Home Page Icon
Home Page
Table of Contents for
V. Preparing For Implementation
Close
V. Preparing For Implementation
by Scott E. Archer
MCSE Windows® 2000 Directory Services Design
Copyright
Dedication
About the Author
About the Technical Reviewers
Acknowledgments
Tell Us What You Think
How to Use This Book
Chapter Opener
Instructional Features Within the Chapter
Case Studies
Extensive Review and Self-test Options
Introduction
How This Book Helps You
What the Designing a Microsoft Windows 2000 Directory Services Infrastructure Exam (70–219) Covers
Analyzing Business Requirements
Analyzing Technical Requirements
Designing a Directory Service Architecture
Designing Service Locations
Hardware and Software You'll Need
Advice on Taking the Exam
New Riders Publishing
I. Active Directory Basics
1. Understanding Active Directory
Introduction
"Directory" Defined
Active Directory Is a Unified Directory
X.500 Compliant
LDAP Is Core
Active Directory Features and Benefits
Support for Open Standards
Rich Set of APIs
ADSI
MAPI
LDAP C API
Drag and Drop Administration
Extensible Schema
Global Catalog Servers
Multi-Master Replication Model
Backward Compatibility
Name Resolution Services
Interoperability
NetWare
Exchange
Future Interoperability
Scalability
Dynamic DNS
Integration with TCP/IP Services
Non-Microsoft DNS Servers
Public/Private Key Infrastructure
Migration from Previous Versions of NT
Microsoft's Recommended Migration Approach
Single Domain Model
Single Master Domain Model
Multiple Master Domain Model
Complete Trust Domain Model
Novell NetWare
Planning, Planning, Planning
Chapter Summary
Apply Your Knowledge
Exercise
1.1. Installing the Active Directory Schema Manager
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
II . Analyzing Business Requirements
2. Planning and Conducting Your Business Assessment
Introduction
Business Analysis Planning Framework
Create Your Strategy
Windows 2000 Feature Set
Company Categorization
Relative to the Industry
Relative to IT
What to Gain from the Analysis
Business Vision
Business Goals and Problems
Organization of the Company
Management Model
Company Organization
Vendor, Partner, and Customer Relationships
Merger and Acquisition Plans
Geographical Scope of the Company
Key Company Processes
Information and Communication Flow
Service and Product Life Cycle
Decision-Making
Company Strategy Influences
Company Priorities
Growth and Growth Strategy
Laws and Regulations
Tolerance for Risk
Total Cost of Ownership (TCO)
Business Analysis Deliverables
Business Goals and Problems Document
Gap Analysis
Risk Assessment
Chapter Summary
Apply Your Knowledge
Exercise
2.1. Creating an Analysis Strategy
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
3. Analyzing the Results of the Business Assessment
Introduction
Case Study: Electrico Corporation
BACKGROUND
PROBLEM STATEMENT
BUSINESS ANALYSIS
Company Categorization
Business Vision
Business Goals and Problems
Company Organization
Geographical Scope and Company Model
Company Processes
Influences That Affect Company Strategy
Envisioning the Future
Current State
How Will the Company Change?
"What If?" Analysis
Concluding the Business Vision Analysis
Analyzing Business Problems
Business Goal
Problem Analysis
Problem-Objective Table
Objective Definition Stage
Company Organization
Existing and Planned Management Models
Existing and Planned Vendor, Partner, and Customer Relationships
Authentication
Rendezvous
Authorization
Electrico
Expected Areas of Growth
Mergers
Acquisitions
Company Operating Scope
Geographical Scope
Company Operational Model
National Model
Subsidiary Model
Branch Office Model
Regional Model
International Model
Key Company Processes
Information and Communication Flow
Enterprise Identity Management
Identity Administration
Existence
Context
Provisioning
Workflow
Decision-Making
Product and Service Life Cycles
Windows Installer
Software Installation and Maintenance Technology
Company Strategy Influences
Conducting an Influence Interview
Company Priorities
Issues Surrounding Growth
Tolerance for Risk
Laws and Regulations
Total Cost of Operations
Goals for a TCO Assessment
Chapter Summary
Apply Your Knowledge
Exercises
3.1. Identify Business Analysis Components
3.2. Understand Knowledge and Information Flow
3.3. Analyze Customer Relationships
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
4. Analyzing the IT Administration Model
Introduction
Case Study: The Electrico IT Organization
BACKGROUND
PROBLEM STATEMENT
CIO
NetWare Administrator
CURRENT IT MODEL
Network Manager
Mainframe Ops Manager
ENVISIONED IT MODEL
CIO
Help Desk Manager
ECONOMIC METRICS
CFO
Structure of IT Management
Type of Administration
Centralized Administration
Decentralized Administration
Hybrid
Impact on Active Directory Design
IT Administration at Electrico
Funding Model
Rapid Economic Justification Framework
Business Assessment
Solution
Cost-Benefit Analysis
Financial Metrics
Risk
Outsourcing
Why Do Companies Outsource Operations?
Management of Outsourced Operations
Identification
Control
Security
Management
Electrico's Plans for Outsourcing
Decision-Making Process
Change Management Process
Documented Change-Management Standards
Your Ability to Detect Potential Change
Considering Change in Active Directory Design
Standards Documentation
Chapter Summary
Apply Your Knowledge
Exercises
4.1. Fill in a 4×7 Benefit Matrix
4.2. Determine the Type of IT Administration
4.3. Calculating TCO and ROI Using the TCO and ROI Advisor
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
III. Analyzing Technical Requirements
5. Analyzing the Physical Environment
Introduction
Interview the Information Technology Team
How Many People and Where Are They?
Enterprise Infrastructure Assessment
Network Topology
Connection Types and Speed of Each
Physical Network
Routers
Switches
Hubs
Bridges and Other Devices
Name Resolution Services
IP Addressing Schemes
DHCP Server
QIP Servers
Manual IP Configuration
Protocol Analysis
Bandwidth
Net Available Bandwidth and SLAs
Quality of Service (QoS)
Telecommuting
Tools and Utilities to Help with Analysis
Case Study: eFly Airlines
BACKGROUND
PROBLEM STATEMENT
CEO
IT Director
Web Developer
CURRENT SYSTEM
Ticket Buyer
Web Developer
Infrastructure Specialist
CURRENT ENVIRONMENT
IT Director
Infrastructure Specialist
Help Desk Manager
ENVISIONED SYSTEM
IT Director
Infrastructure Specialist
Help Desk Manager
SECURITY
Outside Security Consultant
IT Director
Web Developer
PERFORMANCE
Infrastructure Specialist
Indianapolis Maintenance Crew
IT Director
MAINTAINABILITY
IT Director
IT Administrator
Infrastructure Specialist
AVAILABILITY
IT Director
Customer Service Administrator
Infrastructure Specialist
Chapter Summary
Apply Your Knowledge
Exercises
5.1. Determine Net Available Bandwidth
5.2. Determine Appropriate Action
5.3. Analyze the Network Topology
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
6. Analyzing Performance-Related Requirements
Introduction
What Is a Performance Analysis?
Successful Approach to Performance Monitoring
Leverage the Knowledge of IT Resources
Don't Forget the Infrastructure
Step 1: Determine a Baseline
What Data Should I Capture?
Memory
Processor
Network Subsystem
Disk Subsystem
Application Resources
Collecting Data for a Baseline
Data Gathering Timeline
System Monitor Logs
Step 2: Quantify Measurement Information
Starting and Stopping the Logging Process
Preparing the Log File for Analysis
Step 3: Determine Bottlenecks
Workload Characterization
File and Print Servers
Application Servers
Domain Controllers
Memory Bottlenecks
Paged and Non-Paged RAM
Virtual Memory
Detecting Memory Bottlenecks
Processor Bottlenecks
Network Bottlenecks
Network Infrastructure Components
Server-Based Network Elements
Network-Related System Monitor Counters
Protocols
Name Resolution Services
Addressing Network Subsystem Bottlenecks
Disk Bottlenecks
Step 4: Determine Feasible Response Time
Step 5: Project Future Needs
Step 6: Implement a Performance Analysis and Trending Standard
Graphical Trend Reports
Numerical Reports
Windows 2000 Server Roles
Domain Controllers
File/Print Servers
Web Servers
Database Servers
Numerical Analysis Servers
Server Service
Windows 2000 Features That Enhance Performance
Symmetric Multi-Processing (SMP) Support
CPU, Memory, and I/O Tuning
Enterprise Memory Architecture
I2O
Scatter/Gather I/O
Kerberos Authentication Protocol
Windows Load Balancing Services
Chapter Summary
Apply Your Knowledge
Exercises
6.1. Create a System Monitor Log
6.2. Use the System Monitor to View Logged Data
6.3. Utilize Microsoft Excel to Chart Performance Data
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
7. Analyzing Security Requirements
Introduction
Case Study: Online License Company (OLC)
BACKGROUND
PROBLEM STATEMENT
Lead Developer
OLC Director
CURRENT SYSTEM
OLC Data Analyst
A Licensed Driver
ENVISIONED SYSTEM
OLC IT Director
Indiana BMV Director
SECURITY
OLC IT Director
BMV UNIX Administrator
PERFORMANCE
OLC IT Director
MAINTAINABILITY
BMV UNIX Administrator
OLC Development Manager
The Need for Security
The Internet
Disgruntled Employees
Windows 2000 Authentication
NTLM
Kerberos
Kerberos Background
Key Distribution Center
Ticket-Granting Tickets
Session Tickets
Kerberos Integration
Kerberos Interoperability
Extensions for Public Key Authentication
Single Sign-On with Kerberos
SSL/TLS
Authentication of External Users
Public Key Infrastructure (PKI)
Public Key Cryptography
Digital Certificates
Enterprise Root CA
Subordinate Enterprise CA
Standalone Root CA
Subordinate Standalone CA
PKI Components
PKI Standards in Windows 2000
Open Industry Security Standards
Open Security Architecture
Active Directory and Security
Trust Relationships
Delegation of Administration
Granularity
Inheritance
Dynamic Inheritance
Static Inheritance
Some Recommendations for Securing Active Directory
Securing Data Transmissions
Windows 2000 Predefined IPsec Policies
IPsec for OLC
Predefined Rules and Filter Actions
Security in the Enterprise
Security Policy
Precedence
Group Policy Versus System Policy
Domain Security Policy
Domain Controller Security Policy
A Word About Account Policies
Perspective on the Exam Objective
Security Policies
Chapter Summary
Apply Your Knowledge
Exercises
7.1. Creating a Group Policy Object
7.2. 7.2 Setting Up a Certificate Authority
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
8. Impact of Active Directory
Introduction
Case Study: Dewey, Cheatham, & Howe (DCH)— Attorneys at Law
BACKGROUND
PROBLEM STATEMENT
CURRENT SYSTEM
DCH Partner
Jimmy "the Computer Guy"
Paralegal
ENVISIONED SYSTEM
DCH Senior Partner
Attorneys
PERFORMANCE
SECURITY
MAINTAINABILITY
Senior Partner
Paralegal
AVAILABILITY
Partner
New IT Consultant
Do the Lab
Operating System Upgrades
Need for an Application Inventory
Size Up the Company
Select Your Weapon
Manual Collections
Standalone Applications Versus Client/Server Applications
DOS-Based Applications
A Word About Home-Grown Applications
Categorize the Applications
Analyze the Application Inventory
Priority-One Applications
Priority-Two Applications
Priority-Three Applications
Determine the Problem Applications
Why Do Applications Fail?
Where Are the Problems?
OS/2 and POSIX Applications
DOS Applications
Windows 3.x (16-Bit)Applications
Windows 9x Applications
Windows NT Applications
Understanding the Solutions
Upgrade
Replace
Retire
Removal of NetBIOS
Finding NetBIOS in the Environment
WINS
Clients
Determining Which Applications Use NetBIOS
Planned Changes to Systems and Network Applications
Upgrades to Hardware or Software
Rollout of New Equipment
Technical Support Structure
Administration Models
Technical Support Responsibilities
Administrative Level
Platform Support
Hardware Support
Application-Specific Support
Help Desk
Network and Systems Management
Windows Management Services
Desktop Management
Network Management
Data Center Management
Management Disciplines
Common Services
Presentation Services
Management Services
Change and Configuration Management
Security Management
Network Quality of Service
Storage Management
Summing Up Windows Management Services
Value-Added Management Solutions
Chapter Summary
Apply Your Knowledge
Exercises
8.1. Performing a Manual Software Inventory
8.2. Removing NetBIOS Support
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
9. End-User Needs and Desktop Management
Introduction
Case Study: Needy Needy, Inc.
BACKGROUND
PROBLEM STATEMENT
CURRENT SYSTEM
Executive Secretary
Help Desk Tech
ENVISIONED SYSTEM
IT Manager
Executive Secretary
Data Center Manager
PERFORMANCE
IT Manager
Help Desk Tech
SECURITY
IT Manager
Help Desk Manager
MAINTAINABILITY
IT Manager
Lead Help Desk Tech
AVAILABILITY
Client Care Hotline Manager
AR/AP Manager
What! The End-User?
End-User Discussions
Simplify My Job—Please!
Downtime
Roamers
Conducting the End-User Needs Analysis
Data Management
Data Accessibility
Data Availability
Data Protection
Software Installation and Maintenance
Published Applications
Assigned Applications
The Windows Installer Service
Auto-Healing Applications
Custom Installations
Clean Removal of Applications
ZAP Files
Anatomy of a ZAP File
User and Computer Settings Management
Remote OS Installation
CD-Based Installations
RIPrep Image Format Installations
Remote Installation Services
Requirements for RIS
Technical Support
Change and Configuration Management
Establishing the Client Computing Environment
Setting the Standards
Software Distribution Using the Windows Installer
Remote Desktop Management
Software Distribution and Installation
Software Metering
Diagnostics and Troubleshooting
Implementing Folder Redirection
Making Files Available Offline
Chapter Summary
Apply Your Knowledge
Exercises
9.1. Implement Folder Redirection
9.2. Make Files and Folders Available Offline
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
IV. Designing a Directory Service Architecture
10. DNS and Active Directory
Introduction
It All Begins with DNS
Naming Conventions
NetBIOS Name
NetBIOS in Windows 2000
Fully Qualified Domain Names (FQDNs)
Relative Distinguished Name
An Example—User Principal Name
Concepts in DNS Design
DNS Namespace
Flat Namespaces
Hierarchical Namespaces
Character Sets
DNS Domains
DNS Zones
Forward Lookup Zones
Reverse Lookup Zones
DNS Root Namespace
Name Resolution
The Components of DNS
DNS Servers
Primary Servers
Secondary Servers
Caching-Only Servers
Forwarders
Non-Exclusive Mode
Exclusive Mode
Resolvers
Resource Records
Start of Authority (SOA)
Name Server (NS)
Mail Exchanger (MX)
Address (A)
Pointer (PTR)
Canonical Name (CNAME)
Windows Internet Name Service (WINS)
WINS Reverse (WINS-R)
Service (SRV)
Zone Database Files
Full Zone Transfers
Incremental Zone Transfers
Transfers Using DNS Notify
Zone Transfer Best Practices
DNS Name Resolution
Recursive Queries
Iterative Queries
Naming and Name Services
DNS Naming
Active Directory Naming
Selecting the DNS Service
DNS Zone Data Storage Options
WINS and DHCP Integration
DDNS and DHCP Modes of Interaction
Down-Level Client Mode
Active Directory Mode
How Active Directory Uses DNS
Registration of Domain Controllers
SRV Resource Record Registration
SRV RR Naming
Server Types
Locating Domain Controllers
Namespace Planning
Scope of Active Directory
Best to Have a Single Root Domain
Active Directory and the Internet Namespace
Naming Hierarchy
First DNS Domain Name
Choosing the Root DNS Namespace
Using a Registered DNS for Public and Private
Using a Delegated DNS Subdomain as AD Root
Using Different DNS Domains for Public and Private
Complex Namespace Considerations
Clients That Allow an Internal DNS Root
Clients That Do Not Support an Internal DNS Root
Overlapping Internal and External Namespaces
Best Practices
Case Study: ALLBOOKS,, INC.
BACKGROUND
PROBLEM STATEMENT
CURRENT SYSTEM
ENVISIONED SYSTEM
Allbooks CIO
WayFront Infrastructure Architect
PERFORMANCE
Allbooks CIO
WayFront Infrastructure Architect
SECURITY
Allbooks CIO
MAINTAINABILITY
WayFront Network Consultant
Allbooks CIO
AVAILABILITY
Allbooks CIO
Chapter Summary
Apply your knowledge
Exercises
10.1. Understand Your Options
10.2. Trace DNS Queries
Review Questions
Exam Questions
Answers to Exercises
Exercise 10.1
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
11. Designing the Active Directory Structure
Introduction
Case Study: WayFront Consulting
BACKGROUND
PROBLEM STATEMENT
Project Sponsor
Project Manager
CURRENT SYSTEM
CIO
Lead Design Engineer
ENVISIONED SYSTEM
CIO
Lead Design Engineer
First Things First
Object
Container
Tree
Domains
Organizational Units
Domain Trees
Forest
Site
Trusts
Schema
Directory Partitioning and Distribution
Configuration Container
Replication
Global Catalog
Setting the Stage for Active Directory
Business and Technology Assessment
Operational Environment
Physical Environment
Administrative Environment
Rules of Domain Creation
Integration of Organizational Units
OUs Versus Domains
Making Smart Use of Groups
Enterprise Admins
Schema Admins
The Design Process
Determining the Number of Forests
Planning Your Domain Design
Common Misconceptions
Put Together a Site Plan
The Facts About Sites
Making Use of TCP/IP Subnets
Intra-Site Replication
Inter-Site Replication
Setting Up the Site Links and Bridges
Planning a Site Structure for WayFront
Primary Site: Main Headquarters
Secondary Sites
Tertiary Sites
Site Link Plan for WayFront
Domain Planning
Determining the Number of Domains
Planning the Root Domain
Using a Registered DNS Namespace
Creating a Dedicated Root Domain
Planning for Parent/Child Domain Relationships
WayFront Domain Tree
Making the Connection
Completing the Tree
Planning the Use of Trust Relationships
Shortcut Trusts
External Trusts
Placing DCs and GCs in the Right Spot
Placing Domain Controllers
Placing Global Catalog Servers
Operations Masters
Operations Master Roles
Domain Naming Master
Schema Master
Infrastructure Master
PDC Emulator
RID Master
Placing the Operations Masters
Domain-Based Role Assignment
Managing the Operations Masters
Transferring the Operations Masters Roles
Implications of Losing an Operations Master
Seizing Operations Masters Roles
Migration Concepts
Methods of Migration
In-Place Upgrade
Domain Restructuring
Upgrade and Restructuring Decisions
Chapter Summary
Apply Your Knowledge
Exercises
11.1. Designing the Placement of Domain Controllers
11.2. Utilizing NTDSUTIL.EXE
11.3. Creating the Initial Site Structure
Review Questions
Exam Questions
Answers to Exercises
Exercise 11.1
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
12. Designing an OU and Group Policy Management Structure
Introduction
Organizational Units
Plan Your OU Strategy
Delegation of Administration
Application of Policies
Grouping of Objects with Like Properties
Replacement of Existing Resource Domains
Understanding the Impact of Change
General OU Guidelines
Nesting and Naming
Organizational Structure
Administrative Structure
Flexibility in OU Design
Reasons for Creating Domains and OUs
Organize by Geography
Geographic Based OU Structure Advantages
Geographic Based OU Structure Disadvantages
Organize by Function or Department
Function or Department-Based OU Structure Advantages
Function or Department-Based OU Structure Disadvantages
Organize by Administration
IT Administration-Based OU Structure Advantages
IT Administration-Based OU Structure Disadvantages
Organize by Business Unit
Business Unit-Based OU Structure Advantages
Business Unit-Based OU Structure Disadvantages
Organize by Project
Project-Based OU Structure Advantages
Project-Based OU Structure Disadvantages
REVIEW BREAK
Use the Plan
Designing an OU Structure
OU Associations
Why Are You Creating the OU?
Who Will Manage the OU?
What Permissions Will the OU Manager Require?
Creating the OU Hierarchy
First-Level OUs
Second-Level OUs
Remaining-Level OUs
Nesting and Performance
Preparing for an OU Delegation Plan
Getting the Security Model Straight
AD Security Components
Security Descriptors
Access Control Entries
Ownership
Inheritance
Developing an OU Delegation Plan
Common Delegation Tasks
Define OU Administrator Access
Delegation Methods
Determine Whether Additional OUs Are Necessary
Delegation Tools
Delegation of Control Wizard
Object Security Tab
DSACLS.EXE
Considering Group Policy
How GPOs Work
Viewing the Group Policy Container (GPC)
Viewing the Group Policy Templates (GPT)
Creating and Linking GPOs
The Application of Group Policies
Rules of Inheritance
Blocking
No Override
Using Security Groups to Filter Policy Settings
When Group Policies Apply
Local Group Policies
Mixing Windows 2000 and Windows NT Policies
Order of Application
Creating a Group Policy Management Plan
REVIEW BREAK
Scope of Group Policy Management
Administration Type
Monolithic Design
Layered Design
Delegation of Control
Performance
Structure of Policy Types
Managing Client Computers
Case Study: Speedway Management Corp. (SMC)
BACKGROUND
PROBLEM STATEMENT
CURRENT SYSTEM
Network Manager
Network Engineer
ENVISIONED SYSTEM
Network Manager
CIO
MAINTAINABILITY
Network Manager
Help Desk Manager
PERFORMANCE
Network Manager
CIO
Chapter Summary
Apply Your Knowledge
Exercises
12.1. Creating an OU Structure
12.2. Delegation of Administrative Authority
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
13. Developing a Schema Modification Plan
Introduction
Schema Overview
Locating the Schema
The Schema Container
Active Directory Schema Objects
What Is the Schema Class?
Structural Classes
Abstract Classes
Auxiliary Classes
88 Classes
What Is the Schema Attribute?
Mandatory Attributes
Optional Attributes
Single- or Multi-Valued Attributes
Attribute Syntax
Attribute Indexing and Replication
Indexing a Schema Attribute
Replicating a Schema Attribute to the Global Catalog
Preparing to Modify the Schema
When to Modify the Schema
What Can I Modify?
What Can I Not Modify?
Relevance of Data
How to Modify the Schema
Remove the Safety Locks
Locate the Schema Master and Enable Write Access
Add Appropriate Administrators to Schema Admins
Obtain an Object Identifier (OID)
Implications of Schema Modification
Write Conflicts
Replication Latency
Concurrency Control
Developing a Schema Modification Policy
Initiating Schema Modifications
Planning Schema Modifications
Testing Schema Modifications
Executing Schema Modifications
Case Study: Professional Sales Force (PSF)
BACKGROUND
PROBLEM STATEMENT
CURRENT SYSTEM
Sales Manager
Financial Analyst
ENVISIONED SYSTEM
Sales Manager
Financial Analyst
IT Administrator
MAINTAINABILITY
Sales Manager
AVAILABILITY
Biff the Salesman
Chapter Summary
Apply Your Knowledge
Exercises
13.1. Creating Schema Attributes
13.2. Extending a Schema Class
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
14. Planning for Coexistence
Introduction
Coexistence with Windows NT
Planning Coexistence with NetWare NDS
MSDSS Benefits
Working with MSDSS
MSDSS Sessions
Object Mapping
Object-Level Synchronization
Directional Synchronization
One-Way Synchronization
Two-Way Synchronization
Interoperability Features of SFN
File Migration Utility
File and Print Services for NetWare v.5
Additional NetWare Interoperability Features
Planning Coexistence with UNIX
Why Services for UNIX?
File Sharing with NFS
Server for NFS
Client for NFS
Gateway for NFS
User Name Mapping
Simplification of Administration
Telnet Client
Telnet Server
Services for UNIX MMC
Support for Perl and Perl Scripting
Simplified Account Administration Using NIS
NIS Migration Wizard
Server for NIS
Password Synchronization
UNIX Shell and Utilities
A Bit About the SFU Environment
Implementation of .profile and .kshrc
Command-Line Editing
Common Usage Scenarios
Primarily Windows 2000, Some UNIX
Substantial Mix of UNIX, Windows NT and Windows 2000
Existing UNIX with New Windows 2000 and/or Windows NT
Large UNIX Environment with Existing NIS Domain
What About Kerberos?
Synchronizing Exchange 5.5 and Active Directory
About the ADC
ADC Versioning
Connection Agreements
Configuring Connection Agreements
Configuring the CA Direction
Configuring CA Bridgehead Servers
Creating the Synchronization Schedule
Selecting Objects and Containers to Synchronize
How to Handle Object Deletions
Optimizing CA Settings with Advanced Properties
Exchange 2000 and Active Directory Integration
Case Study: Synchronicity
BACKGROUND
PROBLEM STATEMENT
Owner
CURRENT SYSTEM
UNIX Manager
NetWare Manager
ENVISIONED SYSTEM
NetWare Manager
UNIX Manager
Exchange Manager
MAINTAINABILITY
Active Directory Manager
UNIX Manager
NetWare Manager
Exchange Manager
PERFORMANCE
Global IT Manager
Chapter Summary
Apply Your Knowledge
Exercises
14.1. Create a Two-Way MSDSS Session
14.2. Creating an ADC Connection Agreement
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
V. Preparing For Implementation
15. Designing an AD Implementation Plan
Introduction
Why an Implementation Plan?
A Phased Approach Works Well
Project Phases Defined
Phase One: Goals and Objectives
Determine Goals and Objectives
Make Sure You Have the Budget
Feature Selection and Testing
Questions to Answer About Goals and Objectives
Potential Deliverables
Phase Two: Planning and Design
Assess the Business Environment
Questions to Answer About the Business Environment
Assess the Technical Environment
Questions to Answer About the Technical Environment
Prepare Gap Analysis
Core Solution Design
Feature Design
Functional Specification Layout
Potential Deliverables
Phase Three: Pilot
Lab-Based Pilot
Production Pilot
Analysis and Reporting
Milestones and Potential Deliverables
Phase Four: Execution
Milestones and Potential Deliverables
Phase Five: Closure
Post-Project Analysis
Milestones and Potential Deliverables
Case Study: LandScapes Inc.
BACKGROUND
PROBLEM STATEMENT
KEY BUSINESS OBJECTIVES
KEY TECHNOLOGY OBJECTIVES
NEXT STEP
Chapter Summary
Apply Your Knowledge
Exercises
15.1. Determine Where to Spend the Time
Answers to Exercise 15.1
15.2. Develop an Implementation Plan for LandScapes Inc.
Key Business Objectives
Key Technology Objectives
Review Questions
Exam Questions
Answers to Review Questions
Answers to Exam Questions
Suggested Readings and Resources
VI. Final Review
Designing Windows 2000 Direcotry Services Infrastructure
Chapter 1: Understanding Active Directory
Chapter 2: Planning and Conducting Your Business Assessment
Chapter 3: Analyzing the Results of the Business Assessment
Chapter 4: Analyzing the IT Administration Model
Chapter 5: Analyzing the Physical Environment
Chapter 6: Analyzing Performance-Related Requirements
Chapter 7: Analyzing Security Requirements
Chapter 8: Impact of Active Directory
Chapter 9: End-User Needs and Desktop Management
Chapter 10: DNS and Active Directory
Chapter 11: Designing the Active Directory Structure
Chapter 12: Designing an OU and Group Policy Management Structure
Chapter 13: Developing a Schema Modification Plan
Chapter 14: Planning for Coexistence
Chapter 15: Designing an AD Implementation Plan
Study and Exam Prep Tips
Learning Styles
Study Tips
Study Strategies
Macro and Micro Study Strategies
Active Study Strategies
Common-Sense Strategies
Pre-Testing Yourself
Exam Prep Tips
The MCP Exam
Exam Format
Fixed-Form
Adaptive Form
The Adaptive-Exam Process
Case Study Form
Question Types
Multiple-Choice Questions
Multiple-Rating Questions
Simulation Questions
A Typical Simulation Question
Hot Area Question
Drag and Drop Style Questions
Select and Place
Drop and Connect
Ordered List Questions
Tree Questions
Putting It All Together
More Exam Preparation Tips
During the Exam Session
Fixed-Form Exams
Adaptive Exams
Case Study Exams
Final Considerations
Practice Exam
Answers to the Practice Exam
VII. Appendices
A. Glossary
B. Overview of the Certification Process
Types of Certification
Certification Requirements
How to Become a Microsoft Certified Professional
How to Become a Microsoft Certified Professional+Internet
How to Become a Microsoft Certified Professional+Site Building
How to Become a Microsoft Certified Database Administrator
Windows 2000 Track
Core Exams
Elective Exams
Windows NT 4.0 Track
Core Exams
Elective Exams
How to Become a Microsoft Certified Systems Engineer
Windows 2000 Track
Core Exams
Elective Exams
Windows NT 4.0 Track
Core Exams
Elective Exams
How to Become a Microsoft Certified Systems Engineer+Internet
Core Exams
Elective Exams
How to Become a Microsoft Certified Solution Developer
New Track
Core Exams
Elective Exam
Old Track
Core Exams
Elective Exams
Becoming a Microsoft Certified Trainer
C. What's on the CD-ROM
ExamGear, Training Guide Edition
Exclusive Electronic Version of Text
Copyright Information and Disclaimer
D. Using the ExamGear, Training Guide Edition Software
Exam Simulation
Question Quality
Interface Design
Study Tools
Effective Learning Environment
Automatic Progress Tracking
How ExamGear, Training Guide Edition Works
Interface
Database
Installing and Registering ExamGear, Training Guide Edition
Requirements
Installing ExamGear, Training Guide Edition
Registering ExamGear, Training Guide Edition
Registration Benefits
Removing ExamGear, Training Guide Edition from Your Computer
Using ExamGear, Training Guide Edition
General Description of How the Software Works
Menu Options
File
Online
Registration
Check for Product Updates
Web Browser
Help
Starting a Study Mode Session
Starting Practice Exams and Adaptive Exams
Differences Between the Practice and Adaptive Exams and Study Modes
Starting an Exam
What Is an Adaptive Exam?
Why Do Vendors Use Adaptive Exams?
Studying for Adaptive Exams
ExamGear's Adaptive Exam
Assumptions
Algorithm Assumptions
Unit Scores
Overall Scores
Inconclusive Scores
Question Types and How to Answer Them
Multiple Choice
Drag and Drop
Ordered-List Questions
Ordered-Tree Questions
Simulations
Hot Spot Questions
Standard ExamGear, Training Guide Edition Options
Mark Question and Time Remaining
Mark Question
Time Remaining
Item Review
The Item Review Questions Tab
Columns
The Current Score Tab
Review Marked Items
Review Incomplete
Examination Score Report Screen
Show Me What I Missed Browse Sequence
Checking the Web Site
Obtaining Updates
The Catalog Web Site for Updates
Product Updates Dialog Box
Types of Updates
Free Program Updates
Free Database Updates
Contacting New Riders Publishing
Technical Support
Customer Service
Product Updates
Product Suggestions and Comments
License Agreement
License
Software and Documentation
License Term and Charges
Title
Updates
Limited Warranty and Disclaimer
Limitation of Liability
Miscellaneous
U.S. Government Restricted Rights
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
14. Planning for Coexistence
Next
Next Chapter
15. Designing an AD Implementation Plan
Part V. Preparing For Implementation
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset