

Page 4: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Removing Domains or Trees

ADMT pruning/grafting

ADMTv3.1

Page 5: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Functional Levels

Viewing

Raising

Interoperability

UPN – User Principal Name

Page 6: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.
Page 7: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Simplifying Logon

Each userHas a unique down-level logon name

Can have multiple friendly UPN's

Page 8: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Trust Basics

Trusts allow communication between the boundaries of domains and forests

1 way Trust

2 way Trust

Page 9: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Transitive Trusts

Extend permissions across multiple domains

Automatically created as new domain joins a tree or new child is created

Page 10: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.
Page 11: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Forest Trusts

Forest wide

Selective authentication

Page 12: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

External Trusts

Non-Transitive

NT4.0 or Kerebos compatible

Page 13: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Shortcut Trust

Transitive

Speeds up authentication and authorization

Page 14: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Identity

Security Identification (SID) filtering

Page 15: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Create Sites

Balance service delivered to all locations.

Inventory the number of users at each site

Inventory the types of WAN links

Page 16: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.
Page 17: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Create AD Subnets

Associate subnets with the site location that has the closest DC

Page 18: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Configure Site Links

Site Links = WAN links

Star vs Mesh

Page 19: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Associating Link Costs

Cost = Speed/Availability of WAN

Page 20: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.
Page 21: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Configure Infrastructure

Manually link Operational Masters with their backup servers

Page 22: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Global Catalog Servers

Deploy Global Catalog servers at each site when possible

Page 23: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Replication

Each domain can have its own replication topology and schedule

Different events have different priorities to trigger replication

Page 24: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

DFS

DFS – Distributed File System

Method for synchronizing shared folders

Page 25: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

DFS

DFS – Distributed File System

Method for synchronizing shared folders

Conflict and Deleted folder

Good for application distribution or other read-only data

Page 26: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Replication - Automatic

Knowledge Consistency Checker (KCC)

Bridgehead Server

Intersite Topology Generator

Page 27: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Replication - Automatic

Knowledge Consistency Checker (KCC)

Bridgehead Server

Intersite Topology Generator

Scheduling

IP and SMTP protocols

Page 28: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Replication - Manual

Designate a specific bridgehead server

Make a one way replication partnership

Manually force replication after making changes to AD

Page 29: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Global Catalog Server

DC that contains information about other Domains

Page 30: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Promotion

Use the AD snap-in Sites and Services

Partial Attribute Set

Page 31: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.
Page 32: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Alternate Methods

UGMC – Universal Group Membership Caching

Page 33: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Domain Operations Masters

PDC emulator

Relative ID (RID)

Infrastructure

Page 34: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Forest Operations Masters

Schema Master

Domain Naming

Page 35: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Operations Master

Seize vs Transfer

Backup

Placement

Page 36: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.
Page 37: Active Directory Boundaries - Purpose Replication Boundaries Security Boundaries.

Schema Master

Schema can be extended with various tools

Placement should be on a Global Catalog

Time Service is important for successful upgrades