Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
LEARNING PYTHON, 5TH EDITION POWERFUL OBJECT-ORIENTED PROGRAMMING
NRS 2880.00
 
Book details / order
ACTIVE DIRECTORY COOKBOOK, 4TH EDITION SOLUTIONS FOR ADMINISTRATORS & DEVELOPERS [COVERS WINDOWS SERVER 2012 AND POWERSHELL 3.0]
Take the guesswork out of deploying, administering, and automating active directory. with hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with microsoft’s network directory service. this fourth edition includes troubleshooting recipes for windows server 2012, windows 8, and exchange 2013, based on valuable input from windows administrators. you’ll also find quick solutions for the lightweight directory access protocol (ldap), active directory lightweight directory services (ad lds), multi-master replication, dns, group policy, and many other features. manage new ad features, such as the recycle bin, group managed service accounts, and fine-grained password policies work with ad from the command line and use windows powershell to automate tasks remove and create forests, domains, and trusts create groups, modify group scope and type, and manage membership delegate control, view and modify permissions, and handle kerberos tickets import and export data with ldap data interchange format (ldif) synchronize multiple directories and enforce data integrity within a single or multiple stores back up ad, and perform authoritative and non-authoritative restores about the author brian svidergol specializes in microsoft infrastructure and cloud-based solutions around windows, active directory, microsoft exchange, system center, virtualization, and mdop. he holds the mct, mcitp (ea), mcitp (va), mcitp (exchange 2010), and several other microsoft and industry certifications. brian authored microsoft official curriculum (moc) course 6426c - configuring and troubleshooting identity and access solutions with windows server 2008 active directory. he has also worked on microsoft certification exam development and related training content for several years. when he isn’t working on technology projects, he enjoys family time, basketball, and gaming. robbie allen is a technical leader at cisco systems, where he has been involved in the deployment of active directory, dns, dhcp, and several network management solutions. robbie was named a windows server mvp in 2004 and 2005 for his contributions to the windows community and the publication of several popular o'reilly books. robbie is currently studying at mit in its system design and management program. for more information, see robbie's web site at www.rallenhome.com. table of contents: chapter 1 getting started approach to the book where to find the tools getting familiar with ldif replaceable text where to find more information chapter 2 forests, domains, and trusts introduction creating a forest removing a forest creating a domain removing a domain removing an orphaned domain finding the domains in a forest finding the netbios name of a domain renaming a domain raising the domain functional level to windows server 2012 raising the functional level of a windows server 2008 or 2008 r2 forest using adprep to prepare a domain or forest for windows server 2012 determining whether adprep has completed checking whether a windows domain controller can be upgraded to windows server 2003 or 2008 creating an external trust creating a transitive trust between two ad forests creating a shortcut trust between two ad domains creating a trust to a kerberos realm viewing the trusts for a domain verifying a trust resetting a trust removing a trust enabling sid filtering for a trust enabling quarantine for a trust managing selective authentication for a trust finding duplicate sids in a domain adding additional fields to active directory users and computers chapter 3 domain controllers, global catalogs, and fsmos introduction promoting a server to a domain controller promoting a server to a read-only domain controller performing a two-stage rodc installation modifying the password replication policy promoting a server to a windows server 2012 domain controller from media demoting a domain controller automating the promotion or demotion of a domain controller troubleshooting domain controller promotion or demotion problems verifying the promotion of a domain controller removing an unsuccessfully demoted domain controller renaming a domain controller finding the domain controllers for a domain finding the closest domain controller finding a domain controller’s site moving a domain controller to a different site finding the services a domain controller is advertising restoring a deleted domain controller in windows server 2012 resetting the tcp/ip stack on a domain controller configuring a domain controller to use an external time source finding the number of logon attempts made against a domain controller enabling the /3gb switch to increase the lsass cache enabling and disabling the global catalog determining whether global catalog promotion is complete finding the global catalog servers in a forest finding the domain controllers or global catalog servers in a site finding domain controllers and global catalogs via dns changing the preference for a domain controller disabling the global catalog requirement for user logon finding the fsmo role holders transferring a fsmo role seizing a fsmo role finding the pdc emulator fsmo role owner via dns chapter 4 searching and manipulating objects introduction viewing the rootdse viewing the attributes of an object counting objects in active directory using ldap controls using a fast or concurrent bind connecting to an object guid connecting to a well-known guid searching for objects in a domain searching the global catalog searching for a large number of objects searching with an attribute-scoped query searching with a bitwise filter creating an object modifying an object modifying a bit-flag attribute dynamically linking an auxiliary class creating a dynamic object refreshing a dynamic object modifying the default ttl settings for dynamic objects moving an object to a different ou or container moving an object to a different domain referencing an external domain renaming an object deleting an object deleting a container that has child objects viewing the created and last-modified timestamp of an object modifying the default ldap query policy exporting objects to an ldif file importing objects using an ldif file exporting objects to a csv file importing objects using powershell and a csv file chapter 5 organizational units introduction creating an ou enumerating the ous in a domain finding an ou enumerating the objects in an ou deleting the objects in an ou deleting an ou moving the objects in an ou to a different ou moving an ou renaming an ou modifying an ou determining approximately how many child objects an ou has delegating control of an ou assigning or removing a manager for an ou linking a gpo to an ou protecting an ou against accidental deletion chapter 6 users introduction modifying the default display name used when creating users in aduc or adac creating a user creating a large number of users creating an inetorgperson user converting a user object to an inetorgperson object (or vice versa) modifying an attribute for several users at once deleting a user setting a user’s profile attributes moving a user redirecting users to an alternative ou renaming a user copying a user finding locked-out users unlocking a user troubleshooting account lockout problems viewing the domain-wide account lockout and password policies applying a fine-grained password policy to a user object viewing the fine-grained password policy that is in effect for a user account enabling and disabling a user finding disabled users viewing a user’s group membership removing all group memberships from a user changing a user’s primary group copying a user’s group membership to another user setting a user’s password preventing a user from changing a password requiring a user to change a password at next logon preventing a user’s password from expiring finding users whose passwords are about to expire viewing the rodcs that have cached a user’s password setting a user’s account options (useraccountcontrol) setting a user’s account to expire determining a user’s last logon time finding users who have not logged on recently viewing and modifying a user’s permitted logon hours viewing a user’s managed objects creating a upn suffix for a forest restoring a deleted user protecting a user against accidental deletion chapter 7 groups introduction creating a group viewing the permissions of a group viewing the direct members of a group viewing the nested members of a group adding and removing members of a group moving a group within a domain moving a group to another domain changing the scope or type of a group modifying group attributes delegating control for managing membership of a group resolving a primary group id enabling universal group membership caching restoring a deleted group protecting a group against accidental deletion applying a fine-grained password policy to a group object chapter 8 computer objects introduction creating a computer creating a computer for a specific user or group deleting a computer joining a computer to a domain moving a computer within the same domain moving a computer to a new domain renaming a computer adding or removing a computer account from a group testing the secure channel for a computer resetting a computer account finding inactive or unused computers changing the maximum number of computers a user can join to the domain modifying the attributes of a computer object finding computers with a particular os binding to the default container for computers changing the default container for computers listing all the computer accounts in a domain identifying a computer role protecting a computer against accidental deletion viewing the rodcs that have cached a computer’s password chapter 9 group policy objects introduction finding the gpos in a domain creating a gpo copying a gpo deleting a gpo viewing the settings of a gpo modifying the settings of a gpo importing settings into a gpo creating a migration table creating custom group policy settings assigning logon/logoff and startup/shutdown scripts in a gpo installing applications with a gpo disabling the user or computer settings in a gpo listing the links for a gpo creating a gpo link to an ou blocking inheritance of gpos on an ou enforcing the settings of a gpo link applying a security filter to a gpo delegating administration of gpos importing a security template creating a wmi filter applying a wmi filter to a gpo configuring loopback processing for a gpo backing up a gpo restoring a gpo simulating the rsop viewing the rsop refreshing gpo settings on a computer restoring a default gpo creating a fine-grained password policy editing a fine-grained password policy viewing the effective pso for a user chapter 10 schema introduction registering the active directory schema mmc snap-in generating an oid to use for a new class or attribute extending the schema preparing the schema for an active directory upgrade documenting schema extensions adding a new attribute viewing an attribute adding a new class viewing a class indexing an attribute modifying the attributes that are copied when duplicating a user modifying the attributes included with anr modifying the set of attributes stored on a global catalog finding nonreplicated and constructed attributes finding the linked attributes finding the structural, auxiliary, abstract, and 88 classes finding the mandatory and optional attributes of a class modifying the default security of a class managing the confidentiality bit adding an attribute to the read-only filtered attribute set (ro-fas) deactivating classes and attributes redefining classes and attributes reloading the schema cache managing the schema master fsmo chapter 11 site topology introduction creating a site listing sites in a domain renaming a site deleting a site delegating control of a site configuring universal group caching for a site creating a subnet listing the subnets finding missing subnets deleting a subnet changing a subnet’s site assignment creating a site link finding the site links for a site modifying the sites that are part of a site link modifying the cost for a site link enabling change notification for a site link modifying replication schedules disabling site link transitivity or site link schedules creating a site link bridge finding the bridgehead servers for a site setting a preferred bridgehead server for a site listing the servers moving a domain controller to a different site configuring a domain controller to cover multiple sites viewing the site coverage for a domain controller disabling automatic site coverage for a domain controller finding the site for a client forcing a host into a particular site creating a connection object listing the connection objects for a server finding the istg for a site transferring the istg to another server triggering the kcc determining whether the kcc is completing successfully disabling the kcc for a site changing the interval at which the kcc runs chapter 12 replication introduction determining whether two domain controllers are in sync viewing the replication status of several domain controllers viewing unreplicated changes between two domain controllers forcing replication from one domain controller to another enabling and disabling replication changing the intra-site replication notification interval changing the inter-site replication interval disabling inter-site compression of replication traffic checking for potential replication problems enabling enhanced logging of replication events enabling strict or loose replication consistency finding conflict objects finding orphaned objects listing the replication partners for a dc viewing object metadata chapter 13 dns and dhcp introduction creating a forward lookup zone creating a reverse lookup zone viewing a server’s zones converting a zone to an ad integrated zone moving ad integrated zones into an application partition configuring zone transfers configuring forwarding configuring conditional forwarding delegating control of an active directory integrated zone creating and deleting resource records querying resource records modifying the dns server configuration scavenging old resource records clearing the dns cache verifying that a domain controller can register its resource records enabling dns server debug logging registering a domain controller’s resource records deregistering a domain controller’s resource records preventing a domain controller from dynamically registering all resource records preventing a domain controller from dynamically registering certain resource records allowing computers to use a domain suffix that is different from their ad domain authorizing a dhcp server restricting dhcp administrators chapter 14 security and authentication introduction enabling ssl/tls securing ldap traffic with ssl, tls, or signing disabling ldap signing enabling anonymous ldap access using the delegation of control wizard customizing the delegation of control wizard revoking delegated permissions viewing the acl for an object customizing the acl editor viewing the effective permissions on an object configuring permission inheritance changing the acl of an object changing the default acl for an object class in the schema comparing the acl of an object to the default defined in the schema resetting an object’s acl to the default defined in the schema enabling strong domain authentication enabling list object access mode modifying the acl on administrator accounts viewing and purging your kerberos tickets forcing kerberos to use tcp modifying kerberos settings viewing access tokens creating a claim type creating a resource property configuring a central access rule creating a central access policy applying a central access policy enabling domain controller support for claims and compound authentication enabling claims for devices in a domain chapter 15 logging, monitoring, and quotas introduction enabling diagnostics logging enabling netlogon logging enabling gpo client logging enabling kerberos logging viewing dns server performance statistics monitoring the windows time service enabling inefficient and expensive ldap query logging using the stats control to view ldap query statistics monitoring the performance of active directory using perfmon trace logs to monitor active directory creating an administrative alert emailing an administrator on a performance alert enabling auditing of directory access enabling auditing of registry keys creating a quota finding the quotas assigned to a security principal changing how tombstone objects count against quota usage setting the default quota for all security principals in a partition finding the quota usage for a security principal chapter 16 backup, recovery, dit maintenance, and deleted objects introduction backing up the active directory database creating an active directory snapshot mounting an active directory snapshot accessing active directory snapshot data restarting a domain controller in directory services repair mode resetting the directory services repair mode administrator password performing a nonauthoritative restore performing an authoritative restore of an object or subtree performing a complete authoritative restore checking the dit file’s integrity moving the dit files repairing or recovering the dit performing an online defrag manually performing a database recovery creating a reserve file determining how much whitespace is in the dit performing an offline defrag to reclaim space changing the garbage collection interval logging the number of expired tombstone objects determining the size of the active directory database searching for deleted objects undeleting a single object undeleting a container object modifying the tombstone lifetime for a domain chapter 17 application partitions introduction creating and deleting an application partition finding the application partitions in a forest adding or removing a replica server for an application partition finding the replica servers for an application partition finding the application partitions hosted by a server verifying application partitions are instantiated correctly on a server setting the replication notification delay for an application partition setting the reference domain for an application partition delegating control of managing an application partition chapter 18 active directory lightweight directory service introduction installing ad lds creating a new ad lds instance creating a new replica of an ad lds configuration set stopping and starting an ad lds instance changing the ports used by an ad lds instance listing the ad lds instances installed on a computer extending the ad lds schema managing ad lds application partitions managing ad lds organizational units managing ad lds users changing the password for an ad lds user enabling and disabling an ad lds user creating ad lds groups managing ad lds group memberships viewing and modifying ad lds object attributes importing data into an ad lds instance configuring intra-site replication forcing ad lds replication managing ad lds replication authentication managing ad lds permissions enabling auditing of ad lds access chapter 19 active directory federation services introduction installing ad fs prerequisites installing the ad fs federation service configuring an ldap attribute store configuring a microsoft sql server attribute store creating claim descriptions creating a relying party trust configuring a claims provider trust configuring an alternate upn suffix configuring ad fs 2.x and ad fs 1.x interoperability configuring logging for ad fs chapter 20 microsoft exchange server 2013 introduction exchange server and active directory exchange server 2013 architecture finding exchange server cmdlets preparing active directory for exchange installing the first exchange server 2013 server in an organization creating unattended installation files for exchange server installing exchange management tools stopping and starting exchange server mail-enabling a user mail-disabling a user mailbox-enabling a user deleting a user’s mailbox moving a mailbox viewing mailbox sizes and message counts configuring mailbox limits creating an address list creating a database availability group creating a mailbox database enabling or disabling anti-malware scanning enabling message tracking chapter 21 microsoft forefront identity manager introduction creating a sql server management agent creating an active directory management agent setting up a metaverse object deletion rule setting up a simple import attribute flow setting up a simple export attribute flow to active directory defining an advanced import attribute flow implementing an advanced attribute flow rules extension setting up advanced export attribute flow in active directory configuring a run profile to do an initial load of data from a sql server management agent loading initial sql server database data into fim 2010 r2 using a run profile configuring a run profile to load the container structure from active directory loading the initial active directory container structure into fim 2010 r2 using a run profile setting up a sql server management agent to project objects to the metaverse writing a rules extension to provision user objects creating a run profile for provisioning executing the provisioning rule creating a run profile to export objects from the ad ma to active directory exporting objects to active directory using an export run profile creating a run profile script creating a controlling script enabling directory synchronization from active directory to the hr database configuring a run profile to load the telephonenumber from active directory loading telephonenumber changes from ad into fim using a delta import/delta sync run profile exporting telephonenumber data to a sql server database using a sql server ma export run profile to export the telephonenumber to a sql server database searching data in the connector space searching data in the metaverse deleting data in the connector space and metaverse extending object types to include a new attribute previewing changes to the fim configuration committing changes to individual identities using the commit preview feature passing data between rules extensions using transaction properties using a single rules extension to affect multiple attribute flows flowing a null value to a data source importing and decoding the accountexpires attribute exporting and encoding the accountexpires attribute.

Author : Brian svidergol, robbie allen
Publication : Oreilly
Isbn : 9789351101727
Store book number : 105
NRS 2000.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
HEAD FIRST GO: A BRAIN-FRIENDLY GUIDE
NRS 2400.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008