Active Directory disaster recovery [[electronic resource] /] / Florian Rommel ; reviewers, James Eaton-Lee, Nathan Yocom |
Autore | Rommel Florian |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Publishing Ltd., c2008 |
Descrizione fisica | 1 online resource (252 p.) |
Disciplina | 005.7/136 |
Soggetto topico |
Directory services (Computer network technology)
Data recovery (Computer science) - Planning Emergency management Data protection |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-38649-9
9786611386498 1-84719-328-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; Table of Contents; Preface; An Overview of Active Directory Disaster Recovery; What is Disaster Recovery?; Why is Disaster Recovery Needed?; Conventions Used in This Book; Disaster Recovery for Active Directory; Disaster Types and Scenarios Covered by This Book; Recovery of Deleted Objects; Single DC Hardware Failure; Single DC AD Corruption; Site AD Corruption; Corporate (Complete) AD Corruption; Complete Site Hardware Failure; Corporate (Complete) Hardware Failure; Summary; Active Directory Design Principles
Active Directory ElementsThe Active Directory Forest; The Active Directory Tree; Organizational Units and Leaf Objects; Active Directory Sites; Group Policy Objects; Domain Design: Single Forest, Single Domain, and Star Shaped; Domain Design: Single Forest, Single Domain, Empty Root, Star Shaped; Domain Design: Multi-Domain Forest; Domain Design: Multi-Forest; LRS-Lag Replication Site; Design Your Active Directory; Naming Standards; Username and Service Account Naming; Group Policy Naming; Design with Scalability in Mind; Flexible Single Master Operation Roles (FSMO) Migration from Other Authentication ServicesKeeping Up-To-Date and Safe; Documentation; Backups; Summary; Design and Implement a Disaster Recovery Plan for Your Organization; Analyze the Risks, Threats, and the Ways to Mitigate; The Two-Part, 10 Step Implementation Guide; Part One: The Steps for General Implementation; Calculate and Analyze; Create a Business Continuity Plan; Present it to the Management (Part 1 and 2); Define Roles and Responsibilities; Train the Staff for DR; Test Your DRP Frequently; Part Two: Implementing a Disaster Recovery Plan for AD; Writing is Not All Ensure that Everyone is Aware of Locations of the DRPDefine the Order of Restoration for Different Systems (Root First in Hub Site, then Add One Server etc.); Go back to ""Presentation to Management""; Summary; Strengthening AD to Increase Resilience; Baseline Security; Domain Policy; Domain Controller Security Policy; Securing Your DNS Configuration; Secure Updates; Split Zone DNS; Active Directory Integrated Zones; Configuring DNS for Failover; DHCP within AD; Tight User Controls and Delegation; Proper User Delegation; Group Full control; Group with Less Control Group to Allow Password ResetsCentral Logging; Proper Change Management; Virtualization and Lag Sites; Resource Assignment; Backups and Snapshots; Deployment; Sites and Services Explained; Creating Sites, Subnets, and Site Links; Setting Replication Schedules and Costs; Cost; Scheduling; Site Scheduling; Link Scheduling; Lag Sites and Warm Sites; Configuring a Lag Site; Creating, Configuring and Using a Warm Site; Summary; Active Directory Failure On a Single Domain Controller; Problems and Symptoms; Symptoms; Causes; Solution Process; Solution Details; Verification of Corruption Tools for Verification |
Record Nr. | UNINA-9910454918703321 |
Rommel Florian
![]() |
||
Birmingham, U.K., : Packt Publishing Ltd., c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Active Directory disaster recovery [[electronic resource] /] / Florian Rommel ; reviewers, James Eaton-Lee, Nathan Yocom |
Autore | Rommel Florian |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Publishing Ltd., c2008 |
Descrizione fisica | 1 online resource (252 p.) |
Disciplina | 005.7/136 |
Soggetto topico |
Directory services (Computer network technology)
Data recovery (Computer science) - Planning Emergency management Data protection |
ISBN |
1-281-38649-9
9786611386498 1-84719-328-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; Table of Contents; Preface; An Overview of Active Directory Disaster Recovery; What is Disaster Recovery?; Why is Disaster Recovery Needed?; Conventions Used in This Book; Disaster Recovery for Active Directory; Disaster Types and Scenarios Covered by This Book; Recovery of Deleted Objects; Single DC Hardware Failure; Single DC AD Corruption; Site AD Corruption; Corporate (Complete) AD Corruption; Complete Site Hardware Failure; Corporate (Complete) Hardware Failure; Summary; Active Directory Design Principles
Active Directory ElementsThe Active Directory Forest; The Active Directory Tree; Organizational Units and Leaf Objects; Active Directory Sites; Group Policy Objects; Domain Design: Single Forest, Single Domain, and Star Shaped; Domain Design: Single Forest, Single Domain, Empty Root, Star Shaped; Domain Design: Multi-Domain Forest; Domain Design: Multi-Forest; LRS-Lag Replication Site; Design Your Active Directory; Naming Standards; Username and Service Account Naming; Group Policy Naming; Design with Scalability in Mind; Flexible Single Master Operation Roles (FSMO) Migration from Other Authentication ServicesKeeping Up-To-Date and Safe; Documentation; Backups; Summary; Design and Implement a Disaster Recovery Plan for Your Organization; Analyze the Risks, Threats, and the Ways to Mitigate; The Two-Part, 10 Step Implementation Guide; Part One: The Steps for General Implementation; Calculate and Analyze; Create a Business Continuity Plan; Present it to the Management (Part 1 and 2); Define Roles and Responsibilities; Train the Staff for DR; Test Your DRP Frequently; Part Two: Implementing a Disaster Recovery Plan for AD; Writing is Not All Ensure that Everyone is Aware of Locations of the DRPDefine the Order of Restoration for Different Systems (Root First in Hub Site, then Add One Server etc.); Go back to ""Presentation to Management""; Summary; Strengthening AD to Increase Resilience; Baseline Security; Domain Policy; Domain Controller Security Policy; Securing Your DNS Configuration; Secure Updates; Split Zone DNS; Active Directory Integrated Zones; Configuring DNS for Failover; DHCP within AD; Tight User Controls and Delegation; Proper User Delegation; Group Full control; Group with Less Control Group to Allow Password ResetsCentral Logging; Proper Change Management; Virtualization and Lag Sites; Resource Assignment; Backups and Snapshots; Deployment; Sites and Services Explained; Creating Sites, Subnets, and Site Links; Setting Replication Schedules and Costs; Cost; Scheduling; Site Scheduling; Link Scheduling; Lag Sites and Warm Sites; Configuring a Lag Site; Creating, Configuring and Using a Warm Site; Summary; Active Directory Failure On a Single Domain Controller; Problems and Symptoms; Symptoms; Causes; Solution Process; Solution Details; Verification of Corruption Tools for Verification |
Record Nr. | UNINA-9910778460703321 |
Rommel Florian
![]() |
||
Birmingham, U.K., : Packt Publishing Ltd., c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Active Directory disaster recovery / / Florian Rommel ; reviewers, James Eaton-Lee, Nathan Yocom |
Autore | Rommel Florian |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Publishing Ltd., c2008 |
Descrizione fisica | 1 online resource (252 p.) |
Disciplina | 005.7/136 |
Soggetto topico |
Directory services (Computer network technology)
Data recovery (Computer science) - Planning Emergency management Data protection |
ISBN |
1-281-38649-9
9786611386498 1-84719-328-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; Table of Contents; Preface; An Overview of Active Directory Disaster Recovery; What is Disaster Recovery?; Why is Disaster Recovery Needed?; Conventions Used in This Book; Disaster Recovery for Active Directory; Disaster Types and Scenarios Covered by This Book; Recovery of Deleted Objects; Single DC Hardware Failure; Single DC AD Corruption; Site AD Corruption; Corporate (Complete) AD Corruption; Complete Site Hardware Failure; Corporate (Complete) Hardware Failure; Summary; Active Directory Design Principles
Active Directory ElementsThe Active Directory Forest; The Active Directory Tree; Organizational Units and Leaf Objects; Active Directory Sites; Group Policy Objects; Domain Design: Single Forest, Single Domain, and Star Shaped; Domain Design: Single Forest, Single Domain, Empty Root, Star Shaped; Domain Design: Multi-Domain Forest; Domain Design: Multi-Forest; LRS-Lag Replication Site; Design Your Active Directory; Naming Standards; Username and Service Account Naming; Group Policy Naming; Design with Scalability in Mind; Flexible Single Master Operation Roles (FSMO) Migration from Other Authentication ServicesKeeping Up-To-Date and Safe; Documentation; Backups; Summary; Design and Implement a Disaster Recovery Plan for Your Organization; Analyze the Risks, Threats, and the Ways to Mitigate; The Two-Part, 10 Step Implementation Guide; Part One: The Steps for General Implementation; Calculate and Analyze; Create a Business Continuity Plan; Present it to the Management (Part 1 and 2); Define Roles and Responsibilities; Train the Staff for DR; Test Your DRP Frequently; Part Two: Implementing a Disaster Recovery Plan for AD; Writing is Not All Ensure that Everyone is Aware of Locations of the DRPDefine the Order of Restoration for Different Systems (Root First in Hub Site, then Add One Server etc.); Go back to ""Presentation to Management""; Summary; Strengthening AD to Increase Resilience; Baseline Security; Domain Policy; Domain Controller Security Policy; Securing Your DNS Configuration; Secure Updates; Split Zone DNS; Active Directory Integrated Zones; Configuring DNS for Failover; DHCP within AD; Tight User Controls and Delegation; Proper User Delegation; Group Full control; Group with Less Control Group to Allow Password ResetsCentral Logging; Proper Change Management; Virtualization and Lag Sites; Resource Assignment; Backups and Snapshots; Deployment; Sites and Services Explained; Creating Sites, Subnets, and Site Links; Setting Replication Schedules and Costs; Cost; Scheduling; Site Scheduling; Link Scheduling; Lag Sites and Warm Sites; Configuring a Lag Site; Creating, Configuring and Using a Warm Site; Summary; Active Directory Failure On a Single Domain Controller; Problems and Symptoms; Symptoms; Causes; Solution Process; Solution Details; Verification of Corruption Tools for Verification |
Record Nr. | UNINA-9910809994903321 |
Rommel Florian
![]() |
||
Birmingham, U.K., : Packt Publishing Ltd., c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Active Directory for dummies [[electronic resource] /] / by Steve Clines and Marcia Loughry |
Autore | Clines Steve |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2008 |
Descrizione fisica | 1 online resource (363 p.) |
Disciplina |
005.4
005.446 |
Altri autori (Persone) | LoughryMarcia |
Collana | --For dummies |
Soggetto topico | Directory services (Computer network technology) |
Soggetto genere / forma | Electronic books. |
ISBN | 0-470-40653-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Active Directory For Dummies® 2nd Edition; About the Authors; Table of Contents; Introduction; Part I Getting Started; Chapter 1 Understanding Active Directory; Chapter 2 Analyzing Requirements for Active Directory; Chapter 3 Designing an Active Director y Implementation Plan; Part II Planning and Deploying with Active Directory Domain Services; Chapter 4 Playing the Name Game; Chapter 5 Creating a Logical Structure; Chapter 6 Getting Physical; Chapter 7 Ready to Deploy!; Part III New Active Directory Features; Chapter 8 AD LDS: Active Directory on a Diet
Chapter 9 Federating Active DirectoryChapter 10 AD Certificate Services and Rights Management Services; Part IV Managing Active Directory; Chapter 11 Managing Users, Groups, and Other Objects; Chapter 12 Managing Active Directory Replication; Chapter 13 Schema-ing!; Chapter 14 Managing Security with Active Directory Domain Services; Chapter 15 Maintaining Active Directory; Part V The Part of Tens; Chapter 16 The Ten Most Important Active Directory Design Points; Chapter 17 Ten Cool Web Sites for Active Directory Info; Chapter 18 Ten Troubleshooting Tips for Active Directory Part VI AppendixesAppendix A Windows 2008 AD Command Line Tools; Appendix B Glossary; Index |
Record Nr. | UNINA-9910453652903321 |
Clines Steve
![]() |
||
Hoboken, N.J., : Wiley, c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Active Directory for dummies [[electronic resource] /] / by Steve Clines and Marcia Loughry |
Autore | Clines Steve |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2008 |
Descrizione fisica | 1 online resource (363 p.) |
Disciplina |
005.4
005.446 |
Altri autori (Persone) | LoughryMarcia |
Collana | --For dummies |
Soggetto topico | Directory services (Computer network technology) |
ISBN |
0-470-50527-3
0-470-40653-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Active Directory For Dummies® 2nd Edition; About the Authors; Table of Contents; Introduction; Part I Getting Started; Chapter 1 Understanding Active Directory; Chapter 2 Analyzing Requirements for Active Directory; Chapter 3 Designing an Active Director y Implementation Plan; Part II Planning and Deploying with Active Directory Domain Services; Chapter 4 Playing the Name Game; Chapter 5 Creating a Logical Structure; Chapter 6 Getting Physical; Chapter 7 Ready to Deploy!; Part III New Active Directory Features; Chapter 8 AD LDS: Active Directory on a Diet
Chapter 9 Federating Active DirectoryChapter 10 AD Certificate Services and Rights Management Services; Part IV Managing Active Directory; Chapter 11 Managing Users, Groups, and Other Objects; Chapter 12 Managing Active Directory Replication; Chapter 13 Schema-ing!; Chapter 14 Managing Security with Active Directory Domain Services; Chapter 15 Maintaining Active Directory; Part V The Part of Tens; Chapter 16 The Ten Most Important Active Directory Design Points; Chapter 17 Ten Cool Web Sites for Active Directory Info; Chapter 18 Ten Troubleshooting Tips for Active Directory Part VI AppendixesAppendix A Windows 2008 AD Command Line Tools; Appendix B Glossary; Index |
Record Nr. | UNINA-9910782399403321 |
Clines Steve
![]() |
||
Hoboken, N.J., : Wiley, c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Active Directory for dummies [[electronic resource] /] / by Steve Clines and Marcia Loughry |
Autore | Clines Steve |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2008 |
Descrizione fisica | 1 online resource (363 p.) |
Disciplina |
005.4
005.446 |
Altri autori (Persone) | LoughryMarcia |
Collana | --For dummies |
Soggetto topico | Directory services (Computer network technology) |
ISBN |
0-470-50527-3
0-470-40653-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Active Directory For Dummies® 2nd Edition; About the Authors; Table of Contents; Introduction; Part I Getting Started; Chapter 1 Understanding Active Directory; Chapter 2 Analyzing Requirements for Active Directory; Chapter 3 Designing an Active Director y Implementation Plan; Part II Planning and Deploying with Active Directory Domain Services; Chapter 4 Playing the Name Game; Chapter 5 Creating a Logical Structure; Chapter 6 Getting Physical; Chapter 7 Ready to Deploy!; Part III New Active Directory Features; Chapter 8 AD LDS: Active Directory on a Diet
Chapter 9 Federating Active DirectoryChapter 10 AD Certificate Services and Rights Management Services; Part IV Managing Active Directory; Chapter 11 Managing Users, Groups, and Other Objects; Chapter 12 Managing Active Directory Replication; Chapter 13 Schema-ing!; Chapter 14 Managing Security with Active Directory Domain Services; Chapter 15 Maintaining Active Directory; Part V The Part of Tens; Chapter 16 The Ten Most Important Active Directory Design Points; Chapter 17 Ten Cool Web Sites for Active Directory Info; Chapter 18 Ten Troubleshooting Tips for Active Directory Part VI AppendixesAppendix A Windows 2008 AD Command Line Tools; Appendix B Glossary; Index |
Record Nr. | UNINA-9910815406303321 |
Clines Steve
![]() |
||
Hoboken, N.J., : Wiley, c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Automating Active Directory Administration with Windows PowerShell 2.0 [[electronic resource] /] / Ken St. Cyr, Laura E. Hunter |
Autore | St. Cyr Ken |
Edizione | [1st edition] |
Pubbl/distr/stampa | New York, : Wiley, 2011 |
Descrizione fisica | 1 online resource (506 p.) |
Disciplina | 005.71376 |
Altri autori (Persone) | HunterLaura E |
Soggetto topico |
Directory services (Computer network technology)
Windows PowerShell (Computer program language) COMPUTERS / Operating Systems / Windows Server & NT |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-17731-5
9786613177315 1-118-11854-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Automating Active Directory® Administration with Windows PowerShell® 2.0; Table of Contents; Introduction; Part I Administering Service Delivery; Part II Managing Active Directory Data; Part III Protecting Your Investment in Active Directory; Index |
Record Nr. | UNINA-9910456401403321 |
St. Cyr Ken
![]() |
||
New York, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Automating Active Directory Administration with Windows PowerShell 2.0 [[electronic resource] /] / Ken St. Cyr, Laura E. Hunter |
Autore | St. Cyr Ken |
Edizione | [1st edition] |
Pubbl/distr/stampa | New York, : Wiley, 2011 |
Descrizione fisica | 1 online resource (506 p.) |
Disciplina | 005.71376 |
Altri autori (Persone) | HunterLaura E |
Soggetto topico |
Directory services (Computer network technology)
Windows PowerShell (Computer program language) COMPUTERS / Operating Systems / Windows Server & NT |
ISBN |
1-283-17731-5
9786613177315 1-118-11854-5 |
Classificazione | COM046050 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Automating Active Directory® Administration with Windows PowerShell® 2.0; Table of Contents; Introduction; Part I Administering Service Delivery; Part II Managing Active Directory Data; Part III Protecting Your Investment in Active Directory; Index |
Record Nr. | UNINA-9910781508203321 |
St. Cyr Ken
![]() |
||
New York, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Automating Active Directory Administration with Windows PowerShell 2.0 [[electronic resource] /] / Ken St. Cyr, Laura E. Hunter |
Autore | St. Cyr Ken |
Edizione | [1st edition] |
Pubbl/distr/stampa | New York, : Wiley, 2011 |
Descrizione fisica | 1 online resource (506 p.) |
Disciplina | 005.71376 |
Altri autori (Persone) | HunterLaura E |
Soggetto topico |
Directory services (Computer network technology)
Windows PowerShell (Computer program language) COMPUTERS / Operating Systems / Windows Server & NT |
ISBN |
1-283-17731-5
9786613177315 1-118-11854-5 |
Classificazione | COM046050 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Automating Active Directory® Administration with Windows PowerShell® 2.0; Table of Contents; Introduction; Part I Administering Service Delivery; Part II Managing Active Directory Data; Part III Protecting Your Investment in Active Directory; Index |
Record Nr. | UNINA-9910811959703321 |
St. Cyr Ken
![]() |
||
New York, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Group policy : fundamentals, security, and the managed desktop / / Jeremy Moskowitz |
Autore | Moskowitz Jeremy |
Edizione | [Third edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, , 2015 |
Descrizione fisica | 1 online resource (1058 p.) |
Disciplina | 005.4/46 |
Soggetto topico |
Operating systems (Computers)
Software configuration management Computer security Directory services (Computer network technology) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-03568-6
1-119-03567-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Group Policy with Cross-Forest TrustsFinal Thoughts; Chapter 5: Group Policy Preferences; Powers of the Group Policy Preferences; Group Policy Preferences Concepts ; Group Policy Preferences Tips, Tricks, and Troubleshooting; Giving Group Policy Preferences a "Boost" (Using PolicyPak Preferences Manager and PolicyPak Cloud) ; Final Thoughts; Chapter 6: Managing Applications and Settings Using Group Policy; Understanding Administrative Templates; Exploring ADM vs. ADMX and ADML Files; ADMX and ADML Files: What They Do and the Problems They Solve; The Central Store
Creating and Editing GPOs in a Mixed EnvironmentUsing ADM and ADMX Templates from Other Sources; ADMX Migrator and ADMX Editor Tools; PolicyPak Application Manager; Final Thoughts; Chapter 7: Troubleshooting Group Policy; Under the Hood of Group Policy; The Birth, Life, and Death of a GPO; How Client Systems Get Group Policy Objects; Why Isn't Group Policy Applying?; Client-Side Troubleshooting; Advanced Group Policy Troubleshooting with the Event Viewer Logs ; Final Thoughts; Chapter 8: Implementing Security ; The Two Default Group Policy Objects; The Strange Life of Password Policy Inside Basic and Advanced Auditing Restricted Groups; Restrict Software Using AppLocker; Controlling User Account Control with Group Policy ; Wireless (802.3) and Wired Network (802.11) Policies; Configuring Windows Firewall with Group Policy; Final Thoughts; Chapter 9: Profiles: Local, Roaming, and Mandatory; Setting the Stage for Multiple Clients; What Is a User Profile?; Roaming Profiles; Mandatory Profiles; Final Thoughts; Chapter 10: The Managed Desktop, Part 1: Redirected Folders, Offline Files, and the Synchronization Manager; Redirected Folders; Offline Files and Synchronization Using Folder Redirection and Offline Files over Slow Links |
Record Nr. | UNINA-9910460599703321 |
Moskowitz Jeremy
![]() |
||
Indianapolis, Indiana : , : Sybex, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|