Free Essay

Active Directory

In:

Submitted By bigguy856
Words 563
Pages 3
1. Explain the function of the following Windows Server 2008 services: i. Active Directory Federation Services ii. Active Directory Lightweight Directory Services iii. Active Directory Certificate Services iv. Active Directory Rights Management Services

i. Active Directory Federation Services is a standards-based service that allows the secure sharing of identity information between business partners (know as federations) across the extranet.

When a user needs to access a Web application from one of its federation partners, the users own organization is responsible for authenticating the user and providing identity information in the form of "claims" to the partner that hosts the Web application.

The hosting partner uses its trust policy to map the incoming claims to claims that are understood by its Web application, which uses the claims to make authorization decisions.

ii. Active Directory Lightweight Directory Services is a Lightweight Directory Access Protocol (LDAP) directory service designed for use with directory-enabled applications. A directory-enabled application is one that uses a directory, as opposed to a database or flat file, for its data store.

iii. Active Directory Certificate Services is an Identity and Access Control security technology that provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies.

iv. Active Directory Rights Management Services is an information protection technology that works with AD RMS–enabled applications to help safeguard digital information from unauthorized use. Content owners can define who can open, modify, print, forward, or take other actions with the information.

2. Explain Server Manager, the new role-based management tool for Windows Server 2008, and describe the tools it was designed to replace.

Server Manager is a new feature that is included in Windows Server 2008, which is designed to guide information technology (IT) administrators through the process of installing, configuring, and managing server roles and features that are part of the Windows Server 2008 release.

Server Manager replaces a number of features from Microsoft Windows® Server® 2003 such as Manage Your Server, Configure Your Server, and Add or Remove Windows Components.

3. Define the Windows System Resource Manager (WRSM) and how it gives the administrator greater control over the allocation of system resources.

Windows System Resources Manager lets administrators allocate processor and memory resources to applications, users, Remote Desktop Services sessions, and Internet Information Services (IIS) application pools.

Using Windows System Resource Manager provides two key benefits: * More services can run on a single server because service availability can be improved through dynamically managed resources. * High-priority users or system administrators can access the system even during times of maximum resource load.
4. Explain how Network Access Protection (NAP) creates a security architecture that allows administrators to control access to critical resources and assist users in meeting security requirements.

Network Access Protection (NAP) is designed to help administrators maintain the health of the computers on the network, which in turns helps maintain the overall integrity of the network.

It is not designed to secure a network from malicious users. For example, if a computer has all the software and configurations that the network access policy requires, the computer is considered healthy or compliant, and it will be granted the appropriate access to the network.

NAP does not prevent an authorized user with a compliant computer from uploading a malicious program to the network or engaging in other inappropriate behavior.

Similar Documents

Free Essay

Active Directory

...Active Directory Scenario: The small business that you created new domain controllers for now wants you to develop a backup and recovery plan for Active Directory. You also need to develop a monitoring scheme to ensure the new Active Directory environment remains available. Explain this backup and recovery plan along with the tools needed to monitor the active directory environment. Submission Requirements: Submit your response in a 1-2 page Microsoft Word document through the Questa Learning Plan. Evaluation Criteria: Your instructor will use the following points for evaluating your performance in this assessment: * Did you discuss a backup strategy or Active Directory? * Did you discuss a recovery plan for Active Directory? * Did you discuss a monitoring scheme for Active Directory? Windows Server Backup provides several Group Policy settings that give you some limited control over how backups work on your servers. With these backup policies, you can mitigate some of the risks associated with people performing unauthorized backups to obtain access to unauthorized data. The options include: Allow Only System Backup If this is set, Windows Server Backup can only back up critical system volumes. It cannot perform volume backups. Disallow Locally Attached Storage as Backup Target When enabled, this setting does not allow backups to locally attached drives. You can only back up to a network share. Disallow Network as Backup Target This setting does not...

Words: 297 - Pages: 2

Free Essay

Active Directory

...To back up Active Directory, you must install the Windows Server Backup feature from the Server Manager console. To perform backups from the command line, you will also need to install Windows PowerShell. Windows Server Backup supports the use of the disk drives as backup destinations. Windows Server 2008 supports two types of backup: • Manual backup: This type of backup can be initiated by using Server Backup or the Wbadmin.exe command-line tool when a backup is needed. You must be a member of the Administrators group or the Backup Operators group to launch a manual backup. • Scheduled backup: Members of the local Administrators group can schedule backups using the Windows Server Backup utility or the Wbadmin.exe command-line tool. Scheduled backups will reformat the desired drive that hosts the backup files, and can only be performed on a local physical drive that does not have any critical volumes. With all this taken into consideration I would perform a manual backup every time a major change is taking place and then use a scheduled backup every month to make sure every small change is saved and is not over looked. When a domain has multiple domain controllers, the Active Directory database is replicated within each domain controller. Windows Server 2008 allows several different restoration methods, depending on the goals for your restore. Wbadmin, is the command-line component of the Windows Server Backup snap-in, which restores a single Active Directory domain controller...

Words: 423 - Pages: 2

Premium Essay

Active Directory

...Chapter 1: 1. Which of the following items is a valid leaf object in Active Directory? a. Domain b. User c. Application partition d. OU 2. Which of the following domain controllers can be joined to a forest that is currently set at the Windows Server 2008 forest functional level? a. Windows 2000 b. Windows Server 2003 c. Windows Server 2008 d. Windows NT 4.0 3. You are planning an Active Directory implementation for a company that currently has sales, accounting, and marketing departments. All department heads want to manage their own users and resources in Active Directory. What feature will permit you to set up Active Directory to allow each manager to manage his or her own container but not any other containers? a. Delegation of control b. Read-only domain controller c. Multimaster replication d. SRV records 4. The process of keeping each domain controller in synch with changes that have been made elsewhere on the network is called __________. a. Copying b. Osmosis c. Transferring d. Replication 5. The __________ Domain Controller contains a copy of the ntds.dit file that cannot be modified and does not replicate its changes to other domain controllers within Active Directory. a. Secondary b. Primary c. Read-Only d. Mandatory 6. What type of trust is new to Windows Server 2008 and is only available when the forest functionality is set to Windows Server 2008? a. Parent-child trust b. Two-way...

Words: 591 - Pages: 3

Premium Essay

Active Directory

...Project- Windows 2012 Management 12/5/14 Active Directory is a directory service that Microsoft developed for Windows domain networks and is included in most Windows Server operating systems as a set of processes and services. An Active Directory domain controller authenticates and allows all users and computers in a Windows domain type network- assigning and enforcing security policies for all computers and installing or updating software. When a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or normal user. Active Directory makes use of Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS. Active Directory, like many information-technology efforts, originated out of a democratization of design using Request for Comments or RFCs. The Internet Engineering Task Force (IETF), which oversees the RFC process, has accepted numerous RFCs initiated by widespread participants. Active Directory incorporates decades of communication technologies into the overarching Active Directory concept then makes improvements upon them. Microsoft previewed Active Directory in 1999, it was first released with Windows 2000 Server edition, and revised it to extend functionality and improve administration in Windows Server 2003. Additional improvements came with Windows Server 2003 R2, Windows Server 2008, and Windows...

Words: 627 - Pages: 3

Free Essay

Active Directory

...1. Benefits of directory services (AD DS) Without getting too technical and wordy, but being able to help the client understand more about what active directory does, the following can be explained: - AD shows a better representation of the network by a process known as centralization. Centralization is the process of managing users regardless of the size of the network in one location. - Utilizes organizational units to improve scalability. If an organization is large, OUs can help simplify the task by grouping resources (such as users and computers) that have similar rights. - Replication makes it easier because any changes that are made are replicated to other domain controllers so that the network can run more efficiently. http://www.techrepublic.com/article/the-benefits-of-moving-clients-to-an-active-directory-environment/ Active Directory Domain Services (AD DS) benefits: Redundancy Fault Tolerance Serves as a domain controller that authenticates users when logging on to a network. Participates in storing, modifying, and maintaining the AD database (Textbook) Page 3 for major benefits of AD DS Mark is concerned about ensuring the network so that it has little to no downtime at all. AD DS can help ease this issue because of the system providing fault tolerance. It continues to provide services even if 1 or more servers experience hardware failure or loss of connectivity. How does it do this? It does this through its multimaster...

Words: 625 - Pages: 3

Free Essay

Active Directory

...Windows Server 2003 Active Directory Judith Che Strayer University of Maryland Author Note Judith Che, Strayer University of Maryland. Any questions regarding this article should be address to Judith Che. Strayer University Maryland, White Marsh, MD 21085. Company’s today relay on good networking in order for their business to grow and succeed. A system engineer requires the ability, knowledge, and skill to plan and manage today’s networking which faces an ever-increasing variety of applications. We need to be skilled and informed to manage a network running Windows Server 2003 Active Directory. Present day networking administrators have difficulties ensuring that network resources are available to users when access is needed and securing the network in such a way that available resources are accessible to the proper user with the proper permission. We will have to solve networking problems including troubleshooting, configuration, installation, administration, and managing element. Starting from choosing the best Windows Server 2003 Edition that will meet the company’s needs in terms of price, performance and features; work group woes, name resolution nightmares and DNS name conflicts to server security. These problems can be solved with proper planning, managing, and designing a day-to-day administration of an Active Directory domain within their Windows Server 2003 network environment. We predict that implementing a Windows Server 2003 Active Directory will beat and exceed...

Words: 5782 - Pages: 24

Free Essay

Active Directory

...Based on the Active Directory implementation plan that I provided in the week two discussions, I wanted to create a plan that created strategies that would separate or let you know who users in which groups using Windows material are. I want to show that nesting a plan like this will be easier on the user, administrator, and company. Groups these days are used to keep users, connected parts, and everyone that is part of the domain. The administrator or Point of Contact can make things a lot easier when they use groups or grouping. Everything that is stored in the computer’s system from employee start date to age to termination, etc. is stored in the groups. (Microsoft TechNet, 2007) All the groups and users will have the same setting for security and permissions. There are a few groups that can be used. The types of groups we will use here are distribution groups and Security groups. The distribution groups will be used with all email applications for emails to be sent/received to all other users in that email list. Each group will be allowed to access the network. They can also give rights to users in the Active Directory and set different security issues on the network. Distribution and groups are made by the scope with a domain. The groups for Riordan will be local. It gives access to domains and security. (Cooper, 2011) An example of this would be any user or member using the domain. Usually members of this group do not change. The other groups usually only...

Words: 499 - Pages: 2

Premium Essay

Active Directory

...Riordan Active Directory Migration Tyler Dresslar POS 421 September 3, 2012 R.Chung Riordan Active Directory Migration Introduction With regards to Riordan Manufacturing acquiring new severs with Active Directory Technology, the company must look at migrating to Windows Server 2008 R2 in order facilitate the streamlining of work for the Information Technology Department. Moving to Active Directory will save Riordan TIME and MONEY, the benefits of such a move and implementation will be explained in the following paragraphs. Microsoft Active Directory Domain Services are the foundation for distributed networks built on Windows 2000 Server, Windows Server 2003 and Microsoft Windows Server 2008 operating systems that use domain controllers. Active Directory Domain Services provide secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services. Active Directory Domain Services provide support for locating and working with these objects. Windows 2000 Server and later operating systems provide a user interface for users and administrators to work with the objects and data in Active Directory Domain Services. Network administrators write scripts and applications that access Active Directory Domain Services to automate common administrative tasks, such as adding users and groups, managing printers, and setting permissions for network resources. Independent software vendors and end-user developers can use Active...

Words: 603 - Pages: 3

Free Essay

Active Directory

...1.By using SYBEX, please write step by step to A) Create new subdomain named by KualaLumpurCampus B) Create site name TimaBuilding C) Create new TWO (2) server object within TimaBuilding site, type ExamUnitTima & AdminTima D) Create another site name BlockA with a server object name BlockALibrary E) Create OU structure F) Create Active directory object G) Create and publishing printer H) Create and publishing shared folder 2. Find step by step how to assigning user privileges using Active Directory. 1. Go to Start} Programs} Administrative Tools} Active Directory Users and Computers. 2. Double-click the domain node in the console tree. 3. Click the Users folder. 4. Right-click on the GFI_ESEC_Floppy_ReadOnly folder and click Properties. 5. Click the Members tab and click Add. 6. Click Look in to display a list of domains from which users and computers can be added to the group. 7. Select your domain. 8. Click on your user name and then click OK. Testing Since the user groups created by GFI EndPointSecurity are already configured (and assigned privileges) in the default protection policies. You will be automatically assigned read privileges as soon as you add your name to the GFI_ESEC_Floppy_ReadOnly group, without having to bring up the GFI EndPointSecurity user console. To verify this: 1. Insert a formatted floppy disk...

Words: 735 - Pages: 3

Premium Essay

Active Directory Benefits

...One of the benefits of moving an organization to an Active Directory environment is the use of trees and forests. Trees are groups of one or more domains who share resources. Each domain within the tree trusts the other domains in areas of security. A domain added to a tree becomes a child of that tree root domain. These trees can then become a part of a forest. A forest is a collection of numerous trees who share a common large-scale catalog, directory outline, logical structure, and directory arrangement. Forests permit organizations to group their divisions that may need to operate self-sufficiently and use different naming patterns, but still need to communicate with the entire organization through trustworthy sites and share some of the same resources. This allows the organization to reduce costs without added complication and have greater security. (1) Another benefit would be user management. Due to active directory’s forest design, users in one domain are known to the forest domain director. This provides for more flexibility and ease of access for users who must travel from one site to another. A user can travel from site 1 to site 2 and still be able to log in with their usual username and password and have access to all resources throughout the domain. (2) Another useful tool within active directory is group policy. Say you have an employee or group of employees who don’t necessarily follow your rules for computer use. They change their CPU’s desktop environment...

Words: 434 - Pages: 2

Free Essay

Active Directory Replication

...There are a multitude of things that can go wrong with an Active Directory Replication process, but like most preventative maintenance issues, issues can typically be resolved quickly if proper precautions are taken. Such problems include the DNS Lookup Failure coming up as an error in the logs. This is caused by a DNS zone having improper links to the child zones, the IP configuration of the DCs having misconfigured DNS servers, or the mapping of the current IP address to the domain controller isn't correct, along with many other things. In order to fix these types of errors, it's important to test the connectivity through the prompt of dcdiag and verify that the CNAME records. If things aren't verifying correctly, restarting netlogon should fix the issue. But if not, verifying the IP configuration and the DNS servers are correct should correct the error. If an Access Denied from Active Directory on a manual replication begins, there is most likely an issue with permissions with the replication synchronization. Only certain containers that have had that assignment are eligible for manual replication. To be able to fix this, run the repadmin or replmon and that should be able to make the replication work for that directory partition. A very likely issue that can arise between active directories is that the replication between all the sites can become slow. This can be caused by an increase in the latency in the lines, or even if the number of sites continues to go...

Words: 337 - Pages: 2

Free Essay

Active Directory at Campus

...Active Directory Configuration for This Campus Three types of user accounts can be created and configured in Windows Server 2008 installation. The ITT Technical has to use a Domain Controller because the built-in Administrator account created in Active Directory has a full control of the domain in which it created. Groups have been used to make network permission easier to administer. For ITT Tech I will make three distinct groups of users: students, instructors, and administrators. When I determine in which group type I can allocate the students, instructors, and administrators. I have to nesting some groups. To add security and distribution using the group types that are available in the Active Directory domain are as follow: domain local groups, global groups, and universal groups. I will place in the domain local group: Director, Dean, Associate Dean, Registrar, and the Dept. Chair. Because they can contain user accounts, computer accounts, global groups, and universal groups from any domain, in addition to other domain local groups from the same domain. So, the domain local group can has access to all groups in the hierarchy three or forest and UOs. In the global group I will allocate the Instructors and Administrators. This global group can contain user accounts, computer accounts, and/or other global groups only from within the same domain as the global group. Global groups can be used to grant or deny permissions to any resource located in any domain in the forest...

Words: 384 - Pages: 2

Free Essay

Active Directory Accounts

...Active Directory Accounts Active Directory Accounts There is a lot of default groups for users called built in groups. In this paper I will be addressing four of them and the security and risk that arise with them. First we have the administrators group, in this group there are not many users do to the amount of permissions that are bestowed upon the user. They have complete control over everything otherwise known as Full Control which means they can read write execute modify and delete but believe you me myself would detour anybody but a certain few the power to delete. So by default the built in group Administrators gives full control so only a select few will be put into this group and in most cases just one person. Also the administrators group allows the user to have complete control over the domain controllers to add users and set permissions. So the only people you would ever see in this group are Network Administrators. There are a lot of other things this group can do but for this paper that’s all I’m getting into. The next built in group I’ll be talking about is the Account Operators with this account the users are limited when it comes to permissions. They can modify and delete user and user group information but only on their local domain but they can’t modify anything having to do with administrators. So locally they could cause a threat to local groups and users but across the network they have no control so if there is an issue to arise cause by a member...

Words: 801 - Pages: 4

Free Essay

Benefits of Active Directory

...Unit 8 Assignment 2 Benefits of Active Directory An Active Directory structure is a hierarchical arrangement of information about objects. The objects fall into two broad categories: resources (e.g., printers) and security principals (user or computer accounts and groups). Security principals are assigned unique security identifiers (SIDs). Each object represents a single entity—whether a user, a computer, a printer, or a group—and its attributes. Certain objects can contain other objects. An object is uniquely identified by its name and has a set of attributes—the characteristics and information that the object represents— defined by a schema, which also determines the kinds of objects that can be stored in Active Directory. The schema object lets administrators extend or modify the schema when necessary. However, because each schema object is integral to the definition of Active Directory objects, deactivating or changing these objects can fundamentally change or disrupt a deployment. Schema changes automatically propagate throughout the system. Once created, an object can only be deactivated—not deleted. Changing the schema usually requires planning. Sites are physical (rather than logical) groupings defined by one or more IP subnets. AD also holds the definitions of connections, distinguishing low-speed (e.g., WAN, VPN) from high-speed (e.g., LAN) links. Site definitions are independent of the domain and OU structure and are common across the...

Words: 557 - Pages: 3

Free Essay

Active Directory Backup

...supported by Active Directory. Describe the difference between each of these backup strategies; how they are implemented and what tools can be deployed to accomplish these tasks. Active directory has two different types of backups. They are NTBACKUP and Windows Server Backup. The Windows Server Backup is the only “all in one” type of backup. It allows you to work with Volume Shadow Copy Service snapshots in Active Directory. The Window’s Server Backup lets you backup to direct-attached disk volumes, network shares, external hard drives and even DVD’s. You are also able to utilize Group Policy settings to help keep the files safe from people who should not have access to them. The next backup option is NTBACKUP which is a file based backup tool but it has been replaced with the Windows Server Backup. 2. Explain fragmentation. Compare and contrast online defragmentation and offline defragmentation. Fragmentation is when parts of a file are saved in several different areas on the hard disk instead of all together. Online defragmentation is an automated defragmentation process that runs on a schedule. With online defragmentation the physical size of the database is not reduced. Offline defragmentation is just the opposite of online. Offline defragmentation is used to shrink the database size by removing the unused spaces. 3. What factors must be considered and planned to implement a successful Disaster Recovery Plan for a network using Active Directory? A couple factors...

Words: 498 - Pages: 2