Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Mastering Active Directory
  • Toc
  • feedback
Mastering Active Directory

Mastering Active Directory

By : Dishan Francis
4.4 (10)
close
Mastering Active Directory

Mastering Active Directory

4.4 (10)
By: Dishan Francis

Overview of this book

Active Directory is a centralized and standardized system that automates networked management of user data, security, and distributed resources and enables interoperation with other directories. If you are aware of Active Directory basics and want to gain expertise in it, this book is perfect for you. We will quickly go through the architecture and fundamentals of Active Directory and then dive deep into the core components, such as forests, domains, sites, trust relationships, OU, objects, attributes, DNS, and replication. We will then move on to AD schemas, global catalogs, LDAP, RODC, RMS, certificate authorities, group policies, and security best practices, which will help you gain a better understanding of objects and components and how they can be used effectively. We will also cover AD Domain Services and Federation Services for Windows Server 2016 and all their new features. Last but not least, you will learn how to manage your identity infrastructure for a hybrid-cloud setup. All this will help you design, plan, deploy, manage operations on, and troubleshoot your enterprise identity infrastructure in a secure, effective manner. Furthermore, I will guide you through automating administrative tasks using PowerShell cmdlets. Toward the end of the book, we will cover best practices and troubleshooting techniques that can be used to improve security and performance in an identity infrastructure.
Table of Contents (20 chapters)
close

Microsoft Advanced Threat Analytics

Latest Microsoft reports show that it can take an average of 146 days to identify an identity infrastructure security breach. There are certain reasons for this:

  • We fight against human adversaries, and they keep changing their tactics for attacks, which cannot be detected by traditional perimeter defense solutions.
  • Existing security solutions require time and knowledge to set up, fine-tune, and maintain.
  • Going through a large number of logs and reports to identify risks and issues is not practical as engineers could miss important events.
  • Most of the existing security solutions are for preventing attackers at the perimeter level. They do not have a way to detect the attackers once they have successfully logged in to the infrastructure.

I do not allow anyone to drive my car. Not even my lovely wife. I didn't make it, but from the day I...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete