75,80 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
This fourth edition includes troubleshooting recipes for Windows Server 2012, Windows 8, and Exchange 2013, based on valuable input from Windows administrators. You’ll also find quick solutions for the Lightweight Directory Access Protocol (LDAP), Active Directory Lightweight Directory Services (AD LDS), multi-master replication, DNS, Group Policy, and many other features.
* Manage new AD features, such as the Recycle Bin, Group Managed Service Accounts, and fine-grained password policies
* Work with AD from the command line and use Windows PowerShell to automate tasks
* Remove and create forests, domains, and trusts
* Create groups, modify group scope and type, and manage membership
* Delegate control, view and modify permissions, and handle Kerberos tickets
* Import and export data with LDAP Data Interchange Format (LDIF)
* Synchronize multiple directories and enforce data integrity within a single or multiple stores
* Back up AD, and perform authoritative and non-authoritative restores
This fourth edition includes troubleshooting recipes for Windows Server 2012, Windows 8, and Exchange 2013, based on valuable input from Windows administrators. You’ll also find quick solutions for the Lightweight Directory Access Protocol (LDAP), Active Directory Lightweight Directory Services (AD LDS), multi-master replication, DNS, Group Policy, and many other features.
* Manage new AD features, such as the Recycle Bin, Group Managed Service Accounts, and fine-grained password policies
* Work with AD from the command line and use Windows PowerShell to automate tasks
* Remove and create forests, domains, and trusts
* Create groups, modify group scope and type, and manage membership
* Delegate control, view and modify permissions, and handle Kerberos tickets
* Import and export data with LDAP Data Interchange Format (LDIF)
* Synchronize multiple directories and enforce data integrity within a single or multiple stores
* Back up AD, and perform authoritative and non-authoritative restores
Brian Svidergol specializes in Microsoft infrastructure and cloud-based solutions around Windows, Active Directory, Microsoft Exchange, System Center, virtualization, and MDOP. He holds the MCT, MCITP (EA), MCITP (VA), MCITP (Exchange 2010), and several other Microsoft and industry certifications. Brian authored Microsoft Official Curriculum (MOC) course 6426C - Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory. He has also worked on Microsoft certification exam development and related training content for several years. When he isn't working on technology projects, he enjoys family time, basketball, and gaming.
Robbie Allen is a technical leader at Cisco Systems, where he has been involved in the deployment of Active Directory, DNS, DHCP, and several network management solutions. Robbie was named a Windows Server MVP in 2004 and 2005 for his contributions to the Windows community and the publication of several popular O'Reilly books. Robbie is currently studying at MIT in its system design and management program. For more information, see Robbie's web site at [...]
Who Should Read This Book?;
What's in This Book?;
Conventions Used in This Book;
Using Code Examples;
Safari® Books Online;
How to Contact Us;
Acknowledgments;
Chapter 1: Getting Started;
1.1 Approach to the Book;
1.2 Where to Find the Tools;
1.3 Getting Familiar with LDIF;
1.4 Replaceable Text;
1.5 Where to Find More Information;
Chapter 2: Forests, Domains, and Trusts;
2.1 Introduction;
2.2 Creating a Forest;
2.3 Removing a Forest;
2.4 Creating a Domain;
2.5 Removing a Domain;
2.6 Removing an Orphaned Domain;
2.7 Finding the Domains in a Forest;
2.8 Finding the NetBIOS Name of a Domain;
2.9 Renaming a Domain;
2.10 Raising the Domain Functional Level to Windows Server 2012;
2.11 Raising the Functional Level of a Windows Server 2008 or 2008 R2 Forest;
2.12 Using AdPrep to Prepare a Domain or Forest for Windows Server 2012;
2.13 Determining Whether AdPrep Has Completed;
2.14 Checking Whether a Windows Domain Controller Can Be Upgraded to Windows Server 2003 or 2008;
2.15 Creating an External Trust;
2.16 Creating a Transitive Trust Between Two AD Forests;
2.17 Creating a Shortcut Trust Between Two AD Domains;
2.18 Creating a Trust to a Kerberos Realm;
2.19 Viewing the Trusts for a Domain;
2.20 Verifying a Trust;
2.21 Resetting a Trust;
2.22 Removing a Trust;
2.23 Enabling SID Filtering for a Trust;
2.24 Enabling Quarantine for a Trust;
2.25 Managing Selective Authentication for a Trust;
2.26 Finding Duplicate SIDs in a Domain;
2.27 Adding Additional Fields to Active Directory Users and Computers;
Chapter 3: Domain Controllers, Global Catalogs, and FSMOs;
3.1 Introduction;
3.2 Promoting a Server to a Domain Controller;
3.3 Promoting a Server to a Read-Only Domain Controller;
3.4 Performing a Two-Stage RODC Installation;
3.5 Modifying the Password Replication Policy;
3.6 Promoting a Server to a Windows Server 2012 Domain Controller from Media;
3.7 Demoting a Domain Controller;
3.8 Automating the Promotion or Demotion of a Domain Controller;
3.9 Troubleshooting Domain Controller Promotion or Demotion Problems;
3.10 Verifying the Promotion of a Domain Controller;
3.11 Removing an Unsuccessfully Demoted Domain Controller;
3.12 Renaming a Domain Controller;
3.13 Finding the Domain Controllers for a Domain;
3.14 Finding the Closest Domain Controller;
3.15 Finding a Domain Controller's Site;
3.16 Moving a Domain Controller to a Different Site;
3.17 Finding the Services a Domain Controller Is Advertising;
3.18 Restoring a Deleted Domain Controller in Windows Server 2012;
3.19 Resetting the TCP/IP Stack on a Domain Controller;
3.20 Configuring a Domain Controller to Use an External Time Source;
3.21 Finding the Number of Logon Attempts Made Against a Domain Controller;
3.22 Enabling the /3GB Switch to Increase the LSASS Cache;
3.23 Enabling and Disabling the Global Catalog;
3.24 Determining Whether Global Catalog Promotion Is Complete;
3.25 Finding the Global Catalog Servers in a Forest;
3.26 Finding the Domain Controllers or Global Catalog Servers in a Site;
3.27 Finding Domain Controllers and Global Catalogs via DNS;
3.28 Changing the Preference for a Domain Controller;
3.29 Disabling the Global Catalog Requirement for User Logon;
3.30 Finding the FSMO Role Holders;
3.31 Transferring a FSMO Role;
3.32 Seizing a FSMO Role;
3.33 Finding the PDC Emulator FSMO Role Owner via DNS;
Chapter 4: Searching and Manipulating Objects;
4.1 Introduction;
4.2 Viewing the RootDSE;
4.3 Viewing the Attributes of an Object;
4.4 Counting Objects in Active Directory;
4.5 Using LDAP Controls;
4.6 Using a Fast or Concurrent Bind;
4.7 Connecting to an Object GUID;
4.8 Connecting to a Well-Known GUID;
4.9 Searching for Objects in a Domain;
4.10 Searching the Global Catalog;
4.11 Searching for a Large Number of Objects;
4.12 Searching with an Attribute-Scoped Query;
4.13 Searching with a Bitwise Filter;
4.14 Creating an Object;
4.15 Modifying an Object;
4.16 Modifying a Bit-Flag Attribute;
4.17 Dynamically Linking an Auxiliary Class;
4.18 Creating a Dynamic Object;
4.19 Refreshing a Dynamic Object;
4.20 Modifying the Default TTL Settings for Dynamic Objects;
4.21 Moving an Object to a Different OU or Container;
4.22 Moving an Object to a Different Domain;
4.23 Referencing an External Domain;
4.24 Renaming an Object;
4.25 Deleting an Object;
4.26 Deleting a Container That Has Child Objects;
4.27 Viewing the Created and Last-Modified Timestamp of an Object;
4.28 Modifying the Default LDAP Query Policy;
4.29 Exporting Objects to an LDIF File;
4.30 Importing Objects Using an LDIF File;
4.31 Exporting Objects to a CSV File;
4.32 Importing Objects Using PowerShell and a CSV File;
Chapter 5: Organizational Units;
5.1 Introduction;
5.2 Creating an OU;
5.3 Enumerating the OUs in a Domain;
5.4 Finding an OU;
5.5 Enumerating the Objects in an OU;
5.6 Deleting the Objects in an OU;
5.7 Deleting an OU;
5.8 Moving the Objects in an OU to a Different OU;
5.9 Moving an OU;
5.10 Renaming an OU;
5.11 Modifying an OU;
5.12 Determining Approximately How Many Child Objects an OU Has;
5.13 Delegating Control of an OU;
5.14 Assigning or Removing a Manager for an OU;
5.15 Linking a GPO to an OU;
5.16 Protecting an OU Against Accidental Deletion;
Chapter 6: Users;
6.1 Introduction;
6.2 Modifying the Default Display Name Used When Creating Users in ADUC or ADAC;
6.3 Creating a User;
6.4 Creating a Large Number of Users;
6.5 Creating an inetOrgPerson User;
6.6 Converting a user Object to an inetOrgPerson Object (or Vice Versa);
6.7 Modifying an Attribute for Several Users at Once;
6.8 Deleting a User;
6.9 Setting a User's Profile Attributes;
6.10 Moving a User;
6.11 Redirecting Users to an Alternative OU;
6.12 Renaming a User;
6.13 Copying a User;
6.14 Finding Locked-Out Users;
6.15 Unlocking a User;
6.16 Troubleshooting Account Lockout Problems;
6.17 Viewing the Domain-Wide Account Lockout and Password Policies;
6.18 Applying a Fine-Grained Password Policy to a User Object;
6.19 Viewing the Fine-Grained Password Policy That Is in Effect for a User Account;
6.20 Enabling and Disabling a User;
6.21 Finding Disabled Users;
6.22 Viewing a User's Group Membership;
6.23 Removing All Group Memberships from a User;
6.24 Changing a User's Primary Group;
6.25 Copying a User's Group Membership to Another User;
6.26 Setting a User's Password;
6.27 Preventing a User from Changing a Password;
6.28 Requiring a User to Change a Password at Next Logon;
6.29 Preventing a User's Password from Expiring;
6.30 Finding Users Whose Passwords Are About to Expire;
6.31 Viewing the RODCs That Have Cached a User's Password;
6.32 Setting a User's Account Options (userAccountControl);
6.33 Setting a User's Account to Expire;
6.34 Determining a User's Last Logon Time;
6.35 Finding Users Who Have Not Logged On Recently;
6.36 Viewing and Modifying a User's Permitted Logon Hours;
6.37 Viewing a User's Managed Objects;
6.38 Creating a UPN Suffix for a Forest;
6.39 Restoring a Deleted User;
6.40 Protecting a User Against Accidental Deletion;
Chapter 7: Groups;
7.1 Introduction;
7.2 Creating a Group;
7.3 Viewing the Permissions of a Group;
7.4 Viewing the Direct Members of a Group;
7.5 Viewing the Nested Members of a Group;
7.6 Adding and Removing Members of a Group;
7.7 Moving a Group Within a Domain;
7.8 Moving a Group to Another Domain;
7.9 Changing the Scope or Type of a Group;
7.10 Modifying Group Attributes;
7.11 Delegating Control for Managing Membership of a Group;
7.12 Resolving a Primary Group ID;
7.13 Enabling Universal Group Membership Caching;
7.14 Restoring a Deleted Group;
7.15 Protecting a Group Against Accidental Deletion;
7.16 Applying a Fine-Grained Password Policy to a Group Object;
Chapter 8: Computer Objects;
8.1 Introduction;
8.2 Creating a Computer;
8.3 Creating a Computer for a Specific User or Group;
8.4 Deleting a Computer;
8.5 Joining a Computer to a Domain;
8.6 Moving a Computer Within the Same Domain;
8.7 Moving a Computer to a New Domain;
8.8 Renaming a Computer;
8.9 Adding or Removing a Computer Account from a Group;
8.10 Testing the Secure Channel for a Computer;
8.11 Resetting a Computer Account;
8.12 Finding Inactive or Unused Computers;
8.13 Changing the Maximum Number of Computers a User Can Join to the Domain;
8.14 Modifying the Attributes of a computer Object;
8.15 Finding Computers with a Particular OS;
8.16 Binding to the Default Container for Computers;
8.17 Changing the Default Container for Computers;
8.18 Listing All the Computer Accounts in a Domain;
8.19 Identifying a Computer Role;
8.20 Protecting a Computer Against Accidental Deletion;
8.21 Viewing the RODCs That Have Cached a Computer's Password;
Chapter 9: Group Policy Objects;
9.1 Introduction;
9.2 Finding the GPOs in a Domain;
9.3 Creating a GPO;
9.4 Copying a GPO;
9.5 Deleting a GPO;
9.6 Viewing the Settings of a GPO;
9.7 Modifying the Settings of a GPO;
9.8 Importing Settings into a GPO;
9.9 Creating a Migration Table;
9.10 Creating Custom Group Policy Settings;
9.11 Assigning Logon/Logoff and Startup/Shutdown Scripts in a GPO;
9.12 Installing Applications with a GPO;
9.13 Disabling the User or Computer Settings in a GPO;
9.14 Listing the Links for a GPO;
9.15 Creating a GPO Link to an OU;
9.16 Blocking Inheritance of GPOs on an OU;
9.17 Enforcing the Settings of a GPO Link;
9.18 Applying a Security Filter to a GPO;
9.19 Delegating Administration of GPOs;
9.20 Importing a Security Template;
9.21 Creating a WMI Filter;
9.22 Applying a WMI Filter to a GPO;
9.23 Configuring Loopback Processing for a GPO;
9.24 Backing Up a GPO;
9.25 Restoring a GPO;
9.26...
Erscheinungsjahr: | 2013 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XXIII
833 S. |
ISBN-13: | 9781449361426 |
ISBN-10: | 1449361420 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Svidergol, Brian
Allen, Robbie |
Auflage: | 4th edition |
Hersteller: |
O'Reilly Media
O'Reilly Media, Inc. |
Verantwortliche Person für die EU: | dpunkt.verlag GmbH, Vanessa Niethammer, Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Maße: | 221 x 182 x 50 mm |
Von/Mit: | Brian Svidergol (u. a.) |
Erscheinungsdatum: | 16.07.2013 |
Gewicht: | 1,552 kg |
Brian Svidergol specializes in Microsoft infrastructure and cloud-based solutions around Windows, Active Directory, Microsoft Exchange, System Center, virtualization, and MDOP. He holds the MCT, MCITP (EA), MCITP (VA), MCITP (Exchange 2010), and several other Microsoft and industry certifications. Brian authored Microsoft Official Curriculum (MOC) course 6426C - Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory. He has also worked on Microsoft certification exam development and related training content for several years. When he isn't working on technology projects, he enjoys family time, basketball, and gaming.
Robbie Allen is a technical leader at Cisco Systems, where he has been involved in the deployment of Active Directory, DNS, DHCP, and several network management solutions. Robbie was named a Windows Server MVP in 2004 and 2005 for his contributions to the Windows community and the publication of several popular O'Reilly books. Robbie is currently studying at MIT in its system design and management program. For more information, see Robbie's web site at [...]
Who Should Read This Book?;
What's in This Book?;
Conventions Used in This Book;
Using Code Examples;
Safari® Books Online;
How to Contact Us;
Acknowledgments;
Chapter 1: Getting Started;
1.1 Approach to the Book;
1.2 Where to Find the Tools;
1.3 Getting Familiar with LDIF;
1.4 Replaceable Text;
1.5 Where to Find More Information;
Chapter 2: Forests, Domains, and Trusts;
2.1 Introduction;
2.2 Creating a Forest;
2.3 Removing a Forest;
2.4 Creating a Domain;
2.5 Removing a Domain;
2.6 Removing an Orphaned Domain;
2.7 Finding the Domains in a Forest;
2.8 Finding the NetBIOS Name of a Domain;
2.9 Renaming a Domain;
2.10 Raising the Domain Functional Level to Windows Server 2012;
2.11 Raising the Functional Level of a Windows Server 2008 or 2008 R2 Forest;
2.12 Using AdPrep to Prepare a Domain or Forest for Windows Server 2012;
2.13 Determining Whether AdPrep Has Completed;
2.14 Checking Whether a Windows Domain Controller Can Be Upgraded to Windows Server 2003 or 2008;
2.15 Creating an External Trust;
2.16 Creating a Transitive Trust Between Two AD Forests;
2.17 Creating a Shortcut Trust Between Two AD Domains;
2.18 Creating a Trust to a Kerberos Realm;
2.19 Viewing the Trusts for a Domain;
2.20 Verifying a Trust;
2.21 Resetting a Trust;
2.22 Removing a Trust;
2.23 Enabling SID Filtering for a Trust;
2.24 Enabling Quarantine for a Trust;
2.25 Managing Selective Authentication for a Trust;
2.26 Finding Duplicate SIDs in a Domain;
2.27 Adding Additional Fields to Active Directory Users and Computers;
Chapter 3: Domain Controllers, Global Catalogs, and FSMOs;
3.1 Introduction;
3.2 Promoting a Server to a Domain Controller;
3.3 Promoting a Server to a Read-Only Domain Controller;
3.4 Performing a Two-Stage RODC Installation;
3.5 Modifying the Password Replication Policy;
3.6 Promoting a Server to a Windows Server 2012 Domain Controller from Media;
3.7 Demoting a Domain Controller;
3.8 Automating the Promotion or Demotion of a Domain Controller;
3.9 Troubleshooting Domain Controller Promotion or Demotion Problems;
3.10 Verifying the Promotion of a Domain Controller;
3.11 Removing an Unsuccessfully Demoted Domain Controller;
3.12 Renaming a Domain Controller;
3.13 Finding the Domain Controllers for a Domain;
3.14 Finding the Closest Domain Controller;
3.15 Finding a Domain Controller's Site;
3.16 Moving a Domain Controller to a Different Site;
3.17 Finding the Services a Domain Controller Is Advertising;
3.18 Restoring a Deleted Domain Controller in Windows Server 2012;
3.19 Resetting the TCP/IP Stack on a Domain Controller;
3.20 Configuring a Domain Controller to Use an External Time Source;
3.21 Finding the Number of Logon Attempts Made Against a Domain Controller;
3.22 Enabling the /3GB Switch to Increase the LSASS Cache;
3.23 Enabling and Disabling the Global Catalog;
3.24 Determining Whether Global Catalog Promotion Is Complete;
3.25 Finding the Global Catalog Servers in a Forest;
3.26 Finding the Domain Controllers or Global Catalog Servers in a Site;
3.27 Finding Domain Controllers and Global Catalogs via DNS;
3.28 Changing the Preference for a Domain Controller;
3.29 Disabling the Global Catalog Requirement for User Logon;
3.30 Finding the FSMO Role Holders;
3.31 Transferring a FSMO Role;
3.32 Seizing a FSMO Role;
3.33 Finding the PDC Emulator FSMO Role Owner via DNS;
Chapter 4: Searching and Manipulating Objects;
4.1 Introduction;
4.2 Viewing the RootDSE;
4.3 Viewing the Attributes of an Object;
4.4 Counting Objects in Active Directory;
4.5 Using LDAP Controls;
4.6 Using a Fast or Concurrent Bind;
4.7 Connecting to an Object GUID;
4.8 Connecting to a Well-Known GUID;
4.9 Searching for Objects in a Domain;
4.10 Searching the Global Catalog;
4.11 Searching for a Large Number of Objects;
4.12 Searching with an Attribute-Scoped Query;
4.13 Searching with a Bitwise Filter;
4.14 Creating an Object;
4.15 Modifying an Object;
4.16 Modifying a Bit-Flag Attribute;
4.17 Dynamically Linking an Auxiliary Class;
4.18 Creating a Dynamic Object;
4.19 Refreshing a Dynamic Object;
4.20 Modifying the Default TTL Settings for Dynamic Objects;
4.21 Moving an Object to a Different OU or Container;
4.22 Moving an Object to a Different Domain;
4.23 Referencing an External Domain;
4.24 Renaming an Object;
4.25 Deleting an Object;
4.26 Deleting a Container That Has Child Objects;
4.27 Viewing the Created and Last-Modified Timestamp of an Object;
4.28 Modifying the Default LDAP Query Policy;
4.29 Exporting Objects to an LDIF File;
4.30 Importing Objects Using an LDIF File;
4.31 Exporting Objects to a CSV File;
4.32 Importing Objects Using PowerShell and a CSV File;
Chapter 5: Organizational Units;
5.1 Introduction;
5.2 Creating an OU;
5.3 Enumerating the OUs in a Domain;
5.4 Finding an OU;
5.5 Enumerating the Objects in an OU;
5.6 Deleting the Objects in an OU;
5.7 Deleting an OU;
5.8 Moving the Objects in an OU to a Different OU;
5.9 Moving an OU;
5.10 Renaming an OU;
5.11 Modifying an OU;
5.12 Determining Approximately How Many Child Objects an OU Has;
5.13 Delegating Control of an OU;
5.14 Assigning or Removing a Manager for an OU;
5.15 Linking a GPO to an OU;
5.16 Protecting an OU Against Accidental Deletion;
Chapter 6: Users;
6.1 Introduction;
6.2 Modifying the Default Display Name Used When Creating Users in ADUC or ADAC;
6.3 Creating a User;
6.4 Creating a Large Number of Users;
6.5 Creating an inetOrgPerson User;
6.6 Converting a user Object to an inetOrgPerson Object (or Vice Versa);
6.7 Modifying an Attribute for Several Users at Once;
6.8 Deleting a User;
6.9 Setting a User's Profile Attributes;
6.10 Moving a User;
6.11 Redirecting Users to an Alternative OU;
6.12 Renaming a User;
6.13 Copying a User;
6.14 Finding Locked-Out Users;
6.15 Unlocking a User;
6.16 Troubleshooting Account Lockout Problems;
6.17 Viewing the Domain-Wide Account Lockout and Password Policies;
6.18 Applying a Fine-Grained Password Policy to a User Object;
6.19 Viewing the Fine-Grained Password Policy That Is in Effect for a User Account;
6.20 Enabling and Disabling a User;
6.21 Finding Disabled Users;
6.22 Viewing a User's Group Membership;
6.23 Removing All Group Memberships from a User;
6.24 Changing a User's Primary Group;
6.25 Copying a User's Group Membership to Another User;
6.26 Setting a User's Password;
6.27 Preventing a User from Changing a Password;
6.28 Requiring a User to Change a Password at Next Logon;
6.29 Preventing a User's Password from Expiring;
6.30 Finding Users Whose Passwords Are About to Expire;
6.31 Viewing the RODCs That Have Cached a User's Password;
6.32 Setting a User's Account Options (userAccountControl);
6.33 Setting a User's Account to Expire;
6.34 Determining a User's Last Logon Time;
6.35 Finding Users Who Have Not Logged On Recently;
6.36 Viewing and Modifying a User's Permitted Logon Hours;
6.37 Viewing a User's Managed Objects;
6.38 Creating a UPN Suffix for a Forest;
6.39 Restoring a Deleted User;
6.40 Protecting a User Against Accidental Deletion;
Chapter 7: Groups;
7.1 Introduction;
7.2 Creating a Group;
7.3 Viewing the Permissions of a Group;
7.4 Viewing the Direct Members of a Group;
7.5 Viewing the Nested Members of a Group;
7.6 Adding and Removing Members of a Group;
7.7 Moving a Group Within a Domain;
7.8 Moving a Group to Another Domain;
7.9 Changing the Scope or Type of a Group;
7.10 Modifying Group Attributes;
7.11 Delegating Control for Managing Membership of a Group;
7.12 Resolving a Primary Group ID;
7.13 Enabling Universal Group Membership Caching;
7.14 Restoring a Deleted Group;
7.15 Protecting a Group Against Accidental Deletion;
7.16 Applying a Fine-Grained Password Policy to a Group Object;
Chapter 8: Computer Objects;
8.1 Introduction;
8.2 Creating a Computer;
8.3 Creating a Computer for a Specific User or Group;
8.4 Deleting a Computer;
8.5 Joining a Computer to a Domain;
8.6 Moving a Computer Within the Same Domain;
8.7 Moving a Computer to a New Domain;
8.8 Renaming a Computer;
8.9 Adding or Removing a Computer Account from a Group;
8.10 Testing the Secure Channel for a Computer;
8.11 Resetting a Computer Account;
8.12 Finding Inactive or Unused Computers;
8.13 Changing the Maximum Number of Computers a User Can Join to the Domain;
8.14 Modifying the Attributes of a computer Object;
8.15 Finding Computers with a Particular OS;
8.16 Binding to the Default Container for Computers;
8.17 Changing the Default Container for Computers;
8.18 Listing All the Computer Accounts in a Domain;
8.19 Identifying a Computer Role;
8.20 Protecting a Computer Against Accidental Deletion;
8.21 Viewing the RODCs That Have Cached a Computer's Password;
Chapter 9: Group Policy Objects;
9.1 Introduction;
9.2 Finding the GPOs in a Domain;
9.3 Creating a GPO;
9.4 Copying a GPO;
9.5 Deleting a GPO;
9.6 Viewing the Settings of a GPO;
9.7 Modifying the Settings of a GPO;
9.8 Importing Settings into a GPO;
9.9 Creating a Migration Table;
9.10 Creating Custom Group Policy Settings;
9.11 Assigning Logon/Logoff and Startup/Shutdown Scripts in a GPO;
9.12 Installing Applications with a GPO;
9.13 Disabling the User or Computer Settings in a GPO;
9.14 Listing the Links for a GPO;
9.15 Creating a GPO Link to an OU;
9.16 Blocking Inheritance of GPOs on an OU;
9.17 Enforcing the Settings of a GPO Link;
9.18 Applying a Security Filter to a GPO;
9.19 Delegating Administration of GPOs;
9.20 Importing a Security Template;
9.21 Creating a WMI Filter;
9.22 Applying a WMI Filter to a GPO;
9.23 Configuring Loopback Processing for a GPO;
9.24 Backing Up a GPO;
9.25 Restoring a GPO;
9.26...
Erscheinungsjahr: | 2013 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XXIII
833 S. |
ISBN-13: | 9781449361426 |
ISBN-10: | 1449361420 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Svidergol, Brian
Allen, Robbie |
Auflage: | 4th edition |
Hersteller: |
O'Reilly Media
O'Reilly Media, Inc. |
Verantwortliche Person für die EU: | dpunkt.verlag GmbH, Vanessa Niethammer, Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Maße: | 221 x 182 x 50 mm |
Von/Mit: | Brian Svidergol (u. a.) |
Erscheinungsdatum: | 16.07.2013 |
Gewicht: | 1,552 kg |