Managing Workstations In an Active Directory Environment at PCC
|
|
|
- Elvin Rodney Caldwell
- 10 years ago
- Views:
Transcription
1 Managing Workstations In an Active Directory Environment at PCC This document provides information about the implications of implementing Active Directory (AD) on the workstation management functions within TSS. The focus of this information is on the end-user impact as well as the impact to TSS staff responsible for managing workstations. This is not a technical document or a list of project requirements. Instead, it is a visioning tool to illustrate how things will be different when AD is implemented and the various transitions that we will need to manage throughout the process. Most of the information presented here was collected from other higher education institutions that have already implemented AD. Managing Workstations in an AD Environment 1 M. Heuer
2 Contents Overview... 3 User and Workstation Information Synthesized by AD... 4 Project Structure... 6 Active Directory Structure and Workstation Management... 7 Documentation for OUs and GPs... 9 Roles and Responsibilities Naming Standards and Governance Workstation Management Process Changes and New Functionality Changing Roles for TSS Staff Training Recommendations Managing Workstations in an AD Environment 2 M. Heuer
3 Overview PCC is currently working on an Active Directory implementation project. The AD project has a wide scope and several associated initiatives. This document specifically pertains to the workstation management piece of the overall AD program. It is also limited to PCC-owned workstations. AD will make it much easier for people to use their own personal computer on our network (domain) but those considerations are not addressed in this document. A subsequent effort will be launched to develop those requirements. This document also does not cover any of the setup of the data in AD. It assumes that accounts have already been provisioned and that appropriate privileges and system access capabilities have been assigned to users. There is also an assumption that integration processes have been established and the LDAP repository in AD is fully populated and accessible for workstation management purposes. There are several benefits typically associated with doing an AD project such as centralized management of devices, increased security and data protection, and efficient account management. The California Institute of Technology developed a definition of AD that works well for our environment. AD is a network directory that provides a single, logical and consistent database in which to store information about the network and all network-based resources. Perhaps the best way to articulate the benefit of using AD for workstation management is by looking at what we will be able to do when it is implemented. Benefit Statement With AD in place, we will be able to synthesize all of the information we have about the workstation with everything we know about the user. We can then use this set of information to provide the most appropriate system access, software, and services for the user. Managing Workstations in an AD Environment 3 M. Heuer
4 User and Workstation Information Synthesized by AD We currently have a lot of information about the workstations in our asset management system. This includes all relevant hardware and software data. Other current systems also have a lot of information about our users including their role, location, department/division, etc. One of our current limitations to efficient workstation management is that we do not have a single authoritative source for both the hardware and user information. Once AD is implemented we will no longer have this limitation. Here are a couple of examples of using user and machine information together to more effectively manage workstations. Example 1: We currently use Go-Print to charge students for printing in the CRC. However, Go-Print is attached to the workstation regardless of the user role. If a staff member logs onto a CRC workstation and tries to print a document then they will be presented with the Go-Print charge screen. When AD is implemented, an associated policy will be in place to identify the user as either a student or staff member. When a print request is made from that same CRC workstation, AD will administer the policy requiring payment for printing to the student but not the staff member even though they use the same workstation. Example 2: We currently maintain a local administrator account on each workstation for maintenance and support. It is typical that a single shared password is used for that local administrator account on numerous workstations. Technicians rely on that account being the same on different computers they manage in order to automate workstation management tasks from all our existing workstation management tools (KBOX, Ghost, Deep Freeze, Sophos). In order to make and keep that account the same they must rely on manual configuration or workstation imaging and there is no telling which technician has done what on any given workstation using that account. When AD is implemented there will be no need to synchronize local administrator accounts technicians will manage workstations with their own uniquely assigned domain user accounts. This will not only eliminate the overhead of managing local administrator accounts, but will also generate a centralized enterprise-wide audit trail of workstation administration actions that will enhance support team communications and information security. Example 3: Currently users (student, staff, faculty, TSS Tech) log on to workstations with administrator accounts, with few exceptions. This is due to the need to permit users to customize their computing environment on workstations that know nothing of who they are or what they need. When AD is implemented we can configure workstations upon logon based on user roles, thereby eliminating the need for them to have administrator level access. The issue of legacy software that requires administrator access to run can be addressed using a combination of off-the-shelf software or software-as-a-service that identifies all such software on the network, and PCC s asset management system that can deploy software based on the AD role of the user logging in. Example 4: Every year we replace a large number of workstations for staff and faculty. It is a challenge to identify all of the workstations for a specific department/division and associate each workstation to the corresponding user. In the AD environment our workstation Managing Workstations in an AD Environment 4 M. Heuer
5 replacement planning will be greatly simplified. Consistent logon procedures will allow us to associate the user with the corresponding workstation. Departmental workstation replacement planning will be very straightforward because each department/division will already be set up in AD. A full set of use cases will be developed to cover TSS tech staff and user processing needs. These use cases will become the elements of the overall test plan. Several features can be utilized in AD that leverage the synthesis of user and workstation information. The Alabama Cooperative Extension System supported by Auburn University and Alabama A & M came up with a great list. 1. Authentication based on standard username (user information) Requiring username and password for login to any workstation Allowing users the flexibility of logging into any PCC machine securely Ability to restrict access to machines by certain users 2. Structured policy settings (rules) to be used for workstation management (workstation information) Automating Windows updates and other patches Setting and locking security configurations Making software available via "Add/Remove Programs" Automatically mapping network drives Providing granular management of sub-groups, such as labs and workgroups 3. Easier Printer Sharing. Printers appear automatically under "Printers and Faxes tab." Ability to print to any printer within the domain no matter the physical location These are just some of the benefits that we will realize under AD. The complete list of workstation management capabilities that AD will provide is extensive and will grow over time. Some of these capabilities will replace our existing processes and others will be new to us. Managing Workstations in an AD Environment 5 M. Heuer
6 Project Structure The project for managing workstations in an AD environment will be in four phases. Each phase is planned for 6 months. There will be a brief overlap of one month between phases to provide a smooth transition and continuity between phases. The phases are: 1) AD Technical Infrastructure Implementation, 2) AD Services and Features Configuration and Standards, 3) AD Workstation Management Pilot, 4) AD Workstation Management Production. A different team will lead each phase. Phase 1 is led by Server Administration. Phase 2 is led by Solution Services. Phase 3 is led by the Campus Teams. Phase 4 will be a rollout to non-tss staff for delegated workstation management tasks. Once in production, ongoing management and administration of the AD services and features will be done centrally by Solution Services. TSS Workstation Management in AD Project Phase Conceptual Overview Functionality 4. Workstation Management Prod 3. Workstation Management Pilot 2. Services / Features Config and Standards 1. Technical Infrastructure Implementation 2 year timeline 6 months per phase The Workstation Management in an AD Environment project is a sub-project of the overall AD initiative. This structure will require a high degree of coordination, communication, and collaboration with the other AD related projects. The overall project team will include all areas of TSS, vendors and consultants, users, and trainers. Managing Workstations in an AD Environment 6 M. Heuer
7 Active Directory Structure and Workstation Management There is a vast amount of documentation and literature related to AD. A brief explanation of the structure and architecture of AD is helpful in understanding the changes to workstation management that will occur. AD has a hierarchical structure. According to Wikipedia, The forest, tree, and domain are the logical divisions in an Active Directory network. Within each domain are Organizational Units (OU). Outside of the OU structure are Groups that contain a set of user accounts. Each group is controlled by one or more Group Policies (GPs). An example of the structure for a higher education institution was developed by UIC. In an AD environment, users are typically assigned to one or more groups. Rules controlling system access and privileges, GPs, are applied to groups as opposed to individual users. For example, a group policy could be established that requires user passwords to be changed every month. That group policy could then be assigned to all TSS Staff members. AD is a hierarchical system and GPs are applied in a hierarchical manner with higherlevel GPs overriding lower-level policy settings. The example of requiring TSS password changes every month can be used to illustrate the operation of the hierarchy of GPs. For example, a policy could be set at the campus level requiring passwords to be changed every 6 months for all staff members on the campus. The district-wide setting for monthly TSS password changes would override the local campus policy but only applied to TSS staff on that campus. For the most part, the Domain will contain a structure of OUs that will be pretty close to our existing Organizational Charts for Administrative Departments and Academic Programs. All users will be a member of one or more groups. The services, software, and access for the users will be controlled by rules setup in the group policies. The architecture for the Domain and OUs will likely be set by the larger AD project managed by Server Administration and verified by the Managing Workstations in an AD Environment 7 M. Heuer
8 Workstation Management in an AD Environment sub-project. This is a critical step in the project design phase and has to be vetted across all of the sub-projects and stakeholders. Documentation for the structure of our AD environment is an important deliverable from the early phases of the project. This will set the blueprint for service delivery, delegated authority, and policy implementation. A great model depicting the AD structure was produced by the team from The California Institute of Technology. Figure 2 - The hierarchical structure of Active Directory allows for easy delegation of authority, and application of administrative and security policies (Group Policies). This model depicts a single domain AD architecture. Although there is an ability to utilize a structure with multiple domains, this document uses the simple example of a single domain structure. Once the PCC structure is defined we can update the assumptions and modify the AD requirements for workstation management. The information technology team at Rutgers University has a good suggestion for technology teams. For other Microsoft recommendations on best practices and setting up AD, take a look at Best Practice Active Directory Design for Managing Windows Networks from Microsoft. Managing Workstations in an AD Environment 8 M. Heuer
9 Documentation for OUs and GPs The team responsible for workstation management will need to have a complete view into the OU and Group Policy information within AD. This is mentioned by the University of Memphis in their design. Group Policy is a capability available to AD administrators who need to control the client user experience based upon AD site, domain, OU or group affiliation. One of the benefits of AD is the ability to appropriately delegate OU and GP administration to TSS and non-tss staff. This will be beneficial to the workstation management teams and alleviate any reliance on the central AD support team. GP and OU changes are managed centrally and documented for reference by all stakeholders. The most important things for the workstation management team are: 1) to have a process for requesting GPs and a template for documenting the requirements needed in a GP, 2) a way to see all of the production GPs in place, 3) a way to see the OU structure, and 4) a process for being notified of changes to OUs. The need for access to the OU and GP information for the workstation management team is mentioned by Information Services and Technology team from MIT. GPs can be applied to either users or computers. GPs are applied hierarchically from the least restrictive group to the most restrictive group and are cumulative. GPs for both computer configuration settings and user configuration settings include software settings, Windows settings, and administrative templates. In order for the workstation management team to understand what is happening in a user session or predict what will happen, they will need full access to GP and OU documentation. Part of the overall AD project will fully define roles and responsibilities and document which team is ultimately responsible for creating, modifying, and deleting OUs and GPs. During the project implementation phase this will be done by Solution Services. Managing Workstations in an AD Environment 9 M. Heuer
10 Roles and Responsibilities Several teams will need to work together to manage the AD platform. Individual roles based on AD best practices will be defined within each of the teams. The technical infrastructure will be managed by Domain Administrators on the Server Administration team. The features and services as well as standards will be managed by System Administrators on the Solution Services team. The workstation management for departments and divisions will be done by Organizational Unit Administrators on the Campus Teams. Domain Administrators will have privileges for all of the roles. System Administrators will have privileges for feature and services management and also all of the authority of the Organizational Unit Administrators. The Organizational Unit Administrators will have privileges for their corresponding OU. OUs can be embedded in a hierarchy to allow for full functionality by TSS. An example is that an OU may be created for a campus, i.e. RC-OU for Rock Creek, and additional OUs for each department/division at Rock Creek, i.e. RC-MMT, RC-Library, RC-Pavtec. Administrator rights in the RC-OU would be granted to TSS Staff and would allow them to manage any of the embedded OUs. Local department administrators would only have access to their own OU. This structure will allow for centralized management of the overall AD platform by Server Administration and Solution Services and also autonomy on the Campus Teams for their own OUs. Managing Workstations in an AD Environment 10 M. Heuer
11 Naming Standards and Governance The best way to leverage all of the benefit available from the AD architecture is to embrace strict adherence to naming standards and procedures. Naming standards will be established for users, OUs, GPs, workstations, servers, groups, printers, etc. Solution Services will define and document these standards and provide training materials for TSS staff. It is a common best practice in AD environments to produce standard reports identifying components that do not comply with naming standards. These reports are distributed to TSS staff and worked on a daily basis so that components can be appropriately named. Standard procedures for requesting changes, change management, issue resolution, and system documentation will also need to be in place. Ongoing team meetings will need to be established as part of the production implementation. This group will provide the oversight and governance to the system once the project is done. They will establish change management procedures for changes to AD components. This group will also be responsible for getting information from Server Administration about any updates planned by Domain Admins to the system. Additionally, this team will need to produce updates and status reports to other TSS teams and users related to system changes and plans. A simple comprehensive communication plan will be developed to plan and track the flow of information. Managing Workstations in an AD Environment 11 M. Heuer
12 Workstation Management Process Changes and New Functionality The AD platform will allow us to change many of the processes related to workstation management. Some of the areas that will change the most are with patches and updates, new machine deployment, and software provisioning. Windows updates and software patches will be distributed and managed by AD. We will be able to insure that all staff and faculty machines do not have updates and patches disabled. This will also be very beneficial because we will not need to fully re-image classrooms and labs in order to apply updates. With this model in place, our concept of imaging which clones hard drives and pushes them across the network will radically change. In the new process, images will actually just be long lists of software that the user or workstation should have. These lists will be used by AD and KBox to deliver the software payload from the nearest storage location. New machine deployment will be greatly automated. The only manual step in the process will be for TSS staff (or delegates) to assign a new machine to a domain in the system deployment console. Once that is done the machine will get a bare metal install of Windows, be joined to the assigned domain, and appropriate Group Policy will initiate the software load to provision packages via the KBox. If necessary, the information from the user s old machine will be automatically loaded to the new workstation. AD will also control and manage loading new software onto existing workstations. A change will be made to the group policy, or perhaps the OU, and this will trigger the software installation. In all cases we will have a log of all steps and events that impacted a workstation. This provides a nicely documented audit trail and also the ability to follow-up on any workstation management tasks that did not successfully complete. The logging feature in AD can provide a comprehensive history of all management actions applied to the workstation over the lifecycle from initial deployment through end-of-life. These are new, efficient ways of doing functions that we currently accomplish with legacy tools and techniques. The new platform will also give us new functionality that we have not had in the past. We will be able to control where user documents are saved through policy settings. This would allow us to move the default save location for My Documents to network storage without having to touch the workstation. User data backups will be greatly simplified. Our security capabilities will also be greatly increased in AD. We will also have the opportunity to effectively apply very granular policies and restrictions to workstations based on the user and workstation information. Managing Workstations in an AD Environment 12 M. Heuer
13 Changing Roles for TSS Staff Implementing AD will cause many of the roles related to workstation management to change within TSS. There will also be some new TSS roles created. TSS desktop support staff will move away from supporting physical devices on the campus. Their work will instead be focused on the AD layer of Group Policies and OUs to support devices. Software will not be directly loaded on individual machines or built into cloned images. Under AD, software will be packaged and stored in a repository and the commands for loading it managed through policy updates in AD. More time will be focused on correcting errors related to improperly named components, unassigned machines, patching and update failures, and hardware issues. New roles will also need to be developed for system administration and documentation. There will also be a new role for some staff as they are delegated basic OU administration responsibilities. This will be especially important for the centers (Willow Creek, Newberg, CLIMB, Downtown Center, Metro, Coffee Creek, etc.) that have little or no on-site TSS support. There are several interesting job descriptions available that illustrate the skills and responsibilities necessary to support AD. Here is one example from a popular internet job site. SUMMARY: The Active Directory Analyst leads the operation, maintenance and further improvement of a multi-site Microsoft Active Directory 2003/2008 cluster environment, supporting up to 15,000 end users. This position is a senior member of the team, with strong leadership and project management skills. This position requires extremely strong Active Directory administration skills. RESPONSIBILITIES: Serves as Microsoft Active Directory technician, providing 3rd level support of Enterprise Microsoft Operating System-based servers Manages all Windows platforms providing authentication services for end users Monitors, evaluates and troubleshoots the existing Active Directory 2003/2008 implementation(s), developing and implementing solutions for evolution, enhancement, issue resolution and tuning Thorough knowledge of Active Directory, DNS, WINS, DHCP, Server 2003/2008, troubleshooting tools such as performance monitor Provides continuous support of Microsoft Active Directory and the servers and services that comprise the domain. Tests patches and updates Active Directory servers on an ongoing basis Documents standards for naming conventions, Group Policy management, and OU design. Manages GPs and OUs and produces standard operational reports. Assists in the development of project plans, implementation timelines, and deployment schedules relating to Active Directory initiatives Manages multiple and on-going projects, working closely with team members from various areas of the business Balances efforts of the Enterprise Computing team to include an appropriate level of day-to-day problemsolving versus long-term projects and solutions Adheres to strict change management policy to ensure timely notification, testing and approval for all system and application related changes that may impact the environment Adheres to problem management practices that focus on root cause analysis and prevention of future problems Mentors and trains other team members and effectively documents technical and operational procedures Works with the Service Desk to resolve user issues that have been escalated in a timely manner Pro-actively researches and suggest ways to improve the efficiency of the Operating Systems Works closely with members of the Information Technology department from other disciplines to design, maintain and improve systems that cross multiple platforms Managing Workstations in an AD Environment 13 M. Heuer
14 We can see from this description that the responsibilities correspond nicely to our Server Administration and Solutions Services teams. Despite all of these role changes to existing staff and the emergence of new AD related roles, our overall staff size in TSS should not increase. Managing Workstations in an AD Environment 14 M. Heuer
15 Training We will need to have a robust training curriculum in order to develop the expertise to manage the system. There will be several different classes for Domain Admins, System Administrators, Support Staff and Technicians, Managers, and Users. This will be a sizable task and will require multiple approaches. We will undoubtedly send some staff to intensive, week long, full-time training at a vendor location. There is a certification framework for AD skills and this will help us refine the standard curriculum to fit the needs of PCC. We will probably also host some on-site training conducted by a vendor consultant. We can plan for multiple sessions and get the majority of the technical staff trained. Another full curriculum will have to be developed by our training team. This will be related to PCC standards, best practices, and procedures for working with our implementation of AD. Another session will be developed for users. In some cases we will have users performing delegated functions with the AD system. This would likely include the ability to add a workstation to the domain and perhaps password reset authority. Training plans and documentation will be developed for all of these skill areas. Managing Workstations in an AD Environment 15 M. Heuer
16 Recommendations This will be an exciting and challenging project. Fortunately, many higher education institutions have already gone through an implementation and have excellent documentation available for us. The technology is mature and robust and will transform our service-delivery capability at PCC. The project will take a long time but there are some simple steps that we can take now to start things off. The list is long but here are just the top five considerations that we need to address. 1. Complete the pre-planning steps. This document is just a discussion piece to define the workstation management piece of AD. We need to create draft versions of the scope document, project plan, status report, training plan, and communication plan for workstation management. 2. Define the project structure. The past few system implementations at PCC have utilized a very effective model. Technical Services (Greg s teams) builds up the infrastructure platform and establishes the necessary services. Solutions Services (Tammy s teams) administers the application and completes the configuration. Full documentation, change management procedures, training plans, and communication procedures are developed related to the application. Once that phase is completed, the Stakeholders are given use of the system after it is moved into production. In the workstation management for AD project the stakeholders are primarily the campus teams and some super-users that will have delegated authority. This structure has worked very well for many recent projects including document imaging, Remedy replacement, call center rollout, asset management, and others. 3. Acknowledge that the toughest part of this project is strictly adhering to standards. It is very common for TSS support staff to make decisions and implement changes based on very localized needs. Our challenge will be to centrally manage the system and tightly enforce adherence to standards. Although this will result in a sizable loss of autonomy among the front-line staff, we must keep our focus on the strategic big-picture related to workstation management. We will be better off if we embrace that strategic approach in order to meet the service levels that will be expected of us. This is our best bet for effectively managing our growing number of workstations across an expanding set of locations without increasing our staff size. 4. Get the buy in of the Direct Reports group. In order for us to succeed there must be consensus by the leadership on the path forward. We have to execute this project very well and it will take the support and assistance of everybody in TSS. There is also a large component of the AD project that will impact Media Services and their requirements must be factored in as well. This can be a scope expansion to one of the other AD initiatives or a separate project. 5. Engage a consultant to add expertise to the workstation management for AD project. We have a talented group here in TSS but a little assistance would be great. They can help Managing Workstations in an AD Environment 16 M. Heuer
17 us determine our approach, verify our architecture, develop roles and responsibilities, assist with the overall training plan, and get the initial configuration and procedures developed. We should have no problem completing these steps. This will give us a very good idea of how to move forward. We can establish some milestones, add the project to the project review meetings, and get things started. Please provide any feedback that you have related to this document to Michael Heuer, TSS Customer Support Manager, [email protected]. Managing Workstations in an AD Environment 17 M. Heuer
18 References University of Illinois Chicago Academic Computing and Communications Center Active Directory Tech Pages Managing AD Users and Computers University of Minnesota Office of Information Technology UMN Active Directory ntent_ pdf California Institute of Technology Information Management Systems and Services Active Directory FAQ The University of North Carolina Greensboro Information Technology Services Active Directory Project Overview Alabama Cooperative Extension System Alabama A & M and Auburn University Technology Reference Desk Active Directory Services North Carolina State University NCSU Tech Staff Documents Directory Service and Wolftech Active Directory Managing Workstations in an AD Environment 18 M. Heuer
19 Massachusetts Institute of Technology Information Services and Technology Windows Server Platforms: Introduction to Group Policy Georgia Institute of Technology Office of Information Technology Georgia Tech Active Directory Policy Rutgers The State University of New Jersey Office of Information Technology Setting Up Active Directory at Rutgers Alaska Department of Administration Enterprise Technology Services Enterprise Active Directory Project Managing Workstations in an AD Environment 19 M. Heuer
Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator
Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator Products Covered: Who Should Attend: NetIQ Directory And Resource Administrator
Georgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
Role Based Access Control for Industrial Automation and Control Systems
Role Based Access Control for Industrial Automation and Control Systems Johan B. Nye ExxonMobil Research and Engineering Co. Kevin P. Staggs Honeywell ACS Advanced Technology Labs 27 October 2010 abstract
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
Desktop Authority and Group Policy Preferences
Desktop Authority and Group Policy Preferences A ScriptLogic Product Positioning Paper 1.800.813.6415 www.scriptlogic.com Desktop Authority and Group Policy Preferences Introduction Group Policy Preferences
Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees
Reading Read over the Active Directory material in your Network+ Guide I will be providing important materials Administering Active Directory If you don t understand certain concepts, please ask for help!
LDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
Microsoft Active Directory Project
Microsoft Active Directory Project Simcoe County District School Board Project Kick-off Meeting Rami Wehbe (Solution Architect) January 18, 2012 Agenda Introductions Project objectives and drivers Approach
PLANNING AND DESIGNING GROUP POLICY, PART 1
84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group
How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully
How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully Table of Contents Introduction 1 The Methodology 1 Project Management 2 Project Phases 2 Certification Training
Chapter 1 Scenario 1: Acme Corporation
Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page
Portland State University Office of Information Technologies Active Directory Standards and Guidelines for Campus Administrators
Portland State University Office of Information Technologies Active Directory Standards and Guidelines for Campus Administrators Introduced with Windows 2000 Server, Active Directory (AD) is Microsoft
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
HDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation
LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing
ADSelfService Plus Client Software Installation Guide
ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
Windows Domain Network Configuration Guide
Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing
MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan
RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide
RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide Introduction The RSA SecurID Certified Administrator (CA) examination is based on the critical
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
Introduction to Active Directory Services
Introduction to Active Directory Services Tom Brett A DIRECTORY SERVICE A directory service allow businesses to define manage, access and secure network resources including files, printers, people and
Designing a Windows Server 2008 Active Directory Infrastructure and Services
Course Code: M6436 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Windows Server 2008 Active Directory Infrastructure and Services Overview During this five-day course, delegates
Managing and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
Stellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
Windows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
ManageEngine ADSelfService Plus. Evaluator s Guide
ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...
Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2
Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives
INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE
INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE MICROSOFT ACTIVE DIRECTORY INTEGRATION Agostinho Tavares Version 1.0 Published 06/05/2015 This document describes how Inuvika OVD 1.0 can be integrated with Microsoft
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Introduction. Versions Used Windows Server 2003
Training Installing Active Directory Introduction As SonicWALL s products and firmware keeps getting more features that are based on integration with Active Directory, e.g., Active Directory Connector
Structure of Active Directory for University of Edinburgh
Structure of Active Directory for University of Edinburgh Version 1.5 : July 4th 2003 Original Author : George Howat Latest Updates : Scott Currie 1. Changes from last version (From 1.4) 6.1 minor updates
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
For Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
Service Definition. ADNS Domain V0.4. Signoff. Name Role Signature & Date. Jim Leeper. Windows Platform. Page 1
Service Definition ADNS Domain V0.4 Signoff Name Role Signature & Date Jim Leeper Houssein Hallani Luc Betbeder-Matibet Greg Fallon Windows Platform Service Management Faculty IT Director Portfolio Manager
Active Directory Integration Manual
Active Directory Integration Manual Fast and easy roll-out of BackupAgent platforms using Active Directory and web-panels 1. Online Backup for hosters This whitepaper describes the unique and valuable
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led
Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led Course Description During this five-day course, students will learn how to design an Active
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Domain Services Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 02 June 2011 200 Windows
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
What s New Guide: Version 5.6
What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3
70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
How to best protect Active Directory in your organization. Alistair Holmes. Senior Systems Consultant
How to best protect Active Directory in your organization Alistair Holmes. Senior Systems Consultant So where do we start? Lets break it down Security Management 2 Security concerns with Active Directory
Effective Use of Individual User Profiles with Software Distribution
The following paper was originally published in the Digest of the Large Scale System Administration of Windows NT Workshop Seattle, Washington, August 1997 For more information about USENIX Association
The. Essential. Guide. to an NDS-to- Active Directory Migration. By David Chernicoff. sponsored by. March 2010 1
Essential The Guide to an NDS-to- Active Directory Migration By David Chernicoff sponsored by March 2010 1 W ith the release of Windows Server 2008 and the latest iteration of Active Directory, many enterprise
Planning and Implementing an OU Structure
3 CHAPTER THREE Planning and Implementing an OU Structure Terms you ll need to understand: Organizational unit (OU) Delegation of control Group Policy Security group Linked policies Techniques/concepts
These guidelines can dramatically improve logon and startup performance.
Managing Users with Local Security and Group Policies 573. Disable user or computer settings in GPOs Each GPO consists of a user and a computer section. If there are no settings in either of those sections,
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
PowerCAMPUS Portal and Active Directory
SUNGARD SUMMIT 2007 sungardsummit.com 1 PowerCAMPUS Portal and Active Directory Presented by: Chad Sexton PowerCAMPUS Portal Development March 21, 2007 A Community of Learning Overview SunGard Higher Education
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
Administrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
Group Policy 21/05/2013
Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows
Installing, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Kaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers
M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers Looking at Training Differently... Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers Length: Published:
Joining a workstation to the TAMU IT Domain and Profile Migration
Joining a workstation to the TAMU IT Domain and Profile Migration Contents Migration Prerequisites... 1 Firewalls... 1 Run As and Other Alternate Credentialing Methods... 2 File and Print Sharing Is Disabled...
Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
Server Infrastructure Optimization
Best Practices to Reduce IT Operational Costs Abstract This paper shows technical decision makers and IT managers how organizations can reduce costs and improve their IT efficiency by optimizing their
Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
6419: Configuring, Managing, and Maintaining Server 2008
6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led
CHAPTER THREE. Managing Groups
3 CHAPTER THREE Managing Groups Objectives This chapter covers the following Microsoft-specified objectives for the Managing Users, Computers, and Groups section of the Managing and Maintaining a Microsoft
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course Code: M6425 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Overview This five-day instructor-led course
Mac OS X and Directory Services Integration
Mac OS X and Directory Services Integration Neha Setia 1 and Tarun Dalal 2 1 M.Tech Scholor, CBS Group of Institutions, CSE Department, MDU Rohtak, India [email protected] 2 Assistant Professor, CBS
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software
Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure
Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure (Exam 70-294) Table of Contents Course Overview... 2 Section 1.1: Introduction to Active Directory... 3 Section
Managing Windows Environments with Group Policy
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: [email protected] Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Five Days, Instructor-Led About this course This five-day instructor-led course provides in-depth training
Configuring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers MOC6419 About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network
MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008
1 of 6 1/6/2010 3:23 PM MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 This five-day instructor-led course combines five days worth of instructor-led training content from the Network
Windows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
SmartCenter for Pointsec - MI Overview
Chapter SmartCenter for Pointsec - MI Overview 1 SmartCenter for Pointsec - MI is a management and administration framework solution for the Check Point Endpoint Security product line that integrates with
Getting the Most From. Your Help Desk
. Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk
Active Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
Dadeschools.net Site Administrator Security Settings Request for Comment (RFC)
Dadeschools.net Site Administrator Security Settings Request for Comment (RFC) This RFC was prepared by the Information Technology Services (ITS) Department of Miami-Dade County Public Schools (M-DCPS).
APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE. Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.
APPENDIX A WORK PROCESS SCHEDULE AND RELATED INSTRUCTION OUTLINE TITLE O*NET-SOC CODE RAPIDS CODE Computer Support Specialist (Existing Title: Help Desk Technician) 15-1151.00 111HY Network and Computer
AV-006: Installing, Administering and Configuring Windows Server 2012
AV-006: Installing, Administering and Configuring Windows Server 2012 Career Details Duration 105 hours Prerequisites This course requires that student meet the following prerequisites, including that
(Installation through ADSelfService Plus web portal and Manual Installation)
ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...
