How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Elsevier, Feb 8, 2006 - Computers - 500 pages
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.
The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement.
The next book in our best selling and critically acclaimed How to Cheat series. This is the perfect book for users who have already purchased How to Cheat at Managing Windows 2003 Small Business Server.
* Active Directory is the market leader in the directory services space, and 57% of all Microsoft corporate customers have deployed AD
* Follows Syngress's proven "How To Cheat" methodology
* Companion Web site offers dozens of templates, "Cheat Sheets", and checklists for readers
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 2 Developing the Active Directory Infrastructure Designs
Chapter 3 Developing the Network Services Design
Chapter 4 Designing the Logical Components
Chapter 5 Name Resolution
Other editions - View all
Active Directory Active Directory-integrated authentication bandwidth chapter client client computer configured connection created database default delegation deployed deployment DHCP server Directory database discussed DNS namespace DNS server DNS zone DNSSEC domain controllers domain model domain name dynamic updates ensure environment example existing external firewall forest FSMO roles function GC server GPOs Group Policy hardware host identify implementation installed internal DNS Internet IP address Kerberos logon Microsoft multiple name resolution NetBIOS name NTLM number of users objects operating systems options organization password performance placement protocol queries RADIUS remote access remote access policies replication requirements resource records root domain router schema scope Server 2003 DNS service admins settings shown in Figure snap-in specific subnet TCP/IP tion topology traffic trust relationships upgrade user accounts WAN links Windows NT 4.0 Windows Server 2003 WINS server