• Main Menu
  • Microsoft Active Directory

    • Understanding Organizational Units

      Understanding Organizational Units

      An organizational unit (OU) is a container that logically organizes and groups Active Directory objects within domains. OUs are not part of the DNS namespace. They organize Active Directory objects into logical administrative groups. OUs therefore serve as containers in which users can create and manage Active Directory objects. OUs are considered the smallest unit

    • Active Directory Organizational Units

      Active Directory Organizational Units

      An object is a set of attributes that represents a network resource, say a user, a computer, a group policy, etc and object attributes are characteristics of that object stored in the directory. For example, some of the attributes of a user object might include the user's first name, last name, department, and e-mail address

    • Active Directory Objects

      Active Directory Objects

      The Active Directory data store, also referred to as directory, contains data on users, groups, computers, and on which resources these users, groups, and computers can access. It holds all Active Directory information. Each domain controller within a domain holds a readable/writable replica of the Active Directory data store that consists of information pertaining to

    • Implementing and Managing Group Policy Objects (GPOs)

      Implementing and Managing Group Policy Objects (GPOs)

      On Overview on Group Policy Object (GPO) Implementation and the Group Policy Object Editor Group Policy settings are stored in a Group Policy Object (GPO). The types of Group Policy settings which can be stored in a GPO are listed below: Computer configuration settings are located in the Computer Configuration node. User configuration settings are

    • Group Policy Terminology and Concepts

      Group Policy Terminology and Concepts

      What is Group Policy Group Policy is an Active Directory feature that provides the means for you to effectively and efficiently manage large numbers of computers. You can manage both user and computer configuration settings centrally, from one position of administration. You can define group policies as being a collection of user and computer configuration

    • Understanding Trust Relationships

      Understanding Trust Relationships

      In the Windows NT domain model, domains had to be bound together through trust relationships simply because the SAM databases used in those domains could not be joined. What this meant was that where a domain trusted another Windows NT domain, the members of the domain could access network resources located in the other domain.

    • Understanding Forests and Domains

      Understanding Forests and Domains

      A domain is a collection of computers and resources that share a common security database, in this case, the Active Directory database. Computers in the domain also have a common namespace. A namespace is the hierarchical grouping of service and object names that are stored in Active Directory and DNS. Active Directory and DNS namespaces

    • Directory Partitions

      Directory Partitions

      The Active Directory database is logically separated into directory partitions: Schema partition Configuration partition Domain partition Application partition Each partition is a unit of replication and each partition has its own replication topology. Replication occurs between directory partition replicas. Minimum two directory partitions are common among all domain controllers in the same forest: the schema

    • Active Directory Groups

      Active Directory Groups

      Groups are containers that contain user and computer objects within them as members. When security permissions are set for a group in the Access Control List on a resource, all members of that group receive those permissions. Domain Groups enable centralized administration in a domain. All domain groups are created on a domain controller. In

    • Forest and Domain Functional Levels

      Forest and Domain Functional Levels

      Domain and forest functional levels provide a means of enabling additional domain and forest-wide Active Directory features, remove outdated backward compatibility in an environment, and improve Active Directory performance and security. In Windows 2000, the terminology for domain functional levels was domain modes. Forests in Windows 2000 have one mode and domains can have the

    121 queries in 0.347 seconds.