Believe it or not, you ve already been working with Active Directory! If

Size: px
Start display at page:

Download "Believe it or not, you ve already been working with Active Directory! If"

Transcription

1 Chapter 12 Active Directory, Part II In This Chapter Actively managing the Active Directory Understanding the difference between Active Directory planning and practical uses of Active Directory Optimizing organizational units in Active Directory Configuring and delegating OU permissions in Active Directory Adding and moving common Active Directory objects including users, groups, and computers Understanding Active Directory site and domain management Believe it or not, you ve already been working with Active Directory! If you ve followed many of my examples and steps since the beginning of the book, you ve installed a domain controller, and thus you have installed Active Directory (see Chapter 2). If you ve added users, as discussed in Chapter 9, then you have used Active Directory to accomplish a task. I share this with you so that you can minimize if not eliminate any Active Directory anxiety you ve built up. This chapter is the yang to the yin of the last chapter. Whereas the last chapter was planning-centric, this chapter focuses on the practical and pragmatic aspects of Active Directory. It s hands-on, so let s get going. Optimizing Organizational Units I ve come to believe the organizational units (OUs) are where the MCSEs and MBAs can find common ground. I talked about this coming together of business and technical perspectives in the last chapter. In this chapter, we make it happen. Ideally, your Active Directory will be, first and foremost, pragmatic. I believe that the OUs can be designed with the underlying organization in mind, be it corporations, not-for-profit organizations, or government agencies. That is, OUs can be created for different functional areas of responsibility, such as marketing, manufacturing, and legal. Another possibility that works for many firms is to create OUs by geographic location: corporate headquarters, branch offices, project sites, and even vendor sites.

2 426 Part IV: Active Directory and Security Of course, if you feel the world should be run by MCSEs, you might build a complex Active Directory based on subnets, hardware locations, and other technology-based dimensions. The choice is yours. You can create an Active Directory with a focus on business functions, technology resources, or a combination of the two. Remember that OUs may contain users, groups, and computer accounts. OUs are typically used to delegate administrative control. OUs are best deployed if they define administrative boundaries in your domain. To create an OU, follow these steps. STEPS: Creating an OU Step 1. Step 2. Step 3. Step 4. Step 5. Select Administrative Tools, Active Directory Users and Computers on the Start menu. The Active Directory Users and Computers MMC will appear. Right-click the domain icon in the left pane. The secondary menu will be displayed. Select New, Organizational Unit from the secondary menu. The Create New Object - (Organizational Unit) dialog box will appear (see Figure 12-1). Name the OU. Click OK. The OU will appear in the left pane of the Active Directory Users and Computers MMC (see Figure 12-2). Figure 12-1: Creating an OU

3 Chapter 12: Active Directory, Part II 427 Figure 12-2: OU displayed in Active Directory Users and Computers MMC You may recall a secret near the end of Chapter 11 where I suggested you consider creating just one OU and putting everything in it, at least to start with. You would then critically evaluate the need for additional OUs on a case-by-case basis. But be advised that while this advice is valid, it clearly applies to small and medium-sized organizations, not full-scale enterprises. You want to be master of your own destiny with your Active Directory and create at least one OU right away. That s because the built-in default containers shown in Active Directory Users and Computers are not very useful or practical. First, these containers are not true OUs. Second, you cannot create OUs within these default containers. Finally, you can t apply group policy to these default containers. Take my advice and create your own OU or OUs as soon as possible. An OU inside an OU There are very important reasons to consider creating an OU within an OU. For example, this might make the best sense if you work in a decentralized or matrix organization. Another reason to have OUs within OUs would be a project management organization, where the embedded OU might be named after a project of limited scope and duration. To create an OU within an OU, follow these steps.

4 428 Part IV: Active Directory and Security STEPS: Creating an OU within an OU Step 1. Step 2. Step 3. Step 4. Step 5. Select the OU in the left pane of the Active Directory Users and Computers MMC. Right-click the OU that you selected. The secondary menu will appear. Select New Organizational Unit from the secondary menu. The Create New Object - (Organizational Unit) dialog box will appear. Enter the name of the OU in the Name field. Click OK and observe that the new, embedded OU appears indented under the original OU (see Figure 12-3). Figure 12-3: OU within an OU OU permissions In order to create an OU within an OU (as you did when creating Northwest inside of Marketing in the previous example), you must have the following permissions in the parent container (for example, Marketing):

5 Chapter 12: Active Directory, Part II 429 Create Organizational Unit Objects List Contents Read The List Contents right isn t truly necessary when creating an OU within an OU. However, if you don t provide the List Contents correctly, you would not be able to see the embedded OU you just created. Not only is out of sight the same as out of mind, it s also out of management (can t be managed). To assign and modify Active Directory permissions, follow these steps. STEPS: Managing Active Directory permissions Step 1. Step 2. Step 3. Step 4. In the Active Directory Users and Computers MMC, select View Advanced Features. Right click an object (for example, the Marketing OU). Select Properties from the secondary menu. Select the Security tab on the OU s Properties sheet. You may now grant or deny the Full Control, Read, Write, Create All Child Objects, and Delete All Child Objects permissions. Step 5. If you select the Advanced button, the Access Control Settings appear. You may set advanced permissions such as Special. The Access Control Settings dialog box displays permissions entries in the column-and-row format that many of us have been searching for. Many times, I have wanted to know who has access to what, and wanted the information presented in a columnar report-type format. The Access Control Settings dialog box does exactly that. Step 6. Click OK to return to the Active Directory Users and Computers MMC. You have now modified the permissions for an Active Directory object. On the Security tab of an OU s properties sheet, you may select the Allow inheritable permissions from the parent to propagate to this object checkbox. Simply stated, this allows this OU to inherit rights from its parent. Likewise, on the Access Control Settings dialog box, selected via the Advanced button from the Security tab of an OU s properties sheet, you can have the existing OU s permissions propagate to any existing or future children. This is the last-will-and-testament option. To invoke this option, select the Allow inheritable permissions from the parent to propagate to this object checkbox.

6 430 Part IV: Active Directory and Security And in all cases, there is no usurious inheritance tax. Delegating control Another cool Active Directory feature, viewed from the OU perspective, is that it allows you to delegate control of an OU to someone else. This is how you can create mini-administrator, a highly desirable new feature in Windows 2000 Server. The basic reason for delegating control is to make your life easier by having someone help you manage an OU. It is also easier to track permissions at the OU level. Follow these steps to delegate control. STEPS: Delegating control Step 1. Select an OU, right click and select Delegate Control from the secondary menu. The Delegation of Control Wizard will appear (see Figure 12-4). Figure 12-4: Delegation of Control Wizard Step 2. Click Next. The Users or Groups screen appears (see Figure 12-5). Select the group or user that you want to delegate control to via the Add button. Click Next.

7 Chapter 12: Active Directory, Part II 431 Figure 12-5: Users or Groups Selection screen Step 3. Select the Tasks to Delegate from the list of common tasks or create a custom task to delegate (see Figure 12-6). Click Next. Figure 12-6: Tasks to delegate

8 432 Part IV: Active Directory and Security Step 4. Click Finish at the Completing the Delegation of Control Wizard screen. You have now delegated the OU control you elected to delegate to a user or group. Another approach to delegating control is to create your own Microsoft Management Console (MMC) and then assign permissions that permit a delegate to use the custom MMC. For example, create an MMC with three or four of your favorite snap-ins. In Figure 12-7, I ve created an MMC with the Computer Management, Event Viewer, Resource Kits, and Performance Logs and Alerts snap-ins. Figure 12-7: Custom MMC Next, select options from the Console menu. The Options dialog box will appear. Select the Console tab and select User mode - full access (see Figure 12-8). Click OK. You have now delegated control to this MMC. Be sure to save your MMC when you exit.

9 Chapter 12: Active Directory, Part II 433 Figure 12-8: Console mode You may now distribute this MMC to other users. By setting the MMC console to User mode, the other users may not modify this custom MMC, but rather they may use it to complete system management tasks. You may have noticed that the Console mode field had several selections: Author mode: Allows access to all MMC functionality including adding, creating, and modifying the MMC. You may also navigate the entire MMC tree. User mode - full access: Users have access to all MMC management functionality and the MMC tree. However, users cannot add or remove snap-ins or change console file options. The Save commands are disabled. User mode - limited access, multiple window: This is a more restrictive setting. Users cannot modify the MMC, open new Windows, or see areas of the console tree that weren t visible when the MMC was last saved. Multiple windows are allowed. User mode: limited access, single window: Same as the multiple window option except that only a single window is displayed. Advanced features A little known secondary menu option, displayed when you right-click the domain object, is View Advanced Features. When selected, Advanced Features displays several more Active Directory components in the MMC, as seen in Figure 12-9.

10 434 Part IV: Active Directory and Security Figure 12-9: Advanced Features For example, one of the objects displayed is LostAndFound. This object is the default container for orphaned objects. Orphaned objects are created when the relationship that ties these objects to other objects is somehow lost or broken. And to be brutally honest, orphaned objects can be created with no mistake on your part. Sometimes computers just hiccup or act in inexplicable ways. Creating Users, Groups, and Computers This section is actually a review for those of you who diligently read Chapter 9. Because of that, I ll quickly review how you add users, groups, and computers. The first steps are the same. To create a user, group, or computer, simply right-click the domain or OU in the left pane of the Active Directory Users and Computers MMC. From the secondary menu, select New. You would then select User, Group, or Computer depending on the task you want to complete. If you select User, the Create New Object - (User) Wizard will be displayed (see Figure 12-10). Complete each screen to create the user.

11 Chapter 12: Active Directory, Part II 435 Figure 12-10: Creating a user If you select Group, the Create New Object - (Group) Wizard appears (see Figure 12-11). Complete each field and click OK to create the group. Figure 12-11: Creating a group

12 436 Part IV: Active Directory and Security If you select Computer, the Create New Object - (Computer) Wizard will be displayed (see Figure 12-12). Name the computer and click OK to create the computer. It is very important to select the Allow pre-windows 2000 computers to use this account checkbox if you are creating a computer account for a Windows NT 4.0 Workstation machine (as an example). Figure 12-12: Creating a computer account You can also create custom objects such as figures. I ve seen this done in Active Directory where an organization wanted to have a picture of a floor plan showing where each user was located. Good idea when conceived on the whiteboard during planning. Bad idea when fully implemented. Why? Because creating objects such as artwork and figures causes the Active Directory database to grow exponentially in size, resulting in poor performance. Moving Objects If you ve followed the examples in both Chapter 9 and this chapter, you will notice that the user, group, and computer exist as objects just below the domain in the Active Directory. It would be better to move these to an OU. Be advised about the basic guidelines concerning moving objects such as users, groups, and computers. Object permissions move with the object, but inherited permissions do not move.

13 Chapter 12: Active Directory, Part II 437 Follow these steps to move a user, group, and computer to the Marketing OU (again, assuming you ve created that). STEPS: Moving a user, group and computer Step 1. Step 2. Step 3. Select the object you want to move. Right-click the object to display the secondary menu. In this example, I ve selected Raymond MacMillan, a user. Select Move. The Move dialog box appears. Select the container that you want to move the object to. In this example, I ve selected Marketing (see Figure 12-13). Figure 12-13: Move dialog box Step 4. Step 5. Click OK. The object, Raymond MacMillan, has moved to the Marketing OU (see Figure 12-14). Repeat steps 1 to 4 to move a computer or group.

14 438 Part IV: Active Directory and Security Figure 12-14: Moving an object Active Directory Sites and Services The Active Directory Sites and Services MMC, launched from the Administrative Tools group, is used to manage the replication of critical Active Directory information, including network services, domain controller, and site information. A site is really just a collection of subnets. One rule of thumb has been that sites are LANs and separate sites represent a WAN. The replication process is managed via the Active Directory Sites and Services MMC (see Figure 12-15). A few facts about replication might be of interest to you. First, configuring replication often means you must choose between accurate data and high performance. If replications are performed frequently, the data contained at each domain controller will be as accurate as possible. That is a good thing. But this data accuracy comes at a price. This frequent replication pattern consumes network bandwidth. The trade-off is this: accurate data versus network traffic issues. When discussing one site, the originating domain controller with a delta change to its Active Directory database is responsible for notifying the replication partners about such changes. This occurs via a communication known as change notification. The replication partner, typically within five

15 Chapter 12: Active Directory, Part II 439 minutes of receiving this message, pulls down the delta Active Directory changes. When discussing multiple sites, replication is scheduled manually. Once exception to this change notification process is that security-sensitive updates, defined as security-related attributes, are pulled down by the replication partner immediately. Replication pathways within a single site are created via the Knowledge Consistency Checker (KCC). KCC creates pathways that are feasible within three hops. New domain controllers, when added to the network, are automatically added to the replication pathway by KCC. Figure 12-15: Active Directory Sites and Services MMC All replication traffic, whether within one site or across multiple sites, use Remote Procedure Calls (RPC) as the underlying transport mechanism. With multiple site communications, Simple Mail Transport Protocol (SMTP) may also be used. The RPC communication process is shown in Figure Windows 2000 Server Domain Controller A Remote Procedures Server Stub Server RPC Runtime Library Network Transport Windows 2000 Server Domain Controller B Figure 12-16: The RPC communication process

16 Because you are using RPCs in your site replication, you will need to use the RPING utility from Microsoft Exchange to assist in troubleshooting replication problems. RPING is discussed in Chapter 20. Active Directory Domains and Trusts The Active Directory Domains and Trusts MMC (see Figure 12-17) is launched from the Administrative Tools program groups. Its main function is to manage domain trusts and user principal name suffixes and change the domain mode. Domains are administrative units typically created to assist you in organizing and managing your network resources. Trusts create secure pathways between domains. Specifically, you may use Active Directory Domains and Trusts to Support mixed mode domain operations in mixed Windows 2000 and Windows NT domain environments Configure operations to run in strict Windows 2000 native mode Add/remove domain names Change the domain controller that holds the domain naming operations master role Create and modify domain trusts Gather and observe information about domain management Figure 12-17: Active Directory Domains and Trusts

17 Chapter 12: Active Directory, Part II 441 Summary This chapter brought a discussed the practical aspects of Active Directory. Implementing Active Directory in your organization Creating and moving objects in Active Directory Understanding which Active Directory MMC to use under what circumstances Delegating OU permissions in Active Directory Understanding Active Directory site and domain management

18

Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees

Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees Reading Read over the Active Directory material in your Network+ Guide I will be providing important materials Administering Active Directory If you don t understand certain concepts, please ask for help!

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system. 1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you

More information

Releasing blocked email in Data Security

Releasing blocked email in Data Security Releasing blocked email in Data Security IN-TopicInfo:Topic 41101/ Updated: 02-May-2011 Applies To: Websense Data Security v7.1.x Websense Data Security v7.5.x Websense Data Security v7.6.x - v7.8x SMTP

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Chapter 3: Building Your Active Directory Structure Objectives

Chapter 3: Building Your Active Directory Structure Objectives Chapter 3: Building Your Active Directory Structure Page 1 of 46 Chapter 3: Building Your Active Directory Structure Objectives Now that you have had an introduction to the concepts of Active Directory

More information

ThinManager and Active Directory

ThinManager and Active Directory ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Install the Production Treasury Root Certificate (Vista / Win 7)

Install the Production Treasury Root Certificate (Vista / Win 7) Install the Production Treasury Root Certificate (Vista / Win 7) The Production Treasury Root Certificate should be maintained on your local workstations to use OTCnet Check Capture and Deposit Reporting.

More information

CHAPTER THREE. Managing Groups

CHAPTER THREE. Managing Groups 3 CHAPTER THREE Managing Groups Objectives This chapter covers the following Microsoft-specified objectives for the Managing Users, Computers, and Groups section of the Managing and Maintaining a Microsoft

More information

These guidelines can dramatically improve logon and startup performance.

These guidelines can dramatically improve logon and startup performance. Managing Users with Local Security and Group Policies 573. Disable user or computer settings in GPOs Each GPO consists of a user and a computer section. If there are no settings in either of those sections,

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16 1 of 16 Thin Client Manager Table of Contents 1-10ZiG Manager 1.1 - Configuring and Managing the Server 1.1.1 - Server Settings 1.1.2 - Starting and Stopping the Server 1.2 - Configuring and Starting the

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Creating and Managing Shared Folders

Creating and Managing Shared Folders Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

APNS Certificate generating and installation

APNS Certificate generating and installation APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...

More information

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

Ultimus and Microsoft Active Directory

Ultimus and Microsoft Active Directory Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

Managing Software Updates with System Center 2012 R2 Configuration Manager

Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES

More information

NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Administrative Tools Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication

More information

Core Active Directory Administration

Core Active Directory Administration Chapter 7 Core Active Directory Administration In this chapter: Tools for Managing Active Directory............................157 Using the Active Directory Users And Computers Tool............162 Managing

More information

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory Change Reporter Table of Contents General Information...

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

Getting Started With Delegated Administration

Getting Started With Delegated Administration Getting Started With Delegated Administration Delegated Administration (available with Websense v6.1 Corporate Editions) is a powerful tool for distributing filtering and reporting responsibilities for

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible

More information

Group Policy for Beginners

Group Policy for Beginners Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

NTP Software File Auditor for NAS, EMC Edition

NTP Software File Auditor for NAS, EMC Edition NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,

More information

SCCM Client Checklist for Windows 7

SCCM Client Checklist for Windows 7 SCCM Client Checklist for Windows 7 1. The client workstation must have a supported operating system. Supported operating systems include Windows 7. To view information about the operating system version:

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

523 Non-ThinManager Components

523 Non-ThinManager Components 28 Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about

More information

FIGURE 33.5. Selecting properties for the event log.

FIGURE 33.5. Selecting properties for the event log. 1358 CHAPTER 33 Logging and Debugging Customizing the Event Log The properties of an event log can be configured. In Event Viewer, the properties of a log are defined by general characteristics: log path,

More information

Setup Guide for Exchange Server

Setup Guide for Exchange Server Setup Guide for Exchange Server Table of Contents Overview... 1 A. Exchange Server 2007/2010 Inbound Mail... 2 B. Exchange Server 2007/2010 Outbound Mail (optional)... 8 C. Exchange Server 2003/2000 Inbound

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

138 Configuration Wizards

138 Configuration Wizards 9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Microsoft IAS Configuration for RADIUS Authorization

Microsoft IAS Configuration for RADIUS Authorization Microsoft IAS Configuration for RADIUS Authorization Purpose To illustrate how to create a Microsoft IAS Remote Access Policy that utilizes an Uplogix vendor specific attribute that contains a user group

More information

Changing Passwords in Cisco Unity 8.x

Changing Passwords in Cisco Unity 8.x CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

WhatsUp Event Alarm v10.x Listener Console User Guide

WhatsUp Event Alarm v10.x Listener Console User Guide WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm

More information

To install the SMTP service:

To install the SMTP service: To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click

More information

Cloud Services ADM. Agent Deployment Guide

Cloud Services ADM. Agent Deployment Guide Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License

More information

Administrator s Guide

Administrator s Guide MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4

More information

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we

More information

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014 S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: October 08, 2014 Installing the Online Responder service... 1 Preparing the environment...

More information

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel

More information

Load Balancing Exchange 2007 SP1 Hub Transport Servers using Windows Network Load Balancing Technology

Load Balancing Exchange 2007 SP1 Hub Transport Servers using Windows Network Load Balancing Technology Load Balancing Exchange 2007 SP1 Hub Transport Servers using Windows Network Load Balancing Technology Introduction Exchange Server 2007 (RTM and SP1) Hub Transport servers are resilient by default. This

More information

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

Configuring Microsoft Active Directory for Cisco WAAS Encrypted MAPI Acceleration

Configuring Microsoft Active Directory for Cisco WAAS Encrypted MAPI Acceleration White Paper Configuring Microsoft Active Directory for Cisco WAAS Encrypted MAPI Acceleration Abstract The most current versions of Exchange-based email solutions from Microsoft (MAPI) contain data encryption

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

NTP Software QFS for NAS, NetApp Edition Installation Guide

NTP Software QFS for NAS, NetApp Edition Installation Guide NTP Software QFS for NAS, NetApp Edition Installation Guide This Installation Guide applies to all NTP Software QFS for NAS, NetApp filer editions. Abstract This guide provides a short introduction to

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Administering Group Policy with Group Policy Management Console

Administering Group Policy with Group Policy Management Console Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

Overview of Active Directory Replication and Sites

Overview of Active Directory Replication and Sites 200 Chapter 5 Configuring Sites and Replication networks and the types of technology available at locations throughout the world. In remote or less-developed locations, you may not even be able to get

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Automating Administration with SQL Agent

Automating Administration with SQL Agent Automating Administration with SQL Agent Automating Administration with SQL Agent Objectives Configure SQL Server Agent. Set SQL Server Agent properties. Configure a fail-safe operator. Create operators.

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

CC4 TEN: Pre-installation instructions for Windows Server networks

CC4 TEN: Pre-installation instructions for Windows Server networks CC4 TEN: Pre-installation instructions for Windows Server networks Contents Introduction to CC4 TEN... 1 How the transition works... 3 Your pre-installation tasks... 5 Back up your servers... 5 Ensure

More information

Non-ThinManager Components

Non-ThinManager Components Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about their

More information

Configuring Microsoft RADIUS Server and Gx000 Authentication. Configuration Notes. Revision 1.0 February 6, 2003

Configuring Microsoft RADIUS Server and Gx000 Authentication. Configuration Notes. Revision 1.0 February 6, 2003 Configuring Microsoft RADIUS Server and Gx000 Authentication Configuration Notes Revision 1.0 February 6, 2003 Copyright 2002 Gemtek Systems Holding BV www.gemtek-systems.com Notice Gemtek Systems reserves

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Distributing EmailSMS v2.0

Distributing EmailSMS v2.0 Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.

More information

Welcome to the QuickStart Guide

Welcome to the QuickStart Guide QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

MS Outlook 2002/2003. V1.0 BullsEye Telecom Email

MS Outlook 2002/2003. V1.0 BullsEye Telecom Email IMAP Settings Manual Our application allows you to access your email in many different ways. For those of you who do not wish to use the Webmail interface, you may also manage your email and custom folder

More information

Windows XP Service Pack 2 Issues

Windows XP Service Pack 2 Issues Windows XP Service Pack 2 Issues NOTICE THIS DOCUMENT SHALL NOT BE REPRODUCED IN WHOLE OR IN PART, FOR ANY PURPOSE OR IN ANY FASHION AND DISTRIBUTED WITHOUT THE PRIOR WRITTEN CONSENT OF RICOH CORPORATION.

More information

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration 1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: sales@faronics.com Phone: 800-943-6422 or 604-637-3333

More information

Outlook 2007 Delegate Access

Outlook 2007 Delegate Access Outlook 2007 Delegate Access Just as an assistant can help you manage your paper mail, your assistant can use Outlook to act on your behalf: receiving and responding to e-mail, meeting requests, and meeting

More information

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc. Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Outpost Office Firewall

Outpost Office Firewall Technical Reference Outpost Office Firewall Office Firewall Software from Agnitum Abstract This document provides advanced technical information on administering Outpost Office Firewall in a corporate

More information

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2 Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives

More information