Table of Contents
Windows 2000: Concepts & DeploymentLarry LiebermanNT Support EngineerPremier Enterprise SupportMicrosoft Corporation
Agenda
Active Directory
AD Architecture
AD Components (1/10)
AD Components (2/10)Objects
AD Components (3/10)Object Access
AD Components (4/10)Organizing the Directory
AD Components (5/10)OUs
AD Components (6/10)Domains
AD Components (7/10)Sites
AD Components (8/10)Trees And Forests
AD Components (9/10)Boundaries
AD Components (10/10)Global Catalog
Planning AD Design (1/6)Considerations
Planning AD Design (2/6) One Or More Forests
Planning AD Design (3/6)Domain Structure
Planning AD Design (4/6)Multiple Domains(1/3)
Planning AD Design (5/6)Multiple Domains(2/3)
Planning AD Design (6/6)Multiple Domains(3/3)
Microsoft DNS
DNS Requirements
MS DNS Features (1/12)
MS DNS Features (2/12) Active Directory Integration
MS DNS Features (3/12) Active Directory integration
MS DNS Features (4/12) Active Directory integration
MS DNS Features (5/12) Active Directory integration
MS DNS Features (6/12) Dynamic Update
MS DNS Features (7/12) Dynamic Update
MS DNS Features (8/12) Dynamic Update
MS DNS Features (9/12) Secure Dynamic Update
MS DNS Features (10/12) Aging/Scavenging
MS DNS Features (12/12) Caching Resolver
DNS Design (1/11)To support DC locator
DNS Design (2/11)
DNS Design (3/11)
DNS Design (4/11)
DNS Design (5/11)
DNS Design (6/11)
DNS Design (7/11)
DNS Design (8/11)
DNS Design (9/11)
DNS Design (10/11)
DNS Design (11/11)Hardware planning
Security Topics
Security Goals
Authentication/ Authorization
One Security Model: Multiple Security Protocols
NTLM Authentication
Kerberos Integration
Kerberos Protocol Advantages
Kerberos Unix Interoperability
Kerberos AuthNetwork Server connection
Building An Access Token with Kv5
Remote File Access Check
Architecture For Multiple Authentication Services
Windows NT 4.0 - 5.0 Interoperability
Public Key ComponentsX.509 and PKCS Standards
Crypto API Architecture
SSL Client AuthenticationIntegrated Security Administration
SSL Client Authentication
Client AuthenticationUsing SmartCards
Smart Card Logon
Management Of Trust
Encrypting File System
EFS Architecture
File Encryption
File Decryption
Active Directory Security Features
Domain Trust
Managing Security
A Security Configuration
Summary (1/2)
Summary
Group Policy Objects
Group Policy Definition
Group Policy Review
Group Policy And The Active Directory
Group Policy Linked To OUs
Filtering
Example
Conclusion
PPT Slide
|