Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Active Directory Administration Cookbook, Second Edition
  • Table Of Contents Toc
  • Feedback & Rating feedback
Active Directory Administration Cookbook, Second Edition

Active Directory Administration Cookbook, Second Edition

By : Sander Berkouwer
5 (3)
close
close
Active Directory Administration Cookbook, Second Edition

Active Directory Administration Cookbook, Second Edition

5 (3)
By: Sander Berkouwer

Overview of this book

Updated to the Windows Server 2022, this second edition covers effective recipes for Active Directory administration that will help you leverage AD's capabilities for automating network, security, and access management tasks in the Windows infrastructure. Starting with a detailed focus on forests, domains, trusts, schemas, and partitions, this book will help you manage domain controllers, organizational units, and default containers. You'll then explore Active Directory sites management as well as identify and solve replication problems. As you progress, you'll work through recipes that show you how to manage your AD domains as well as user and group objects and computer accounts, expiring group memberships, and Group Managed Service Accounts (gMSAs) with PowerShell. Once you've covered DNS and certificates, you'll work with Group Policy and then focus on federation and security before advancing to Azure Active Directory and how to integrate on-premise Active Directory with Azure AD. Finally, you'll discover how Microsoft Azure AD Connect synchronization works and how to harden Azure AD. By the end of this AD book, you’ll be able to make the most of Active Directory and Azure AD Connect.
Table of Contents (18 chapters)
close
close

What this book covers

Chapter 1, Optimizing Forests, Domains, and Trusts, discusses how Active Directory for large organizations entails managing many logical aspects of Active Directory. This chapter focuses on the intangible aspects of Active Directory: forests, domains, trusts, schemas, and partitions.

Chapter 2, Managing Domain Controllers, shows how domain controllers represent Active Directory towards devices, applications, and users. 

Chapter 3, Managing Active Directory Roles and Features, details how some domain controllers are created more equal than others. The differences between domain controllers and how to manage them are described in this chapter. 

Chapter 4, Managing Containers and Organizational Units, explains how there is a standard set of containers and OUs that are created during the installation of Active Directory. These are usually confused by Active Directory administrators. This chapter will help administrators understand when and why they need to use OUs instead of containers and how to perform all common tasks.

Chapter 5, Managing Active Directory Sites and Troubleshooting Replication, looks at how a site is a logical means to represent the physical aspects of AD. In this chapter, you will create and manage sites, subnets, and sitelinks. The focus here will also be on identifying, managing, and solving AD replication problems.

Chapter 6, Managing Active Directory Users, looks at Active Directory objects, which are where you manage the organization's resources. With the effective tips and tricks given in this chapter, you will be able to create, delete, and manage users. 

Chapter 7, Managing Active Directory Groups, looks at groups, which are the cornerstone to providing access in Active Directory. With the information in this chapter, you will be able to create, delete, and manage groups and change the scope of a group based on your requirements. 

Chapter 8, Managing Active Directory Computers, discusses how Active Directory computer objects offer single sign-on and a secure channel between devices, domain controllers, and resources. 

Chapter 9, Managing DNS, looks at Domain Name System (DNS), which is important to Active Directory. While not every domain controller is a DNS server, most are. You will learn how to manage DNS.

Chapter 10, Getting the Most Out of Group Policy, looks at Group Policy, which helps to control the settings deployed to the user objects and computers of your Active Directory infrastructure. In this chapter, we will cover recipes to work with Group Policy objects (GPOs) to help bring greater understanding to this topic.  

Chapter 11, Securing Active Directory, discusses how Active Directory plays a critical role in the IT infrastructure and safeguards the security of different network resources in an interconnected environment. In this chapter, we will cover a set of practical techniques that will help administrators protect an enterprise Active Directory environment.

Chapter 12, Managing Certificates, covers certificates. To secure communications between hosts and the internet, certificates can be issued by certification authorities (CAs). In this chapter, you'll learn how to set one up, manage it, and optionally decommission it.

Chapter 13, Managing Federation, looks at federation, which is the way organizations collaborate using open authentication standards. You will learn how to set up, configure, and manage Active Directory Federation Services (AD FS) servers and Web Application Proxy servers in this chapter.

Chapter 14, Handling Authentication in a Hybrid World (AD FS, PHS, PTA, and DSSO), shows you how to integrate Active Directory identities with your Azure AD. The information in this chapter will revolve around managing AD FS, PHS, PTA, and DSSO.

Chapter 15, Handling Synchronization in a Hybrid World (Azure AD Connect), explains how synchronization works with Azure AD Connect and how to customize it. It helps you choose the right source anchor attribute and manage the Azure AD Connect service accounts.

Chapter 16, Hardening Azure AD, discusses how many organizations depend on the integrity of the privileged accounts that manage IT systems for the security of business assets. Cyber-attackers focus on Active Directory and Azure AD to gain access to an organization's sensitive data. This chapter will offer expert tips on hardening security with Azure AD.

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY