index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
796
21.27. Searching Data in the Metaverse Problem You are troubleshooting and want to view a metaverse object. Solution You need to search the metaverse: 1. Open the Synchronization Service Manager. 2. Click the Metaverse Search button on the toolbar. 3. Click the Search button. Records from the metaverse are returned in the Search Results pane. 4. Double-click a record in the Search Results pane. 5. You can see which MA contributed data to this metaverse object. If you double￾click the object that you added a telephoneNumber to in AD, you should see its attributes detailed in the pane below the Attributes tab. 6. Click the Connectors tab. You can see which MAs this metaverse object is joined to. Discussion The Connectors tab highlights the difference between projection and provisioning. You should see that the link between the metaverse object and the connector space entries was created because of projection rules for the SQL Server MA and provisioning rules for the AD MA. That is because you configured the SQL Server MA to project objects to the metaverse, and then you wrote a rules extension to provision objects from the metaverse to the AD connector space. See Also Recipe 21.26 for searching data in the connector space; TechNet: Create a Metaverse Search Query 21.27. Searching Data in the Metaverse | 771
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
797
21.28. Deleting Data in the Connector Space and Metaverse Problem You want to clear out the connector space or the metaverse, perhaps so that you can perform another complete run-through of all these recipes to consolidate learning. Solution 1. Open the Synchronization Service Manager. 2. Click the Metaverse Designer button on the toolbar. 3. In the Actions pane on the far-right side, click Configure Object Deletion Rule. 4. Ensure that the “Delete metaverse object when connector from this management agent is disconnected” radio button is selected. 5. Place a checkmark next to the SQL Server MA in the list and then click OK. 6. Click the Management Agents button on the toolbar. 7. In the Management Agents pane, click the MA you wish to delete objects from— do the AD MA first. 8. In the Actions pane on the far-right side, click Delete. This is important: you risk deleting the whole MA if you do not perform the following step correctly. 9. Ensure that the “Delete connector space only” radio button is selected. 10. When prompted that you are sure you want to delete the connector space, click Yes. 11. A message box will appear with details of how many records were deleted. Click OK. 12. Perform steps 7–11 again on the HR Database MA. Discussion You configured the metaverse object deletion rule so that when objects from the SQL Server MA were deleted, the related metaverse objects would also be deleted. That is why you deleted objects from the AD MA first. When you performed steps 7–11 the second time, the metaverse objects were also deleted. You can prove this by searching the metaverse in between delete operations. 772 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
798
There is no metaverse delete; FIM ensures that objects in the metaverse always have a join to at least one object in a connector space from at least one MA. The object deletion rule is the configuration that tells FIM what to do with metaverse objects when con‐ nector space objects get deleted. For more control, you can specify that a rules extension should be used to make the decision for you. It is impossible to end up in the situation where FIM has an object in the metaverse but no corresponding object in any connector space. See Also TechNet: Configuring Management Agents 21.29. Extending Object Types to Include a New Attribute Problem You want to add a new attribute to an existing object type in the metaverse so that you can hold data specific to your implementation. Solution 1. Open the Synchronization Service Manager. 2. Click the Metaverse Designer button on the toolbar. 3. In the “Object type” pane, select the object type you wish to modify (e.g., Person). 4. In the lower Actions pane, click the Add Attribute listing. 5. In the Add Attribute To Object Type dialog box, click the “New attribute” button. 6. In the New Attribute dialog box, fill in the following properties: a. Attribute name (the name of the attribute as you will see it in the metaverse attributes list) Choosing a nonindexed value will let you store a much larger value here, but it cannot be indexed and should never be used for purposes of a join. b. Attribute type (the type of attribute data you can store; it defaults to String (indexable)) c. Multi-values (check this if you intend this attribute to be multivalued) 21.29. Extending Object Types to Include a New Attribute | 773
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
799
d. Indexed (check this if you intend the value to be used during join operations) 7. Click the OK button twice to accept the changes. Discussion Once an attribute is created and attached to an object type, it can be linked to any other object type by following steps 1–4 and then checking off the attribute(s) that you wish to add. Choosing a multivalued attribute type will automatically configure the attribute to also be indexed, if supported by the chosen attribute type. 21.30. Previewing Changes to the FIM Configuration Problem You want to make changes to one or more flows and you would like to confirm the exact effect the change will have before you roll it out. Solution The solution involves the use of the Preview function, which is accessed as a property of an individual connector space object: 1. Open the Synchronization Service Manager. 2. Locate the connector space object you would like to preview changes against by using the recipe for searching the connector space—you need to pick the connector in the MA that you would run the full or delta synchronization against. 3. On the Connector Space Object Properties dialog, click the Preview button (see Figure 21-15). 774 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
800
Figure 21-15. Connector Space Object Properties dialog—Preview 4. On the Preview dialog, under the “Select preview mode” section, select between a Full Synchronization or a Delta Synchronization; select the radio button accord‐ ingly and then click the Generate Preview button (see Figure 21-16). 5. In the contents pane, you can now browse each step and follow from Source Object Details all the way through provisioning to Export Attribute flow on individual connectors. 21.30. Previewing Changes to the FIM Configuration | 775
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
801
Figure 21-16. Preview dialog—Select preview mode Discussion Preview is one of the most useful aspects of the FIM product; it allows you to do what if scenarios and ascertain the exact effect any configuration change will have on the state of all identities. Incidentally, the Preview function is actually a side effect of basing FIM on SQL Server. Under normal circumstances, any given run profile step is wrapped in a SQL transaction (one transaction for every connector space object in the MA of the run profile), and as each identity is converged across all connectors, that transaction is committed to the database. In the event of an exception, only that transaction is rolled back and the next identity is processed. Given this feature, the Preview ability simply rolls back the transaction for the given object. This means that FIM is not simply sim‐ ulating what a run would look like; it’s actually executing the process exactly as it would be under normal circumstances, with the exception that the changes are not committed. Since Preview is executing every step and rolling back the transaction, be extremely careful in your rules extensions that you are not perform‐ ing actions that can’t be undone. Anything you do through a rules ex‐ tension to any source outside of FIM will not be rolled back because it is outside of the scope of the SQL transaction. You should use the Utils.InPreviewMode() property to determine when you are in Pre‐ view mode, and gate certain functions of your flow. 776 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
802
See Also TechNet: Using Metaverse Search 21.31. Committing Changes to Individual Identities Using the Commit Preview Feature Problem You want to make changes to a rules extension or flow but you would like to confirm the exact effect the change will have before you roll it out. In addition, you want to commit the changes to only a handful of records that need the changes to go into effect right away and you can’t afford to run a full synchronization to get them. Solution 1. Open the Synchronization Service Manager. 2. Locate the connector space object you would like to preview changes against by using the recipe for searching the connector space—you need to pick the connector in the MA that you would run the full or delta synchronization against. 3. On the Connector Space Object Properties dialog, click the Preview button (see Figure 21-15). 4. On the Preview dialog, under the Select preview mode section, select between a Full Synchronization or a Delta Synchronization; select the radio button accordingly and then click the Commit Preview button (see Figure 21-16). 5. In the contents pane, you can now browse each step and follow from Source Object Details all the way through provisioning to Export Attribute flow on individual connectors! Discussion Commit Preview functions like the Preview button; however, it actually commits the transaction at the end for the given connector. This allows you to automatically apply new policies to specific connectors; you should use this strategy only when you abso‐ lutely cannot afford (from a time perspective) to run a full sync. Using Commit Preview during testing and certification is recommended when you want to follow a change across data sources. See Also Recipe 21.26 for searching data in the connector space 21.31. Committing Changes to Individual Identities Using the Commit Preview Feature | 777
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
803
21.32. Passing Data Between Rules Extensions Using Transaction Properties Problem You are tracking an event that occurs in an authoritative data source and want to pass a message or a data element to one of the other extensions. Solution 1. Open Visual Studio and open your rules extension project solution. 2. You first need to set a transaction property, and while these properties can be set anywhere, you will most likely set them in ShouldProjectToMV, MapAttributes ForJoin, ResolveJoinSearch, MapAttributesForImport, MapAttributesForEx port, and Deprovision, or within the Provisioning rules extensions. The following example shows two ways of setting different types of transaction properties: ' String Dim strWF As String = "foobar" Utils.TransactionProperties.Add("WORKFLOW", strWF) ' Boolean Utils.TransactionProperties.Add("DELETE", True) 3. Once you have one or more properties set, you can query for them elsewhere: If (Utils.TransactionProperties.Contains("DELETE") AndAlso Utils.TransactionProperties("DELETE").Equals(True)) Then ' This allows for a typesafe way to query for the existence of a property End If If (Utils.TransactionProperties.Contains("WORKFLOW") AndAlso Utils.TransactionProperties("WORKFLOW").ToString.Contains("foo")) Then ' This allows you to search the contents of a string property ' You can then do an assignment Dim strWFResponse As String =↵ Utils.TransactionProperties("WORKFLOW").ToString End If If (Utils.TransactionProperties.Contains("WORKFLOW") AndAlso Utils.TransactionProperties("WORKFLOW").Equals("foobar")) Then ' This allows you to do a simple comparison End If 778 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
804
Discussion A transaction property is only good for as long as the current FIM transaction is running. This makes it relevant only to the identity you are processing, and it is available across all extensions that are touched as part of the synchronization of that identity; when the next identity is loaded for processing, all transaction properties are destroyed. See Also Recipe 21.30; Recipe 21.31 21.33. Using a Single Rules Extension to Affect Multiple Attribute Flows Problem You have several attributes that you would like to apply the same block of code to, and you don’t want to duplicate the same block of code or call the same function from multiple case statements. Solution 1. Open Visual Studio and open your rules extension project solution. 2. Add a code block similar to this (before your main select case FlowRuleName statement): If FlowRuleName.StartsWith("Trim:") Then ' Trim String ' ' Reusable code to convert an attribute to its string format ' FlowRuleName will be passed as "Trim:srcAttribute,destAttribute" ' Dim strAttributeName, strSrcAttribute, strDestAttribute, arrAttribs() As String ' Replace the beginning of the flowrulename with nothing strAttributeName = FlowRuleName.Replace("Trim:", "") arrAttribs = strAttributeName.Split(","c) ' Splits the string ' on a comma trSrcAttribute = arrAttribs(0) ' Assigns the first value strDestAttribute = arrAttribs(1) ' Assigns the second value ' Now we can assign the value and trim any whitespace at the front and back mventry(strDestAttribute).Value =↵ csentry(strSrcAttribute).Value.ToString.Trim Else If FlowRuleName.StartsWith("MyFunction:") Then 21.33. Using a Single Rules Extension to Affect Multiple Attribute Flows | 779
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
805
' Apply custom function ' ' Reusable code to apply a custom function to an attribute ' FlowRuleName will be passed as "MyFunction:sourceAttribute,destinationAttribute" ' Dim strAttributeName, strSrcAttribute, strDestAttribute, arrAttribs() As String ' Replace the beginning of the flowrulename with nothing strAttributeName = FlowRuleName.Replace("MyFunction:", "") arrAttribs = strAttributeName.Split(","c) ' Splits the string on a comma strSrcAttribute = arrAttribs(0) ' Assigns the first value strDestAttribute = arrAttribs(1) ' Assigns the second value ' Now we can apply your custom function prior to the assignment Dim strSrcAttributeValue As String strSrcAttributeValue = MySharedCodeLib.MyFunction↵ (csentry(strSrcAttribute).Value) mventry(strDestAttribute).Value =↵ strSrcAttributeValue Else ' Continue on as you normally do Select case FlowRuleName 3. Open the Synchronization Service Manager. 4. Apply the rule. Discussion Using this approach allows you to create several reusable code sections and apply them to new advanced flows without the need for code changes or recompiles. This approach is valid in both the import and export flow sections. 21.34. Flowing a Null Value to a Data Source Problem You need to delete or “flow a null” to an attribute in another data source. Solution 1. Open the Synchronization Service Manager. 2. Click the Management Agents button on the toolbar. 3. In the Management Agents pane, double-click the AD MA. 780 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
806
4. In the Management Agent Designer pane on the lefthand side, select Configure Attribute Flow. 5. Ensure that “user” is selected in the data source object type drop-down list. 6. Ensure that “person” is selected in the metaverse object type drop-down list. 7. In the Mapping Type section of the dialog, select Advanced. 8. In the Flow Direction section of the dialog, select Export and then check the box to Allow Nulls. If you don’t check the box to Allow Nulls, the rule value will never be contributed. 9. Select telephoneNumber from the data source attributes list. 10. Select <object-id> from the Metaverse attributes list. 11. Selecting <object-id> here ensures that the source value will always be present; otherwise, the rule will not fire if the source value in the metaverse is null. 12. Click New. 13. In the Advanced Export Attribute Flow Options dialog, type Delete:telephone Number. 14. Open Visual Studio and open your rules extension project solution. 15. If you are using Recipe 21.33, insert the following before the final Else; otherwise, only the final line is needed in a standard Case block: Else If FlowRuleName.StartsWith("Delete") Then ' ' Reusable code to delete the referenced attribute ' FlowRuleName will be passed as "Delete:Attribute" ' Dim strAttributeName As String ' Replace the beginning of the flowrulename with nothing ' to find the attribute to be deleted strAttributeName = FlowRuleName.Replace("Delete:", "") ' This is whre we delete the value csentry(strAttributeName).Delete() Discussion You never have to actually set a “null value” to contribute a delete to another data source. This is partially due to the fact that different systems handle null values differently and 21.34. Flowing a Null Value to a Data Source | 781
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
807
in order to contribute the proper value, the Delete() property is used to handle that translation for you. To process any Advanced Rules extension, you need to have a value in the source at‐ tribute. A common problem occurs when the source attribute is null in the metaverse, preventing the rule from firing on that identity. An advanced flow will fire if an existing value is deleted (by contributing a null), but it will never fire if the value is null to begin with. In addition, while using a fixed value like <object-id> ensures that the value will never be null, this value will never change and therefore you will require a full syn‐ chronization run to trigger this rule; however, you can use Recipe 21.31 to force a full synchronization on an individual identity and commit the changes. See Also Recipe 21.8; Recipe 21.31; Recipe 21.33 21.35. Importing and Decoding the accountExpires Attribute Problem You want to import the accountExpires attribute into the metaverse as a string￾formatted date/time value. This could be any of the Large Integer/Interval syntax at‐ tributes, such as accountExpires, badPasswordTime, lastLogoff, lastLogon, lastLo gonTimestamp, lockoutTime, or pwdLastSet. Solution 1. Open the Synchronization Service Manager. 2. See Recipe 21.29 to add a new metaverse attribute if necessary. 3. Click the Management Agents button on the toolbar. 4. In the Management Agents pane, double-click the AD MA. 5. In the Management Agent Designer pane on the lefthand side, select Configure Attribute Flow. 6. Ensure that “user” is selected in the data source object type drop-down list. 7. Ensure that “person” is selected in the metaverse object type drop-down list. 8. In the Mapping Type section of the dialog, select Advanced. 9. In the Flow Direction section of the dialog, select Import. 10. Select accountExpires from the data source attributes list. 782 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
808
11. Select the attribute created in step 2 or an existing String attribute from the Met‐ averse attributes list (e.g., AccountExpirationDate). 12. Click New. 13. In the Advanced Import Attribute Flow Options dialog, type ConvertFileTime:ac countExpires,AccountExpirationDate, and then click OK twice. 14. Open Visual Studio and open your rules extension project solution. 15. If you are using Recipe 21.33 insert the following before the final Else; otherwise, only the final line is needed in a standard Case block: ElseIf FlowRuleName.StartsWith("ConvertFileTime:") Then ' ' Reusable code to convert generalized time into string format ' FlowRuleName will be passed as "ConvertFileTime:sourceAttribute,destinationAttribute" ' Dim strAttributeName, strSourceAttribute, strDestinationAttribute,↵ arrAttribs() As String ' Replace the beginning of the flowrulename with nothing to find↵ the attribute to be deleted strAttributeName = FlowRuleName.Replace("ConvertFileTime:", "") arrAttribs = strAttributeName.Split(","c) strSourceAttribute = arrAttribs(0) strDestinationAttribute = arrAttribs(1) ' NOTE: The value will be invalid if it was never set ' (9223372036854775807 (0x7FFFFFFFFFFFFFFF)) ' or 0 if it was set and then later cleared Const AD_ACCOUNT_NO_EXPIRATION As Long = 9223372036854775807 If (strSourceAttribute = "accountExpires") Then If (csentry(strSourceAttribute).Value = 0 OrElse csentry(strSourceAttribute).Value = AD_ACCOUNT_NO_EXPIRATION) Then ' The value was cleared or never set mventry(strDestinationAttribute).Value = "Never" Else ' The value has been set Dim dtFileTime As DateTime = DateTime.FromFileTime(DateTime.Parse(csentry↵ (strSourceAttribute).Value).ToFileTme) mventry(strDestinationAttribute).Value = Format(dtFileTime, "yyyy-MM-dd") End If Else ' We are not dealing with the accountExpires attribute, just decode it Dim dtFileTime As DateTime = DateTime.FromFileTime(DateTime.Parse(csentry(strSourceAttribute).Value)↵ 21.35. Importing and Decoding the accountExpires Attribute | 783
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
809
.ToFileTime) mventry(strDestinationAttribute).Value = Format(dtFileTime, "yyyy-MM-dd") End If Discussion The Large Integer/Interval syntax in Active Directory can be decoded by using the DateTime.FromFileTime() function in the .NET Framework. By using the Date Time.Parse().ToFileTime property, you are ensuring that the value you are getting is a valid date/time. If you are concerned with data integrity here, consider wrapping this in a Try/Catch block. See Also Recipe 21.29; Recipe 21.33 21.36. Exporting and Encoding the accountExpires Attribute Problem You want to export to the accountExpires attribute from a string-formatted date/time value in the metaverse. This could be any of the Large Integer/Interval syntax attributes, such as accountExpires, badPasswordTime, lastLogoff, lastLogon, lastLogonTimes tamp, lockoutTime, or pwdLastSet. Solution 1. Open the Synchronization Service Manager. 2. Click the Management Agents button on the toolbar. 3. In the Management Agents pane, double-click the AD MA. 4. In the Management Agent Designer pane on the lefthand side, select Configure Attribute Flow. 5. Ensure that “user” is selected in the data source object type drop-down list. 6. Ensure that “person” is selected in the metaverse object type drop-down list. 784 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
810
7. In the Mapping Type section of the dialog, select Advanced. 8. In the Flow Direction section of the dialog, select Export. 9. Select accountExpires from the data source attributes list. 10. Select an existing String attribute from the Metaverse attributes list (e.g., AccountExpirationDate). 11. Click New. 12. In the Advanced Export Attribute Flow Options dialog, type ConvertFileTime:ac countExpires,AccountExpirationDate, and then click OK twice. 13. Open Visual Studio and open your rules extension project solution. 14. If you are using Recipe 21.33, insert the following before the final Else; otherwise, only the final line is needed in a standard Case block: ElseIf FlowRuleName.StartsWith("ConvertFileTime:") Then ' ' Reusable code to convert generalized time into string format ' FlowRuleName will be passed as "ConvertFileTime:sourceAttribute,destinationAttribute" ' Dim strAttributeName, strSourceAttribute, strDestinationAttribute,↵ arrAttribs() As String ' Replace the beginning of the flowrulename with nothing to find↵ the attribute to be deleted strAttributeName = FlowRuleName.Replace("ConvertFileTime:", "") arrAttribs = strAttributeName.Split(","c) strSourceAttribute = arrAttribs(0) strDestinationAttribute = arrAttribs(1) ' NOTE: The value will be invalid if it was never set ' (9223372036854775807 (0x7FFFFFFFFFFFFFFF)) ' or 0 if it was set and then later cleared Const AD_ACCOUNT_NO_EXPIRATION As Long = 9223372036854775807 If (strDestinationAttribute = "accountExpires") Then If (mventry(strSourceAttribute).IsPresent = False) Then ' The value in the metaverse is empty so remove the account expiration csentry(strDestinationAttribute).IntegerValue = 0 Else ' We should have a date value present to enforce Dim dtFileTime As DateTime = DateTime.Parse(mventry(strSourceAttribute).Value) csentry(strDestinationAttribute).IntegerValue = dtFileTime.ToFileTimeUtc() End If 21.36. Exporting and Encoding the accountExpires Attribute | 785
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
811
Else ' We are not dealing with the accountExpires attribute,↵ just encode it Dim dtFileTime As DateTime = DateTime.Parse(mventry(strSourceAttribute).Value) csentry(strDestinationAttribute).IntegerValue =↵ dtFileTime.ToFileTimeUtc() End If Discussion The Large Integer/Interval syntax in Active Directory can be encoded by using the DateTime.ToFileTime() function in the .NET Framework. By using the Date Time.Parse() property, you are ensuring that the value you are getting is a valid date/ time. If you are concerned with data integrity here, consider wrapping this in a Try/Catch block. See Also Recipe 21.29; Recipe 21.33; Recipe 21.35 786 | Chapter 21: Microsoft Forefront Identity Manager
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
812
We’d like to hear your suggestions for improving our indexes. Send email to index@oreilly.com. Index Symbols . (period), using for hostname in AdMod or Ad‐ Find, 639 15 Field Engineering diagnostics logging set‐ tings, 549 32- or 64-bit computers, 86 /3GB switch, enabling to increase LSASS cache, 86 5807 events, 403 88 classes, finding, 375 A abstract classes, finding, 375 Access Control Entries (ACEs), 252 access control, dynamic (see Dynamic Access Control) Account Lockout and Management toolset, 212 accountExpires attribute, user objects, 237 exporting and encoding, 784 importing and exporting in FIM, 782 ACEs (Access Control Entries), 252 ACL Editor, 513 changing ACL of an object, 518 configuring permission inheritance, 516 customizing, 514 familiarizing yourself with, 514 resetting object’s ACL to default defined in schema, 521 viewing effective permissions on an object, 515 acldiag utility comparing ACL of object to default defined in schema, 520 viewing effective permissions on an object, 516 ACLs (access control lists), 47, 501 AD LDS permissions, 652 changing default for object class in schema, 519 changing for an object, 518 comparing ACL of object to default in sche‐ ma, 520 computer objects, 277 DACL and SACL, 252 GPO, security filtering and, 328 List Object Access mode and, 524 modifying ACL on administrator accounts, 525 resetting object’s ACL to default defined in schema, 521 setting when delegating control of an OU, 183 viewing ACL for an object, 513 Active Directory creating AD management agent in FIM, 724 Exchange Server and, 674 787
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
813
exporting objects from AD MA to Active Di‐ rectory, 750 multiple versions on corporate networks, 3 preparing for Exchange, 676 setting up advanced export attribute flow from FIM, 736 simple export attribute flow from FIM, 729 Active Directory Administrative Center ACL Editor, customizing, 514 applying FGPP to group object, 270 applying fine-grained password policy to user object, 216 authoritative restore of object or subtree, 586 changing user’s primary group, 223 configuring central access rule for Dynamic Access Control, 533 copying user’s group membership to another user, 225 creating a computer, 274 creating a fine-grained password policy (FGPP), 342 creating a user, 192 creating an OU, 166 creating central access policy for Dynamic Access Control, 534 creating claim type, 531 creating computer for specific user or group, 276 creating groups, 249 creating resource property for Dynamic Ac‐ cess Control, 532 Deleted Objects container, 577 deleting a computer, 278 deleting a user, 201 finding domain controllers or global catalog servers in a site, 91 finding orphaned objects, 454 modifying an object, 134 modifying computer object’s attributes, 292 modifying default display name when creat‐ ing users, 191 modifying group attributes, 260 moving a group within a domain, 256 moving object to different OU or container, 145 preventing user from changing a password, 228 preventing user’s password from expiring, 230 removing all group memberships from user, 222 requiring user to change password at next logon, 229 restoring a deleted group, 268 restoring deleted domain controller in Win‐ dows Server 2012, 80 restoring deleted user, 244 searching for deleted objects, 602 setting user’s account options, 233 setting user’s account to expire, 236 setting user’s password, 227 undeleting a single object, 603 viewing direct members of a group, 252 Active Directory Application Mode (ADAM), 625 Active Directory Certificate Services (AD CS), 17, 502 Active Directory Domain Services (AD DS), 16, 17 removing AD DS role, 19 stopping and restarting, 576 Active Directory Domains and Trusts MMC snap-in configuring alternate UPN suffix, 667 creating an external trust, 35 creating shortcut trust between AD do‐ mains, 39 creating trust to a Kerberos realm, 40 creating UPN suffix for a forest, 243 finding Domain Naming FSMO role, 95 managing Selective Authentication for trusts, 49 raising domain function level to Windows Server 2012, 27 raising functional level of Windows Server 2008 or 2008 R2 forest, 28 resetting a trust, 45 transferring Domain Naming FSMO role, 98 verifying a trust, 44 viewing trusts for a domain, 42 Active Directory Federation Services, 17, 657– 672 configuring a claims provider trust, 665 configuring AD FS 2.x and AD FS 1.x intero‐ perability, 668–671 configuring alternate UPN suffix, 666 configuring LDAP attribute store, 661 configuring logging for, 671 788 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
814
configuring Microsoft SQL Server attribute store, 662 creating a replying party trust, 664 creating claim descriptions, 663 installing AD FS Federation Service, 660 installing prerequisites, 658 Active Directory Federation Services MMC snap-in (see AD FS MMC snap-in) Active Directory Lightweight Directory Service, 17, 625–656 AD Schema Analyzer, 353 changing password for a user, 640 changing ports used by an instance, 633 configuring intra-site replication, 648 creating groups, 643 creating new instance of, 627 creating new replica of configuration set, 629 enabling and disabling a user, 641 enabling auditing of access, 654 extending AD LDS Schema, 634 forcing replication, 649 importing data into an instance, 647 installing, 626 listing instances installed on a computer, 633 managing AD LDS application partitions, 636 managing group memberships, 644 managing organizational units, 637 managing permissions, 652 managing replication authentication, 650 managing users, 639 starting and stopping an instance, 631 viewing and modifying object attributes, 645 Active Directory Lightweight Directory Services Setup Wizard creating new AD LDS instance, 627 creating new replica of AD LDS configura‐ tion set, 629 Active Directory Migration Tool (ADMT) MMC snap-in moving a group to another domain, 257 moving computer to new domain, 281 moving object between different domains, 147 Active Directory Recycle Bin feature, 80, 576 Active Directory Rights Management Services, 17 Active Directory Schema Analyzer, 353 Active Directory Schema MMC snap-in adding new attribute to the schema, 354 adding new class to the schema, 360 changing default ACL for object class in schema, 519 deactivating classes and attributes, 382 finding FSMO role holders, 95 finding mandatory and optional attributes of a class, 377 finding structural, auxiliary, abstract, and 88 classes, 375 indexing an attribute, 363 managing Schema Master FSMO, 386 modifying attributes copied during duplica‐ tion of a user, 365 modifying attributes included in ANR, 367 modifying default security of a class, 378 registering, 349 reloading the schema cache, 384 transferring FSMO roles, 98 viewing a class, 362 viewing an attribute, 358 Active Directory Services Interface (ADSI), fast binds, 116 Active Directory Sites and Services MMC snap￾in changing inter-site replication interval, 446 configuring intra-site replication for AD LDS, 649 configuring universal group caching for a site, 399 creating a connection object, 428 creating a site, 393 creating a site link, 407 creating a site link bridge, 417 creating a subnet, 401 delegating control of a site, 398 Delegation of Control Wizard, 507 deleting a site, 397 deleting a subnet, 405 disabling inter-site compression of replica‐ tion traffic, 448 disabling KCC for a site, 434 disabling site link transitivity or site link schedules, 415 enabling and disabling global catalog (GC), 87 enabling change notification for a site link, 412 Index | 789
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
815
enabling universal group membership cach‐ ing, 266 finding ISTG for a site, 430 forcing AD LDS replication, 650 forcing replication from one domain con‐ troller to another, 442 listing connection objects for a server, 429 listing replication partners for domain con‐ troller, 455 listing servers in a site, 421 listing sites in a domain, 395 listing subnets, 402 modifying cost for a site link, 411 modifying replication schedules, 413 modifying sites associated with a site link, 410 moving domain controller to a different site, 77, 422 protecting an OU against accidental dele‐ tion, 187 renaming a site, 396 setting preferred bridgehead server for a site, 419 transferring ISTG to another site, 431 triggering the KCC, 432 Active Directory Users and Computers MMC snap-in, 52 ACL Editor, customizing, 514 adding and removing group members, 254 adding or removing computer account from a group, 285 assigning or removing manager for an OU, 183 changing scope or type of a group, 259 copying a user, 208 creating inetOrgPerson user, 196 delegating control for managing group membership, 263 delegating control of an OU, 182 Delegation of Control Wizard, 507 deleting an object, 154 deleting an OU, 174 deleting objects in an OU, 172 determining user’s last logon time, 237 enabling and disabling users, 218 enumerating objects in an OU, 171 enumerating OUs in a domain, 168 exporting objects to CSV file, 161 finding an OU, 169 finding computers with particular OS, 294 finding disabled users, 219 finding domain controllers for a domain, 74 finding holders of PDC Emulator, RID Mas‐ ter, and Infrastructure Master roles, 96 finding users who haven’t logged on recently, 239 identifying a computer’s role, 301 listing all computer accounts in a domain, 300 loading telephoneNumber changes from AD into FIM, 765 modifying an OU, 180 modifying attribute for several users at once, 200 modifying default display name when creat‐ ing users, 191 modifying Password Replication Policy (PRP) on RODC, 63 moving computer within same domain, 280 moving objects to different OU, 175 moving users, 203 protecting computer against accidental dele‐ tion, 302 protecting group against accidental deletion, 269 protecting OU against accidental deletion, 186 protecting user against accidental deletion, 245 renaming an OU, 178 renaming users, 206 resetting a computer account, 287 resolving primary group ID for a user, 264 restricting DHCP administrators, 498 revoking delegated permissions, 512 setting user’s profile attributes, 202 unlocking a user, 210 viewing and modifying user’s permitted log‐ on hours, 240 viewing effective PSO for a user, 345 viewing fine-grained password policy for user account, 217 viewing nested members of a group, 253 viewing permissions of a group, 251 viewing RODCs that cached computer’s password, 303 viewing user’s group membership, 221 790 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
816
AD CS (see Active Directory Certificate Serv‐ ices) AD Directory Information Tree (DIT) (see DIT; ntds.dit file) AD DS (see Active Directory Domain Services) AD FS MMC snap-in configuring AD FS 2.x and AD F 1.x intero‐ perability, 668 configuring LDAP attribute store, 662 configuring Microsoft SQL Server attribute store, 662 creating a replying party trust, 664 creating claim descriptions, 663 AD integrated zones, 462 converting standard primary zone to, 468 delegating control of, 474 moving into application partition, 469 AD LDS (see Active Directory Lightweight Di‐ rectory Service) ADAC (see Active Directory Administrative Center) ADAM (Active Directory Application Mode), 625 adaminstall utility, 631 Add Attribute To Object Type dialog box, 773 Add Monitored Server Wizard, 418 Add-ADFSRelyingPartyTrust cmdlet, 665 Add-DnsServerConditionalForwarderZone cmdlet, 474 Add-DnsServerPrimaryZone cmdlet, 464 address list, creating, 700 AdFind utility attribute-scoped queries with -asq switch, 127 configuring universal group caching for a site, 400 connecting to object GUID, 117 counting objects in Active Directory, 111 deleting objects in an OU, 173 determining number of child objects for an OU, 181 determining user’s last logon, 237 disabling KCC for a site, 435 displaying efficiency statistics for queries, 552 displaying RootDSE object, 105 enabling change notification for site link, 413 enumerating and connecting to well-known GUIDs, 118 enumerating objects in an OU, 171 enumerating OUs in a domain, 168 exporting objects to CSV file, 161 switches to customize CSV file output, 162 finding all group memberships for user, 225 finding an OU, 169 finding application partitions hosted by a DC, 616 finding application partitions in a forest, 610 finding attributes included in ANR, 369 finding attributes included in PAS, 371 finding attributes not copied during user du‐ plication, 366 finding classes, 376 finding computers with particular OS, 295 finding conflict objects, 452 finding disabled users, 220 finding GPOs in a domain, 308 finding indexed attributes, 364 finding ISTG for a site, 430 finding linked attributes, 374 finding mandatory and optional attributes of a class, 377 finding nonreplicated and constructed at‐ tributes, 372 finding orphaned objects, 454 finding Schema FSMO role owner, 386 finding site links for a site, 409 LDAP controls, 113 listing replication partners for domain con‐ troller, 455 listing servers in site topology, 421 listing sites in a forest, 395 listing subnets and displaying their proper‐ ties, 402 moving objects between OUs, 175 removing all group memberships from user, 223 searching for deleted objects, 602 searching for objects in a domain, 120 searching the global catalog, 123 searching with bitwise filter, 129 undeleting a container object, 605 using with AdMod to modify AD Users and Computers, 53 using with AdMod to remove a trust, 46 Index | 791
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
817
viewing AD LDS object attributes, 646 viewing an attribute, 358 viewing class properties, 362 viewing created and last-modified time‐ stamps of an object, 156 viewing direct members of a group, 252 viewing object metadata, 456 viewing object’s attributes, 107, 110 viewing permissions of a group, 251 viewing RODCs that cached computer’s password, 304 viewing site properties, 395 working with AD LDS, creating environ‐ ment variables for often-used switches, 638 ADFS (see Active Directory Federation Serv‐ ices) Admin Role Separation feature, 62 Admin SD Holder process, 525 permissions and, 518 administration, 182 (see also Active Directory Administrative Center) assigning or removing manager for an OU, 183 creating administrative alert for perfor‐ mance, 559 delegating control for managing group membership, 263 delegating control of a site, 398 delegating control of AD integrated zone, 474 delegating control of an OU, 182 delegating control of managing application partition, 621 delegating for GPOs, 329 delegating rights to authorize DHCP server, 496 Delegation of Control Wizard, 507 customizing, 509–511 emailing administrator on performance alert, 560 Exchange Server 2013, 674 modifying ACL on administrator accounts, 525 resetting DSRM administrator password, 584 restricting DHCP administrators, 497 revoking delegated permissions, 512 Administrative templates (.adm files), 306 Administrator account, viewing attributes of, 107 .adml files, creating custom settings for GPO, 319 AdMod utility, 53 (see also AdFind utility) adding and removing group members, 255 adding attribute to RO-FAS, 381 adding new class, 360 adding or removing computer from a group, 285 adding schema attribute, 355 allowing computers to use different domain suffix, 494 assigning or removing manager for an OU, 184 changing inter-site replication interval, 447 changing intra-site replication notification interval, 445 changing machine account quota, 291 changing password for AD LDS user, 641 changing scope or type of a group, 259 changing subnet’s site assignment, 406 changing tombstone weight in quota calcu‐ lations, 569 configuring alternate UPN suffix, 667 configuring universal group caching for a site, 400 converting user object to inetOrgPerson ob‐ ject, 199 copying user’s group membership to another user, 225 creating a computer, 275 creating a site, 394 creating a site link, 408 creating a site link bridge, 417 creating a subnet, 401 creating a user account, 193 creating an object, 132 creating an OU, 166 creating groups, 249 numeric values for group types, 249 creating inetOrgPerson user, 197 creating large number of users, 195 creating or deleting AD LDS OUs, 638 creating UPN suffix for a forest, 243 deactivating classes, 382 deleting a computer, 278 792 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
818
deleting a site, 397 deleting a subnet, 406 deleting a user, 201 deleting an object, 154 deleting an OU, 174 deleting container with child objects, 155 disabling inter-site compression of replica‐ tion traffic, 448 disabling KCC for a site, 435 dynamically linking auxiliary class to exist‐ ing object instance, 139 enabling and disabling global catalog (GC), 87 enabling group caching, 267 LDAP controls, 113 managing AD LDS replication authentica‐ tion, 651 managing AD LDS users, 639 managing confidentiality bit for schema at‐ tributes, 379 modifying AD LDS object attributes, 646 modifying an object, 134 modifying an OU, 180 modifying attributes copied during user du‐ plication, 365 modifying attributes included with ANR, 367 modifying computer object’s attributes, 293 modifying cost for a site link, 412 modifying default display name when creat‐ ing users, 191 modifying default security of a class, 378 modifying group attributes, 261 modifying replication schedules, 414 modifying set of attributes stored on global catalog, 370 modifying tombstone lifetime for a domain, 606 moving a computer within same domain, 281 moving a group within a domain, 256 moving an OU, 178 moving domain controller to different site, 77, 422 moving object to different OU or container, 146 moving users, 204 performing online defrag, 593 refreshing a dynamic object, 143 reloading the schema cache, 384 removing all group memberships from user, 223 renaming a site, 396 renaming an object, 151 renaming an OU, 179 renaming users, 207 requiring user to change password at next logon, 229 restricting DHCP administrators, 498 searchFlags value for classSchema object, en‐ abling, 363 setting preferred bridgehead server for a site, 420 setting reference domain for application par‐ tition, 621 setting replication notification delay for ap‐ plication partition, 619 setting user’s password, 227 setting user’s profile attributes, 202 transferring ISTG to another site, 431 using with AdFind to move objects to differ‐ ent OU, 175 using with AdFind to remove a trust, 46 working with AD LDS, creating environ‐ ment variables for often-used switches, 638 ADMT (see Active Directory Migration Tool MMC snap-in) .admx files, 306 creating custom settings for GPO, 318 AdPrep utility preparing domain for Windows upgrade, 352 preparing domain or forest for Windows Server 2012, 30 determining if AdPrep has completed, 31 preparing forest for Windows upgrade, 352 adrestore utility, 602, 604 ADSI (Active Directory Services Interface), fast binds, 116 ADSI Edit adding fields to AD Users and Computers, 52 adding or removing replica server for appli‐ cation partition, 611 changing garbage collection interval, 598 changing intra-site replication notification interval, 445 Index | 793
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
819
changing maximum number of computers user can join to domain, 291 changing password for AD LDS user, 640 changing weight of tombstone objects in quota calculations, 568 computers using different domain suffix from AD domain, 493 converting between user and inetOrgPerson objects, 198 creating an object, 132 creating or deleting AD LDS groups, 643 delegating control of managing application partition, 621 delegating rights to authorize DHCP server, 496 deleting an object, 153 deleting container with child objects, 155 determining if AdPrep has completed, 32 dynamically linking auxiliary class to exist‐ ing object instance, 139 enabling and disabling AD LDS user, 642 enabling anonymous LDAP access, 505 enabling List Object Access mode, 523 finding replica servers for application parti‐ tion, 614 managing AD LDS group memberships, 644 managing AD LDS replication authentica‐ tion, 651 managing AD LDS users, 639 modifying default display name when creat‐ ing users, 191 modifying default LDAP query policy, 157 modifying default TTL settings for dynamic objects, 144 modifying tombstone lifetime for a domain, 605 referencing an external domain, 149 removing AD LDS application partition, 636 renaming an object, 151 setting default quota for all security princi‐ pals, 570 setting reference domain for application par‐ tition, 620 setting replication notification delay for ap‐ plication partition, 618 viewing and modifying AD LDS object at‐ tributes, 646 viewing RODCs that cached user’s password, 232 viewing user’s managed objects, 242 ADS_GROUP_TYPE_SECURITY_ENABLED flag, 260 ADS_USER_FLAG_ENUM enumeration, 235 ADUC MMC snap-in (see Active Directory Users and Computers MMC snap-in) Advanced Export Attribute Flow Options dialog box, 785 Advanced Import Attribute Flow Options dia‐ log box, 783 Ambiguous Name Resolution (ANR), 130 default attributes included with, 368 efficiency statistics on search, 553 modifying attributes included with, 367 anonymous LDAP access, 505 ANR (see Ambiguous Name Resolution) anti-malware scanning for Exchange Server, en‐ abling or disabling, 704 application partitions, 14, 607–623 adding or removing replica server for, 611 anatomy of, 608 creating and deleting, 608 defined, 469 delegating control of management, 621 finding in a forest, 609 finding replica servers for, 613 hosted by a server, finding, 615 managing for AD LDS, 636 moving AD integrated zones into, 469 setting reference domain for, 620 setting replication notification delay for, 618 verifying instant correction on a server, 616 Assessment and Planning Solution Accelerator, 35 attribute flow rules, 718 defining advanced import attribute flow, 731 implementing advanced attribute flow rules extension, 733–736 setting up advanced export attribute flow in Active Directory, 736 setting up simple export attribute flow to Ac‐ tive Directory, 729 setting up simple import attribute flow, 727 using single rules extension to affect multi‐ ple attribute flows, 779 attribute stores configuring LDAP attribute store for AD FS, 661 794 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
820
configuring Microsoft SQL Server attribute store for AD FS, 662 extracting attribute store information as AD FS 1.x claim types, 669 attribute value assertions (AVAs), 145 attribute-scoped query, searching with, 126 attributes adding new attribute to the schema, 354–357 adding to object type in FIM, 773 adding to Read-Only Filtered Attribute Set (RO-FAS), 381 copied during duplication of user, modify‐ ing, 365 data stored by attributes set on an object, 457 deactivating, 382 finding linked attributes, 373 finding mandatory and optional attributes of a class, 377 finding nonreplicated and constructed at‐ tributes, 371 indexing, 363 managing confidentiality bit, 379 modifying attributes included in ANR, 367– 369 modifying set of attributes stored on global catalog, 369 of site objects, 390 OID for new attribute, 350 redefining, 383 viewing properties of, 358 attributeSchema objects, 14, 348 adding to Schema container, 356 attributes of, 349 lDAPDisplayName attribute, 359 linkID attribute, 375 searchFlags and systemFlags attributes, 130 searchFlags attribute, 364 systemFlags bit values, 359 attributeSyntax attribute, 356 auditing enabling for AD LDS access, 654 enabling for directory access, 561–564 enabling for Registry keys, 564 authentication, 502 authorization versus, 657 enabling claims for devices in a domain, 536 enabling domain controller support for claims and compound authentication, 535 enabling Kerberos logging, 545 enabling strong domain authentication, 521 forcing Kerberos to use TCP, 527 managing AD LDS replication authentica‐ tion, 650 modifying Kerberos settings, 529 Selective Authentication for trusts, 49 viewing access tokens, 530 viewing and purging Kerberos tickets, 526 authoritative restore complete, performing, 588 performing for object or subtree, 586 requiring full reboot into DSRM, 576 restoring a deleted object, 244 authorization, 657 auxiliary classes dynamically linking to existing object in‐ stances, 139 finding, 375 AVAs (attribute value assertions), 145 B backlink, 375 backup, 576 backing up the AD database, 578 creating reserve file on disk containing ntds.dit file, 595 snapshots of AD database, 578, 579–581 tombstone objects and, 577 Backup-GPO cmdlet, 336 backupgpo.wsf script, 335 bcdedit utility, 86 restarting domain controller in DSRM, 583 bit flag attribute, modifying, 136–138 sample bit flag attribute values, 137 bitwise filters, searching with, 128 books and magazines on Active Directory, 9 bridgehead servers finding for a site, 418 setting preferred server for a site, 419 C CalcBit function, 138 CD (connected directory) in FIM, 710 Index | 795
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
821
central access policy applying, 535 creating, 534 central access rule, 533 Certificate Lifecycle Manager (CLM), 707 certificate requests, generating in IIS installa‐ tion, 658 certificates, installing, 660 certreq utility, 660 change notification, enabling for a site link, 412 child domains, 20 circular logging, 575 claims, 657 configuring a claims provider trust, 665 configuring AD FS 2.x and AD FS 1.x intero‐ perability, 668–671 creating a claim type, 531 creating claim descriptions, 663 enabling domain controller support for, 535 enabling for devices in a domain, 536 classes AD, claim types associated with, 531 adding new class to schema, 360 changing default ACL for object class in schema, 519 deactivating, 382 default ACL for object class in schema, com‐ paring to ACL of an object, 520 dynamically linking auxiliary class to exist‐ ing object instance, 139 finding mandatory and optional attributes of, 377 finding structural, auxiliary, abstract, and 88 classes, 375 modifying default security, 378 OID for new class, 350 redefining, 383 supported class types in AD schema, 376 viewing attributes of, 362 classSchema objects, 14 attributes of, 347 creating, important attributes, 361 objectClassCategory attribute, 376 CLI (command-line interface), 2 AD FS configuring alternate UPN suffix, 667 generating a certificate request, 659 AD LDS changing password for user, 641 creating new instance, 628 creating new replica of configuration set, 630 enabling auditing of access, 655 enabling or disabling a user, 642 extending the schema, 635 forcing replication, 650 importing data into an instance, 647 listing instances installed on a computer, 633 managing application partitions, 636 managing group memberships, 644 managing OUs, 638 managing permissions, 653 managing replication authentication, 651 managing users, 639 starting and stopping an instance, 632 viewing and modifying object attributes, 646 adding fields to AD Users and Computers, 53 application partitions adding or removing replica server for, 612 creating and deleting, 609 delegating control of managing, 622 finding in a forest, 610 finding replica servers for, 614 hosted by a server, finding, 615 setting reference domain for, 620 setting replication notification delay, 619 verifying correct instantiation on server, 617 backup and recovery authoritative restore of object or subtree, 586 backing up the AD database, 578 creating AD snapshot, 579 creating reserve DIT file, 595 mounting AD snapshot, 580 nonauthoritative restore of domain con‐ troller, 585 performing AD database recovery, 594 resetting DSRM administrator password, 584 restarting domain controller in DSRM, 583 computer objects adding or removing from a group, 285 796 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
822
binding to default container, 297 changing default container for, 299 changing machine account quota, 291 creating, 275 creating computer for specific user or group, 276 deleting, 278 finding computers with particular OS, 294 finding inactive or unused computers, 289 identifying computer role, 301 joining to a domain, 279 listing all computer accounts in a do‐ main, 300 modifying attributes, 293 moving to different domain, 282 moving within same domain, 281 protecting against accidental deletion, 303 renaming, 284 resetting computer account, 288 testing secure channel for, 286 viewing RODCs that cached password, 304 deleted objects, searching for, 602 DHCP authorizing a DHCP server, 495 restricting administrators, 498 DIT maintenance checking integrity of DIT file, 589 determining amount of whitespace in DIT, 596 determining size of DIT file, 601 moving DIT files, 590 offline defrag of DIT to reclaim space, 597 performing online defrag manually, 593 repairing or recovering the DIT, 591 DNS clearing DNS server cache, 483 computers using different domain suffix from AD domain, 494 configuring conditional forwarding, 473 configuring forwarding, 472 configuring zone transfers, 470 converting zone to AD integrated zone, 468 creating and deleting resource records, 476 creating forward lookup zone, 463 creating reverse lookup zone, 465 delegating control of AD integrated zone, 475 deregistering DC’s resource records, 488 enabling DNS server debug logging, 486 modifying DNS server configuration, 480 moving AD integrated zones into appli‐ cation partition, 469 preventing DC from dynamically regis‐ tering resource records, 489, 491 querying resource records, 478 registering DC’s resource records, 488 scavenging old resource records, 481 verifying DC can register its resource re‐ cords, 484 viewing server’s zones, 466 domain controllers configuring to use external time source, 84 finding closest, 75 finding DC or GC servers in a site, 91 finding DCs and GCs via DNS, 92 finding for a domain, 74 finding number of logon attempts for, 85 finding services advertised by, 79 finding site for, 76 increasing LSASS cache, 86 modifying password caching policy on all RODCs, 64 modifying Password Replication Policy on RODC, 63 moving to different site, 77 removing, 71 renaming, 73 resetting TCP/IP stack, 82, 82 restoring deleted DC in Windows Server 2012, 81 verifying promotion of, 70 domains finding duplicate SIDs, 51 finding NetBIOS name of, 25 removing orphaned domain, 22 Exchange Server 2013 creating unattended installation files for, 683 installing first server, 680 Index | 797
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
823
installing management tools, 684 preparing Active Directory for Exchange, 677 stopping and starting, 685 finding disabled users, 220 finding duplicate SIDs in a domain, 51 finding locked-out users, 209 finding users with passwords nearing expira‐ tion, 231 forests creating UPN suffix for, 243 FSMO roles finding holders of FSMO roles, 96 finding PDC Emulator role owner via DNS, 100 seizing, 99 transferring a role, 98 transferring to different DC, 98 garbage collection interval, changing, 599 global catalog checking if DC promotion is complete, 89 enabling and disabling, 87 enumerating GC servers in a forest, 90 Group Policy Management Console sample scripts, 307 Group Policy Objects (GPOs) applying security filter to, 328 backing up, 335 copying, 310 creating, 309 creating migration table for, 317 deleting, 311 editing fine-grained password policy, 344 finding GPOs in a domain, 308 importing settings into, 315 listing links for, 324 refreshing settings on a computer, 340 restoring, 337 restoring default GPO, 341 reviewing settings, 313 viewing effective PSO for a user, 345 viewing RSoP, 339 groups adding and removing members, 255 applying fine-grained password policy to, 271 changing scope or type of, 259 creating, 249 delegating control for managing mem‐ bership, 263 enabling universal group membership caching, 266 modifying attributes, 261 moving to another domain, 258 moving within a domain, 256 protecting against accidental deletion, 270 viewing direct members of, 252 viewing nested members of, 254 viewing permissions of, 251 help information for tools, 7 LDIF and ldifde utility, 4 logging enabling diagnostics logging, 541 enabling GPO client logging, 543 enabling Kerberos logging, 545 enabling NetLogon logging, 542 logging number of expired tombstone ob‐ jects, 600 monitoring using STATS control to view LDAP query statistics, 552 viewing DNS server performance statis‐ tics, 546 Windows Time Service, 548 objects connecting to object GUID, 117 counting in Active Directory, 111 creating an object, 132 creating dynamic object, 141 deleting an object, 154 deleting container with child objects, 155 displaying RootDSE object, 105 dynamically linking auxiliary class to ex‐ isting object instance, 139 exporting to CSV file, 161 importing using LDIF file, 160 modifying an object, 134 modifying default LDAP query policy, 157 modifying default TTL settings for dy‐ namic objects, 144 moving to different OU or container, 146 refreshing a dynamic object, 143 renaming an object, 151 searching for large number of, 125 searching for, in a domain, 120 798 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
824
searching the global catalog, 123 searching with attribute-scoped query, 127 searching with bitwise filter, 129 using LDAP controls, 113 viewing attributes, 107 viewing created and last-modified time‐ stamps, 156 organizational units assigning or removing manager, 184 creating an OU, 166 deleting an OU, 174 deleting objects in an OU, 173 determining number of child objects, 181 enumerating objects in an OU, 171 enumerating OUs in a domain, 168 finding an OU, 169 modifying an OU, 180 moving an OU, 177 moving objects between OUs, 175 protecting against accidental deletion, 186 renaming an OU, 179 quotas assigned to security principal, finding, 567 changing tombstone weight in quotas, 568 creating, 565 finding usage for security principals, 571 setting default for security principals, 570 replaceable text in examples, 6 replication changing inter-site replication interval, 447 changing intra-site replication notifica‐ tion interval, 445 checking for potential problems, 449 determining if domain controllers are in sync, 439 disabling inter-site compression of traf‐ fic, 448 enabling and disabling on DCs, 444 enabling strict or loose consistency, 451 finding conflict objects from collisions, 452 finding orphaned objects, 454 forcing from one DC to another, 442 listing replication partners for a DC, 455 viewing object metadata, 456 viewing status for domain controllers, 440 viewing unreplicated changes between DCs, 442 running tools with alternate credentials, 3 schema adding attribute to Read-Only Filtered Attribute Set (RO-FAS), 381 adding new attribute, 355 adding new class, 360 copying attributes when duplicating a user, 365 deactivating classes and attributes, 382 finding classes, 375 finding linked attributes, 374 finding mandatory and optional at‐ tributes of a class, 377 finding nonreplicated and constructed attributes, 372 indexing an attribute, 363 managing confidentiality bit, 379 managing Schema Master FSMO, 386 modifying attributes included in ANR, 367 modifying attributes stored on global cat‐ alog, 369 modifying default security of a class, 378 reloading the cache, 384 viewing a class, 362 viewing an attribute, 358 security and authentication changing ACL of an object, 518 comparing ACL of object to default de‐ fined in schema, 520 configuring permission inheritance, 517 delegation of control over objects, 508 forcing Kerberos to use TCP, 528 LDAP signing and encryption, tools sup‐ porting, 504 resetting object’s ACL to default in sche‐ ma, 521 revoking delegated permissions, 512 viewing access tokens, 530 viewing ACL for an object, 513 viewing and purging Kerberos tickets, 527 viewing effective permissions on an ob‐ ject, 516 Index | 799
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
825
site topology changing interval to run KCC, 436 changing subnet’s site assignment, 406 configuring universal group caching, 400 creating a site, 393 creating a site link, 408 creating a site link bridge, 417 creating a subnet, 401 creating connection object, 428 delegating control of a site, 398 deleting a site, 397 deleting a subnet, 405 determining if KCC completes success‐ fully, 433 disabling automatic site coverage for do‐ main controller, 425 disabling KCC for a site, 434 enabling change notification for site link, 413 finding bridgehead servers for a site, 418 finding ISTG for a site, 430 finding site for a client, 426 finding site links for a site, 409 forcing host into a particular site, 427 listing connection objects for a server, 429 listing servers in, 421 listing sites in a domain, 395 listing subnets, 402 modifying cost for a site link, 411 modifying replication schedules, 414 modifying sites associated with a site link, 410 moving domain controller to different site, 422 renaming a site, 396 setting preferred bridgehead server, 420 transferring ISTG to another site, 431 triggering the KCC, 432 viewing site coverage for domain con‐ troller, 424 third-party tools, finding, 3 tombstone lifetime for a domain, modifying, 606 trusts creating external trust, 36 creating shortcut trust between AD do‐ mains, 39 creating transitive trust between AD for‐ ests, 37 creating trust to a Kerberos realm, 41 enabling quarantine for, 48 enabling Selective Authentication, 50 enabling SID filtering, 47 removing, 46 resetting, 45 verifying, 44 viewing for a domain, 42 undeleting a container object, 605 users applying fine-grained password policy to, 216 converting user object to inetOrgPerson object, 199 copying group membership to another user, 225 creating, 193 creating inetOrgPerson user, 197 creating large number of, 195 deleting, 201 determining last logon time, 237 disabled, finding, 220 enabling and disabling, 219 finding locked-out users, 209 finding users whose password is nearing expiration, 231 finding with no recent logon, 239 modifying attribute for several at once, 200 modifying default display name when creating, 191 moving, 204 preventing from changing password, 228 preventing password from expiring, 230 protecting against accidental deletion, 245 redirecting to alternative OU, 206 removing all group memberships from, 223 renaming, 207 requiring to change password at next log‐ on, 229 setting account expiration, 236 setting account options (userAccount‐ Control), 234 setting password, 227 unlocking, 211 800 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
826
updating profile attributes, 202 viewing fine-grained password policy for, 217 viewing group membership, 221 viewing managed objects, 242 viewing RODCs that cached password, 233 Client Access Server role (Exchange Server 2013), 674 client resolver cache, flushing, 483 CLM (Certificate Lifecycle Manager), 707 comma-separated values (see CSV files) Commit Preview feature, using in FIM, 777 common name (cn) setting for classSchema objects, 361 specifying for attribute, 359 Computer Migration Wizard, 281 computer objects, 273–304 adding or removing computer account from a group, 285 attributes of, 273 binding to default container, 296 changing default container for, 298 changing maximum number user can join to a domain, 290 creating, 274 creating computer for specific user or group, 276 disabling computer settings in a GPO, 322 domain controller, attributes of, 56 domain controller, storage of old names, 73 finding inactive or unused computers, 289 finding with particular OS, 294 identifying a computer’s role, 301 joining a computer to a domain, 278 listing all computer accounts in a domain, 300 migrating between domains, 147 modifying attributes of, 292 modifiable attributes, 293 moving computer within same domain, 280 moving to new domain, 281 operating system service-pack-level at‐ tributes of, adding to ADUC, 52 protecting against accidental deletion, 302 RDOC, attributes of Password Replication Policy, 58 refreshing GPO settings on, 340 renaming, 283 resetting computer account, 287 restoration of, issues with, 587 testing secure channel for a computer, 286 userAccountControl attribute, 130, 234 computers AD LDS instances installed on, listing, 633 deleting, 278 finding site for client computer, 426 using different domain suffix from their AD domain, 493 Computers container, 297 concurrent binds, 114 conditional forwarding (DNS), configuring, 473 confidentiality bit, managing for schema at‐ tributes, 379 Configuration NC, 13, 607 Deleted Objects WKGUID, 297 enumerating well-known GUIDs in, 118 Partitions container, 608 replication to domain controllers, 55 Sites container, 389 objects in, 57 Subnets container, 402 well-known GUIDs in, 119 configuration set (AD LDS), creating new repli‐ ca of, 629 confirming import, 752 conflict objects determining, 453 finding from replication collisions, 452 connected directory (CD) in FIM, 710 connection objects, 389 creating, 428 listing for a server, 429 management by KCC, 456 connector space (CS), 710, 712 deleting data in, 772 management agents and, 717 searching data in, 769 Connector Space Object Properties dialog box, 774 connectors, 714 constructed attributes, finding, 371 containers, 165 built-in, protection against accidental dele‐ tion of OUs, 187 changing default for computers, 298 default, binding to for computers, 296 deleting container with child objects, 155 Index | 801
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
827
loading container structure from AD into FIM, 740 moving object to different container, 145 quota container, anatomy of, 540 undeleting a container object, 604 Control Panel joining a computer to a domain, 279 renaming a computer, 283 controlling script, 755–760 ConvertTo-DnsServerPrimaryZone cmdlet, 468 Copy-GPO cmdlet, 310 copygpo.wsf script, 310 counters for performance objects, 555 createDialog attribute, 192 creategpo.wsf script, 309 createmigrationtable.wsf script, 317 createTimestamp attribute, 157 Credential Management (CM), 707 cross-forest trusts, 12 crossRef objects, 14, 149, 608 attributes of, 608 msDS-NC-Replica-Locations attribute, 613 removing for orphaned domain, 23 systemFlags attribute, 611 CS (see connector space) cscript utility, 307 CSV comma-separated values) files exporting objects to, 161 importing objects using PowerShell and, 162 csvde utility, 163 exporting objects to CSV files, 161 D DACL (Discretionary Access Control List), 252 DAG (Database Availability Group), creating, 701 data binding binding to default container for computers, 296 serverless bind, 4 using fast or concurrent bind, 114 Data Loss Prevention (DLP), 673 data sources in FIM, 710 flowing null value to a data source, 780 Database Availability Group (DAG), creating, 701 databases, 575 (see also DIT; ntds.dit file) creating mailbox database, 703 determining size of AD database, 601 FIM platform, 707 dcdiag utility checking for potential replication problems, 449 CheckSDRefDom, VerifyReplicas, and CrossRefValidation tests, 617 determining if any problems with applica‐ tion partition, 617 determining if KCC completes successfully, 433 finding services advertised by domain con‐ troller, 79 troubleshooting domain controller promo‐ tion or demotion, 69 verifying promotion of domain controller, 70 verifying that domain controller can register its resource records, 484 dcgpofix utility, 341 dcpromo utility, 19 log files, 69 Dcpromoui log files, 69 DCs (see domain controllers) DDNS (dynamic DNS), 18, 480 preventing domain controller from dynami‐ cally registering certain resource records, 490 preventing domain controller from using to register resource records, 489 defaultSecurityDescriptor attribute, classSche‐ ma object, 379 defragmentation offline defrag of DIT to reclaim space, 597 performing online defrag manually, 592 Delegation of Control Wizard, 499 customizing, 509–511 using, 507 Delegwiz.inf file, customizing, 509–511 deleted objects, 576 anatomy of, 577 authoritative restore of, 586 garbage collection of tombstoned objects, 599 searching for, 602 undeleting a container object, 604 undeleting a single object, 603 Deleted Objects container, 576 deletegpo.wsf script, 311 802 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
828
Delta Import and Delta Synchronization run profile, 763 loading telephoneNumber changes from AD using, 765 delta synchronization, 715 description attribute (OUs), 167 design considerations for AD, 12 DHCP (Dynamic Host Configuration Protocol) authorizing DHCP server, 495–497 restricting DHCP administrators, 497–499 dhcpClass class, 496 dhcpRoot objects, 496 diagnostics logging enabling, 540 enabling for replication events, 450 summary of settings, 541 directories in FIM, 710 synchronization from AD to HR database, 761 Directory Domains and Trusts MMC snap-in removing a trust, 46 Directory Services Restore Mode (see DSRM) Directory Sites and Services MMC snap-in changing subnet’s site assignment, 406 disconnectors, 714 Discretionary Access Control List (DACL), 252 display names of Active Directory users, modi‐ fying, 191 distinguished name (DN), 5, 14 advanced attribute flow in FIM, 732 DIT (Directory Information Tree), 575 checking DIT file’s integrity, 589 determining amount of whitespace in, 596 determining size of ntds.dit file, 601 moving DIT files, 590 performing offline defrag to reclaim space, 597 repairing or recovering, 591 DLP (Data Loss Prevention), 673 DN (distinguished name), 5, 14 advanced attribute flow in FIM, 732 DNS (Domain Name System), 11, 461–494 allowing computers to use domain suffix dif‐ ferent from AD domain, 493 anatomy of DNS object, 462 clearing the cache, 483 configuring conditional forwarding, 473 configuring forwarding, 471 configuring zone transfers, 470 converting zone to an AD integrated zone, 468 creating and deleting resource records, 475 creating forward lookup zone, 463 creating reverse lookup zone, 464 delegating control of AD integrated zone, 474 deregistering domain controller’s resource records, 488 domain controller covering for remote site, publishing site-specific resource records, 424 domainDNS objects, 608 enabling DNS server debug log, 485 finding domain controllers and global cata‐ logs, 92 finding PDC Emulator FSMO role owner via, 100 modifying DNS server configuration, 479 moving AD integrated zones into applica‐ tion partition, 469 preventing domain controller from dynami‐ cally registering all resource records, 489 querying resource records, 478 RegisterInDNS test, dcdiag, 69 registering domain controllers resource re‐ cords, 488 removing entries for demoted domain con‐ troller, 18 scavenging old resource records, 480 SRV records, modifying Priority and Weight fields, 93 viewing DNS server statistics, 546 viewing server’s zones, 466 DNS Management MMC snap-in clearing the DNS cache, 483 configuring conditional forwarding, 473 configuring forwarding, 472 configuring zone transfers, 470 converting zone to AD integrated zone, 468 creating and deleting resource records, 476 creating forward lookup zone, 463 creating reverse lookup zone, 464 delegating control of AD integrated zone, 474 enabling DNS server debug logging, 485 modifying DNS server configuration, 479 Index | 803
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
829
moving AD integrated zones into applica‐ tion partition, 469 querying resource records, 478 scavenging old resource records, 481 viewing server’s zones, 466 dnscmd utility clearing the DNS cache, 483 configuring conditional forwarding, 473 configuring forwarding, 472 configuring zone transfers, 470 converting zone to AD integrated zone, 468 creating and deleting resource records, 476 creating forward lookup zone, 463 creating reverse lookup zone, 465 enabling DNS server debug logging, 486 modifying DNS server configuration, 480 moving AD integrated zones into applica‐ tion partition, 469 scavenging old resource records, 481 viewing a server’s zones, 466 viewing DNS server performance statistics, 546 dNSHostName attribute, 494 dnsNode objects, 462 dnsRoot attribute, crossRef object, 611 dnsZone objects, 462 domain controllers, 55–101 anatomy of, 56 changing preference for, 93 checking if can be upgraded to Windows Server 2003 or 2008, 34 configuring to cover multiple sites, 423 configuring to use external time source, 83 deleted, restoring in Windows Server 2012, 80 demoting, 18 demoting when removing a domain, 21 demoting Windows Server 2012 domain controller, 66 determining if global catalog (GC) promo‐ tion is complete, 89 determining if two domain controllers are in sync, 439 determining size of AD database, 601 disabling automatic site coverage for, 425 enabling /3GB switch to increase LSASS cache, 86 enabling and disabling global catalog (GC), 86 enabling support for claims and compound authentication, 535 finding closest, 75 finding for a domain, 74 finding FSMO role holders, 95 finding number of logon attempts made against, 85 finding services advertised by, 79 finding site for, 76 finding via DNS, 92 forcing replication between two partners, 442 FSMO roles on, 387 or global catalogs, finding in a site, 91 listing connection objects associated with, 429 listing replication partners for, 455 moving to different site, 77, 422 nonauthoritative restore, 585 predefined partitions hosted by, 607 preventing from dynamically registering all DNS resource records, 489 preventing from dynamically registering cer‐ tain DNS resource records, 490 promoting a server to, 17, 58 promoting a server to RODC, 59 performing two-stage installation, 61 promoting server to Windows Server 2012 domain controller from media, 64 promotion or demotion problems, trouble‐ shooting, 68 promotion or demotion, automating, 67 querying for 5807 events, 403 registering DNS resource records, 488 registration of DNS resource records, 484 removing unsuccessfully demoted domain controller, 71 renaming, 73 replication on, 444 (see also replication) represented in site topology by server object, 421 resetting TCP/IP stack, 82 restarting in DS Repair Mode, 582–584 site coverage for, 424 targeting specific, 4 transferring FSMO roles, 97 verifying promotion, 70 viewing replication status for, 440 804 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
830
viewing unreplicated changes between, 441 domain functional levels raising to Windows Server 2012, 27 summary of, 27 domain local groups, 248 Domain Naming FSMO role, 22, 97 finding holders of, 95 Domain NC, 14, 607 domainDNS and crossRef objects in, 608 enumerating and connecting to well-known GUIDs in, 118 LostAndFound container, 454 msDS-LogonTimeSyncInterval attribute, 239 RDOCs versus writable domain controllers, 57 well-known GUIDs, 297 well-known GUIDs in, 119 domainDNS objects, 291 attributes of, 608 msDS-Behavior-Version attribute, 27 wellKnownObjects attribute, 298 DomainDNSZones application partition, re‐ moving for orphaned domain, 23 DomainRole attribute, 302 domains anatomy of, 14 changing maximum number of computers user can join to domain, 290 computers using domain suffix different from their AD domain, 493 creating, 19 creating external trust to, 35 creating shortcut trust between two AD do‐ mains, 38 defined, 11 enabling claims for devices in, 536 enabling strong authentication, 521 enumerating OUs in, 168 finding domain controllers for, 74 finding duplicate SIDs in, 51 finding GPOs in a domain, 307 finding holders of domain-level FSMO roles, 96 finding in a forest, 23 joining a computer to, 278 listing all computer accounts in a domain, 300 listing sites in, 395 modifying tombstone lifetime for, 605 moving a group to another domain, 257 moving a group within a domain, 256 moving computer to new domain, 281 moving computer within same domain, 280 moving object to different domain, 147 preparation for Exchange Server, 676 preparing for Windows Server 2012 with AdPrep, 30 determining if AdPrep has completed, 32 preparing for Windows upgrade, 352 referencing an external domain, 149 removing, 20 removing orphaned domain, 22 renaming, 26 searching for objects in, 120 setting reference domain for application par‐ tition, 620 viewing domain-wide account lockout and password policies, 213–215 viewing trusts for, 41 viewing trusts for a domain, 41 DOMAIN_CONTROLLER_INFO flags, 80 dsacls utility configuring permission inheritance, 517 creating a computer for specific user or group, 276 delegating control for managing group membership, 263 delegating control of a site, 398 delegating control of AD integrated zone, 475 delegating control of managing application partition, 622 delegation of control over objects, 508 managing AD LDS permissions, 653 protecting a group against accidental dele‐ tion, 270 protecting computer against accidental dele‐ tion, 303 protecting OU against accidental deletion, 186 protecting user against accidental deletion, 245 resetting object’s ACL to default defined in schema, 521 viewing ACL for an object, 513 viewing permissions of a group, 251 dsadd utility creating a computer, 275 Index | 805
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
831
creating a user, 193 creating an OU, 166 creating groups, 249 creating large number of users, 195 dsamain utility, mounting AD snapshot, 580 dsdbutil utility changing ports used by AD LDS instance, 633 listing AD LDS instances installed on a com‐ puter, 633 dsget utility determining if group caching is enabled, 266 finding quota usage for security principals, 571 viewing direct members of a group, 252 viewing nested members of a group, 254 viewing site properties, 395 DsGetDcName method, 75 DOMAIN_CONTROLLER_INFO structure returned by, 80 DsGetSiteName method, 426 dSHeuristics attribute, 507 dsmgmt utility, 636 dsmod utility adding and removing group members, 255 changing scope or type of a group, 259 changing tombstone weight in quota calcu‐ lations, 569 enabling and disabling global catalog (GC), 87 enabling and disabling users, 219 modifying an object, 134 modifying an OU, 180 modifying group attributes, 261 preventing user’s password from expiring, 230 renaming users, 207 requiring user to change password at next logon, 229 resetting computer account, 288 restricting DHCP administrators, 498 setting user’s account to expire, 236 setting user’s password, 227 setting user’s profile attributes, 202 user options for setting userAccountControl, 234 dsmove utility moving a computer within same domain, 281 moving a group within a domain, 256 moving an OU, 177 moving domain controller to a different site, 422 moving domain controller to different site, 77 moving object to different OU or container, 146 moving users, 204 renaming an object, 151 renaming an OU, 179 dsquery utility determining if group caching is enabled, 266 determining number of child units for an OU, 181 enumerating all GC servers in a forest, 90 enumerating objects in an OU, 171 enumerating OUs in a domain, 168 finding AD classes, 375 finding application partitions hosted by do‐ main controller, 615 finding application partitions in a forest, 610 finding computers with particular OS, 295 finding conflict objects, 452 finding disabled users, 220 finding GPOs in a domain, 308 finding holders of individual FSMO roles, 96 finding inactive or unused computers, 289 finding linked attributes, 374 finding mandatory and optional attributes of a class, 377 finding nonreplicated and constructed at‐ tributes, 372 finding orphaned objects, 454 finding quotas assigned to security principal, 567 finding Schema FSMO role owner, 386 finding site links for a site, 409 finding users with no recent logon, 239 finding users with passwords nearing expira‐ tion, 231 listing replication partners for domain con‐ troller, 455 listing servers in site topology, 421 listing sites in a forest, 395 listing subnets, 402 modifying attribute for several users at once, 200 806 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
832
returning distinguished name of server ob‐ ject, 78 searching for objects in a domain, 120 searching the global catalog, 123 searching with bitwise filter, 129 viewing an attribute, 358 viewing class attributes, 362 viewing created and last-modified time‐ stamps of an object, 156 viewing object’s attributes, 107 -attr option, 110 dsrevoke utility, revoking delegated permis‐ sions, 512 DSRM (Directory Services Restore Mode), 17 nonauthoritative restore by rebooting DC in, 585 rebooting into, during complete authorita‐ tive restore, 588 resetting administrator password, 584 restarting domain controller in, 582–584 stopping and starting of AD DS, 576 dsrm utility deleting a computer, 278 deleting a subnet, 405 deleting a user, 201 deleting an OU, 174 deleting container with child objects, 155 deleting objects in an OU, 173 Dynamic Access Control configuring central access rule, 533 creating central access policy, 534 creating new claim type for, 531 creating resource property for, 532 dynamic DNS (see DDNS) Dynamic Host Configuration Protocol (see DHCP) dynamic objects creating, 140 modifying default TTL settings, 144 refreshing, 142 dynamicObjectDefaultTTL attribute, 141 E EAC (see Exchange Administration Center) effective permissions of an object, 516 email configuring mailbox limits, 698 creating a mailbox database, 703 creating an address list, 700 deleting a user’s mailbox, 691 enabling message tracking on Exchange Server, 705 mail-disabling a user, 688 mail-enabling a user, 687 mailbox-enabling a user, 689 moving a mailbox, 693 viewing mailbox sizes and message counts, 695 EMS (see Exchange Management Shell) EMT (Exchange Management Tools), installing, 683 entryTTL attribute, 141, 143 enumprop command, 3 ESE (Extensible Storage Engine), 575 esentutl database utility, 594 event codes for DNS debug logging, 486 Event Viewer MMC checking Directory Services Event Log for global catalog server, 89 determining if KCC completes successfully, 433 event-based synchronization, identity manage‐ ment products, 714 EventCombMT utility, 212 Everyone security principal, 353 Exchange Administration Center (EAC), 674 accessing, 675 configuring mailbox limits, 698 creating a Database Availability Group (DAG), 701 creating a mailbox database, 703 creating an address list, 700 deleting a user’s mailbox, 692 enabling message tracking, 705 mail-disabling a user, 688 mail-enabling a user, 687 mailbox-enabling a user, 689 moving a mailbox, 693 Exchange Management Shell (EMS), 674 finding Exchange Server cmdlets, 675 Exchange Server 2013, 673–706 architecture, 674 configuring mailbox limits, 698 creating a mailbox database, 703 creating an address list, 700 creating Database Availability Group (DAG), 701 creating unattended installation files for, 682 Index | 807
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
833
deleting a user’s mailbox, 691 enabling message tracking, 705 enabling or disabling anti-malware scan‐ ning, 704 Exchange Server and Active Directory, 674 finding Exchange Server cmdlets, 675 installing Exchange Management Tools, 683 installing first server, 679 mail-disabling a user, 688 mail-enabling a user, 687 mailbox-enabling a user, 689 preparing Active Directory for Exchange, 676 services, 685 stopping and starting Exchange Server, 684 viewing mailbox sizes and message counts, 695 expensive or inefficient LDAP queries, logging, 549–551 explicit disconnectors, 714 Extensible Storage Engine (ESE), 575 F fast binds, 114 federated trusts, 657 Federated Web SSO design, 657 FGPPs (see fine-grained password policies) filters applying WMI filter to a GPO, 333 LDAP search filters, 121 searching with bitwise filter, 128 WMI, 305 creating, 332 FIM (see Forefront Identity Manager) findexpacc utility, 231 fine-grained password policies (FGPPs), 215 applying FGPP to group object, 270 applying FGPP to user object, 216 creating, 342 editing, 343 viewing FGPP in effect for user account, 217 Flexible Single Master Operation (see FSMO roles) Forefront Identity Manager (FIM), 707–786 committing changes to individual identities using Commit Preview feature, 777 configuring run profile for initial load of da‐ ta from SQL Server MA, 737 configuring run profile to load container structure from AD, 740 configuring run profile to load telephone‐ Number from AD, 762 connector, 714 connector space (CS), 712 creating a controlling script, 755–760 creating Active Directory management agent, 724 creating rule profile for provisioning, 747 executing provisioning rule, 749 creating rule profile to export objects from AD MA to AD, 750 creating run profile script, 753 creating SQL Server management agent, 722 defining advanced import attribute flow, 731 deleting data in connector space and meta‐ verse, 772 enabling directory synchronization from AD to HR database, 761 exporting and encoding accountExpires at‐ tribute, 784 exporting objects to AD using export run profile, 752 exporting telephoneNumber data to SQL Server DB, 767 using run profile, 768 extending object types to include new at‐ tribute, 773 flowing null value to a data source, 780 implementing advanced attribute flow rules extension, 733–736 importing and decoding accountExpires at‐ tribute, 782 importing data, 710 loading initial AD container structure into FIM using run profile, 742 loading initial SQL Server database data into FIM using run profile, 739 loading telephoneNumber from AD using run profile, 765 management agents (MAs), 717, 717 attribute flow rules, 718 example scenario, 720 Metaverse Designer, 718 run profiles, 717 metaverse (MV), 712 passing data between rules extensions using transaction properties, 778 808 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
834
previewing changes to configuration, 774 primer on, 710 projection and joins, 712 requirements for FIM 2010 R2, 709 searching data in connector space, 769 searching data in metaverse, 771 setting up advanced export attribute flow in Active Directory, 736 setting up metaverse object deletion rule, 726 setting up simple export attribute flow to AD, 729 setting up simple import attribute flow, 727 setting up SQL Server MA to project objects to metaverse, 743 state-based synchronization, 715 synchronization and reconciliation of identi‐ ty information, 709 using single rules extension to affect multi‐ ple attribute flows, 779 writing rules extension to provision user ob‐ jects, 744–747 ForeignSecurityPrincipal, 645 forests anatomy of, 13 creating, 15 creating domains in, 19 creating transitive trust between two AD for‐ ests, 37 creating UPN suffix for, 243 defined, 11 disabling replication on, 444 finding application partitions in, 609 finding domains in, 23 finding global catalog servers in, 90 finding holders of forest-level FSMO roles, 96 listing sites in, 395 modifying default LDAP query policy, 157 preparation for Exchange Server, 676 preparing for Windows Server 2012 with AdPrep, 30 determining if AdPrep has completed, 32 preparing for Windows upgrade, 352 raising functional level of Windows Server 2008 or 2008 R2 forest, 28 removing, 18 forward link, 375 forward lookup zones, 463 forwarding (DNS) configuring, 471 configuring conditional forwarding, 473 FQDN (fully qualified domain name), 73 FSMO (Flexible Single Master Operation) roles, 56 demotion of domain controller and, 67 Domain Naming FSMO, 22 finding PDC Emulator role owner via DNS, 100 finding role holders, 95 identifying a computer’s role, 301 managing Schema FSMO, 386 seizing a FSMO role, 99 summary of, 97 transferring a FSMO role, 97 fSMORoleOwner attribute, 76, 97 fsutil utility, creating reserve file, 595 full synchronization, 715 fully qualified domain name (FQDN), 73 functional levels domain, 27 forest, 28 G garbage collection, 593 changing interval for, 598 diagnostics logging option, 596 logging number of expired tombstone ob‐ jects, 600 GCs (global catalogs) determining if GC promotion is complete, 89 disabling global catalog requirement for user logon, 95 enabling and disabling, 86 finding domain controllers or global catalogs in a site, 91 finding global catalog servers in a forest, 90 finding via DNS, 92 modifying set of attributes stored on, 369 searching, 122 Get-ADDomain cmdlet, 25 -Identity switch, 96 finding holders of FSMO roles, 97 Get-ADDomainController cmdlet -Discover switch, 75 -Filter switch, 74, 90, 91 -Server switch, 76, 90 Index | 809
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
835
Get-ADForest cmdlet, 24, 29 finding forest-level FSMO role holders, 96 finding holders of FSMO roles, 97 Get-ADObject cmdlet -Filter switch, 111 -LDAPFilter switch, 112, 129 -SearchBase switch, 125 Get-ADOrganizationalUnit cmdlet -Filter parameter, 169 -LDAPFilter switch, 170 -SearchBase switch, 170 Get-ADPermission cmdlet, 251 Get-ADReplicationAttributeMetadata cmdlet, 457 Get-ADReplicationConnection cmdlet, 456 Get-ADReplicationPartnerMetadata cmdlet, 441 Get-ADReplicationSite cmdlet, 395 Get-ADReplicationSubnet cmdlet, 403 Get-ADReplicationUpToDatenessVectorTable cmdlet, 440 Get-ADRootDSE cmdlet, 105 Get-ADUser cmdlet, 107 Get-Command cmdlet, 676 Get-DnsServerZone cmdlet, 466 Get-ExCommand cmdlet, 676 Get-GPOReport cmdlet, 313 Get-MailboxStatistics cmdlet, 697 Get-WinEvent cmdlet, 405 GetADObject cmdlet –IncludeDeletedObjects switch, using LDAP controls, 113 getreportsforgpo.wsf script, 313 GetUserInfo utility, 221 global catalogs (see GCs) global groups, 248 globally unique identifiers (see GUIDs) GlobalNamesZone (GNZ), 461 GP BPA (Group Policy Best Practice Analyzer), 307 GPC (groupPolicyContainer) objects, 305 gpfixup.exe utility, 26 gpLink attribute, 185, 324 GPMC (see Group Policy Management Console MMC snap-in) GPME (see Group Policy Management Editor) GPOs (Group Policy Objects), 305–346 AdPrep switch updating permissions on, 31 applying security filter to a GPO, 327 applying WMI filter to a GPO, 333 assigning logon/logoff and startup/shut‐ down scripts in, 320 backing up, 335 blocking inheritance of GPOs on an OU, 325 configuring loopback processing for, 334 copying, 310 creating, 309 creating a WMI filter, 332 creating custom settings for, 317–319 creating migration table for, 316 delegating administration of, 329 deleting, 311 disabling user or computer settings in, 322 Domain Controllers OU and, 56 editing a fine-grained password policy, 343 enabling auditing of AD LDS access, 655 enabling auditing of changes to Registry keys, 564 enabling GPO client logging, 543 enforcing settings of GPO link, 326 finding in a domain, 307 importing security template, 331 importing settings into a GPO, 314 inability to link to built-in containers, 297 installing applications with, 321 linking to OUs, 185 listing links for a GPO, 323 managing, 306 modifying settings, 313 refreshing GPO settings on a computer, 340 restoring, 337 restoring default GPO, 341 reviewing settings, 312 simulating the RSoP, 338 viewing effective POS for a user, 345 GPPs (Group Policy Preferences), 306 gpresult utility, 339 GPT (Group Policy Template) files, 305 gpupdate utility, 340 group objects, 248 (see also groups) attributes of, 248 memberOf attribute, 253 primaryGroupToken attribute, 265 Group Policy Best Practice Analyzer (GP BPA), 307 Group Policy Editor (GPE), 306 810 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
836
Group Policy Management Console (GPMC) MMC snap-in, 306, 307 applying central access policy, 535 applying security filter to a GPO, 328 applying WMI filter to a GPO, 333 assigning logon logoff and startup/shutdown scripts in GPO, 320 backing up a GPO, 335 blocking inheritance of GPOs on an OU, 325 configuring domain controller to cover mul‐ tiple sites, 423 configuring loopback processing for a GPO, 334 copying a GPO, 310 creating a GPO, 309 creating GPO link to an OU, 324 creating migration table, 316 delegating administration of GPOs, 329 deleting a GPO, 311 disabling user or computer settings in a GPO, 322 enabling auditing of directory access, 561 enabling claims for devices in domain, 536 enabling domain controller support for claims and compound authentication, 536 enabling strong domain authentication, 522 enforcing settings of a GPO link, 326 finding GPOs in a domain, 308 importing security template into a GPO, 331 importing settings into a GPO, 314 installing applications with a GPO, 321 linking a GPO to an OU, 185 listing links for a GPO, 323 modifying GPO settings, 313 modifying Kerberos settings, 529 preventing domain controller from dynami‐ cally registering certain resource records, 490 restoring a GPO, 337 reviewing GPO settings, 312 Sample Scripts, 307 simulating the RSoP, 338 updating permissions on GPOs with Ad‐ Prep, 31 viewing domain-wide account lockout and password policies, 213 Group Policy Management Editor (GPME), 306 Group Policy Objects (see GPOs) Group Policy Preferences (GPPs), 306 Group Policy Template (GPT) files, 305 groupPolicyContainer (GPC) objects, 305 groups, 247–271 adding and removing members, 254 adding or removing computer account, 285 applying fine-grained password policy to group object, 270 changing scope or type, 259 changing user’s primary group, 223 copying user’s group membership to another user, 225 creating, 249 creating computer for specific group, 276 creating or deleting AD LDS groups, 643 delegating control for managing member‐ ship, 263 DHCP, adding or removing members, 498 enabling universal group membership cach‐ ing, 266 group object attributes, 248 included in Admin SD Holder processing, 525 managing AD LDS group memberships, 644 modifying attributes, 260 moving to another domain, 257 moving within a domain, 256 protecting from accidental deletion, 269 removing all group memberships from a user, 222 resolving primary group ID for a user, 264 restoration of, issues with, 587 restoring deleted group, 268 streamlining number a user belongs to, 530 viewing direct members of, 252 viewing nested members of, 253 viewing permissions of, 251 viewing user’s group membership, 221 groupType attribute, 250 changing type of a group, 260 GUI-based tools, 2 preparing Active Directory for Exchange, 676 running with alternate credentials, 3 signing and encrypting LDAP traffic, 503 GUIDs (globally unique identifiers) connecting to an object GUID, 116 connecting to well-known GUID, 117 Index | 811
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
837
GPO, stored in gpLink attribute, 324 object renaming and, 152 schemaIDGUID for classes, 361 well-known GUIDs that map to container objects, 297 H homeDirectory attribute, 203 homeDrive attribute, 203 hosts, forcing into a site, 427 I IADs interfaces, 116 IADsContainer::GetObject method, 116 IADsTool interface, 426 IADsUser::AccountDisabled property, 219 IADsUser::IsAccountLocked method, 211 identity data, synchronization and reconcilia‐ tion of (see Forefront Identity Manager) Identity Lifecycle Manager (ILM), 707 (see also Forefront Identity Manager) IIS (Internet Information Services) installing, 658 Import-GPO cmdlet, 315 inefficient or expensive LDAP queries, logging, 549–551 inetOrgPerson class, 193 inetOrgPerson objects converting user objects to or from, 198 creating, 196 information sources for AD tasks, 7 Infrastructure FSMO role, 97 finding holders of role, 96 running AdPrep to prepare domain for Win‐ dows Server 2012, 30 inheritance, 103 blocking inheritance of GPOs on an OU, 325 configuring permission inheritance, 516 Install-ADDSDomain cmdlet, 20 Install-ADDSDomainController cmdlet, 60, 68 Install-ADDSForest cmdlet, 17 Inter-Site Topology Generator (ISTG), 78 finding for a site, 429 transferring to another site, 431 Internet Information Service (IIS) Manager MMC snap-in, 658 Internet Information Services (see IIS) intra-site replication configuring for AD LDS, 648 invoke-command cmdlet, 68 Invoke-GPUpdate cmdlet, 341 ipconfig utility, 483 isDefunct attribute, 383 isGlobalCatalogReady attribute (RootDSE), 89 isMemberOfPartialAttributeSet attribute, 370 ISTG (see Inter-Site Topology Generator) I_NetLogonControl2 method, 85 J joins, 712 K KCC (Knowledge Consistency Checker), 78 changing interval at which it runs, 436 creating and maintaining connection ob‐ jects, 456 determine if completing successfully, 433 disabling for a site, 434 triggering, 432 Kerberos, 502 creating trust to Kerberos realm, 40 enabling Kerberos logging, 545 forcing to use TCP, 527 modifying settings, 529 resetting Kerberos realm trust, 45 support for claims, compound authentica‐ tion, and Kerberos armoring, 536 verifying a Kerberos trust, 44 viewing access tokens, 530 viewing and purging Kerberos tickets, 526 kerbtray utility, 526 klist utility, 527 L lastLogon attribute, 238 lastLogonTimestamp attribute, 237, 239 LDAP (Lightweight Directory Access Protocol), 103 configuring attribute store for AD FS, 661 controls supported by Active Directory, 113 deleting an OU with an LDAP utility, 174 disabling LDAP signing, 504 enabling anonymous LDAP access, 505 812 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
838
logging inefficient and expensive LDAP queries, 549–551 modifying default query policy, 157 or LDAP over SSL, changing ports used by AD LDS instance, 633 over SSL/TLS, 503 paged searching support via LDAP controls, 125 query policy settings, 158 search parameters for attribute-based query, 127 searches, using base DN, search scope, and search filter, 121 securing LDAP traffic with SSL, TLS, or signing, 503 using LDAP controls, 112 using LDAP filtering in PowerShell, 112 using STATS control to view query statistics, 551–554 lDAPAdminLimits attribute, 157 lDAPDisplayName attribute attributeSchema object, 359 classSchema objects, 361 LDIF (LDAP Data Interchange Format), 4, 197 (see also ldifde utility) create_crossref_object.ldf file, 149 create_dynamic_object.ldf file, 141 create_object.ldf file, 132 creating large number of users, file for, 195 dynamically_link_class.ldf file, 139 exporting objects to LDIF file, 159 files for AdPrep, 353 importing objects using LDIF file, 160 modify_object.ldf file, 134 MS-ADLDS-DisplaySpecifiers.LDF file, 649 optional files provided with AD LDS instal‐ ler, 641 refresh_dynamic_object.ldf file, 143 schema extension files, 353 ldifde utility, 5 adding fields to AD Users and Computers, 53 adding new attribute to the schema, 355 adding new class to the schema, 360 changing computer account quota, 291 changing garbage collection interval, 599 changing inter-site replication interval, 447 changing intra-site replication notification interval, 445 changing password for AD LDS user, 641 changing tombstone weight in quota calcu‐ lations, 569 computers using different domain suffix from AD domain, 494 configuring universal group caching for a site, 400 copying attributes when duplicating a user, 365 creating a site, 394 creating a site link, 408 creating a site link bridge, 417 creating a subnet, 401 creating an object, 132 creating dynamic object, 141 creating inetOrgPerson user, 197 creating large number of users, 195 deactivating classes and attributes, 382 disabling KCC for a site, 434 dynamically linking auxiliary class to exist‐ ing object instance, 139 enabling group caching, 267 exporting objects to LDIF file, 159 extending AD LDS schema, 635 importing data into AD LDS instance, 648 importing objects using LDIF file, 160 including attribute as part of ANR, 367 indexing an attribute, 363 modifying an object, 134 modifying computer object’s attributes, 293 modifying cost for a site link, 412 modifying group attributes, 261 modifying set of attributes stored on global catalog, 370 modifying sites associated with a site link, 410 modifying tombstone lifetime for a domain, 606 online defrag, manual, 593 referencing an external domain, 150 refreshing a dynamic object, 143 reloading the schema, 384 setting default quota for security principals, 570 setting preferred bridgehead server for a site, 420 LDP accessing AD snapshot data, 581 adding AD LDS application partitions, 636 Index | 813
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
839
binding to default container for computers, 296 changing default container for computers, 298 connecting to object GUID, 116 connecting to well-known GUID, 118 counting objects in Active Directory, 110 creating dynamic object, 140 deleting an object, 153 determining number of child objects for an OU, 181 fast or concurrent bind, 115 finding application partitions hosted by a server, 615 finding application partitions in a forest, 610 finding conflict objects from replication col‐ lisions, 452 finding linked attributes, 374 finding nonreplicated and constructed at‐ tributes, 371 managing AD LDS permissions, 652 performing online defrag manually, 592 redirecting users to alternative OU, 205 refreshing a dynamic object, 142 renaming an object, 151 searching for large number of objects, 124 searching for objects in a domain, 120 searching the global catalog, 122 searching with attribute-scoped query, 126 searching with bitwise filter, 128 using LDAP controls, 112 using STATS control to view LDAP query statistics, 552 viewing created and last-modified time‐ stamps of an object, 156 viewing object metadata, 456 viewing object’s attributes, 106 viewing RootDSE object, 104 leaf nodes, 165 licensingSiteSettings objects, 389 Lightweight Directory Access Protocol (see LDAP) lingering objects, 451, 577 linked attributes, finding, 373 linking GPOs, 305 creating GPO link to an OU, 324 links creating a site link, 407 enforcing settings of GPO link, 326 listing for a GPO, 323 restoration of GPOs and, 338 List Object Access mode, 523 listastallgpos.wsf script, 308 LM authentication, 522 Local Mailbox Move Wizard, 695 lockoutDuration attribute, 210 lockouts finding locked-out users, 209 troubleshooting account lockout problems, 211 unlocking a user, 210 viewing domain-wide lockout and password policies, 213–215 LockoutStatus utility, 212 lockoutTime attribute, 210 logging circular, 575 configuring for Active Directory Federation Services (AD FS), 671 directory access and modifications, 562 enabling diagnostics logging, 540 enabling DNS server debug logging, 485 event codes, 486 enabling GPO client logging, 543 enabling inefficient and expensive LDAP query logging, 549–551 enabling Kerberos logging, 545 enabling NetLogon logging, 542 enhanced logging of replication events, 450 message tracking log for Exchange Server, 705 tombstone objects removed in each garbage collection, 600 using Perfmon Trace Logs to monitor AD, 557–558 logonHours attribute, user object, 241 logons determining user’s last logon time, 237 finding number of attempts made against a domain controller, 85 finding users who haven’t logged on recently, 238 NetLogon logging, 542 requiring user to change password at next logon, 229 user, disabling global catalog requirement for, 95 814 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
840
viewing and modifying user’s permitted log‐ on hours, 240 loopback processing, configuring for a GPO, 334 loose replication consistency, 450 LostAndFound container, 454 LSASS cache, increasing, 86 M machine account quota, 290 mail and mailboxes (see email) mail attribute changing, 207 mailbox database, creating, 703 Mailbox Server role (Exchange Server 2013), 674 mailing lists for Active Directory, 9 managedBy attribute, 184, 243 group objects, 264 site objects, 398 managedObjects attribute, 184, 242 management agents (MAs), 717 attribute flow rules, 718 creating Active Directory management agent, 724 creating SQL Server management agent, 722 example scenario, synchronizing AD from HR database, 720 Metaverse Designer, 718 run profiles, 717 MAP (Microsoft Assessment and Planning) tools, 35 MaxTokenSize value, 530 mayContain attribute, classSchema object, 378 Measure-Object cmdlet, 182 member attribute group object, 222 member attribute, group object, 253, 254 memberOf attribute, 222, 226 group objects, 253 user objects, 265 memberof utility, 221 viewing nested members of a group, 254 message counts, viewing for mailboxes on a server, 695 message tracking in Exchange Server, 705 metadata, viewing object metadata, 456 metadirectory synchronization tools, 708 metaverse (MV), 712 creating Provisioning-Rules-Extension, 745 deleting data in, 772 mapping attributes from connected system into, 728 searching data in, 771 simple export attribute flow to AD MA, 730 SQL Server MA projecting objects to, 743 Metaverse Designer, 718 metaverse object deletion rule, 726 Microsoft Assessment and Planning Solution Accelerator, 35 Microsoft Developer Network (see MSDN) Microsoft Exchange Server 2013 (see Exchange Server 2013) Microsoft Forefront Identity Manager (see Fore‐ front Identity Manager) Microsoft Identity Lifecycle Manager (ILM), 707 (see also Forefront Identity Manager) Microsoft Knowledge Base (MS KB) articles, 1, 7 Microsoft Management Console (MMC), run‐ ning with alternate credentials, 4 Microsoft SQL Server (see SQL Server) Microsoft System Center Operations Manager (OpsMgr), 559 migration tables, 311 creating for GPO, 316 mmc command, 4 modifyTimestamp attribute, 157 Move-ADDirectoryServer cmdlet, 78 Move-ADDirectoryServerOperationMasterRole command, 98, 100 MS KB (see Microsoft Knowledge Base articles) ms-DS-MachineAccountQuota attribute, 291 msconfig utility, restarting domain controller in DSRM, 583 MSDN (Microsoft Developer Network), 1 information resources on Active Directory, 7 msDS-AllowedDNSSuffixes attribute, 494 msDS-Approx-Immed-Subordinates attribute, 182 example of constructed attribute, 373 msDS-DefaultQuota attribute, 570 msDS-HasInstantiatedNCs attribute, 617 msDS-LogonTimeSyncInterval attribute, 239 msDS-NC-Replica-Locations attribute, 611 msDS-NeverRevealGroup attribute (RODC), 63 msDS-PasswordSettingsObjects, 343 msDS-Preferred-GC-Site attribute, 268 Index | 815
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
841
msDS-PSOApplied attribute, 217 msDS-QuotaContainer objects, 540 msDS-QuotaControl objects, 540 msDs-QuotaEffective attribute, 571 msDS-QuotaTrustee attribute, 568 msDs-QuotaUsed attribute, 571 msDS-ReplAttributeMetaData attribute, 457 msDS-ReplAuthenticationMode, 651 description of values, 652 msDS-ReplValueMetaData attribute, 457 msDS-ResultantPSO attribute, 217 msDS-RevealedDSAs attribute, 232, 304 msDS-RevealedUsers attribute, 304 msDS-RevealOnDemandGroup attribute (RODC), 64 msDS-SDReferenceDomain attribute, 620 msDS-TombstoneQuotaFactor attribute, 568 msDs-TopQuotaUsage attribute, 572 msDS-User-Account-Control-Computed at‐ tribute, 211 msDS-UserAccountDisabled attribute, 642 msExchPrivateMDB class, 704 multimaster replication, 631 mustContain attribute, classSchema object, 378 MV (see metaverse) N namespaces, DNS, 11 naming contexts (NCs), 13 replication of Configuration and Schema NCs to all domain controllers, 55 NetBIOS name of a domain, 14, 24 netdom utility creating an external trust, 36 creating shortcut trust between AD do‐ mains, 39 creating transitive trust between AD forests, 37 creating trust to a Kerberos realm, 41 disabling SID filtering, 48 enabling quarantine for a trust, 48 enabling Selective Authentication for a trust, 50 enabling SID filtering for a trust, 47 enumerating trusts for a domain, 42 finding holders of FSMO roles, 96 joining a computer to a domain, 279 removing a trust, 46 renaming a computer, 284 renaming domain controller, 73 resetting a trust, 45 resetting computer account, 288 verifying a trust, 44 NetLogon service, 490 enabling logging, 542 netlogon.log file, 403 NO_CLIENT_SITE entries, 404 netmon utility, diagnosing DC promotion prob‐ lems, 69 netsh utility authorizing a DHCP server, 495 resetting TCP/IP stack on domain controller, 82 Network Monitor program (netmon), 69 New-ADCentralAccessRule cmdlet, 533 New-ADClaimType cmdlet, 531 new-ADComputer cmdlet, 275 New-ADFineGrainedPasswordPolicy cmdlet, 343 New-ADObject cmdlet -Path switch, 133 New-ADOrganizationalUnit command, 167 New-ADReplicationSiteLink cmdlet, 408 New-ADReplicationSiteLinkBridge cmdlet, 417 New-ADReplicationSubnet cmdlet, 402 New-ADUser cmdlet, 163 switches, 194 New-GPLink cmdlet, 325 nltest utility checking if global catalog (GC) promotion is complete, 89 deregistering domain controller’s resource records, 488 enabling NetLogon logging, 542 enumerating trusts for a domain, 42 switches to modify default behavior, 43 finding closest domain controller, 75 finding domain controller’s site, 76 finding number of attempted logons against a domain controller, 85 finding services advertised by domain con‐ troller, 79 finding site for a client, 426 registering DC’s resource records, 488 resetting computer account, 288 testing secure channel for a computer, 286 viewing site coverage for domain controller, 424 816 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
842
wrapper for DsGetDcName method, 75 nonauthoritative restore of domain controller, 585 nonreplicated attributes, finding, 371 nontransitive trusts, 15 normal connectors, 714 normal disconnectors, 714 NO_CLIENT_SITE entries, 403 example from netlogon.log file, 404 nslookup utility finding PDC Emulator FSMO role owner, 100 querying DNS SRV records, 92 querying resource records, 478 NT LAN Manager (NTLM) authentication, 522 NTDS counters, 555 NTDS Site Settings object msDS-Preferred-GC-Site attribute, 268 options attribute, 268 ntds.dit file, 575 checking integrity of, 589 contained in AD snapshot, mounting, 581 creating reserve file on disk containing, 595 determining size of, 601 moving, 590 optimizing disk space used by, performing online defrag, 592 performing database recovery on, 593 replication of, and promotion of server to domain controller, 64 nTDSConnection objects, 390 attributes of, 393 nTDSConnection objects, attributes of, 393 nTDSDSA objects, 56, 71, 390 attributes of, 57, 392 distinguishing domain controllers, 422 for replica servers, 613 msDS-HasInstantiatedNCs attribute, 617 queryPolicyObject attribute, 159 representing domain controllers, 76 nTDSSiteSettings objects, 389 attributes of, 391 creating, 394 ntdsutil utility authoritative restore of object or subtree, 586 checking integrity of DIT file, 589 creating AD snapshot, 579 creating and deleting application partition, 609 finding and deleting duplicate SIDs in a do‐ main, 51 finding replica servers for application parti‐ tion, 614 forcibly seizing Schema FSMO to another domain controller, 386 inability to recover database with, 594 modifying default LDAP query policy, 157 modifying default TTL settings for dynamic objects, 144 mounting AD snapshot, 580 moving DIT files, 590 offline defrag of DIT to reclaim space, 597 promoting server to Windows Server 2012 from media, 64 removing metadata of removed domain, 21 removing unsuccessfully demoted domain controller, 71 repairing or recovering the DIT, 591 resetting DSRM administrator password, 584 restoring deleted domain controller in Win‐ dows Server 2012, 81 transferring a FSMO role, 98 transferring Schema FSMO role, 386 verifying state of an application partition, 617 null value, flowing to data source in FIM, 780 O Object Identifiers (OIDs), generating for new class or attribute, 350 objectCategory attribute, 553 objectClass attribute, 133 dynamicObject, 141 objectClassCategory attribute, classSchema ob‐ jects, 376 objectGUID attribute, 117 objects, 103–163 AD LDS, viewing and modifying attributes, 645 anatomy of, 103 authoritative restore of, 586 changing ACL for, 518 common attributes, 103 comparing ACL to default defined in sche‐ ma, 520 connecting to object’s GUID, 116 connecting to well-known GUID, 117 Index | 817
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
843
counting in Active Directory, 110 creating, 131 creating dynamic object, 140 deleted objects in AD, 576 deleting, 153 deleting container with child objects, 155 deleting in an OU, 172 dynamically linking an auxiliary class, 139 enumerating in an OU, 170 exporting to CSV file, 161 exporting to LDIF file, 159 extending object types to include new at‐ tribute in FIM, 773 importing using LDIF file, 160 importing using PowerShell and CSV file, 162 modifying, 134 modifying a bit flag attribute, 136–138 modifying default LDAP query policy, 157 modifying default TTL settings for dynamic objects, 144 moving between OUs, 175 moving to different domain, 147 moving to different OU or container, 145 referencing an external domain, 149 refreshing a dynamic object, 142 renaming, 150 resetting ACL to default defined in schema, 521 searching for large number of, 124 searching for, in a domain, 120 searching the global catalog, 122 searching with attribute-scoped query, 126 searching with bitwise filter, 128 segregating into OUs, 167 undeleting a single object, 603 using fast or concurrent bind, 114 using LDAP controls, 112–114 viewing ACL for an object, 513 viewing attributes of, 106–110 viewing created and last-modified time‐ stamps, 156 viewing effective permissions on, 515 viewing metadata for, 456 viewing the RootDSE object, 104 viewing user’s managed objects, 242 objectVersion attribute of AD DS forest, 33 offline defrag, performing on DIT, 597 OIDs (Object Identifiers), generating for new class or attribute, 350 oldcmp utility, 239 finding inactive or unused computers, 289 oMSyntax attribute, 356 one-way trusts, 15 online defrag, performing manually, 592 operating system (OS) computer object attributes for, 274 operating systems (OS) finding computers with particular OS, 294 options attribute, 138 organizational units (see OUs) organizationalUnit objects, 165 orphaned objects, finding, 453 OUs (organizational units), 165–187 assigning or removing manager for, 183 attributes of organizationalUnit objects, 165 blocking inheritance of GPOs on an OU, 325 creating, 166 creating GPO link to an OU, 324 delegating control of, 182 deleting an OU, 173 deleting objects in, 172 determining number of child objects, 181 Domain Controllers organizational unit, 56 enumerating in a domain, 168 enumerating objects in, 170 finding, 169 group objects in, 255 linking GPO to, 185 managing AD LDS OUs, 637 modifying, 179 moving an OU, 177 moving object to different OU or container, 145 moving objects to different OU, 175 moving users between, 203 protecting against accidental deletion, 186 protection against accidental deletion of a group, 270 redirecting users to alternative OU, 205 renaming, 178 restoring an OU and all its child objects, 605 Outlook Web App (OWA), 673 P PAC (Privilege Attribute Certificate), 530 paged searching support via LDAP controls, 125 818 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
844
partitions, 607 (see also application partitions) in a forest, 13 in AD LDS instances, 635 predefined partitions hosted by AD domain controllers, 607 Partitions container, 14, 608 crossRef objects, 150 msDS-Behavior-Version attribute, 29 Password Replication Policy (PRP) configuration for RODCs, 57 modifying on a RODC, 62 passwords applying fine-grained password policy to group object, 270 applying fine-grained password policy to user object, 216 changing for AD LDS user, 640 finding users with passwords nearing expira‐ tion, 231 password management in FIM, 720 preventing from expiring, 230 preventing user from changing, 228 requiring user to change password at next logon, 229 resetting DSRM administrator password, 584 RODCs that cached computer’s password, viewing, 303 setting user’s password, 226 viewing domain-wide password policies, 213–215 viewing fine-grained password policy for user account, 217 PasswordSettingsObjects (PSOs), 217, 271 creating for fine-grained password policies, 343 editing, 344 precedence rules for, 218, 346 viewing effective PSO for a user, 345 PDC Emulator, 97 finding holders of role, 96 finding role owner via DNS, 100 finding via DNS, 93 seizing the role, 99 setting time source on, 84 transferring role to another domain control‐ ler, 98 performance alerts, 559 emailing an administrator on, 560 Performance Monitor creating administrative alert, 559 emailing administrator on performance alert, 560 examining performance of Active Directory, 554 using Trace Logs to monitor Active Directo‐ ry, 557–558 viewing DNS server performance statistics, 546 PermissionBits, description of values, 653 permissions, 310 (see also GPOs; security; users) viewing for a group, 251 PowerShell, 2, 2 accessing snapshot data, 581 Active Directory versions and, 3 adding and removing group members, 255 adding attribute to RO-FAS, 381 adding computer account to a group, 285 adding new class to the schema, 361 adding or removing replica server for appli‐ cation partition, 613 adding user or group to DHCP Administra‐ tors group, 499 anti-malware scanning on Exchange Server, script for, 704 applying fine-grained password policy to group object, 271 applying fine-grained password policy to user object, 216 applying security filter to a GPO, 328 assigning or removing manager for an OU, 184 authoritative restore of object or subtree, 587 authorizing a DHCP server, 495 backing up a GPO, 336 backing up the AD database, 578 binding to default container for computers, 297 blocking inheritance of GPOs on an OU, 326 changing ACL of an object, 518 changing inter-site replication interval, 447 changing interval at which KCC runs, 436 changing intra-site replication notification interval, 446 changing machine account quota, 291 Index | 819
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
845
changing password for AD LDS user, 641 changing scope or type of a group, 260 changing subnet’s site assignment, 407 changing tombstone quota factor, 569 checking for replication problems, 449 checking if global catalog (GC) promotion is complete, 90 clearing DNS cache, 483 configuring alternate UPN suffix, 667 configuring central access rule, 533 configuring conditional forwarding, 473 configuring forwarding, 472 configuring LDAP attribute store, 662 configuring logging for AD FS, 671 configuring mailbox limits, 698 configuring Microsoft SQL Server attribute store, 663 configuring permission inheritance, 517 configuring universal group caching for a site, 400 configuring zone transfers, 470 connecting to object GUID, 117 connecting to well-known GUIDs, 119 converting user object to inetOrgPerson ob‐ ject, 199 converting zone to AD integrated zone, 468 copying a GPO, 310 copying a user, 208 copying user’s group membership to another user, 226 counting objects in Active Directory, 111 creating a computer account, 275 creating a domain, 20 creating a forest, 17 creating a GPO, 309 creating a site, 394 creating a site link, 408 creating a site link bridge, 417 creating a subnet, 402 creating a user, 193 New-ADUser cmdlet, switches for, 194 creating AD FS claim descriptions, 663 creating address list in Exchange Server, 700 creating an object, 133 creating an OU, 167 creating and deleting DNS resource records, 477 creating central access policy, 534 creating claim type, 531 creating Claims Provider Trust rules, 670 creating fine-grained password policy (FGPP), 343 creating forward lookup zone, 464 creating groups, 250 creating large number of users, 195 creating mailbox database, 703 creating or removing AD LDS groups, 643 creating or removing AD LDS OUs, 638 creating replying party trust, 665 creating reverse lookup zone, 465 creating schema attribute, 355 creating UPN suffix for a forest, 243 deactivating schema class or attribute, 382 delegating control for managing group membership, 264 delegating control of AD integrated zone, 475 deleting a computer, 278 deleting a GPO, 312 deleting a site, 397 deleting a subnet, 406 deleting a user, 201 deleting an object, 154 deleting an OU, 174 deleting container with child objects, 155 deleting objects in an OU, 173 demoting domain controllers, 21 demoting Windows Server 2012 domain controller, 67 determining amount of whitespace in DIT, 596 determining and enabling universal group membership caching, 267 determining if domain controllers are in sync, 440 determining if KCC completes successfully, 433 determining number of child objects for an OU, 182 disabling automatic site coverage for domain controller, 425 disabling inter-site compression of replica‐ tion traffic, 448 disabling KCC for a site, 435 disabling site link transitivity and site link schedules, 415 disabling user or computer settings in a GPO, 322 820 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
846
dynamically linking auxiliary class to exist‐ ing object instance, 140 editing a fine-grained password policy, 344 emailing administrator on performance alert, 560 enabling and disabling global catalog (GC), 88 enabling anonymous LDAP access, 506 enabling change notification for site link, 413 enabling diagnostic logging, 541 enabling DNS server debug logging, 486 enabling GPO client logging, 543 enabling Kerberos logging, 545 enabling message tracking on Exchange Server, 705 enabling or disabling AD LDS user, 642 enabling or disabling user account, 219 enforcing settings of GPO link, 327 enumerating objects in an OU, 171 enumerating OUs in a domain, 169 enumerating trusts for a domain, 42 Exchange Server 2013, working with, 674 exporting objects to CSV file, 161 finding an OU, 170 finding application partitions hosted by a server, 616 finding application partitions in a forest, 610 finding bridgehead servers for sites, 418 finding classes of different types, 376 finding closest domain controller, 75 finding computers with particular OS, 295 finding conflict objects, 452 finding disabled users, 220 finding domain controllers for a domain, 74 finding domain controllers or global catalog servers in a site, 91 finding domain controller’s site, 76 finding domains in a forest, 24 finding Exchange Server cmdlets, 676 finding FSMO role holders in forest or do‐ main, 97 finding global catalogs in domain or forest, 90 finding GPOs in a domain, 308 finding holders of FSMO roles, 96 finding inactive or unused computers, 290 finding linked attributes, 374 finding locked-out users, 209 finding mandatory and optional attributes of a class, 377 finding NetBIOS name of a domain, 25 finding nonreplicated and constructed at‐ tributes, 372 finding orphaned objects, 454 finding quotas in a domain, 567 finding site links for a site, 409 finding users who haven’t logged on recently, 239 finding users with passwords nearing expira‐ tion, 231 forcing host into a particular site, 427 forcing Kerberos to use TCP, 528 forcing replication from one domain con‐ troller to another, 443 importing objects using CSV file, 162 importing settings into a GPO, 315 indexing an attribute, setting searchFlags bit value, 364 installing AD FS Federation Service, 661 installing AD LDS, 626 joining a computer to a domain, 279 linking GPO to an OU, 185 listing 5807 events, 405 listing AD LDS instances installed on a com‐ puter, 634 listing all computer accounts in a domain, 300 listing connection objects for a server, 429 listing links for a GPO, 324 listing replication partners for domain con‐ troller, 456 listing servers in site topology, 421 listing sites in a domain, 395 listing subnets and displaying their proper‐ ties, 403 logging number of expired tombstone ob‐ jects, 600 mail-disabling a user, 688 mail-enabling a user, 688 mailbox-disabling a user, 692 mailbox-enabling a user, 690 managing AD LDS group memberships, 645 managing AD LDS replication authentica‐ tion, 651 managing AD LDS users, 640 managing confidentiality bit for schema at‐ tributes, 380 Index | 821
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
847
migrating a group, 258 modifying a bit flag attribute, 137 modifying an object, 135 modifying an OU, 180 modifying attribute for several users at once, 200 modifying attributes copied during user du‐ plication, 366 modifying attributes included with ANR, 367 modifying computer object’s attributes, 293 modifying cost for a site link, 412 modifying default display name for users created in ADUC or ADAC, 192 modifying default security of a class, 379 modifying DNS server configuration, 480 modifying GPO settings, 314 modifying group attributes, 262 modifying list of allowed DNS suffixes for domain, 494 modifying replication schedules, 414 modifying sites associated with a site link, 410 modifying tombstone lifetime for a domain, 606 moving a group within a domain, 256 moving a mailbox, 693 moving AD integrated zones into applica‐ tion partition, 469 moving an OU, 178 moving computer within same domain, 281 moving domain controller to different site, 78, 423 moving object to different domain, 148 moving object to different OU or container, 146 moving objects to different OU, 176 moving Schema FSMO to another domain controller, 387 moving users, 204 parameters, replaceable text in, 6 performance monitoring for Active Directo‐ ry, 555 performing online defrag, 593 preventing domain controller from dynami‐ cally registering certain resource records, 492 preventing user from changing a password, 229 preventing user’s password from expiring, 230 promoting a server as RODC, 60 promotion or demotion of domain control‐ lers, automating, 67 protecting an OU against accidental dele‐ tion, 186 protecting computer against accidental dele‐ tion, 303 protecting group against accidental deletion, 270 protecting user against accidental deletion, 245 querying DNS resource records, 479 raising domain functional level to Windows Server 2012, 27 refreshing a dynamic object, 143 refreshing GPO settings on a computer, 341 remotely installing domain controller, 68 removing all group memberships from user, 223 renaming a computer, 284 renaming a site, 396 renaming an object, 152 renaming an OU, 179 renaming user objects, 207 requiring user to change password at next logon, 230 resetting computer’s secure channel, 288 resolving primary group for a user, 265 restoring a deleted group, 269 restoring a GPO, 337 restoring all child objects of OU, 605 restoring deleted domain controller in Win‐ dows Server 2012, 81 retrieving current forest functional level, 29 reviewing GPO settings, 313 running Exchange Server 2013 setup.exe, 682 scavenging old DNS resource records, 481 scripts in Exchange scripts folder, 675 searching for deleted objects, 602 searching for large number of objects, 125 searching for objects in a domain, 121 searching the global catalog, 123 searching with attribute-scoped query, 127 searching with bitwise filter, 129 seizing a FSMO role, 100 822 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
848
setting default quota for security principals, 570 setting preferred bridgehead server for a site, 420 setting replication notification delay for ap‐ plication partition, 619 setting user account options (userAccount‐ Control), 234 setting user’s account to expire, 237 setting user’s password, 227 setting user’s profile attributes, 203 SID filtering settings, viewing, 47 starting and stopping AD LDS instance, 632 Stop-Service cmdlet, 576 stopping and starting Exchange Server, 685 synchronizing DSRM password with pass‐ word of domain Administrator account, 584 testing secure channel for a computer, 286 transferring a FSMO role, 98 transferring ISTG to another site, 431 triggering the KCC, 433 undeleting a single object, 604 unlocking a user, 211 using LDAP controls, 113 verifying that domain controller can register its resource records, 484 viewing ACL for an object, 513 viewing an attribute, 358 viewing and modifying AD LDS object at‐ tributes, 647 viewing and modifying user’s permitted log‐ on hours, 240 viewing class properties, 362 viewing created and last-modified time‐ stamps of an object, 156 viewing direct members of a group, 253 viewing DNS server performance statistics, 547 viewing domain-wide account lockout and password policies, 213 viewing fine-grained password policy for user object, 217 viewing mailbox sizes and message counts, 696 viewing nested group membership, 254 viewing object metadata, 456 viewing object’s attributes, 107 viewing permissions of a group, 251 viewing replication status for domain con‐ trollers, 441 viewing RODCs that cached computer’s password, 304 viewing RODCs that cached user’s password, 233 viewing RootDSE object, 105 viewing server’s zones, 466 viewing user’s group membership, 221 viewing user’s managed objects, 242 Preview function, using in FIM, 774 primaryGroupID attribute, user objects, 224, 265 primaryGroupToken attribute, group object, 224, 265 Privilege Attribute Certificate (PAC), 530 profile attributes, setting for users, 202 profilePath attribute, 203 projection (in FIM), 712 provisioning and, 744 setting up SQL Server MA to project objects to metaverse, 743 provision (in FIM), 744 provisioning (in FIM) creating run profile for, 747 executing provisioning rule, 749 projection and, 744 steps in process, 745 PRP (see Password Replication Policy) psomgr utility, 217 applying fine-grained password policy to group object, 271 editing fine-grained password policy, 344 viewing effective PSO for a user, 345 PSOs (see PasswordSettingsObjects) Public Key Infrastructure (PKI), 707 pwdLastSet attribute, 232 pwdProperties attribute, 215 Q quarantine, enabling for a trust, 48 query policy settings (LDAP), 158 querybackuplocation.wsf script, 336 queryPolicy objects, 158 quotas anatomy of a quota object, 540 anatomy of quota object container, 540 changing relative weight of tombstone ob‐ jects in calculations, 568 Index | 823
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
849
creating, 565 defined, 539 finding quota usage for security principals, 571–573 finding quotas assigned to security principal, 567 setting default for all security principals, 570 R RDN (relative distinguished name), 14 changing for renamed user, 207 specifying value when creating objects, 133 Read-Only Domain Controllers (see RODCs) Read-Only Filtered Attribute Set (RO-FAS) adding attribute to, 381 recovery nonauthoritative restore, 585 performing authoritative restore of object or subtree, 586 performing complete authoritative restore, 588 performing database recovery, 593 recovering the DIT, 591 restarting domain controller in DSRM, 582– 584 snapshots of AD database, 578 undeleting a container object, 604 undeleting a single object, 603 Recycle Bin feature (AD), 80 redircmp utility, 297 changing default container for computers, 299 redirusr command, 206 Reference DN, 732 regedit utility changing interval at which KCC runs, 436 determining amount of whitespace in DIT, 596 enabling diagnostic logging, 541 enabling GPO client logging, 543 enabling Kerberos logging, 545 enabling strict or loose replication consisten‐ cy, 450 forcing host into a particular site, 427 forcing Kerberos to use TCP, 527 logging number of expired tombstone ob‐ jects, 600 RegisterInDNS test (dcdiag), 69 Registry settings configuring domain controller to use exter‐ nal time source, 83 diagnostics logging, 540 disabling automatic site coverage for domain controller, 425 enabling auditing of changes to Registry keys, 564 enabling Group Policy logging, 544 enabling Kerberos logging, 545 forcing host into a particular site, 427 governing ISTG registration, 432 interval at which KCC runs, 437 mnemonics for resource records, 492 modifying Priority or Weight field in SRV resource records, 93 preventing domain controller from dynami‐ cally registering certain resource records, 491 viewing RSoP for a computer, 340 relative distinguished name (see RDN) relying party trust, creating, 664 Remote Server Administration Tools (RSAT), 215 Remove Roles and Features Wizard, 21 Remove-ADReplicationSite cmdlet, 397 Remove-ADReplicationSubnet cmdlet, 406 Remove-GPO cmdlet, 312 rendom.exe utility, 26 repadmin utility checking for replication problems, 449 creating a connection object, 428 enabling and disabling replication, 444 enabling strict or loose replication consisten‐ cy, 451 finding bridgehead servers for a site, 418 finding ISTG for a site, 430 forcing AD LDS replication, 650 forcing replication from one domain con‐ troller to another, 443 listing connection objects for a server, 429 setting replication notification delay for ap‐ plication partition, 619 triggering the KCC, 432 viewing replication status for domain con‐ trollers, 440 viewing unreplicated changes between do‐ main controllers, 442 replaceable text in examples, 6 824 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
850
Replicating Directory Changes rights, 712 replication, 439–459 AD LDS configuration set, 629 changing inter-site replication interval, 446 changing intra-site replication notification interval, 445 checking for potential problems, 449 controlling manually, 415 determining if two domain controllers are in sync, 439 disabling inter-site compression of replica‐ tion traffic, 448 enabling and disabling, 444 enabling strict or loose consistency, 450 enhanced logging of replication events, 450 finding conflict objects, 452 finding orphaned objects, 453 forcing AD LDS replication, 649 forcing from one domain controller to an‐ other, 442 intra-site, configuring for AD LDS applica‐ tion partition, 648 listing replication partners for a domain controller, 455 managing AD LDS replication authentica‐ tion, 650 modifying schedules for, 413 setting notification delay for application par‐ tition, 618 viewing object metadata, 456 viewing replication status of several domain controllers, 440 viewing unreplicated changes between do‐ main controllers, 441 Replication Monitor finding bridgehead servers for a site, 418 request.inf file, 659 reserve file, creating, 595 resource properties for Dynamic Access Con‐ trol, 532 resource records, DNS, 461 creating and deleting, 475 deregistering domain controller’s records, 488 preventing domain controller from dynami‐ cally registering all records, 489 preventing domain controller from dynami‐ cally registering certain records, 490 querying, 478 registering domain controller’s records, 488 Registry mnemonics for, 492 scavenging old records, 480 verifying that domain controller can register its records, 484 resources for information, 7 restore from replication, 585 Restore-GPO cmdlet, 337 restoregpo.wsf script, 337 restores (see recovery) Resultant Set of Policies (see RSOP) reverse lookup zones, 464 revision attribute of AD DS domain, 33 Richards, Joe, 3 RID FSMO role, 97 finding holders of role, 96 moving a group to another domain, 258 seizing, issues with, 100 transferring to another domain controller, 98 RIDs, 51 RO-FAS (Read-Only Filtered Attribute Set) adding attribute to, 381 RODCs (Read-Only Domain Controllers), 56 AdPrep switch to allow for installation of, 31 attributes of, 57 installation, two-stage, 61 modifying Password Replication Policy (PRP), 62 preventing attribute’s replication to, 381 promoting a server to RODC, 59 viewing RODCs that cached computer’s password, 303 viewing RODCs that cached user’s password, 232 root domain, creating for a forest, 17 RootDSE objects domainFunctionality attribute, 28 forestFunctionality attribute, 29 isGlobalCatalogReady attribute, 89 schemaUpdateNow attribute, 385 viewing attributes of, 104 RSAT (Remote Server Administration Tools), 215 RSoP (Resultant Set of Policies) simulating, 338 viewing, 339 Index | 825
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
851
run profiles, 717 configuring to do initial load of data from SQL Server MA, 737 configuring to load container structure from AD, 740 configuring to load telephoneNumber from AD, 762 creating for provisioning, 747 creating script for, 753 creating to export object from AD MA to AD, 750 exporting objects to AD using, 752 SQL Server MA export run profile, using to export data to SQL Server DB, 768 using to load initial SQL Server DB data into FIM 2010 R2, 739 Run Step Warning dialog box, 765 runas command, 4 S SACL (System Access Control List), 252 SAM account, retrieving for all user objects in a domain, 120 sAMAccountName attribute changing when renaming users, 207 computer objects, 275 not applicable to AD LDS users, 640 using in group creation, 249 schema, 347–387 adding a new attribute, 354–357 adding a new class, 360 adding attribute to Read-Only Filtered At‐ tribute Set (RO-FAS), 381 anatomy of schema objects, 347 changing default ACL for object class, 519 deactivating classes and attributes, 382 default ACL for object class, comparing ACL of object to, 520 documenting extensions, 353 extending, 351 extending AD LDS schema, 634 finding linked attributes, 373 finding nonreplicated and constructed at‐ tributes, 371 finding structural, auxiliary, abstract and 88 classes, 375 generating OID to use for new class or at‐ tribute, 350 indexing an attribute, 363 managing confidentiality of attributes, 379 managing Schema Master FSMO, 386 modifying attributes copied when duplicat‐ ing a user, 365 modifying attributes included in ANR, 367– 369 modifying default security of a class, 378 modifying set of attributes stored on global catalog, 369 preparing Active Directory for Exchange Server, 678 preparing for Active Directory upgrade, 352 redefining classes and attributes, 383 registering Active Directory Schema MMC snap-in, 349 reloading the cache, 384 viewing a class, 362 viewing an attribute, 358 schema cache, 385 Schema container, 348 Schema FSMO role, 97 extending schema on, 385 finding holders of, 95 managing, 386 running AdPrep on to prepare forest for Windows Server 2012, 30 Schema NC, 14, 607 replication to domain controllers, 55 schemaIDGUID attribute attributeSchema object, 349 classSchema object, 348, 361 scope changing for a group, 259 group scopes, 248 LDAP searches, 121 scope of management (SOM), 305 assigning while linking a GPO, 325 scriptPath attribute, 203 scripts assigning in a GPO, 320 creating controlling script for FIM, 755–760 creating run profile script, 754 Group Policy Management Console Sample Scripts, 307 scripts folder, Exchange Server 2013, 675 Search Connector Space dialog box, 770 searchFlags attribute, 357 attributeSchema object, 130 confidentiality bit, 380 826 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
852
setting value to index an attribute, 363 secure channel for a computer, 273 resetting, 288 testing, 286 Secure Sockets Layer (see SSL) security, 501–537 applying central access policy, 535 auditing of directory access and modifica‐ tions, 561–564 auditing of Registry keys, 564 authentication (see authentication) changing ACL of an object, 518 comparing ACL of object to default defined in schema, 520 configuring central access rule, 533 configuring permission inheritance, 516 creating central access policy, 534 creating claim type for Dynamic Access Control, 531 creating resource property for Dynamic Ac‐ cess Control, 532 customizing ACL Editor, 514 customizing Delegation of Control Wizard, 509–511 disabling LDAP signing, 504 enabling anonymous LDAP access, 505 enabling List Object Access mode, 523 enabling SSL/TLS, 502 managing AD LDS permissions, 652 modifying ACL on administrator accounts, 525 modifying default security of a class, 378 resetting object’s ACL to default defined in schema, 521 revoking delegated permissions, 512 securing LDAP traffic with SSL, TLS, or signing, 503 using Delegation of Control Wizard, 507 viewing ACL for an object, 513 viewing effective permissions on an object, 515 vulnerability with use of SID history, 47 security boundary for Active Directory, forests as, 12 security filters, applying to GPO, 327 Security Identifiers (see SIDs) security principals finding quota usage for, 571–573 finding quotas assigned to, 567 protected by AdminSDHolder process, 518 quotas on number of objects created by, 565 setting default quota for all, 570 security templates, importing into GPOs, 331 Selective Authentication for a trust, 49 Send-MailMessage cmdlet, 560 Server Manager demoting Windows Server 2012 domain controller, 66 enabling SSL/TLS, 502 installing AD FS Federation Service, 661 installing AD LDS on Windows Server 2012 server, 626 installing IIS, 658 server objects, 57, 390 attributes of, 392 distinguished name (DN), 87 listing in site topology, 421 representing domain controllers in site top‐ ology, 76 serverless binding, 4 servers application partitions hosted by, finding, 615 DHCP, authorizing, 495–497 DNS enabling debug logging, 485 flushing the cache, 483 modifying configuration, 479 performance statistics, 546 viewing server’s zones, 466 zone transfers, 471 installing first Exchange Server 2013 server, 679 replica server for application partition adding or removing, 611 finding, 613 Servers container, 389 serversContainer objects, creating, 394 service-pack-level attributes of computer ob‐ jects, 52 servicePrincipalName attribute, 494 services (Exchange Server), 685 Services MMC snap-in starting and stopping AD LDS instance, 632 stopping and starting Exchange Server, 685 Set-ADAccountControl cmdlet, 229 Set-ADAccountPassword cmdlet, 227 Set-ADComputer cmdlet modifying computer object’s attributes, 293 Index | 827
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
853
Set-ADDomainMode cmdlet, 27 Set-ADGroup cmdlet modifying group attributes, 262 switches to modify specific group attributes, 262 Set-ADObject cmdlet, 88 Set-ADReplicationSiteLink cmdlet, 447 Set-ADReplicationSubnet cmdlet, 407 Set-ADUser cmdlet switches to modify userAccountControl, 234 Set-GPInheritance cmdlet, 326 Set-GPLink cmdlet, 327 Set-GPPermission cmdlet, 329 Set-GPRegistryValue cmdlet, 314 setgpopermissions.wsf script, 328, 328 Setup.exe (Exchange Server), 677 shortcut trust, creating between AD domains, 38 SIDs (Security Identifiers) enabling SID filtering for a trust, 47 finding duplicate SIDs in a domain, 51 restricting with quarantined trust, 48 signing disabling LDAP signing, 504 securing LDAP traffic with, 503 single sign-on (SSO), 657 site objects, 57 objects contained in, 394 site topology, 389–437 anatomy of objects, 390–393 changing interval at which KCC runs, 436 changing subnet’s site assignment, 406 configuring domain controller to cover mul‐ tiple sites, 423 configuring universal group caching for a site, 399 creating a connection object, 428 creating a site, 393 creating a site link, 407 creating a site link bridge, 416 creating a subnet, 401 delegating control of a site, 398 deleting a site, 397 deleting a subnet, 405 determining if KCC is completing success‐ fully, 433 disabling automatic site coverage for a do‐ main controller, 425 disabling KCC for a site, 434 disabling site link transitivity or site link schedules, 415 enabling change notification for a site link, 412 finding bridgehead servers for a site, 418 finding ISTG for, 429 finding missing subnets, 403 finding site for a client, 426 finding site links for a site, 409 forcing host into a particular site, 427 hierarchy, 390 listing connection objects for a server, 429 listing servers, 421 listing sites in a domain, 395 listing subnets, 402 modifying cost for a site link, 411 modifying replication schedules, 413 modifying sites associated with a site link, 410 moving domain controller to a different site, 422 renaming a site, 396 setting preferred bridgehead server for a site, 419 transferring ISTG to another site, 431 triggering the KCC, 432 viewing site coverage for a domain control‐ ler, 424 siteLink objects, 57 attributes of, 391 creating, 407 disabling transitivity or schedules, 415 enabling change notification for, 412 finding for a site, 409 modifying cost for, 411 modifying replication schedules, 413 modifying sites associated with, 410 sites, 76 (see also site topology) finding domain controllers or global catalogs in, 91 finding domain controller’s site, 76 moving domain controller to different site, 77 Sites container, 57, 389 sn (last name) attribute, 207 snapshots of AD database, 578 accessing snapshot data, 581 creating, 579 828 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
854
mounting, 580 SOM (scope of management), 305, 305 assigning while linking a GPO, 325 SQL (Structured Query Language) and Fore‐ front Identity Manager collocation, 709 SQL Server configuring attribute store for AD FS, 662 creating SQL Server management agent, 722 exporting telephoneNumber data from SQL Server MA to SQL Server DB, 767 Forefront Identity Manager (FIM), 707 SRV resource records global catalog servers and domain control‐ lers, 92 modifying Priority or Weight field, 93 SSL (Secure Sockets Layer), 501 enabling, 502 installing certificate on IIS server, 658 LDAP over SSL, changing ports used by AD LDS instance, 633 securing LDAP traffic with, 503 SSO (single sign-on), 657 staging in FIM, 710 state-based synchronization (FIM), 714 STATS LDAP control, using to view query sta‐ tistics, 551–554 Stop-Service cmdlet, 576 strict replication consistency, 450 structural classes, finding, 375 subnet objects, 57 attributes of, 391 deleting, 405 subnets changing site assignment, 406 creating, 401 finding missing subnets, 403 listing in AD, 402 Subnets container, 402 subSchema objects, 348 subtrees, authoritative restore of, 586 Support Tools, Replication Monitor, 418 synchronization of identity data, 715 objects projected from SQL Server MA to metaverse, 744 Synchronization Service Manager committing changes using Commit Preview, 777 configuring run profile for SQL Server MA, 738 configuring run profile to load telephone‐ Number from AD, 763 configuring SQL Server MA export run pro‐ file to export data to SQL Server DB, 767 creating Active Directory management Agent, 724 creating metaverse Provisioning-Rules￾Extension, 745 creating provisioning run profile for SQL Server MA, 747 creating run profile script, 754 creating SQL Server management agent, 723 defining advanced import attribute flow, 731 deleting data in connector space and meta‐ verse, 772 enabling directory synchronization from AD to HR database, 761 exporting and encoding accountExpires at‐ tribute, 784 flowing null value to a data source, 780 implementing advanced attribute flow rules extension, 733 importing and exporting accountExpires at‐ tribute, 782 loading initial SQL Server DB data into FIM using run profile, 739 run profile to export objects from AD MA to AD, 750 running AD MA run profile to import con‐ tainer structure, 742 running Delta Import and Delta Synchroni‐ zation run profile, 765 searching data in connector space, 769 searching data in metaverse, 771 setting up advanced export attribute flow in Active Directory, 736 setting up metaverse object deletion rule, 727 setting up simple attribute flow to AD, 729 setting up simple import attribute flow, 728 System Access Control List (SACL), 252 System Center Configuration Manager (Con‐ figMgr), 322 System container trustedDomain objects in, 15 WMIPolicy container, 332 System State backup of AD database, 578 Index | 829
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
855
systemFlags attribute attributeSchema object, 130, 373 bit values, 359 classSchema object, 348 crossref object, 611 systemMayContain attribute, classSchema ob‐ ject, 378 systemMustContain attribute, classSchema ob‐ ject, 378 SYSVOL folder, 306 replication of, 64 T TCP, forcing Kerberos to use, 527 TCP/IP stack, resetting on domain controller, 82 telephoneNumber attribute configuring run profile to load from AD, 762 exporting data to SQL Server database, 767 loading changes from AD using run profile, 765 templates for GPO settings, 318 security template, importing into a GPO, 331 TGT (ticket-granting ticket), 527, 530 third-party tools for Exchange Server 2013, 675 ticket-granting ticket (TGT), 527, 530 Time Service (Windows), monitoring, 548 time source (external), configuring domain controller to use, 83 timestamps, created and last-modified, of an object, 156 TLS (Transport Layer Security), 501 enabling, 502 securing LDAP traffic with, 503 tokensz utility, 530 tombstone objects, 576 changing how they count against quota us‐ age, 568 created by a security principal, 572 expired, logging number of, 600 garbage collection of expired objects, 599 modifying tombstone lifetime for a domain, 605 tombStoneLifetime attribute, 451 tombstoneLifetime attribute, 577 Trace Logs (Perfmon), 557–558 transaction properties in FIM, 778 transitive trusts, 15 Transport Layer Security (see TLS) Tree Delete LDAP control, 174 trustedDomain objects, 15 trusts anatomy of, 15 configuring a claims provider trust, 665 creating a replying party trust, 664 creating an external trust, 35 creating shortcut trust between two AD do‐ mains, 38 creating transitive trust between two AD for‐ ests, 37 creating trust to Kerberos realm, 40 defined, 11 enabling quarantine for, 48 enabling SID filtering for, 47 managing selective authentication for, 49 removing, 45 resetting, 45 restoration of trust objects, 587 transitive trust relationship between all do‐ mains in a forest, 13 verifying, 43 TTL settings (default), modifying for dynamic objects, 144 U unattended installation of Exchange Server, 682 unicodePwd attribute, 133, 227 Uninstall-ADDSDomainController cmdlet, 21, 67, 68 universal groups, 248 configuring caching for a site, 399 enabling group membership caching, 266 moving to another domain, 258 unjoining a computer from a domain, 280 unlock command, 209 unlocking a user, 210 up-to-dateness vector for domain controllers, 439 UPN (User Principal Name), 207 configuring alternate UPN suffix, 666 creating UPN suffix for a forest, 243 extracting to create a claim rule, 668 modifying, 207 UPN (userPrincipalName) computer objects, 277 urgent replication, 446 830 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
856
user objects, 15 accountExpires attribute, 237 attributes changed when creating a mailbox for, 691 attributes of, 189 converting to or from inetOrgPerson ob‐ jects, 198 creating, 192 linked attributes, 375 logonHours attribute, 241 provisioning in AD MA from objects in SQL Server MA, 744–747 retrieving SAM account name for all in a do‐ main, 120 userAccountControl attribute, 130, 234 User Principal Name (see UPN) userAccountControl attribute, 130, 138, 219 disabled user accounts, 220 disabling expiration of user’s password, 231 properties defined in ADS_USER_FLAG_ENUM, 235 setting user’s account options, 233 userAccountControl flag, 737 USERDOMAIN environment variable, 25 userProxy objects, 645 users, 189–245 adding additional fields to AD Users and Computers, 52 anatomy of, 189 applying fine-grained password policy to user object, 216 changing password for AD LDS user, 640 changing primary group for, 223 converting user object to or from inetOrg‐ Person object, 198 copying, 208 copying user’s group membership to another user, 225 creating, 192 creating a computer for specific user, 276 creating inetOrgPerson user, 196 creating large number of, 194 creating UPN suffix for a forest, 243 deleting, 201 determining last logon time, 237 disabling user settings in a GPO, 322 duplication of, modifying attributes copied during, 365 enabling and disabling, 218 enabling and disabling AD LDS user, 641 finding disabled users, 219 finding locked-out users, 209 finding passwords nearing expiration, 231 finding users who haven’t logged on recently, 238 mail-disabling, 688 mail-enabling, 687 mailbox-disabling (deleting the mailbox), 691 mailbox-enabling, 689 managing AD LDS users, 639 modifying attribute for several users at once, 200 modifying default display name for users created in ADUC or ADAC, 191 moving, 203 moving mailbox for, 693 preventing from changing a password, 228 preventing password from expiring, 230 protecting against accidental deletion, 245 redirecting to alternative OU, 205 removing all group memberships from, 222 renaming, 206 requiring password change at next logon, 229 resolving primary group ID for, 264 restoration of, issues with, 587 restoring deleted user, 244 setting account options (userAccountCon‐ trol), 233 setting account to expire, 236 setting password for, 226 setting profile attributes, 202 troubleshooting account lockout problems, 211 unlocking, 210 viewing and modifying permitted logon hours for, 240 viewing domain-wide account lockout and password policies, 213–215 viewing effective POS for, 345 viewing fine-grained password policy for user account, 217 viewing group membership for, 221 viewing RODCs that cached user’s password, 232 viewing user’s managed objects, 242 Users container of a domain, 15 Index | 831
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
857
V VBScript enabling List Object Access mode, 523 forcing Kerberos to use TCP, 528 modifying a bit flag attribute, 136 VisualBasic, script for advanced attribute flow rules extension, 734 Volume Shadow Copy Service (VSS), 579 W W32time service, stopping and starting, 84 w32tm utility, 548 wbadmin utility backing up the AD database, 578 nonauthoritative restore of domain control‐ ler, 585 performing complete authoritative restore, 588 Web SSO design, 657 websites, information resources for Active Di‐ rectory, 8 well-known GUIDs (WKGUIDs) connecting to, 117 mapped to container objects, 297 wellKnownObjects attribute, 119 domainDNS object, 298 whitespace determining amount in DIT, 596 generated in ntdis.dit from deleted objects, 593 whoami utility, 221 Windows Management Instrumentation (see WMI) Windows operating systems, monitoring per‐ formance of, 559 Windows Server 2008, 3 Windows Server 2008 R2, 3 creating a forest using a GUI, 16 Windows Server 2012, 3 ADMT MMC snap-in not supported on, 148 creating a forest, 16 Exchange Server 2013 installation, prerequi‐ sites for, 682 integration of adprep into domain controller promotion process, 353 promoting server to domain controller from media, 64 raising functional level of Windows Server R2 AD domain to, 27 restoring deleted domain controller, 80 using AdPrep to prepare domain or forest for, 30 Windows Time Service, monitoring, 548 WINS, removing entries for demoted domain controller, 18 Winsock, resetting, 82 WKGUIDs (well-known GUIDs), 117 mapped to container objects, 297 WMI (Windows Management Instrumentation) applying WMI filter to a GPO, 333 creating WMI filter, 332 filters, 305 WMIC command-line component, 302 WMI Query Language (WQL), 332 wmic utility, 301 WMIPolicy container, 332 WQL (WMI Query Language), 332 X xdr-fixup tool, 26 XML-based .admx format, GPO settings, 306 Z zombie objects, 451, 577 zones, DNS, 462 configuring zone transfers, 470 converting primary zone to AD integrated zone, 468 delegating control of AD integrated zone, 474 moving AD integrated zones into applica‐ tion partition, 469 viewing server’s zones, 466 832 | Index
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf
858
About the Authors Brian Svidergol specializes in Microsoft infrastructure and cloud-based solutions around Windows, Active Directory, Microsoft Exchange, System Center, virtualization, and MDOP. He holds the MCT, MCITP (EA), MCITP (VA), MCITP (Exchange 2010), and several other Microsoft and industry certifications. Brian authored Microsoft Of‐ ficial Curriculum (MOC) course 6426C - Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory. He has also worked on Microsoft certification exam development and related training content for several years. When he isn’t working on technology projects, he enjoys family time, basketball, and gaming. Robbie Allen is a technical leader at Cisco Systems, where he has been involved in the deployment of Active Directory, DNS, DHCP, and several network management solu‐ tions. Robbie was named a Windows Server MVP in 2004 and 2005 for his contributions to the Windows community and the publication of several popular O’Reilly books. Robbie is currently studying at MIT in its System Design and Management program. For more information, see Robbie’s website. Colophon The animal on the cover of Active Directory Cookbook, Fourth Edition is a bluefin tuna (Thunnus thynnus), also known as a horse mackerel. It inhabits both the Atlantic and Pacific Oceans in temperate and subtropical waters. The body of a bluefin tuna is a metallic, deep blue on top, while the undersides and belly are silvery white. The first dorsal fin is yellow or blue; the second is red or brown. The rear fin and finlets are yellow, edged with black. The central caudal keel is black. The bluefin tuna is one of the largest and fastest species of marine fish. An adult can weigh as much as 1,500 pounds (680 kilograms) and can swim up to speeds of 55 miles per hour (88.5 kilometers per hour). A bluefin tuna can swim across the Atlantic Ocean in 40 days. Recent pop-up satellite tracking has revealed that the bluefin tuna can dive to depths greater than 3,000 feet in a matter of minutes and still maintain a body tem‐ perature of 77 degrees Fahrenheit (25 degrees Celsius), even in near-freezing water. Commercial fishing has reduced the stock of bluefin tuna to the extent that a single fish, once caught, can be worth up to $40,000. However, the situation is reversible, and the numbers of tuna could increase if the guidelines of the International Commission for the Conservation of Atlantic Tuna (ICCAT), an intergovernmental fishing organization that oversees tuna, are followed. The cover image is from Dover Pictorial Archive. The cover font is Adobe ITC Gara‐ mond. The text font is Adobe Minion Pro; the heading font is Adobe Myriad Condensed; and the code font is Dalton Maag’s Ubuntu Mono.
http://ter40.free.fr/ebooktmp/new/Active%20Directory%20Cookbook,%204th%20Edition.pdf